InCharge RF Manager Server
April 01, 2006
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Good management; powerful protection.
- Weaknesses: Can take a while to populate list of allowed access points.
- Verdict: Protects your network against unsecured and rogue access points; well-designed management interface makes it much easier to configure.
This device is similar in operation to RFprotect, but it comes with a 1U rack-mountable server, which configures the remote sensors.
In practice, this makes it easier to configure. First, you need to use SSH to get at the console, configuring the DNS settings so the remote sensors can automatically find the server.
From here you need to connect the 802.11a/b/g sensors to your network, making sure you have enough coverage for your entire company, so you will need a few sensors per floor. Management is performed through a Java-based console using IE 5.5 or higher.
The first time you connect to the console a quick-start wizard takes you through configuration.
The wizard includes being able to define the kinds of wireless access you want, including specifying allowed SSIDs and even access point manufacturers.
Next, you can import the list of authorised and non-authorised access points and clients. If you don’t have a list, you can do this later manually, but it will take a while to get the system running.
The first task you have after completing the wizard is to load your company’s floor plans and place your sensors on these maps. This location-based information is used to help you locate the exact location of a wireless intrusion or rogue access point.
Now you just need to configure your security policy. Most events are catered for and you’ll find that you look for pretty much any network activity.
RF Manager is easy to use, and its neat graphical interface works really well. For each alert you configure you have a choice of responses, including sending an email alert and turning on the vulnerability prevention. This uses the remote sensors to block transmissions to unauthorised devices.
There are three global settings, including Block, which blocks any communications on a single channel, and Interrupt, which causes errors in the communication on any two channels. But the settings are global and you can’t configure them by wireless network.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry