1.70
Categories
Values
Enhance Staff Productivity
Improve Customer Service
DAP-1155/A
Беспроводная точка доступа с поддержкой режима маршрутизатора. Это доступное решение для создания беспроводных сетей дома и в офисе.
About Product
About Product
Description
Устройство DAP-1155 представляет собой беспроводную точку доступа с поддержкой режима маршрутизатора. Это доступное решение для создания беспроводных сетей дома и в офисе.
Используя DAP-1155, Вы сможете быстро организовать беспроводную сеть и разрешить Вашим сотрудникам или членам Вашей семьи подключаться к ней практически в любой точке (в зоне действия беспроводной сети). Точка доступа может выполнять функции базовой станции для подключения к беспроводной сети устройств, работающих по стандартам 802.11b, 802.11g и 802.11n (со скоростью до 150 Мбит/с).
В устройстве реализовано множество функций для беспроводного интерфейса. Устройство поддерживает несколько стандартов безопасности (WEP, WPA/WPA2), фильтрацию подключаемых устройств по MAC-адресу, несколько режимов работы (точка доступа, маршрутизатор, клиент), а также позволяет использовать технологии WPS, WDS и WMM.
Вы можете подключить беспроводную точку доступа DAP-1155 в режиме маршрутизатора к кабельному или DSL-модему или выделенной Ethernet-линии, чтобы использовать высокоскоростное соединение с сетью Интернет для решения широкого круга профессиональных задач.
В режиме маршрутизатора устройство DAP-1155 оснащено встроенным межсетевым экраном. Расширенные функции безопасности позволяют минимизировать последствия действий хакеров и предотвращают вторжения в Вашу сеть и доступ к нежелательным сайтам для пользователей Вашей локальной сети. Для управления и настройки DAP-1155 используется простой и удобный встроенный web-интерфейс (доступен на нескольких языках).
Характеристики:
Аппаратное обеспечение
Интерфейс WAN
1 порт 10/100BASE-TX Ethernet для подключения кабельного или DSL-модема или подключения к выделенной Ethernet-линии
Интерфейс LAN
1 порт 10/100BASE-TX Ethernet
Интерфейс WLAN
• IEEE 802.11n (до 150 Мбит/с)
• IEEE 802.11b/g
Антенны
Внешняя всенаправленная антенна с коэффициетом усиления 2 dBi
Диапазон частот
• 802.11b
◦ 2400 ~ 2497 МГц в диапазоне ISM
• 802.11g
◦ 2400 ~ 2483,5 МГц в диапазоне ISM
• 802.11n
◦ 2400 ~ 2483,5 МГц в диапазоне ISM
◦ HT20: 2412 ~ 2472 МГц в диапазоне ISM
◦ HT20: 2422 ~ 2462 МГц в диапазоне ISM
Скорость беспроводного соединения
• 802.11b: 11, 5,5, 2 и 1 Мбит/c
• 802.11g: 54, 48, 36, 24, 18, 12, 9 и 6 Мбит/с
• 802.11n: От 6,5 до 150 Мбит/с
Схемы модуляции
• 802.11b: DQPSK, DBPSK, DSSS, CCK
• 802.11g: BPSK, QPSK, 16QAM, 64QAM с OFDM
• 802.11n: BPSK, QPSK, 16QAM, 64QAM с OFDM
Чувствительность приемника
• 802.11b (типичная при PER = 8% для пакета размером 1000 байт)
-82 дБм при 1 Мбит/с
-80 дБм при 2 Мбит/с
-78 дБм при 5,5 Мбит/с
-76 дБм при 11 Мбит/с
• 802.11g (типичная при PER = 10% для пакета размером 1000 байт)
-85 дБм при 6 Мбит/c
-84 дБм при 9 Мбит/c
-82 дБм при 12 Мбит/c
-80 дБм при 18 Мбит/c
-77 дБм при 24 Мбит/c
-73 дБм при 36 Мбит/c
-69 дБм при 48 Мбит/c
-68 дБм при 54 Мбит/c
• 802.11n (типичная при PER = 10% для пакета размером 1000 байт)
2.4GHz, HT20
-82 дБм при MCS0
-79 дБм при MCS1
-77 дБм при MCS2
-74 дБм при MCS3
-70 дБм при MCS4
-66 дБм при MCS5
-65 дБм при MCS6
-64 дБм при MCS7
2.4GHz, HT40
-79 дБм при MCS0
-76 дБм при MCS1
-74 дБм при MCS2
-71 дБм при MCS3
-67 дБм при MCS4
-63 дБм при MCS5
-62 дБм при MCS6
-61 дБм при MCS7
Выходная мощность передатчика
Максимальное значение мощности передатчика будет изменяться в соответствии с правилами радиочастотного регулирования в Вашей стране
• 802.11b (типичная при комнатной температуре 25 °C)
18 дБм при 1 Мбит/c
18 дБм при 2 Мбит/c
18 дБм при 5,5 Мбит/c
18 дБм при 11 Мбит/c
• 802.11g (типичная при комнатной температуре 25 °C)
17 дБм при 6 Мбит/c
17 дБм при 9 Мбит/c
17 дБм при 12 Мбит/c
16 дБм при 18 Мбит/c
16 дБм при 24 Мбит/c
15 дБм при 36 Мбит/c
15 дБм при 48 Мбит/c
15 дБм при 54 Мбит/c
• 802.11n (типичная при комнатной температуре 25 °C)
2.4GHz, HT20
17 дБм при MCS0
17 дБм при MCS1
17 дБм при MCS2
16 дБм при MCS3
16 дБм при MCS4
16 дБм при MCS5
15 дБм при MCS6
14 дБм при MCS7
2.4GHz, HT40
17 дБм при MCS0
17 дБм при MCS1
17 дБм при MCS2
16 дБм при MCS3
16 дБм при MCS4
16 дБм при MCS5
15 дБм при MCS6
14 дБм при MCS7
Программное обеспечение
Режимы работы
• Режим точки доступа
• Режим маршрутизатора
Сетевые функции
• Типы WAN-соединения:
◦ PPPoE
◦ Статический IP
◦ Динамический IP
◦ PPTP/L2TP + Статический IP
◦ PPTP/L2TP + Динамический IP
• DHCP-сервер и DHCP-клиент
• DNS relay
• Пропуск VPN-тоннеля (PPTP/L2TP)
• Dynamic DNS
• Статическая IP-маршрутизация
• Удаленный доступ
• Сетевая статистика для каждого интерфейса
• IGMP Proxy
• RIP
• UPnP
• Поддержка функции ping со стороны внешней сети (WAN ping respond)
Беспроводное соединение
• Сегментация беспроводной сети (до 4-х SSID)
• Поддерживаемые стандарты безопасности:
◦ WEP
◦ WPA/WPA2 Personal
◦ WPA/WPA2 Enterprise
• MAC-фильтр
• Управление подключенными устройствами
• Методы PIN и PBC функции WPS
• Функция WMM (Wi-Fi QoS)
• Расширенные настройки
• Функция WDS
• Функция «клиент» в режиме точки доступа
◦ Клиент беспроводной сети
◦ Повторитель беспроводной сети
• Функция «клиент» в режиме маршрутизатора
◦ Повторитель WISP (беспроводного Интернет-провайдера)
Функции межсетевого экрана
• Преобразование сетевых адресов (NAT)
• Контроль состояния соединений (SPI)
• IP-фильтры
• URL-фильтр
• MAC-фильтр
• DMZ-зона
• Функция защиты от ARP- и DDoS-атак
• Виртуальные серверы
Настройка и управление
• Web-интерфейс настройки и управления на нескольких языках
• Доступ по TELNET
• Обновление внутреннего программного обеспечения точки доступа через web-интерфейс
• Сохранение и загрузка конфигурации
• Поддержка удаленного журналирования
• Автоматическая синхронизация системного времени с NTP-сервером и ручная настройка даты и времени (в режиме маршрутизатора)
• Функция Ping
• Утилита traceroute (в режиме маршрутизатора)
Индикаторы • Питание • Беспроводная сеть • WPS • Локальная сеть • Интернет Питание Источник питания: внешний адаптер питания постоянного тока 12В/0,5А Кнопки • Кнопка для возврата к заводским установкам по умолчанию • Кнопка WPS Рабочая температура От 0 до 40 C Температура хранения От -20 до 65 С Влажность при эксплуатации От 10% до 90% без конденсата Влажность при хранении От 5% до 95% без конденсата
…Индикаторы • Питание • Беспроводная сеть • WPS • Локальная сеть • Интернет Питание Источник питания: внешний адаптер питания постоянного тока 12В/0,5А Кнопки • Кнопка для возврата к заводским установкам по умолчанию • Кнопка WPS Рабочая температура От 0 до 40 C Температура хранения От -20 до 65 С Влажность при эксплуатации От 10% до 90% без конденсата Влажность при хранении От 5% до 95% без конденсата
User features
Organizational Features
Internet access is available for employees
{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"product":{"reference-bonus":{"ru":"Предложить бонус за референс","_type":"localeString","en":"Offer a reference bonus"},"configurator":{"_type":"localeString","en":"Сonfigurator","ru":"Конфигуратор"},"i-sell-it":{"ru":"I sell it","_type":"localeString","en":"I sell it"},"i-use-it":{"en":"I use it","ru":"I use it","_type":"localeString"},"roi-calculator":{"_type":"localeString","en":"ROI-calculator","ru":"ROI-калькулятор"},"selling":{"_type":"localeString","en":"Selling","ru":"Продают"},"using":{"ru":"Используют","_type":"localeString","en":"Using"},"show-more-button":{"en":"Show more","ru":"Показать еще","_type":"localeString"},"hide-button":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"supplier-popover":{"ru":"поставщик","_type":"localeString","en":"supplier"},"implementation-popover":{"en":"deployment","ru":"внедрение","_type":"localeString"},"manufacturer-popover":{"_type":"localeString","en":"manufacturer","ru":"производитель"},"short-description":{"_type":"localeString","en":"Pitch","ru":"Краткое описание"},"i-use-it-popover":{"_type":"localeString","en":"Make your introduction and get a bonus from ROI4CIO or the supplier.","ru":"Внесите свое внедрение и получите бонус от ROI4CIO или поставщика."},"details":{"_type":"localeString","en":"Details","ru":"Детальнее"},"description":{"_type":"localeString","en":"Description","ru":"Описание"},"product-features":{"_type":"localeString","en":"Product features","ru":"Особенности продукта"},"categories":{"ru":"Категории","_type":"localeString","en":"Categories"},"solutions":{"en":" Problems that solves","ru":"Проблемы которые решает","_type":"localeString"},"values":{"_type":"localeString","en":"Values","ru":"Ценности"},"сomparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison matrix"},"testing":{"en":"Testing","ru":"Тестирование","_type":"localeString"},"compare":{"en":"Compare with competitors","ru":"Сравнить с конкурентами","_type":"localeString"},"characteristics":{"en":" Characteristics","ru":"Характеристики","_type":"localeString"},"transaction-features":{"en":"Transaction Features","ru":"Особенности сделки","_type":"localeString"},"average-discount":{"ru":"Средняя скидка партнера","_type":"localeString","en":"Partner average discount"},"deal-protection":{"ru":"Защита сделки","_type":"localeString","en":"Deal protection"},"average-deal":{"ru":"Средний размер сделки","_type":"localeString","en":"Average deal size"},"average-time":{"ru":"Средний срок закрытия сделки","_type":"localeString","en":"Average deal closing time"},"login":{"ru":"Войти","_type":"localeString","en":"Login"},"register":{"_type":"localeString","en":"Register","ru":"Зарегистрироваться"},"to-know-more":{"en":"To know more","ru":"Чтобы узнать больше","_type":"localeString"},"scheme":{"ru":"Схема работы","_type":"localeString","en":" Scheme