Mission Control WiFi Security

Wireless technology is popular and common, especially for organizations with a mobile workforce. However, the risks to users of wireless technology are continuously on the increase. The WiFi Security service prevents unauthorized access to wireless networks and deploys corporate security policies that protect business-critical resources. The Captive Portal option is intended for guest access or for occasional access by internal employees, whereas the EAP Authentication option is ideal for connecting company clients securely and protecting a private network.


Captive Portal

The Captive Portal is specifically designed for individuals that are not part of the internal network and require access to internet resources, for example guests or internal employees that need internet access in a public area of the organization.

 

Login page for the Captive Portal.
Login page for the Captive Portal.

EAP Authentication

The EAP Authentication option offers IEEE 802.1X-based authentication by implementing the EAP-TLS or EAP-TTLS authentication protocols on the RADIUS server. Users benefit from convenient, quick and easy access, together with secure connections and strong authentication, and no longer need to keep re-entering their credentials. For the wireless access point, the communication is encrypted (WPA2-Enterprise).

 

When connecting to a wireless access point or an 802.1x enabled switch, the mobile device is requested to authenticate with the extensible authentication protocol (EAP) against the Identity Server (RADIUS server). For this to work, the mobile client and the access point or switch are first configured to use a specific EAP, i.e. EAP-TLS or EAP-TTLS. (2) Upon successful authentication, the mobile device is allowed to access (3) the target network.
When connecting to a wireless access point or an 802.1x enabled switch, the mobile device is requested to authenticate with the extensible authentication protocol (EAP) against the Identity Server (RADIUS server). For this to work, the mobile client and the access point or switch are first configured to use a specific EAP, i.e. EAP-TLS or EAP-TTLS. (2) Upon successful authentication, the mobile device is allowed to access (3) the target network.
Go to top