Product Overview. Trapeze Networks Wireless LAN Mobility System

Size: px
Start display at page:

Download "Product Overview. Trapeze Networks Wireless LAN Mobility System"

Transcription

1 An Overview of the Trapeze Networks Wireless LAN Mobility System

2 Enterprise IT demands for an integrated wireless mobility infrastructure span both technical and financial concerns. A wireless LAN (WLAN) system must meet stringent security requirements, deliver the required mobility functions, and at the same time be easy and cost-effective to install and operate. The WLAN Mobility System from Trapeze Networks meets these seemingly disparate requirements by delivering best-in-class secure mobility, the broadest range of services, and the lowest total cost of ownership of any WLAN system. Best-in-Class Secure Mobility While all WLAN systems purport to bring you mobility, only the Trapeze Mobility System has an architecture that lets users roam securely anywhere in the network, over any topology whether it s at headquarters, branch offices, campuses or multi-tenant/multi-use facilities. The Mobility System does not require changes to your current infrastructure. It simply makes your existing network, with all of its structure and services, available wirelessly. With Trapeze, you just deploy the WLAN equipment, link to your wired network, and the Mobility System automatically provides roaming users with secure access to their existing network resources and only those appropriate resources. Trapeze gives users complete mobility without forcing you to distribute VLANs throughout your network, add a new VLAN, or change your client infrastructure. The Trapeze Mobility System applies the toughest security measures available today to ensure that only authorized people can access your network s resources. Using strong standards-based authentication and encryption, the Trapeze Mobility System protects against misuse and eavesdroppers and isolates traffic between multiple private groups. When the Mobility System authenticates users, it tracks their individual identities as they roam throughout the WLAN, enabling fast secure handoffs and eliminating the need for users to reauthenticate as they roam. As a result, users enjoy passport-free mobility, with no need to reconfirm their identity, and they gain access to a consistent set of services. Broadest Range of Services The architecture of the Trapeze Mobility System supports the broadest range of wireless services of any WLAN system. It integrates with authentication, authorization, and accounting (AAA) servers to provide user services based on identity a feature Trapeze calls Identity-Based Networking. With Identity-Based Networking, you can centralize policies for network access, traffic prioritization, and mobility services in the AAA server, which provides consistent controls wherever users roam. The Trapeze Mobility System also provides you with crucial security and network administration services such as a robust Intrusion Detection System (IDS) and resiliency capabilities. Identity-Based Networking enables you to define for a user or user group their virtual private group, time of day access, encryption type, quality of service (QoS) level, traffic filtering, roaming profiles, and location-specific policies. Page 1

3 The system also excels in its delivery of voice-over-wireless-ip (VoWIP) services, with Wi-Fi Multimedia (WMM) for QoS and per-user queuing. Only the Trapeze Mobility System relies on standard mechanisms to provide such fine-grained control to network resources and enforces those policies consistently as users roam. In addition to user-based services, the Trapeze Mobility System also provides important IT-oriented services. These services include intrusion detection and location, denial-of-service alerts, user monitoring and location, and high-availability and network-resiliency mechanisms. The Trapeze Mobility System s comprehensive Intrusion Detection System provides a strong line of defense against denial-of-service and other attacks, while intelligent countermeasure take direct aim at disabling rogue devices. Many of these capabilities are derived from the award-winning Trapeze RingMaster tool suite, which enables you to plan, deploy, configure, and manage your WLAN. Trapeze also offers industry-leading resiliency capabilities. The system relies on standard, interoperable techniques such as spanning tree and per VLAN spanning tree (PVST+) to support redundant connections to the backbone and within the WLAN system. Trapeze is unique in supporting two Ethernet ports on each Mobility Point (MP ) access point, enabling data path and power-over-ethernet (PoE) redundancy from the wired infrastructure. For more details on rogue and intrusion detection, resiliency and other Trapeze Mobility System functions, see the Key Functions of the Trapeze Integrated Mobility System section that follows. Lowest Total Cost of Ownership The Trapeze Mobility System offers unparalleled operational advantages. It remains the easiest WLAN to plan and run and therefore offers the lowest total cost of ownership in the industry. To a large extent, the powerful RingMaster tool suite is responsible for these operational gains, which have provided Trapeze customers with a return on investment of less than one year. RingMaster is a full WLAN lifecycle tool. It includes all the features you need to plan, deploy, configure, and manage the WLAN. RingMaster yields an accurate plan for the WLAN through its use of measured attenuation factors for building obstacles. The tool automatically calculates how many MPs you need and places them in your building for optimal radio-frequency (RF) coverage and capacity. No other WLAN system tool includes building attenuation, so no other tool can pinpoint the optimal location for access points (APs). As you re building the plan, behind the scenes RingMaster is building the configuration files that support that plan. When you verify that the plan is complete, RingMaster provides a work order to simplify deployment, and then in a single step, RingMaster automatically configures the WLAN equipment. International support ensures that RingMaster will use the appropriate channel settings and power levels allowed by each country s regulations. If an MP detects radar or Dynamic Frequency Selection (DFS), which identifies the presence of radar on a channel, it switches to another channel and does not attempt to use the channel where the radar was detected for 30 minutes. You ll enjoy the greatest operational savings during the actual running of the Trapeze Mobility System. The system automates such time-consuming tasks as rogue detection, user monitoring, user location, roaming history, RF monitoring, security enforcement, and troubleshooting. Using RingMaster, Trapeze s customers have achieved operational savings of 50%-70% over other WLAN architectures. Page 2

4 Key Functions of the Trapeze Integrated Mobility System 1) Planning and Scaling Pre-Deployment The first step in planning a Trapeze deployment is to import building plans in standard file formats typically as a DWG or DXF file. These files are generally available from the Facilities department or building owner. Alternatively, a standard JPEG or.gif file of the floor plan can be used. With the plans loaded into the tool, RingMaster allows IT staff to assign pre-set RF attenuation factors to walls, doors, cubes, windows, ceilings, and other objects on the floor plan, based on the building materials. RingMaster will use this information as the foundation for all planning, verification, deployment, and management. RingMaster operates three dimensionally to consider both the horizontal (on the floor) and vertical (between floors) transmission and attenuation of wireless signals. Next, IT specifies an area where they want to provide wireless coverage. RingMaster will calculate the appropriate number of MPs or third-party APs based on either the minimum count needed to provide RF coverage in that area or capacity parameters if IT has chosen to note the number of users and bandwidth per user in that area. RingMaster places the MPs places them on the floor plan, though managers can choose to manually move them to more convenient locations to simplify installation. RingMaster lets you import an AutoCAD drawing of your floor to simplify planning and management. RingMaster assigns power levels, channels, and minimum data association rates for each MP. The power levels and association rates are set to optimize cell sizes for the coverage area. RingMaster shows expected coverage via an offline verification process, in which it models the RF environment. For installation, IT can then print a work order directly from RingMaster that shows the MP placement. In centralized deployments, the MXs can be installed anywhere in the network and connect to the MPs through the existing infrastructure of switches and routers. In distributed deployments, Trapeze Mobility Exchange (MX ) WLAN switches can be deployed in wiring closets and connect directly to MPs. Workers can install MPs, pulling Category 5 unshielded twisted-pair (UTP) cable as needed from wiring closets to the MP locations that are specified by two-dimensional coordinates on the work order. Future scaling requirements are easily met. IT can implement capacity planning at any time and add or change metrics about the user count and bandwidth amount. The system then generates an updated floor plan, showing the new MPs. To make the updates as easy as possible, RingMaster will preserve existing MP locations and add new ones around them to increase bandwidth, coverage area, or both, and RingMaster will automatically make any needed adjustments to the channel settings or power levels of the existing MPs. Page 3

