DELIVERING SECURE ELASTIC NETWORKS
|
|
- Cora Stanley
- 5 years ago
- Views:
Transcription
1 DELIVERING SECURE ELASTIC NETWORKS Shmulik Contact vcard Shmulik Nehama Identity Engines Portfolio Leader Avaya Networking 1
2 Thank you Sponsors! Global Sponsors Gold Sponsors Silver Sponsors
3 Join the #AvayaATF
4 SECURE ELASTIC NETWORKS OPTIMIZING END USER & IT EXPERIENCES NETWORK FLEXIBILITY Elastic Networks Fast, Automation & Security with Identity Engines USER & IT EXPERIENCE NETWORK SECURITY Control WHO gets access, from WHERE, and with WHAT NETWORK SIMPLICITY Automate BYOD and IOT onboarding Avaya Fabric Networking Delivers the Architecture, Capacity & Control to Optimize the IT and End User Experiences 2016 Avaya Inc. All right reserved 4
5 CUSTOMER NETWORK EDGE CHALLENGES INFLEXIBILITY Traditional Networking Complex & Inflexible Time consuming and error prone to enable new services Many complex protocols to manage Lacks end to end virtualization and security Long Convergence Times Unable to support Internet of Things Services Manual network provisioning for the access & core 2016 Avaya Inc. All right reserved 5
6 CUSTOMER NETWORK EDGE CHALLENGES SECURITY RISKS FROM TO Corporate Computer Corporate Computer Personal Phone Personal Tablet Significant Growth in Mobile Devices & Applications Business & Personal Applications Becoming Intermixed 2016 Avaya Inc. All right reserved 6
7 CUSTOMER NETWORK EDGE CHALLENGES SECURITY RISKS Increasing global security concerns BYOD is here to stay!! Mandates the need to protect IT infrastructure However, it is also imperative to provide Great IT Experience Great User experience Network Completely Open Network Completely Locked Policy-based Access 2016 Avaya Inc. All right reserved 7
8 CUSTOMER NETWORK EDGE CHALLENGES COMPLEXITY FROM TO 2016 Avaya Inc. All right reserved 8
9 CUSTOMER NETWORK EDGE CHALLENGES COMPLEXITY Billions Billions of IOT devices by 2020 Wired and Wireless Network of Everything (wired and wireless) Badge Scanners Smart Signs Smart Lights (POE-based) Medical Devices Ceiling Fans IP Cameras IP Phones Printers With so many network attached devices, the need for Edge Automation is greater than ever 2016 Avaya Inc. All right reserved 9
10 IDENTITY ENGINES QUICK BASICS Vendor Agnostic Any Network Vendor Any User Any Device Wired & Wireless Unified Access Centralized Policy Directory Federation All major directory servers MDM AirWatch, Citrix Identity Routing Virtual Mapping Guest Access Self-service Sponsor / Front Desk Audit logs Virtual Appliance Software-based solution VMware ESXi BYOD Device On-boarding Device Fingerprinting non-802.1x access 2016 Avaya Inc. All right reserved 10
11 IDENTITY ENGINES SECURE ACCESS, INTERNET OF THINGS, ANALYTICS IF (identity = HR employee) AND IF (device = corp laptop) AND IF (medium = wired) THEN GRANT CORPORATE ACCESS IF (device = MDM enrolled) AND IF (device = has pin-lock) AND IF (device = is not Jail-broken) THEN GRANT CORPORATE ACCESS IF (identity = HR employee) AND IF (device = personal ipad) AND IF (medium = wireless) THEN GRANT LIMITED ACCESS IF (device = Vending Machine) OR (device = POE Lighting) AND IF (building = main campus) THEN GRANT NETWORK SERVICE 2016 Avaya Inc. All right reserved 11
12 IDENTITY ENGINES IDENTITY & POLICY BASED ACCESS Advanced Policy Engine Based on firewall concepts High Availability Active-Active Active-Standby Not inline 2016 Avaya Inc. All right reserved 12
13 SECURE ELASTIC NETWORKS OPTIMIZING END USER & IT EXPERIENCES NETWORK FLEXIBILITY Elastic Networks Fast, Automation & Security with Identity Engines USER & IT EXPERIENCE NETWORK SECURITY Control WHO gets access, from WHERE, and with WHAT NETWORK SIMPLICITY Automate BYOD and IOT onboarding Avaya Fabric Networking Delivers the Architecture, Capacity & Control to Optimize the IT and End User Experiences 2016 Avaya Inc. All right reserved 13
14 TRADITIONAL VS. FABRIC NETWORKING COMPLEX & INFLEXIBLE VS. SIMPLE & FLEXIBLE Time consuming and error prone to enable new services Many complex protocols to manage Lacks end to end virtualization and security Long Convergence Times Unable to support Internet of Things Services Manual network provisioning for the access & core Traditional Networking Complex & Inflexible Fabric Networking Simple & Flexible Unified network fabric no wireless overlay with disparate capabilities Reduced risk provision endpoint only not hop by hop Improved network control single protocol and FIB Increased performance no controller bottleneck Reduced latency no controller looping of traffic Improved resiliency no single point of controller failure Enhanced security Secure Elastic Network Enabled BYOD Identity Engines 2016 Avaya Inc. All right reserved 14
15 ELASTIC NETWORKS WITH FABRIC ATTACH SIMPLE & FLEXIBLE WITH IDENTITY ENGINES Fabric Attach allows automated network attachment with or without Fabric Connect. Fabric Attach Elements: FA Server An SPB switch at the Fabric edge running an FA agent in FA Server mode. FA Server creates ISID/VLAN bindings based FA Signaling. FA Proxy A non-spb switch at the network edge (wiring closet) running an FA agent in FA Proxy mode. FA Proxy supports directly attached users, end devices and FA Clients. FA Proxy supports FA Signaling with FA Server and FA Clients. FA Client - A network attached end device running an FA agent in FA Client mode. FA Client can be Avaya WLAN 9100 APs, ONA, Hypervisors supporting FA Client on Open vswitch, or other future planned 3 rd party devices. FA Policy Server Avaya Identity Engines network access policy server fully automates Fabric Attach. FA-Client(s) FA Signaling FA-Proxy FA Signaling FA-Server Fabric Connect Fabric Attach DHCP WOS Avaya Fabric Connect FA-Policy Server Devices (non-fa endpoints) FA Policy Signalling FA Policy Signalling FA Signaling - Protocol that leverages standard extension of network protocols to exchange msgs and data between FA Elements to orchestrate network automation Avaya Inc. All right reserved 15
