DELIVERING SECURE ELASTIC NETWORKS

Size: px
Start display at page:

Download "DELIVERING SECURE ELASTIC NETWORKS"

Transcription

1 DELIVERING SECURE ELASTIC NETWORKS Shmulik Contact vcard Shmulik Nehama Identity Engines Portfolio Leader Avaya Networking 1

2 Thank you Sponsors! Global Sponsors Gold Sponsors Silver Sponsors

3 Join the #AvayaATF

4 SECURE ELASTIC NETWORKS OPTIMIZING END USER & IT EXPERIENCES NETWORK FLEXIBILITY Elastic Networks Fast, Automation & Security with Identity Engines USER & IT EXPERIENCE NETWORK SECURITY Control WHO gets access, from WHERE, and with WHAT NETWORK SIMPLICITY Automate BYOD and IOT onboarding Avaya Fabric Networking Delivers the Architecture, Capacity & Control to Optimize the IT and End User Experiences 2016 Avaya Inc. All right reserved 4

5 CUSTOMER NETWORK EDGE CHALLENGES INFLEXIBILITY Traditional Networking Complex & Inflexible Time consuming and error prone to enable new services Many complex protocols to manage Lacks end to end virtualization and security Long Convergence Times Unable to support Internet of Things Services Manual network provisioning for the access & core 2016 Avaya Inc. All right reserved 5

6 CUSTOMER NETWORK EDGE CHALLENGES SECURITY RISKS FROM TO Corporate Computer Corporate Computer Personal Phone Personal Tablet Significant Growth in Mobile Devices & Applications Business & Personal Applications Becoming Intermixed 2016 Avaya Inc. All right reserved 6

7 CUSTOMER NETWORK EDGE CHALLENGES SECURITY RISKS Increasing global security concerns BYOD is here to stay!! Mandates the need to protect IT infrastructure However, it is also imperative to provide Great IT Experience Great User experience Network Completely Open Network Completely Locked Policy-based Access 2016 Avaya Inc. All right reserved 7

8 CUSTOMER NETWORK EDGE CHALLENGES COMPLEXITY FROM TO 2016 Avaya Inc. All right reserved 8

9 CUSTOMER NETWORK EDGE CHALLENGES COMPLEXITY Billions Billions of IOT devices by 2020 Wired and Wireless Network of Everything (wired and wireless) Badge Scanners Smart Signs Smart Lights (POE-based) Medical Devices Ceiling Fans IP Cameras IP Phones Printers With so many network attached devices, the need for Edge Automation is greater than ever 2016 Avaya Inc. All right reserved 9

10 IDENTITY ENGINES QUICK BASICS Vendor Agnostic Any Network Vendor Any User Any Device Wired & Wireless Unified Access Centralized Policy Directory Federation All major directory servers MDM AirWatch, Citrix Identity Routing Virtual Mapping Guest Access Self-service Sponsor / Front Desk Audit logs Virtual Appliance Software-based solution VMware ESXi BYOD Device On-boarding Device Fingerprinting non-802.1x access 2016 Avaya Inc. All right reserved 10

11 IDENTITY ENGINES SECURE ACCESS, INTERNET OF THINGS, ANALYTICS IF (identity = HR employee) AND IF (device = corp laptop) AND IF (medium = wired) THEN GRANT CORPORATE ACCESS IF (device = MDM enrolled) AND IF (device = has pin-lock) AND IF (device = is not Jail-broken) THEN GRANT CORPORATE ACCESS IF (identity = HR employee) AND IF (device = personal ipad) AND IF (medium = wireless) THEN GRANT LIMITED ACCESS IF (device = Vending Machine) OR (device = POE Lighting) AND IF (building = main campus) THEN GRANT NETWORK SERVICE 2016 Avaya Inc. All right reserved 11

12 IDENTITY ENGINES IDENTITY & POLICY BASED ACCESS Advanced Policy Engine Based on firewall concepts High Availability Active-Active Active-Standby Not inline 2016 Avaya Inc. All right reserved 12

13 SECURE ELASTIC NETWORKS OPTIMIZING END USER & IT EXPERIENCES NETWORK FLEXIBILITY Elastic Networks Fast, Automation & Security with Identity Engines USER & IT EXPERIENCE NETWORK SECURITY Control WHO gets access, from WHERE, and with WHAT NETWORK SIMPLICITY Automate BYOD and IOT onboarding Avaya Fabric Networking Delivers the Architecture, Capacity & Control to Optimize the IT and End User Experiences 2016 Avaya Inc. All right reserved 13

14 TRADITIONAL VS. FABRIC NETWORKING COMPLEX & INFLEXIBLE VS. SIMPLE & FLEXIBLE Time consuming and error prone to enable new services Many complex protocols to manage Lacks end to end virtualization and security Long Convergence Times Unable to support Internet of Things Services Manual network provisioning for the access & core Traditional Networking Complex & Inflexible Fabric Networking Simple & Flexible Unified network fabric no wireless overlay with disparate capabilities Reduced risk provision endpoint only not hop by hop Improved network control single protocol and FIB Increased performance no controller bottleneck Reduced latency no controller looping of traffic Improved resiliency no single point of controller failure Enhanced security Secure Elastic Network Enabled BYOD Identity Engines 2016 Avaya Inc. All right reserved 14

15 ELASTIC NETWORKS WITH FABRIC ATTACH SIMPLE & FLEXIBLE WITH IDENTITY ENGINES Fabric Attach allows automated network attachment with or without Fabric Connect. Fabric Attach Elements: FA Server An SPB switch at the Fabric edge running an FA agent in FA Server mode. FA Server creates ISID/VLAN bindings based FA Signaling. FA Proxy A non-spb switch at the network edge (wiring closet) running an FA agent in FA Proxy mode. FA Proxy supports directly attached users, end devices and FA Clients. FA Proxy supports FA Signaling with FA Server and FA Clients. FA Client - A network attached end device running an FA agent in FA Client mode. FA Client can be Avaya WLAN 9100 APs, ONA, Hypervisors supporting FA Client on Open vswitch, or other future planned 3 rd party devices. FA Policy Server Avaya Identity Engines network access policy server fully automates Fabric Attach. FA-Client(s) FA Signaling FA-Proxy FA Signaling FA-Server Fabric Connect Fabric Attach DHCP WOS Avaya Fabric Connect FA-Policy Server Devices (non-fa endpoints) FA Policy Signalling FA Policy Signalling FA Signaling - Protocol that leverages standard extension of network protocols to exchange msgs and data between FA Elements to orchestrate network automation Avaya Inc. All right reserved 15