5 RingMaster shows the contours of RF coverage. 2) Installation, Configuration, and Verification Post-Deployment RingMaster includes a policy feature that allows IT to create configuration templates. The templates quickly replicate configuration details across dozens to thousands of MXs and MPs. With one click of the mouse, the system verifies the configurations. A second click pushes the configurations to the MXs via secure HTTP. This process is a transaction-based communication, so if any part of it fails, the system will abort the entire operation and roll back to the previous known good configuration. After the equipment is installed and configurations are pushed to the MXs, the MPs will automatically selfconfigure, either obtaining their configuration from a directly attached MX or using DHCP to get an IP address and subsequently learn the MX which hosts its configuration. After the system is deployed, RingMaster can perform online topology verification. In this process, the system uses the RF statistics collected by the Mobility System Software (MSS ) on the MXs and MPs to compare actual coverage to the design goals outlined in the planning phase. 3) Secure Virtual Private Groups The Trapeze Mobility System secures network access on a per-user basis and makes it very easy for IT to The Trapeze Mobility System secures network access on a per-user basis and makes it very easy for IT to define multiple secure Virtual Private Groups (VPGs ). The Trapeze system is the only WLAN architecture that allows IT to retain the same user groups on the wireless network as exist on the wired network and will dynamically link users to those groups wherever they roam on the network. IT does not have to modify the wired network to distribute those groups in advance, nor does a new wireless group need to be defined. IT simply configures the groups to exist on the backbone ports of an MX and they re accessible across the Trapeze system. The Trapeze Mobility System works with the back-end AAA infrastructure to assign users to the appropriate VPG, and IT can define a host of additional attributes associated with that group, including encryption type, time of day access, QoS levels, filtering, and roaming profiles. 4) Roaming The Trapeze Mobility System simplifies IT s ability to enable secure roaming on the WLAN. The MXs authenticate users and then maintain session tables for the users, which they communicate with each other to share information about authenticated users and their MP associations. MXs know the existence and whereabouts of all MXs and MPs in the system, enabling secure roaming throughout the deployment. As a user roams, the MX moves user information, such as authentication, pairwise master keys for encryption, access control, and secure private group membership, to the appropriate location on the same or another MX. Page 4

6 Because the MXs share this data, users are not required to request re-authentication or re-authorization from the AAA back-end while roaming. The MXs maintains statistics for the complete session, even when the user changes location, keeping the roaming history updated for help in troubleshooting. In addition, because users traffic is dynamically linked to the appropriate secure private group on the wired infrastructure, enabling roaming is very easy for IT. While most WLAN switches require IT to define new wireless groups or to replicate existing wired groups everywhere on the wired network, Trapeze in contrast requires just that IT extend existing wired groups into an MX somewhere in the network. From there, the MXs take care of dynamically instantiating the required VPG wherever a user roams. 5) Third-Party APs The Trapeze Mobility System goes to great lengths to retain IT s investment in existing APs. The system provides a broader set of services to third-party APs than any other WLAN system, making it easier for IT to plan, manage, and deploy services across them. Planning Integration The Trapeze RingMaster tool suite provides extensive planning and management of third-party APs. IT can denote on a floor plan the location, channel, and power setting of them, and RingMaster will plan the WLAN around those settings. The system will automatically select channels on surrounding MPs to avoid co-channel interference. This planning capability is crucial not just for accommodating an organization s existing APs but also for noting the location of neighbors APs. RF Modeling Not only can IT locate third-party APs on a floor plan in RingMaster and plan around them, but RingMaster also displays the wireless coverage of those radios in a particular environment. RingMaster is the only WLAN system tool that includes a library of RF attenuation factors, so it understands how RF will move through the facility. IT can view the RF contours of both MPs and third-party APs, instantaneously getting a snapshot of the radio signal propagation. The APs on the left side of the floor plan are third-party APs with their RF coverage modeled in RingMaster. The right side of the floor shows three Trapeze MPs. These visualizations are essential to understanding the coverage that APs from Trapeze and other vendors provide. These visualizations are also vital to modeling the impact of an AP failure, verifying the absence of co-channel interference, and seeing the 3D impact of APs above and below the floor you re modeling. Of all the WLAN infrastructure tools, only Trapeze s RingMaster incorporates an understanding of RF attenuation in a building, so only Trapeze can model MPs and third-party APs accurately. Page 5

7 Channel and Power Management In addition to noting the existing channel and power settings when first deploying the Trapeze Mobility System, RingMaster also enables IT to modify those settings in the future. As the WLAN system grows or as IT redeploys those third-party APs, the flexibility to control their settings from the Trapeze Mobility System is very helpful. Authentication The Trapeze system provide authentication and network access for users associated with third-party APs. Clients can be authenticated using 802.1X and its Extensible Authentication Protocol (EAP) variations, Media Access Control (MAC), WebAAA, or using the Mobility Exchange s local database or a RADIUS server group. Security The Trapeze system also lets IT control the security settings on third-party APs. IT can define packet filtering policies on the MX to set prioritization for QoS or to instantiate client access policies. IT can define, for example, that all traffic from a third-party AP must go to a certain network device or that traffic from particular applications can be sent only to one network device. Power over Ethernet The MX supplies industry-standard IEEE 802.3af PoE, so it can power third-party APs. This capability makes it easy for organizations to consolidate existing APs and new MPs on the same integrated device rather than needing the MX to power some radios and standalone PoE switches or power injectors to power others. 6) Authentication and Encryption Strong mutual authentication is a critical element in securing access to a WLAN. The Trapeze Mobility System supports a variety of authentication mechanisms including 802.1X, MAC address, and web authentication. WebAAA allows users to login security using a web browser, such as would be used for public or guest access, and this web page can be easily customized. WebAAA provides fast login by immediately placing the user in the appropriate subnet/vlan after authentication and authorization, and then enforces all authorized policies such as time of day/day of week, encryption type, and access control lists. Any of these approaches tie into AAA servers, which can host a set of authorizations associated with each user or user group. In the Trapeze Mobility System, the MXs play a major role in authentication. The MXs process EAP variants, such as PEAP, and so can offload that protocol processing from the AAA server (see Topic 11, AAA Integration and RADIUS Scaling ). Once the system authenticates a user associated with an MP or third-party AP, it maintains the information about that user, including the set of authorization attributes from the AAA server. The MXs store that information as part of the user session, and when a user roams, the next MX requests that user session from the previous MX. With this architecture, the Trapeze Mobility System does not require users to reauthenticate every time they roam, speeding the roaming hand-off time dramatically and preserving the user s secure connection to WLAN. Another critical security element is strong encryption to protect the data transmitted over the air so that other users cannot intercept and read it. The Trapeze Mobility System has distributed the key generation and authentication encryption functions to the MXs to further offload the AAA back-end. Trapeze supports a range of encryption options to meet the toughest security requirements, including dynamic Wired Equivalent Protocol (WEP) with rotating broadcast/multicast keys, Wi-Fi Protected Access (WPA) 1.0 based on the i Temporal Key Integrity Protocol (TKIP) or WPA 2.0 based on the i Advanced Encryption Standard (AES), which is the strongest encryption available today. The MX can generate the public key infrastructure (PKI) keys locally, which are needed for certificate creation and processing. The MX can either generate certificate signing requests to be sent to a third-party certificate authority, or the MX can generate self-signed certificates. Page 6

8 Certificate authority (CA) certificates may also be installed on the MX. This set of keys and certificates ensure the security of the client authentication process, as well as the communications channel to RingMaster and secure web browsers. The MX can also perform all public key/private key operations to encrypt the authentication channel between the MX and wireless clients. In addition, the MX can generate the session keying material to encrypt transmission between the MP and wireless clients. Hardware on the MX accelerates the computationally intense process of key generation, enabling the Trapeze Mobility System to scale with an increasing number of wireless users. The MX then delivers the appropriate keying material to the MP. The MP performs the actual session encryption in hardware, which significantly scales the WLAN because encryption horsepower increases every time another MP is added to the network. The hardware-based encryption and authentication protocol processing that happens in Trapeze equipment significantly offloads the burden that would otherwise fall on the AAA back-end. 7) Identity-Based Networking Networking systems to date have focused on physical and geographical elements for deployment and management. Wired switches, for example, use physical ports as the basis for VLAN assignment, authentication, and management. In the wireless realm, the importance of a physical port disappears since a user can be anywhere in the enterprise and will attach to the network at a variety of points. User A is in Area A User B is in Area B User A travels into Area B and is immediately denied network access User B travels into Area A and is immediately denied network access User A remains in Area B without network access User B returns to Area B and is automatically reconnected to the network The Trapeze Mobility System lets you decide who gets wireless LAN access and where they can get it. To provide the relevant information to the right location, a wireless system must rely on user identity instead of devices as its architectural focus. An MX then, as the heart of an enterprise-class wireless system, must coordinate with other MXs to provide the appropriate access rights, location information and data propagation based on a user s identity rather than ports. User attributes such as VLAN and subnet assignment, access control lists (ACLs), authentication information, usage tracking, and network statistics must follow users and remain consistent, independent of the attachment point to the network or the media (wired or wireless) used. 8) Voice Support The Trapeze Mobility System excels in its support for voice traffic. Whether using VoIP handsets or soft phones, workers can roam without worrying about dropped calls or poor voice quality. The Mobility System uses WMM to provide QoS. WMM maps priority information between wired and wireless packets, so that voice, video and other high-priority traffic receive priority treatment end-to-end throughout the network. Page 7

