WirelessTrakker is a solution to make deploying and managing a wireless network (WLAN) easy and simple,
while maintaining high security and control over what happens on your network. Similar to products
from BlueSocket, Meraki, and Cisco; it is designed to be fast and easy to get any management tasks
done, and to tie into your existing network with only some minor changes in most cases.
Equipment Buy Back
We recognize that many organizations have wireless equipment in place, and it
may be difficult to finance the purchasing of all new access points or
controllers. To help ease the financial burden of purchasing WirelessTrakker
Access Points and replacing any wireless controllers you have, we may be able to
buy your existing equipment from you to offset the cost of your WirelessTrakker
purchase. Depending on your equipment, your WirelessTrakker purchase may even
be free for the first year! Contact us for more details about this program.
Try it now!
We offer a free 30-day on-site demo of our WirelessTrakker Controller appliance. You will
have to purchase at least one wireless access point.
If you would like to test WirelessTrakker at your business
please complete
this form.
Overview
Businesses' wireless networks are being asked to do more and more every day. For example many
businesses are issuing employees iPads that need filtered and secure access to the Internet.
Guest presenters are also becoming more common, and these presenters often need full access to
the Internet, but you want to keep them off your LAN. WirelessTrakker was designed to solve these
problems by providing the ability to separate different groups of wireless users with different
levels of access, all from one central management interface.
A WirelessTrakker solution consists of a WirelessTrakker Controller, and one or many WirelessTrakker
Access Points. The WirelessTrakker Controller is a 1U appliance that you install in your server
room or wiring closet. The WirelessTrakker Controller acts as a router/gateway between your wired
network and your wireless network. It is a low power device that has minimal moving parts,
designed to be an integral part of your network and to have very high uptimes.
The WirelessTrakker Access Points are installed throughout your building, wherever you need access
to the wireless network. In typical business construction, if you place an access point in a
hallway with offices on both sides, it should cover 4-6 large office spaces with good signal quality.
The access points support 802.11b, 802.11g, and 802.11n. They can be mounted directly on drop
ceiling tiles, or mounted to a wall.
The WirelessTrakker Access Points are powered using Power Over Ethernet injectors, that are typically
placed in your wiring closet. You simply connect your switch to the power injector’s “LAN” port,
then the WirelessTrakker Access Point (directly or via a patch panel) to the “POE” port. The power
cord for the POE injector plugs into a standard power outlet on a surge protector or UPS strip.
This means that wherever you need to put an access point, you only need a CAT5 jack. No electric
outlets are needed at the access point’s location.
Security
WirelessTrakker allows you to create multiple wireless networks, each with different levels of access.
For example, you can create a “guest” WLAN that allows only filtered access to the Internet, a
“presenter” WLAN that allows full access to the Internet but no access to the LAN, a “staff” WLAN
that allows access to everything on your wired network, and a “student” WLAN that allows access to
select network devices.
WirelessTrakker supports 802.11 encryption standards, like WEP, WPA, and WPA2. All three of these
methods support the typical “pre shared key”, or PSK, security. WirelessTrakker also supports
Enterprise level authentication for WPA and WPA2. Instead of requiring your users to put in a key
that is common to everyone (and easily stolen from post-it notes and word of mouth), users are
prompted for a name and password before they are even given an IP address on the network. That
name and password can then be validated against a database on the WirelessTrakker appliance, Active
Directory, LDAP, or a ISBossBox user database.
Additionally, each WLAN can have a different encryption type to make it easier for some users to
access it. For example, the “guest” WLAN would probably be best suited to have no authentication so
that guest users can just get on and get what they need to do done, while the “staff” WLAN requires
a name and password to validate that they are a member of the organization.
For unencrypted WLANs and for WLANs with PSK encryption, you can also turn on a captive portal.
The captive portal requires that the user identify themselves somehow (either by their full name,
or a username and password ) and optionally agree to a Terms of Service agreement (customizable by
you) before they are granted access to the network.
Management
One of the goals of WirelessTrakker is to make it simple and fast to deploy and maintain a robust
wireless network. All of the configuration for the entire wireless network is done in the
WirelessTrakker web interface. If you are familiar with ISBossBox, using WirelessTrakker will be
second nature since it’s based on the same interface design. The WirelessTrakker Access Points get
their configuration from the WirelessTrakker Controller, so you do not have to configure each access
point individually. If you add a new WirelessTrakker Access Point to your network, the controller
will push the configuration down to the access point and it will “just work”.
WirelessTrakker logs and reports everyone that connects to the WLAN, adding accounting and credibility
to your WLAN. For example, if user “Fred” logs in to the WLAN, WirelessTrakker can tell you that
“Fred” logged in, got IP address x.x.x.x, and connected to the access point “y”. Using that data
you can even see where (approximately) the user was when they connected.
Integration With ISBossBox
WirelessTrakker works great as a standalone product to manage and control your wireless network.
But when paired with ISBossBox, it’s capabilities increase even more! The ISBossBox add-on to
support filtering of Apple iPads & iPods, and Google Android devices determines how to filter the
user based on the device’s IP address. When WirelessTrakker (with an authenticated WLAN) is added
to the mix, you add authentication to the system so that ISBossBox knows exactly who is using the
device so it can filter and log them accordingly.
Requirements
WirelessTrakker is fairly easy to install and get going. The only requirement your network needs to
have is that the switches in between the WirelessTrakker Controller and the WirelessTrakker Access
Points need to support VLANs and VLAN tagging (known as 802.1Q). Most managed switches support this.
You will need to configure the ports that the WirelessTrakker Access Points and the WirelessTrakker
controller connect to with VLAN tagging support and place the ports in the correct VLANs. We can help
you with this process, and have instructions for how to do this for many different vendors
of switches.
If you want to authenticate your wireless users with Active Directory, then you need to have a
Microsoft Windows Domain Controller running Windows 2000 or newer.
Service & Warranties
The WirelessTrakker controller is fully warrantied and supported by ISBoss for
as long as you subscribe to the service. This includes email and telephone
support, as well as software updates for the controller and access points. Once
your subscription is up, you return the controller to us. The access points are
outright purchases, and warrantied from ISBoss for 30 days against DOA (dead on
arrival). The APs carry a one year warranty from the manufacturer, and details
on the return process are included in the documentation for the access points.
|