16 ELASTIC NETWORKS WITH FABRIC ATTACH FA ELEMNT MODEL & FA SIGNALING Fabric Attach elements are FA agent roles in devices Below are all the FA elements required to create a Fabric Attach solution with the supported element interconnections (tiers). Adhere to this FA architectural model when designing FA solutions end to end with an SPB Fabric Connect Core. SPB Device Non-SPB Device Non-SPB Device SPB Fabric FA Server (BEB) FA Proxy FA Client FA Client SPBM LLDP Control plane I-SID VLAN Services Data plane FA TLV Element Type TLV Type [127] TLV Length [50 octets] Avaya OUI [ D] Subtype [11] HMAC-SHA256 Digest Element Type State Mgmt VLAN Reserved System ID 7 bits 9 bits 3 octets 1 octet 32 octets 6 bits 6 bits 12 bits 1 octet 10 octets FA Client - Access Point (6) Data integrity and source validation FA Client - Switch (8) using HMAC-HA256 FA Client - IP Phone (10) FA Client MAC address Symmetric private keys are used for FA Client - IP Camera (11) of the network interface digest generation FA Client - IP Video (12) 2016 Avaya Inc. All right reserved FA Client - Virtual Switch (14) 16

17 ELASTIC NETWORKS WITH FABRIC ATTACH FA ELEMNT MODEL & FA SIGNALING Fabric Attach elements are FA agent roles in devices Below are all the FA elements required to create a Fabric Attach solution with the supported element interconnections (tiers). Adhere to this FA architectural model when designing FA solutions end to end with an SPB Fabric Connect Core. SPB Device Non-SPB Device Non-SPB Device SPB Fabric FA Server (BEB) FA Proxy FA Client FA Client SPBM LLDP Control plane I-SID VLAN Services Data plane FA TLV VLAN-SID Assignment TLV Type [127] TLV Length octets Avaya OUI [ D] Subtype [12] HMAC-SHA256 Digest Assignment Status 7 bits 9 bits 3 octets 1 octet 32 octets 4 bits 12 bits 3 octets VLAN ISID Assignment status data returned by the FA Server for Data integrity and source validation each pending ISID/VLAN assignment. Requested VLAN Example of potential values: using HMAC-HA256 Requested ISID to have VLAN Assignment accepted (2) Symmetric private keys are used for Rejection: Duplicate data (5) traffic mapped to on the FA digest generation 2016 Avaya Inc. All right reserved Rejection: VLAN invalid (6) Server switch Rejection: VLAN resources unavailable (8) 17

18 ELASTIC NETWORKS WITH FABRIC ATTACH IDENTITY ENGINES FA POLICY SERVER IDE as Fabric Attach Policy Server IDE can be added as a centralized Policy engine to fully automate the attachement of Non-FA devices & certain FA Clients (such as WLAN 9100 APs). End users and devices that support 802.1X/EAP supplicant/client functions can connect to FA Proxy or FA Server switches, and can be authenticated & attached to specific VLANs and I-SIDs according to IDE Policy rules. SPB Fabric FA Policy Server (IDE) VSP - Fabric edge (switch cluster) FA Server (BEB) vist FA Server (BEB) ERS - Access (wiring closet) FA Proxy OVS / 3 rd Party FA Client ONA FA Client WLAN AP FA Client End devices/users Wired IoT device Non-FA device Laptop/tablet/Smartphone Non-FA device IP Phone/PC/Printer/Camera Non-FA device PC/Server Non-FA device Switch (ERS3510) Non-FA device Non-FA devices can be connected to a switch enabled with Fabric Attach services. However, FA signaling on the FA Server or FA Proxy switch downstream port(s) must be disabled (IE: server/host, or additional ERS off an FA Proxy) Avaya Inc. All right reserved 18

19 ELASTIC NETWORKS WITH FABRIC ATTACH FA POLICY SERVER USERS / DEVICES WITH SPB Adding Identity Engines fully automates provisioning of ISIDs/VLANs and port memberships Automated example Users and end (EAP) devices (MAC/MEAP/FA) are authenticated by IDE and placed in automatically provisioned VLAN/I-SID based on Policy SPB Fabric FA Server VSP4/7/8K vist FA Proxy ERS4800 / 5900 (Wiring Closet) End Users or IOT Devices Alternate vist path FA Policy Server Identity Engines Fabric Attach Management VSN (I-SID) Data VSN (I-SID) Voice VSN (I-SID) VLAN MGMT VLAN 10 VLAN 20 Authenticated users/devices placed in Data VSN Authenticated voice devices placed in Voice VSN On successful authentication of user or device, IDE sends VLAN/ISID mapping to FA Proxy which dynamically creates the VLAN, adds port membership for user/device, uplink port, and also sends request to FA Server to create VLAN/ISID mapping Avaya Inc. All right reserved 19

20 ELASTIC NETWORKS WITH FABRIC ATTACH FA POLICY SERVER USERS / DEVICES WITH SPB FA Policy for IOT Device (non-fa Client) Example of policy for Employees and Contractors 2016 Avaya Inc. All right reserved 20

21 ELASTIC NETWORKS WITH FABRIC ATTACH IDENTITY ENGINES ATTACHING WLAN 9100 AP IDE is used to securely authenticate attachment of new WLAN 9100 series AP s to an FA enabled network. Automated Plug-in AP 9100, IDE authenticates AP, and signals to FA Proxy what VLANs to provision for AP based on policy in IDE. WOS SPB Fabric Alternate vist path FA Server VSP4/7/8K vist FA Proxy ERS4800 / 5900 (Wiring Closet) FA Client AP 9100 End Users or IOT Devices FA Policy Server Identity Engines Fabric Attach Management VSN (I-SID) Data VSN (I-SID) VLAN MGMT VLAN 10 Authenticated users/devices placed in Data VSN Guest VSN (I-SID) VLAN 50 Authenticated users/devices placed in Guest VSN 2016 Avaya Inc. All right reserved 21

22 ELASTIC NETWORKS WITH FABRIC ATTACH IDENTITY ENGINES ATTACHING WLAN 9100 AP FA Client AP 9100 connects to FA Proxy Standalone switch FA Client AP 9100 communicates via FA Signaling with the FA Proxy Standalone switch FA Proxy Standalone discovers and authenticates the FA Client AP 9100 against FA Policy Identity Engines Simple Authentication Secure Authentication FA Policy authorizes AP 9100 with Auto Create VLAN VLAN:ISID pairs PVID AP 9100 obtains DHCP IP AP 9100 discovers WOS AP 9100 registers & downloads profile AP 9100 ready for wireless clients WOS AP Discovery AP Profile FA Signaling DHCP Request DNS Lookup Avaya-WOS FA Policy Ignition Server Authentication Authorization Auto Create VLAN VLAN:ISID pairs PVID FA Proxy Standalone FA Client WLAN AP Avaya Inc. All right reserved 22

23 ELASTIC NETWORKS WITH FABRIC ATTACH IDENTITY ENGINES ATTACHING WLAN 9100 AP FA Policy for FA Client AP 9100 Traditional FA Policy for FA Client AP 9100 Secure 2016 Avaya Inc. All right reserved 23

24 ELASTIC NETWORKS WITH FABRIC ATTACH IDENTITY ENGINES ATTACHING WLAN 9100 AP FA Policy for FA Client AP 9100 Traditional FA Policy for FA Client AP 9100 Secure 2016 Avaya Inc. All right reserved 24

