Complete User Management

User Authentication

Secure User Authentication

Enterprises and organizations need to have complete visibility of all Wi-Fi users on their network in order to prevent, identify, and fend off potential intruders. 4ipnet’s WLAN solution supports both 802.1X and browser-based authentication, ensuring the proper identification of network users before granting access to the network. Existing external authentication databases such as LDAP, POP3, NT Domain, and RADIUS can be easily enabled by network administrators and uniformly enforced across all deployment sites. Additionally, captive portals are fully customizable for web-based authentication of visitors or guests, utilizing authentication options such as social media, e-mail, or SMS.

Learn More

Role-based User Policies

In many deployment scenarios it is often desirable for a single Wi-Fi network to have the capability of offering differentiated service levels. 4ipnet’s solution provides network administrators with the ability to pre-define multiple user roles, and assign unique access policies that take effect at different times and locations in the wireless network. The integrated access control functionality includes:

  • Bandwidth Control
  • Traffic Classification & QoS
  • Firewall Profiles
  • Routing Policies
  • Concurrent Sessions Limitation
  • User Idle Timeout
Learn More
Role-based User Policies
Detailed User Logs & Reports

Detailed User Logs & Reports

With increasing security regulations in both public and enterprise Wi-Fi deployments, WLAN solutions need to be able to effectively track all network activity. 4ipnet offers a complete set of logs & reports from its monitoring interface, including user browsing histories, NAT conversion logs, and all authentication related events. Furthermore, the guest Wi-Fi platform allows administrators to aggregate unique user information such as social media profiles, cellular numbers, or e-mail addresses for detailed analytics or troubleshooting.

Want to Learn More?

User Authentication Feature Guide

Role-based User Policies Feature Guide

Contact Us