Basic Function |
RG-AP680-O(V3) |
Applicable software version |
RGOS11.9(6)W2B4 or later |
WLAN |
|
Max. number of associated STAs |
1,024 (up to 512 STAs per radio) |
Max. number of BSSIDs |
32 (up to 16 BSSIDs per radio) |
Max. number of WLAN IDs |
16 |
STA management |
SSID hiding Each SSID can be configured with the authentication mode, encryption mechanism, and VLAN attributes independently. Remote Intelligent Perception Technology (RIPT) Intelligent STA identification Intelligent load balancing based on the STA quantity or traffic |
STA limiting |
SSID-based STA limiting Radio-based STA limiting |
Bandwidth limiting |
STA/SSID/AP-based rate limiting |
CAPWAP |
IPv4/IPv6 CAPWAP Layer 2 and Layer 3 topology between an AP and an AC An AP can automatically discover the accessible AC. An AP can be automatically upgraded through the AC. An AP can automatically download the configuration file from the AC. CAPWAP through NAT |
Data forwarding |
Centralized and local forwarding |
Wireless roaming |
Layer 2 and Layer 3 roaming |
Wireless locating |
MU and TAG device locating |
Security and Authentication |
|
Authentication and encryption |
Remote Authentication Dial-In User Service (RADIUS) PSK, UPSK and web authentication QR code-based guest authentication, SMS authentication, and MAC address bypass (MAB) authentication Data encryption: WEP (64/128 bits), WPA (TKIP), WPA-PSK, WPA2 (AES) |
Data frame filtering |
Allowlist, static blocklist, and dynamic blocklist |
WIDS |
Rogue device discovery Optimization of rogue AP containment for all STA types Fuzzy containment SSID-based blocklist DDoS attack identification Automatic detection of STA attacks, and adding STAs to the blocklist when ICMP attacks or TCP SYN attacks are detected STA isolation |
Dynamic Policy |
IP standard ACL, MAC extended ACL, IP extended ACL, and expert-level ACL IPv6 ACL Time range-based ACL ACL based on a Layer 2 interface ACL based on a Layer 3 interface Ingress ACL based on a wireless interface Dynamic ACL assignment based on 802.1X authentication (used with the AC) CoA/DM |
CPP |
CPU Protect Policy (CPP) |
NFPP |
Network Foundation Protection Policy (NFPP) |
Routing and Switching |
|
MAC |
Static and filtered MAC addresses MAC address table size: 1,024 Max. number of static MAC addresses: 1,024 Max. number of filtered MAC addresses: 1,024 |
Ethernet |
Jumbo frame length: 1,518 Ethernet II 1000M SFP ports modules 2.5G ports |
VLAN |
Interface-based VLAN assignment Layer 2 isolation of wired interfaces (including aggregate interfaces) within VLANs Max. number of SVIs: 191 Max. number of VLANs: 4,094 VLAN ID range: 1–4,094 |
ARP |
ARP entry aging, gratuitous ARP learning, and proxy ARP Max. number of ARP entries: 1,024 Detection of IP address conflicts among downlink hosts ARP check |
IPv4 services |
Static and DHCP-assigned IPv4 addresses NAT, FTP ALG and DNS ALG |
IPv6 services |
IPv6 addressing, Neighbor Discovery (ND), IPv6 ND proxy, ICMPv6, IPv6 ping IPv6 DHCP client |
IP routing |
IPv4/IPv6 static route Max. number of static IPv4 routes: 1,024 Max. number of static IPv6 routes: 1,000 |
Multicast |
Multicast-to-unicast conversion |
VPN |
PPPoE client IPsec VPN |
Network Management and Monitoring |
|
Network management |
NTP server and NTP client SNTP client SNMPv1/v2c/v3 Fault detection and alarm Information statistics and logging |
Network management platform |
Web management (Eweb) |
User access management |
Telnet, SSH, FTP client, FTP server, and TFTP client |
Switchover among Fat, Fit, and cloud modes |
When the AP works in Fit mode, it can be switched to Fat mode through an AC. When the AP works in Fat mode, it can be switched to Fit mode through the console port or Telnet mode. When the AP works in cloud mode, it can be managed through Ruijie Cloud. |