16 ELASTIC NETWORKS WITH FABRIC ATTACH FA ELEMNT MODEL & FA SIGNALING Fabric Attach elements are FA agent roles in devices Below are all the FA elements required to create a Fabric Attach solution with the supported element interconnections (tiers). Adhere to this FA architectural model when designing FA solutions end to end with an SPB Fabric Connect Core. SPB Device Non-SPB Device Non-SPB Device SPB Fabric FA Server (BEB) FA Proxy FA Client FA Client SPBM LLDP Control plane I-SID VLAN Services Data plane FA TLV Element Type TLV Type [127] TLV Length [50 octets] Avaya OUI [ D] Subtype [11] HMAC-SHA256 Digest Element Type State Mgmt VLAN Reserved System ID 7 bits 9 bits 3 octets 1 octet 32 octets 6 bits 6 bits 12 bits 1 octet 10 octets FA Client - Access Point (6) Data integrity and source validation FA Client - Switch (8) using HMAC-HA256 FA Client - IP Phone (10) FA Client MAC address Symmetric private keys are used for FA Client - IP Camera (11) of the network interface digest generation FA Client - IP Video (12) 2016 Avaya Inc. All right reserved FA Client - Virtual Switch (14) 16
17 ELASTIC NETWORKS WITH FABRIC ATTACH FA ELEMNT MODEL & FA SIGNALING Fabric Attach elements are FA agent roles in devices Below are all the FA elements required to create a Fabric Attach solution with the supported element interconnections (tiers). Adhere to this FA architectural model when designing FA solutions end to end with an SPB Fabric Connect Core. SPB Device Non-SPB Device Non-SPB Device SPB Fabric FA Server (BEB) FA Proxy FA Client FA Client SPBM LLDP Control plane I-SID VLAN Services Data plane FA TLV VLAN-SID Assignment TLV Type [127] TLV Length octets Avaya OUI [ D] Subtype [12] HMAC-SHA256 Digest Assignment Status 7 bits 9 bits 3 octets 1 octet 32 octets 4 bits 12 bits 3 octets VLAN ISID Assignment status data returned by the FA Server for Data integrity and source validation each pending ISID/VLAN assignment. Requested VLAN Example of potential values: using HMAC-HA256 Requested ISID to have VLAN Assignment accepted (2) Symmetric private keys are used for Rejection: Duplicate data (5) traffic mapped to on the FA digest generation 2016 Avaya Inc. All right reserved Rejection: VLAN invalid (6) Server switch Rejection: VLAN resources unavailable (8) 17
18 ELASTIC NETWORKS WITH FABRIC ATTACH IDENTITY ENGINES FA POLICY SERVER IDE as Fabric Attach Policy Server IDE can be added as a centralized Policy engine to fully automate the attachement of Non-FA devices & certain FA Clients (such as WLAN 9100 APs). End users and devices that support 802.1X/EAP supplicant/client functions can connect to FA Proxy or FA Server switches, and can be authenticated & attached to specific VLANs and I-SIDs according to IDE Policy rules. SPB Fabric FA Policy Server (IDE) VSP - Fabric edge (switch cluster) FA Server (BEB) vist FA Server (BEB) ERS - Access (wiring closet) FA Proxy OVS / 3 rd Party FA Client ONA FA Client WLAN AP FA Client End devices/users Wired IoT device Non-FA device Laptop/tablet/Smartphone Non-FA device IP Phone/PC/Printer/Camera Non-FA device PC/Server Non-FA device Switch (ERS3510) Non-FA device Non-FA devices can be connected to a switch enabled with Fabric Attach services. However, FA signaling on the FA Server or FA Proxy switch downstream port(s) must be disabled (IE: server/host, or additional ERS off an FA Proxy) Avaya Inc. All right reserved 18
19 ELASTIC NETWORKS WITH FABRIC ATTACH FA POLICY SERVER USERS / DEVICES WITH SPB Adding Identity Engines fully automates provisioning of ISIDs/VLANs and port memberships Automated example Users and end (EAP) devices (MAC/MEAP/FA) are authenticated by IDE and placed in automatically provisioned VLAN/I-SID based on Policy SPB Fabric FA Server VSP4/7/8K vist FA Proxy ERS4800 / 5900 (Wiring Closet) End Users or IOT Devices Alternate vist path FA Policy Server Identity Engines Fabric Attach Management VSN (I-SID) Data VSN (I-SID) Voice VSN (I-SID) VLAN MGMT VLAN 10 VLAN 20 Authenticated users/devices placed in Data VSN Authenticated voice devices placed in Voice VSN On successful authentication of user or device, IDE sends VLAN/ISID mapping to FA Proxy which dynamically creates the VLAN, adds port membership for user/device, uplink port, and also sends request to FA Server to create VLAN/ISID mapping Avaya Inc. All right reserved 19
20 ELASTIC NETWORKS WITH FABRIC ATTACH FA POLICY SERVER USERS / DEVICES WITH SPB FA Policy for IOT Device (non-fa Client) Example of policy for Employees and Contractors 2016 Avaya Inc. All right reserved 20
21 ELASTIC NETWORKS WITH FABRIC ATTACH IDENTITY ENGINES ATTACHING WLAN 9100 AP IDE is used to securely authenticate attachment of new WLAN 9100 series AP s to an FA enabled network. Automated Plug-in AP 9100, IDE authenticates AP, and signals to FA Proxy what VLANs to provision for AP based on policy in IDE. WOS SPB Fabric Alternate vist path FA Server VSP4/7/8K vist FA Proxy ERS4800 / 5900 (Wiring Closet) FA Client AP 9100 End Users or IOT Devices FA Policy Server Identity Engines Fabric Attach Management VSN (I-SID) Data VSN (I-SID) VLAN MGMT VLAN 10 Authenticated users/devices placed in Data VSN Guest VSN (I-SID) VLAN 50 Authenticated users/devices placed in Guest VSN 2016 Avaya Inc. All right reserved 21
