Cisco Catalyst9800L Kenya

 

Cisco Catalyst9800L WirelessController Kenya

The Cisco Catalyst9800L WirelessController Kenya is a fixed wireless controller with seamless software updates for small and midsize enterprises. The controller is secured with Encrypted Traffic Analytics (ETA) and Software-Defined Access (SD-Access).

Description

Cisco Catalyst9800L Wireless Controller Kenya

The Cisco Catalyst9800L WirelessController Kenya is a fixed wireless controller with seamless software updates for small and midsize enterprises. The controller is secured with Encrypted Traffic Analytics (ETA) and Software-Defined Access (SD-Access). The controller comes with built-in security : Secure Boot, runtime defenses, image signing, integrity verification, and hardware authenticity. Built from the ground up for intent-based networking, the Cisco Catalyst 9800-L brings together Cisco IOS® XE Software and Cisco RF excellence to create a best-in-class wireless experience for your evolving and growing organization. This Wireless Controller Kenya comes with built-in security : Secure Boot, runtime defenses, image signing, integrity verification, and hardware authenticity. Also, availability and seamless software updates, enabled by hot and cold patching, keep your clients and services always on in planned and unplanned events.

With Cisco In Service Software Upgrade (ISSU), network downtime during a software update or upgrade is a thing of the past. ISSU is a complete image upgrade and update while the network is still running. The software image—or patch—is pushed onto the Cisco Catalyst9800L wireless controller while traffic forwarding continues uninterrupted. Cisco User Defined Network, a feature available in Cisco DNA Center, allows IT to give end users control of their very own wireless network partition on a shared network. End users can then remotely and securely deploy their devices on this network. Perfect for university dormitories or extended hospital stays, Cisco User Defined Network grants both device security and control, allowing each user to choose who can connect to their network.

The Wi-Fi 6 readiness dashboard is a new dashboard in the Assurance menu of Cisco DNA Center. It will look through the inventory of all devices on the network and verify device, software, and client compatibility with the new Wi-Fi 6 standard. After upgrading, advanced wireless analytics will indicate performance and capacity gains as a result of the Wi-Fi 6 deployment. This is an incredible tool that will help your team define where and how the wireless network should be upgraded. It will also give you insights into the Cisco wifi Kenya access point distribution by protocol (802.11 ac/n/abg), wireless airtime efficiency by protocol, and granular performance metrics.

Features

  • Choose between copper and fiber uplinks. This choice gives you flexibility in your network.
  • High availability and seamless software updates, enabled by hot and cold patching, keep your clients and services always on in planned and unplanned events.
  • Secure the air, devices, and users with the Cisco Catalyst 9800-L. The wireless infrastructure becomes the strongest first line of defense, with Encrypted Traffic Analytics (ETA) and Software-Defined Access (SD-Access). The controller comes with built-in security : Secure Boot, runtime defenses, image signing, integrity verification, and hardware authenticity.
  • Built on a modular operating system, the controller features open and programmable APIs that enable automation of day-0 to day-N network operations. Model-driven streaming telemetry provides deep insights into your network and client health.
  • Cisco User Defined Network, a feature available in Cisco DNA Center, allows IT to give end users control of their very own wireless network partition on a shared network. End users can then remotely and securely deploy their devices on this network. Perfect for university dormitories or extended hospital stays, Cisco User Defined Network grants both device security and control, allowing each user to choose who can connect to their network.
  • The Wi-Fi 6 readiness dashboard is a new dashboard in the Assurance menu of Cisco DNA Center. It will look through the inventory of all devices on the network and verify device, software, and client compatibility with the new Wi-Fi 6 standard. After upgrading, advanced wireless analytics will indicate performance and capacity gains as a result of the Wi-Fi 6 deployment. This is an incredible tool that will help your team define where and how the wireless network should be upgraded. It will also give you insights into the access point distribution by protocol (802.11 ac/n/abg), wireless airtime efficiency by protocol, and granular performance metrics.
  • With Cisco In Service Software Upgrade (ISSU), network downtime during a software update or upgrade is a thing of the past. ISSU is a complete image upgrade and update while the network is still running. The software image—or patch—is pushed onto the wireless controller while traffic forwarding continues uninterrupted. All access point and client sessions are retained during the upgrade process. With just a click, your network automatically upgrades to the newest software.