9 The system also includes a sophisticated classification and prioritization scheme for marking and treating traffic appropriately. The MX classifies traffic according to user and/or application and marks it using DiffServ conventions. The MP then places traffic marked as highest priority in the expedited queue of that user. Each MP hosts four queues per user, and expedited traffic for all users is always sent first. To further simplify customer s voice deployments, Trapeze supports handsets and badges from a wide range of companies, including SpectraLink, and provides native support for SpectraLink Voice Priority (SVP). The system simultaneously supports SVP and WMM VoIP devices simply by configuring an access control list to set the class of service. The strong mobility features of the Trapeze system, with fast roaming and caching of encryption keys, enables the high quality of the voice connection to persist as phone users roam. 9) Intrusion Detection System and Denial-of-Service Alerts The Trapeze Mobility System includes a sophisticated RF Intrusion Detection System (IDS) that alerts IT to the presence and location of rogues or denial-of-service attacks. IT can use policies to enforce strict control over the type of wireless devices allowed on the network. IT can set policies to permit devices by their SSID or their manufacturer, or blacklist clients by their MAC addresses, preventing them from communicating. Trapeze first determines whether a device is permitted, interfering, or a rogue. An interfering device may belong to a neighboring business, and if it is not a threat then IT may choose to ignore it. IT can issue effective and fine-grained countermeasures against rogue and interfering devices on an attack list. Trapeze also detects denial-of-service attacks, flood attacks, and spoofed APs and immediately alerts IT of the intrusion. In addition, the RF IDS can detect RF jamming, weak WEP keys used by the client, and fake AP flooding. To prevent MAC address spoofing of MPs themselves, MPs insert a confidential signature in all management frames, which the MX uses to know if the MP really belongs to the Trapeze Mobility Domain. IT can define several kinds of rogue sweeps: Continuous, scheduled or on-demand. With continuous sweeps, radios in MPs can be designated to be in SentryScan mode, where all they do is scan for transmissions. Or with ActiveScan, MPs fulfill a dual role, continuously scanning a single band to root out rogues while simultaneously providing wireless connectivity to mobile clients. For scheduled or on-demand sweeps, IT can define radios to listen during a sweep but serve the WLAN whenever no sweep is occurring. Only Trapeze offers this flexibility of having radios that typically serve WLAN users occasionally participate in a rogue detection sweep. If a rogue or interfering device is identified, intelligent countermeasures can neutralize the threat. RingMaster can correlate the collected RF data collected from the MPs and MXs and compare it against the RF topology in the plan. RingMaster notes discrepancies to identify and locate rogue APs and users, denial-ofservice attacks or ad hoc client networks. RingMaster presents this information on the same floor layouts that were used for planning and configuration of the Trapeze Mobility System. 10) Redundancy and Failure Recovery The MX provides redundant, load-sharing links to the network and supports 802.1Q trunking, spanning tree 802.1D, PVST+ and IGMP snooping. The MPs provide two Ethernet ports, so IT can link them to two different MXs or other networking devices to ensure data path and PoE redundancy. MP Redundancy: RingMaster helps IT design for capacity rather than simply for coverage, so a well-designed plan will place more than one MP within range of users. When an MP is dual-homed to two MXs, two networking devices, or one of each, the MP has redundant services for both its data path and PoE. AP Failover: If an AP fails, users simply roam to another MP or third-party AP within range and the system seamlessly supports them. The MX supporting that failed MP notifies RingMaster of the failure and records the event in the system log and a system log server. Page 8

10 MX Redundancy: RingMaster allows IT to design the wireless system with redundant MXs, where the MPs are connected to two different MXs either directly or indirectly over the wired network. This level of redundancy is unique to the Trapeze MP other APs have only a single port, making the switch to which they are connected a single point of failure. In addition, the MX has dual load-sharing, hot-swappable power supplies. WLAN Switch Failover: If a switch fails, the MPs connected to it use their redundant links to connect to another MX, providing a resilient data path for the attached users. Network Infrastructure Redundancy: The MXs offer several redundancy options for network connectivity, so administrators can connect an MX to two different network core or distribution layer switches. Ports configured as uplink ports support dual-homing, load sharing via link aggregation, as well as spanning tree and per-vlan spanning tree. 11) AAA Integration and RADIUS Scaling (AIRS ) With AAA Integration and RADIUS Scaling (AIRS), the MX performs the role of an active 802.1X authenticator for all of its attached MPs. As an active authenticator, the MX terminates and processes EAP authentication requests and challenges, reducing the processing burden on the AAA back-end by as much as 75%. In addition the MX has hardware acceleration for processing public key/private key operations and master key, session key generation. Unlike the MX, standalone APs and other WLAN switches are passive authenticators. Passive authenticators simply encapsulate and pass all EAP authentication requests and challenges to the AAA back-end, which must support a new heavyweight EAP protocol. Therefore, standalone APs and basic WLAN switches generate a burdensome authentication load on the AAA back-end. In the Trapeze system, the MX reduces the number of AAA clients by as much as 100 to 1. Because the AAA back-end is so critical to the operation of the wireless users, IT typically configures multiple RADIUS servers or server groups. The Trapeze Mobility System allows IT managers to assign different RADIUS server groups to different users for resiliency and/or to perform load-sharing within server groups. In addition, the MXs track session statistics and accounting per user and delivers that information to the AAA back-end for charge-back purposes, for example. The Trapeze Mobility System helps scale WLANs for large enterprises by performing several functions on behalf of the AAA back-end. The MX offloads 802.1X EAP processing, provides AAA server load-balancing, and supports multiple AAA server groups. Because the MX is identity-aware, different types of users and user groups may be authenticated to different AAA domains while utilizing the same WLAN infrastructure. 12) User Tracking, Monitoring and Management The Trapeze Mobility System is identity aware, so it can find and provide user names associated with active sessions throughout the system. IT can query RingMaster to learn a user s identity, location, and roaming history, all by searching by user name. RingMaster also tracks user statistics such as bandwidth consumption and average system performance. This tracked information can help IT optimize the network. They can determine areas with a high density of roaming users and locate under-utilized network locations. RingMaster lets them quickly update the network plan to better serve user needs and network changes. RingMaster provides extensive user and network management capabilities to a Trapeze Mobility System. IT can see topology views showing Trapeze network elements, user locations, rogue devices, and ad hoc user groups. They can review user statistics of network usage and roaming history. They can also have RingMaster integrate with the Hewlett-Packard OpenView Network Node Manager. Page 9

11 Trapeze has taken special precautions to ensure that the data stored in RingMaster and the actual network configuration information are always synchronized. RingMaster checks the configuration information on Trapeze hardware on a time interval that IT defines. These checks alert IT to any changes made on the hardware via another RingMaster user or the command line interface (CLI) and will prompt IT to either accept or reject them. RingMaster s sophisticated dashboard-like monitoring window provides detailed WLAN performance and fault information. To promote scaling, resiliency and non-stop 24-x-7 operation, RingMaster is based on a client/server architecture with distributed monitoring servers. Information about network topology, fault and performance data, the RF environment and client activity is collected and stored by the monitoring servers so that large networks with thousands of mobile devices can be effectively monitored. This feature offers unprecedented visibility into the myriad activities and performance metrics of their Trapeze WLAN. Comprehensive configuration reports keep IT abreast of what s happening on the network. The Trapeze Mobility System can periodically check the status of the network, and the status is portrayed visually in layout views and summary reports. When a status change occurs for example, an MX or MP goes offline or comes back up the Mobility System automatically sends an with a consolidated report. Web-based configuration and monitoring reports include Mobility Domain configuration, WLAN security switch configuration, equipment installation work order, inventory, client sessions, and rogues. The MSS offers a variety of management attributes. It supports secure connections to the RingMaster interface, a telnet/cli interface, a secure web interface, SNMP with enterprise traps, and multiple syslog servers. The Mobility System Elements The Trapeze Mobility System includes Mobility System Software, the Mobility Exchange, the Mobility Point and the RingMaster tool suite. Mobility System Software The Mobility System Software drives all functions of the Trapeze system. Running on all Trapeze equipment, it enables all MXs and MPs to operate as a single mobility system. The software is tightly coupled to the RingMaster tool suite, seamlessly integrating the planning and management capabilities with system deployment and operation. Because the MSS coordinates all system behavior, it enables MXs and MPs to reside anywhere in the network, providing the topology independence that makes the Trapeze Mobility System so flexible to deploy. MXs and MPs can be separated by both Layer 2 and Layer 3 network devices, yet they operate in such an integrated fashion that the MPs behave as extensions of the MXs. The MSS also tightly integrates with the AAA back-end, allowing the Trapeze Mobility System to deliver services based on user identity rather than devices and ports. The MSS maintains a record of all authenticated users and controls their network authorization by enforcing their attributes wherever they roam in the WLAN. Enforced attributes include VLAN/subnet membership, roaming policies, access control lists, and class of service. The Trapeze Mobility System also supports dynamic VLAN policies so that all 802.1X client devices are authenticated and assigned to a subnet/vlan. Non-802.1X devices can be authenticated and assigned to a VLAN based on their MAC address. A device that cannot authenticate to the network can be automatically placed on a guest VLAN to ensure secure traffic isolation while still providing access. Page 10