22 ELASTIC NETWORKS WITH FABRIC ATTACH IDENTITY ENGINES ATTACHING WLAN 9100 AP FA Client AP 9100 connects to FA Proxy Standalone switch FA Client AP 9100 communicates via FA Signaling with the FA Proxy Standalone switch FA Proxy Standalone discovers and authenticates the FA Client AP 9100 against FA Policy Identity Engines Simple Authentication Secure Authentication FA Policy authorizes AP 9100 with Auto Create VLAN VLAN:ISID pairs PVID AP 9100 obtains DHCP IP AP 9100 discovers WOS AP 9100 registers & downloads profile AP 9100 ready for wireless clients WOS AP Discovery AP Profile FA Signaling DHCP Request DNS Lookup Avaya-WOS FA Policy Ignition Server Authentication Authorization Auto Create VLAN VLAN:ISID pairs PVID FA Proxy Standalone FA Client WLAN AP Avaya Inc. All right reserved 22
23 ELASTIC NETWORKS WITH FABRIC ATTACH IDENTITY ENGINES ATTACHING WLAN 9100 AP FA Policy for FA Client AP 9100 Traditional FA Policy for FA Client AP 9100 Secure 2016 Avaya Inc. All right reserved 23
24 ELASTIC NETWORKS WITH FABRIC ATTACH IDENTITY ENGINES ATTACHING WLAN 9100 AP FA Policy for FA Client AP 9100 Traditional FA Policy for FA Client AP 9100 Secure 2016 Avaya Inc. All right reserved 24
25 ELASTIC NETWORKS WITH FABRIC ATTACH IDENTITY ENGINES FA POLICY TEMPLATES 2016 Avaya Inc. All right reserved 25
26 ELASTIC NETWORKS WITH FABRIC ATTACH IDENTITY ENGINES FA CLIENTS INVENTORY FA Client automated fingerprinting On successful authentication the FA Client device is seen in the FA Client Devices inventory table. Click on Last Seen Authenticator to find out the last switch and location of the FA Client 2016 Avaya Inc. All right reserved 26
27 ELASTIC NETWORKS WITH FABRIC ATTACH IDENTITY ENGINES FA CLIENTS MONITORING The Device Name, Device Type and Subtype are also seen in RADIUS AAA Summary Avaya Inc. All right reserved 27
28 SECURE ELASTIC NETWORKS OPTIMIZING END USER & IT EXPERIENCES NETWORK FLEXIBILITY Elastic Networks Fast, Automation & Security with Identity Engines USER & IT EXPERIENCE NETWORK SECURITY Control WHO gets access, from WHERE, and with WHAT NETWORK SIMPLICITY Automate BYOD and IOT onboarding Avaya Fabric Networking Delivers the Architecture, Capacity & Control to Optimize the IT and End User Experiences 2016 Avaya Inc. All right reserved 28
29 ENTERPRISE MOBILE DEVICE MANAGEMENT SECURING BYOD DEVICES Challenges Associated with Mobility Jail-broken / Rooted device Fragmented OS Unwanted / Wanted Apps Personal / Corporate device Regulatory Compliance Data Containerization Encryption / Passcode HIPPA Access Policy MDM 2016 Avaya Inc. All right reserved 29
30 ENTERPRISE MOBILE DEVICE MANAGEMENT SECURING BYOD DEVICES a User access requests Mobile Devices b Identity Engines RADIUS 3 Fed to PE Database Policy Engine Device sync-up 2 REST APIs 1 Device enrollment MDM Cloud-service / MDM On-premise Server 2016 Avaya Inc. All right reserved 30
31 ACCESS PORTAL EXTERNAL LOGIN EXTERNAL LOGIN FOR WLAN 9100 BENEFITS Device Onboarding with Access Portal Access Portal can now act as an external Captive Portal for WLAN 9100 BYOD onboarding redirect from WLAN 9100 Users get Authenticated and Fingerprinted Works over L2 and L3 network Highly customizable Login Page Highly customizable Success Page Post authentication, user traffic will be out-of-band the Access Portal and in line with WLAN AP Avaya Inc. All right reserved 31
32 ACCESS PORTAL EXTERNAL LOGIN EXTERNAL LOGIN FOR WLAN 9100 HOW IT WORKS? Ignition Server User Devices AP 9100 Access Portal 2016 Avaya Inc. All right reserved 32
33 ACCESS PORTAL SOCIAL MEDIA LOGIN SOCIAL MEDIA LOGIN FOR WLAN 9100 BENEFITS Guest Access with Social Media Login Benefits of Access Portal Social Media Login for WLAN 9100 BYOD onboarding redirect from WLAN 9100 Users get Authenticated and Fingerprinted Works over L2 and L3 network Highly customizable Login Page Highly customizable Success Page No need for user / front desk to create guest account Feed for Analytics Social Media login requires user consent Basic user information retrieved from Social Media site Plans to feed Analytics with Social Media user attributes Post authentication, user traffic will be out-of-band the Access Portal and in line with WLAN AP Avaya Inc. All right reserved 33
34 ACCESS PORTAL SOCIAL MEDIA LOGIN SOCIAL MEDIA LOGIN FOR WLAN 9100 HOW IT WORKS? 2016 Avaya Inc. All right reserved 34
35 ACCESS PORTAL ADDITIONAL ENHANCEMENTS Lightspeed Integration Standard-based feed to Security Gateways for Content Filtering Override NATing Configurable as separate RADIUS Accounting server User Custom VSA Obtain user input prior to granting access Use case example Schedule for Backups Consistent with Ignition Server and Guest Manager Recurring configurable schedule Example of customized login Maintenance networks are segregated Contractor arrives onsite to perform maintenance work Contractor selects the network needed for access Identity Engines confirms access rights and grants appropriate access 2016 Avaya Inc. All right reserved 35
36 SECURE ELASTIC NETWORKS OPTIMIZING END USER & IT EXPERIENCES NETWORK FLEXIBILITY Elastic Networks Fast, Automation & Security with Identity Engines USER & IT EXPERIENCE NETWORK SECURITY Control WHO gets access, from WHERE, and with WHAT NETWORK SIMPLICITY Automate BYOD and IOT onboarding Avaya Fabric Networking Delivers the Architecture, Capacity & Control to Optimize the IT and End User Experiences 2016 Avaya Inc. All right reserved 36
37 SIMPLIFYING DEVICE ONBOARDING IDENTITY ENGINES SMARTPHONE APP User can use QR code scanner to auto populate MAC address and device name. QR code scanner can only parse Avaya supported QR code format. QR Code Format for ONA with example data: SERIAL:X A2A0 MAC:48:C0:93:00:A2:00 MACNUM:16 PEC:EC E6 MAN:AVAYA MOD:ONA 1101GT REV: Avaya Inc. All right reserved 37
38 SIMPLIFYING DEVICE ONBOARDING IDENTITY ENGINES SMARTPHONE APP WLAN 9100 APs ship with QR code label 2016 Avaya Inc. All right reserved 38
