Evolving Network Security with the Alcatel-Lucent Access Guardian
|
|
|
- Augusta Hodges
- 10 years ago
- Views:
Transcription
1 T E C H N O L O G Y W H I T E P A P E R Evolving Network Security with the Alcatel-Lucent Access Guardian Enterprise network customers encounter a wide variety of difficulties and complexities when designing and implementing a security infrastructure. The solution must be comprehensive, flexible, and able to grow and evolve in tandem with the network and the threats it faces. Alcatel-Lucent has a large portfolio of tools and solutions to help the enterprise network customer. One such solution is the Alcatel-Lucent Access Guardian, which integrates authentication, device compliance and access control functions directly into the network infrastructure at the switch level. The following paper outlines several common customer security challenges and how the Access Guardian can be used to meet them.
2 Table of contents 1 Introduction 1 Network authentication with Access Guardian 2 Employee access 2 Enabling access for guests in public areas 2 Access control with Access Guardian 3 Endpoint compliance with Access Guardian 4 Conclusion 4 Abbreviations 4 Contacts 4 References
3 Introduction Every enterprise network has individual security requirements. Alcatel-Lucent has several tools and solutions to fully customize network security based on a customers needs. The following examples outline common customer security requirements and their possible solutions. Only the right people should have access to my network Figure 1. Alcatel-Lucent Embedded Network Security Framework Authentication Employee: 802.1x Guest: captive portal IP phone: 802.1x or Mac-based Printer: port-based Identity Integrity Host integrity check Integrated HIC (CyberGateKeeper) static agent or on-demand agent Access guardian Monitoring/audit trail OmniSwitch embedded network security framework User network profiles Role-based access including VLAN, QoS, ACL Visibility Privilege AQM Quarantine and remediation Traffic anomaly detection Zero day attack Isolation Threats control Network authentication with Access Guardian Although network authentication technologies have been around for many years, deployment has been limited in most enterprise networks. The recent introduction of the wireless LAN (WLAN) infrastructure has changed the perception regarding network security. This heightened security awareness in conjunction with the prevalence of mobile devices and the integration of authentication methods into the wireless encryption process (WPA, WPA2) has propelled network authentication back into the forefront of network security technologies. Even as authentication has gained widespread adoption in WLAN infrastructures, deploying it on the wired LAN is a continuous struggle. Legacy devices, lack of driver support and other compatibility issues limit how users and devices access network resources. The Alcatel-Lucent Access Guardian solves the wired LAN problem by combining several authentication technologies into one customizable and flexible framework within the edge switch to evolve current authentication systems from manual to dynamic. Evolving Network Security with the Alcatel-Lucent Access Guardian Technology White Paper 1
4 Employee access Possibly the biggest challenge in implementing authentication is determining the identity of authorized devices. Not all devices may have actual end users entering credentials (printers, copiers, vending machines, cameras, some IP phones, etc.), so alternative processes must be established to recognize them, which places an extra burden on network administrators. To grant network access to devices that do not have built-in capabilities such as challenge-based authentication (802.1X or web-based authentication), media access control (MAC) authentication can be implemented using a RADIUS server and an appropriate database (SQL, etc.) The database contains all the MAC addresses and optionally the appropriate role to be returned to the switch. Gathering and managing all the MAC addresses is daunting, but several tools are available to make it easier. The Alcatel-Lucent OmniVista 2500 Network Management System includes the Locator application, which polls and stores information on all MAC addresses in the network. By crossreferencing a vendor s IEEE organizationally unique identifier (OUI) with the OmniVista 2500 NMS database an administrator can quickly recognize various device classes, such as printers or IP phones. Recognizing guests on the network is the result of a process of elimination. Once employees and other known devices have been recognized by 802.1X, MAC-based or web-based authentication, all other devices are considered new and/or guest devices. The administrator is then able to decide whether to grant access or not. If access is granted, the web-based authentication method could be used, and separate roles returned to grant the guest different access rights and VLANs. An effective method of control is to provide guest credentials using a sign-in process at a front desk or visitor desk. A temporary login/password is assigned to each visitor, and these credentials are used to gain wired and/or wireless access to the network infrastructure. Enabling access for guests in public areas Access Guardian authentication policies are defined on a per-port basis. Which means different devices may be connected to a port using different VLANs or access controls, but the configuration of the authentication policy is defined per port. To allow access to the network from public and semi-public areas such as lobbies, conference