25 ELASTIC NETWORKS WITH FABRIC ATTACH IDENTITY ENGINES FA POLICY TEMPLATES 2016 Avaya Inc. All right reserved 25

26 ELASTIC NETWORKS WITH FABRIC ATTACH IDENTITY ENGINES FA CLIENTS INVENTORY FA Client automated fingerprinting On successful authentication the FA Client device is seen in the FA Client Devices inventory table. Click on Last Seen Authenticator to find out the last switch and location of the FA Client 2016 Avaya Inc. All right reserved 26

27 ELASTIC NETWORKS WITH FABRIC ATTACH IDENTITY ENGINES FA CLIENTS MONITORING The Device Name, Device Type and Subtype are also seen in RADIUS AAA Summary Avaya Inc. All right reserved 27

28 SECURE ELASTIC NETWORKS OPTIMIZING END USER & IT EXPERIENCES NETWORK FLEXIBILITY Elastic Networks Fast, Automation & Security with Identity Engines USER & IT EXPERIENCE NETWORK SECURITY Control WHO gets access, from WHERE, and with WHAT NETWORK SIMPLICITY Automate BYOD and IOT onboarding Avaya Fabric Networking Delivers the Architecture, Capacity & Control to Optimize the IT and End User Experiences 2016 Avaya Inc. All right reserved 28

29 ENTERPRISE MOBILE DEVICE MANAGEMENT SECURING BYOD DEVICES Challenges Associated with Mobility Jail-broken / Rooted device Fragmented OS Unwanted / Wanted Apps Personal / Corporate device Regulatory Compliance Data Containerization Encryption / Passcode HIPPA Access Policy MDM 2016 Avaya Inc. All right reserved 29

30 ENTERPRISE MOBILE DEVICE MANAGEMENT SECURING BYOD DEVICES a User access requests Mobile Devices b Identity Engines RADIUS 3 Fed to PE Database Policy Engine Device sync-up 2 REST APIs 1 Device enrollment MDM Cloud-service / MDM On-premise Server 2016 Avaya Inc. All right reserved 30

31 ACCESS PORTAL EXTERNAL LOGIN EXTERNAL LOGIN FOR WLAN 9100 BENEFITS Device Onboarding with Access Portal Access Portal can now act as an external Captive Portal for WLAN 9100 BYOD onboarding redirect from WLAN 9100 Users get Authenticated and Fingerprinted Works over L2 and L3 network Highly customizable Login Page Highly customizable Success Page Post authentication, user traffic will be out-of-band the Access Portal and in line with WLAN AP Avaya Inc. All right reserved 31

32 ACCESS PORTAL EXTERNAL LOGIN EXTERNAL LOGIN FOR WLAN 9100 HOW IT WORKS? Ignition Server User Devices AP 9100 Access Portal 2016 Avaya Inc. All right reserved 32

33 ACCESS PORTAL SOCIAL MEDIA LOGIN SOCIAL MEDIA LOGIN FOR WLAN 9100 BENEFITS Guest Access with Social Media Login Benefits of Access Portal Social Media Login for WLAN 9100 BYOD onboarding redirect from WLAN 9100 Users get Authenticated and Fingerprinted Works over L2 and L3 network Highly customizable Login Page Highly customizable Success Page No need for user / front desk to create guest account Feed for Analytics Social Media login requires user consent Basic user information retrieved from Social Media site Plans to feed Analytics with Social Media user attributes Post authentication, user traffic will be out-of-band the Access Portal and in line with WLAN AP Avaya Inc. All right reserved 33

34 ACCESS PORTAL SOCIAL MEDIA LOGIN SOCIAL MEDIA LOGIN FOR WLAN 9100 HOW IT WORKS? 2016 Avaya Inc. All right reserved 34

35 ACCESS PORTAL ADDITIONAL ENHANCEMENTS Lightspeed Integration Standard-based feed to Security Gateways for Content Filtering Override NATing Configurable as separate RADIUS Accounting server User Custom VSA Obtain user input prior to granting access Use case example Schedule for Backups Consistent with Ignition Server and Guest Manager Recurring configurable schedule Example of customized login Maintenance networks are segregated Contractor arrives onsite to perform maintenance work Contractor selects the network needed for access Identity Engines confirms access rights and grants appropriate access 2016 Avaya Inc. All right reserved 35

36 SECURE ELASTIC NETWORKS OPTIMIZING END USER & IT EXPERIENCES NETWORK FLEXIBILITY Elastic Networks Fast, Automation & Security with Identity Engines USER & IT EXPERIENCE NETWORK SECURITY Control WHO gets access, from WHERE, and with WHAT NETWORK SIMPLICITY Automate BYOD and IOT onboarding Avaya Fabric Networking Delivers the Architecture, Capacity & Control to Optimize the IT and End User Experiences 2016 Avaya Inc. All right reserved 36

37 SIMPLIFYING DEVICE ONBOARDING IDENTITY ENGINES SMARTPHONE APP User can use QR code scanner to auto populate MAC address and device name. QR code scanner can only parse Avaya supported QR code format. QR Code Format for ONA with example data: SERIAL:X A2A0 MAC:48:C0:93:00:A2:00 MACNUM:16 PEC:EC E6 MAN:AVAYA MOD:ONA 1101GT REV: Avaya Inc. All right reserved 37

38 SIMPLIFYING DEVICE ONBOARDING IDENTITY ENGINES SMARTPHONE APP WLAN 9100 APs ship with QR code label 2016 Avaya Inc. All right reserved 38

39 SIMPLIFYING DEVICE ONBOARDING API FOR PROGRAMMATIC PROVISIONING INTO IDE APIs APIs APIs APIs APIs Fetching Provisioning Fetching Devices iteratively or Fetching devices with filter Bulk Delete of Guest Close Cursor Id groups for a Provisioner a Provisioner and without details Users for a Provisioner Fetching Provisioning Group details for Group Name GET Cursor Id of device API to query the status of single device Device Registration GET next N devices API to query the status of multiple devices Fetching Guest User details by username for a Provisioner Fetching Guest Users iteratively for a Provisioner Fetching Guest User with filter Fetching Guest Users with filter and without details Update a device GET first N devices Guest User Registration GET Cursor Id API to query the status of single user Delete a device GET last N devices Re-send Credentials through /SMS to Guest User by Username Deleting multiple Devices GET count of total available Update a Guest User device records GET next N Guest Users GET first N Guest Users API to query the status of multiple users Bulk Delete of devices for a Provisioner Close Cursor Id Delete a Guest User GET last N Guest Users Fetching Device details by MAC for a Provisioner Fetching devices with filter Deleting multiple Guest Users GET count of total available Guest Users Records 2016 Avaya Inc. All right reserved 39 Note: Authorization Scheme : Basic (Base64 Encryption)

40 SIMPLIFYING DEVICE ONBOARDING TWO CLICKS TO ADD DEVICE Network attached device attempts access Users right click on log record to add device to local DB Available from Succeeded & Failed Authentications In addition, edit a device directly 2016 Avaya Inc. All right reserved 40