39 SIMPLIFYING DEVICE ONBOARDING API FOR PROGRAMMATIC PROVISIONING INTO IDE APIs APIs APIs APIs APIs Fetching Provisioning Fetching Devices iteratively or Fetching devices with filter Bulk Delete of Guest Close Cursor Id groups for a Provisioner a Provisioner and without details Users for a Provisioner Fetching Provisioning Group details for Group Name GET Cursor Id of device API to query the status of single device Device Registration GET next N devices API to query the status of multiple devices Fetching Guest User details by username for a Provisioner Fetching Guest Users iteratively for a Provisioner Fetching Guest User with filter Fetching Guest Users with filter and without details Update a device GET first N devices Guest User Registration GET Cursor Id API to query the status of single user Delete a device GET last N devices Re-send Credentials through /SMS to Guest User by Username Deleting multiple Devices GET count of total available Update a Guest User device records GET next N Guest Users GET first N Guest Users API to query the status of multiple users Bulk Delete of devices for a Provisioner Close Cursor Id Delete a Guest User GET last N Guest Users Fetching Device details by MAC for a Provisioner Fetching devices with filter Deleting multiple Guest Users GET count of total available Guest Users Records 2016 Avaya Inc. All right reserved 39 Note: Authorization Scheme : Basic (Base64 Encryption)
40 SIMPLIFYING DEVICE ONBOARDING TWO CLICKS TO ADD DEVICE Network attached device attempts access Users right click on log record to add device to local DB Available from Succeeded & Failed Authentications In addition, edit a device directly 2016 Avaya Inc. All right reserved 40
41 SIMPLIFYING DEVICE ONBOARDING ONBOARD IOT/BYOD DEVICE BASED ON ACCESS POLICY NEW on POR NEW CONCEPT: Access Policy Actions Register Device Add device to IDE local store automatically based on a Access Policy rule Use case example: MAC Learning, more Assign Group(s) Assign a group or groups to a device based on an Access Policy rule Use case example: MAC Learning, BYOD Onboarding, more Trigger COA Disconnect Disconnect device based on a Access Policy rule Use case example: BYOD Onboarding, more Alert Send alert based on a Access Policy rule Use case example: Send alert when device that belongs to STOLEN group attempts to access the network 2016 Avaya Inc. All right reserved 41
42 SMART HEALTHCARE IOT FOR WIRELESS SOLUTION OVERVIEW Easy onboarding & tracking of medical devices and smart traffic tunneling to Central Medical Application Challenges & Benefits addressed Mobility of patient monitors & imaging devices Currently constrained due to manual reconfiguration of network Tracking of medical devices usage, their location & IT compliance Secure traffic segmentation of clinical data and one-hop transport from care-giving area to central application in data center Example: patient vital data, EHS records, imaging Solution Summary Easy & safe on-boarding of WiFi patient monitor (or simulator) into Avaya WLAN 9100 WiFi + ERS 4800/5900 edge network o Fabric Attach based auto onboarding of WLAN 9100 o QR-Code based auto onboarding of medical device using Identity Engines IDR mobile App Smart traffic segmentation & diversion directly into central medical application server (HMS) o Dynamic GRE tunnel from AP into IGT VM running adjacent to central medical application (imaging, EHR, HMS, etc.) 2016 Avaya Inc. All right reserved 42
43 SMART HEALTHCARE IOT FOR WIRELESS ARCHITECTURE 2016 Avaya Inc. All right reserved 43
44 SMART CLASSROOM & SAFE-SCHOOL SOLUTION ARCHITECTURE Automatic Class Attendance Dynamic control of in-class application access Detect Students in unsafe Locations & Auto-alert 2016 Avaya Inc. All right reserved 44
45 SIMPLIFYING DEVICE ONBOARDING ONBOARD IOT/BYOD DEVICE BASED ON ACCESS POLICY NEW on POR Access Policy Actions available from: User Authorization Policy (including Failed Authentication) Mac Authorization Policy (including Failed Authentication) 2016 Avaya Inc. All right reserved 45
46 SECURE ELASTIC NETWORKS OPTIMIZING END USER & IT EXPERIENCES NETWORK FLEXIBILITY Elastic Networks Fast, Automation & Security with Identity Engines USER & IT EXPERIENCE NETWORK SECURITY Control WHO gets access, from WHERE, and with WHAT NETWORK SIMPLICITY Automate BYOD and IOT onboarding Avaya Fabric Networking Delivers the Architecture, Capacity & Control to Optimize the IT and End User Experiences 2016 Avaya Inc. All right reserved 46
47 Visit Our Smart City Expo Hours Monday, April 4 Tuesday, April 5 Wednesday, April 6 Thursday, April 7 6:30pm 9:00pm 7:00am 8:30am 7:00am 8:30am 7:00am 8:30am 12:15pm 1:30pm 12:15pm 1:30pm (Expo closes after breakfast) 6:00pm 8:00pm
48 Complete your survey at the end of the session in the Mobile App
49 2016 Avaya Inc. All right reserved 49
50
51 IGNITION TUNNELING SERVER GRE TUNNELING FOR WLAN 9100 AP 9100 WOS Admin Ignition Server GRE Guest Tunneling Access Portal Captive Portal Switch Firewall Internet 2016 Avaya Inc. All right reserved 51
DEPLOYING AND EVOLVING FABRICS IN EXISTING NETWORKS. Scott Fincher Global Solutions Architect Avaya Networking
DEPLOYING AND EVOLVING FABRICS IN EXISTING NETWORKS Scott Fincher Global Solutions Architect Avaya Networking Thank you Sponsors! Global Sponsors Gold Sponsors Silver Sponsors Join the Conversation @Avaya
More informationCisco ISE Features. Cisco Identity Services Engine Administrator Guide, Release 1.4 1
Cisco ISE Overview, page 2 Key Functions, page 2 Identity-Based Network Access, page 2 Support for Multiple Deployment Scenarios, page 3 Support for UCS Hardware, page 3 Basic User Authentication and Authorization,
More informationSMART CAMPUS, BUILDING AND VENUES
SMART CAMPUS, BUILDING AND VENUES Greg Deffenbaugh, Corporate Solutions Technologist SDS & Hospitality SDN Solutions and Strategy, Avaya @gregdeff gregdeff 1 Thank you Sponsors! Global Sponsors Gold Sponsors
More informationNetwork Access Control