of work"},"competitive-products":{"en":" Competitive products","ru":"Конкурентные продукты","_type":"localeString"},"implementations-with-product":{"ru":"Внедрения с этим продуктом","_type":"localeString","en":"Deployments with this product"},"user-features":{"ru":"Особенности пользователей","_type":"localeString","en":"User features"},"job-roles":{"ru":"Роли заинтересованных сотрудников","_type":"localeString","en":" Roles of Interested Employees"},"organizational-features":{"_type":"localeString","en":"Organizational Features","ru":"Организационные особенности"},"calculate-price":{"en":" Calculate product price","ru":"Рассчитать цену продукта","_type":"localeString"},"selling-stories":{"_type":"localeString","en":" Selling stories","ru":"Продающие истории"},"materials":{"_type":"localeString","en":"Materials","ru":"Материалы"},"about-product":{"ru":"О продукте","_type":"localeString","en":"About Product"},"or":{"en":"or","ru":"или","_type":"localeString"},"program-sends-data":{"_type":"localeString","en":"Program Sends Data"},"calculate-roi":{"_type":"localeString","en":"Calculate Product ROI","ru":"Рассчитать ROI продукта"},"complementary-categories":{"en":"Complementary Categories","ru":"Схожие категории","_type":"localeString"},"program-receives-data":{"en":"Program Receives Data","_type":"localeString"},"rebate":{"en":"Bonus","ru":"Бонус","_type":"localeString"},"rebate-for-poc":{"en":"Bonus 4 POC","ru":"Бонус 4 POC","_type":"localeString"},"configurator-content":{"en":"Calculate price for this product here","ru":"Рассчитайте стоимость продукта","_type":"localeString"},"configurator-link":{"_type":"localeString","en":"here","ru":"тут"},"vendor-popover":{"ru":"производитель","_type":"localeString","en":"vendor"},"user-popover":{"_type":"localeString","en":"user","ru":"пользователь"},"select-for-presentation":{"ru":"выбрать продукт для презентации","_type":"localeString","en":"select product for presentation"},"auth-message":{"en":"You have to register or login.","ru":"Вам нужно зарегистрироваться или войти.","_type":"localeString"},"add-to-comparison":{"ru":"Добавить в сравнение","_type":"localeString","en":"Add to comparison"},"added-to-comparison":{"ru":"Добавлено в сравнения","_type":"localeString","en":"Added to comparison"},"roi-calculator-content":{"en":"Calculate ROI for this product here","ru":"Рассчитайте ROI для данного продукта","_type":"localeString"},"not-yet-converted":{"ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время.","_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later."},"videos":{"ru":"Видео","_type":"localeString","en":"Videos"},"vendor-verified":{"ru":"Подтверждено производителем","_type":"localeString","en":"Vendor verified"},"event-schedule":{"ru":"Расписание событий","_type":"localeString","en":"Events schedule"},"scheduling-tip":{"en":"Please, сhoose a convenient date and time and register for the event.","ru":"Выберите удобную дату и время и зарегистрируйтесь на ивент.","_type":"localeString"},"register-to-schedule":{"ru":"Для того чтобы зарегистрироваться на ивент пожалуйста авторизируйтесь или зарегистрируйтесь на сайт.","_type":"localeString","en":"To register for the event please log in or register on the site."},"comparison-matrix":{"en":"Comparison matrix","ru":"Матрица сравнений","_type":"localeString"},"compare-with-competitive":{"_type":"localeString","en":" Compare with competitive","ru":"Сравнить с конкурентными"},"avg-deal-closing-unit":{"ru":"месяцев","_type":"localeString","en":"months"},"under-construction":{"ru":"Данная услуга всё ещё находится в разработке.","_type":"localeString","en":"Current feature is still developing to become even more useful for you."},"product-presentation":{"ru":"Презентация продукта","_type":"localeString","en":"Product presentation"},"go-to-comparison-table":{"en":" Go to comparison table","ru":"Перейти к таблице сравнения","_type":"localeString"},"see-product-details":{"en":"See Details","ru":"Детали","_type":"localeString"}},"header":{"help":{"de":"Hilfe","ru":"Помощь","_type":"localeString","en":"Help"},"how":{"ru":"Как это работает","_type":"localeString","en":"How does it works","de":"Wie funktioniert es"},"login":{"de":"Einloggen","ru":"Вход","_type":"localeString","en":"Log in"},"logout":{"_type":"localeString","en":"Sign out","ru":"Выйти"},"faq":{"de":"FAQ","ru":"FAQ","_type":"localeString","en":"FAQ"},"references":{"ru":"Мои запросы","_type":"localeString","en":"Requests","de":"References"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"_type":"localeString","en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта"},"autoconfigurator":{"_type":"localeString","en":" Price calculator","ru":"Калькулятор цены"},"comparison-matrix":{"_type":"localeString","en":"Comparison Matrix","ru":"Матрица сравнения"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"en":"Bonus for reference","ru":"Бонус за референс","_type":"localeString"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"en":"Catalogs","ru":"Каталоги","_type":"localeString"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"_type":"localeString","en":"Blog","ru":"Блог"},"agreements":{"ru":"Сделки","_type":"localeString","en":"Deals"},"my-account":{"ru":"Мой кабинет","_type":"localeString","en":"My account"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"ru":"Удаление","_type":"localeString","en":"Deletion"},"comparison-confirm":{"ru":"Подтвердите удаление","_type":"localeString","en":"Are you sure you want to delete"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"_type":"localeString","en":"My profile","ru":"Мои данные"},"about":{"en":"About Us","_type":"localeString"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"_type":"localeString","en":"Pitch Avatar"},"sub_it_catalogs":{"_type":"localeString","en":"Find IT product"},"sub_b4reference":{"en":"Get reference from user","_type":"localeString"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"en":"Our IT Catalogs","_type":"localeString"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"en":"Explore IT products by category","_type":"localeString"},"it_our_products":{"_type":"localeString","en":"Our Products"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"de":"Über die Firma","ru":"О компании","_type":"localeString","en":"My Company"},"about":{"_type":"localeString","en":"About us","de":"Über uns","ru":"О нас"},"infocenter":{"en":"Infocenter","de":"Infocenter","ru":"Инфоцентр","_type":"localeString"},"tariffs":{"_type":"localeString","en":"Subscriptions","de":"Tarife","ru":"Тарифы"},"contact":{"de":"Kontaktiere uns","ru":"Связаться с нами","_type":"localeString","en":"Contact us"},"marketplace":{"en":"Marketplace","de":"Marketplace","ru":"Marketplace","_type":"localeString"},"products":{"_type":"localeString","en":"Products","de":"Produkte","ru":"Продукты"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс","_type":"localeString"},"salestools":{"de":"Salestools","ru":"Salestools","_type":"localeString","en":"Salestools"},"automatization":{"_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung","ru":"Автоматизация расчетов"},"roi_calcs":{"_type":"localeString","en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы"},"matrix":{"_type":"localeString","en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения"},"b4r":{"_type":"localeString","en":"Rebate 4 Reference","de":"Rebate 4 Reference","ru":"Rebate 4 Reference"},"our_social":{"de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString","en":"Our social networks"},"subscribe":{"en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку","_type":"localeString"},"subscribe_info":{"ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString","en":"and be the first to know about promotions, new features and recent software reviews"},"policy":{"_type":"localeString","en":"Privacy Policy","ru":"Политика конфиденциальности"},"user_agreement":{"_type":"localeString","en":"Agreement","ru":"Пользовательское соглашение "},"solutions":{"_type":"localeString","en":"Solutions","ru":"Возможности"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"ru":"Калькулятор цены","_type":"localeString","en":"Price calculator"},"boosting":{"ru":"Развитие бизнеса","_type":"localeString","en":"Business boosting"},"4vendors":{"ru":"поставщикам","_type":"localeString","en":"4 vendors"},"blog":{"ru":"блог","_type":"localeString","en":"blog"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"ru":"Email","_type":"localeString","en":"Email"},"subscribe__name-label":{"ru":"Имя","_type":"localeString","en":"Name"},"subscribe__required-message":{"en":"This field is required","ru":"Это поле обязательное","_type":"localeString"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"ru":"Подписаться","_type":"localeString","en":"Subscribe"},"subscribe__email-message":{"_type":"localeString","en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты"},"subscribe__email-placeholder":{"en":"username@gmail.com","ru":"username@gmail.com","_type":"localeString"},"subscribe__name-placeholder":{"en":"Last, first name","ru":"Имя Фамилия","_type":"localeString"},"subscribe__success":{"en":"You are successfully subscribed! Check you mailbox.","ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString"},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"en":"Roi4Presenter","de":"roi4presenter","ru":"roi4presenter","_type":"localeString"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"_type":"localeString","en":"Home","ru":"Главная"},"companies":{"ru":"Компании","_type":"localeString","en":"Companies"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"ru":"Внедрения","_type":"localeString","en":"Deployments"},"login":{"en":"Login","ru":"Вход","_type":"localeString"},"registration":{"ru":"Регистрация","_type":"localeString","en":"Registration"},"b2b-platform":{"_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers","ru":"Портал