D-Link D-Link Wireless Controller
The D-Link DWC-1000 Wireless Controller is a centralized wireless LAN manager developed specifically for campuses, branch offices, and small to-medium enterprises (SMBs) that are looking for an easy to use, scalable solution to manage and configure their wireless network. With the ability to manage up to six wireless Access Points (upgradable to 24) and a maximum of 96 wireless Access Points in a Controller Cluster, the DWC-1000 is a cost effective mobility solution business environments. Its auto-managed Access Point (AP) discovery and single point management allow customers to acquire an enterprise class system without the burden of executing large and complex configurations. With a robust and comprehensive security detection system, the DWC-1000 also enables managed APs to block potential attacks from unauthorized users and devices, especially for wireless environments.
The DWC-1000 features a self-organizing, self-optimizing, and self-healing network capability to increase the stability of the entire wireless network. With scheduled-based wireless frequency scanning and performance analyzing, the DWC-1000 automatically adjusts wireless frequency channels and power periodically to avoid interference and keep the wireless network in an optimized state. For a sudden RF signal vacuum created by any faulty Access Point, the DWC-1000 will increase the transmit output power of neighboring Access Points to expand radiofrequency (RF) coverage.
The DWC-1000 provides a comprehensive wireless security solution for any network. Empowered by a Wireless Instruction Detection System (WIDS), the DWC-1000 detects rogue Access Points and rogue clients as well as anticipates wireless threats, preventing any potential damage and illegal access. In addition to other fundamental wireless security features including WEP, WPA Personal/Enterprise, WPA2 Personal/Enterprise, and MAC Authentication to determine the identity of wireless devices, the Captive Portal feature allows you to block clients from accessing the network until the clients verify their identities. This double-layer authentication and authorization provides a robust security fence to also protect against attacks from within the network.