Boutique Promos

Cart  

(empty)

New products

No new product at this time

Cisco WRV210-EU (4260039346845) Wireless Router


Cisco WRV210-EU (4260039346845) Wireless Router

Cisco WRV210-EU (4260039346845) Wireless Router - 54 Mbps, 802.11b / g, Functionalities: Firewall, DHCP Server, WAN: 1 10 Base-T/100 Base-TX, LAN: 10 Base-T, 10 / 100 Base-T, Firewall: SPI (Stateful Packet Inspection), Content Filtering, NAT, WEP: 40 bit (= 64 bit), 128 bit, offering reserved for professionals

More details


59,90 €

98142387



MPN

MPN: 4260039346845

Key Features

Features: Sets the main function of fire routeur.Pare
DHCP server
Connectivity: Wireless
Antenna type: Internal antennas are built into the device. They can not be changed or directed.
External antennas can be oriented in different directions. They are usually used to increase the range of the device.
The detachable antennas are screwed to the device. They can easily be replaced by models puissants.2 detachable antennas
WLAN Standards: IEEE 802.11b
IEEE 802.11g
Security: All access points are wireless to guarantee a certain level of security to protect access to data you transmit. These are safety standards that the device is conforme.802.1x

Interfaces

Integrated: Integrated Switch 4-port
Interfaces LAN: 10 Base-T
10/100 Base-T
WAN interfaces: When you buy a router for a long-distance network, remember that this type of network covers a large number of different devices and services. You must therefore choose the interface based on the type of service and the nature and amount of traffic that the network will transmettre.1 10 Base-T/100 Base-TX

Standards and Protocols

LAN standards: IEEE 802.3 CSMA / CD or Ethernet
IEEE 802.3u 100 Mbps (Fast Ethernet)
IEEE 802.11b 2.4 Ghz 11 Mbps Wi-Fi
IEEE 802.11g
IEEE 802.11i (wireless security)
IEEE 802.1x (Port Access Control for WLANs)
IEEE 802.11e
Protocols: The protocols are standard formats for converting data between devices. They determine many aspects of data: error checking, compression types and names of the procedures for sending and retrieving data from the devices. Programmers can choose from a wide variety of standard protocols, each with their advantages and disadvantages. Some are easier than others, some are more reliable and more faster. The key for the user that the device uses the correct protocol to communicate with other ordinateurs.PPPoE
PPTP
L2TP
Routing Protocols: RIP Version 1
RIP Version 2
Static Routing
Management Protocol: A network protocol is a set of rules, conventions and formal data structures that govern how computers exchange information over a network. Fruit of years of evolution and development, network protocols are defined by many standards organizations and vendors technologiques.HTTP
SNMP 1
SNMP 2c
HTTPS

Firewall / VPN

VPN tunnels: 5
Firewall Features: SPI (Stateful Packet Inspection)
Content Filtering
NAT
VPN Protocols: IPSec
L2TP
Authentication: RADIUS
Radio Service Set ID (SSID)
VPN Encryption: The standard DES (Data Encryption Standard) is the standard method of data encryption. She uses the key DES56 bits to encrypt and decrypt data.
3DES 168-bit encryption (sometimes called "Triple") is an algorithm that guarantees a higher level of security because it encrypts each data block three times with each time a key unique.DES
3DES
AES
MD5
SHA-1
WPA
WPA2
WPA2-PSK

Wireless

802.11b data rates: 11 Mbps, 5.5 Mbps, 2 Mbps, 1 Mbps
802.11g data rates: 54 Mbps, 48 ​​Mbps, 36 Mbps, 24 Mbps, 28 Mbps, 12 Mbps, 9 Mbps, 6 Mbps, 5.5 Mbps, 2 Mbps, 1 Mbps
Modulation: There are many standards of modulation. The most commonly used are:

DSSS
The standard DSSS (Direct-Sequence Spread Spectrum) is a transmission technology that combines the data signal to a sequence of data bits higher technique called "chipping." This ensures an increased resistance to noise and better data integrity.

OFDM
The standard OFDM (Orthogonal Frequency Division Multiplexing) isto transmit digital data by radio wave by dividing a radio signal into multiple sub-signals. These signals are then transmitted simultaneously at different frequencies. This modulation technique has the advantage of reducing the crosstalk noise.

CCK
CCK (Complementary Code Keying) uses a sequence of 64 code words 8 bits to encode data. This results in speeds of 5.5 and 11 Mb / s in the 2.4 GHz band of laOFDM
CCK
QPSK
BPSK
DBPSK
DQPSK
16QAM
64QAM
DSSS
WEP Encryption Length: WEP data encryption, as defined by the 802.11 standard, is used to build a network of two main security features: the first is to prevent unauthorized persons can access the network using a similar wireless LAN equipment. The second is to prevent unauthorized traffic on the LAN. WEP works on the following principle: the administrator can define "key" for each user of the wireless network and access is denied to all persons who have no clé.40 bits (= 64 bits)
128 bit

Other Features

LEDs: Power
State
Activity
Link
Other features: Support for MIMO
DMZ support

Dimension

Width: 17 cm
Depth: 17 cm
Height: 4.2 cm
Weight: 0.35 kg

Guarantee

Warranty: Lifetime

Various

Product No.: 98142387
Comparateur de prix
Site présent sur le comparateur prix le moins cher.fr