41 SIMPLIFYING DEVICE ONBOARDING ONBOARD IOT/BYOD DEVICE BASED ON ACCESS POLICY NEW on POR NEW CONCEPT: Access Policy Actions Register Device Add device to IDE local store automatically based on a Access Policy rule Use case example: MAC Learning, more Assign Group(s) Assign a group or groups to a device based on an Access Policy rule Use case example: MAC Learning, BYOD Onboarding, more Trigger COA Disconnect Disconnect device based on a Access Policy rule Use case example: BYOD Onboarding, more Alert Send alert based on a Access Policy rule Use case example: Send alert when device that belongs to STOLEN group attempts to access the network 2016 Avaya Inc. All right reserved 41

42 SMART HEALTHCARE IOT FOR WIRELESS SOLUTION OVERVIEW Easy onboarding & tracking of medical devices and smart traffic tunneling to Central Medical Application Challenges & Benefits addressed Mobility of patient monitors & imaging devices Currently constrained due to manual reconfiguration of network Tracking of medical devices usage, their location & IT compliance Secure traffic segmentation of clinical data and one-hop transport from care-giving area to central application in data center Example: patient vital data, EHS records, imaging Solution Summary Easy & safe on-boarding of WiFi patient monitor (or simulator) into Avaya WLAN 9100 WiFi + ERS 4800/5900 edge network o Fabric Attach based auto onboarding of WLAN 9100 o QR-Code based auto onboarding of medical device using Identity Engines IDR mobile App Smart traffic segmentation & diversion directly into central medical application server (HMS) o Dynamic GRE tunnel from AP into IGT VM running adjacent to central medical application (imaging, EHR, HMS, etc.) 2016 Avaya Inc. All right reserved 42

43 SMART HEALTHCARE IOT FOR WIRELESS ARCHITECTURE 2016 Avaya Inc. All right reserved 43

44 SMART CLASSROOM & SAFE-SCHOOL SOLUTION ARCHITECTURE Automatic Class Attendance Dynamic control of in-class application access Detect Students in unsafe Locations & Auto-alert 2016 Avaya Inc. All right reserved 44

45 SIMPLIFYING DEVICE ONBOARDING ONBOARD IOT/BYOD DEVICE BASED ON ACCESS POLICY NEW on POR Access Policy Actions available from: User Authorization Policy (including Failed Authentication) Mac Authorization Policy (including Failed Authentication) 2016 Avaya Inc. All right reserved 45

46 SECURE ELASTIC NETWORKS OPTIMIZING END USER & IT EXPERIENCES NETWORK FLEXIBILITY Elastic Networks Fast, Automation & Security with Identity Engines USER & IT EXPERIENCE NETWORK SECURITY Control WHO gets access, from WHERE, and with WHAT NETWORK SIMPLICITY Automate BYOD and IOT onboarding Avaya Fabric Networking Delivers the Architecture, Capacity & Control to Optimize the IT and End User Experiences 2016 Avaya Inc. All right reserved 46

47 Visit Our Smart City Expo Hours Monday, April 4 Tuesday, April 5 Wednesday, April 6 Thursday, April 7 6:30pm 9:00pm 7:00am 8:30am 7:00am 8:30am 7:00am 8:30am 12:15pm 1:30pm 12:15pm 1:30pm (Expo closes after breakfast) 6:00pm 8:00pm

48 Complete your survey at the end of the session in the Mobile App

49 2016 Avaya Inc. All right reserved 49

50

51 IGNITION TUNNELING SERVER GRE TUNNELING FOR WLAN 9100 AP 9100 WOS Admin Ignition Server GRE Guest Tunneling Access Portal Captive Portal Switch Firewall Internet 2016 Avaya Inc. All right reserved 51

DEPLOYING AND EVOLVING FABRICS IN EXISTING NETWORKS. Scott Fincher Global Solutions Architect Avaya Networking

DEPLOYING AND EVOLVING FABRICS IN EXISTING NETWORKS. Scott Fincher Global Solutions Architect Avaya Networking DEPLOYING AND EVOLVING FABRICS IN EXISTING NETWORKS Scott Fincher Global Solutions Architect Avaya Networking Thank you Sponsors! Global Sponsors Gold Sponsors Silver Sponsors Join the Conversation @Avaya

More information

Cisco ISE Features. Cisco Identity Services Engine Administrator Guide, Release 1.4 1

Cisco ISE Features. Cisco Identity Services Engine Administrator Guide, Release 1.4 1 Cisco ISE Overview, page 2 Key Functions, page 2 Identity-Based Network Access, page 2 Support for Multiple Deployment Scenarios, page 3 Support for UCS Hardware, page 3 Basic User Authentication and Authorization,

More information

SMART CAMPUS, BUILDING AND VENUES

SMART CAMPUS, BUILDING AND VENUES SMART CAMPUS, BUILDING AND VENUES Greg Deffenbaugh, Corporate Solutions Technologist SDS & Hospitality SDN Solutions and Strategy, Avaya @gregdeff gregdeff 1 Thank you Sponsors! Global Sponsors Gold Sponsors

More information

Network Access Control

Network Access Control Network Access Control It is about saying YES! to BYOD but staying on control Jan Michael de Kok Sales Engineering Manager Caribbean & Central America Realities of Smart Devices, Like It Or Not A new device

More information

P ART 3. Configuring the Infrastructure

P ART 3. Configuring the Infrastructure P ART 3 Configuring the Infrastructure CHAPTER 8 Summary of Configuring the Infrastructure Revised: August 7, 2013 This part of the CVD section discusses the different infrastructure components that are

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

ENTERPRISE NETWORKS WLAN Guest Management Software

ENTERPRISE NETWORKS WLAN Guest Management Software ENTERPRISE NETWORKS WLAN Guest Management Software Deb Ghosh Visitor Access Applications Secure Guest Access BYOD for employee mobiles Conferences and Tradeshows Public/Retail Hotspots Locations Services

More information

Extreme Policy Access Control

Extreme Policy Access Control Extreme Policy Access Control Granular network access and control across wired and wireless infrastructure Role-Based Policy Policy Management Secure and provision network resources based upon the role

More information

ACCP-V6.2Q&As. Aruba Certified Clearpass Professional v6.2. Pass Aruba ACCP-V6.2 Exam with 100% Guarantee

ACCP-V6.2Q&As. Aruba Certified Clearpass Professional v6.2. Pass Aruba ACCP-V6.2 Exam with 100% Guarantee ACCP-V6.2Q&As Aruba Certified Clearpass Professional v6.2 Pass Aruba ACCP-V6.2 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back

More information

Integrating Meraki Networks with

Integrating Meraki Networks with Integrating Meraki Networks with Cisco Identity Services Engine Secure Access How-To guide series Authors: Tim Abbott, Colin Lowenberg Date: April 2016 Table of Contents Introduction Compatibility Matrix

More information

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices

Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices Michal Zlesák Area Sales Manager Michal.zlesak@enterasys.com Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices A Siemens Enterprise Communications Company

More information

Cisco ISE Features Cisco ISE Features

Cisco ISE Features Cisco ISE Features Cisco ISE Overview, on page 2 Key Functions, on page 2 Identity-Based Network Access, on page 3 Support for Multiple Deployment Scenarios, on page 3 Support for UCS Hardware, on page 3 Basic User Authentication

More information

BYOD: BRING YOUR OWN DEVICE.