для покупателей, поставщиков и производителей ИТ"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"en":"First name","ru":"Имя","_type":"localeString"},"lastname":{"_type":"localeString","en":"Last name","ru":"Фамилия"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"en":"Position","ru":"Должность","_type":"localeString"},"actual-cost":{"en":"Actual cost","ru":"Фактическая стоимость","_type":"localeString"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"ru":"Тип экономии","_type":"localeString","en":"Saving type"},"comment":{"_type":"localeString","en":"Comment","ru":"Комментарий"},"your-rate":{"_type":"localeString","en":"Your rate","ru":"Ваша оценка"},"i-agree":{"en":"I agree","ru":"Я согласен","_type":"localeString"},"terms-of-use":{"_type":"localeString","en":"With user agreement and privacy policy","ru":"С пользовательским соглашением и политикой конфиденциальности"},"send":{"_type":"localeString","en":"Send","ru":"Отправить"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"_type":"localeString","en":"Thank you for your understanding","ru":"Спасибо за ваше понимание"}}},"translationsStatus":{"product":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"product":{"title":{"ru":"ROI4CIO: Продукт","_type":"localeString","en":"ROI4CIO: Product"},"meta":[{"name":"og:type","content":"website"},{"name":"og:image","content":"https://roi4cio.com/fileadmin/templates/roi4cio/image/roi4cio-logobig.jpg"}],"translatable_meta":[{"name":"og:title","translations":{"en":"Example product","ru":"Конкретный продукт","_type":"localeString"}},{"name":"og:description","translations":{"_type":"localeString","en":"Description for one product","ru":"Описание для конкретного продукта"}},{"translations":{"ru":"Продукт","_type":"localeString","en":"Product"},"name":"title"},{"name":"description","translations":{"ru":"Описание продукта","_type":"localeString","en":"Product description"}},{"name":"keywords","translations":{"ru":"Ключевые слова продукта","_type":"localeString","en":"Product keywords"}}]}},"pageMetaDataStatus":{"product":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{"dap-1155a":{"id":696,"logoURL":"https://old.roi4cio.com/fileadmin/content/DAP-1155_B1.jpg","logo":true,"scheme":false,"title":"DAP-1155/A","vendorVerified":0,"rating":"1.70","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"dap-1155a","companyTitle":"D-Link","companyTypes":["supplier","vendor"],"companyId":3346,"companyAlias":"d-link","description":"<div id=\"cside\">\r\n<div style=\"text-align: justify;\">Устройство DAP-1155 представляет собой беспроводную точку доступа с поддержкой режима маршрутизатора. Это доступное решение для создания беспроводных сетей дома и в офисе.\r\n<div style=\"text-align: justify;\"> \r\n<div style=\"text-align: justify;\">Используя DAP-1155, Вы сможете быстро организовать беспроводную сеть и разрешить Вашим сотрудникам или членам Вашей семьи подключаться к ней практически в любой точке (в зоне действия беспроводной сети). Точка доступа может выполнять функции базовой станции для подключения к беспроводной сети устройств, работающих по стандартам 802.11b, 802.11g и 802.11n (со скоростью до 150 Мбит/с).\r\n<div style=\"text-align: justify;\"> \r\n<div style=\"text-align: justify;\">В устройстве реализовано множество функций для беспроводного интерфейса. Устройство поддерживает несколько стандартов безопасности (WEP, WPA/WPA2), фильтрацию подключаемых устройств по MAC-адресу, несколько режимов работы (точка доступа, маршрутизатор, клиент), а также позволяет использовать технологии WPS, WDS и WMM.\r\n<div style=\"text-align: justify;\"> \r\n<div style=\"text-align: justify;\">Вы можете подключить беспроводную точку доступа DAP-1155 в режиме маршрутизатора к кабельному или DSL-модему или выделенной Ethernet-линии, чтобы использовать высокоскоростное соединение с сетью Интернет для решения широкого круга профессиональных задач.\r\n<div style=\"text-align: justify;\"> \r\n<div style=\"text-align: justify;\">В режиме маршрутизатора устройство DAP-1155 оснащено встроенным межсетевым экраном. Расширенные функции безопасности позволяют минимизировать последствия действий хакеров и предотвращают вторжения в Вашу сеть и доступ к нежелательным сайтам для пользователей Вашей локальной сети. Для управления и настройки DAP-1155 используется простой и удобный встроенный web-интерфейс (доступен на нескольких языках).\r\n<div style=\"text-align: justify;\"> \r\n<div style=\"text-align: justify;\">\r\n<div class=\"textr\"><em><strong>Характеристики:</strong></em>\r\n<div id=\"cside\">\r\n<strong>Аппаратное обеспечение</strong>\r\n<strong>Интерфейс WAN</strong>\r\n1 порт 10/100BASE-TX Ethernet для подключения кабельного или DSL-модема или подключения к выделенной Ethernet-линии\r\n \r\n<strong>Интерфейс LAN</strong>\r\n1 порт 10/100BASE-TX Ethernet\r\n \r\n<strong>Интерфейс WLAN</strong>\r\n• IEEE 802.11n (до 150 Мбит/с)\r\n• IEEE 802.11b/g\r\n \r\n\r\n<strong>Антенны</strong>\r\nВнешняя всенаправленная антенна с коэффициетом усиления 2 dBi\r\n \r\n\r\n<strong>Диапазон частот</strong>\r\n• 802.11b\r\n ◦ 2400 ~ 2497 МГц в диапазоне ISM\r\n• 802.11g\r\n ◦ 2400 ~ 2483,5 МГц в диапазоне ISM\r\n• 802.11n\r\n ◦ 2400 ~ 2483,5 МГц в диапазоне ISM\r\n ◦ HT20: 2412 ~ 2472 МГц в диапазоне ISM\r\n ◦ HT20: 2422 ~ 2462 МГц в диапазоне ISM\r\n \r\n<strong>Скорость беспроводного соединения</strong>\r\n• 802.11b: 11, 5,5, 2 и 1 Мбит/c\r\n• 802.11g: 54, 48, 36, 24, 18, 12, 9 и 6 Мбит/с\r\n• 802.11n: От 6,5 до 150 Мбит/с\r\n \r\n<strong>Схемы модуляции</strong>\r\n• 802.11b: DQPSK, DBPSK, DSSS, CCK\r\n• 802.11g: BPSK, QPSK, 16QAM, 64QAM с OFDM\r\n• 802.11n: BPSK, QPSK, 16QAM, 64QAM с OFDM\r\n \r\n<strong>Чувствительность приемника</strong>\r\n• 802.11b (типичная при PER = 8% для пакета размером 1000 байт)\r\n -82 дБм при 1 Мбит/с\r\n -80 дБм при 2 Мбит/с\r\n -78 дБм при 5,5 Мбит/с\r\n -76 дБм при 11 Мбит/с\r\n• 802.11g (типичная при PER = 10% для пакета размером 1000 байт)\r\n -85 дБм при 6 Мбит/c\r\n -84 дБм при 9 Мбит/c\r\n -82 дБм при 12 Мбит/c\r\n -80 дБм при 18 Мбит/c\r\n -77 дБм при 24 Мбит/c\r\n -73 дБм при 36 Мбит/c\r\n -69 дБм при 48 Мбит/c\r\n -68 дБм при 54 Мбит/c\r\n• 802.11n (типичная при PER = 10% для пакета размером 1000 байт)\r\n 2.4GHz, HT20\r\n -82 дБм при MCS0\r\n -79 дБм при MCS1\r\n -77 дБм при MCS2\r\n -74 дБм при MCS3\r\n -70 дБм при MCS4\r\n -66 дБм при MCS5\r\n -65 дБм при MCS6\r\n -64 дБм при MCS7\r\n 2.4GHz, HT40\r\n -79 дБм при MCS0\r\n -76 дБм при MCS1\r\n -74 дБм при MCS2\r\n -71 дБм при MCS3\r\n -67 дБм при MCS4\r\n -63 дБм при MCS5\r\n -62 дБм при MCS6\r\n -61 дБм при MCS7\r\n \r\n<strong>Выходная мощность передатчика</strong>\r\n<em>Максимальное значение мощности передатчика будет изменяться в соответствии с правилами радиочастотного регулирования в Вашей стране</em>\r\n• 802.11b (типичная при комнатной температуре 25 °C)\r\n 18 дБм при 1 Мбит/c\r\n 18 дБм при 2 Мбит/c\r\n 18 дБм при 5,5 Мбит/c\r\n 18 дБм при 11 Мбит/c\r\n• 802.11g (типичная при комнатной температуре 25 °C)\r\n 17 дБм при 6 Мбит/c\r\n 17 дБм при 9 Мбит/c\r\n 17 дБм при 12 Мбит/c\r\n 16 дБм при 18 Мбит/c\r\n 16 дБм при 24 Мбит/c\r\n 15 дБм при 36 Мбит/c\r\n 15 дБм при 48 Мбит/c\r\n 15 дБм при 54 Мбит/c\r\n• 802.11n (типичная при комнатной температуре 25 °C)\r\n 2.4GHz, HT20\r\n 17 дБм при MCS0\r\n 17 дБм при MCS1\r\n 17 дБм при MCS2\r\n 16 дБм при MCS3\r\n 16 дБм при MCS4\r\n 16 дБм при MCS5\r\n 15 дБм при MCS6\r\n 14 дБм при MCS7\r\n 2.4GHz, HT40\r\n 17 дБм при MCS0\r\n 17 дБм при MCS1\r\n 17 дБм при MCS2\r\n 16 дБм при MCS3\r\n 16 дБм при MCS4\r\n 16 дБм при MCS5\r\n 15 дБм при MCS6\r\n 14 дБм при MCS7\r\n \r\n<strong>Программное обеспечение</strong>\r\n<strong>Режимы работы</strong>\r\n• Режим точки доступа\r\n• Режим маршрутизатора\r\n \r\n<strong>Сетевые функции</strong>\r\n• Типы WAN-соединения:\r\n ◦ PPPoE\r\n ◦ Статический IP\r\n ◦ Динамический IP\r\n ◦ PPTP/L2TP + Статический IP\r\n ◦ PPTP/L2TP + Динамический IP\r\n• DHCP-сервер и DHCP-клиент\r\n• DNS relay\r\n• Пропуск VPN-тоннеля (PPTP/L2TP)\r\n• Dynamic DNS\r\n• Статическая IP-маршрутизация\r\n• Удаленный доступ\r\n• Сетевая статистика для каждого интерфейса\r\n• IGMP Proxy\r\n• RIP\r\n• UPnP\r\n• Поддержка функции ping со стороны внешней сети (WAN ping respond)\r\n \r\n<strong>Беспроводное соединение</strong>\r\n• Сегментация беспроводной сети (до 4-х SSID)\r\n• Поддерживаемые стандарты безопасности:\r\n ◦ WEP\r\n ◦ WPA/WPA2 Personal\r\n ◦ WPA/WPA2 Enterprise\r\n• MAC-фильтр\r\n• Управление подключенными устройствами\r\n• Методы PIN и PBC функции WPS\r\n• Функция WMM (Wi-Fi QoS)\r\n• Расширенные настройки\r\n• Функция WDS\r\n• Функция «клиент» в режиме точки доступа\r\n ◦ Клиент беспроводной сети\r\n ◦ Повторитель беспроводной сети\r\n• Функция «клиент» в режиме маршрутизатора\r\n ◦ Повторитель WISP (беспроводного Интернет-провайдера)\r\n \r\n<strong>Функции межсетевого экрана</strong>\r\n• Преобразование сетевых адресов (NAT)\r\n• Контроль состояния соединений (SPI)\r\n• IP-фильтры\r\n• URL-фильтр\r\n• MAC-фильтр\r\n• DMZ-зона\r\n• Функция защиты от ARP- и DDoS-атак\r\n• Виртуальные серверы\r\n \r\n<strong>Настройка и управление</strong>\r\n• Web-интерфейс настройки и управления на нескольких языках\r\n• Доступ по TELNET\r\n• Обновление внутреннего программного обеспечения точки доступа через web-интерфейс\r\n• Сохранение и загрузка конфигурации\r\n• Поддержка удаленного журналирования\r\n• Автоматическая синхронизация системного времени с NTP-сервером и ручная настройка даты и времени (в режиме маршрутизатора)\r\n• Функция Ping\r\n• Утилита traceroute (в режиме маршрутизатора)\r\n<br /><br />\r\n<strong>Индикаторы</strong>\r\n• Питание\r\n• Беспроводная сеть\r\n• WPS\r\n• Локальная сеть\r\n• Интернет\r\n \r\n<strong>Питание</strong>\r\nИсточник питания: внешний адаптер питания постоянного тока 12В/0,5А\r\n \r\n<strong>Кнопки</strong>\r\n• Кнопка для возврата к заводским установкам по умолчанию\r\n• Кнопка WPS\r\n \r\n<strong>Рабочая температура</strong>\r\nОт 0 до 40 C\r\n \r\n<strong>Температура хранения</strong>\r\nОт -20 до 65 С\r\n \r\n<strong>Влажность при эксплуатации</strong>\r\nОт 10% до 90% без конденсата\r\n \r\n<strong>Влажность при хранении</strong>\r\nОт 5% до 95% без конденсата\r\n \r\n\r\n\r\n","shortDescription":"Беспроводная точка доступа с поддержкой режима маршрутизатора. Это доступное решение для создания беспроводных сетей дома и в офисе.","type":"Hardware","isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":1,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DAP-1155/A","keywords":"Мбит, сети, маршрутизатора, доступа, типичная, DAP-1155, Функция, режиме","description":"<div id=\"cside\">\r\n<div style=\"text-align: justify;\">Устройство DAP-1155 представляет собой беспроводную точку доступа с поддержкой режима маршрутизатора. Это доступное решение для создания беспроводных сетей дома и в офисе.