<ruby id="txhzx"><ins id="txhzx"><meter id="txhzx"></meter></ins></ruby>

    <noframes id="txhzx"><form id="txhzx"><nobr id="txhzx"><th id="txhzx"></th></nobr></form>

    <address id="txhzx"><nobr id="txhzx"><meter id="txhzx"></meter></nobr></address>
    <address id="txhzx"></address>

      <form id="txhzx"><listing id="txhzx"><meter id="txhzx"></meter></listing></form>

      <address id="txhzx"></address>
      <em id="txhzx"></em>

          <form id="txhzx"><nobr id="txhzx"><meter id="txhzx"></meter></nobr></form>

          <address id="txhzx"><nobr id="txhzx"><progress id="txhzx"></progress></nobr></address>

          <noframes id="txhzx"><address id="txhzx"></address>

            H3C WX5860H New Generation Multiservice Access Controller

            H3C WX5860H access controller is a new generation of high-performance multiservice unified wired and wireless access controller intended for high-end enterprise networks. It features large capacity, high availability, and rich services. Equipped with a high-performance multi-core CPU and a FPGA card, it is even capable of forwarding packets of 64 bytes at line rate over wireless channels. Running H3C's state-of-the-art Comware 7 network operating system, the WX5860H supports not only granular user control and management, comprehensive RF resource management, 7×24 wireless security control, fast Layer 2 and Layer 3 roaming, flexible QoS management, and IPv4/IPv6 dual stack, but also emerging wireless features including multi-core control plane, next-generation wireless location, Bonjour, and Hotspot 2.0.

            The WX5860H greatly facilitates network deployment, configuration, and maintenance. It supports multiple flexible networking methods, including Oasis cloud management, IRF, and license synchronization. Also, it provides wired and wireless access on a single platform and enables configuration and management of wired and wireless features in one system.

            Working together with H3C fit AP product series, it is an ideal access controller option for large enterprise campuses to provide wireless services such as WLAN access, wireless coverage in MAN, and Wi-Fi hotspot coverage.

            Learn more Show less
            WX5860H multiservice access controller
            WX5860H multiservice access controller
            • Features
            • Specification
            • Ordering Information
            • Resources
            • Software


            802.11ac AP management

            In addition to 802.11a/b/g/n APs, the WX5860H can work together with H3C 802.11ac APs to provide multiple times faster wireless access rate over larger area. This feature improves user experience and ensures the application of wireless multimedia technology that requires high transmission rate.

            Cutting-edge operating system

            The WX5860H runs H3C's state-of-the-art Comware 7 network operating system. This system significantly improves product performance and reliability, and supports the increasingly complicated network applications in the enterprise market. This system offers the following advantages:

            * Multi-core control—Comware 7 can adjust the ratio of the control cores to forwarding cores in the CPU to achieve an optimal balance as demanded, remarkably improving the CPU control capabilities and computing capabilities while providing strong concurrent computing capabilities.

            * User-mode multitasking—In Comware 7, most network applications are executed in user mode. When you start an application, the system creates a task for the application and provides the task with private resources. If a task error occurs, the error is limited to this task and does not affect other applications and the operating system.

            * User-mode task monitoring—Comware 7 monitors each task executed in user mode. When a task error occurs, the system will reload the task to ensure quick recovery of the application.

            * Independent application upgrade—Comware 7 can upgrade a single module independently instead of the whole system, which enhances upgrade security and network stability significantly.

            Powerful wired and wireless processing capability

            Equipped with robust hardware, the WX5860H delivers strong concurrent computing capabilities and industry-leading wireless packet processing capabilities:

            * Lately-developed high-performance multicore CPU, with 8 independent cores that can be virtualized to 32 logical cores

            * High-bandwidth switching chips

            * High-performance programmable FPGA card

            High-density port access

            The WX5860H offers multiple port types and high port density, significantly facilitating wired and wireless accesses and improving networking agility.

            License synchronization

            H3C license synchronization technology enhances availability of a network with multiple ACs and provides agility for network deployment.

            The following two license synchronization modes are available:

            * Dual-link backup mode (two ACs)—The two ACs back up licenses for each other. When an AC fails, the other AC takes over the service and APs will be reassociated with the backup AC.

