Cisco Catalyst9800-80 Ghana

 

Cisco Catalyst9800-80 WirelessController Ghana

The Cisco Catalyst9800-80 WirelessController Ghana is a modular wireless controller with optional 100 Gigabit Ethernet (G) modular uplinks and seamless software updates for large enterprises and campuses.

Description

Cisco Catalyst9800-80 Wireless Controller Ghana

The Cisco Catalyst9800-80 WirelessController Ghana is a modular wireless controller with optional 100 Gigabit Ethernet (G) modular uplinks and seamless software updates for large enterprises and campuses. Cisco WiFi Ghana built from the ground up for intent-based networking and Cisco DNA based and integrate the RF excellence of Cisco Aironet® access points, creating a best-in-class wireless experience for your evolving and growing organization. The Cisco Catalyst9800-80 WirelessController Ghana is built on an open and programmable architecture with built-in security, streaming telemetry, and rich analytics.

The Cisco Catalyst9800-80 WirelessController Ghana is built on the three pillars of network excellence—always on, secure, and deployed anywhere—which strengthen the network by providing the best wireless experience without compromise while saving time and money. It is feature rich and enterprise ready to power your business-critical operations and transform end-customer experiences:

Features

  • High availability and seamless software updates, enabled by hot patching, keep your clients and services always on in planned and unplanned events.
  • Secure air, devices, and users with the Cisco Catalyst 9800-80. Wireless infrastructure becomes the strongest first line of defense with Cisco Encrypted Traffic Analytics (ETA) and Software-Defined Access (SD-Access). The controller comes with built-in security: Secure Boot, runtime defenses, image signing, integrity verification, and hardware authenticity.
  • Built on a modular operating system, the 9800-80 features open and programmable APIs that enable automation of day-0 to day-N network operations. Model-driven streaming telemetry provides deep insights into the health of your network and clients.
  • Cisco User Defined Network, a feature available in Cisco DNA Center, allows IT to give end users control of their very own wireless network partition on a shared network. End users can then remotely and securely deploy their devices on this network. Perfect for university dormitories or extended hospital stays, Cisco User Defined Network grants both device security and control, allowing each user to choose who can connect to their network.
  • The Wi-Fi 6 readiness dashboard is a new dashboard in the Assurance menu of Cisco DNA Center. It will look through the inventory of all devices on the network and verify device, software, and client compatibility with the new Wi-Fi 6 standard. After upgrading, advanced wireless analytics will indicate performance and capacity gains as a result of the Wi-Fi 6 deployment. This is an incredible tool that will help your team define where and how the wireless network should be upgraded. It will also give you insights into the access point distribution by protocol (802.11 ac/n/abg), wireless airtime efficiency by protocol, and granular performance metrics.
  • With Cisco In Service Software Upgrade (ISSU), network downtime during a software update or upgrade is a thing of the past. ISSU is a complete image upgrade and update while the network is still running. The software image—or patch—is pushed onto the wireless controller while traffic forwarding continues uninterrupted. All access point and client sessions are retained during the upgrade process. With just a click, your network automatically upgrades to the newest software.

Always on

Seamless software updates enable faster resolution of critical issues, introduction of new access points with zero downtime, and flexible software upgrades. Stateful switchover (SSO) with 1:1 active standby and N+1 redundancy keeps your network, services, and clients always on, even in unplanned events. Cisco Advanced Wireless Intrusion Prevention System (aWIPS) is a complete wireless security solution that uses the Cisco Unified Access® infrastructure to detect, locate, mitigate, and contain wired and wireless rogues and threats.

Secure

Secure air, devices, and users with the Cisco Catalyst 9800-80 Wireless Controller Ghana. Wireless infrastructure becomes the strongest first line of defense with ETA and SD-Access. The controller comes with built-in security: Secure Boot, runtime defenses, image signing, integrity verification, and hardware authenticity.

Open and programmable

The controller is built on the Cisco IOS XE operating system, which offers a rich set of open standards-based programmable APIs and model-driven telemetry that provide an easy way to automate day-0 to day-N network operations.

Power

The Cisco Catalyst9800-80 WirelessController Ghana ships with redundant power supply units, either AC or DC, based on the customer’s choice. The Power Entry Module (PEM) provides redundant power to the system, and the 9800-80 can operate continuously with only a single PEM installed. The PEMs are hot-swappable, and replacement of a single PEM can be made without power interruption to the system. All external connections to the PEMs are made from the rear panel of the chassis, and they are removed or inserted from the rear. The main power switch for the unit is located directly next to the PEMs on the rear of the chassis.