\r\n<div style=\"text-align: justify;\">&","og:title":"DAP-1155/A","og:description":"<div id=\"cside\">\r\n<div style=\"text-align: justify;\">Устройство DAP-1155 представляет собой беспроводную точку доступа с поддержкой режима маршрутизатора. Это доступное решение для создания беспроводных сетей дома и в офисе.\r\n<div style=\"text-align: justify;\">&","og:image":"https://old.roi4cio.com/fileadmin/content/DAP-1155_B1.jpg"},"eventUrl":"","translationId":6987,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":172,"title":"WLAN - wireless network","alias":"wlan-wireless-network","description":"Unified Communications (UC) is a marketing buzzword describing the integration of real-time, enterprise, communication services such as instant messaging (chat), presence information, voice (including IP telephony), mobility features (including extension mobility and single number reach), audio, web & video conferencing, fixed-mobile convergence (FMC), desktop sharing, data sharing (including web connected electronic interactive whiteboards), call control and speech recognition with non-real-time communication services such as unified messaging (integrated voicemail, e-mail, SMS and fax). UC is not necessarily a single product, but a set of products that provides a consistent unified user-interface and user-experience across multiple devices and media-types.\r\n\r\nIn its broadest sense, UC can encompass all forms of communications that are exchanged via a network to include other forms of communications such as Internet Protocol Television (IPTV) and digital signage Communications as they become an integrated part of the network communications deployment and may be directed as one-to-one communications or broadcast communications from one to many.\r\n\r\nUC allows an individual to send a message on one medium, and receive the same communication on another medium. For example, one can receive a voicemail message and choose to access it through e-mail or a cell phone. If the sender is online according to the presence information and currently accepts calls, the response can be sent immediately through text chat or video call. Otherwise, it may be sent as a non-real-time message that can be accessed through a variety of media.\r\n\r\nSource: https://en.wikipedia.org/wiki/Unified_communications","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/WLAN_-_wireless_network.png"}],"characteristics":[],"concurentProducts":[{"id":4766,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Cisco_ONS_15454_Series.jpg","logo":true,"scheme":false,"title":"Cisco ONS 15454 Series","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"supplierPartnersCount":125,"alias":"cisco-ons-15454-series","companyTitle":"Cisco","companyTypes":["supplier","vendor"],"companyId":170,"companyAlias":"cisco","description":"For over a decade, service providers and enterprises alike have relied on Cisco for metro, regional, long haul, and data center optical transport networks. These networks transport huge quantities of data at high rates over great distances, providing the foundation for all WANs.\r\n<span style=\"font-weight: bold;\">Get fourth-generation innovation</span><br />\r\nCisco ROADM innovation continues into its fourth generation with the first Single Module ROADM. It combines multidegree wavelength switching functionality with optical amplification and spectrum analysis in a single slot line card.<br />\r\n<span style=\"font-weight: bold;\">Utilize new features</span><br />\r\nAlong with advanced features, the 15454 provides wavelength switched optical network functionality. This embeds optical layer intelligence directly into network elements to support wavelength-on-demand services and dynamic restoration.<br />\r\n<span style=\"font-weight: bold;\">Gain flexible aggregation</span><br />\r\nCisco optical transport aggregation solutions integrate packet, SONET, and OTN aggregation and switching into the DWDM transport platform. Customers will enjoy efficient wavelength fill and tight communication among network layers.<br />\r\n<span style=\"font-weight: bold;\">Streamline operations</span><br />\r\nSelected on a per card basis, a mix of Layer 1 services, time division multiplexing (TDM), and packet switching technologies can be deployed where needed. Meet customer and network requirements while simplifying operations. <br />\r\n<span style=\"font-weight: bold;\">Scale to 100 Gb and beyond</span><br />\r\nCisco leads the optical transport industry as it moves toward coherent technology for DWDM transport of 100 Gb services. Powered by nLight Silicon, Cisco coherent technology will scale to even greater densities and higher bit rates.","shortDescription":"Cisco ONS 15454 Series Multiservice Transport Platforms","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cisco ONS 15454 Series","keywords":"","description":"For over a decade, service providers and enterprises alike have relied on Cisco for metro, regional, long haul, and data center optical transport networks. These networks transport huge quantities of data at high rates over great distances, providing the found","og:title":"Cisco ONS 15454 Series","og:description":"For over a decade, service providers and enterprises alike have relied on Cisco for metro, regional, long haul, and data center optical transport networks. These networks transport huge quantities of data at high rates over great distances, providing the found","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Cisco_ONS_15454_Series.jpg"},"eventUrl":"","translationId":4767,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":852,"title":"Network security","alias":"network-security","description":" Network security consists of the policies and practices adopted to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs; conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: it secures the network, as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password.\r\nNetwork security starts with authentication, commonly with a username and a password. Since this requires just one detail authenticating the user name — i.e., the password—this is sometimes termed one-factor authentication. With two-factor authentication, something the user 'has' is also used (e.g., a security token or 'dongle', an ATM card, or a mobile phone); and with three-factor authentication, something the user 'is' is also used (e.g., a fingerprint or retinal scan).\r\nOnce authenticated, a firewall enforces access policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer worms or Trojans being transmitted over the network. Anti-virus software or an intrusion prevention system (IPS) help detect and inhibit the action of such malware. An anomaly-based intrusion detection system may also monitor the network like wireshark traffic and may be logged for audit purposes and for later high-level analysis. Newer systems combining unsupervised machine learning with full network traffic analysis can detect active network attackers from malicious insiders or targeted external attackers that have compromised a user machine or account.\r\nCommunication between two hosts using a network may be encrypted to maintain privacy.\r\nHoneypots, essentially decoy network-accessible resources, may be deployed in a network as surveillance and early-warning tools, as the honeypots are not normally accessed for legitimate purposes. Techniques used by the attackers that attempt to compromise these decoy resources are studied during and after an attack to keep an eye on new exploitation techniques. Such analysis may be used to further tighten security of the actual network being protected by the honeypot. A honeypot can also direct an attacker's attention away from legitimate servers. A honeypot encourages attackers to spend their time and energy on the decoy server while distracting their attention from the data on the real server. Similar to a honeypot, a honeynet is a network set up with intentional vulnerabilities. Its purpose is also to invite attacks so that the attacker's methods can be studied and that information can be used to increase network security. A honeynet typically contains one or more honeypots.","materialsDescription":" <span style=\"font-weight: bold;\">What is Network Security?