Network Access Control It is about saying YES! to BYOD but staying on control Jan Michael de Kok Sales Engineering Manager Caribbean & Central America Realities of Smart Devices, Like It Or Not A new device
More informationP ART 3. Configuring the Infrastructure
P ART 3 Configuring the Infrastructure CHAPTER 8 Summary of Configuring the Infrastructure Revised: August 7, 2013 This part of the CVD section discusses the different infrastructure components that are
More informationForeScout Extended Module for VMware AirWatch MDM
ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5
More informationENTERPRISE NETWORKS WLAN Guest Management Software
ENTERPRISE NETWORKS WLAN Guest Management Software Deb Ghosh Visitor Access Applications Secure Guest Access BYOD for employee mobiles Conferences and Tradeshows Public/Retail Hotspots Locations Services
More informationExtreme Policy Access Control
Extreme Policy Access Control Granular network access and control across wired and wireless infrastructure Role-Based Policy Policy Management Secure and provision network resources based upon the role
More informationACCP-V6.2Q&As. Aruba Certified Clearpass Professional v6.2. Pass Aruba ACCP-V6.2 Exam with 100% Guarantee
ACCP-V6.2Q&As Aruba Certified Clearpass Professional v6.2 Pass Aruba ACCP-V6.2 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back
More informationIntegrating Meraki Networks with
Integrating Meraki Networks with Cisco Identity Services Engine Secure Access How-To guide series Authors: Tim Abbott, Colin Lowenberg Date: April 2016 Table of Contents Introduction Compatibility Matrix
More informationSecure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices
Michal Zlesák Area Sales Manager Michal.zlesak@enterasys.com Secure IT consumeration (BYOD), users will like you How to make secure access for smart mobile devices A Siemens Enterprise Communications Company
More informationCisco ISE Features Cisco ISE Features
Cisco ISE Overview, on page 2 Key Functions, on page 2 Identity-Based Network Access, on page 3 Support for Multiple Deployment Scenarios, on page 3 Support for UCS Hardware, on page 3 Basic User Authentication
More informationBYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-BOaRDING and Securing DEVICES IN YOUR Corporate NetWORk PrepaRING YOUR NetWORk to MEEt DEVICE DEMaND The proliferation of smartphones and tablets brings increased
More informationRelease Notes for Avaya WLAN 9100 AOS-Lite Operating System WAP9112 Release WAP9114 Release 8.1.0
WLAN 9100 Release Notes Release Notes for Avaya WLAN 9100 AOS-Lite Operating System WAP9112 Release 8.1.0 WAP9114 Release 8.1.0 Avaya Inc - External Distribution 1. Introduction This document provides
More informationForeScout Extended Module for MaaS360
Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...
More informationIntroducing. Secure Access. for the Next Generation. Bram De Blander Sales Engineer
Introducing Secure Access for the Next Generation Bram De Blander Sales Engineer bdeblander@pulsesecure.net What CIOs are asking Mobility Cloud Apps IoT Is our firewall security and EMM system good enough?
More informationSecure wired and wireless networks with smart access control
Secure wired and wireless networks with smart access control Muhammad AbuGhalioun Senior Presales Consultant Hewlett-Packard Enterprise Aruba Saudi Arabia Managing risk in today s digital enterprise Increasingly
More informationUSP Network Authentication System & MobileIron. Good for mobile security solutions
USP Network Authentication System & MobileIron Good for mobile security solutions Content About United Security Providers Today s network security challenges USP Network Authentication System Access control
More informationSecuring the Corporate WLAN in a Healthcare Regulated Organization
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Securing
More informationHOW-TO-GUIDE: demonstrating Fabric Attach using OpenVSwitch
HOW-TO-GUIDE: demonstrating Fabric Attach using OpenVSwitch 1 Target audience System Engineers interested to understand the Fabric Attach (FA) technology and/or for demo proposes. Why does it make sense
More informationONE POLICY. Tengku Shahrizam, CCIE Asia Borderless Network Security 20 th June 2013
ONE POLICY Tengku Shahrizam, CCIE Asia Borderless Network Security 20 th June 2013 Agenda Secure Unified Access with ISE Role-Based Access Control Profiling TrustSec Demonstration How ISE is Used Today
More informationSOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE
SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE March 2018 Table of Contents Introduction...1 Design...2 Use Cases...2 Underlay...3 Overlay...3 Dynamic Segmentation...3 Non-Stop Networking...4 Summary...5
More information2012 Cisco and/or its affiliates. All rights reserved. 1
2012 Cisco and/or its affiliates. All rights reserved. 1 Policy Access Control: Challenges and Architecture UA with Cisco ISE Onboarding demo (BYOD) Cisco Access Devices and Identity Security Group Access
More information905M 67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves
67% of the people who use a smartphone for work and 70% of people who use a tablet for work are choosing the devices themselves 905M tablets in use for work and home globally by 2017 Before Now 32% of
More informationTITLE GOES HERE RUCKUS CLOUDPATH ENROLLMENT SYSTEM. The only integrated security and policy management platform that delivers: COMPRISED OF:
CASE STUDY Ruckus Enrollment System (ES) software is a security and policy management platform that enables IT to easily and definitively secure the network, secure users and secure wired and wireless
More informationPhil Schwan Technical
Phil Schwan Technical Architect pschwan@projectleadership.net @philschwan Today s challenges Users Devices Apps Data Users expect to be able to work in any location and have access to all their work resources.
