supports port-based and SSID-based IEEE 802.1X authentication and accounting
WEP, WPA2, or WPA encryption
can be deployed at the AP to lock out unauthorized wireless access by authenticating users prior to granting network access;
robust Advanced Encryption Standard (AES) or Temporal Key Integrity Protocol (TKIP) encryption secures the data integrity of
wireless traffic
Integrated Wireless Intrusion Detection System (WIDS) support
provides support for hybrid and dedicated modes; detects flood, spoofing, and weak IV attacks; displays statistics (events) and
history; supports configuration of detection policies
Integrated Wireless Intrusion Prevention System (WIPS)
automatically identifies and classifies all APs and stations; enables packet-trigger containment via knowledge-based heuristics;
protects against honeypot attacks and enforces STA security; detects Denial Of Service (DoS) attacks via pre-defined DoS
attacks, and provides a Signature mechanism which allows admins to define custom rules; enables Virtual Service Domains to
deploy security policies by department or location for example.
Media access control (MAC) authentication
provides simple authentication based on a user's MAC address; supports local or RADIUS-based authentication
Secure user isolation
virtual AP services enable network administrators to provide specific services for different user groups, allowing effective
resource sharing, and simplifying network maintenance and management
Secure access by location
AP location-based user access control helps ensure that wireless users can access and authenticate only to preselected APs,
enabling system administrators to control the locations where a wireless user can access the network
Endpoint Admission Defense
integrated wired and wireless Endpoint Admission Defense (EAD) helps ensure that only wireless clients who comply with
mandated enterprise security policies can access the network, reducing threat levels caused by infected wireless clients and
improving the overall security of the wireless network
Public Key Infrastructure (PKI)
is used to control access
Authentication, authorization, and accounting (AAA)
uses an embedded authentication server or external AAA server for local users
Intelligent Application Aware Feature (WIAA)
provides a user role based or SSID based firewall embedded in WLAN Controller via ACL-based packet filter firewall and ASPF
firewall. Protect clients from outside attacks Restrict specific users from accessing specific network resources.
Source Address Validation Improvement (SAVI)
records the wireless client's IP address and MAC address and at the next data traffic forwarding stage, SAVI will validate the
client's IP address to prevent attacker spoofing other client's IP address.
Connectivity
IEEE 802.3at Power over Ethernet (PoE+)
provides 30 W of support per port for PoE+-capable devices such as IP phones, wireless access points, and security cameras, as
well as any IEEE 802.3af-compliant end device; eliminates the cost of additional electrical cabling that would be needed in IP
phone and WLAN deployments; the HP 830 8-Port PoE+ Unified Wired-WLAN Switch supports up to 5 ports at 30 W; the 24-port
model can support up to 24 ports at up to 30 W depending on the power source
Loopback
supports internal loopback testing for maintenance purposes and an increase in availability; loopback detection protects against
incorrect cabling or network configurations and can be enabled on a per-port or per-VLAN basis for added flexibility
IPv6
IPv6 host
enables controllers to be managed and deployed at the IPv6 network's edge
Dual stack (IPv4 and IPv6)
QuickSpecs
HP 830 Unified Wired-WLAN Switch Series
Overview
DA - 14560 Worldwide — Version 8 — June 10, 2014
Page 3