12 The MSS running on all MXs forms the Mobility Domain, throughout which users can roam freely and securely, with all the appropriate permissions. The MXs communicate records detailing user identity, attributes, and roaming history as users roam. Because the MSS maintains these user records, the Trapeze Mobility System can provide users with a single, persistent login, preventing the application disruption that can occur when users roam. The integration of these user records also allows network managers to know a user s location across the entire network and their state and RF statistics, allowing IT to locate and troubleshoot user problems. The MSS, in conjunction with RingMaster, also plays a crucial role in intrusion and denial-of-service detection. IT can enforce strict control over the type of devices allowed and may classify permitted devices by SSID, manufacturer or other characteristics. IT can classify devices as permitted, interfering, and rogue, and issue effective, fine-grained countermeasures against unwanted clients and APs. The MSS collates RF statistics that detail who is on the air either legally in the Trapeze system or trespassing as rogue APs or users. Those RF statistics also provide IT with insight into the coverage and performance of the wireless system. Key MSS Features The MSS drives all network system functions: Forms a Mobility Domain across an administrator-defined collection of MXs and MPs Distributes MX and MP topology information between MXs Distributes user information, including authentication, VLAN membership, and roaming history Enforces location policies that determine where, if, and how a user can access the wireless LAN Coordinates Virtual Private Groups over the air Forms isolated, encrypted broadcast domains on-demand across single or multiple MPs using one SSID Fully integrates with AAA to enable Identity-Based Networking All user services are provided based on user identity Maintains records for authenticated users as they roam Locates users and their information anywhere on the network Can perform all AAA authentication functions, including 802.1X locally Offloads 802.1X certificate processing Re-directing of AAA requests based on username content Load-balanced AAA groups; redundant AAA servers Manages encryption to ensure secure communications WPA 2.0/AES, WPA/TKIP and dynamic WEP with rotating broadcast/multicast keys Coordinates the generation of master and session keys Controls packet encryption between MXs and MPs Lets MXs and MPs work together s a single entity, regardless of location Sets up connection between MXs to link users to their Virtual Private Group, even across IP router boundaries Supports roaming for IP and non-ip protocols The Mobility Exchange The Trapeze Networks Mobility Exchange (MX ) switch is the platform for executing the Mobility System Software, and maintains the intelligence of the Trapeze Mobility System. In addition to managing users identities as they roam, MXs configure and control all aspects of Trapeze Mobility Points (MPs) and third-party access points (APs). Multiple MXs function as a peer-to-peer system to support mobility and enforce security. For example, one MX can support a mobile user s connection to a subnet even though the actual attachment to that subnet is through a different MX. This MX-to-MX exchange requires no changes to existing IP backbones. Page 11

13 With Identity-based Networking, MXs provide user-based services such as Virtual Private Group membership, personal firewall filters, time-of-day/day-of-week access, encryption, authentication, usage tracking, location tracking, and associated network statistics. Authorizations stay with users wherever they roam because MXs share the information, ensuring secure access and connectivity to the right services. MXs control third-party APs and configure and manage Trapeze MPs whether they are directly attached or indirectly connected across the wired infrastructure. The MX is available in a variety of platforms the MXR-2, MX-8, MX-200, MX-216 and MX-400 but all provide the same core features of Identity-Based Networking, systemwide roaming functions, multiple private groups, and AAA offload and integration. In addition to performing Layer 2 forwarding, MXs come with extensive with Layer 3-4 and identity-tracking capabilities. They integrate seamlessly with wired infrastructures and offers redundant load-sharing links, 802.1Q trunking, spanning tree and per-vlan spanning tree (PVST+). It also supports IGMP snooping, which is vital to supporting IP multicast streams. Quality of service (QoS) is done with Layer 3-4 application information on a per-user or per-group basis, while class of service (CoS) utilizes IP DiffServ code points. MXs are equipped with the Trapeze Web Quick Start for fast configuration of basic connectivity requirements or they can be configured through WebView or the CLI. Alternatively, the Trapeze RingMaster planning and management tool suite enables MXs to obtain their configurations locally or from a remote location. MXs can also use an onboard DHCP client to quickly and automatically obtain their IP configurations. The compact MXR-2 delivers wireless LAN services to branch offices using automatic, no-touch deployment and remote configuration and management, eliminating the need for onsite IT expertise. It supports up to 3 Trapeze MPs or third-party APs as well as PoE. The MX-8 includes eight 10/100 Mbps ports and provides PoE. It s designed for distributed deployments in the wiring closet and can support 12 MPs or third-party APs. The MX-200 has two Gigabit Ethernet ports. Designed for data center deployment, it supports up to 32, 64, 96 or 128 managed MPs simultaneously, depending on the licensing option. The MX-216 has 16 10/100 Mbps port, all with integrated power-over-ethernet (PoE), plus two Gigabit Ethernet ports, and is equally suited for distributed wiring closet and centralized data center deployments. The MX-216 also supports up to 32, 64, 96 or 128 managed MPs simultaneously, depending on the licensing option. The MX-400, designed for data center deployment, includes four Gigabit Ethernet ports and supports 120 MPs or third-party APs. Key MX Features The MX delivers a range of unique features: The Trapeze Mobility Exchange switches: From top to bottom, the MXR-2, MX-8, MX-216, MX-200 and MX-400 Tracks and maintains user authentication, authorization and RF statistics information as users roam across multiple MXs Page 12

14 Maintains a user s membership in the right virtual private group based on the user s authenticated identity Dynamically enables virtual private groups as needed to support roaming users, even across router boundaries Provides scaled, resilient, integrated AAA back-end infrastructure Terminates and processes the Extensible Authentication Protocol (EAP) for 802.1X users Reduces AAA clients by 20:1 Supports complete local AAA authentication, including 802.1X, as primary or backup to a centralized AAA server Supports multiple AAA server groups and can load share across multiple AAA servers or within a server group Offloads Transport Layer Security (TLS) operations from AAA server, reducing the traffic load by 80% Generates and manages X.509 digital certificates Assigns and enforces per-user authorization policies that are managed centrally from the AAA back-end Authorizations include virtual private group membership, personal firewall filters, time-of-day/day-of- week access, encryption type, and location-specific policies Performs local cryptographic functions WPA 2.0/AES, WPA/TKIP and dynamic WEP with rotating broadcast/multicast keys Generates master and session keys Provides key management for each encryption technique Provides detailed per-user session RF accounting statistics and management Tracks the location, roaming history, virtual private group, network addresses, state, activity, errors, usage and other attributes by user name, session, VLAN, user group or other categories selected by IT Provides per-user audit trail and charge-back capability through the accounting component of AAA Configures and controls MPs; controls third party APs The boot, configuration and management model is compliant with the IETF Architecture for Control and Provisioning of Wireless Access Points (CAPWAP). The MX is categorized as an access controller (AC) that supports direct, switched, and routed connections. Controls all data forwarding, configuration and images of MPs Multiple MXs provide resilient control Enables resilient network operation EtherChannel load-shared, redundant links Spanning tree and per-vlan spanning tree (PVST+) Resilient network attachment via any MX port N:1 redundant MX capabilities Trapeze Web Quick Start simplifies the deployment of new MXs Provides management access Web access using HTTPS Telnet server, client SSL, XML interface to RingMaster SSH v2 (command line interface) SNMP v1 v2c, v3 Page 13