More informationThe Context Aware Network A Holistic Approach to BYOD
The Context Aware Network A Holistic Approach to BYOD Trends Bring Your Own Device BYOD at Cisco Cisco BYOD Solution Use Cases Summary Trends #CiscoPlusCA Demand for Mobility 15 billion new networked mobile
More informationThomas Lippert Principal Product Manager. Sophos Mobile. Spring 2017
Thomas Lippert Principal Product Manager Sophos Mobile Spring 2017 Market Overview Trends Security or data breaches involving mobile devices are on the rise More people use mobile devices for work than
More informationEnterprise Guest Access
Data Sheet Published Date July 2015 Service Overview Whether large or small, companies have guests. Guests can be virtually anyone who conducts business with the company but is not an employee. Many of
More informationVisibility, control and response
Visibility, control and response Protecting Clients and Unifying Policy Tomas Muliuolis Baltics Lead September 2018 Today s Escalating Customer Challenges Advanced attacks and unforeseen threats continue
More informationDelivering a Secure BYOD Solution with XenMobile MDM and Cisco ISE
Delivering a Secure BYOD Solution with XenMobile MDM and Cisco ISE Bhumik Patel Solutions Architect, Citrix Systems May 21 st 2013 App Complete Enterprise Mobility Business Apps Productivity and Collaboration
More informationSupport Device Access
Personal Devices on a Corporate Network (BYOD), on page 1 Personal Device Portals, on page 2 Support Device Registration Using Native Supplicants, on page 8 Device Portals Configuration Tasks, on page
More informationRelease Notes for Avaya WLAN 9100 Software Patch Release WLAN Release Notes
WLAN 9100 Release Notes Release Notes for Avaya WLAN 9100 Software Patch Release AP Operating System Rel 7.2.8 Wireless LAN Orchestration System Rel 7.4.2 Avaya Inc - External Distribution Avaya Inc -
More informationIdentity Based Network Access
Identity Based Network Access Identity Based Network Access - Agenda What are my issues Cisco ISE Power training What have I achieved What do I want to do What are the issues? Guest Student Staff Contractor
More informationClearPass Ecosystem. Tomas Muliuolis HPE Aruba Baltics lead
ClearPass Ecosystem Tomas Muliuolis HPE Aruba Baltics lead 2 Changes in the market create paradigm shifts 3 Today s New Behavior and Threats GenMobile Access from anywhere? BYOD Trusted or untrusted? Bad
More informationAvaya Networking Update. Peter Pauhof Westcon, Lednice 07/2014
Avaya Networking Update Peter Pauhof Westcon, Lednice 07/2014 Status Quo Enterprise Architecture of Today Proprietary Fabric Traditional WAN Or Stitched Overlay Traditional IP Network Generic NAC And proprietary
More informationBYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013
BYOD the HP Way: Secure, Device-Agnostic Network Access Management Jochen Fischer Solution Architect (MASE) September 2013 Bring Your Own???? 2 Bring Your Own Device cannot be ignored About 50% Workers
More informationMobile Security using IBM Endpoint Manager Mobile Device Management
Mobile Security using IBM Endpoint Manager Mobile Device Management Mahendra Chopra Security Solution Architect @ IBM CIO Lab, Innovation mahendra.chopra@in.ibm.com Agenda Market Trends Mobile Security?
More informationForeScout Extended Module for MobileIron
Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...
More informationThe Aruba S3500 Mobility Access Switch
Tech Brief Enterprise The Aruba S3500 Mobility Access Switch Tech Brief: The Aruba S3500 Mobility Access Switch Table of Contents Introducing the Aruba S3500 Mobility Access Switch... 2 Flexible deployment
More informationVodafone Secure Device Manager Administration User Guide
Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of June 2017. Vodafone Ready Business Contents Introduction 3 Help 4 How to find help in the Vodafone Secure
More informationBorderless Networks. Tom Schepers, Director Systems Engineering
Borderless Networks Tom Schepers, Director Systems Engineering Agenda Introducing Enterprise Network Architecture Unified Access Cloud Intelligent Network & Unified Services Enterprise Networks in Action
More informationWAP9112/9114 Quick Start Guide
WAP9112/9114 Quick Start Guide Release 7.6 NN47252-308 Issue 02.01 March 2016 Contents Chapter 1: Introduction... 3 Chapter 2: Required Software Components... 4 Chapter 3: Installing or Upgrading Wireless
More informationISE Version 1.3 Self Registered Guest Portal Configuration Example
ISE Version 1.3 Self Registered Guest Portal Configuration Example Document ID: 118742 Contributed by Michal Garcarz and Nicolas Darchis, Cisco TAC Engineers. Feb 13, 2015 Contents Introduction Prerequisites
More informationCLEARPASS EXCHANGE. Open third party integration for endpoint controls, policy and threat prevention SOLUTION OVERVIEW MAKE BETTER-INFORMED DECISIONS
Open third party integration for endpoint controls, policy and threat prevention While billions of Wi-Fi enabled smartphones and tablets connect to enterprise networks, it s a major challenge to ensure
More informationCLEARPASS GUEST. A ClearPass Policy Manager Application DATA SHEET KEY FEATURES THE CLEARPASS ADVANTAGES
A ClearPass Policy Manager Application ClearPass Guest is a scalable, easy-to-use visitor management solution that delivers secure automated guest access workflows for visitors, contractors, partners,
More informationNETWORK SENTRY KNOWN ANOMALIES. Network Sentry /8.2.9 Agent Analytics Rev: G 9/26/2018
RELEASE NOTES NETWORK SENTRY KNOWN ANOMALIES Network Sentry 8.1.12/8.2.9 Agent 5.0.5 Analytics 5.0.0 Rev: G 9/26/2018 For further information, please contact Bradford Networks Customer Support at 866-990-3799
More informationWHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365
WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often
More informationAvaya 7691X Exam. Volume: 65 Questions. Question: 1 Which processes are used to upgrade the Ignition Server firmware?
Volume: 65 Questions Question: 1 Which processes are used to upgrade the Ignition Server firmware? A. 1) Open the Upgrade Firmware view of Dashboard. 2) Select Configuration Hierarchy. 3) Launch the Firmware
More informationAlcatel-Lucent OmniVista Cirrus Simple, secure cloud-based network management as a service
Alcatel-Lucent OmniVista Cirrus Simple, secure cloud-based network management as a service Alcatel-Lucent OmniVista Cirrus is a scalable, resilient, secure cloud-based network management for unified access
More informationLCOS 8.82 RC1 Feature Notes.
