Control your Employee and Guest Wireless Networks.
WirelessTrakker is a solution to make deploying and managing a wireless network (WLAN) easy and simple, while maintaining high security and control over what happens on your network. Similar to products from BlueSocket, Meraki, and Cisco; it is designed to be fast and easy to get any management tasks done, and to tie into your existing network with only some minor changes in most cases.
Equipment Buy Back
We recognize that many organizations have wireless equipment in place, and it may be difficult to finance the purchasing of all new access points or controllers. To help ease the financial burden of purchasing WirelessTrakker Access Points and replacing any wireless controllers you have, we may be able to buy your existing equipment from you to offset the cost of your WirelessTrakker purchase. Depending on your equipment, your WirelessTrakker purchase may even be free for the first year! Contact us for more details about this program.
Try it now!
We offer a free 30-day on-site demo of our WirelessTrakker Controller appliance. You will have to purchase at least one wireless access point. If you would like to test WirelessTrakker at your business please complete this form.
Businesses' wireless networks are being asked to do more and more every day. For example many businesses are issuing employees iPads that need filtered and secure access to the Internet. Guest presenters are also becoming more common, and these presenters often need full access to the Internet, but you want to keep them off your LAN. WirelessTrakker was designed to solve these problems by providing the ability to separate different groups of wireless users with different levels of access, all from one central management interface. A WirelessTrakker solution consists of a WirelessTrakker Controller, and one or many WirelessTrakker Access Points. The WirelessTrakker Controller is a 1U appliance that you install in your server room or wiring closet. The WirelessTrakker Controller acts as a router/gateway between your wired network and your wireless network. It is a low power device that has minimal moving parts, designed to be an integral part of your network and to have very high uptimes.
The WirelessTrakker Access Points are installed throughout your building, wherever you need access to the wireless network. In typical business construction, if you place an access point in a hallway with offices on both sides, it should cover 4-6 large office spaces with good signal quality. The access points support 802.11b, 802.11g, and 802.11n. They can be mounted directly on drop ceiling tiles, or mounted to a wall.
The WirelessTrakker Access Points are powered using Power Over Ethernet injectors, that are typically placed in your wiring closet. You simply connect your switch to the power injector’s “LAN” port, then the WirelessTrakker Access Point (directly or via a patch panel) to the “POE” port. The power cord for the POE injector plugs into a standard power outlet on a surge protector or UPS strip. This means that wherever you need to put an access point, you only need a CAT5 jack. No electric outlets are needed at the access point’s location.
WirelessTrakker allows you to create multiple wireless networks, each with different levels of access. For example, you can create a “guest” WLAN that allows only filtered access to the Internet, a “presenter” WLAN that allows full access to the Internet but no access to the LAN, a “staff” WLAN that allows access to everything on your wired network, and a “student” WLAN that allows access to select network devices.
WirelessTrakker supports 802.11 encryption standards, like WEP, WPA, and WPA2. All three of these methods support the typical “pre shared key”, or PSK, security. WirelessTrakker also supports Enterprise level authentication for WPA and WPA2. Instead of requiring your users to put in a key that is common to everyone (and easily stolen from post-it notes and word of mouth), users are prompted for a name and password before they are even given an IP address on the network. That name and password can then be validated against a database on the WirelessTrakker appliance, Active Directory, LDAP, or a ISBossBox user database.
Additionally, each WLAN can have a different encryption type to make it easier for some users to access it. For example, the “guest” WLAN would probably be best suited to have no authentication so that guest users can just get on and get what they need to do done, while the “staff” WLAN requires a name and password to validate that they are a member of the organization.
For unencrypted WLANs and for WLANs with PSK encryption, you can also turn on a captive portal. The captive portal requires that the user identify themselves somehow (either by their full name, or a username and password ) and optionally agree to a Terms of Service agreement (customizable by you) before they are granted access to the network.
One of the goals of WirelessTrakker is to make it simple and fast to deploy and maintain a robust wireless network. All of the configuration for the entire wireless network is done in the WirelessTrakker web interface. If you are familiar with ISBossBox, using WirelessTrakker will be second nature since it’s based on the same interface design. The WirelessTrakker Access Points get their configuration from the WirelessTrakker Controller, so you do not have to configure each access point individually. If you add a new WirelessTrakker Access Point to your network, the controller will push the configuration down to the access point and it will “just work”.
WirelessTrakker logs and reports everyone that connects to the WLAN, adding accounting and credibility to your WLAN. For example, if user “Fred” logs in to the WLAN, WirelessTrakker can tell you that “Fred” logged in, got IP address x.x.x.x, and connected to the access point “y”. Using that data you can even see where (approximately) the user was when they connected.
Integration With ISBossBox
WirelessTrakker works great as a standalone product to manage and control your wireless network. But when paired with ISBossBox, it’s capabilities increase even more! The ISBossBox add-on to support filtering of Apple iPads & iPods, and Google Android devices determines how to filter the user based on the device’s IP address. When WirelessTrakker (with an authenticated WLAN) is added to the mix, you add authentication to the system so that ISBossBox knows exactly who is using the device so it can filter and log them accordingly.
WirelessTrakker is fairly easy to install and get going. The only requirement your network needs to have is that the switches in between the WirelessTrakker Controller and the WirelessTrakker Access Points need to support VLANs and VLAN tagging (known as 802.1Q). Most managed switches support this. You will need to configure the ports that the WirelessTrakker Access Points and the WirelessTrakker controller connect to with VLAN tagging support and place the ports in the correct VLANs. We can help you with this process, and have instructions for how to do this for many different vendors of switches.
If you want to authenticate your wireless users with Active Directory, then you need to have a Microsoft Windows Domain Controller running Windows 2000 or newer.
Service & Warranties
The WirelessTrakker controller is fully warrantied and supported by ISBoss for as long as you subscribe to the service. This includes email and telephone support, as well as software updates for the controller and access points. Once your subscription is up, you return the controller to us. The access points are outright purchases, and warrantied from ISBoss for 30 days against DOA (dead on arrival). The APs carry a one year warranty from the manufacturer, and details on the return process are included in the documentation for the access points.