15 Trapeze Mobility Points. The Mobility Point An integral part of Trapeze Mobility System, the Trapeze Networks Mobility Point (MP ) provides wireless LAN (WLAN) access to the network while enabling secure mobility, quality of service (QoS) for vital applications, and seamless roaming. The MP also provides client access to a wide range of features on the Trapeze Mobility Exchange (MX ) WLAN switch. Trapeze MPs can link to MXs directly or can be deployed anywhere throughout an existing wired network. MPs use 802.3af power over Ethernet (PoE) from directly connected MXs or third-party PoE injectors. MPs have two 10/100BASE-T Ethernet ports for resilient power and data paths. Planning, configuring and deploying Trapeze MPs is simple. The Trapeze RingMaster tool suite automates the entire process. It determines how many MPs are needed, where they should be installed on a floor plan, generates configuration details for each MP, and creates a work order for installers. Designed by Trapeze, these plenum-rated MPs intentionally resemble smoke detectors to minimize visibility. With no protruding rabbit ears and no obvious hallmarks of an AP, MPs are less likely to be tampered with. Trapeze MPs also feature a built-in Kensington locking system for added physical security. Trapeze MPs are controlled by centrally located MXs throughout a Trapeze Mobility Domain. APs have no local store of data so they can be safely installed in unsecured areas without fear of hacking or theft. Trapeze offers a safer alternative to access points (APs) that store vital network and user information. The Trapeze MXs automatically configure MPs. At installation, no pre-configuration of any type is needed. If an MP needs to be replaced, the newly installed MP will automatically inherit the necessary MP configuration for that deployment from the MX. Trapeze MPs play a key role in rogue and intrusion detection as well as denial-of-service (DoS) attack detection. ActiveScan allows MPs to fulfill a dual role. They continuously scan all bands, channels and VLANs while simultaneously providing wireless connectivity to mobile clients. MPs can also act as dedicated sentries, providing nonstop scanning. The Trapeze WLAN Mobility System lets you create policies that determine what, where and when RF countermeasures are launched. This prevents interfering with WLANs in adjacent businesses, while allowing scanning in areas of the WLAN that require policing and ensuring prompt corrective action if a rogue, intruder or DoS attack is detected. When it comes to RF, Trapeze MPs take RF Auto-Tuning to where it should be to the user. MPs automatically calculate the data integrity and signal strength of the WLAN channel and continually tune for optimal RF channel and transmit power. Using intelligent queuing, Trapeze MPs enforce the prioritization of delay-sensitive voice and other critical applications. Wi-Fi Multimedia (WMM) or SpectraLink Voice Priority (SVP) can be configured to ensure optimal QoS for voice traffic. Policies allow per user, protocol or class-of-service (CoS) mapping. MPs always prioritize time-sensitive traffic, such as voice calls, over other traffic types. Page 14

16 Key Features The MP shares some features with other APs, but is unique in many ways: Dual radios Dual-radio a and b/802.11g Granular Transmit Power Setting (1 dbm) and channel selection to support international requirements and control the RF cell size ActiveScan rogue and DoS detection Scan all bands, associated channels and VLANs, while simultaneously providing wireless connectivity to mobile clients SentryScan Scan the air nonstop on both bands and their associated channels, while other MPs support WLAN clients Rogue detection, Intrusion Detection System (IDS) and RF countermeasures Determines whether devices seen on the air are merely interfering or truly rogue As policy dictates, if a rogue AP or client is detected, the most appropriate MP spoofs appropriate control messages Prevents clients from communicating associating and authenticating with rogue APs and clients, discovers information about them and discovers information about both Intrusion Detection System (IDS) provides alerts in the event of DoS attacks, flood attacks and AP spoofing Intelligent RF countermeasures avoid the shoot-first-ask-questions-later approach to disabling suspected rogue devices RF Auto-Tuning Continuous self-tuning for optimal channel and transmit power in response to environmental changes Self-tuning factors-in client data integrity when adjusting and optimizing RF settings Eliminates dynamic and unplanned coverage holes where no APs are installed Virtualized APs Each radio can have multiple BSSID/SSIDs, to appear as multiple APs Virtual Private Groups (VPGs) Ability to have independently encrypted and isolated subnets or VLANs while using the same SSID Configuration Automated by RingMaster tool suite Downloaded to MP from MX, across the network as needed CAPWAP compatible The boot, configuration and management model is compliant with the IETF architecture for Control and Provisioning of Wireless Access Points (CAPWAP) Working Group Installation and ergonomics Zero configuration of the MP no staging required by installer Replacement MP inherits configuration from MX Highly inconspicuous, looks like a smoke detector Plenum rated to meet safety and insurance requirements for building deployments One-snap installation invisible attachment to ceiling grid True omni-antenna capability allows position-independent placement vertical or horizontal Page 15

17 RF and encryption Performs packet encryption over the air Hardware support for dynamic WEP, WPA/TKIP, and WPA 2.0/AES Communicates RF knowledge to MX, including statistics, counters, client status and other discovered devices Supports a variety of external high-gain directional antenna options Voice and quality of service (QoS) MP prioritizes traffic delivery by QoS model Per-user and/or per priority queuing Wi-Fi Multimedia (WMM) QoS SpectraLink Voice Priority (SVP) Poses no security risk No local data store No console port; no local access is possible Kensington security lock If stolen, no secure configuration data goes with it All data on the wired network goes only to and from the managing MX Not operational as a standalone device All security management handled by MX, including the generation of session keys Resiliency support Two 10/100BASE-T Ethernet ports for dual-honed switch connections Supports redundant 802.3af PoE links Maximizes wireless LAN availability MP outage resiliency planning through RingMaster Session load-balancing Prevents bug-light syndrome Won t accept user associations until MX successfully configures and enables the MP RingMaster RingMaster is a full-featured tool suite that enables IT managers to perform pre- and post-deployment planning, configuration, verification, management and optimization of the WLAN infrastructure. IT first imports standard building plan files in AutoCAD DXF, AutoCAD DWG, JPEG or GIF formats to design the WLAN offline. The wizard-based Trapeze Virtual Site Survey and capacity planning tools simplify device configurations. RingMaster s 3D awareness lets IT plan an entire building vs. just a floor, and the built-in library of measured attenuation factors ensures that RingMaster understands how RF will flow through the particular environment. The RingMaster tool suite automatically determines the number of MPs that need to be installed in any part of a building and can take into consideration the number of users and the level of traffic they re likely to generate if IT wants RingMaster to include capacity planning. Page 16

18 RingMaster also allows the IT manager to easily adjust WLAN capacity with minimal disruption. Once the plan is done, IT can print a work order that shows where to install Trapeze MXs and MPs. When that s done, IT can deploy hundreds of MP configurations in a single step. RingMaster shows you the location of roaming users and Mobility Points and access points they are associated with. With Trapeze, tight integration, automation and ease of use reduce operating costs, reducing the burden on the IT staff, eliminating configuration errors and delivering a faster response to problems. Key RingMaster Features Standalone Java application Runs on Windows 2000, Windows XP, Solaris 8 and 9, and Linux Can integrate with HP OpenView Network Node Manager Complete off-line and on-line configuration planning Eliminates expensive and time-consuming manual site surveys Design offline with AutoCAD and other standard file formats Applies RF attenuation factors to walls, doors, ceilings, windows, and other structures Optional capacity planning optimizes the performance of applications and services Allows what-if scenarios for planning, without needing any hardware Deployment tool leverages network plan Automatic MX and MP placement, power-level optimization, and RF channel assignment Generate work orders that show where to install Trapeze equipment Verify and synchronize configurations Configuration version archives One-click systemwide changes Deploys configurations to all MX and MP devices Systemwide MX and MP image management Centralized upgrades Easy network rollbacks Page 17

19 RF sweeps provide rogue and intrusion detection and wireless topology map - Supports continuous, scheduled, or on-demand RF sweeps - Single radio can sweep both 2.4 and 5.0 GHz bands - Detects and locates rogue APs and users and ad hoc networks - RF coverage verification and topology-mapping tools provide air awareness Locates users by identity - Tracks roaming history, bandwidth usage statistics Issues automatic alerts about rogue detection, any network changes - Wizard interface prompt for conflict resolution Sophisticated, context-sensitive rules engine Fault and event viewer for all MX and MP events Performance statistics - Tables, graphs with file export Page 18

20 Product Overview Americas 5753 W. Las Positas Blvd. Pleasanton, CA Phone Fax EMEA Olympia 3D NS Hilversum The Netherlands Phone +31 (0) Fax +31 (0) Asia-Pacific 275A, 2/F, Sui On Centre 8 Harbour Road Wanchai, Hong Kong Phone Fax Japan ARK Mori Bldg., West Wing 12F 12-32, Akasaka 1-chome Minato-ku, Tokyo Phone +81 (0) Fax +81 (0) Trapeze Networks, the Trapeze Networks logo, the Trapeze Networks flyer icon, Mobility System, Mobility Exchange, MX, Mobility Point, MP, Mobility System Software, MSS, RingMaster, AAA Integration and RADIUS Scaling, ActiveScan, AIRS, Bonded Auth, FastRoaming, Granular Transmit Power Setting, GTPS, Layer 3 Path Preservation, Location Policy Rule, LPR, Mobility Domain, Mobility Profile, Passport-Free Roaming, SentryScan, Time-of-Day Access, TDA, TAPA, Trapeze Access Point Access Protocol, Virtual Private Group, VPG, Virtual Service Set, Virtual Site Survey and WebAAA are trademarks of Trapeze Networks, Inc. Trapeze Networks SafetyNet is a service mark of Trapeze Networks, Inc. All other products and services are trademarks, registered trademarks, service marks or registered service marks of their respective owners Trapeze Networks, Inc. All rights reserved. OV-MSO-206

Mobility Point MP-422A

Mobility Point MP-422A Mobility Point MP-422A DATA SHEET Mobility Point MP-422A Dual-radio Indoor Wireless Access Point for 802.11a and 802.11b/g The Mobility Point family provides access point, bridging and wireless mesh services

More information

Mobility Exchange MX-8

Mobility Exchange MX-8 Mobility Exchange MX-8 DATA SHEET Mobility Exchange MX-8 Intelligent WLAN Controller for branch office and wiring closet deployment. Supports up to 12 access points. The Mobility Exchange (MX ) family

More information

Network Design Best Practices for Deploying WLAN Switches

Network Design Best Practices for Deploying WLAN Switches Network Design Best Practices for Deploying WLAN Switches A New Debate As wireless LAN products designed for the enterprise came to market, a debate rapidly developed pitting the advantages of standalone

More information

RingMaster : Enterprise Wi-Fi Management

RingMaster : Enterprise Wi-Fi Management RingMaster : Enterprise Wi-Fi Management RingMaster is a richly-featured, innovative, easy-to-use, full-lifecycle enterprise WLAN management suite. RingMaster enables network managers to perform all critical

More information

Mobility Exchange MXR-2

Mobility Exchange MXR-2 Mobility Exchange MXR-2 The Trapeze Mobility Exchange (MX ) family of intelligent WLAN controllers provide the platform for Trapeze Smart Mobile wireless networks. Smart Mobile is the only WLAN architecture

More information

Mobility Point MP-372

Mobility Point MP-372 Mobility Point MP-372 The Trapeze Mobility Point (MP ) family of multi-function access points provides access point wireless services for Trapeze Smart Mobile wireless networks. Smart Mobile is the only

More information

Trapeze Networks. RingMaster Enterprise Wi-Fi Management. Trapeze Overview Software Mobility Exchanges Mobility Points Trapeze Appliances

Trapeze Networks. RingMaster Enterprise Wi-Fi Management. Trapeze Overview Software Mobility Exchanges Mobility Points Trapeze Appliances 1 of 19 11/15/2011 6:30 AM Trapeze Networks Trapeze Overview Software Mobility Exchanges Mobility Points Trapeze Appliances Trapeze Smart Mobile provides all the components required to deploy a high-availability

More information

No Wires. No Waiting. No Worries. NETWORKS WITHOUT WIRES 26610 Agoura Road, Suite 110 Calabasas, California 91302

No Wires. No Waiting. No Worries. NETWORKS WITHOUT WIRES 26610 Agoura Road, Suite 110 Calabasas, California 91302 No Wires No Waiting No Worries NETWORKS WITHOUT WIRES 26610 Agoura Road, Suite 110 Calabasas, California 91302 1.877.STRIXSYS (1.877.787.4979) www.strixsystems.com The Best Wireless Network has No Wires

More information

Cisco Wireless Control System (WCS)

Cisco Wireless Control System (WCS) Data Sheet Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform for wireless LAN planning, configuration,

More information

CISCO WIRELESS CONTROL SYSTEM (WCS)

CISCO WIRELESS CONTROL SYSTEM (WCS) CISCO WIRELESS CONTROL SYSTEM (WCS) Figure 1. Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform

More information

OmniAccess Wireless LAN Switching Systems. The Next Generation of Wireless LAN Connectivity Secure mobility for the enterprise

OmniAccess Wireless LAN Switching Systems. The Next Generation of Wireless LAN Connectivity Secure mobility for the enterprise OmniAccess Wireless LAN Switching Systems The Next Generation of Wireless LAN Connectivity Secure mobility for the enterprise Alcatel OmniAccess WLAN switching system changes how 802.11 networks are deployed,

More information

Wireless Local Area Networks (WLANs)

Wireless Local Area Networks (WLANs) 4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................

More information

How To Set Up A Cisco Wap121 Wireless N Access Point With Single Point Setup

How To Set Up A Cisco Wap121 Wireless N Access Point With Single Point Setup Data Sheet Cisco WAP121 Wireless-N Access Point with Single Point Setup Secure, Easy-to-Deploy, Affordable Wireless-N Connectivity Highlights Provides affordable high-bandwidth 802.11n wireless connectivity

More information

Avaya WLAN 2300 Series

Avaya WLAN 2300 Series Avaya WLAN 2300 Series The Avaya WLAN 2300 Series is a complete 802.11 solution for enterprises wishing to deploy widespread wireless coverage for today s business, IP Telephony and converged multimedia

More information

Deploying a Secure Wireless VoIP Solution in Healthcare

Deploying a Secure Wireless VoIP Solution in Healthcare Deploying a Secure Wireless VoIP Solution in Healthcare Situation Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants

More information

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business Quick Start Guide Cisco Small Business WRV210 Wireless-G VPN Router with RangeBooster Package Contents WRV210 Router Ethernet Cable Power Adapter Product CD-ROM Quick Start Guide Welcome Thank you for

More information

Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers. Product Highlights. Relay2 Enterprise Access Point RA100 Datasheet

Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers. Product Highlights. Relay2 Enterprise Access Point RA100 Datasheet Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers The Relay2 Smart Access Point (RA100) is an enterprise-class access point designed for deployment in high-density environments

More information

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks. Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted

More information

300Mbps Wireless N Gigabit Ceilling Mount Access Point

300Mbps Wireless N Gigabit Ceilling Mount Access Point Datasheet 300Mbps Wireless N Gigabit Ceilling Mount Access Point 120 Highlights Wireless N speed up to 300Mbps The Controller Software enables administrators to manage hundreds of s easily from any PC

More information

Boosting Business Mobility and Responsiveness with the Cisco Unified Wireless Network

Boosting Business Mobility and Responsiveness with the Cisco Unified Wireless Network Solution Overivew Boosting Business Mobility and Responsiveness with the Cisco Unified Wireless Network EXECUTIVE SUMMARY Today s businesses are turning to wireless networking to give employees immediate

More information

Best Practices for Outdoor Wireless Security

Best Practices for Outdoor Wireless Security Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged

More information

Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN

Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN Deploying the ShoreTel IP Telephony Solution with a Meru Networks Wireless LAN Copyright 2005, Meru Networks, Inc. This document is an unpublished work protected by the United States copyright laws and

More information

How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility

How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility w h i t e p a p e r How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility So much is happening today to give you a chance to rethink your wireless architecture. Indeed, you

More information

Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security. Cisco Small Business Access Points

Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security. Cisco Small Business Access Points Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security Cisco Small Business Access Points Advanced, High-Performance Wireless Access for the Small Business Highlights Supports high-bandwidth applications

More information

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the

More information

Secure Wireless Networking

Secure Wireless Networking Secure Wireless Networking In today s connected world, people expect seamless connectivity to their networks and the Internet. That s why Cisco Small Business Wireless s offer expanded range and coverage

More information

Deploy and Manage a Highly Scalable, Worry-Free WLAN

Deploy and Manage a Highly Scalable, Worry-Free WLAN Deploy and Manage a Highly Scalable, Worry-Free WLAN Centralized WLAN management and auto provisioning Manages up to 512 APs with granular access control simplifies complex, inconvenient cabling Wi-Fi

More information

300Mbps Wireless N Ceiling Mount Access Point

300Mbps Wireless N Ceiling Mount Access Point Datasheet Ceiling Mount Access Point 110 Highlights Wireless N speed up to 300Mbps Controller Software enables administrators to easily manage hundreds of s Supports passive PoE for convenient installation

More information

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia

More information

Enterprise A Closer Look at Wireless Intrusion Detection:

Enterprise A Closer Look at Wireless Intrusion Detection: White Paper Enterprise A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Josh Wright Senior Security Researcher Introduction As wireless enterprise networks become

More information

Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security Cisco Small Business Access Points

Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security Cisco Small Business Access Points Cisco WAP4410N Wireless-N Access Point: PoE/Advanced Security Cisco Small Business Access Points Advanced, High-Performance Wireless Access for the Small Business Highlights Supports high-bandwidth applications

More information

NXC5200/ NWA5000-N Series Wireless LAN Controller/ 802.11 a/b/g/n Managed Access Point

