X

Ultra Electronics 3eTi

WiFiProtect Manager

Wireless device management software

Managing a network can be a labor-intensive experience of provisioning new equipment, updating and backing up configurations, changing credentials, and monitoring health and status. WiFiProtect Manager simplifies this process by providing a single window through which to perform all of these actions, and more, in an intuitive and secure manner. From this single window, WiFiProtect Manager helps reduce installation, operation and maintenance costs by consolidating the numerous tasks which naturally result from simultaneously managing multiple non-integrated networks. Access to WiFiProtect Manager’s capabilities is via any compatible web-browser which means deployment across a network is easy with no additional software installation required.

Deployment

WiFiProtect Manager can be deployed either as a Virtual Machine or as an Appliance in a 19” rack form-factor, with the same functionality in both deployments.

Device Monitoring

The WiFiProtect Manager can automatically discover newly installed 3eTI devices and incorporate them into a comprehensive topology map so its view is always up to date. In addition, users have several options on how to display topology views, such as by device type, wireless network, or VLAN. The device view can be arranged in hierarchical, circular, random or orthogonal topology, so users can see the impact of each device and fine-tune its placement in the network for varying effect. An overview window provides a summary of deployment, while a zooming view allows for a detailed view of any part of the network. The links between devices are colored to represent different signal levels and individual device settings are easily accessible from the Web interface.

Key Distribution

The WiFiProtect Manager is capable of generating and distributing both encryption keys and security credentials (e.g. digital certificates) to selected devices, be they wired or wireless. Through the job-scheduling feature key generation & distribution can be scheduled to routinely occur per the user’s request. Keys can be generated either internally in software, externally by a high-entropy hardware security module, or imported from an outside PKI.

Device Control

WiFiProtect helps perform individual and group management tasks across a wide range of devices, such as re-booting, resetting, or radio silence. Radio frequency (RF) transmissions from wireless devices must be eliminated during certain scenarios, such as during weapons testing or fueling. The WiFiProtect Manager Appliance can control when power is transmitted from wireless devices, allowing RF transmissions to be turned off when required.

Configuration Wizards

WiFiProtect provides a number of configuration wizards to support the easy creation of device specific configuration files either individually or in batches, for provisioning of large numbers of new devices. WiFiProtect also provides wizards to more easily configure security features such as firewalls and deep-packet-inspection, ensuring security is maintained and free from configuration-errors. Finally through WiFiProtect these configuration files can be distributed to the correct devices with a click of a button.

Firmware Management

Multiple versions of device firmware can be stored in the appliance, simplifying storage and minimizing upgrade maintenance. A firmware repository screen in the Web interface provides an easy view of firmware versions that are loaded into different devices so users have a clear view of the network software history as well as upgrades.

Job Scheduling

The job management screen allows for easy job scheduling and traditional planned network maintenance activities. Certain scheduled tasks such as encryption key management, VLAN security, bridge security, TX on/off and firmware upgrades can be planned in advance to relieve the burden of last minute IT management tasks.

Multi-level User Credentials

Different levels of user credentials can be set to allow partial access to the tool, giving the Network Administrator the ability to provide varying degrees of access to different levels of users. This streamlines related Administrative tasks, allowing the Network Administrator to make wholesale updates or modifications per user group.