SlideShare uma empresa Scribd logo
1 de 13
Bring Your Own Design
SIMPLIFYING BYOD WITH RUCKUS




                     RUCKUS WIRELESS PROPRIETARY AND CONFIDENTIAL
The Realities of BYOD




2 | Meeting Name
What Enterprises REALLY Want

                   1   Simple onboarding

                   2   Automated enforcement of user policies

                   3   Visibility of who and what is on the WLAN

                   4   Extension of wired security to WLAN

                   5   More capacity to deal with flood of devices

                   6   Leverage existing infrastructure


3 | Meeting Name
Don’t Reinvent the Wheel




            FIREWALLS   CONTENT      AAA     ACLs / VLANS
                         FILTERS   SERVERS




4 | Meeting Name
Now What?
SIMPLIFYING BYOD WITH RUCKUS




                  RUCKUS WIRELESS PROPRIETARY AND CONFIDENTIAL
Defining the SSID Structure

        ▪ DOMAIN SSID
            ▪ School owned / managed devices with access to all resources:
              printers, applications, files shares

        ▪ Guest Visitor SSID
            ▪ Users who are not in the OUI with access only to the internet
        ▪ Staff and Student BYOD SSID
            ▪ Non-school owned / managed devices needing Internet access and
              specified school resources, VLAN and content filtering applied
        ▪ Provisioning SSID
            ▪ Hotspot with a walled garden attribute, redirecting all users to
              an activation page



6 | Meeting Name
Automating Role-Based Access

                   DOMAIN   Administrator automatically placed on VLAN W, no rate limits



                   GUEST
                            Allowed on via a Guest Pass, accepting terms and conditions
                            automatically placed on VLAN Z, rate limited at 1 Mbps


                    STAFF   Staff automatically placed on VLAN X, rate limited at 5 Mbps



              STUDENT       Student automatically placed on VLAN Y, rate limited at 1 Mbps



            STRANGER        User does NOT have account and is denied




7 | Meeting Name
How to BYOD with Ruckus

         1         Unknown device associates with provisioning SSID

         2         User challenged to authenticate

         3         ZD queries LDAP (AAA domain)

         4         User placed into requisite role based on security
                   group membership, VLAN dynamically assigned

         5         Unique dynamic PSK automatically
                   generated, bound with device and pushed to client

         6         Policies applied per role and VLAN membership


8 | Meeting Name
What it Looks Like                                                            WHAT HAPPENS WHEN?

                          User           Student          Staff            Guest
                        Database        Resources       Resources        Resources   1. Users connect to a
                                                                                        provisioning SSID and are
                                                                                        re-directed to an
                                                                         Internet       onboarding portal.

                                                                                     2. Users enter domain
                                                                                        credentials which are
                                                                                        verified against a user
                                                                                        database.

                                                                                     3. The user’s role assignment
                                                                                        and permissions are
                                                                                        automatically determined
                                                                                        based on authentcaion.

                                                                                     4. Using Zero-IT, the device is
                                                                      Guest SSID        auto-provisioned with a
                        Onboarding
                          SSID
                                         Student SSID    Staff SSID    (hotspot)        dynamic pre-shared key
                                                                                        and dynamically assigned
                                                                                        to the requisite WLAN.
                                                                                     5. Devices re-connect on a
                                                                                        secure WLAN, receiving
                                                                                        network permissions
              Student           Staff                                     Guest
                                                                                        according to their role.

               New BYOD Devices           Provisioned BYOD                 Guest


9 | Meeting Name
Key Technologies
SIMPLIFYING BYOD WITH RUCKUS




                  RUCKUS WIRELESS PROPRIETARY AND CONFIDENTIAL
Zero IT Automates Onboarding
       ▪ Requirement:
          automatic, secure
          authentication and
          roaming
       ▪ Enabled by SSID and
         authorization protocol
         configuration
       ▪ Easy-to-use Ruckus         Invitation         Branded             „One-Click‟
         approach to push                              Landing            Configuration
         configuration                                  Page

       ▪ Uses mobile OS auto-
                                                              Automatic
         detect and -authenticate                Authentication Enabled
         features, not a separate
         connection manager app

11 | Meeting Name
D-PSK Automates Security/Config




                          ZD applies role,      LDAP sends
                         generates D-PSK        user security
                        pushes dissolvable    group information
                        PROV file to device        to ZD




                        WLAN profile configured
                        device, and on the WLAN
                        based on allowed by role.



