RingMaster : Enterprise Wi-Fi Management RingMaster is a richly-featured, innovative, easy-to-use, full-lifecycle enterprise WLAN management suite. RingMaster enables network managers to perform all critical functions necessary for planning, configuring, deploying, monitoring, and optimizing their business Wi-Fi networks. Planning RingMaster provides unparalleled RF planning capabilities. By performing a Virtual Site Survey, RingMaster automates coverage, capacity, and voice planning for indoor and outdoor areas. AutoCAD DXF and DWG, JPEG, and GIF floor plan files can be imported to create a useful RF plan. RingMaster factors in the RF characteristics of common building materials, including many types of doors, walls, ceilings, and other physical obstructions and uses that information to develop an accurate RF plan for the building. RingMaster provides an intuitive visual graphic display for signal strength, coverage holes, high interference, and high utilization areas. RingMaster automatically determines how many Trapeze Mobility Point Access Points or 3rd party Access Points need to be installed in any part of a building, taking into account RF obstacles and capacity requirements. RingMaster automates channel assignment and optimizes power levels. A detailed installation report can be generated that shows technicians exactly where to install the Access Points. Configuring RingMaster configuration wizards provide an easy and error-free means of setup for wireless services including WPA/WPA2 802.1X-based secure wireless access, voice services, mesh services, guest access services, 1
as well as customizable service profiles. The same intuitive wizards can be run for a single WLAN switch or can be used as a policy for creating common configurations for hundreds of switches. Advanced users can skip the wizard and configure any part of the Wi-Fi network directly. RingMaster provides the ability to make configuration changes live or off-line. This gives the network administrator the power to review, deploy, accept, reject, or even roll back configuration changes across the entire network. All configuration parameters and changes are tested and validated before deployment. RingMaster automatically detects inconsistencies and recommends industry best practices for wireless configuration and security enforcement. For each error notice, RingMaster provides a contextual, single-click resolution to allow easy resolution of the issue. Deploying After configuration is complete, RingMaster makes deployment easy. The administrator simply clicks on the Deploy button and all the WLAN controllers and Access Points are automatically configured simultaneously. RingMaster uses a transactional protocol which ensures the deployment is precisely orchestrated from one stable state of network operation to the next desired state. This avoids the problem of partial updates, where some devices are newly configured but not others. By eliminating this problem, the troubleshooting time and potential outages of partial updates are avoided. Monitoring & Reporting RingMaster simplifies the ongoing operation of even the most complex Wi-Fi networks. It features a single, centralized, intuitive, visually graphic monitoring dashboard which provides real-time information on network status, traffic patterns, Wi-Fi client connectivity, Access Point and WLAN controller status, and reports any alarms instantly. Monitoring is real time and provides a 30-day historical record. From the visual dashboard, the administrator can launch into specific views to obtain detailed information on any aspect of the Wi-Fi network, from details on a specific device s status, to detailed statistics on traffic patterns, to specific users location and bandwidth usage. 2
RingMaster runs periodic audits for serious conditions like missing or incorrectly-configured equipment and services. If a problem is found, RingMaster provides an automatic indication. RingMaster supports a full complement of alarms such as client authentication failures, spoofed MAC addresses, switch failures, denial of service (DoS) attacks detected, PoE failures detected, and many more. The user can define filtering criteria to quickly find alarms of interest. Alarms can be acknowledged or cleared. To resolve issues, wizards are presented in context allowing the user to quickly correct problems with little effort. Reports are generated according to pre-defined schedules. The resulting report output is stored on the RingMaster server, accessible via secure Internet connections or email. A wide range of predefined report types are provided, including inventory, client session summary, rogue summary, switch configuration, and equipment installation. Reports can also be run on customizable criteria. Enhancing Wireless Security RingMaster enhances the security of the Wi-Fi network by providing an extensive set of security-related alarms. Alarms include notification and location of rogue Access Points and their users, denial of service (DoS) attacks, probe attacks, and