
Open solutions to secure and manage WLANs
from the branch office to the enterprise.
Bluesocket BlueSecure Controller Family
Intrusion Detection, Worm Protection and
Clientless Scanning for Trusted Endpoint Security
Unlike signature-based tools or OS-specific
scanners, the Bluesocket BlueSecure Controller
has implemented real-time monitoring of Wi-Fi
®
users’ data to detect malicious traffic based on
the users’ actual behavior without requiring any
client-side software. This enables administrators
to automatically block network access to hackers
or worm infected users even for “zero-day” attacks
well before traditional signature-based tools have
updates available. The BlueSecure Controller
fully integrates clientless scanning, to provide a
maintenance-free way to protect wireless devices
of viruses, worms, Trojan horses, spyware/malware
and other threats and anomalies before they are
allowed to log-on and gain access to the WLAN.
Taking advantage of automated Web-based
scanning, Bluesocket is unique in providing trusted
endpoint security, ensuring the user’s device is free
from viruses and worms, and has
the required security and OS patches.
Security and QoS for VoIP
802.11 is a shared bandwidth technology, so
network contention becomes an issue as the
number of users and network traffic increases.
Bluesocket overcomes this problem by providing
administrators fine-grained bandwidth and WLAN
prioritization QoS controls to ensure low latency
performance for voice and video. Bluesocket’s
unique stateful packet inspection allows adminis-
trators to identify and secure dynamic, real-time
voice protocols such as SIP, H.323 and SCCP and
provides a complete platform for converged voice,
video and data over a single WLAN infrastructure.
BlueSecure Controller Family
Platform Specifications
BlueSecure 600 BlueSecure 1200 BlueSecure 2200 BlueSecure 3200 BlueSecure 5200
Number of
APs Supported
8 25 50 100 150
Typical Deployment
Small Offices/
Retail Stores
Branch Office Regional Office
Regional Office/
Medium Enterprise
Medium/Large
Enterprise/Campus
Network Interfaces
Data Interfaces
Four GbE Managed
One GbE Protected
Four GbE Managed
One GbE Protected
Four GbE Data Ports
Optional Fiber
Four GbE Data Ports
Optional Fiber
Four GbE Data Ports
Optional Fiber
Other One 10/100 Failover One 10/100 Failover
One GbE Failover
One GbE Admin
One GbE Failover
One GbE Admin
One GbE Failover
One GbE Admin
Dimensions
Rack Units
Width
Height
Depth
1U
15” (380 mm)
1.75” (44.5 mm)
11.5” (290 mm)
1U
15” (380 mm)
1.75” (44.5 mm)
11.5” (290 mm)
2U
17.5” (445 mm)
3.5” (88 mm)
17.5” (445 mm)
2U
17.5” (445 mm)
3.5” (88 mm)
17.5” (445 mm)
2U
17.5” (445 mm)
3.5” (88 mm)
17.5” (445 mm)
* Although user licensing is based on concurrent authenticated users, it is recommended you consider and plan for unregistered users (users connected
to the system but not yet authenticated), in your user count, when sizing the appropriate controller for your organization as unregistered users
consume system resources. For best performance, have a mixture of authentication types. For example: 802.1X authentication, MAC authentication,
and web based authentication. Having all web based authentication may have an unfavorable effect on the BSC’s web server performance.
Comentarios a estos manuales