Specifications

Item Specification
Wireless IEEE 802.11a, 802.11b, 802.11g, 802.11d, WMM/802.11e, 802.11h, 802.11n, 802.11k, 802.11r, 802.11u, 802.11w, 802.11ac Wave 1 and Wave 2, 802.11ax
Wired, switching, and routing IEEE 802.3 10BASE-T, IEEE 802.3u 100BASE-TX, 1000BASE-T, 1000BASE-SX, 1000-BASE-LH, IEEE 802.1Q VLAN tagging, IEEE 802.1AX Link Aggregation
Data standards
  • RFC 768 User Datagram Protocol (UDP)
  • RFC 791 IP
  • RFC 2460 IPv6
  • RFC 792 Internet Control Message Protocol (ICMP)
  • RFC 793 TCP
  • RFC 826 Address Resolution Protocol (ARP)
  • RFC 1122 Requirements for Internet Hosts
  • RFC 1519 Classless Interdomain Routing (CIDR)
  • RFC 1542 Bootstrap Protocol (BOOTP)
  • RFC 2131 Dynamic Host Configuration Protocol (DHCP)
  • RFC 5415 Control and Provisioning of Wireless Access Points (CAPWAP) Protocol
  • RFC 5416 CAPWAP Binding for 802.11
Security standards
  • Wi-Fi Protected Access (WPA)
  • IEEE 802.11i (WPA2, RSN)
  • Wi-Fi Protected Access 3 (WPA3)
  • RFC 1321 MD5 Message-Digest Algorithm
  • RFC 1851 Encapsulating Security Payload (ESP) Triple DES (3DES) Transform
  • RFC 2104 HMAC : Keyed-Hashing for Message Authentication
  • RFC 2246 TLS Protocol Version 1.0
  • RFC 2401 Security Architecture for the Internet Protocol
  • RFC 2403 HMAC-MD5-96 within ESP and AH
  • RFC 2404 HMAC-SHA-1-96 within ESP and AH
  • RFC 2405 ESP DES-CBC Cipher Algorithm with Explicit IV
  • RFC 2407 Interpretation for Internet Security Association Key Management Protocol (ISAKMP)
  • RFC 2408 ISAKMP
  • RFC 2409 Internet Key Exchange (IKE)
  • RFC 2451 ESP CBC-Mode Cipher Algorithms
  • RFC 3280 Internet X.509 Public Key Infrastructure (PKI) Certificate and Certificate Revocation List (CRL) Profile
  • RFC 4347 Datagram Transport Layer Security (DTLS)
  • RFC 5246 TLS Protocol Version 1.2
Encryption standards
  • Static Wired Equivalent Privacy (WEP) RC4 40, 104 and 128 bits
  • Advanced Encryption Standard (AES) : Cipher Block Chaining (CBC), Counter with CBC-MAC (CCM), Counter with CBC Message Authentication Code Protocol (CCMP)
  • Data Encryption Standard (DES) : DES-CBC, 3DES
  • Secure Sockets Layer (SSL) and Transport Layer Security (TLS) : RC4 128-bit and RSA 1024- and 2048-bit
  • DTLS : AES-CBC
  • IPsec : DES-CBC, 3DES, AES-CBC
  • 802.1AE MACsec encryption
Authentication, Authorization, and Accounting (AAA)
  • IEEE 802.1X
  • RFC 2548 Microsoft Vendor-Specific RADIUS Attributes
  • RFC 2716 Point-to-Point Protocol (PPP) Extensible Authentication Protocol (EAP)-TLS
  • RFC 2865 RADIUS Authentication
  • RFC 2866 RADIUS Accounting
  • RFC 2867 RADIUS Tunnel Accounting
  • RFC 2869 RADIUS Extensions
  • RFC 3576 Dynamic Authorization Extensions to RADIUS
  • RFC 5176 Dynamic Authorization Extensions to RADIUS
  • RFC 3579 RADIUS Support for EAP
  • RFC 3580 IEEE 802.1X RADIUS Guidelines
  • RFC 3748 Extensible Authentication Protocol (EAP)
  • Web-based authentication
  • TACACS support for management users
Management standards
  • Simple Network Management Protocol (SNMP) v1, v2c, v3
  • RFC 854 Telnet
  • RFC 1155 Management Information for TCP/IP-based Internets
  • RFC 1156 MIB
  • RFC 1157 SNMP
  • RFC 1213 SNMP MIB II
  • RFC 1350 Trivial File Transfer Protocol (TFTP)
  • RFC 1643 Ethernet MIB
  • RFC 2030 Simple Network Time Protocol (SNTP)
  • RFC 2616 HTTP
  • RFC 2665 Ethernet-Like Interface Types MIB
  • RFC 2674 Definitions of Managed Objects for Bridges with Traffic Classes, Multicast Filtering, and Virtual Extensions
  • RFC 2819 Remote Monitoring (RMON) MIB
  • RFC 2863 Interfaces Group MIB
  • RFC 3164 Syslog
  • RFC 3414 User-Based Security Model (USM) for SNMPv3
  • RFC 3418 MIB for SNMP
  • RFC 3636 Definitions of Managed Objects for IEEE 802.3 MAUs
  • RFC 4741 Base NETCONF protocol
  • RFC 4742 NETCONF over SSH
  • RFC 6241 NETCONF
  • RFC 6242 NETCONF over SSH
  • RFC 5277 NETCONF event notifications
  • RFC 5717 Partial Lock Remote Procedure Call
  • RFC 6243 With-Defaults capability for NETCONF
  • RFC 6020 YANG
  • Cisco private MIBs
Management interfaces
  • Web-based : HTTP/HTTPS
  • Command-line interface : Telnet, Secure Shell (SSH) Protocol, serial port
  • SNMP
  • NETCONF
Hard Disk Drives (HDD)
  • SATA Solid-State Drive (SSD)
  • 240 GB of memory
Environmental conditions supported Operating temperature :