BYOD: BRING YOUR OWN DEVICE. white paper BYOD: BRING YOUR OWN DEVICE. On-BOaRDING and Securing DEVICES IN YOUR Corporate NetWORk PrepaRING YOUR NetWORk to MEEt DEVICE DEMaND The proliferation of smartphones and tablets brings increased

More information

Release Notes for Avaya WLAN 9100 AOS-Lite Operating System WAP9112 Release WAP9114 Release 8.1.0

Release Notes for Avaya WLAN 9100 AOS-Lite Operating System WAP9112 Release WAP9114 Release 8.1.0 WLAN 9100 Release Notes Release Notes for Avaya WLAN 9100 AOS-Lite Operating System WAP9112 Release 8.1.0 WAP9114 Release 8.1.0 Avaya Inc - External Distribution 1. Introduction This document provides

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Introducing. Secure Access. for the Next Generation. Bram De Blander Sales Engineer

Introducing. Secure Access. for the Next Generation. Bram De Blander Sales Engineer Introducing Secure Access for the Next Generation Bram De Blander Sales Engineer bdeblander@pulsesecure.net What CIOs are asking Mobility Cloud Apps IoT Is our firewall security and EMM system good enough?

More information

Secure wired and wireless networks with smart access control

Secure wired and wireless networks with smart access control Secure wired and wireless networks with smart access control Muhammad AbuGhalioun Senior Presales Consultant Hewlett-Packard Enterprise Aruba Saudi Arabia Managing risk in today s digital enterprise Increasingly

More information

USP Network Authentication System & MobileIron. Good for mobile security solutions

USP Network Authentication System & MobileIron. Good for mobile security solutions USP Network Authentication System & MobileIron Good for mobile security solutions Content About United Security Providers Today s network security challenges USP Network Authentication System Access control

More information

Securing the Corporate WLAN in a Healthcare Regulated Organization

Securing the Corporate WLAN in a Healthcare Regulated Organization Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Securing

More information

HOW-TO-GUIDE: demonstrating Fabric Attach using OpenVSwitch

HOW-TO-GUIDE: demonstrating Fabric Attach using OpenVSwitch HOW-TO-GUIDE: demonstrating Fabric Attach using OpenVSwitch 1 Target audience System Engineers interested to understand the Fabric Attach (FA) technology and/or for demo proposes. Why does it make sense

More information

ONE POLICY. Tengku Shahrizam, CCIE Asia Borderless Network Security 20 th June 2013

ONE POLICY. Tengku Shahrizam, CCIE Asia Borderless Network Security 20 th June 2013 ONE POLICY Tengku Shahrizam, CCIE Asia Borderless Network Security 20 th June 2013 Agenda Secure Unified Access with ISE Role-Based Access Control Profiling TrustSec Demonstration How ISE is Used Today

More information

SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE

SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE March 2018 Table of Contents Introduction...1 Design...2 Use Cases...2 Underlay...3 Overlay...3 Dynamic Segmentation...3 Non-Stop Networking...4 Summary...5

More information

2012 Cisco and/or its affiliates. All rights reserved. 1

2012 Cisco and/or its affiliates. All rights reserved. 1 2012 Cisco and/or its affiliates. All rights reserved. 1 Policy Access Control: Challenges and Architecture UA with Cisco ISE Onboarding demo (BYOD) Cisco Access Devices and Identity Security Group Access

More information

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves

905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in use for work and home globally by 2017 Before Now 32% of

More information

TITLE GOES HERE RUCKUS CLOUDPATH ENROLLMENT SYSTEM. The only integrated security and policy management platform that delivers: COMPRISED OF:

TITLE GOES HERE RUCKUS CLOUDPATH ENROLLMENT SYSTEM. The only integrated security and policy management platform that delivers: COMPRISED OF: CASE STUDY Ruckus Enrollment System (ES) software is a security and policy management platform that enables IT to easily and definitively secure the network, secure users and secure wired and wireless

More information

Phil Schwan Technical

Phil Schwan Technical Phil Schwan Technical Architect pschwan@projectleadership.net @philschwan Today s challenges Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources.

More information

The Context Aware Network A Holistic Approach to BYOD

The Context Aware Network A Holistic Approach to BYOD The Context Aware Network A Holistic Approach to BYOD Trends Bring Your Own Device BYOD at Cisco Cisco BYOD Solution Use Cases Summary Trends #CiscoPlusCA Demand for Mobility 15 billion new networked mobile

More information

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017

Thomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017 Thomas Lippert Principal Product Manager Sophos Mobile Spring 2017 Market Overview Trends Security or data breaches involving mobile devices are on the rise More people use mobile devices for work than

More information

Enterprise Guest Access

Enterprise Guest Access Data Sheet Published Date July 2015 Service Overview Whether large or small, companies have guests. Guests can be virtually anyone who conducts business with the company but is not an employee. Many of

More information

Visibility, control and response

Visibility, control and response Visibility, control and response Protecting Clients and Unifying Policy Tomas Muliuolis Baltics Lead September 2018 Today s Escalating Customer Challenges Advanced attacks and unforeseen threats continue

More information

Delivering a Secure BYOD Solution with XenMobile MDM and Cisco ISE

Delivering a Secure BYOD Solution with XenMobile MDM and Cisco ISE Delivering a Secure BYOD Solution with XenMobile MDM and Cisco ISE Bhumik Patel Solutions Architect, Citrix Systems May 21 st 2013 App Complete Enterprise Mobility Business Apps Productivity and Collaboration

More information

Support Device Access

Support Device Access Personal Devices on a Corporate Network (BYOD), on page 1 Personal Device Portals, on page 2 Support Device Registration Using Native Supplicants, on page 8 Device Portals Configuration Tasks, on page

More information

Release Notes for Avaya WLAN 9100 Software Patch Release WLAN Release Notes

Release Notes for Avaya WLAN 9100 Software Patch Release WLAN Release Notes WLAN 9100 Release Notes Release Notes for Avaya WLAN 9100 Software Patch Release AP Operating System Rel 7.2.8 Wireless LAN Orchestration System Rel 7.4.2 Avaya Inc - External Distribution Avaya Inc -

More information

Identity Based Network Access

Identity Based Network Access Identity Based Network Access Identity Based Network Access - Agenda What are my issues Cisco ISE Power training What have I achieved What do I want to do What are the issues? Guest Student Staff Contractor

More information

ClearPass Ecosystem. Tomas Muliuolis HPE Aruba Baltics lead

ClearPass Ecosystem. Tomas Muliuolis HPE Aruba Baltics lead ClearPass Ecosystem Tomas Muliuolis HPE Aruba Baltics lead 2 Changes in the market create paradigm shifts 3 Today s New Behavior and Threats GenMobile Access from anywhere? BYOD Trusted or untrusted? Bad

More information

Avaya Networking Update. Peter Pauhof Westcon, Lednice 07/2014

Avaya Networking Update. Peter Pauhof Westcon, Lednice 07/2014 Avaya Networking Update Peter Pauhof Westcon, Lednice 07/2014 Status Quo Enterprise Architecture of Today Proprietary Fabric Traditional WAN Or Stitched Overlay Traditional IP Network Generic NAC And proprietary

More information

BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013

BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013 BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013 Bring Your Own???? 2 Bring Your Own Device cannot be ignored About 50% Workers

More information

Mobile Security using IBM Endpoint Manager Mobile Device Management

Mobile Security using IBM Endpoint Manager Mobile Device Management Mobile Security using IBM Endpoint Manager Mobile Device Management Mahendra Chopra Security Solution Architect @ IBM CIO Lab, Innovation mahendra.chopra@in.ibm.com Agenda Market Trends Mobile Security?