            * N+1 backup mode (N ≤ 4)—An AC backs up licenses for other ACs. When one or more of the other ACs fail, the backup AC will take over the service and APs will be reassociated with the backup AC.

            Intelligent Resilient Framework (IRF)

            The H3C Intelligent Resilient Framework (IRF) technology can virtualize two WX5860H ACs into a logical device called an IRF fabric, which delivers the following benefits:

            * Simplified topology—To set up an IRF fabric, you can connect the ACs directly or through an switch. No dedicated cable or port is required.

            * Simplified configuration—The configurations on the IRF fabric (master AC) will be automatically synchronized to the member AC.

            * 1+1 redundancy—Failure of one AC does not affect the operation of the IRF fabric.

            * Flexible license control—The ACs in the IRF fabric share their licenses. The number of APs that can be connected to the IRF fabric is the sum of licenses installed on the ACs. Licenses installed on an AC can be easily unloaded or migrated.

            AC hierarchy architecture

            AC hierarchy architecture is a brand new networking model engineered by H3C to cater for the need of hierarchy network construction in the market. An AC hierarchy network contains a central AC, local ACs, and APs. The central AC manages all local ACs, and local ACs provide network access to APs and process client traffic.

            * The central AC has a high processing capacity and is deployed at the distribution layer. It focuses on performing global services such as network management and control and centralized authentication. It can also provide network access to APs and process client traffic.

            * The local ACs can be standard ACs, all-in-one ACs (with routing and DPI features), or unified wired and wireless switches.

            AC hierarchy architecture is well suited for large-scale wireless network deployment. It supports headquarter and branch networking applications. The link bandwidth at the core layer and forwarding capacity of the central AC are no longer the bottleneck. Through centralized management on the central AC, this architecture allows automatic and convenient version upgrade and configuration synchronization of local ACs and APs. The local ACs are responsible for AP switching, significantly improving roaming performance.

            CUPID location

            The WX5860H supports CUPID location, which is similar to radar probing and provides high positioning accuracy. It enables an AP to proactively send a probe packet to a client and locate the client by calculating the time difference between the probe and response packets.

            CUPID is superior to RF fingerprinting in the following aspects:




            RF fingerprinting


            For example, moving people

            Almost not affected

            Large signal strength attenuation

            Multipath effect

            For example, signals have been reflected and dispersed during the transmission

            Not affected

            Greatly affected


            Field survey and signal feature investigation

            Small workload

            Large workload. It is required to set up a fingerprint database by collecting signal strengths and client locations.


            Positioning accuracy

            2 m (6.56 ft)

            5 to 15 m (16.40 to 49.21 ft), typically 10 m (32.81 ft)


            Positioning stability under interference of environmental factors

            Stable positioning result

            Positioning result susceptible to obstacles, multipath effect, deployment density, and environment changes.

            New-generation Wireless Intelligent Application Aware

            Wireless Intelligent Application Aware (wIAA) provides user role-based application-layer security, QoS, and forwarding policies for wired and wireless users. With wIAA, you can control user access and specify networks available for applications such as HTTP and FTP and the allowed bandwidth.

            The last-generation wIAA identifies packets based on the fourth-layer port number (such as port number 80 for HTTP, 20/21 for FTP). Users can bypass access restrictions simply by setting up a proxy.

            The new-generation wIAA integrates message depth analysis (DPI) and improves application identification and statistical functions. Based on the 7-layer model characteristics of Ethernet packets, as well as the typical packet signature, the new-generation wIAA implements a more precise recognition and complete restriction. With DPI, you can set up a rule to control access to certain types of websites, instead of denying each website individually. This feature simplifies network configuration and improves efficiency.

            Flexible forwarding modes

            Traditional ACs typically use the centralized forwarding mode. The AC performs centralized control and security monitoring and all user data is sent from APs to the AC for processing and forwarding. This might result in inefficient forwarding. The uplink bandwidth and the forwarding capability of the AC might become the bottleneck, especially when APs are deployed at branches, the AC is deployed at the headquarters, and APs and the AC are connected over a WAN.

            The WX5860H supports centralized forwarding, distributed forwarding, and policy-based forwarding, and users can choose the forwarding mode flexibly according to service needs and network conditions.

