GuestGate MK II – Firmware 2.08

3.2 SESSION & TRAFFIC LOG UPDATES

a. Session Log Updates

Additional information is stored in the session log.

username / password

User agent (e.g., Mozilla/5.0 (Windows NT 6.1; WOW64; rv:6.0.2) Gecko/20100101 Firefox/6.0.2) The session log also contains the login and logout time, as well as the MAC address of the client. The MAC address provides the link to the traffic log.

b. Download and deletion of session and traffic log via HTTP command

With the new firmware you can remotely download and also delete the session and traffic log off GuestGate. In order to use the function, you first need to generate a key. This key is a randomly generated string, which looks something like this: “FAF9D99766676112FB547B6EAB15D3B0”. Why do we use this string instead of the administrator user name and password you may ask? The reason is security. As GuestGate currently does not support SSL encryption, all requests sent to the device ca n be potentially read by a third party. We therefore do not include the admin credentials in the HTTP links. In case something is rea ding the traffic, he’d only receive the key, which does not give access to GuestGate’s administrator interface.

You will end up with 4 links:

1.Session Log HTTP Download Link

2.Session Log HTTP Clear Link

3.Traffic Log HTTP Do wnload Link

4.Traffic Log HTTP Clear Link

The links will look like this:

http://111.222.333.444/cgi‐bin/config.cgi?auth_key=

FAF9D99766676112FB547B6EAB15D3B0&session_log=download

http://111.222.333.444/cgi‐bin/config.cgi?auth_key=

FAF9D99766676112FB547B6EAB15D3B0&traffic_log=clear

October 31st, 2011 www.intellinet‐network.com

Page 6
Image 6
Intellinet Network Solutions MK II manual Session & Traffic LOG Updates

MK II specifications

Intellinet Network Solutions MK II is an advanced networking device designed to address the demands of modern communication technologies. This next-generation solution builds upon the strengths of its predecessor, offering enhanced performance, scalability, and security features suitable for a variety of networking environments.

One of the hallmark features of the MK II is its support for high-speed data processing, facilitating rapid data transfer rates that are essential for businesses reliant on real-time communication and data sharing. With Gigabit Ethernet capabilities, the MK II can efficiently manage large volumes of traffic while maintaining optimal performance. This design ensures that organizations can easily scale their operations without encountering performance bottlenecks.

The MK II incorporates advanced routing protocols, such as OSPF and BGP, allowing for dynamic routing capabilities that adapt to network changes. This flexibility ensures improved network resilience and redundancy. In cases of link failure or network congestion, the device can reroute traffic seamlessly, thereby minimizing downtime and preserving user experience.

Security is another critical aspect of the Intellinet MK II. It integrates robust firewall features alongside intrusion detection and prevention systems. These security measures are crucial in safeguarding sensitive data against unauthorized access and cyber threats. The MK II also supports secure VPN connections, enabling remote employees to access the corporate network safely and efficiently.

In addition to these features, the MK II supports the latest wireless technologies, including Wi-Fi 6, which enhances connectivity and performance for mobile devices. This compatibility is particularly beneficial for organizations looking to implement smart offices and IoT solutions, as it provides a more reliable and faster wireless experience.

With an intuitive management interface, network administrators can efficiently monitor performance metrics, configure settings, and respond to issues in real-time. This accessibility streamlines operations and facilitates better decision-making regarding network management and optimization.

In summary, the Intellinet Network Solutions MK II stands out with its high-speed data processing, advanced routing protocols, robust security features, and support for modern wireless technologies. Its user-friendly management interface further enhances its appeal, making it a comprehensive solution for businesses seeking improved networking capabilities.