  • Normal : 0° to 40° C (32° to 104°F)
  • Short term :0° to 50° C (32° to 122°F)

Non-operating temperature :

-40° to 65° C (-104° to 149°F)

Operating humidity :

  • Normal : 10% to 90% noncondensing
  • Short term : 5% to 90% noncondensing

Non-operating temperature humidity :

5% to 93% at 82°F (28°C)

Operating altitude :

  • Appliance operating : 0 to 3000 m (0 to 10,000 ft)
  • Appliance non-operating : 0 to 12,192 m (0 to 40,000 ft)

Electrical input :

  • AC input frequency range : 47 to 63 Hz
  • AC input range : 90 to 264 VAC with AC PEM
  • DC input range : -40 to -72 VDC with DC PEM
  • Maximum power with modules : 600W
  • Heat dissipation : 2047 BTU/hr
  • Sound power level measure :
  • A-weighted sound power level is 70.5 LpAm (dBA) @ 27C nominal operation
Regulatory compliance Safety :

  • UL/CSA 60950-1
  • IEC/EN 60950-1
  • AS/NZS 60950.1
  • CAN/CSA-C22.2 No. 60950-1
EMC – Emissions :

  • FCC 47CFR15
  • AS/NZS CISPR 22
  • CISPR 22
  • EN55022/EN55032 (EMI-1)
  • ICES-003
  • VCCI
  • KN 32 (EMI-2)
  • CNS-13438
Class A
EMC – Emissions :

  • EN61000-3-2 Power Line Harmonics (EMI-3)
  • EN61000-3-3 Voltage Changes, Fluctuations, and Flicker (EMI-3)
EMC – Immunity :

  • IEC/EN61000-4-2 Electrostatic Discharge Immunity
  • IEC/EN61000-4-3 Radiated Immunity
  • IEC/EN61000-4-4 EFT-B Immunity (AC Power Leads)
  • IEC/EN61000-4-4 EFT-B Immunity (DC Power Leads)
  • IEC/EN61000-4-4 EFT-B Immunity (Signal Leads)
  • IEC/EN61000-4-5 Surge AC Port
  • IEC/EN61000-4-5 Surge DC Port
  • IEC/EN61000-4-5 Surge Signal Port
  • IEC/EN61000-4-6 Immunity to Conducted Disturbances
  • IEC/EN61000-4-8 Power Frequency Magnetic Field Immunity
  • IEC/EN61000-4-11 Voltage Dips, Short Interruptions, and Voltage Variations
  • K35 (EMI-2)
  • EMC (ETSI/EN)
  • EN 300 386 Telecommunications Network Equipment (EMC) (EMC-3)
  • EN55022 Information Technology Equipment (Emissions)
  • EN55024/CISPR 24 Information Technology Equipment (Immunity)
  • EN50082-1/EN61000-6-1 Generic Immunity Standard (EMC-4)

 

Datasheet Download