NXC5200/ NWA5000-N Series Wireless LAN Controller/ 802.11 a/b/g/n Managed Access Point Higherbandwidth, higher density with full range of 802.11n s (NWA5000N Series) Comprehensive guest network management with auto guest account generator and Web authentication support Manage up to 240 APs

More information

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4 1. APPLE AIRPORT EXTREME 1.1 Product Description The following are device specific configuration settings for the Apple Airport Extreme. Navigation through the management screens will be similar but may

More information

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model

A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid

More information

Intelligent WLAN Controller with Advanced Functions

Intelligent WLAN Controller with Advanced Functions Intelligent WLAN Controller with Advanced Functions Centralized WLAN management and auto provisioning Manages up to 512 APs with granular access control ZyMESH simplifies complex, inconvenient cabling

More information

Design Guide for Pervasive Wireless Networks

Design Guide for Pervasive Wireless Networks Design Guide Design Guide for Pervasive Wireless Networks This document describes how to design and install a pervasive wireless network based on the Meru Networks Wireless LAN (WLAN) System. A pervasive

More information

300Mbps Wireless N Gigabit Ceilling Mount Access Point

300Mbps Wireless N Gigabit Ceilling Mount Access Point Datasheet 300Mbps Wireless N Gigabit Ceilling Mount Access Point 120 Highlights Wireless N speed up to 300Mbps Clustering function greatly simplified business wireless network management, to easy manage

More information

Trapeze Networks Mobility System Configuration and Deployment Guide

Trapeze Networks Mobility System Configuration and Deployment Guide Trapeze Networks Mobility System Configuration and Deployment Guide SpectraLink s Voice Interoperability for Enterprise Wireless (VIEW) Certification Program is designed to ensure interoperability and

More information

APPENDIX 3 LOT 3: WIRELESS NETWORK

APPENDIX 3 LOT 3: WIRELESS NETWORK APPENDIX 3 LOT 3: WIRELESS NETWORK A. TECHNICAL SPECIFICATIONS MAIN PURPOSE The Wi-Fi system should be capable of providing Internet access directly to a user using a smart phone, tablet PC, ipad or Laptop

More information

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks.

This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. This document describes how the Meraki Cloud Controller system enables the construction of large-scale, cost-effective wireless networks. Copyright 2009 Meraki, Inc. All rights reserved. Trademarks Meraki

More information

L2+ Unified Wired/Wireless Gigabit PoE Switches

L2+ Unified Wired/Wireless Gigabit PoE Switches Scalable Unified Wired/Wireless Network Architecture Manages up to 48 D-Link Unified Access Points Up to 192 Unified Access Points can be managed by a cluster of four DWS-3160 switches Robust Wired/Wireless

More information

QuickSpecs. Models. Features and Benefits Mobility. ProCurve Wireless Edge Services zl Module. ProCurve Wireless Edge Services zl Module Overview

QuickSpecs. Models. Features and Benefits Mobility. ProCurve Wireless Edge Services zl Module. ProCurve Wireless Edge Services zl Module Overview Overview Models J9051A Introduction Working in conjunction with ProCurve radio ports, the provides centralized wireless LAN configuration and management of advanced wireless services, enabling a resilient,

More information

Meraki Stacking. White Paper

Meraki Stacking. White Paper White Paper Meraki Stacking OCTOBER 2015 This document describes the benefits of Meraki Stacking technology and how it can be used to manage a distributed network. In addition, this document will cover

More information

Design and Implementation Guide. Apple iphone Compatibility

Design and Implementation Guide. Apple iphone Compatibility Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new

More information

Feature Guide. RingMaster Software Version 7.4 Mobility System Software Version 7.3

Feature Guide. RingMaster Software Version 7.4 Mobility System Software Version 7.3 Feature Guide RingMaster Software Version 7.4 Mobility System Software Version 7.3 Trapeze Networks, Inc. 5753 W. Las Positas Blvd. Pleasanton, CA 94588 Tel: +1 925-474-2200 Fax: +1 925-251-0642 Toll-Free:

More information

Cisco Small Business Managed Switches

Cisco Small Business Managed Switches Cisco SRW224P 24-Port 10/100 + 2-Port Gigabit Switch: WebView/PoE Cisco Small Business Managed Switches Secure, Reliable, Intelligent Switching with PoE for Growing Businesses Highlights Connects up to

More information

BYOD Networks for Kommuner

BYOD Networks for Kommuner BYOD Networks for Kommuner Simon Tompson Solutions Architect @MerakiSimon About Meraki The recognized leader in Cloud Networking - Thousands of customer networks in over 100 countries worldwide - World

More information

Secure Networks for Process Control

Secure Networks for Process Control Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than

More information

HiPath Wireless Controller, Access Points and Convergence Software, V3.0. User Guide

HiPath Wireless Controller, Access Points and Convergence Software, V3.0. User Guide HiPath Wireless Controller, Access Points and Convergence Software, V3.0 User Guide *1PA31003-W1010-A100-1-7619* 1P A31003-W1010-A100-1-7619 The information provided in this document contains merely general

More information

Ensuring HIPAA Compliance in Healthcare

Ensuring HIPAA Compliance in Healthcare The Intelligent Wireless Networking Choice WHITE PAPER Ensuring HIPAA Compliance in Healthcare Overview Wireless LANs are prevalent in healthcare institutions. The constant need for mobility among doctors,

More information

Cisco Small Business 500 Series Wireless Access Points

Cisco Small Business 500 Series Wireless Access Points Data Sheet Cisco Small Business 500 Series Wireless Access Points High-Performance, Easy-to-Deploy, Secure Business-Class Wireless-N Connectivity Highlights Provides cost-effective selectable or concurrent

More information

48 GE PoE-Plus + 2 GE SFP L2 Managed Switch, 375W

48 GE PoE-Plus + 2 GE SFP L2 Managed Switch, 375W GEP-5070 Version: 1 48 GE PoE-Plus + 2 GE SFP L2 Managed Switch, 375W The LevelOne GEP-5070 is an intelligent L2 Managed Switch with 48 x 1000Base-T PoE-Plus ports and 2 x 100/1000BASE-X SFP (Small Form

More information

Applying Mesh Networking to Wireless Lighting Control

Applying Mesh Networking to Wireless Lighting Control White Paper Applying Mesh Networking to Wireless Lighting Control www.daintree.net Abstract Recent advances in wireless communications standards and energy-efficient lighting equipment have made it possible

More information

Wireless Technology Seminar

Wireless Technology Seminar Wireless Technology Seminar Introduction Adam Worthington Network Consultant [email protected] Wireless LAN Why? Flexible network access for your users? Guest internet access? VoWIP? RFID? Available

More information

Configuration Notes Trapeze Networks Infrastructure in Ascom VoWiFi System

Configuration Notes Trapeze Networks Infrastructure in Ascom VoWiFi System Configuration Notes Trapeze Networks Infrastructure in Ascom VoWiFi System Contents 1 Introduction... 1 1.1 Abbreviations and Glossary... 1 2 Configuration... 2 2.1 Radio Settings... 2 2.1.1 Radio Channels...

More information

Intelligent, Functional and Effective Gateways for Small Business Applications

Intelligent, Functional and Effective Gateways for Small Business Applications Intelligent, Functional and Effective Gateways for Small Business Applications Application Guide Small Business Gateway Series Easy Installation and Management with Streamlined Support Available Anytime

More information

Cisco WAP321 Wireless-N Selectable-Band Access Point with Single Point Setup

Cisco WAP321 Wireless-N Selectable-Band Access Point with Single Point Setup Data Sheet Cisco WAP321 Wireless-N Selectable-Band Access Point with Single Point Setup Secure and Easy to Deploy Wireless-N Networking with Gigabit Ethernet Connectivity Highlights Provides selectable-band

More information

BYOD: BRING YOUR OWN DEVICE.