Always on

The Cisco Catalyst9800L WirelessController Kenya provides seamless software updates for faster resolution of critical issues, the ability to introduce new access points with zero downtime, and flexible software upgrades. Stateful Switchover (SSO) with active standby and N+1 redundancy keeps your network, services, and clients always on, even in unplanned events.

Secure

Secure the air, devices, and users with the Cisco Catalyst9800L WirelessController Kenya. Wireless infrastructure becomes the strongest first line of defense with Encrypted Traffic Analytics and SD-Access. The controller comes with built-in security : Secure Boot, runtime defenses, image signing, integrity verification, and hardware authenticity. Cisco Advanced Wireless Intrusion Prevention System (aWIPS) is a complete wireless security solution that uses the Cisco Unified Access® infrastructure to detect, locate, mitigate, and contain wired and wireless rogues and threats.

Open and programmable

The Cisco Catalyst9800L WirelessController Kenya is built on the Cisco IOS XE operating system, which offers a rich set of open standards-based programmable APIs and model-driven telemetry that provide an easy way to automate day-0 to day-N network operations.

Specifications

Item Specification
Wireless IEEE 802.11a, 802.11b, 802.11g, 802.11d, WMM/802.11e, 802.11h,802.11n, 802.11k, 802.11r, 802.11u, 802.11w, 802.11ac Wave1 and Wave2, 802.11ax
Wired, switching, and routing IEEE 802.3 10BASE-T, IEEE 802.3u 100BASE-TX specification, 1000BASE-T, 1000BASE-SX, 1000-BASE-LH, IEEE 802.1Q VLAN tagging, IEEE 802.1AX Link Aggregation
Data Requests For Comments (RFCs)
  • RFC 768 UDP
  • RFC 791 IP
  • RFC 2460 IPv6
  • RFC 792 ICMP
  • RFC 793 TCP
  • RFC 826 ARP
  • RFC 1122 Requirements for Internet Hosts
  • RFC 1519 CIDR
  • RFC 1542 BOOTP
  • RFC 2131 DHCP
  • RFC 5415 CAPWAP Protocol Specification
  • RFC 5416 CAPWAP Binding for 802.11
Security standards
  • Wi-Fi Protected Access (WPA)
  • IEEE 802.11i (WPA2, RSN)
  • RFC 1321 MD5 Message-Digest Algorithm
  • RFC 1851 ESP Triple DES Transform
  • RFC 2104 HMAC : Keyed-Hashing for Message Authentication
  • RFC 2246 TLS Protocol Version 1.0
  • RFC 2401 Security Architecture for the Internet Protocol
  • RFC 2403 HMAC-MD5-96 within ESP and AH
  • RFC 2404 HMAC-SHA-1-96 within ESP and AH
  • RFC 2405 ESP DES-CBC Cipher Algorithm with Explicit IV
  • RFC 2407 Interpretation for ISAKMP
  • RFC 2408 ISAKMP
  • RFC 2409 IKE
  • RFC 2451 ESP CBC-Mode Cipher Algorithms
  • RFC 3280 Internet X.509 PKI Certificate and CRL Profile
  • RFC 4347 Datagram Transport Layer Security
  • RFC 5246 TLS Protocol Version 1.2
Encryption
  • Wired Equivalent Privacy (WEP) RC4 40, 104 and 128 bits (both static and shared keys)
  • Advanced Encryption Standard (AES) : Cipher Block Chaining (CBC), Counter with CBC-MAC (CCM), Counter with Cipher Block Chaining Message Authentication Code Protocol (CCMP)
  • Data Encryption Standard (DES) : DES-CBC, 3DES
  • Secure Sockets Layer (SSL) and Transport Layer Security (TLS) : RC4 128-bit and RSA 1024- and 2048-bit
  • DTLS : AES-CBC
  • IPsec : DES-CBC, 3DES, AES-CBC
  • 802.1AE MACsec encryption
Authentication, Authorization, and Accounting (AAA)
  • IEEE 802.1X
  • RFC 2548 Microsoft Vendor-Specific RADIUS Attributes
  • RFC 2716 PPP EAP-TLS
  • RFC 2865 RADIUS Authentication
  • RFC 2866 RADIUS Accounting
  • RFC 2867 RADIUS Tunnel Accounting
  • RFC 2869 RADIUS Extensions
  • RFC 3576 Dynamic Authorization Extensions to RADIUS
  • RFC 5176 Dynamic Authorization Extensions to RADIUS
  • RFC 3579 RADIUS Support for EAP
  • RFC 3580 IEEE 802.1X RADIUS Guidelines
  • RFC 3748 Extensible Authentication Protocol (EAP)
  • Web-based authentication
  • TACACS support for management users
Management
  • Simple Network Management Protocol (SNMP) v1, v2c, v3
  • RFC 854 Telnet
  • RFC 1155 Management Information for TCP/IP-Based Internets
  • RFC 1156 MIB
  • RFC 1157 SNMP
  • RFC 1213 SNMP MIB II
  • RFC 1350 TFTP
  • RFC 1643 Ethernet MIB
  • RFC 2030 SNTP
  • RFC 2616 HTTP
  • RFC 2665 Ethernet-Like Interface Types MIB
  • RFC 2674 Definitions of Managed Objects for Bridges with Traffic Classes, Multicast Filtering, and Virtual Extensions
  • RFC 2819 RMON MIB
  • RFC 2863 Interfaces Group MIB
  • RFC 3164 Syslog
  • RFC 3414 User-Based Security Model (USM) for SNMPv3
  • RFC 3418 MIB for SNMP
  • RFC 3636 Definitions of Managed Objects for IEEE 802.3 MAUs
  • RFC 4741 Base NETCONF protocol
  • RFC 4742 NETCONF over SSH
  • RFC 6241 Network Configuration Protocol (NETCONF)
  • RFC 6242 NETCONF over SSH
  • RFC 5277 NETCONF event notifications
  • RFC 5717 Partial Lock Remote Procedure Call
  • RFC 6243 With-Defaults capability for NETCONF
  • RFC 6020 YANG
  • Cisco private MIBs
Management interfaces
  • Web-based : HTTP/HTTPS
  • Command-line interface : Telnet, Secure Shell (SSH) Protocol, serial port
  • Cisco Prime Infrastructure
Environmental conditions supported Operating temperature :