            The WX5860H also supports local forwarding in conjunction with centralized authentication. It can perform 802.1X and portal authentications for data streams that are forwarded locally.

            Carrier-class wireless access control and management

            The WX5860H supports the following access control methods:

            * User profile-based access control

            A user profile is a configuration template that saves predefined configurations such as Committed Access Rate (CAR) and QoS policies for clients. When a client passes authentication, the authentication server sends the related user profile to the AC. The AC uses the configuration in the user profile to restrict the client's access. When the client goes offline, the AC disables the user profile. You can configure several user profiles for different clients to achieve user profile-based access control.

            * MAC authentication access control

            MAC authentication allows you to configure and modify the access rights of a group of clients or a particular client on the AAA server. The refined access control method enhances the availability of WLANs and facilitates access right assignment.

            * MAC-based VLAN access control

            The administrator can assign users (or MAC addresses) with the same attributes to the same VLAN and configure a VLAN-based security policy on the AC. This simplifies system configuration and refines user management to the per-user granularity.

            * AP-based access control.

            The AC gets a list of permitted APs from the authentication server during client authentication, and then selects an optimal AP for the client. This allows you to control the APs that wireless clients can associate for security or accounting purposes.

            Intelligent dynamic frequency selection (DFS)

            In a WLAN, adjacent APs need to work in non-overlapping channels to avoid channel interference. However, the non-overlapping channels in a WLAN are limited. For example, the 2.4 GHz band has only three non-overlapping channels. Meanwhile, there are many possible interference sources such as radars and microwave ovens that can affect the operation of APs in a WLAN.

            DFS can ensure that each AP operates in the optimal channel, thereby minimizing adjacent channel interference. In addition, the real-time interference detection function can help keep APs away from interference sources.

            Intelligent AP load balancing

            In a WLAN, clients prefer to associate with an AP that has a higher RSSI. As a result, a large number of clients might associate with the same AP because it has stronger signal strength. Because these clients share the wireless media, the throughput for each client will be reduced.

            The WX5860H provides session-based load balancing and traffic-based load balancing. It analyzes AP loads, determines which APs can balance loads for each other, and dynamically adjusts loads among APs to ensure adequate bandwidth for clients.

            Wireless intrusion detection and prevention system (WIDS/WIPS)

            The WX5860H provides the following WIDS/WIPS features: blacklist, whitelist, rogue detection, malformed packet detection, illegal client logoff, and MAC layer attack detection and countermeasures through predefined signatures. MAC layer attacks include DoS attacks, flood attacks, and man-in-the-middle attacks.

            With the huge intelligent expert information base built in the wireless application center, the AC can visually track and monitor physical locations of attackers and shut down a physical port.

            Cooperating with H3C professional core-layer firewall/IPS devices, the AC can achieve complete security protection from Layer 1 through Layer 7, fulfilling the end-to-end security requirements of both 802.11 and 802.3 standards.

            802.1X, MAC, and portal authentications

            The WX5860H supports the following authentication methods:

            * 802.1X authentication—The WX5860H supports local and remote 802.1X authentication and multiple 802.1X authentication methods, such as TLS, PEAP, TTLS, MD5, and SIM card. In local authentication mode, the AC acts as the authentication server and no additional AAA server is required. The WX5860H also supports dynamic VLAN assignment and ACL through predefined user profiles.

            * MAC authentication—The WX5860H supports MAC address authentication to authenticate hand-held terminals such as Wi-Fi phones and hand-held mobile terminals. On the WX5860H or AAA server, you can specify MAC addresses allowed to access a WLAN. MAC addresses not specified are considered illegal and cannot access the WLAN. This function facilitates some wireless applications such as the wireless healthcare system where MAC authentication can ensure that only the PDAs of the hospital can access the dedicated WLAN but not those owned by patients.

            * Portal authentication—The WX5860H provides an embedded portal server. This authentication method allows users to initiate authentication through a Web browser without installing client software. After a client passes authentication, the AC redirects the client to the specified website and simultaneously starts authorization and accounting. Customized portal pages can also be pushed to the clients for advertisement and message delivery. This is widely used in various scenarios like wireless campus, wireless city, and guest access.