</span>\r\nNetwork security is any action an organization takes to prevent malicious use or accidental damage to the network’s private data, its users, or their devices. The goal of network security is to keep the network running and safe for all legitimate users.\r\nBecause there are so many ways that a network can be vulnerable, network security involves a broad range of practices. These include:\r\n<ul><li><span style=\"font-weight: bold;\">Deploying active devices:</span> Using software to block malicious programs from entering, or running within, the network. Blocking users from sending or receiving suspicious-looking emails. Blocking unauthorized use of the network. Also, stopping the network's users accessing websites that are known to be dangerous.</li><li><span style=\"font-weight: bold;\">Deploying passive devices:</span> For instance, using devices and software that report unauthorized intrusions into the network, or suspicious activity by authorized users.</li><li><span style=\"font-weight: bold;\">Using preventative devices:</span> Devices that help identify potential security holes, so that network staff can fix them.</li><li><span style=\"font-weight: bold;\">Ensuring users follow safe practices:</span> Even if the software and hardware are set up to be secure, the actions of users can create security holes. Network security staff is responsible for educating members of the organization about how they can stay safe from potential threats.</li></ul>\r\n<span style=\"font-weight: bold;\">Why is Network Security Important?</span>\r\nUnless it’s properly secured, any network is vulnerable to malicious use and accidental damage. Hackers, disgruntled employees, or poor security practices within the organization can leave private data exposed, including trade secrets and customers’ private details.\r\nLosing confidential research, for example, can potentially cost an organization millions of dollars by taking away competitive advantages it paid to gain. While hackers stealing customers’ details and selling them to be used in fraud, it creates negative publicity and public mistrust of the organization.\r\nThe majority of common attacks against networks are designed to gain access to information, by spying on the communications and data of users, rather than to damage the network itself.\r\nBut attackers can do more than steal data. They may be able to damage users’ devices or manipulate systems to gain physical access to facilities. This leaves the organization’s property and members at risk of harm.\r\nCompetent network security procedures keep data secure and block vulnerable systems from outside interference. This allows the network’s users to remain safe and focus on achieving the organization’s goals.\r\n<span style=\"font-weight: bold;\">Why Do I Need Formal Education to Run a Computer Network?</span>\r\nEven the initial setup of security systems can be difficult for those unfamiliar with the field. A comprehensive security system is made of many pieces, each of which needs specialized knowledge.\r\nBeyond setup, each aspect of security is constantly evolving. New technology creates new opportunities for accidental security leaks, while hackers take advantage of holes in security to do damage as soon as they find them. Whoever is in charge of the network’s security needs to be able to understand the technical news and changes as they happen, so they can implement safety strategies right away.\r\nProperly securing your network using the latest information on vulnerabilities helps minimize the risk that attacks will succeed. Security Week reported that 44% of breaches in 2014 came from exploits that were 2-4 years old.\r\nUnfortunately, many of the technical aspects of network security are beyond those who make hiring decisions. So, the best way an organization can be sure that their network security personnel are able to properly manage the threats is to hire staff with the appropriate qualifications.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Network_security.png"},{"id":548,"title":"Web security - Appliance","alias":"web-security-appliance","description":"A security appliance is any form of server appliance that is designed to protect computer networks from unwanted traffic. Types of network security appliance:\r\n<span style=\"font-weight: bold;\">Active devices</span> block unwanted traffic. Examples of such devices are firewalls, anti-virus scanning devices, and content filtering devices. For instance, if you want to make sure that you do not get pointless spam and other unnecessary issues, installing an active device might be a great idea. Active devices include anti-virus scanning devices, which will automatically scan throughout the network to ensure that no virus exists within the protected network. Then, there are web filtering appliances as well as firewalls, the purpose of both of which is to ensure that only useful content and traffic flows through the network and all pointless or harmful data is filtered.\r\n<span style=\"font-weight: bold;\">Passive devices detect and report on unwanted traffic.</span> A common example is intrusion detection appliances, which are installed in order to determine whether the network has been compromised in any way. These devices usually work in the background at all times.\r\n<span style=\"font-weight: bold;\">Preventative devices</span> scan networks and identify potential security problems (such as penetration testing and vulnerability assessment appliances). These devices are usually designed to 'prevent' damage to the network by identifying problems in advance. Common examples include devices that employ penetration testing as well as those devices which carry out vulnerability assessment on networks.\r\n<span style=\"font-weight: bold;\">Unified Threat Management (UTM)</span> combines features together into one system, such as some firewalls, content filtering, web caching etc. UTM devices are designed to provide users with a one-stop solution to all of their network needs and internet security appliances. As the name clearly suggests, these devices provide the features of all of the other network devices and condense them into one. These devices are designed to provide a number of different network security options in one package, hence providing networks with a simple solution. Rather than installing four different devices, users can easily install one and be done with it. The market of UTM devices has exceeded the billion dollar mark already, which just goes to show how popular these devices have become amongst network users.\r\nOne of the most popular and accessible types of web security appliance tools is the hardware <span style=\"font-weight: bold;\">keylogger.</span> This device is placed covertly between the case and keyboard with an output for the computer case and input for the keyboard. As hardware standards have changed over time, a USB hardware keylogger provides access on many devices.\r\nThe <span style=\"font-weight: bold;\">web proxy appliance</span> is basically hardware you use to manage user web access. More to the point, it's the type of device that handles the blocking or controlling of suspicious programs. It's typically placed in between network users and the worldwide web; ergo, it's most popular application is serving as a central control hub over employee Internet use by corporations and enterprises. It's the in-between gateway that serves as a termination point of sorts for online communications within a network and is capable of applying a multitude of rule-based limitations on Internet traffic, web content, and requests before they even end up with end users.\r\nAnother commonly used hardware tool is the <span style=\"font-weight: bold;\">wireless antenna.</span> These can be used to surveil a wide variety of wireless communications, including local cellular and internet service networks. More mechanical and general devices may include lockpicks or portable probes and hijack chips for compromising electronic devices through the physical circuit.\r\n<span style=\"font-weight: bold;\">Secure web gateway appliances</span> are solutions to prevent advanced threats, block unauthorized access to systems or websites, stop malware, and monitor real-time activity across websites accessed by users within the institution. Software and cloud-based platforms now perform this function as well.","materialsDescription":"<h1 class=\"align-center\"> What are the top Network Security Appliance brands?</h1>\r\n<span style=\"font-weight: bold;\">Blue Coat Systems,</span> Sunnyvale, Calif.-based Blue Coat has been part of security powerhouse Symantec since 2016.\r\n<span style=\"font-weight: bold;\">F5 Networks,</span> the Seattle-based network application delivery vendor, sold about $17.6 million in network security appliances through the channel in the second quarter, NPD said.\r\n<span style=\"font-weight: bold;\">SonicWall.</span>Firewall power player SonicWall sold about $23.5 million in network security appliances through the channel in the second quarter, according to NPD.\r\n<span style=\"font-weight: bold;\">Fortinet,</span> Sunnyvale, Calif., security software vendor Fortinet sold about $24.4 million in network security appliances through the channel in the second quarter, NPD said.\r\n<span style=\"font-weight: bold;\">Cisco Systems,</span> Cisco Systems was the quarter's growth champion, posting $77.2 million in network security appliance sales through the channel in the period, beating the previous year’s quarterly total of $62.3 million by about 24 percent, according to NPD.\r\n<span style=\"font-weight: bold;\">Palo Alto Networks.