12 | Meeting Name
Client Fingerprinting
                                                       Hostname: dstiff‟s iPhone
                                                       MAC: 50:ea:d6:7c:30:e4
           Device-Specific Policy Enforcement

       ▪ Visibility “Who‟s device is this?”
       ▪ Self-registration
          ▪ Automatically registers and maintains
            client info on WLAN and Wired interfaces
              ▪ Operating System
              ▪ Operating System Hostname
       ▪ Control by device type
          ▪ Permit/allow
          ▪ Assign to VLAN
          ▪ Rate limit (Down/Up)
       ▪ Management
          ▪ WLAN controller or standalone
              ▪ WLAN dashboard
              ▪ Client monitor
              ▪ Client details

13 | Meeting Name

Mais conteúdo relacionado

Mais procurados

Goingwimax.Com Demystifying Wi Max Public Key Infrastructure Pki For Operator...
Goingwimax.Com Demystifying Wi Max Public Key Infrastructure Pki For Operator...Goingwimax.Com Demystifying Wi Max Public Key Infrastructure Pki For Operator...
Goingwimax.Com Demystifying Wi Max Public Key Infrastructure Pki For Operator...Irepa International, LLC
 
Ds tz series_us_10_april10
Ds tz series_us_10_april10Ds tz series_us_10_april10
Ds tz series_us_10_april10Yustinus Malawau
 
2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1aalwayson
 
[SOS 2009] D-Link: Red Segura L2 L3
[SOS 2009] D-Link: Red Segura L2 L3[SOS 2009] D-Link: Red Segura L2 L3
[SOS 2009] D-Link: Red Segura L2 L3Chema Alonso
 
Java Everywhere. Descubra la Internet de las Cosas
Java Everywhere. Descubra la Internet de las Cosas Java Everywhere. Descubra la Internet de las Cosas
Java Everywhere. Descubra la Internet de las Cosas GeneXus
 
Lecture2 network attack
Lecture2 network attackLecture2 network attack
Lecture2 network attackrajakhurram
 
Regulatory compliant cloud computing rethinking web application architectures...
Regulatory compliant cloud computing rethinking web application architectures...Regulatory compliant cloud computing rethinking web application architectures...
Regulatory compliant cloud computing rethinking web application architectures...Khazret Sapenov
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentationguestf018d88
 

Mais procurados (13)

802.11w Tutorial
802.11w Tutorial802.11w Tutorial
802.11w Tutorial
 
Goingwimax.Com Demystifying Wi Max Public Key Infrastructure Pki For Operator...
Goingwimax.Com Demystifying Wi Max Public Key Infrastructure Pki For Operator...Goingwimax.Com Demystifying Wi Max Public Key Infrastructure Pki For Operator...
Goingwimax.Com Demystifying Wi Max Public Key Infrastructure Pki For Operator...
 
Ap6532 spec sheet
Ap6532 spec sheetAp6532 spec sheet
Ap6532 spec sheet
 
Ds tz series_us_10_april10
Ds tz series_us_10_april10Ds tz series_us_10_april10
Ds tz series_us_10_april10
 
2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a
 
[SOS 2009] D-Link: Red Segura L2 L3
[SOS 2009] D-Link: Red Segura L2 L3[SOS 2009] D-Link: Red Segura L2 L3
[SOS 2009] D-Link: Red Segura L2 L3
 
Java Everywhere. Descubra la Internet de las Cosas
Java Everywhere. Descubra la Internet de las Cosas Java Everywhere. Descubra la Internet de las Cosas
Java Everywhere. Descubra la Internet de las Cosas
 
JavaOne Keynote: Programmable Networking is SFW
JavaOne Keynote: Programmable Networking is SFWJavaOne Keynote: Programmable Networking is SFW
JavaOne Keynote: Programmable Networking is SFW
 
Lecture2 network attack
Lecture2 network attackLecture2 network attack
Lecture2 network attack
 
Nx9000 spec sheet
Nx9000 spec sheetNx9000 spec sheet
Nx9000 spec sheet
 
Regulatory compliant cloud computing rethinking web application architectures...
Regulatory compliant cloud computing rethinking web application architectures...Regulatory compliant cloud computing rethinking web application architectures...
Regulatory compliant cloud computing rethinking web application architectures...
 
