Learn actionable best-practices and tips to prepare your 802.11n wireless network for tablets, smartphones and other mobile devices. Step-by-step guide that you can implement today. Learn more: http://cisco.com/go/wireless
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Support iPads, Tablets and Smartphones on your Wi-Fi: Best Practices
1. March 22, 2011 iPad. Galaxy. Cius. Best Practices to Support the influx of Mobile Devices
2. Agenda 2 1 User Transition to Mobile Tablets and Devices Best practices and tips for enabling reliable and secure mobile device access Best practices and tips for enabling reliable and secure mobile device access
3.
4. Work is a function —Globally dispersed, mixed device ownership
7. Work is a place you go to—limited off campus access
8. IT visibility and control into user devices and applicationsExecutive Employee IT
9. The Transformation Of The Desktop Driven by Demand for Mobility Traditional Revolutionize Modernized Centralized provisioning, management and security for users and applications Apps Apps Virtual Apps Virtual Apps Virtual Apps Virtual Apps WinXP WinXP Thick Client HVD HVD HVD ZeroClient Thin Client Mobile Client Virtualized Platforms
10. Key Market FindingsMobility Is Here to Stay 32% 50% Employees globally rely on more than one mobile data device during their typical workday Global enterprises consider WLAN as mission critical to operations
11. Key Market FindingsThe Challenge Is to Ensure Network Performance and Security 32% 74% 40% 57% Employees use unmanaged devices on their corporate network IT staff—security the biggest challenge
12. Embrace Mobility. Address Security.Some Questions to Consider Do I have the WLAN capacity to support increase in mobile devices? How do I ensure business critical WLAN reliability? How do I enforce security policies on non compliant devices? How do I grant different levels of access to protect my network? How do I ensure data loss prevention on devices where I don’t have visibility? How should I address the cool kids (tech-savvy) who trade-up to new devices? New Policy? How do I protect my Intellectual Property/personal information?
13. Best practices and tips:Providing a reliable and high performance wireless network
14. Follow these steps: Start Migration to 802.11n to Enhance Network Performance 1 2 3 4 5 6 Design your Cisco 802.11n Network to Optimize Rich Media on Mobile Devices Properly Configure for High Density Wireless Deployments Improve Reliability and Coverage with Cisco ClientLink Detect and Mitigate RF Interference with Cisco CleanAir Improve Video Applications with VideoStream Implement Cisco Radio Resource Management
21. This is the aggregate bandwidth you will require in your space
22.
23.
24. Step 3: Optimize the Installation Configure 2.4 GHz for 20MHz and three non-overlapping channels/cells Provides greater flexibility for access point placement for optimal coverage and capacity Disable lower data rates in 2.4GHz Encourage clients to use 5-GHz by enabling Cisco BandSelect BandSelect directs clients to 5 GHz optimizing RF usage Better usage of the higher capacity 5GHz band Frees up 2.4 GHz for single band clients Consider using DFS Channels—Supported by Cisco Cius , Apple iPad, Intel 5100/5300/6200/6300 radios Dual-Band Client Radio 2.4/5GHz Discovery Probes Looking for AP Discovery Response 2.4 5 802.11n
25.
26.
27.
28. Best practices and tips:Implementing mobile device policies and secure network access
29. Embrace Mobility. Address Security.Some Questions to Consider How do I keep this flood of new devices off my network? How do I grant different levels of access to protect my network? How do I deal with people who trade-up to new devices? How do I ensure data loss prevention and malware protection? How do I enforce security policies on non compliant devices? How does remote access differ from local LAN access? Do I have the WLAN capacity to support increase in mobile devices? How do I ensure business critical WLAN reliability? How do I enforce security policies on non compliant devices? How do I grant different levels of access to protect my network? How do I ensure data loss prevention on devices where I don’t have visibility? How should I address the cool kids (tech-savvy) who trade-up to new devices? New Policy? How do I protect my Intellectual Property/personal information? How do I keep this flood of new devices off my network? How do I grant different levels of access to protect my network? How do I deal with people who trade-up to new devices? How do I ensure data loss prevention and malware protection? How do I enforce security policies on non compliant devices? How does remote access differ from local LAN access? How do I keep this flood of new devices off my network? How do I grant different levels of access to protect my network? How do I enforce security policies on non compliant devices? How do I deal with people who trade-up to new devices? How do I ensure data loss prevention and malware protection? How do I enforce security policies on non compliant devices? How does remote access differ from local LAN access?