the presence of ad-hoc networks. Optionally, users can add advanced Wireless Intrusion Detection Systems/Wireless Intrusion Prevention Systems (WIDS/WIPS) with an AirDefense Server and sensors. RingMaster fully integrates with AirDefense and displays a full complement of AirDefense security alarms. Through RingMaster, the administrator can automatically convert Access Points into WIDS/WIPS sensors to assist in quickly locating and shutting down rogue Access Points and clients. Scaling RingMaster s architecture is designed for scalability. Organizations can deploy single or multi-site networks and manage them all from a single console. A single RingMaster server scales to support thousands of Access Points and tens of thousands of Wi-Fi client devices. The administrator can manage the network on-site or remotely. 3
Key Features PLANNING CONFIGURING MONITORING REPORTING Eliminates expensive and time-consuming RF wireless site surveys Requires no RF expertise Tests what-if scenarios without hardware Graphically displays RF coverage, throughput capacity, and voice planning Plans indoor and outdoor areas 3D planning for all floors of a building Extensive RF attenuation library for common building materials Configures sophisticated Wi-Fi networks with built-in intuitive wizards for common configuration tasks Wizards ease setup for secure WPA/WPA2-Enterprise 802.1X-based corporate wireless access, voice over Wi-Fi services, mesh networking services, and guest access Defines network policies for security and Quality of Service (QoS) by SSID, by access location, or by user groups Policy-based templates for applying common configurations to multiple WLAN switches Change management features to detect, review, undo, or accept network changes Transactional protocol to simultaneously apply configurations to all switches and Access Points Verification of configuration parameters to detect errors and suggest best practices Dashboard view provides real-time high level information on equipment status, alarms, wireless clients, and traffic Dashboard view provides the ability to click and drill down for details on all items, including switches, Access Points, individual clients, client traffic patterns Easy tree-based navigation Automatically generates reports for 1-hour, 24-hour, 7 day, and 30 day trends Reports include network utilization, client status, alarms, RF footprints, and IDS/security HTML formatted reports for easy email sharing, printing, and editing Scheduled reports with email notifications Centralized repository of reports on server for local and remote access 4
ALARMS IDS/IPS LOCATION TRACKING TECH SPECS Client association failures Client authentication failures Client authorization failures Client 802.1X failures Security (full complement of rogue and spoofing alarms) System (fan status, PoE, MX availability, power, channel tuning) Intrusion Detection System/Intrusion Prevention System Detects and locates rogue access points, clients of rogues, interfering devices, and security risky ad-hoc networks Detects and reports Denial of Service (DoS) and probe attacks Integrates with AirDefense servers for advanced security analysis and reporting Configures countermeasures and containment strategies Identifies physical location of valid clients, rogue Access Points, and clients associated to rogue Access Points Support for location of any generic Wi-Fi RFID tag Up to 10 meters location precision; 3 meters precision with optional Location Appliance Java-based client-server application with rich client UI Java Web Start provides zero-installation client Manage the network from client application, simple wizard tools OS Support o Windows Server 2000/2003 o Solaris o Red Hat/SUSE Linux o Mac OS X Integrates with Hewlett-Packard s OpenView Network Node Manager Americas 5753 W. Las Positas Blvd. Pleasanton, CA 94588 Phone 925.474.2200 Fax 925.251.0642 EMEA Olympia 3D-2 1213 NS Hilversum The Netherlands Phone +31 (0) 35.64.64.420 Fax +31 (0) 35.64.64.429 Asia-Pacific 275A, 2/F Sui On Centre, 8 Harbour Road Wanchai, Hong Kong Phone +852.2824.8961 Fax +852.2824.8381 Japan Ark Mori Bldg., West Wing 12F 12-32, Akasaka 1-chome Minato-ku, Tokyo 107-6024 Phone +81 (0) 3.4360.8400 Fax +81 (0) 3.4360.8447 Trapeze Networks, the Trapeze Networks logo, Smart Mobile, Mobility Exchange, MX, Mobility Point, MP, Mobility System Software, MSS, RingMaster, Mobility Domain, SentryScan, ActiveScan, Bonded Auth, FastRoaming, Granular Transmit Power Setting, GTPS, Layer 3 Path Preservation, Location Policy Rule, Mobility Profile, Passport Free Roaming, Time-of-Day Access, TAPA, Trapeze Access Point Access Protocol, Virtual Private Group, VPG, Virtual Service Set, Virtual Site Survey and WebAAA are trademarks of Trapeze Networks, Inc. Trapeze Networks SafetyNet is a service mark of Trapeze Networks, Inc. All other products and services are trademarks, registered trademarks, service marks or registered service marks of their respective owners. 2007 Trapeze Networks, Inc. All rights reserved. DS001-MP372-10/06 5