Sonic wall tz series
Sonic wall tz seriesSonic wall tz series
Sonic wall tz series
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentation
 

Destaque

Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless AnalysisSavvius, Inc
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)Pace IT at Edmonds Community College
 
Brocade PartnerWebinar: Network Edge キャンパス・スイッチ新製品&新機能、および有線&無線統合ソリューションアップデー...
Brocade PartnerWebinar: Network Edge キャンパス・スイッチ新製品&新機能、および有線&無線統合ソリューションアップデー...Brocade PartnerWebinar: Network Edge キャンパス・スイッチ新製品&新機能、および有線&無線統合ソリューションアップデー...
Brocade PartnerWebinar: Network Edge キャンパス・スイッチ新製品&新機能、および有線&無線統合ソリューションアップデー...Brocade
 
Introduction to Ruckus Carrier Solutions
Introduction to Ruckus Carrier SolutionsIntroduction to Ruckus Carrier Solutions
Introduction to Ruckus Carrier SolutionsMichal Jarski
 
A Conversation About Location - With Ruckus Wireless Smart Positioning Techno...
A Conversation About Location - With Ruckus Wireless Smart Positioning Techno...A Conversation About Location - With Ruckus Wireless Smart Positioning Techno...
A Conversation About Location - With Ruckus Wireless Smart Positioning Techno...Ruckus Wireless
 
Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)
Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)
Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)Alphorm
 
Alphorm.com Formation Cisco ICND2
Alphorm.com Formation Cisco ICND2Alphorm.com Formation Cisco ICND2
Alphorm.com Formation Cisco ICND2Alphorm
 
Troubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized ControllersTroubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized ControllersCisco Mobility
 
Informar Sobre la Renuncia de un Auditor Fiscal
Informar Sobre la Renuncia de un Auditor FiscalInformar Sobre la Renuncia de un Auditor Fiscal
Informar Sobre la Renuncia de un Auditor FiscalMiguel A. C. Sánchez
 
Avaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBaseAvaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBasePacketBase, Inc.
 
Cisco Case Analysis
Cisco Case AnalysisCisco Case Analysis
Cisco Case Analysisperk2624
 

Destaque (16)

PACE-IT: Troubleshooting Wireless Networks (part 1)
PACE-IT: Troubleshooting Wireless Networks (part 1)PACE-IT: Troubleshooting Wireless Networks (part 1)
PACE-IT: Troubleshooting Wireless Networks (part 1)
 
PACE-IT: Troubleshooting Wireless Networks (part 2)
PACE-IT: Troubleshooting Wireless Networks (part 2)PACE-IT: Troubleshooting Wireless Networks (part 2)
PACE-IT: Troubleshooting Wireless Networks (part 2)
 
Pace IT - Troubleshooting Wireless Networks
Pace IT - Troubleshooting Wireless NetworksPace IT - Troubleshooting Wireless Networks
Pace IT - Troubleshooting Wireless Networks
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
Brocade PartnerWebinar: Network Edge キャンパス・スイッチ新製品&新機能、および有線&無線統合ソリューションアップデー...
Brocade PartnerWebinar: Network Edge キャンパス・スイッチ新製品&新機能、および有線&無線統合ソリューションアップデー...Brocade PartnerWebinar: Network Edge キャンパス・スイッチ新製品&新機能、および有線&無線統合ソリューションアップデー...
Brocade PartnerWebinar: Network Edge キャンパス・スイッチ新製品&新機能、および有線&無線統合ソリューションアップデー...
 
Introduction to Ruckus Carrier Solutions
Introduction to Ruckus Carrier SolutionsIntroduction to Ruckus Carrier Solutions
Introduction to Ruckus Carrier Solutions
 
Iuwne10 S06 L01
Iuwne10 S06 L01Iuwne10 S06 L01
Iuwne10 S06 L01
 
A Conversation About Location - With Ruckus Wireless Smart Positioning Techno...
A Conversation About Location - With Ruckus Wireless Smart Positioning Techno...A Conversation About Location - With Ruckus Wireless Smart Positioning Techno...
A Conversation About Location - With Ruckus Wireless Smart Positioning Techno...
 
Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)
Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)
Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)
 
Alphorm.com Formation Cisco ICND2
Alphorm.com Formation Cisco ICND2Alphorm.com Formation Cisco ICND2
Alphorm.com Formation Cisco ICND2
 
Troubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized ControllersTroubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized Controllers
 
Informar Sobre la Renuncia de un Auditor Fiscal
Informar Sobre la Renuncia de un Auditor FiscalInformar Sobre la Renuncia de un Auditor Fiscal
Informar Sobre la Renuncia de un Auditor Fiscal
 
Avaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBaseAvaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBase
 
Cisco Case Analysis
Cisco Case AnalysisCisco Case Analysis
Cisco Case Analysis
 

Semelhante a BYOD - Ruckus way. Right way.

Cisco Study: State of Web Security
Cisco Study: State of Web Security Cisco Study: State of Web Security
Cisco Study: State of Web Security Cisco Canada
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...VMworld
 
Juniper Enterprise Guest Access
Juniper Enterprise Guest AccessJuniper Enterprise Guest Access
Juniper Enterprise Guest AccessAltaware, Inc.
 
Daniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDaniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDigicomp Academy AG
 
Vfm security with aruba wireless
Vfm security with aruba wirelessVfm security with aruba wireless
Vfm security with aruba wirelessvfmindia
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentRamesh Nagappan
 
Securing a public cloud infrastructure : Windows Azure
Securing a public cloud infrastructure : Windows AzureSecuring a public cloud infrastructure : Windows Azure
Securing a public cloud infrastructure : Windows Azurevivekbhat
 
Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsCourtland Smith
 
Aerohive-GuestManager
Aerohive-GuestManagerAerohive-GuestManager
Aerohive-GuestManagerppuichaud
 
Extending your Data Centre with AWS Sydney Customer Appreciation Day
Extending your Data Centre with AWS Sydney Customer Appreciation DayExtending your Data Centre with AWS Sydney Customer Appreciation Day
Extending your Data Centre with AWS Sydney Customer Appreciation DayAmazon Web Services
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideNick Owen
 
Workshop: Advanced Federation Use-Cases with PingFederate
Workshop: Advanced Federation Use-Cases with PingFederateWorkshop: Advanced Federation Use-Cases with PingFederate
Workshop: Advanced Federation Use-Cases with PingFederateCraig Wu
 
“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with Everything“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with EverythingDave Hay
 
Mobilizing Your Enterprise, Why & How?
Mobilizing Your Enterprise, Why & How?Mobilizing Your Enterprise, Why & How?
Mobilizing Your Enterprise, Why & How?SolarWinds
 
Introducing DirectReader
Introducing DirectReaderIntroducing DirectReader
Introducing DirectReaderDirectReader
 
OpSource cloud hosting
OpSource cloud hostingOpSource cloud hosting
OpSource cloud hostingOpSource
 

Semelhante a BYOD - Ruckus way. Right way. (20)

Cisco Study: State of Web Security
Cisco Study: State of Web Security Cisco Study: State of Web Security
Cisco Study: State of Web Security
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
 
Juniper Enterprise Guest Access
Juniper Enterprise Guest AccessJuniper Enterprise Guest Access
Juniper Enterprise Guest Access
 
Daniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDaniel künzli cloudgateway.next
Daniel künzli cloudgateway.next
 
Vfm security with aruba wireless
Vfm security with aruba wirelessVfm security with aruba wireless
Vfm security with aruba wireless
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environment
 
BranchOffice Szenarios
BranchOffice SzenariosBranchOffice Szenarios
BranchOffice Szenarios
 
Private cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud securityPrivate cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud security
 
Ct 1 Danielson
Ct 1 DanielsonCt 1 Danielson
Ct 1 Danielson
 
Securing a public cloud infrastructure : Windows Azure
Securing a public cloud infrastructure : Windows AzureSecuring a public cloud infrastructure : Windows Azure
Securing a public cloud infrastructure : Windows Azure
 
Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise Insights
 
Aerohive-GuestManager
Aerohive-GuestManagerAerohive-GuestManager
Aerohive-GuestManager
 