</span> With $94.2 million in network security appliance sales in the quarter, Palo Alto Networks was the best-selling network security appliance brand of the second quarter, according to NPD.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Web_security_Appliance.png"},{"id":513,"title":"Networking","alias":"networking","description":" Networking hardware, also known as network equipment or computer networking devices, are electronic devices which are required for communication and interaction between devices on a computer network. Specifically, they mediate data transmission in a computer network. Units which are the last receiver or generate data are called hosts or data terminal equipment.\r\nNetworking devices may include gateways, routers, network bridges, modems, wireless access points, networking cables, line drivers, switches, hubs, and repeaters; and may also include hybrid network devices such as multilayer switches, protocol converters, bridge routers, proxy servers, firewalls, network address translators, multiplexers, network interface controllers, wireless network interface controllers, ISDN terminal adapters and other related hardware.\r\nThe most common kind of networking hardware today is a copper-based Ethernet adapter which is a standard inclusion on most modern computer systems. Wireless networking has become increasingly popular, especially for portable and handheld devices.\r\nOther networking hardware used in computers includes data center equipment (such as file servers, database servers and storage areas), network services (such as DNS, DHCP, email, etc.) as well as devices which assure content delivery.\r\nTaking a wider view, mobile phones, tablet computers and devices associated with the internet of things may also be considered networking hardware. As technology advances and IP-based networks are integrated into building infrastructure and household utilities, network hardware will become an ambiguous term owing to the vastly increasing number of network capable endpoints.","materialsDescription":" <span style=\"font-weight: bold;\">What is network equipment?</span>\r\nNetwork equipment - devices necessary for the operation of a computer network, for example: a router, switch, hub, patch panel, etc. You can distinguish between active and passive network equipment.\r\n<span style=\"font-weight: bold;\">What is an active network equipment?</span>\r\nActive networking equipment is equipment followed by some “smart” feature. That is, a router, switch (switch), etc. are active network equipment.\r\n<span style=\"font-weight: bold;\">What is passive network equipment?</span>\r\nPassive network equipment - equipment not endowed with "intellectual" features. For example - cable system: cable (coaxial and twisted pair (UTP/STP)), plug / socket (RG58, RJ45, RJ11, GG45), repeater (repeater), patch panel, hub (hub), balun (balun) for coaxial cables (RG-58), etc. Also, passive equipment can include mounting cabinets and racks, telecommunication cabinets.\r\n<span style=\"font-weight: bold;\">What are the main network components?</span>\r\nThe main components of the network are workstations, servers, transmission media (cables) and network equipment.\r\n<span style=\"font-weight: bold;\">What are workstations?</span>\r\nWorkstations are network computers where network users implement application tasks.\r\n<span style=\"font-weight: bold;\">What are network servers?</span>\r\nNetwork servers - hardware and software systems that perform the functions of controlling the distribution of network shared resources. A server can be any computer connected to the network on which the resources used by other devices on the local network are located. As the server hardware, fairly powerful computers are used.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Networking.png"},{"id":172,"title":"WLAN - wireless network","alias":"wlan-wireless-network","description":"Unified Communications (UC) is a marketing buzzword describing the integration of real-time, enterprise, communication services such as instant messaging (chat), presence information, voice (including IP telephony), mobility features (including extension mobility and single number reach), audio, web & video conferencing, fixed-mobile convergence (FMC), desktop sharing, data sharing (including web connected electronic interactive whiteboards), call control and speech recognition with non-real-time communication services such as unified messaging (integrated voicemail, e-mail, SMS and fax). UC is not necessarily a single product, but a set of products that provides a consistent unified user-interface and user-experience across multiple devices and media-types.\r\n\r\nIn its broadest sense, UC can encompass all forms of communications that are exchanged via a network to include other forms of communications such as Internet Protocol Television (IPTV) and digital signage Communications as they become an integrated part of the network communications deployment and may be directed as one-to-one communications or broadcast communications from one to many.\r\n\r\nUC allows an individual to send a message on one medium, and receive the same communication on another medium. For example, one can receive a voicemail message and choose to access it through e-mail or a cell phone. If the sender is online according to the presence information and currently accepts calls, the response can be sent immediately through text chat or video call. Otherwise, it may be sent as a non-real-time message that can be accessed through a variety of media.\r\n\r\nSource: https://en.wikipedia.org/wiki/Unified_communications","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/WLAN_-_wireless_network.png"},{"id":475,"title":"Network Management - Hardware","alias":"network-management-hardware","description":" Your business is much more than just a machine that dispenses products or services in exchange for money. It’s akin to a living and breathing thing. Just as with the human body, in business, all the parts are interconnected and work together to move things forward.\r\nIf a company’s management is the brain, then its employees are the muscles. Muscles don’t work without the oxygen carried to them by the blood. Blood doesn’t pump through the body without the heart and circulatory system.\r\nData moves through your network like blood through veins, delivering vital information to employees who need it to do their jobs. In a business sense, the digital network is the heart and circulatory system. Without a properly functioning network, the entire business collapses. That’s why keeping networks healthy is vitally important. Just as keeping the heart healthy is critical to living a healthy life, a healthy network is a key to a thriving business. It starts with network management.\r\nNetwork management is hardware with a broad range of functions including activities, methods, procedures and the use of tools to administrate, operate, and reliably maintain computer network systems.\r\nStrictly speaking, network Management does not include terminal equipment (PCs, workstations, printers, etc.). Rather, it concerns the reliability, efficiency and capacity/capabilities of data transfer channels.","materialsDescription":" <span style=\"font-weight: bold;\">What Is Network Management?</span>\r\nNetwork management refers to the processes, tools, and applications used to administer, operate and maintain network infrastructure. Performance management and fault analysis also fall into the category of network management. To put it simply, network management is the process of keeping your network healthy, which keeps your business healthy.\r\n<span style=\"font-weight: bold;\">What Are the Components of Network Management?</span>\r\nThe definition of network management is often broad, as network management involves several different components. Here are some of the terms you’ll often hear when network management or network management software is talked about:\r\n<ul><li>Network administration</li><li>Network maintenance</li><li>Network operation</li><li>Network provisioning</li><li>Network security</li></ul>\r\n<span style=\"font-weight: bold;\">Why Is Network Management so Important When It Comes to Network Infrastructure?</span>\r\nThe whole point of network management is to keep the network infrastructure running smoothly and efficiently. Network management helps you:\r\n<ul><li><span style=\"font-style: italic;\">Avoid costly network disruptions.</span> Network downtime can be very costly. In fact, industry research shows the cost can be up to $5,600 per minute or more than $300K per hour. Network disruptions take more than just a financial toll. They also have a negative impact on customer relationships. Slow and unresponsive corporate networks make it harder for employees to serve customers. And customers who feel underserved could be quick to leave.</li><li><span style=\"font-style: italic;\">Improve IT productivity.</span> By monitoring every aspect of the network, an effective network management system does many jobs at once. This frees up IT staff to focus on other things.</li><li><span style=\"font-style: italic;\">Improve network security.</span> With a focus on network management, it’s easy to identify and respond to threats before they propagate and impact end-users. Network management also aims to ensure regulatory and compliance requirements are met.</li><li><span style=\"font-style: italic;\">Gain a holistic view of network performance.</span> Network management gives you a complete view of how your network is performing. It enables you to identify issues and fix them quickly.</li></ul>\r\n<span style=\"font-weight: bold;\">What Are the Challenges of Maintaining Effective Network Management and Network Infrastructure?