GAMA Application Overview - GAMA is a software tool that gives the IT manager full control over client access to their Wi-Fi networks.

Wireless Technology Guest Access Manager Advance - GAMA
3Com Technical Marketing Engineering Page 6
Setting up Access Control Rules
To set up an ACR, the IT manager would first name the rule, then construct match filters
based on any combination of SSID, User Name pattern (e.g. domain\username),
physical location, and other criteria. Next, IT determines the actions to take against the
matched sessions, such as changing the authorization attributes or disconnecting the
user. Next, they decide what event should trigger the in-session update, such as client
roam, location change or RADIUS accounting update. Finally, IT decides when and how
the ACRs should be invoked, whether they should happen automatically upon meeting
the conditions, or scheduled to run at set times.
Location Integration
GAMA integrates seamlessly with the Newbury Location Appliance to provide access
control and dynamic authorization based on a user’s physical location. The Newbury
Location Appliance provides real time location positioning for any Wi-Fi device accurate
to within 3 meters. GAMA adds location information to the user’s RADIUS accounting
data enabling the network manager to invoke policies based on physical location such
as accept/deny, change bandwidth, or change allowed resources.
Open APIs to Integrate with Other Systems
GAMA ships with published, open, standards-based, Web-based open Application
Programming Interfaces (APIs) to make it easy to integrate its functionality with other
systems. Likely 3rd party applications for such integration include credit card billing
systems, facility management systems, hospitality registration systems, IPS/IDS
systems and custom reporting systems.
Conventional Access
Access Control with
A
ccess
End Point
Authenticatio
Are you who you
claim to be?
Mac Address, User
ID, Password Keys
Can your device be
trusted?
Virus Definitions,
Firewall, Encryption
Are you
who you
claim to
be?
Can your
device be
trusted?
What access do you
deserve?
Time of day, Location,
Bandwidth, Apps
Authenticatio
End Point