Extending your Data Centre with AWS Sydney Customer Appreciation Day
Extending your Data Centre with AWS Sydney Customer Appreciation DayExtending your Data Centre with AWS Sydney Customer Appreciation Day
Extending your Data Centre with AWS Sydney Customer Appreciation Day
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
 
Workshop: Advanced Federation Use-Cases with PingFederate
Workshop: Advanced Federation Use-Cases with PingFederateWorkshop: Advanced Federation Use-Cases with PingFederate
Workshop: Advanced Federation Use-Cases with PingFederate
 
Ruckus brief customer_Medley
Ruckus brief customer_MedleyRuckus brief customer_Medley
Ruckus brief customer_Medley
 
“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with Everything“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with Everything
 
Mobilizing Your Enterprise, Why & How?
Mobilizing Your Enterprise, Why & How?Mobilizing Your Enterprise, Why & How?
Mobilizing Your Enterprise, Why & How?
 
Introducing DirectReader
Introducing DirectReaderIntroducing DirectReader
Introducing DirectReader
 
OpSource cloud hosting
OpSource cloud hostingOpSource cloud hosting
OpSource cloud hosting
 

Mais de Michal Jarski

carnet-wifi-test-results
carnet-wifi-test-resultscarnet-wifi-test-results
carnet-wifi-test-resultsMichal Jarski
 
Location - the new battlefield
Location - the new battlefieldLocation - the new battlefield
Location - the new battlefieldMichal Jarski
 
How do the 802.11u and HotSpot 2.0 work?
How do the 802.11u and HotSpot 2.0 work?How do the 802.11u and HotSpot 2.0 work?
How do the 802.11u and HotSpot 2.0 work?Michal Jarski
 
Interworking Wi-Fi and mobile networks
Interworking Wi-Fi and mobile networksInterworking Wi-Fi and mobile networks
Interworking Wi-Fi and mobile networksMichal Jarski
 
Adaptive Antennas vs. TxBF
Adaptive Antennas vs. TxBFAdaptive Antennas vs. TxBF
Adaptive Antennas vs. TxBFMichal Jarski
 
ZoneFlex 7982 - the best access point ever
ZoneFlex 7982 - the best access point everZoneFlex 7982 - the best access point ever
ZoneFlex 7982 - the best access point everMichal Jarski
 

Mais de Michal Jarski (10)

carnet-wifi-test-results
carnet-wifi-test-resultscarnet-wifi-test-results
carnet-wifi-test-results
 
Location - the new battlefield
Location - the new battlefieldLocation - the new battlefield
Location - the new battlefield
 
How do the 802.11u and HotSpot 2.0 work?
How do the 802.11u and HotSpot 2.0 work?How do the 802.11u and HotSpot 2.0 work?
How do the 802.11u and HotSpot 2.0 work?
 
802.11ac Overview
802.11ac Overview802.11ac Overview
802.11ac Overview
 
Wi fi-stress-test
Wi fi-stress-testWi fi-stress-test
Wi fi-stress-test
 
802.11ac whitepaper
802.11ac whitepaper802.11ac whitepaper
802.11ac whitepaper
 
Rate My Wi-Fi
Rate My Wi-FiRate My Wi-Fi
Rate My Wi-Fi
 
Interworking Wi-Fi and mobile networks
Interworking Wi-Fi and mobile networksInterworking Wi-Fi and mobile networks
Interworking Wi-Fi and mobile networks
 
Adaptive Antennas vs. TxBF
Adaptive Antennas vs. TxBFAdaptive Antennas vs. TxBF
Adaptive Antennas vs. TxBF
 
ZoneFlex 7982 - the best access point ever
ZoneFlex 7982 - the best access point everZoneFlex 7982 - the best access point ever
ZoneFlex 7982 - the best access point ever
 

Último

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

BYOD - Ruckus way. Right way.