rooms, etc., physical ports in those areas could be configured to require web-based authentication. This change does not require a wide-scale implementation of other authentication methods, but can be pinpointed to specific areas without the introduction of a new security infrastructure. I want to control what parts of my network users can access Access control with Access Guardian The Access Guardian framework allows administrators to implement dynamic access controls through the network infrastructure. User network profiles (UNP) enforced at the edge switch provides a means of correlating a user group to a specific set of access control policies. Access controls can be based on user identity through authentication or physical location based on the port. Control based on physical location is achieved by assigning the appropriate UNP to a specific set of ports, which is then linked to access control lists (ACLs) in the edge switch hardware. Because there is no limit to the number of endpoints that can be associated to an internal list, the design is scalable to any size of network. UNPs can also be determined by any form of authentica- 2 Evolving Network Security with the Alcatel-Lucent Access Guardian Technology White Paper
5 tion implemented on the edge switch (802.1X, MAC-based and web-based authentication). By associating a list of ACLs to a UNP, groups of users are given specific access rights. Note that this association does not take the VLAN or source IP address into consideration. ACLs are implemented based on the MAC address of the station and not its membership in a particular VLAN or subnet. It is possible for a customer to implement the same UNP names across their entire infrastructure, as the VLAN association is kept locally on each switch. For example, a UNP named Engineering is deployed in one building with VLAN 10, while the same UNP in another building is VLAN 20. In each building, the same ACLs are enforced, simplifying the authentication and access attributes that RADIUS provides to the edge switches. The current generation of Alcatel-Lucent edge switches supports eight different ACL lists that have the ability to be shared by many different UNPs. For example, a customer wants to implement two access control mechanisms in a remote office, but does not want to burn multiple subnets. All that has to be done is to configure two UNPs for the same VLAN, but with different ACL lists, thereby separating the access for each user group. Determining the appropriate access rights is a complex undertaking. To determine what IP addresses are accessed by a user, a combination of multiple tools is necessary. Starting with the internal connection list of the host is a good start (using the netstat command in Windows or Linux). However, monitoring network devices using a network analyzer is highly recommended, as most analyzers will build a connectivity table that translates into the appropriate ACLs for that group. Also, it is possible during the initial implementation phase to create ACLs to log network traffic. By capturing network activity instead of dropping it, the administrator obtains a log for future analysis. I want to make sure endpoints on my network are safe Endpoint compliance with Access Guardian Access Guardian has the ability to perform endpoint compliance independent of authentication and access controls directly from the edge switch. This feature does not require additional hardware or changes in the network architecture. To enable endpoint compliance, configure the switch to interact with the centralized host integrity check (HIC) server, also known as the InfoExpress CyberGatekeeper server. Next, specify a UNP role for the devices to be verified as well as the allowed resources, such as specific servers or subnets. The UNP can be derived from the source port, a source MAC address range, source IP addresses or through authentication. A device is quarantined when it has not been verified or if it has failed the check. The edge switch will still allow access to a predefined set of resources while restricting all other access. In this way the administrator can still have access to quarantined users with SMS or a remote session in order to fix and update the machines. Alternatively, the administrator is able to allow access to certain areas of the network and restrict access to other parts until the user s device has been checked. Limiting network access is achieved by widening the scope of remediation servers to include the accessible subnets. At this point four distinct entries are available, each with its own IP range and mask. Evolving Network Security with the Alcatel-Lucent Access Guardian Technology White Paper 3
6 Conclusion Access Guardian enhances the functions of the Alcatel-Lucent edge switch families by integrating authentication, device compliance and access control functions directly into the hardware. Switchbased security functions allow an administrator to configure, manage and maintain their entire security infrastructure more efficiently and without additional equipment. Host integrity checking and user profiles simplify the network while automatically managing the security fitness of end points and limiting the access of unauthorized users and devices. By creating a flexible customizable security infrastructure at the switch-level, Alcatel-Lucent distributes security functions to all corners of the network leaving no backdoor for intruders. Abbreviations 802.1X IEEE Standard for port-based network access control ACL access control list HIC host integrity check IEEE Institute of Electrical and Electronics Engineers IP Internet Protocol LAN local area network MAC media access control OUI organizationally unique identifier RADIUS remote authentication dial in user service SMS short message service SQL structured query language UNP user network profile VLAN virtual local area network WLAN wireless local area network WPA, WPA2 Wi-Fi protected access Contacts Vincent Vermeulen ([email protected]) Enterprise Solutions Division Alcatel-Lucent Sarveshwar Rao ([email protected]) Enterprise Solutions Division Alcatel-Lucent References User-centric Security: Network Security: 4 Evolving Network Security with the Alcatel-Lucent Access Guardian Technology White Paper