More information

ForeScout Extended Module for MobileIron

ForeScout Extended Module for MobileIron Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

The Aruba S3500 Mobility Access Switch

The Aruba S3500 Mobility Access Switch Tech Brief Enterprise The Aruba S3500 Mobility Access Switch Tech Brief: The Aruba S3500 Mobility Access Switch Table of Contents Introducing the Aruba S3500 Mobility Access Switch... 2 Flexible deployment

More information

Vodafone Secure Device Manager Administration User Guide

Vodafone Secure Device Manager Administration User Guide Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of June 2017. Vodafone Ready Business Contents Introduction 3 Help 4 How to find help in the Vodafone Secure

More information

Borderless Networks. Tom Schepers, Director Systems Engineering

Borderless Networks. Tom Schepers, Director Systems Engineering Borderless Networks Tom Schepers, Director Systems Engineering Agenda Introducing Enterprise Network Architecture Unified Access Cloud Intelligent Network & Unified Services Enterprise Networks in Action

More information

WAP9112/9114 Quick Start Guide

WAP9112/9114 Quick Start Guide WAP9112/9114 Quick Start Guide Release 7.6 NN47252-308 Issue 02.01 March 2016 Contents Chapter 1: Introduction... 3 Chapter 2: Required Software Components... 4 Chapter 3: Installing or Upgrading Wireless

More information

ISE Version 1.3 Self Registered Guest Portal Configuration Example

ISE Version 1.3 Self Registered Guest Portal Configuration Example ISE Version 1.3 Self Registered Guest Portal Configuration Example Document ID: 118742 Contributed by Michal Garcarz and Nicolas Darchis, Cisco TAC Engineers. Feb 13, 2015 Contents Introduction Prerequisites

More information

CLEARPASS EXCHANGE. Open third party integration for endpoint controls, policy and threat prevention SOLUTION OVERVIEW MAKE BETTER-INFORMED DECISIONS

CLEARPASS EXCHANGE. Open third party integration for endpoint controls, policy and threat prevention SOLUTION OVERVIEW MAKE BETTER-INFORMED DECISIONS Open third party integration for endpoint controls, policy and threat prevention While billions of Wi-Fi enabled smartphones and tablets connect to enterprise networks, it s a major challenge to ensure

More information

CLEARPASS GUEST. A ClearPass Policy Manager Application DATA SHEET KEY FEATURES THE CLEARPASS ADVANTAGES

CLEARPASS GUEST. A ClearPass Policy Manager Application DATA SHEET KEY FEATURES THE CLEARPASS ADVANTAGES A ClearPass Policy Manager Application ClearPass Guest is a scalable, easy-to-use visitor management solution that delivers secure automated guest access workflows for visitors, contractors, partners,

More information

NETWORK SENTRY KNOWN ANOMALIES. Network Sentry /8.2.9 Agent Analytics Rev: G 9/26/2018

NETWORK SENTRY KNOWN ANOMALIES. Network Sentry /8.2.9 Agent Analytics Rev: G 9/26/2018 RELEASE NOTES NETWORK SENTRY KNOWN ANOMALIES Network Sentry 8.1.12/8.2.9 Agent 5.0.5 Analytics 5.0.0 Rev: G 9/26/2018 For further information, please contact Bradford Networks Customer Support at 866-990-3799

More information

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often

More information

Avaya 7691X Exam. Volume: 65 Questions. Question: 1 Which processes are used to upgrade the Ignition Server firmware?

Avaya 7691X Exam. Volume: 65 Questions. Question: 1 Which processes are used to upgrade the Ignition Server firmware? Volume: 65 Questions Question: 1 Which processes are used to upgrade the Ignition Server firmware? A. 1) Open the Upgrade Firmware view of Dashboard. 2) Select Configuration Hierarchy. 3) Launch the Firmware

More information

Alcatel-Lucent OmniVista Cirrus Simple, secure cloud-based network management as a service

Alcatel-Lucent OmniVista Cirrus Simple, secure cloud-based network management as a service Alcatel-Lucent OmniVista Cirrus Simple, secure cloud-based network management as a service Alcatel-Lucent OmniVista Cirrus is a scalable, resilient, secure cloud-based network management for unified access

More information

LCOS 8.82 RC1 Feature Notes.

LCOS 8.82 RC1 Feature Notes. Feature Notes www.lancom.de Introduction The LANCOM operating system LCOS and the corresponding management tools (LCMS) regularly provide free new functions for current LANCOM routers, access points, and

More information

NETWORK DESIGNS AND DEPLOYMENTS

NETWORK DESIGNS AND DEPLOYMENTS DATA CENTER SOLUTIONS NETWORK DESIGNS AND DEPLOYMENTS Fabrizio Fiori Global Director SDN Fx Solutions Software Defined Architecture Gates Zeng Corporate Solutions Technologist Cloud Networking Evangelist

More information

CounterACT Afaria MDM Plugin

CounterACT Afaria MDM Plugin Version 1.7.0 and Above Table of Contents About Afaria MDM Service Integration... 4 About This Plugin... 4 How It Works... 5 Continuous Query Refresh... 5 Offsite Device Management... 6 Supported Devices...