30. Flood of New Devices Which are corporate devices? What corporate data is on these devices? Security? Friend or Foe? Managed vs. UnManaged
31. Job Role Supply Partner Unmanaged desktop; complex support issues Requires limited access to corporate resources Employee Managed desktop; potentially unmanaged personal devices Full access for managed devices Contractor, Temp Access requirementsvary greatly. Unmanaged or managed devices; access needs to be limited Teleworker Managed desktop; unmanaged personal devices Requires consistent LAN-like performance
32. Local LAN Access Policy Partial Corporate LAN Access Full Corporate LAN Access Managed / UnManaged Asset Guestnet / Deny Role Managed Employee UnManaged Managed Contractor UnManaged Vendor / Guest UnManaged
33. Local LAN Access Policy Partial Corporate LAN Access Full Corporate LAN Access Managed / UnManaged Asset Guestnet / Deny Role Managed Employee UnManaged Managed Contractor UnManaged Vendor / Guest UnManaged
34. Machine Access Restriction Solution Full Access or Deny Authentication User authentication must be proceeded by machine authentication Calling station ID database ACS 4.0 or greater Requires user and machine credentials Typically used with username/password Enterprise LAN
35. Active Directory/User Certificate Solution Authentication Maintain the existing username/password infrastructure for partial LAN access Deploy user certificates to all managed devices for local LAN or remote access authentication Certificates must be locked to the device Certificate Revocation List Web Enrollment Simple Certificate Enrollment Protocol (SCEP) Web Search: “Windows server certificate services”
36. Network Access Control Solution Profiling, Fingerprinting Watermarking Clientless Profiling using MAC OUI, DHCP, HTTP, DNS Customizable profiles Regular profile updates The RIGHT Person On the RIGHT Device In The RIGHT Way
37. Embrace Mobility. Address Security.Some Questions to Consider How do I keep this flood of new devices off my network? How do I grant different levels of access to protect my network? How do I deal with people who trade-up to new devices? How do I ensure data loss prevention and malware protection? How do I enforce security policies on non compliant devices? How does remote access differ from local LAN access?
38. Global Threat Telemetry Global Threat Telemetry Cisco Security Intelligence Operation Cisco SensorBase Threat Operations Center Advanced Algorithms 8:10 GMT All Cisco Customers Protected Ad Agency HG in London Bank Branch in Chicago ISP Datacenter in Moscow 8:00 GMT Detects New Malware 8:03 GMT Sensor Detects Hacker Probing 8:07 GMT Sensor Detects New Botnet Higher Threat Coverage, Greater Accuracy, Proactive Protection
39. Threat Intelligence: SIO Network Security Access Control Secure Mobility Content Security Cisco Security Solutions Portfolio ASA, ASA for Catalyst, VSG, ASA with IPS, IPS 4200, ISR IOS security, ASR, CSM Access Control Server, TrustSec, NAC ASA SSL VPN, ASA IPSEC VPN, Adaptive Wireless IPS, Cisco Virtual Office, AnyConnect IronPort Email Security Appliance, IronPort Web Security Appliance, ScanSafe Web Security Secure Cloud and Virtualization
43. How do I keep this flood of new devices off my network? How do I grant different levels of access to protect my network? How do I deal with people who trade-up to new devices? How do I ensure data loss prevention and malware protection? How do I enforce security policies on non compliant devices? How does remote access differ from local LAN access? Embrace Mobility. Address Security.Some Questions to Consider
44. Cisco SecureX: The Ultimate Security SolutionAnnounced at RSA Keep Bad Stuff Out Protect Good Stuff Enable Productivity and Innovation Keep Critical Services Running Be Inbounds/ Compliant Requires an Architectural Approach
45. Borderless Network ArchitectureEnabling Mobility—Securely, Seamlessly and Reliably Architecture for Agile Delivery of the Borderless Experience BORDERLESS END-POINT/USER SERVICES Securely, Reliably, Seamlessly:AnyConnect POLICY App Performance: App Velocity Energy Management: EnergyWise Multimedia Optimization: Medianet Mobility:Motion Security:TrustSec BORDERLESS NETWORK SERVICES MANAGEMENT BORDERLESS NETWORK SYSTEMS APIs Core Fabric Extended Cloud ExtendedEdge Unified Access Application Networking/ Optimization BORDERLESSINFRASTRUCTURE Switching Security Routing Wireless SMART PROFESSIONAL AND TECHNICAL SERVICES: Realize the Value of Borderless Networks Faster
46. Cisco’s Borderless Networks Solutions Prepare Your Enterprise Network for Mobile Devices Implement a high capacity, high performance WLAN. Enable context-aware security for end-points and the network Meet User Demand for Mobility
47. Key Resources White Paper: Optimize the Cisco Unified Wireless Network to Support Wi-Fi Enabled Phones and Tablets http://wifi-cs.co/ijRBqz White Paper: The Future of Network Security: Cisco SecureXArchitecture http://wifi-cs.co/jVazao