</span>\r\nNetwork infrastructures can be complex. Because of that complexity, maintaining effective network management is difficult. Advances in technology and the cloud have increased user expectations for faster network speeds and network availability. On top of that, security threats are becoming ever more advanced, varied and numerous. And if you have a large network, it incorporates several devices, systems, and tools that all need to work together seamlessly. As your network scales and your company grows, new potential points of failure are introduced. Increased costs also come into play.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Network_Management_Hardware__1_.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":697,"logoURL":"https://old.roi4cio.com/fileadmin/content/DAP-1320_A1.jpg","logo":true,"scheme":false,"title":"DAP-1320 (D-Link)","vendorVerified":0,"rating":"1.70","implementationsCount":0,"suppliersCount":0,"supplierPartnersCount":0,"alias":"dap-1320-d-link","companyTitle":"D-Link","companyTypes":["supplier","vendor"],"companyId":3346,"companyAlias":"d-link","description":"<b>Простая настройка и использование</b>\r\nСуществует несколько простых способов настройки беспроводного повторителя DAP-1320. Можно использовать приложение QRS Mobile, поддерживаемое мобильными устройствами на платформе iOS или Android. Также можно выполнить настройку одним нажатием кнопки WPS на повторителе DAP-1320 и на маршрутизаторе или точке доступа, зону покрытия которой необходимо увеличить. Кроме того, можно просто включить DAP-1320 в электрическую розетку, подключиться к устройству по беспроводной сети с компьютера или мобильного устройства и выполнить шаги Мастера по установке.\r\n\r\n<b>Компактный и удобный для установки дизайн </b>\r\nКомпактный размер позволяет установить повторитель дома или в небольшом офисе, устройство не занимает много места и готово к работе сразу после подключения. Беспроводной повторитель подключается непосредственно к электрической розетке, поэтому нет необходимости использовать дополнительные кабели и громоздкие блоки питания. Благодаря аккуратному и компактному дизайну DAP-1320 идеально впишется в любой интерьер.\r\n\r\n<div class=\"textr\" style=\"font-size: 12px; font-weight: bold; padding: 20px 20px 0px; font-family: arial, sans-serif;\">Характеристики:\r\n<div id=\"cside\" style=\"text-align: justify; padding: 0px 20px 10px; font-family: arial, sans-serif;\">\r\n<b>Интерфейсы устройства</b>\r\n• 802.11 n/g/b\r\n• Кнопка WPS\r\n• Кнопка Reset\r\n<br /><b>Схема MIMO </b><br />2x2\r\n\r\n<b>Индикаторы</b>\r\nStatus/WPS\r\n\r\n<b>Стандарты</b>\r\nIEEE 802.11b/g/n\r\n\r\n<b>Скорость передачи данных</b>\r\n• IEEE 802.11b: 11, 5,5, 2, и 1 Мбит/с\r\n• IEEE 802.11g: 54, 48, 36, 24, 18, 12, 9 и 6 Мбит/с\r\n• IEEE 802.11n*: \r\n\r\n<table style=\"border: none; width: 300px;\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\"> <tbody> <tr> <td style=\"vertical-align: top;\" valign=\"top\">MCS</td> <td style=\"vertical-align: top;\" colspan=\"2\" valign=\"top\">GI=800ns</td> <td style=\"vertical-align: top;\" colspan=\"2\" valign=\"top\">GI=400ns</td> </tr> <tr> <td style=\"vertical-align: top;\" valign=\"top\"> </td> <td style=\"vertical-align: top;\" valign=\"top\">20МГц</td> <td style=\"vertical-align: top;\" valign=\"top\">40МГц</td> <td style=\"vertical-align: top;\" valign=\"top\">20МГц</td> <td style=\"vertical-align: top;\" valign=\"top\">40МГц</td> </tr> <tr> <td style=\"vertical-align: top;\" valign=\"top\">0</td> <td style=\"vertical-align: top;\" valign=\"top\">6,5</td> <td style=\"vertical-align: top;\" valign=\"top\">13,5</td> <td style=\"vertical-align: top;\" valign=\"top\">7,2</td> <td style=\"vertical-align: top;\" valign=\"top\">15</td> </tr> <tr> <td style=\"vertical-align: top;\" valign=\"top\">1</td> <td style=\"vertical-align: top;\" valign=\"top\">13</td> <td style=\"vertical-align: top;\" valign=\"top\">27</td> <td style=\"vertical-align: top;\" valign=\"top\">14,4</td> <td style=\"vertical-align: top;\" valign=\"top\">30</td> </tr> <tr> <td style=\"vertical-align: top;\" valign=\"top\">2</td> <td style=\"vertical-align: top;\" valign=\"top\">19,5</td> <td style=\"vertical-align: top;\" valign=\"top\">40,5</td> <td style=\"vertical-align: top;\" valign=\"top\">21,7</td> <td style=\"vertical-align: top;\" valign=\"top\">45</td> </tr> <tr> <td style=\"vertical-align: top;\" valign=\"top\">3</td> <td style=\"vertical-align: top;\" valign=\"top\">26</td> <td style=\"vertical-align: top;\" valign=\"top\">54</td> <td style=\"vertical-align: top;\" valign=\"top\">28,9</td> <td style=\"vertical-align: top;\" valign=\"top\">60</td> </tr> <tr> <td style=\"vertical-align: top;\" valign=\"top\">4</td> <td style=\"vertical-align: top;\" valign=\"top\">39</td> <td style=\"vertical-align: top;\" valign=\"top\">81</td> <td style=\"vertical-align: top;\" valign=\"top\">43,3</td> <td style=\"vertical-align: top;\" valign=\"top\">90</td> </tr> <tr> <td style=\"vertical-align: top;\" valign=\"top\">5</td> <td style=\"vertical-align: top;\" valign=\"top\">52</td> <td style=\"vertical-align: top;\" valign=\"top\">108</td> <td style=\"vertical-align: top;\" valign=\"top\">57,8</td> <td style=\"vertical-align: top;\" valign=\"top\">120</td> </tr> <tr> <td style=\"vertical-align: top;\" valign=\"top\">6</td> <td style=\"vertical-align: top;\" valign=\"top\">58,5</td> <td style=\"vertical-align: top;\" valign=\"top\">121,5</td> <td style=\"vertical-align: top;\" valign=\"top\">65,0</td> <td style=\"vertical-align: top;\">135</td> </tr> <tr> <td style=\"vertical-align: top;\">7</td> <td style=\"vertical-align: top;\">65</td> <td style=\"vertical-align: top;\">135</td> <td style=\"vertical-align: top;\" valign=\"top\">72,2</td> <td style=\"vertical-align: top;\" valign=\"top\">150</td> </tr> <tr> <td style=\"vertical-align: top;\" valign=\"top\">8</td> <td style=\"vertical-align: top;\" valign=\"top\">13</td> <td style=\"vertical-align: top;\" valign=\"top\">27</td> <td style=\"vertical-align: top;\" valign=\"top\">14,4</td> <td style=\"vertical-align: top;\" valign=\"top\">30</td> </tr> <tr> <td style=\"vertical-align: top;\" valign=\"top\">9</td> <td style=\"vertical-align: top;\" valign=\"top\">26</td> <td style=\"vertical-align: top;\" valign=\"top\">54</td> <td style=\"vertical-align: top;\" valign=\"top\">28,9</td> <td style=\"vertical-align: top;\" valign=\"top\">60</td> </tr> <tr> <td style=\"vertical-align: top;\" valign=\"top\">10</td> <td style=\"vertical-align: top;\" valign=\"top\">39</td> <td style=\"vertical-align: top;\" valign=\"top\">81</td> <td style=\"vertical-align: top;\" valign=\"top\">43,3</td> <td style=\"vertical-align: top;\" valign=\"top\">90</td> </tr> <tr> <td style=\"vertical-align: top;\" valign=\"top\">11</td> <td style=\"vertical-align: top;\" valign=\"top\">52</td> <td style=\"vertical-align: top;\" valign=\"top\">108</td> <td style=\"vertical-align: top;\" valign=\"top\">57,8</td> <td style=\"vertical-align: top;\" valign=\"top\">120</td> </tr> <tr> <td style=\"vertical-align: top;\" valign=\"top\">12</td> <td style=\"vertical-align: top;\" valign=\"top\">78</td> <td style=\"vertical-align: top;\" valign=\"top\">162</td> <td style=\"vertical-align: top;\" valign=\"top\">86,7</td> <td style=\"vertical-align: top;\" valign=\"top\">180</td> </tr> <tr> <td style=\"vertical-align: top;\" valign=\"top\">13</td> <td style=\"vertical-align: top;\" valign=\"top\">104</td> <td style=\"vertical-align: top;\" valign=\"top\">216</td> <td style=\"vertical-align: top;\" valign=\"top\">115,6</td> <td style=\"vertical-align: top;\" valign=\"top\">240</td> </tr> <tr> <td style=\"vertical-align: top;\" valign=\"top\">14</td> <td style=\"vertical-align: top;\" valign=\"top\">117</td> <td style=\"vertical-align: top;\" valign=\"top\">243</td> <td style=\"vertical-align: top;\" valign=\"top\">130,0</td> <td style=\"vertical-align: top;\" valign=\"top\">270</td> </tr> <tr> <td style=\"vertical-align: top;\" valign=\"top\">15</td> <td style=\"vertical-align: top;\" valign=\"top\">130</td> <td style=\"vertical-align: top;\" valign=\"top\">270</td> <td style=\"vertical-align: top;\" valign=\"top\">144,4</td> <td style=\"vertical-align: top;\" valign=\"top\">300</td> </tr> </tbody> </table>\r\nЕдиница измерения: Мбит/с\r\n\r\n<b>Выходная мощность передатчика</b>\r\n• IEEE 802.11b:\r\n 20 dBm при 1, 2, 5,5, 11 Мбит/с\r\n• IEEE 802.11g:\r\n 20 dBm при 6-36 Мбит/с\r\n 19 dBm при 48 Мбит/с\r\n 18 dBm при 54 Мбит/с\r\n• IEEE 802.11n:\r\n HT20:\r\n 20 dBm при MCS0-MCS4 и MCS8-MCS12 \r\n 19 dBm при MCS5 и MCS13\r\n 18 dBm при MCS6-MCS7 и MCS14-MCS15 \r\n HT40:\r\n 19 dBm при MCS0-MCS5 и MCS8-MCS13 \r\n 18 dBm при MCS6 и MCS14\r\n 17 dBm при MCS7 и MCS15 \r\n\r\n<b>Чувствительность приемника</b>\r\n• IEEE 802.11b:\r\n -87 dBm при 1 Мбит/с\r\n -87 dBm при 2 Мбит/с\r\n -85 dBm при 5,5 Мбит/с\r\n -82 dBm при 11 Мбит/с\r\n• IEEE 802.11g:\r\n -82 dBm при 6 Мбит/с\r\n -81 dBm при 9 Мбит/с\r\n -79 dBm при 12 Мбит/с\r\n -77 dBm при 18 Мбит/с\r\n -74 dBm при 24 Мбит/с\r\n -70 dBm при 36 Мбит/с\r\n -66 dBm при 48 Мбит/с\r\n -65 dBm при 54 Мбит/с\r\n• IEEE 802.11n:\r\n 20 МГц \r\n -82 dBm при MCS-0/8\r\n -79 dBm при MCS-1/9\r\n -77 dBm при MCS-2/10\r\n -74 dBm при MCS-3/11\r\n -70 dBm при MCS-4/12\r\n -66 dBm при MCS-5/13\r\n -65 dBm при MCS-6/14\r\n -64 dBm при MCS-7/15\r\n 40 МГц \r\n -79 dBm при MCS-0/8\r\n -76 dBm при MCS-1/9\r\n -74 dBm при MCS-2/10\r\n -74 dBm при MCS-3/11\r\n -67 dBm при MCS-4/12\r\n -63 dBm при MCS-5/13\r\n -62 dBm при MCS-6/14\r\n -61 dBm при MCS-7/15\r\n\r\n<b>Частотный диапазон</b>\r\nОт 2,4 ГГц до 2,4835 