Sophos AP 100C Access Point - Ceiling Mountable, 1-Year Warranty with Power Supply
Sophos Access Points are ideal for creating multiple separate wireless zones. Configure a wireless network to provide employees access to internal network resources. On the same access point, you can offer wireless guests Internet access. Do it all without compromising the integrity of the internal network. Access points can act as a repeater or bridge to extend Wi-Fi coverage to hard to wire areas.
|Maximum throughput||1.3 Gbps + 450 Mbps|
|Multiple SSIDs||8 per radio (16 in total)|
|LAN interface||1 x 10/100/1000 Base TX|
|Supported WLAN Standards||802.11 a/b/g/n/ac 2.4 and 5 GHz|
|Power over Ethernet||802.3at|
|Number of antennas||6 internal|
|Number of radios||2|
Get secure and reliable wireless access all over the office
Simplify your wireless networking by using Sophos UTM as a wireless controller to centralize your Wi-Fi management and security. Our access points are automatically set up and configured by the UTM. That means all your wireless clients get complete threat protection too.
Installs fast with automatic setup and configuration
You can set up multiple wireless Access Points (APs) within minutes. They require no local configuration and will simply find the controller, retrieve their IP address via DHCP, and import the configuration. Devices automatically appear in the UTM interface where you can manually activate them.
Creates reliable networks for all areas
Our range of access points support different deployment scenarios. They include the desktop AP 15, the ceiling-mounted AP 30, and the dual-band/dual-radio AP 50 and AP 100. The AP 50 can act as a wireless repeater and/or bridge to extend coverage to areas that are hard to reach with wired Ethernet.
Provides guest Wi-Fi and BYOD access
We give you secure, easy-to-manage guest access out-of-the-boxwithout extra appliances, licenses or complex configuration. And you can tailor the guest experience to suit your needs. Set bandwidth limits and content filtering as well as customizing the login page and vouchers to strengthen your company brand.
Secure wireless and integrated UTM protection
To prevent unauthorized access we use the most advanced encryption and authentication standards available, including WPA2-Enterprise in combination with IEEE 802.1X (RADIUS authentication). And, our APs forward wireless traffic to the UTM, giving wireless clients the same level of security as if they were physically connected to the LAN. You can also choose to authenticate users based on their credentials from any back end server supported by our UTM for greater flexibility and control.
Request a Quote
ShippingSKU # A1EZTCHNF-BDL
Product Delivery: Shipped Product