All WILIGEAR devices are powered by WILI (WILI stands for Wireless Linux) - portable embedded Linux based software platform. WILI-S is suited to implement highly functional, secure and manageable wired and wireless IP networking devices: HotSpot access points, access controllers, enterprise access points, fixed 802.11abg wireless network elements, base stations and customer premise equipment (CPE) and high performance, secure point to point or point to multi point wireless bridges.
Authentication, Authorization & Accounting
The WILI-S supports multiple secure authentication methods ranging from standard web browser login (Universal Access Method), 802.1x/EAP authentication with passwords, certificates or SIM cards. The integrated real-time accounting system is based on industry standard RADIUS/EAP and supports various billing plans: prepaid, pay-per-time, per-volume, per-use or flat rate. Integration into existing Operation Support Systems (OSS) and Business Support Systems (BSS) can be done with ease.
The WILI-S based device is placed at the edge of a broadband access network and allows operators to provide cost effective public Wi-Fi services by managing per user access control, device configuration, and radio performance centrally from the operations center. HTTPS, SSH, SNMP and RCMS (Remote Configuration Management System) agent can be used for secure remote management.
At the heart of the WILI-S management subsystem is a simple text based configuration file and RCMS agent which in pair with RCMS server creates a structure for fast wireless network deployment and robust administration. It has built in automatic provisioning, automatic configuration file and firmware image upload capabilities. The RCMS agent can traverse most firewall and NAT protected routers without additional configuration. The WILI-S also has all traditional management interfaces such as WEB, command line, SNMP and syslog for troubleshooting.
The WILI-S supports different levels of security and data encryption: WEP/WPA/WPA2, dynamic key, 802.1x authenticator and supplicant. Device security settings can be configured per virtual AP (MBSSID) basis. Client stations can be separated on the data link layer (Layer 2 User Isolation), preventing intruders from accessing the computers of the other users. User credentials (passwords) are protected by SSL or EAP-based authentication methods. User traffic can be encrypted either by VPNs (pass-through) or by Wi-Fi Protected Access (WPA).