  • 1. Bring Your Own Design SIMPLIFYING BYOD WITH RUCKUS RUCKUS WIRELESS PROPRIETARY AND CONFIDENTIAL
  • 2. The Realities of BYOD 2 | Meeting Name
  • 3. What Enterprises REALLY Want 1 Simple onboarding 2 Automated enforcement of user policies 3 Visibility of who and what is on the WLAN 4 Extension of wired security to WLAN 5 More capacity to deal with flood of devices 6 Leverage existing infrastructure 3 | Meeting Name
  • 4. Don’t Reinvent the Wheel FIREWALLS CONTENT AAA ACLs / VLANS FILTERS SERVERS 4 | Meeting Name
  • 5. Now What? SIMPLIFYING BYOD WITH RUCKUS RUCKUS WIRELESS PROPRIETARY AND CONFIDENTIAL
  • 6. Defining the SSID Structure ▪ DOMAIN SSID ▪ School owned / managed devices with access to all resources: printers, applications, files shares ▪ Guest Visitor SSID ▪ Users who are not in the OUI with access only to the internet ▪ Staff and Student BYOD SSID ▪ Non-school owned / managed devices needing Internet access and specified school resources, VLAN and content filtering applied ▪ Provisioning SSID ▪ Hotspot with a walled garden attribute, redirecting all users to an activation page 6 | Meeting Name
  • 7. Automating Role-Based Access DOMAIN Administrator automatically placed on VLAN W, no rate limits GUEST Allowed on via a Guest Pass, accepting terms and conditions automatically placed on VLAN Z, rate limited at 1 Mbps STAFF Staff automatically placed on VLAN X, rate limited at 5 Mbps STUDENT Student automatically placed on VLAN Y, rate limited at 1 Mbps STRANGER User does NOT have account and is denied 7 | Meeting Name
  • 8. How to BYOD with Ruckus 1 Unknown device associates with provisioning SSID 2 User challenged to authenticate 3 ZD queries LDAP (AAA domain) 4 User placed into requisite role based on security group membership, VLAN dynamically assigned 5 Unique dynamic PSK automatically generated, bound with device and pushed to client 6 Policies applied per role and VLAN membership 8 | Meeting Name
  • 9. What it Looks Like WHAT HAPPENS WHEN? User Student Staff Guest Database Resources Resources Resources 1. Users connect to a provisioning SSID and are re-directed to an Internet onboarding portal. 2. Users enter domain credentials which are verified against a user database. 3. The user’s role assignment and permissions are automatically determined based on authentcaion. 4. Using Zero-IT, the device is Guest SSID auto-provisioned with a Onboarding SSID Student SSID Staff SSID (hotspot) dynamic pre-shared key and dynamically assigned to the requisite WLAN. 5. Devices re-connect on a secure WLAN, receiving network permissions Student Staff Guest according to their role. New BYOD Devices Provisioned BYOD Guest 9 | Meeting Name
  • 10. Key Technologies SIMPLIFYING BYOD WITH RUCKUS RUCKUS WIRELESS PROPRIETARY AND CONFIDENTIAL
  • 11. Zero IT Automates Onboarding ▪ Requirement: automatic, secure authentication and roaming ▪ Enabled by SSID and authorization protocol configuration ▪ Easy-to-use Ruckus Invitation Branded „One-Click‟ approach to push Landing Configuration configuration Page ▪ Uses mobile OS auto- Automatic detect and -authenticate Authentication Enabled features, not a separate connection manager app 11 | Meeting Name
  • 12. D-PSK Automates Security/Config ZD applies role, LDAP sends generates D-PSK user security pushes dissolvable group information PROV file to device to ZD WLAN profile configured device, and on the WLAN based on allowed by role. 12 | Meeting Name
  • 13. Client Fingerprinting Hostname: dstiff‟s iPhone MAC: 50:ea:d6:7c:30:e4 Device-Specific Policy Enforcement ▪ Visibility “Who‟s device is this?” ▪ Self-registration ▪ Automatically registers and maintains client info on WLAN and Wired interfaces ▪ Operating System ▪ Operating System Hostname ▪ Control by device type ▪ Permit/allow ▪ Assign to VLAN ▪ Rate limit (Down/Up) ▪ Management ▪ WLAN controller or standalone ▪ WLAN dashboard ▪ Client monitor ▪ Client details 13 | Meeting Name

Notas do Editor

  1. School SSID – easy – the school owns all devices – 100% control – only those devices have access to the resources, anti-virus control, device imaging control, etc., behind the firewallGuest SSID – Also easy – guests have access to only the internet – BYOD SSID – This is where it gets interesting…because you have teachers and students bringing in their own devices – Teachers needing access to specific resources, students needing access to specific resources.
  2. Web
  3. Web