            IPv4/IPv6 dual stack (native IPv6)

            The WX5860H supports both IPv4 and IPv6 client accesses. When the AC is deployed on an IPv4 network, APs connected to the AC can identify IPv6 packets and map IPv6 priorities to the tunnel priority. After receiving packets sent from APs, the AC can also use ACLs to control and filter IPv6 packets. When the AC is deployed on an IPv6 network, it will automatically negotiate with APs and establish an IPv6 tunnel with each AP and can still correctly identify and process IPv4 packets from wireless clients.

            Excellent IPv4/IPv6 adaptability enables the WX5860H to provide services to various complicated applications during migration from IPv4 to IPv6.

            The WX5860H also supports IPv6 Source Address Validation (SAVI) to address emerging IPv6 forged packet attacks on campus networks. Through address allocation protocol snooping, the AC obtains clients' IP addresses and ensures that clients use the correct address when they come online, eradicating the possibility of IP address forging and guaranteeing the reliability of source IP addresses. IPv6 SAVI in conjunction with portal authentication further guarantees the integrity and security of network packets.

            End-to-end QoS

            Developed based on the H3C's cutting-edge Comware 7 operating system, the WX5860H supports the QoS Diff-Serv model perfectly. It also supports IPv6 QoS.

            The QoS Diff-Serv model mainly includes traffic classification, traffic policing, queue management, and queue scheduling, completely supporting the six kinds of PHB services: EF, AF1 through AF4, and BE. This enables service providers to provide services with different qualities to clients, making the Internet a truly integrated network carrying data, voice and video services at the same time.

            Fast Layer 2 and Layer 3 roaming

            The WX5860H under H3C fit AP+AC architecture improves both Layer 2 and Layer 3 roaming performance significantly and enables inter-subnet roaming. This benefit greatly simplifies early wireless network planning and reduces network planning costs.

            The WX5860H uses key caching to implement fast roaming of clients. The key caching function allows clients to fast roam from one AP to another without performing the complete 802.1X authentication process while ensuring user identification and the continuity of keys. With fast roaming, an intra-AC roaming will take no more than 50 ms, which ensures transmission of speed-demanding voice traffic.

            Remote access for branches

            The WX5860H can be deployed to implement the following features for remote branch access:

            * Performance improvement of services such as printer access and terminal communication in branch LANs by choosing centralized forwarding mode or local forwarding mode.

            * Client access to local resources in case of WAN or AC failure and the AC escape function.

            * Communication between an AC and APs in a private network through NAT.


            Hardware specifications



            Dimensions (H × W × D)

            88.1 × 440 × 480 mm (3.47 × 17.32 × 18.90 in)

            Weight (full configuration)

            12.86 kg (28.35 lb)


            8 × GE ports

            12 × SFP/SFP+ ports

            4 × QSFP+ ports

            1 × console port

            1 × OOBM port

            1 × USB port

            Power supply

            Removable AC or DC power modules

            Support for 1+1 power module redundancy

            (Power module should be purchased separately.)

            Maximum power consumption

            < 300 W


            Operating temperature: 0°C to +45°C (+32°F to +113°F)

            Storage temperature: –40°C to +70°C (–40°F to +158°F)

            Relative humidity (non-condensing)

            Operating and storage humidity: 5% to 95%

            Safety standards

            UL 60950-1

            CAN/CSA C22.2 No 60950-1

            IEC 60950-1

            EN 60950-1/A11

            AS/NZS 60950

            EN 60825-1

            EN 60825-2


            FDA 21 CFR Subchapter J

            EMC standards

            ETSI EN 300 386 V1.3.3:2005

            EN 55024: 1998+ A1: 2001 + A2: 2003

            EN 55022 :2006

            VCCI V-3:2007


            EN 61000-3-2:2000+A1:2001+A2:2005

            EN 61000-3-3:1995+A1:2001+A2:2005

            AS/NZS CISPR 22:2004

            FCC PART 15:2005

            GB 9254:1998

            GB/T 17618:1998


            ≥ 50, 000 hours

            Software specifications



            Basic capabilities

            Supported APs without license


            License type


            Max. manageable number of APs


            Max. configurable number of APs


            Max. manageable number of wireless users


            802.11 MAC

            802.11 protocol suite

            Hide SSID

            802.11g protection

            802.11n only

            Client quantity limit

            SSID-based client quantity limit

            Radio-based client quantity limit

            Online client detection

            Automatic client aging

            Multi-country code

            User isolation

            VLAN-based user isolation

            SSID-based user isolation

            20 MHz/40 MHz auto-switch in 40 MHz mode

            Local forwarding

            Local forwarding based on SSID+VLAN


            Auto AP

            AC discovery (DHCP option 43 and DNS)

