Design
Features
Antenna type:Type of antenna, also known an aerial, e.g. external, internal.
External
Logistics data
Country of origin:Country where the device is made.
Germany
Customs product code (TARIC):
85176200
Management features
Performance management:
ICMP
Quality of Service (QoS) support:
Multicast Listener Discovery (MLD) snooping:
Network
Modulation:Modulation is the process of varying one or more properties of a periodic waveform, called the carrier signal (High Frequency Signal), with a modulating signal which typically contains information to be transmitted. The aim of digital modulation is to transfer a digital bit stream over an analog bandpass channel, for example over the public switched telephone network (where a bandpass filter limits the frequency range to between 300 and 3400 Hz), or over a limited radio frequency band. The aim of analog modulation is to transfer an analog baseband (or lowpass) signal, for example an audio signal or TV signal, over an analog bandpass channel at a different frequency, for example over a limited radio frequency band or a cable TV network channel.
256-QAM, 1024-QAM
PPTP/L2TP VPN tunnels (max):
25
Wi-Fi:Popular technology that allows an electronic device to exchange data or connect to the internet wirelessly using radio waves.
Networking standards:The way in which the network is working, e.g. IEEE 802.11a, IEEE 802.11b, IEEE 802.11g.
IEEE 802.1Q
Ethernet LAN data rates:The different speed levels of the Ethernet LAN connection.
10,100,1000 Mbit/s
Networking
Modulation:Modulation is the process of varying one or more properties of a periodic waveform, called the carrier signal (High Frequency Signal), with a modulating signal which typically contains information to be transmitted. The aim of digital modulation is to transfer a digital bit stream over an analog bandpass channel, for example over the public switched telephone network (where a bandpass filter limits the frequency range to between 300 and 3400 Hz), or over a limited radio frequency band. The aim of analog modulation is to transfer an analog baseband (or lowpass) signal, for example an audio signal or TV signal, over an analog bandpass channel at a different frequency, for example over a limited radio frequency band or a cable TV network channel.
256-QAM, 1024-QAM
PPTP/L2TP VPN tunnels (max):
25
Wi-Fi:Popular technology that allows an electronic device to exchange data or connect to the internet wirelessly using radio waves.
Networking standards:The way in which the network is working, e.g. IEEE 802.11a, IEEE 802.11b, IEEE 802.11g.
IEEE 802.1Q
Ethernet LAN data rates:The different speed levels of the Ethernet LAN connection.
10,100,1000 Mbit/s
Operational conditions
Operating relative humidity (H-H):
0 - 95%
Operating temperature (T-T):The minimum and maximum temperatures at which the product can be safely operated.
0 - 40 °C
Packaging content
Cables included:
LAN (RJ-45)
Quick start guide:Instructions, either online, as a computer program or in paper form, to allow you to set up and start using the product quickly.
Packaging data
Package weight:Weight of the packaged product.
1.49 kg
Package depth:The distance from the front to the back of the packaging.
320 mm
Package height:The distance from the top to the bottom of the packaging.
110 mm
Package width:The distance from one side of the packaging to the other.
210 mm
Performance
Ports & interfaces
DC-in jack:The socket/plug where the DC electricity supply connects to the device.
Ethernet LAN (RJ-45) ports:Number of Ethernet LAN (RJ-45) ports (connecting interfaces) in the device. Ethernet LAN (RJ-45) ports allow a computer to connect to the ethernet.
5
WAN connection:A wide area network (WAN) is a network that covers a broad area (i.e. any telecommunications network that links across metropolitan, regional, or national boundaries such as the Internet) using private or public network transports. Business and government entities utilize WANs to relay data among employees, clients, buyers, and suppliers from various geographical locations.
Ethernet (RJ-45)
USB 2.0 ports quantity:Number of USB 2.0 ports (connecting interfaces) in the device. USB 2.0 was released in April 2000 (now called "Hi-Speed"), adding higher maximum signaling rate of 480 Mbit/s (effective throughput up to 35 MB/s or 280 Mbit/s), USB 2.0 ports are usually black.
1
Power
Power consumption (idle):
17 W
Power consumption (max):The maximum amount of power used by the device.
24 W
Protocols
DHCP server:A server is a system which that responds to requests across a computer network to provide, or help to provide, a network service. DCHP servers uses the DCHP (Dynamic Host Configuration Protocol), which is a standardized networking protocol used by servers on an IP network to allocate IP addresses to computers. The purpose of DHCP is to automate the IP address configuration of a computer without a network administrator. IP addresses are typically selected from a range of assigned IP addresses stored in a database on the server and issued to a computer which requests a new IP address. An IP address is assigned to a computer for a set interval, after which, the computer must renew the IP address or acquire a new one.
Routing protocols:
BGP4, LISP, OSPFv2, RIP-2, VRRP
Supported network protocols:Network protocols tested as compatible with this product e.g. FTP,HTML, POP.
Ethernet over GRE-Tunnel (EoGRE), L2TPv3, ARP-Lookup, LLDP, DHCP option 82, IPv6-Router-Advertisement-Snooping, DHCPv6-Snooping, LDRA (Lightweight DHCPv6 Relay Agent), Spanning Tree, Rapid Spanning Tree, ARP, Proxy ARP, BOOTP, DHCP, LACP
Management protocols:
SNMPv1,v2c,v3
Security
Authentication method:
PAP, CHAP, MS-CHAP, MS-CHAPv2
Firewall security:Part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
VLAN support:A Virtual Local Area Network (VLAN) consists of a group of computers and switches that can be physically distributed over different networks and buildings, but form one LAN on a logical level.
Security algorithms:Security algorithms are used to provide authentication, cipher key generation, integrity and radio link privacy to users on mobile networks. The security algorithms supported are the ones that can be used with this product.
802.1x RADIUS, 1024-bit RSA, 2048-bit RSA, 4096-bit RSA, AES-CCMP, AES-GCMP, EAP-FAST, EAP-GTC, EAP-MD5, EAP-TLS, EAP-TTLS, FIPS 140, MSCHAPv2, PEAP, TKIP, WEP, WPA2, WPA2-Enterprise, WPA3, WPA3-Enterprise
MAC address filtering:Security access control method whereby the 48-bit address assigned to each network card is used to determine access to the network. MAC addresses are uniquely assigned to each card, so using MAC filtering on a network permits and denies network access to specific devices through the use of blacklists and whitelists.
Access Control List (ACL):
Sustainability
Sustainability compliance:
Weight & dimensions
Weight:Weight of the product without packaging (net weight). If possible, the net weight is given including standard accessories and supplies. Please note that sometimes the manufacturer leaves out the weight of accessories and/or supplies.
715 g
Depth:The distance from the front to the back of something.
190 mm
Height:The measurement of the product from head to foot or from base to top.
44 mm
Width:The measurement or extent of something from side to side.
293 mm