Feature Notes www.lancom.de Introduction The LANCOM operating system LCOS and the corresponding management tools (LCMS) regularly provide free new functions for current LANCOM routers, access points, and
More informationNETWORK DESIGNS AND DEPLOYMENTS
DATA CENTER SOLUTIONS NETWORK DESIGNS AND DEPLOYMENTS Fabrizio Fiori Global Director SDN Fx Solutions Software Defined Architecture Gates Zeng Corporate Solutions Technologist Cloud Networking Evangelist
More informationCounterACT Afaria MDM Plugin
Version 1.7.0 and Above Table of Contents About Afaria MDM Service Integration... 4 About This Plugin... 4 How It Works... 5 Continuous Query Refresh... 5 Offsite Device Management... 6 Supported Devices...
More informationWLAN Security Preparing For BYOD and IoT
Next Presentation Begins at 13:00 WLAN Security Preparing For BYOD and IoT Mathew Edwards, Product Marketing Manager & Gregor Vucajnk, Global Training Manager Your Past and possibly present ANYTIME ANYWHERE
More informationUser Directories and Campus Network Authentication - A Wireless Case Study
User Directories and Campus Network Authentication - A Wireless Case Study Sean Convery Identity Engines Kevin Jones Metropolitan Community College Agenda Role-based Access Control About MCC Wireless project
More informationPulse Policy Secure X Network Access Control (NAC) White Paper
Pulse Policy Secure 802.1X Network Access Control (NAC) White Paper Introduction The growing mobility trend has created a greater need for many organizations to secure and manage access for both users
More informationForescout. eyeextend for VMware AirWatch. Configuration Guide. Version 1.9
Forescout Version 1.9 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191
More informationSecure Access - Update
Secure Access - Update for people, devices, things and services Jonas Gyllenhammar Senior Consultant Engineer - Specialist The New Reality All Major OSs One Client On-the-go Home network Untrusted LAN
More informationCisco SD-Access Building the Routed Underlay
Cisco SD-Access Building the Routed Underlay Rahul Kachalia Sr. Technical Leader Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the
More informationAT&T SD-WAN Network Based service quick start guide
AT&T SD-WAN Network Based service quick start guide After you order your AT&T SD-WAN Network Based service, you can: Create administrator accounts Log in to the SD-WAN orchestrator Configure business policy
More informationCisco Secure Access Control
Cisco Secure Access Control Delivering Deeper Visibility, Centralized Control, and Superior Protection Martin Briand - Security Escalation VSE Global Virtual Engineering Oriol Madriles Soriano Security
More informationCisco ISE Ports Reference
Cisco ISE Infrastructure Cisco ISE Infrastructure, on page 1 Cisco ISE Administration Node Ports, on page 2 Cisco ISE Monitoring Node Ports, on page 4 Cisco ISE Policy Service Node Ports, on page 5 Inline
More informationWHY YOUR NAC PROJECTS KEEP FAILING: ADDRESSING PRODUCTS, PEOPLE, PROCESSES
SESSION ID: TECH-W14 WHY YOUR NAC PROJECTS KEEP FAILING: ADDRESSING PRODUCTS, PEOPLE, PROCESSES Jennifer Minella VP of Engineering & Security Carolina Advanced Digital, Inc. @jjx securityuncorked.com @CADinc
More informationClearPass Design Scenarios
ClearPass Design Scenarios Austin Hawthorne Feb 26, 2015 Agenda 1. Better user experience and tighter security, is that possible? 2. Employees on Guest Network 3. The headless device dilemma 2 CONFIDENTIAL
More informationCertificate Enrollment for the Atlas Platform
Certificate Enrollment for the Atlas Platform Certificate Distribution Challenges Digital certificates can provide a secure second factor for authenticating connections from MAP-wrapped enterprise apps
More informationHow a Unified Wired and Wireless Architecture Addresses BYOD
How a Unified Wired and Wireless Architecture Addresses BYOD John W. Turner Brandeis University www.linkedin.com/in/johnwturner1 @johnwturner Airheads Social ID: turner Mobility Trends Birthplace of BYOD
More informationForescout. eyeextend for IBM MaaS360. Configuration Guide. Version 1.9
Forescout Version 1.9 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191
More informationRUCKUS CLOUD WI-FI Cloud Managed Wi-Fi
TITLE GOES HERE SUB-TITLE GOES HERE RUCKUS CLOUD WI-FI Cloud Managed Wi-Fi SIMPLIFIED MANAGEMENT OF MULTI-SITE WI-FI NETWORKS Ruckus Cloud Wi-Fi simplifies deployment, monitoring and management of your
More informationGuide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1
Guide to Deploying VMware Workspace ONE DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationConfiguring Client Profiling
Prerequisites for, page 1 Restrictions for, page 2 Information About Client Profiling, page 2, page 3 Configuring Custom HTTP Port for Profiling, page 4 Prerequisites for By default, client profiling will
More informationMobility First How Tomorrow Moves for Education
Mobility First How Tomorrow Moves for Education Presented by: Sponsored by: CONFIDENTIAL Copyright 2016. Aruba Networks, an HP Company. All rights reserved GENMOBILE IS AT THE HEART OF OUR TECHNOLOGY STRATEGY
More informationAVAYA SDN Fx HEALTHCARE SOLUTION BRIEF
AVAYA SDN Fx HEALTHCARE SOLUTION BRIEF A 2015 report cited by Government Health IT 1 indicates that: 21% of all breaches globally are in the healthcare industry 34% of total healthcare records globally
More informationQuickSpecs. Aruba ClearPass Guest Software. Overview. Aruba ClearPass Guest Software A ClearPass Policy Manager Application.
Overview A ClearPass Policy Manager Application Product overview ClearPass Guest is a scalable, easy-to-use visitor management solution that delivers secure automated guest access workflows for visitors,
More informationMR Cloud Managed Wireless Access Points
Datasheet MR Series MR Cloud Managed Wireless Access Points Overview The Meraki MR series is the world s first enterprise-grade line of cloud-managed WLAN access points. Designed for challenging enterprise
More informationTHE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017
THE NETWORK. INTUITIVE. Powered by intent, informed by context. Rajinder Singh Product Sales Specialist - ASEAN August 2017 The Network. Intuitive. Constantly learning, adapting and protecting. L E A R
More informationA. Post-Onboarding. the device wit be assigned the BYOQ-Provision firewall role in me Aruba Controller.
Volume: 98 Questions Question: 1 Based on the ClearPass and Aruba Controller configuration settings for On boarding shown, which statement accurate describes an employee's new personal device connecting
More informationSecurity and Control for all Devices on the Access Network
Security and Control for all Devices on the Access Network DATASHEET Aerohive A3 Aerohive A3 Aerohive A3 is an innovative solution for securing, managing and controlling all devices on your Access Network
More informationForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.