            IPv6 tunnel

            Network synchronization

            Jumbo frame forwarding

            AP preprovisioning

            AP basic network settings such as static IP, VLAN, and AC's IP address

            NAT traversal between AP and AC


            Intra-AC Layer 2 and Layer 3 roaming

            Inter-AC Layer 2 and Layer 3 roaming

            Access control

            Open system, shared key authentication

            WEP-64/128, dynamic WEP

            WPA, WPA2


            CCMP (802.11n recommended)

            WAPI (optional)


            Wireless End-point Access Domination (EAD)

            Oasis cloud authentication

            Portal authentication

            Transparent authentication, remote or external server

            Portal webpage redirection

            SSID-based portal webpage redirection

            AP-based portal webpage redirection

            Portal by-pass proxy

            802.1X authentication


            Local authentication

            802.1X, portal authentication, MAC authentication

            LDAP authentication

            Portal access

            802.1X access with EAP-GTC or EAP-TLS

            AP-based access control

            Guest access control

            VIP tunnel

            ARP anti-attack

            Wireless SAVI

            SSID anti-spoofing

            Username and SSID binding

            Domain- and SSID-based AAA server selection

            AAA server backup

            Local AAA server for wireless clients



            Priority mapping

            Layer 2 to Layer 4 traffic classification

            Rate limit

            Granularity of 8 Kbps


            User profile-based access control

            Intelligent bandwidth limit (equal bandwidth share algorithm)

            Intelligent bandwidth limit (user specific)

            Intelligent bandwidth guarantee

            Free flow for packets coming from every SSID when traffic is not congested, and minimum bandwidth specified for each SSID when traffic is congested

            QoS optimization for SVP phone

            Call Admission Control (CAC)

            CAC based on client quantity or bandwidth

            End-to-end QoS

            AP uplink rate limit

            WLAN radio resource management

            Country code lock

            Static channel and power configuration

            Dynamic channel and power configuration

            Transmit power control (TPC)

            Coverage hole detection and correction

            Load balancing mode

            Traffic-based load balancing

            Session-based load balancing

            Radio group based load balancing (dual-band supported)

            Intelligent load balancing

            AP load balancing group

            Auto-discovery and flexible setting


            Static blacklist

            Dynamic blacklist


            Rogue AP detection

            Rogue AP detection based on SSID, BSSID, or device OUI

            Countermeasures against rogue APs



            Anti-weak IV attack


            7-layer mobile security protection

            Layer 2 protocols

            ARP proxy




            Broadcast storm suppression

            IP protocols


            Native IPv6

            IPv6 SAVI

            IPv6 Portal


            MLD Snooping

            IGMP Snooping

            Number of multicast groups


            Multicast-to-unicast conversion (IPv4/IPv6)

            Support for unicast threshold setting


            1+1, N+1, N+N AC backup

            Support for license sharing

            AP load balancing

            Remote AP

            Network management and configuration


            WEB, SNMPv1/v2/v3, RMON


            Web, CLI, Telnet, FTP

            Wireless location

            CUPID location

            Power save

            Scheduled radio shutdown

            Scheduled wireless service shutdown

            Per-packet power control (PPC)

            WLAN application

            RF Ping

            Remote probing and analysis

            RealTime Spectrum Guard (RTSG)

            Wireless Intelligent Application Aware (wIAA)

            Based on stateful firewall

            Packet forwarding fairness scheduling

            802.11n packet forwarding suppression

            Connection status-based traffic shaping

            AP channel sharing

            AP channel reusing

            Radio transmission rate adjustment algorithm

            Ignore packets with low RSSI

            Forbid clients with low RSSI from accessing a WLAN

            Forbid multicast buffering

            Blink status detection

            Ordering Information

            Product code

            Product description


            H3C WX5860H Access Controller


            650W AC Power Module


            650W DC Power Module