Specifications
The BlueSecure WLAN Solution End-user Experience
BlueSecure™ Controller Setup and Administration Guide 1-5
VoIP Protocols/VoWLAN Support
You can configure the BSC to support Voice-over-WLAN (VoWLAN) phones by enabling 
VoIP protocols such as H.323, Session Initiation Protocol (SIP), and Cisco Signaling 
Connection Control Part (SCCP) for stateful inspection by the BSC. Additionally, you can 
configure vendor-specific IP phones (Polycom, Cisco, Skype, and Vocera), and system-
level QoS for voice traffic.
Secure Mobility
® 
MatriX
Where multiple BlueSecure Controllers are deployed across multiple WLANs, Bluesocket 
provides centralized management and control through its Secure Mobility MatriX 
architecture, as illustrated in the following figure.
The BlueSecure Controllers comprising the MatriX communicate with each other in real 
time enabling seamless secure roaming, policy enforcement, configuration replication, 
load sharing, and high availability.
The BlueSecure WLAN Solution End-user Experience
As with the introduction of any new technology to your network, it is important to 
understand how the end-user population uses and experiences the technology. The end-
user experience of the BlueSecure Controller WLAN solution largely depends on the 
authentication method(s) you enable, seamless secure roaming across multiple WLAN 
and the reliable, low latency RF environment supported by the BlueSecure Access Points. 
The BlueSecure Controller can support multiple authentication methods simultaneously.
Transparent Authentication
With some authentication methods the BlueSecure Controller is transparent to the user. 
These methods include transparent NTLM, transparent 802.1x, and MAC-based 
authentication.
A transparent domain authentication means that the wireless user authentication process 
is no different than that on a wired user. The BlueSecure Controller is intelligent and 
identifies users who are trying to log into the domain and dynamically communicates with 
the domain controllers defined in the Bluesocket BSC configuration.
If successful, the user is not only logged into the domain but is also placed into a role in 
the BlueSecure Controller based on which domain controller the user authenticated 
against, or some user attribute returned by Active Directory.
Figure 1-2: The Bluesocket Secure Mobility MatriX Architecture