ГГц\r\n\r\n<b>Антенны</b>\r\n\r\nДве внутренние всенаправленные антенны с коэффициентом усиления 0 dBi\r\n\r\n<b>Исполнение штекера</b>\r\nЗависит от региона\r\n\r\n<b>Безопасность</b>\r\n• Wi-Fi Protected Access (WPA и WPA2)\r\n• 64/128-битное WEP-шифрование данных\r\n• WPS (PBC)\r\n\r\n<b>Расширенные функции</b>\r\nПоддержка приложения QRS (iOS, Android) \r\n\r\n<b>Управление</b>\r\nWeb-интерфейс \r\n<br /><br />\r\n<b>Размеры</b>\r\n48 х 42 х 53,5 мм\r\n\r\n<b>Вес</b>\r\n69 г\r\n\r\n<b>Питание</b>\r\nОт 110 до 240 В переменного тока, 50/60 Гц\r\n\r\n<b>Температура</b>\r\n• Рабочая: От 0° до 40°C\r\n• Хранения: От -20° до 65°C\r\n\r\n<b>Влажность</b>\r\n• Рабочая: От 10% до 90% (без образования конденсата)\r\n• Хранения: От 5% до 95% (без образования конденсата)\r\n\r\n<b>Сертификаты</b>\r\n• FCC \r\n• IC\r\n• CE\r\n• UL\r\n• EMI/EMC\r\n• Wi-Fi\r\n• C-Tick\r\n\r\n<i><span style=\"font-size: 8px;\">*</span><span style=\"font-size: xx-small;\">Максимальная скорость передачи данных по беспроводному соединению определена техническими требованиями стандартов 802.11g и IEEE 802.11n. Реальная пропускная способность будет другой. Условия, в которых работает сеть, а также факторы окружающей среды, включая объем сетевого трафика, строительные материалы и конструкции, а также передача служебных данных сети, могут снизить пропускную способность. Факторы окружающей среды также негативно влияют на уровень беспроводного сигнала. </span></i>","shortDescription":"Портативное устройство, увеличивающее зону действия существующей сети. Компактный DAP-1320 обладает высокой мощностью и оддерживает скорость беспроводного соединение до 300 Мбит/с.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":12,"sellingCount":9,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"DAP-1320 (D-Link)","keywords":"Мбит, IEEE, DAP-1320, данных, также, 40МГц, Кнопка, Wi-Fi","description":"<b>Простая настройка и использование</b>\r\nСуществует несколько простых способов настройки беспроводного повторителя DAP-1320. Можно использовать приложение QRS Mobile, поддерживаемое мобильными устройствами на платформе iOS или Android. Также можно выполнить н","og:title":"DAP-1320 (D-Link)","og:description":"<b>Простая настройка и использование</b>\r\nСуществует несколько простых способов настройки беспроводного повторителя DAP-1320. Можно использовать приложение QRS Mobile, поддерживаемое мобильными устройствами на платформе iOS или Android. Также можно выполнить н","og:image":"https://old.roi4cio.com/fileadmin/content/DAP-1320_A1.jpg"},"eventUrl":"","translationId":6988,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":172,"title":"WLAN - wireless network","alias":"wlan-wireless-network","description":"Unified Communications (UC) is a marketing buzzword describing the integration of real-time, enterprise, communication services such as instant messaging (chat), presence information, voice (including IP telephony), mobility features (including extension mobility and single number reach), audio, web & video conferencing, fixed-mobile convergence (FMC), desktop sharing, data sharing (including web connected electronic interactive whiteboards), call control and speech recognition with non-real-time communication services such as unified messaging (integrated voicemail, e-mail, SMS and fax). UC is not necessarily a single product, but a set of products that provides a consistent unified user-interface and user-experience across multiple devices and media-types.\r\n\r\nIn its broadest sense, UC can encompass all forms of communications that are exchanged via a network to include other forms of communications such as Internet Protocol Television (IPTV) and digital signage Communications as they become an integrated part of the network communications deployment and may be directed as one-to-one communications or broadcast communications from one to many.\r\n\r\nUC allows an individual to send a message on one medium, and receive the same communication on another medium. For example, one can receive a voicemail message and choose to access it through e-mail or a cell phone. If the sender is online according to the presence information and currently accepts calls, the response can be sent immediately through text chat or video call. Otherwise, it may be sent as a non-real-time message that can be accessed through a variety of media.\r\n\r\nSource: https://en.wikipedia.org/wiki/Unified_communications","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/WLAN_-_wireless_network.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":425,"logoURL":"https://old.roi4cio.com/fileadmin/user_upload/Modul_servisov_besprovodnykh_setei__WiSM__dlja_Cisco_Catalyst_serii_6500_i_serii_7600.jpg","logo":true,"scheme":false,"title":"Cisco Catalyst 6500 Series 7600 Series Wireless Services Module (WiSM)","vendorVerified":0,"rating":"2.00","implementationsCount":2,"suppliersCount":0,"supplierPartnersCount":125,"alias":"cisco-catalyst-6500-series-7600-series-wireless-services-module-wism","companyTitle":"Cisco","companyTypes":["supplier","vendor"],"companyId":170,"companyAlias":"cisco","description":"As a member of the Cisco Wireless LAN Controller family, the Cisco WiSM works in conjunction with Cisco Aironet access points, and the Cisco Wireless Control System (WCS) to support mission-critical wireless data, voice, and video applications. As a key component of Cisco Unified Wireless Network for the enterprise, and Cisco ServiceMesh for service providers, the Cisco WiSM provides real-time communication between access points and other wireless LAN controllers to deliver a secure, end-to-end wireless solution.\r\nBecause the Cisco WiSM supports 802.11a/b/g and the IEEE 802.11n draft 2.0 standard, organizations can deploy the solution that best meets their individual requirements. Organizations can offer robust coverage with 802.11 a/b/g or deliver greater performance with 5x the throughput and unprecedented reliability using 802.11n as part of an enterprise, or service provider wireless solution.","shortDescription":"The Cisco Catalyst 6500 Series/7600 Series Wireless Services Module (WiSM) provides unparalleled security, mobility, redundancy, and ease of use for business-critical wireless LANs (WLANs). It allows network managers and operators to control and manage their wireless networks easily.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cisco Catalyst 6500 Series 7600 Series Wireless Services Module (WiSM)","keywords":"Cisco, WiSM, wireless, Wireless, solution, with, access, enterprise","description":"As a member of the Cisco Wireless LAN Controller family, the Cisco WiSM works in conjunction with Cisco Aironet access points, and the Cisco Wireless Control System (WCS) to support mission-critical wireless data, voice, and video applications. As a key compon","og:title":"Cisco Catalyst 6500 Series 7600 Series Wireless Services Module (WiSM)","og:description":"As a member of the Cisco Wireless LAN Controller family, the Cisco WiSM works in conjunction with Cisco Aironet access points, and the Cisco Wireless Control System (WCS) to support mission-critical wireless data, voice, and video applications. As a key compon","og:image":"https://old.roi4cio.com/fileadmin/user_upload/Modul_servisov_besprovodnykh_setei__WiSM__dlja_Cisco_Catalyst_serii_6500_i_serii_7600.jpg"},"eventUrl":"","translationId":426,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":172,"title":"WLAN - wireless network","alias":"wlan-wireless-network","description":"Unified Communications (UC) is a marketing buzzword describing the integration of real-time, enterprise, communication services such as instant messaging (chat), presence information, voice (including IP telephony), mobility features (including extension mobility and single number reach), audio, web & video conferencing, fixed-mobile convergence (FMC), desktop sharing, data sharing (including web connected electronic interactive whiteboards), call control and speech recognition with non-real-time communication services such as unified messaging (integrated voicemail, e-mail, SMS and fax). UC is not necessarily a single product, but a set of products that provides a consistent unified user-interface and user-experience across multiple devices and media-types.\r\n\r\nIn its broadest sense, UC can encompass all forms of communications that are exchanged via a network to include other forms of communications such as Internet Protocol Television (IPTV) and digital signage Communications as they become an integrated part of the network communications deployment and may be directed as one-to-one communications or broadcast communications from one to many.\r\n\r\nUC allows an individual to send a message on one medium, and receive the same communication on another medium. For example, one can receive a voicemail message and choose to access it through e-mail or a cell phone. If the sender is online according to the presence information and currently accepts calls, the response can be sent immediately through text chat or video call. Otherwise, it may be sent as a non-real-time message that can be accessed through a variety of media.\r\n\r\nSource: https://en.wikipedia.org/wiki/Unified_communications","materialsDescription":"","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/WLAN_-_wireless_network.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"jobRoles":[],"organizationalFeatures":["Internet access is available for employees"],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":["Enhance Staff Productivity","Improve Customer Service"],"implementations":[],"presenterCodeLng":"","productImplementations":[]}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}