More information

WLAN Security Preparing For BYOD and IoT

WLAN Security Preparing For BYOD and IoT Next Presentation Begins at 13:00 WLAN Security Preparing For BYOD and IoT Mathew Edwards, Product Marketing Manager & Gregor Vucajnk, Global Training Manager Your Past and possibly present ANYTIME ANYWHERE

More information

User Directories and Campus Network Authentication - A Wireless Case Study

User Directories and Campus Network Authentication - A Wireless Case Study User Directories and Campus Network Authentication - A Wireless Case Study Sean Convery Identity Engines Kevin Jones Metropolitan Community College Agenda Role-based Access Control About MCC Wireless project

More information

Pulse Policy Secure X Network Access Control (NAC) White Paper

Pulse Policy Secure X Network Access Control (NAC) White Paper Pulse Policy Secure 802.1X Network Access Control (NAC) White Paper Introduction The growing mobility trend has created a greater need for many organizations to secure and manage access for both users

More information

Forescout. eyeextend for VMware AirWatch. Configuration Guide. Version 1.9

Forescout. eyeextend for VMware AirWatch. Configuration Guide. Version 1.9 Forescout Version 1.9 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Secure Access - Update

Secure Access - Update Secure Access - Update for people, devices, things and services Jonas Gyllenhammar Senior Consultant Engineer - Specialist The New Reality All Major OSs One Client On-the-go Home network Untrusted LAN

More information

Cisco SD-Access Building the Routed Underlay

Cisco SD-Access Building the Routed Underlay Cisco SD-Access Building the Routed Underlay Rahul Kachalia Sr. Technical Leader Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the

More information

AT&T SD-WAN Network Based service quick start guide

AT&T SD-WAN Network Based service quick start guide AT&T SD-WAN Network Based service quick start guide After you order your AT&T SD-WAN Network Based service, you can: Create administrator accounts Log in to the SD-WAN orchestrator Configure business policy

More information

Cisco Secure Access Control

Cisco Secure Access Control Cisco Secure Access Control Delivering Deeper Visibility, Centralized Control, and Superior Protection Martin Briand - Security Escalation VSE Global Virtual Engineering Oriol Madriles Soriano Security

More information

Cisco ISE Ports Reference

Cisco ISE Ports Reference Cisco ISE Infrastructure Cisco ISE Infrastructure, on page 1 Cisco ISE Administration Node Ports, on page 2 Cisco ISE Monitoring Node Ports, on page 4 Cisco ISE Policy Service Node Ports, on page 5 Inline

More information

WHY YOUR NAC PROJECTS KEEP FAILING: ADDRESSING PRODUCTS, PEOPLE, PROCESSES

WHY YOUR NAC PROJECTS KEEP FAILING: ADDRESSING PRODUCTS, PEOPLE, PROCESSES SESSION ID: TECH-W14 WHY YOUR NAC PROJECTS KEEP FAILING: ADDRESSING PRODUCTS, PEOPLE, PROCESSES Jennifer Minella VP of Engineering & Security Carolina Advanced Digital, Inc. @jjx securityuncorked.com @CADinc

More information

ClearPass Design Scenarios

ClearPass Design Scenarios ClearPass Design Scenarios Austin Hawthorne Feb 26, 2015 Agenda 1. Better user experience and tighter security, is that possible? 2. Employees on Guest Network 3. The headless device dilemma 2 CONFIDENTIAL

More information

Certificate Enrollment for the Atlas Platform

Certificate Enrollment for the Atlas Platform Certificate Enrollment for the Atlas Platform Certificate Distribution Challenges Digital certificates can provide a secure second factor for authenticating connections from MAP-wrapped enterprise apps

More information

How a Unified Wired and Wireless Architecture Addresses BYOD

How a Unified Wired and Wireless Architecture Addresses BYOD How a Unified Wired and Wireless Architecture Addresses BYOD John W. Turner Brandeis University www.linkedin.com/in/johnwturner1 @johnwturner Airheads Social ID: turner Mobility Trends Birthplace of BYOD

More information

Forescout. eyeextend for IBM MaaS360. Configuration Guide. Version 1.9

Forescout. eyeextend for IBM MaaS360. Configuration Guide. Version 1.9 Forescout Version 1.9 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

RUCKUS CLOUD WI-FI Cloud Managed Wi-Fi

RUCKUS CLOUD WI-FI Cloud Managed Wi-Fi TITLE GOES HERE SUB-TITLE GOES HERE RUCKUS CLOUD WI-FI Cloud Managed Wi-Fi SIMPLIFIED MANAGEMENT OF MULTI-SITE WI-FI NETWORKS Ruckus Cloud Wi-Fi simplifies deployment, monitoring and management of your

More information

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 Guide to Deploying VMware Workspace ONE DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Configuring Client Profiling

Configuring Client Profiling Prerequisites for, page 1 Restrictions for, page 2 Information About Client Profiling, page 2, page 3 Configuring Custom HTTP Port for Profiling, page 4 Prerequisites for By default, client profiling will

More information

Mobility First How Tomorrow Moves for Education

Mobility First How Tomorrow Moves for Education Mobility First How Tomorrow Moves for Education Presented by: Sponsored by: CONFIDENTIAL Copyright 2016. Aruba Networks, an HP Company. All rights reserved GENMOBILE IS AT THE HEART OF OUR TECHNOLOGY STRATEGY

More information

AVAYA SDN Fx HEALTHCARE SOLUTION BRIEF

AVAYA SDN Fx HEALTHCARE SOLUTION BRIEF AVAYA SDN Fx HEALTHCARE SOLUTION BRIEF A 2015 report cited by Government Health IT 1 indicates that: 21% of all breaches globally are in the healthcare industry 34% of total healthcare records globally

More information

QuickSpecs. Aruba ClearPass Guest Software. Overview. Aruba ClearPass Guest Software A ClearPass Policy Manager Application.

QuickSpecs. Aruba ClearPass Guest Software. Overview. Aruba ClearPass Guest Software A ClearPass Policy Manager Application. Overview A ClearPass Policy Manager Application Product overview ClearPass Guest is a scalable, easy-to-use visitor management solution that delivers secure automated guest access workflows for visitors,

More information

MR Cloud Managed Wireless Access Points

MR Cloud Managed Wireless Access Points Datasheet MR Series MR Cloud Managed Wireless Access Points Overview The Meraki MR series is the world s first enterprise-grade line of cloud-managed WLAN access points. Designed for challenging enterprise

More information

THE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017

THE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017 THE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017 The Network. Intuitive. Constantly learning, adapting and protecting. L E A R

More information

A. Post-Onboarding. the device wit be assigned the BYOQ-Provision firewall role in me Aruba Controller.

A. Post-Onboarding. the device wit be assigned the BYOQ-Provision firewall role in me Aruba Controller. Volume: 98 Questions Question: 1 Based on the ClearPass and Aruba Controller configuration settings for On boarding shown, which statement accurate describes an employee's new personal device connecting

More information

Security and Control for all Devices on the Access Network

Security and Control for all Devices on the Access Network Security and Control for all Devices on the Access Network DATASHEET Aerohive A3 Aerohive A3 Aerohive A3 is an innovative solution for securing, managing and controlling all devices on your Access Network

More information

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance. Real-time Visibility Network Access Control Endpoint Compliance Mobile Security ForeScout CounterACT Continuous Monitoring and Mitigation Rapid Threat Response Benefits Rethink IT Security Security Do

More information

Alcatel-Lucent OmniVista Cirrus Simple, secure cloud-based network management as a service

Alcatel-Lucent OmniVista Cirrus Simple, secure cloud-based network management as a service Alcatel-Lucent OmniVista Cirrus Simple, secure cloud-based network management as a service Alcatel-Lucent OmniVista Cirrus is a scalable, resilient, secure cloud-based network management for unified access

