Google+
Internet bandwidth is a premium resource and as such organizations require a way of managing its usage. One of the approaches to effectively control this shared corporate resource would be to adopt bandwidth management techniques; from determining who has access to the network to the amount of bandwidth provisioned to a user or an application. Bandwidth management techniques can provide granular Control that would help to:
 
  • Optimize Bandwidth
  • Improve Network speed
  • Increase Productivity
  • Save Time
  • Reduce Cost
Based on clients unique requirements a choice has been made for a basic Network access/Bandwidth control system. To effect this, an Internet Authentication Gateway (with an optional User Manager for granular policies) would be required.

Internet Authentication Gateway from CLEON provides a convenient method of controlling access to public and private networks leveraging existing network technologies. Users simply "open and connect” using their favorite browser and a login page pops-up prompting for authentication credentials before logon to the network.

The Authentication Gateway essentially acts as the gatekeeper by determining who has access to the network apart from a myriad of features including but not limited to Bandwidth Management, Access Control, Proxy, etc. As a bandwidth manager the gateway apportions pre-determined bandwidth per user or per device. This ensures that one single user or device does not consume the entire bandwidth available to the corporate office.

The primary benefits of this solution stems from the seamless connectivity not requiring additional customer knowledge, software or special configuration. Clients are able to quickly and easily gain access to the network regardless of the type of device, operating system or connectivity media used as long as the right credentials are supplied.

The authentication gateway can also serve managerial functions of redirecting users to a particular page to acquaint the users with special information, notices or a sign-up process. This can also be a good avenue to remind users of certain organizational policy.

The Internet Authentication Gateway is uniquely suitable for a wide range of environments including offices, hotels, service providers, universities, Internet Hotspots and guest networks.  The IAG is industry compliant and supports various authentication billing and management databases particularly those based on the RADIUS protocol.

The following is a table of notable features of the authentication gateway when combined with the User Manager. The user manager is a licensed database of policies that can be applied to user profiles that allows granular control of user accounts in the database.

FEATURES

BENEFITS

Single server supports thousands of concurrent sessions

Optimize large scale deployments

Browser based password encryption

Provides increased logon password security in addition to SSL encryption

SSL Encryption

Industry standard for encryption and mutual authentication. Establishes identity, protects sensitive client information such as account passwords.

Configurable Web HTML interface

Customize the look and feel, link to sign-up server, account management and advertising sites

User status display

Allows users to view account statistics such as time and data used and remaining.

Integrated ADMIN interface

Easy to use 100% web based configuration and local account management simplifies system configuration tasks.

Active session list

See who's online including duration and real-time bandwidth usage. Enables disconnect of active sessions.

Setup a walled garden

Provides complimentary limited access to select services such as new customer signup, account management, company web sites or information related to a particular venue.

Themes

Offer customized login portals based on user location, language, browser and device type. Operate multiple specialized venues concurrently on single server instance.

Local account management

Configure local access accounts with expiration date, time & data limits and maximum upload/download data rates. Useful for smaller installations or special administrative access.

Anonymous Access

Provides guest access to the network with an optional set of limitations such as upload/download data rates and daily time and data usage restrictions. This is useful in situations where you may want to provide a certain level of free service such as one or two hours of service per day, offer advertising supported access or simply require users read and accept a terms of service agreement before gaining access to the network.

Client Data Mirroring

Captures all network data sent or received on per user basis to industry standard capture files. Useful for diagnostic or intercept purposes.

Transparent web proxy

Directs HTTP requests to local transparent proxy servers on a per user basis. Enables customer choice of acceleration and content filtering services.

Maximum prioritized UL/DL data rates per user

Prevents single users from monopolizing network resources. Enables tiered service offerings.

Bandwidth pooling

Restrict groups of users to common shared bandwidth allocations. Prevents single users from monopolizing network resources. Enables tiered service offerings.

Commercial session interruption

Periodically force users to view a series of commercial messages. Advertising supported access. Tiered service offerings.

Tickets/Vouchers

Revenue generation/Managed access

Traffic Quotas

Limits users/devices to amount of download/upload per day/week/month

 

SUMMARY

Internet Bandwidth is a premium resource and must be treated as such by putting control measures that prevents abuse, guarantees fair-share usage and prevents unauthorized access. Putting control measures also ensures that workers are focused on the more important tasks thus improving productivity.

ORDER INFORMATION

ITEM No

DESCRIPTION

 

IAG-NM-25

Internet Authentication Gateway

 

RUM-NM-UL

User Manager