Ruijie RG-WS6512-L, High-Performance Large Campus Wireless Access Controller
Ruijie RG-WS6512-L, High-Performance Large Campus Wireless Access Controller
Product Overview
The RG-WS6512-L high-performance wireless access controller (AC), developed by Ruijie Networks, is targeted for next-generation high-speed wireless networks. It can be deployed on a Layer 2 or Layer 3 network without any architecture or hardware device changes, delivering seamless and secure control over wireless networks. The RG-WS6512-L can manage up to 128 wireless access points (APs) by default. With licenses for capacity expansion, it can manage a maximum of 1,152 generic APs or 2,304 wall-mounted APs. Through powerful centralized and visualized management and control over wireless networks, the RG-WS6512-L can significantly simplify construction and deployment of wireless networks. The RG-WS6512-L, adopting enhanced security and clustering technologies, offers identity-based networking services. Multiple ACs in a cluster can share a user database, allowing clients to seamlessly roam in different areas of a network. The cluster design guarantees the security and session integrity during roaming and smooth interaction of data and voice over Wi-Fi applications.
Product Highlights
High-speed Forwarding with Full IPv6 Support
● Centralized/Distributed, integrated, and intelligent local forwarding, eliminating the traffic bottleneck of the wireless access controller
● Full IPv6 support
Intelligent Management
● Adaptive Portal authentication page for clients, fair client access, and intelligent load balancing through spectrum navigation
● Intelligent RF management, flexibly controlling AP configuration and optimizing RF coverage and performance
● Advanced wireless access controller cluster technology for fast roaming and voice support
Secure and Reliable Network Systems
● Advanced AC virtualization technology for high reliability and capacity and performance scaling
● Virtual AP technology, managing APs in groups for secure and convenient authentication and encryption
● Dynamic network isolation for identity-based access control
● Authentication and encryption technologies including WPA3, 802.1x, PSK, WEP, TKIP, and AES for enhanced data security
● Deep Packet Inspection (DPI) based on packet characteristics, identifying over 2500 applications
● Uniform policy enforcement for WLAN, LAN, and WAN traffic, including content auditing, Flow Pre-Manager (FlowPM), and Ruijie Network Foundation Protection (RNFP)