<li id="bfx44"></li>

    <li id="bfx44"><acronym id="bfx44"><u id="bfx44"></u></acronym></li>

    1. <th id="bfx44"></th>

      Chinese

      多種無線認證方式 總有一種是你想要的

      Multi-way Authentication

      Supports a variety of wireless authentication methods such as Portal authentication, RADIUS authentication, Wechat authentication, SMS authentication, QR code authentication, 802.1X authentication, CA Certificate authentication, APP download authentication, temporary visitor authentication, third-party database authentication etc.


      微信連Wi-Fi 新一代微信認證   公眾號關注   Wi-Fi上網一步到位

      Wechat WIFI Connecting
      New Generation Wechat WIFI  Public ID Attention  Wi-Fi Easy Connection

      WeChat authentication Combines Wi-Fi authentication with WeChat Public ID attention, bringing the innovation of wireless authentication method.

      New Generation WeChat authentication perfectly supports WeChat Wi-Fi, effectively simplifying the end-user Internet access. 

      Largely enhance the end-user Internet experience, increase the number of WeChat public fans, to bring more business value to businesses.


      手機短信認證 最經典的認證方式  沒有之一

      SMS Authentication
      Most common authentication

      Integrated SMS Gateway authentication, no need need to build a server to have dynamic verification code authentication. Users can enter the mobile number then get the verification code, which will reduce the rub of network, effectively make sure the security of wireless Internet access , but also for subsequent precision marketing provides first-hand information.


      APP下載認證  應用分發市場外的又一大APP推廣利器

      APP authentication 
      The best way for APP Promotion

      APP authentication obtains Internet access via downloading APP, downloading app before authentication, installation and activation then you could connect to the Internet. At the same time, download APP using wireless traffic, not ISP traffic, So no worry to consume large user data flow due to APP package downloading.


      二維碼審核認證 掃描即可上網 安全簡便

      OR Code authentication
      Once scan then connect wifi  simple and safe

      After the user connects the SSID, the QR code page pops up automatically. The visitor can scan the OR Code which be created by designated approver authorized terminal devices, then the visitor can access to the Internet. and record the user's access action in the form of auditor + user terminal MAC + note to ensure the security, meanwhile, the network access is traceable.


      臨時訪客認證  靈活授權 有效管理

      Temporary visitors authentication
      Flexible approval  Effective management

      Regarding access users, not only needs to provide safe and effective authentication, but also needs to simplify the certification process as much as possible. Sundray wireless integrated temporary user management system, users only need to manually enter the temporary guest account and password to access the external network, and can set the effective duration, beyond the validity period to regain access authorization.


      802.1X高級認證 一鍵配置 跟復雜命令行說再見

      802.1X advanced authentication
      One key configuration Say goodbye on complicated Command line

      Traditional authentication scheme on terminal configuration is complicated, Sundray 802.1X certification provides a key configuration tool. End users simply download the configuration tool, then could quickly have wireless access configuration.


      支持關聯外部數據庫  認證方式靈活定制

      Supports thid-party database 
      Flexible customization on authentication

      Except above authentications, Sundray controller supports external CA, RADIUS, LDAP, AD domain and Third-party certificate etc authentication methods, easily support some advanced authentication based on Employee ID, Student ID, Passport ID, VIP Account ID etc.


      支持作為認證服務器 對接友商設備實現統一認證

      As a authentication Server
      Supports others WIFI Vendor devices to have unified authentication

      Traditional WIFI vendors Supports single device authentication method, and need to increase the authentication method or unify the authentication methods when expanding other brand devices. Now, even if we already deployed other brands of Controller or AP devices, we can do unified certification based on Sundray controller, and supports a variety of authentication methods.

      Related Scheme
      Case StudyMore  >