Real-time Visibility Network Access Control Endpoint Compliance Mobile Security ForeScout CounterACT Continuous Monitoring and Mitigation Rapid Threat Response Benefits Rethink IT Security Security Do
More informationAlcatel-Lucent OmniVista Cirrus Simple, secure cloud-based network management as a service
Alcatel-Lucent OmniVista Cirrus Simple, secure cloud-based network management as a service Alcatel-Lucent OmniVista Cirrus is a scalable, resilient, secure cloud-based network management for unified access
More informationBYOD: Management and Control for the Use and Provisioning of Mobile Devices
BYOD: Management and Control for the Use and Provisioning of Mobile Devices Imran Bashir Technical Marketing Engineer BYOD: Management and Control for the Use and Provisioning of Mobile Devices -- 3:30
More informationCreating Wireless Networks
WLANs, page 1 Creating Employee WLANs, page 2 Creating Guest WLANs, page 4 Internal Splash Page for Web Authentication, page 7 Managing WLAN Users, page 9 Adding MAC for Local MAC Filtering on WLANs, page
More informationSet Up Cisco ISE in a Distributed Environment
Cisco ISE Deployment Terminology, page 1 Personas in Distributed Cisco ISE Deployments, page 2 Cisco ISE Distributed Deployment, page 2 Configure a Cisco ISE Node, page 5 Administration Node, page 8 Policy
More informationManaging BYOD Networks
Managing BYOD Networks SPS-2013 Raghu Iyer raghu.iyer@nevisnetworks.com 1 What is BYOD Bring Your Own Device Are you allowing a Rogue? SPS-2013 Raghu Iyer raghu.iyer@nvisnetworks.com 2 Why BYOD Increased
More informationPrivilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer
Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing
More informationAerohive and IntelliGO End-to-End Security for devices on your network
Aerohive and IntelliGO End-to-End Security for devices on your network Introduction Networks have long used a password to authenticate users and devices. Today, many cyber attacks can be used to capture
More informationNNTF12_51 SIMPLY CONNECTED IN ACTION : AN OVERVIEW OF DIFFERENT USE-CASES. Tim McCarthy
NNTF12_51 SIMPLY CONNECTED IN ACTION : AN OVERVIEW OF DIFFERENT USE-CASES Tim McCarthy MAJOR MARKET TRENDS DATA MOBILITY AND SCALE AT AN ALL TIME HIGH AND GROWING Sophisticati on (Maturity) Device Proliferation
More informationBring Your Own Design: Implementing BYOD Without Going Broke or Crazy. Jeanette Lee Sr. Technical Marketing Engineer Ruckus Wireless
Bring Your Own Design: Implementing BYOD Without Going Broke or Crazy Jeanette Lee Sr. Technical Marketing Engineer Ruckus Wireless Taking the Scary out of BYOD What Enterprises REALLY Want 1 2 3 4 5 6
More informationDolby Conference Phone 3.1 configuration guide for West
Dolby Conference Phone 3.1 configuration guide for West 17 January 2017 Copyright 2017 Dolby Laboratories. All rights reserved. For information, contact: Dolby Laboratories, Inc. 1275 Market Street San
More informationAccess Guardian and BYOD in AOS Release 8.1.1
Access Guardian and BYOD in AOS Release 8.1.1 Configuration Guide through Use Cases Copyright 2014 by Alcatel-Lucent All rights reserved Alcatel-Lucent, 26801 West Agoura Road, Calabasas, CA 91301, USA
More informationBEST PRACTICE - NAC AUF ARUBA SWITCHES. Rollenbasierte Konzepte mit Aruba OS Switches in Verbindung mit ClearPass Vorstellung Mobile First Features
BEST PRACTICE - NAC AUF ARUBA SWITCHES Rollenbasierte Konzepte mit Aruba OS Switches in Verbindung mit ClearPass Vorstellung Mobile First Features Agenda 1 Overview 2 802.1X Authentication 3 MAC Authentication
More informationGuide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1
Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware
More informationMake Wi-Fi Simple and Secure for Google Apps, BYOD, and More. 21 April 2016
Make Wi-Fi Simple and Secure for Google Apps, BYOD, and More 21 April 2016 Today s Speaker Bruce Miller VP Product Marketing Xirrus, Inc. bruce.miller@xirrus.com @bmiller715 2 Agenda 1 2 3 4 5 6 7 Introduction
More informationVMware AirWatch Android Platform Guide
VMware AirWatch Android Platform Guide Workspace ONE UEM v9.4 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationARUBA INSTANT Combining enterprise-class Wi-Fi with unmatched affordability and configuration simplicity
ARUBA INSTANT Combining enterprise-class Wi-Fi with unmatched affordability and configuration simplicity Table of Contents Introduction... 3 Aruba Instant Overview... 4 Aruba Instant APs... 4 Adaptive
More informationCONFERENCING: THE PATH FORWARD. Mike Wasserburger
CONFERENCING: THE PATH FORWARD Mike Wasserburger Thank you Sponsors! Global Sponsors Gold Sponsors Silver Sponsors Join the Conversation @Avaya #AvayaATF Complete your survey at the end of the session
More informationYour wireless network
Your wireless network How to ensure you are meeting Government security standards Cabinet Office best practice Wi-Fi guidelines Overview Cyber Security is a hot topic but where do you start? The Cabinet
More informationRSA Authentication Manager 8.2
RSA Authentication Manager 8.2 Over 25,000 customers 50 60 million active tokens in circulation 10 million units shipped per year More than 50% market share RSA Ready Partner Program: 400 Partners with
More informationCloud Mobility: Meraki Wireless & EMM
BRKEWN-2002 Cloud Mobility: Meraki Wireless & EMM Emily Sporl Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile
More informationHiveManager Public Cloud
D ATA S H E E T HiveManager Public Cloud Enterprise Access Network Management Offering Intuitive Configuration Workflows, Real-Time & Historical Monitoring, and Simplified Troubleshooting DATASHEET HiveManager
More informationCisco ISE Ports Reference
Cisco ISE Infrastructure, page 1 Cisco ISE Administration Node Ports, page 2 Cisco ISE Monitoring Node Ports, page 4 Cisco ISE Policy Service Node Ports, page 5 Cisco ISE pxgrid Service Ports, page 10
More information