o Up to four SSIDs (one per wireless community): allows administrator to identify multiple service sets for clients
to access
o Up to four VLANs (one per wireless community): IEEE 802.1Q VLAN tagging provides security between
workgroups
o Wireless community-based prioritization: allows the administrator to help ensure that key network traffic is
prioritized by weighting specific wireless communities
Auto Channel Select (ACS): helps reduce radio co-channel interference by automatically selecting an unoccupied radio
channel
Wireless Distribution System (WDS) modes:
o Access Point and WDS Bridge, Access Point Only, WDS Bridge Only, and Monitor: allow HP M200 802.11n Access
Points to connect wirelessly to other HP M200 802.11n Access Points without a wired backbone; this is useful for
extending the network across areas where no wired infrastructure exists
Interoperability: meets Wi-Fi Alliance certifications, including IEEE 802.11n Wi-Fi and WPA2 to help provide multivendor
interoperability
Three external 3x3 MIMO omni-directional antennas: enable the antennas to be configured for improved radio coverage
and performance
Quality of Service management:
o IEEE 802.1p: maps WMM prioritization to IEEE 802.1p queues on the wired network
o Wireless community-based prioritization: allows users to prioritize traffic based on wireless community (SSID)
o DiffServ: prioritizes data based on the traffic class
Security
AP client access control functions:
o IEEE 802.1X authentication using EAP-SIM, EAP-FAST, EAP-TLS, EAP-TTLS, and PEAP
o MAC address authentication using local or RADIUS access lists
o RADIUS AAA using EAP-MD5, PAP, CHAP, and MS-CHAPv2
o Layer 2 wireless client isolation
RADIUS-based MAC authentication: authenticates a wireless client with a RADIUS server based on the MAC address of the
client; this is useful for clients with minimal or no user interface
Choice of IEEE 802.11i, Wi-Fi Protected Access 2 (WPA2), or WPA: locks out unauthorized wireless access by
authenticating users prior to granting network access; robust Advanced Encryption Standard (AES) or Temporal Key
Integrity Protocol (TKIP) encryption secures the data integrity of wireless traffic
Secure Sockets Layer (SSL): encrypts all HTTP traffic, allowing secure access to the browser-based management
interface of the access point
Local wireless bridge client traffic filtering: when enabled, prevents communication between wireless devices
associated with the same access point
Closed system: restricts broadcast of SSID as a security measure to conceal presence of the wireless network; access
point does not respond to the wireless client probe request of "ANY"
Management password: provides security so that only authorized access to the Web browser interface is allowed
Wired Equivalent Privacy (WEP) using 64 and 128-bit encryption: provides backward compatibility for legacy clients
Rogue AP detection: identifies all access points in range; known or trusted access points can be saved, allowing network
administrators to identify unauthorized access points
Monitor and diagnostics
Diagnostic:
o Client event log records association, authentication, and DHCP events
o Packet capture tool for Ethernet and IEEE 802.11 interfaces (PCAP format)
o Data rate matrix
o Remote SYSLOG
Warranty and support