More information

BYOD: Management and Control for the Use and Provisioning of Mobile Devices

BYOD: Management and Control for the Use and Provisioning of Mobile Devices BYOD: Management and Control for the Use and Provisioning of Mobile Devices Imran Bashir Technical Marketing Engineer BYOD: Management and Control for the Use and Provisioning of Mobile Devices -- 3:30

More information

Creating Wireless Networks

Creating Wireless Networks WLANs, page 1 Creating Employee WLANs, page 2 Creating Guest WLANs, page 4 Internal Splash Page for Web Authentication, page 7 Managing WLAN Users, page 9 Adding MAC for Local MAC Filtering on WLANs, page

More information

Set Up Cisco ISE in a Distributed Environment

Set Up Cisco ISE in a Distributed Environment Cisco ISE Deployment Terminology, page 1 Personas in Distributed Cisco ISE Deployments, page 2 Cisco ISE Distributed Deployment, page 2 Configure a Cisco ISE Node, page 5 Administration Node, page 8 Policy

More information

Managing BYOD Networks

Managing BYOD Networks Managing BYOD Networks SPS-2013 Raghu Iyer raghu.iyer@nevisnetworks.com 1 What is BYOD Bring Your Own Device Are you allowing a Rogue? SPS-2013 Raghu Iyer raghu.iyer@nvisnetworks.com 2 Why BYOD Increased

More information

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing

More information

Aerohive and IntelliGO End-to-End Security for devices on your network

Aerohive and IntelliGO End-to-End Security for devices on your network Aerohive and IntelliGO End-to-End Security for devices on your network Introduction Networks have long used a password to authenticate users and devices. Today, many cyber attacks can be used to capture

More information

NNTF12_51 SIMPLY CONNECTED IN ACTION : AN OVERVIEW OF DIFFERENT USE-CASES. Tim McCarthy

NNTF12_51 SIMPLY CONNECTED IN ACTION : AN OVERVIEW OF DIFFERENT USE-CASES. Tim McCarthy NNTF12_51 SIMPLY CONNECTED IN ACTION : AN OVERVIEW OF DIFFERENT USE-CASES Tim McCarthy MAJOR MARKET TRENDS DATA MOBILITY AND SCALE AT AN ALL TIME HIGH AND GROWING Sophisticati on (Maturity) Device Proliferation

More information

Bring Your Own Design: Implementing BYOD Without Going Broke or Crazy. Jeanette Lee Sr. Technical Marketing Engineer Ruckus Wireless

Bring Your Own Design: Implementing BYOD Without Going Broke or Crazy. Jeanette Lee Sr. Technical Marketing Engineer Ruckus Wireless Bring Your Own Design: Implementing BYOD Without Going Broke or Crazy Jeanette Lee Sr. Technical Marketing Engineer Ruckus Wireless Taking the Scary out of BYOD What Enterprises REALLY Want 1 2 3 4 5 6

More information

Dolby Conference Phone 3.1 configuration guide for West

Dolby Conference Phone 3.1 configuration guide for West Dolby Conference Phone 3.1 configuration guide for West 17 January 2017 Copyright 2017 Dolby Laboratories. All rights reserved. For information, contact: Dolby Laboratories, Inc. 1275 Market Street San

More information

Access Guardian and BYOD in AOS Release 8.1.1

Access Guardian and BYOD in AOS Release 8.1.1 Access Guardian and BYOD in AOS Release 8.1.1 Configuration Guide through Use Cases Copyright 2014 by Alcatel-Lucent All rights reserved Alcatel-Lucent, 26801 West Agoura Road, Calabasas, CA 91301, USA

More information

BEST PRACTICE - NAC AUF ARUBA SWITCHES. Rollenbasierte Konzepte mit Aruba OS Switches in Verbindung mit ClearPass Vorstellung Mobile First Features

BEST PRACTICE - NAC AUF ARUBA SWITCHES. Rollenbasierte Konzepte mit Aruba OS Switches in Verbindung mit ClearPass Vorstellung Mobile First Features BEST PRACTICE - NAC AUF ARUBA SWITCHES Rollenbasierte Konzepte mit Aruba OS Switches in Verbindung mit ClearPass Vorstellung Mobile First Features Agenda 1 Overview 2 802.1X Authentication 3 MAC Authentication

More information

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware

More information

Make Wi-Fi Simple and Secure for Google Apps, BYOD, and More. 21 April 2016

Make Wi-Fi Simple and Secure for Google Apps, BYOD, and More. 21 April 2016 Make Wi-Fi Simple and Secure for Google Apps, BYOD, and More 21 April 2016 Today s Speaker Bruce Miller VP Product Marketing Xirrus, Inc. bruce.miller@xirrus.com @bmiller715 2 Agenda 1 2 3 4 5 6 7 Introduction

More information

VMware AirWatch Android Platform Guide

VMware AirWatch Android Platform Guide VMware AirWatch Android Platform Guide Workspace ONE UEM v9.4 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

ARUBA INSTANT Combining enterprise-class Wi-Fi with unmatched affordability and configuration simplicity

ARUBA INSTANT Combining enterprise-class Wi-Fi with unmatched affordability and configuration simplicity ARUBA INSTANT Combining enterprise-class Wi-Fi with unmatched affordability and configuration simplicity Table of Contents Introduction... 3 Aruba Instant Overview... 4 Aruba Instant APs... 4 Adaptive

More information

CONFERENCING: THE PATH FORWARD. Mike Wasserburger

CONFERENCING: THE PATH FORWARD. Mike Wasserburger CONFERENCING: THE PATH FORWARD Mike Wasserburger Thank you Sponsors! Global Sponsors Gold Sponsors Silver Sponsors Join the Conversation @Avaya #AvayaATF Complete your survey at the end of the session

More information

Your wireless network

Your wireless network Your wireless network How to ensure you are meeting Government security standards Cabinet Office best practice Wi-Fi guidelines Overview Cyber Security is a hot topic but where do you start? The Cabinet

More information

RSA Authentication Manager 8.2

RSA Authentication Manager 8.2 RSA Authentication Manager 8.2 Over 25,000 customers 50 60 million active tokens in circulation 10 million units shipped per year More than 50% market share RSA Ready Partner Program: 400 Partners with

More information

Cloud Mobility: Meraki Wireless & EMM

Cloud Mobility: Meraki Wireless & EMM BRKEWN-2002 Cloud Mobility: Meraki Wireless & EMM Emily Sporl Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile

More information

HiveManager Public Cloud

HiveManager Public Cloud D ATA S H E E T HiveManager Public Cloud Enterprise Access Network Management Offering Intuitive Configuration Workflows, Real-Time & Historical Monitoring, and Simplified Troubleshooting DATASHEET HiveManager

More information

Cisco ISE Ports Reference

Cisco ISE Ports Reference Cisco ISE Infrastructure, page 1 Cisco ISE Administration Node Ports, page 2 Cisco ISE Monitoring Node Ports, page 4 Cisco ISE Policy Service Node Ports, page 5 Cisco ISE pxgrid Service Ports, page 10

More information