VM Controller

The VM controller can allow to run any VMware enviornment. With AP management, user authentication, policy assignment, traffic shaping, firewall features, and much more all packaged into a single box, the VM Controller provides network administrators with a reliable, easy-to-use, and centralized management console for an entire organization’s wireless network infrastructure.

The VM controller can allow to run any VMware enviornment. With AP management, user authentication, policy assignment, traffic shaping, firewall features, and much more all packaged into a single box, the VM Controller provides network administrators with a reliable, easy-to-use, and centralized management console for an entire organization’s wireless network infrastructure.

The VM Controller can be deployed and configured easily by anyone, including non-wireless savvy users. For example, automated AP discovery prevents network administrators from having to go through the hassle of individually adding and configuring each access point. Access points as well as connected Wi-Fi devices can then be monitored and managed from a centralized point, with extensive logging & reporting features to assist in troubleshooting and maintenance.

As Wi-Fi enabled handheld devices such as martphones and tablets become ever so prevalent in our daily lives, businesses and network operators alike are faced with a mindboggling dilemma – how to simultaneously address the needs of BYOD (Bring Your Own Device), manage Wi-Fi users, and maintain network service quality for mission critical applications. The VM Controller is designed exactly with these requirements in mind, and with a total cost of ownership that satisfies even the most price conscious, organizations are guaranteed to receive an unmatched ROI on their wireless LAN infrastructure

  • Key Specifications
    • (Captive Portal) of users with capacity to register at least 1000 customers.
    • Registration and authentication through web portal.
    • The passwords of users registered for authentication through the web portal are stored in an encrypted form.
    • Unauthenticated users can not access the same Vlan as the authenticated users.
    • Apply flow rules independently for authenticated users and unauthenticated users.
    • Pre-shared key authentication (PSK), each station that connects to the SSID providing the pre-shared key to access network resources, and the WPA2 protocol with 128-bit AES encryption algorithm should be used.
    • Authentication by IEEE 802.1X standard.
    • Web Portal authentication, where connected to the network are redirected to a Web Portal where they must authenticate and then receive access policies.
    • Authentication through social media accounts, and compatibility with at least Google and Facebook is mandatory.
    • Implement the IEEE 802.1X protocol for wireless client authentication, with at least the following EAP methods: PEAPMSCHAPv2 and EAP-TLS.
    • Integration with Radius Server that supports the EAP methods cited.
    • Enable the grouping of Access Points, in order to allow the management of each group individually, with creation of SSIDs, rules and Vlans for each group of Access Points.
    • Support simultaneous connection of up to 1000 (thousand) wireless clients.
    • The Centralized Management System may be directly and/or remotely connected to the Access Points managed by it, i.e., connected on different networks and interconnected by routing.
    • Restricted access per user with the ability to create different access profiles where it is possible to determine the functionalities assigned to each profile, with at least one profile with permissions to create visiting users and a profile with permission to make any changes.
    • Enable the creation of a new SSID, define authentication parameters, define the security policies associated with the SSID, define which Access Points will be propagating the SSID, without any need for individual access at each Access Point used.
    • Identify and list neighboring radios and their SSID/BSSID that can be perceived by each AP.
    • Monitor through the management software the performance of each Access Point, consolidating network operating information, containing at least: signal-to-noise ratio, interference, signal power, CPU performance, memory utilization, network interface utilization.
    • In the event of inoperability of an access point, the wireless controller will automatically adjust the power of the adjacent Access Points in order to provide cover for the unassisted area.
    • Roaming with session integrity.
    • Open network management standards SNMPv2c and SNMPv3, including the generation of traps.
    • Record events in internal and/or external log through the Contractor’s SYSLOG server.
    • Automatically analyze and adjust access point power to eliminate coverage gaps and optimize network performance.
    • Have a system for searching for customer information from the user’s IP address, MAC address and login, indicating which Access Point the user is logged into.
    • Have reporting capacity for a previous period 12 months.
    • Listing of wireless clients, indicating SSID, IP address, MAC address, time and date of login and associated Access Point.
    • Listing of Access Points and the status of each Access Point in an individual manner, displaying information about the operation of radios, available wireless networks and currently authenticated customers.
    • Available warranty choices up to 60 months.
    • Several licensing choices by online validation, including no term of use or any license expiration.
  • icon VM Controller_BR (Project Only)

FEATURE HIGHLIGHTS

hotspot-billing-icon
Hotspot Billing & Guest Wi-Fi
  • Customizable Captive Portal
  • Social Media Login
  • Guest On-Demand Accounts
  • Multiple Billing Plans & User Quotas
  • SMS & Payment Gateway Interfaces
  • Hotel PMS Integration
  • Location-based Login Advertisements
  • Multi-factor Email Verification
  • Flexible On-Demand API
  • Unique Service Zone Access Restrictions
complete-user-management
Complete User Management
  • 802.1X or Browser-based Authentication
  • Simultaneous Authentiaction Databses
  • Flexible Role-based User Policies
  • Schedule-based Policy Assignment
  • User Bandwidth Control, Firewall, and Routing
  • MAC/IP Privilege Lists and Blacklists
  • Detailed User Browsing History
  • User Session Control & Limits
  • Traffic Isolation by SSID or Service Zone
  • User Event Logs & Traffic Statistics
wi-fi-performance-optimization
Wi-Fi Performance Optimization
  • Centralized AP Provisioning & Management
  • Configurable Connectivity Thresholds
  • Airtime Fairness & Band Steering
  • AP Grouping & Load Balancing
  • Rogue AP Detection
  • Seamless & Fast Roaming
  • Map-based AP Visualization
  • AP Status Monitoring & Notifications
  • Built-in Network Troubleshooting Utilities
  • High Availability & System Redundancy