BYOD: BRING YOUR OWN DEVICE. white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased

More information

EAP9550 11N Wall Mount Access Point / WDS AP / Universal Repeater

EAP9550 11N Wall Mount Access Point / WDS AP / Universal Repeater EAP9550 is a powerful and multi-functioned 11n Access Point and it can act three modes AP/WDS/Universal Repeater. Smoke detector appearance will minimize visibility. So this model can work properly at

More information

Wireless Network Standard and Guidelines

Wireless Network Standard and Guidelines Wireless Network Standard and Guidelines Purpose The standard and guidelines listed in this document will ensure the uniformity of wireless network access points and provide guidance for monitoring, maintaining

More information

Mobility System Software Quick Start Guide

Mobility System Software Quick Start Guide Mobility System Software Quick Start Guide Version 8.0 P/N 530-041387 Rev.05 Table of Contents About this Guide Using the Web Quick Start (WLC2, WLC8, WLC200,WLC800R, and WLC880R) Remotely Configuring

More information

Introduction to Junos Space Network Director

Introduction to Junos Space Network Director Introduction to Junos Space Network Director Release 2.0 Published: 2015-02-12 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights

More information

How To Use An Ipad Wireless Network (Wi Fi) With An Ipa (Wired) And An Ipat (Wired Wireless) Network (Wired Wired) At The Same Time

How To Use An Ipad Wireless Network (Wi Fi) With An Ipa (Wired) And An Ipat (Wired Wireless) Network (Wired Wired) At The Same Time IdentiFiTM IDENTIFI Experience Matters IdentiFi wired-like Wi-Fi experience for the wireless world Extreme Networks IdentiFi is a purpose-built Wi-Fi solution that provides a wiredlike Wireless Local Area

More information

HP AP8760 Dual Radio 802.11a/b/g Access Point Overview

HP AP8760 Dual Radio 802.11a/b/g Access Point Overview Overview Models JD016A Key features Simultaneous 802.11a and 802.11b/g support PoE power/data via Category 5/6 data cables WPA/2, AES, TKIP, WEP packet encryption MAC address authentication/filtering WDS

More information

Wireless LAN. Quick Sales Guide

Wireless LAN. Quick Sales Guide Wireless LAN Quick Sales Guide Wireless LAN Quick Finder Key Features Segment Description Key Features Small Web Managed SNMP Extended Range 2.4 GHz Support 802.11n Generation of PoE AP Support 802.11n

More information

Enterprise WiFi System. Datasheet. Models: UAP, UAP-LR, UAP-PRO, UAP-AC UAP-Outdoor, UAP-Outdoor5

Enterprise WiFi System. Datasheet. Models: UAP, UAP-LR, UAP-PRO, UAP-AC UAP-Outdoor, UAP-Outdoor5 Enterprise WiFi System Models: UAP, UAP-LR, UAP-PRO, UAP-AC UAP-Outdoor, UAP-Outdoor5 Unlimited Indoor/Outdoor AP Scalability in a Unified Management System Breakthrough Speeds up to 1300 Mbps (802.11ac)

More information

Document Created by Nick Schuster

Document Created by Nick Schuster Document Created by Nick Schuster Product Overview...4 Introduction... 4 Features... 5 Package Contents... 6 System Requirements... 6 Hardware Overview...7 LEDs... 7 Connections... 7 Basic Installation...8

More information

Key Features. EnGenius Outdoor Base Station designs High Power, High Sensitivity and Strong Reliability Solutions under Harsh Environment.

Key Features. EnGenius Outdoor Base Station designs High Power, High Sensitivity and Strong Reliability Solutions under Harsh Environment. 802.11 b/g/n N300 Access Point Key Features IEEE 802.11 b/g/n compliant Up to 300Mbps (2.4GHz) Complaint with IEEE 802.3 at for PoE supported PoE injector with reset from remote-end Two Gigabit Ethernet

More information

DWL-8600AP. Quality of Service WMM (Wi-Fi Multimedia) SVP (SpectraLink Voice Priority)

DWL-8600AP. Quality of Service WMM (Wi-Fi Multimedia) SVP (SpectraLink Voice Priority) Ideal for Business Dualband Connectivity for Increased Network Capacity Concurrent Operation in both 802.11a/n & 802.11b/g/n at Full Bandwidth Speeds Solid Die Cast Metal Housing Design for Indoor Deployment

More information

Configuring Security Solutions

Configuring Security Solutions CHAPTER 3 This chapter describes security solutions for wireless LANs. It contains these sections: Cisco Wireless LAN Solution Security, page 3-2 Using WCS to Convert a Cisco Wireless LAN Solution from

More information

Cisco EXAM - 500-451. Enterprise Network Unified Access Essentials. Buy Full Product. http://www.examskey.com/500-451.html

Cisco EXAM - 500-451. Enterprise Network Unified Access Essentials. Buy Full Product. http://www.examskey.com/500-451.html Cisco EXAM - 500-451 Enterprise Network Unified Access Essentials Buy Full Product http://www.examskey.com/500-451.html Examskey Cisco 500-451 exam demo product is here for you to test the quality of the

More information

PCI Wireless Compliance with AirTight WIPS

PCI Wireless Compliance with AirTight WIPS A White Paper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Suite 200, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Introduction Although [use

More information

Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led

Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led Course Description This 3-day instructor-led, hands-on course provides learners with skills and resources required to successfully

More information

Matthew Chu - SR. Technical Architect Channel Technical Sales Enablement

Matthew Chu - SR. Technical Architect Channel Technical Sales Enablement MOTOROLA WLAN OVERVIEW Matthew Chu - SR. Technical Architect Channel Technical Sales Enablement AGENDA Growth Opportunity and Key Drivers WiNG 5 & The Motorola Advantage Vertical Use Cases Resources Q

More information

Vocera Infrastructure Planning Summary. B3000n Compatible

Vocera Infrastructure Planning Summary. B3000n Compatible Vocera Infrastructure Planning Summary B3000n Compatible Notice Copyright 2002- Vocera Communications, Inc. All rights reserved. Vocera is a registered trademark of Vocera Communications, Inc. This software

More information

ProSAFE 8-Port and 16-Port Gigabit Click Switch

ProSAFE 8-Port and 16-Port Gigabit Click Switch ProSAFE 8-Port and 16-Port Gigabit Click Switch Model GSS108E and GSS116E User Manual March 2015 202-11520-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products.

More information

VIEW Certified Configuration Guide. Trapeze Networks. Mobility System for MP-372 Access Points. January 2008 Edition 1725-36083-001 Version H

VIEW Certified Configuration Guide. Trapeze Networks. Mobility System for MP-372 Access Points. January 2008 Edition 1725-36083-001 Version H VIEW Certified Configuration Guide Trapeze Networks Mobility System for MP-372 Access Points January 2008 Edition 1725-36083-001 Version H Configuration Guide Trademark Information Polycom and the logo

More information

Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems

Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems Page 1 of 5 Protecting the Palace: Cardholder Data Environments, PCI Standards and Wireless Security for Ecommerce Ecosystems In July the Payment Card Industry Security Standards Council (PCI SSC) published

More information

Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 [email protected] www.tunitas.

Wireless Security. New Standards for 802.11 Encryption and Authentication. Ann Geyer 209-754-9130 ageyer@tunitas.com www.tunitas. Wireless Security New Standards for 802.11 Encryption and Authentication Ann Geyer 209-754-9130 [email protected] www.tunitas.com National Conference on m-health and EOE Minneapolis, MN Sept 9, 2003 Key

More information

July, 2006. Figure 1. Intuitive, user-friendly web-based (HTML) interface.

July, 2006. Figure 1. Intuitive, user-friendly web-based (HTML) interface. Smart Switches The Value-Oriented Alternative for Managed Switching White Paper September, 2005 Abstract This White Paper provides a short introduction to Web Smart switches and their importance in a local

More information

Avaya WLAN Orchestration System

Avaya WLAN Orchestration System Avaya WLAN Orchestration System Overview The Avaya WLAN Orchestration System (WOS) is a wireless network management platform that provides full monitoring and management of the Avaya WLAN 9100 Series network

More information

Configure WorkGroup Bridge on the WAP131 Access Point

Configure WorkGroup Bridge on the WAP131 Access Point Article ID: 5036 Configure WorkGroup Bridge on the WAP131 Access Point Objective The Workgroup Bridge feature enables the Wireless Access Point (WAP) to bridge traffic between a remote client and the wireless

More information

YO-301AP POE AP Datasheet

YO-301AP POE AP Datasheet YO-301AP POE AP Datasheet 300Mbps Wi-Fi Ceiling POE Access Point VER:1.0 Date:2013-06-03 1 Product Description: Practical and powerful The Ceiling PoE wireless access point for your home or office network

More information

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area

More information

Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access

Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access Cisco ServiceMesh defines a network design for service providers delivering valueadded municipal wireless services over a mesh network.

More information

Chapter 2 Configuring Your Wireless Network and Security Settings

Chapter 2 Configuring Your Wireless Network and Security Settings Chapter 2 Configuring Your Wireless Network and Security Settings This chapter describes how to configure the wireless features of your DG834N RangeMax TM NEXT Wireless ADSL2+ Modem Router. For a wireless

More information

Cisco Unified Access Technology Overview: Converged Access

Cisco Unified Access Technology Overview: Converged Access White Paper Cisco Unified Access Technology Overview: Converged Access Introduction Today, less than 1 percent of things in the physical world are network connected. In the near future the growth of the

More information