32° to 104°F (0° to 40°C)

Note : The maximum temperature is derated by 1.0°C for every 1000 ft (305 m) of altitude above sea level.

Non-operating temperature :

–13° to 158°F (–25° to 70°C)

Operating humidity :

5% to 95% noncondensing

Non-operating humidity :

0% to 95% noncondensing

Altitude :

  • Operating altitude : 0 to 3000 m (0 to 10,000 ft)
  • Non-operating altitude : 0 to 12,192 m (0 to 40,000 ft.)

Electrical input :

  • AC input frequency range : 47 to 63 Hz
  • AC input range : 90 to 264 VAC

Maximum power :

  • 9800-L-C max measured power = 86.9W (with 4.5W USB load)
  • 9800-L-F max measured power = 84.5W (assumes 2pc 2.5W SFP and with 4.5W USB load)

Maximum heat dissipation :

  • 9800-L-C : 296.4 Btu/hr (with 4.5W USB load)
  • 9800-L-F : 288.2 Btu/hr (assumes 2pc 2.5W SFP and with 4.5W USB load)

Sound power level measure :

  • Normal : 40 dBA at 25C
  • Maximum : 42.9 dBA at 40C

Power adapter :

Input power : 100 to 240 VAC; 50/60 Hz

Regulatory compliance Safety :

  • UL/CSA 60950-1
  • IEC/EN 60950-1
  • AS/NZS 60950.1
  • CAN/CSA-C22.2 No. 60950-1
EMC – Emissions :

  • FCC 47CFR15
  • AS/NZS CISPR 22
  • CISPR 22
  • EN55022/EN55032 (EMI-1)
  • ICES-003
  • VCCI
  • KN 32 (EMI-2)
  • CNS-13438

EMC – Emissions :

  • EN61000-3-2 Power Line Harmonics (EMI-3)
  • EN61000-3-3 Voltage Changes, Fluctuations, and Flicker (EMI-3)
Class A

 

 

Yealink CP960 Conference Phone Kenya