Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Interlink Networking Upgrades WLAN Access Control Software

Interlink Networks has announced a new version of its LucidLink wireless local area network (WLAN) access control software for larger enterprises. LucidLink 2.0 can authenticate up to 250 users, compared to 50 in the previous version, and now supports mobile computers running both Windows XP and Windows 2000.

Targeted at small and mid-sized enterprises, LucidLink enables network administrators to grant access to mobile users the first time log into the network using the client application. Once authorized, the user's computer can access the network automatically until its privileges expire, or until the network administrator de-authorizes the user by simply clicking a button next to his name in the LucidLink server software. This eliminates the need for the user to enter encrypted network keys, while still preventing unauthorized network access.

Enterprises can grant temporary wireless access to authorized visitors with simple two-click enrollment and one-click removal procedures. LucidLink also features RADIUS authentication with 802.1X, WPA-enterprise and 802.11i standards-based security and automatic configurations for both wireless access point and network cards.

Version 2.0 has added client support for Windows 2000 systems. The server software supports Windows 2000, 2003 and XP servers and, according to Interlink, it does not event need to reside on a dedicated server, but can be installed on any desktop system in the network.

"LucidLink is the first product to make setting up and securing a wireless network as simple as managing your email," Interlink CEO Mike Klein said in a statement. "It eliminates the complexities that have discouraged many businesses from installing wireless networks, putting secure wireless computing within the reach of any organization regardless of its IT resources."