7
8 Alcatel, Lucent, Alcatel-Lucent and the Alcatel-Lucent logo are trademarks of Alcatel-Lucent. All other trademarks are the property of their respective owners. The information presented is subject to change without notice. Alcatel-Lucent assumes no responsibility for inaccuracies contained herein. Copyright 2009 Alcatel-Lucent. All rights reserved. EPG (06)
InfoExpress Cyber Gatekeeper. How to quote? Günter Neuleitner. März 2009
InfoExpress Cyber Gatekeeper How to quote? Günter Neuleitner März 2009 Agenda 1. Introduction 2. Components 3. Quoting CyberGatekeeper 4. AGENTLESS AND AGENT-BASED 5. Examples 1 Introduction 3 Presentation
Alcatel-Lucent Services
SOLUTION DESCRIPTION Alcatel-Lucent Services Security Introduction Security is a sophisticated business and technical challenge, and it plays an important role in the success of any network, service or
Alcatel-Lucent Enterprise Converged Network Solution
Alcatel-Lucent Enterprise Converged Network Solution Deliver a quality user experience, streamline operations and reduce costs The New Challenges in Delivering a High-quality User Experience Three key
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
alcatel-lucent converged network solution The cost-effective, application fluent approach to network convergence
alcatel-lucent converged network solution The cost-effective, application fluent approach to network convergence the corporate network is under pressure Today, corporate networks are facing unprecedented
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE
EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE EXECUTIVE SUMMARY Enterprise network managers are being forced to do more with less. Their networks are growing in size and complexity. They need
Simplifying. Single view, single tool virtual machine mobility management in an application fluent data center network
Simplifying Network Administration in an Alcatel- Lucent VMware Virtual Environment Single view, single tool virtual machine mobility management in an application fluent data center network Strategic White
ALCATEL-LUCENT ENTERPRISE CONVERGED NETWORK SOLUTION Deliver a consistent and quality user experience, streamline operations and reduce costs
CONVERGED NETWORK SOLUTION Deliver a consistent and quality user experience, streamline operations and reduce costs THE CHALLENGES TO BECOME THE NEXT-GEN CORPORATIONS Technology is essential for the efficiency
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
Network Access Control ProCurve and Microsoft NAP Integration
HP ProCurve Networking Network Access Control ProCurve and Microsoft NAP Integration Abstract...2 Foundation...3 Network Access Control basics...4 ProCurve Identity Driven Manager overview...5 Microsoft
Design and Implementation Guide. Apple iphone Compatibility
Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new
ENTERPRISE CONVERGED NETWORK SOLUTION. Deliver a quality user experience, streamline operations and reduce costs
ENTERPRISE CONVERGED NETWORK SOLUTION Deliver a quality user experience, streamline operations and reduce costs THE NEW CHALLENGES IN DELIVERING A HIGH-QUALITY USER EXPERIENCE Key trends are driving new
Secure network guest access with the Avaya Identity Engines portfolio
Secure network guest access with the Avaya Identity Engines portfolio Table of Contents Executive summary... 1 Overview... 1 The solution... 2 Key solution features... 2 Guest Access Administration...
Secure WiFi Access in Schools and Educational Institutions. WPA2 / 802.1X and Captive Portal based Access Security
Secure WiFi Access in Schools and Educational Institutions WPA2 / 802.1X and Captive Portal based Access Security Cloudessa, Inc. Palo Alto, CA July 2013 Overview The accelerated use of technology in the
Microsoft Windows Server System White Paper
Introduction to Network Access Protection Microsoft Corporation Published: June 2004, Updated: May 2006 Abstract Network Access Protection, a platform for Microsoft Windows Server "Longhorn" (now in beta
Models HP IMC Smart Connect Edition Virtual Appliance Software E-LTU
Models HP IMC Smart Connect Edition Virtual Appliance Software E-LTU JG659AAE Key features Identity-based access, advanced device profiling, and real-time traffic quarantining Converged network support
Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks
Tech Brief Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks Introduction In today s era of increasing mobile computing, one of the greatest challenges
ALCATEL-LUCENT OMNIVISTA 2500 NETWORK MANAGEMENT SYSTEM
ALCATEL-LUCENT OMNIVISTA 2500 NETWORK MANAGEMENT SYSTEM The Alcatel-Lucent OmniVista 2500 Network Management System (NMS) provides cohesive management and network-wide visibility, increasing IT efficiency
Lucent VPN Firewall Security in 802.11x Wireless Networks
Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper
WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment... 2. Adaptive Network Security...
WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Adaptive Network Security Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with Adaptive
BYOD: BRING YOUR OWN DEVICE.
white paper BYOD: BRING YOUR OWN DEVICE. On-boarding and Securing Devices in Your Corporate Network Preparing Your Network to Meet Device Demand The proliferation of smartphones and tablets brings increased
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview
STRATEGIC WHITE PAPER Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview Abstract Cloud architectures rely on Software-Defined Networking
HP Intelligent Management Center Enterprise Software. Platform. Key features. Data sheet
Data sheet HP Intelligent Management Center Enterprise Software Platform Key features Highly flexible and scalable deployment options Powerful administration control Rich resource management Detailed performance
Best Practices for Outdoor Wireless Security
Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged
ALCATEL-LUCENT OMNIVISTA 8770 NETWORK MANAGEMENT SYSTEM A SINGLE MANAGEMENT INTERFACE ACROSS SYSTEMS AND DEVICES
ALCATEL-LUCENT OMNIVISTA 8770 NETWORK MANAGEMENT SYSTEM A SINGLE MANAGEMENT INTERFACE ACROSS SYSTEMS AND DEVICES INTEGRATED APPLICATION SUITE Today s enterprises are facing the challenges of voice, video
WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2
WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Secure Network Access Control Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with
HP Intelligent Management Center User Access Management Software
Data sheet HP Intelligent Management Center User Access Management Software Key features One central database of users and available services Advanced reporting capabilities Directory of network-attached
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
VLANs. Application Note
VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static
Penn State Wireless 2.0 and Related Services for Network Administrators
The following document provides details about the operation and configuration parameters for Penn State Wireless 2.0 and Visitor Wireless. It is intended for Penn State network administrators who are considering
ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS
ENTERPRISE SESSION BORDER CONTROLLERS: SAFEGUARDING TODAY S AND TOMORROW S UNIFIED COMMUNICATIONS ALCATEL-LUCENT OPENTOUCH SESSION BORDER CONTROLLER A SECURE SOLUTION FOR BORDERLESS CONVERSATIONS APPLICATION
WiNG5 CAPTIVE PORTAL DESIGN GUIDE
WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated
ARCHITECT S GUIDE: Mobile Security Using TNC Technology
ARCHITECT S GUIDE: Mobile Security Using TNC Technology December 0 Trusted Computing Group 855 SW 5rd Drive Beaverton, OR 97006 Tel (50) 69-056 Fax (50) 644-6708 [email protected] www.trustedcomputinggroup.org
Aerohive Private PSK. solution brief
Aerohive Private PSK solution brief Table of Contents Introduction... 3 Overview of Common Methods for Wi-Fi Access... 4 Wi-Fi Access using Aerohive Private PSK... 6 Private PSK Deployments Using HiveManager...
NXC5200/ NWA5000-N Series Wireless LAN Controller/ 802.11 a/b/g/n Managed Access Point
Higherbandwidth, higher density with full range of 802.11n s (NWA5000N Series) Comprehensive guest network management with auto guest account generator and Web authentication support Manage up to 240 APs
Alcatel-Lucent Office Communication Solutions for Small and Medium Businesses. Simplified communications for businesses on the move
Alcatel-Lucent Office Communication Solutions for Small and Medium Businesses Simplified communications for businesses on the move To succeed as a small or medium business (SMB), you need to keep customer
Policy Management: The Avenda Approach To An Essential Network Service
End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: [email protected] email: [email protected] Avenda
Alcatel-Lucent Office Communication Solutions for Small and Medium Businesses. Simplified communications for businesses on the move
Alcatel-Lucent Office Communication Solutions for Small and Medium Businesses Simplified communications for businesses on the move To succeed as a small or medium business (SMB), you need to keep customer
alcatel-lucent Network Management for the Application Fluent Enterprise
alcatel-lucent OMNIVISTA 2500 Network management solution Network Management for the Application Fluent Enterprise In today s highly competitive business environment, enterprises must be dynamic and adaptable,
How to Configure a BYOD Environment with the DWS-4026
Configuration Guide How to Configure a BYOD Environment with the DWS-4026 (MAC Authentication + Captive Portal) Overview This guide describes how to configure and implement BYOD environment with the D-Link
Whitepaper. Securing Visitor Access through Network Access Control Technology
Securing Visitor Access through Contents Introduction 3 The ForeScout Solution for Securing Visitor Access 4 Implementing Security Policies for Visitor Access 4 Providing Secure Visitor Access How it works.
A Coordinated. Enterprise Networks Software Defined. and Application Fluent Programmable Networks
A Coordinated Virtual Infrastructure for SDN in Enterprise Networks Software Defined Networking (SDN), OpenFlow and Application Fluent Programmable Networks Strategic White Paper Increasing agility and
Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
Application Note User Groups
Application Note User Groups Application Note User Groups Table of Contents Background... 3 Description... 3 Benefits... 4 Theory of Operation... 4 Interaction with Other Features... 6 Configuration...
HP ProCurve Identity Driven Manager 3.0
Product overview HP ProCurve Identity Driven Manager (IDM), a plug-in to HP ProCurve Manager Plus, dynamically provisions network security and performance settings based on user, device, location, time,
The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments
The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments Centralized WLAN management and auto provisioning Manages up to 0 APs with granular access control Advanced RF management
Sygate Secure Enterprise and Alcatel
Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and
Virtuelle WLAN Controller Alcatel Lucent Wireless LAN Instant AP
Virtuelle WLAN Alcatel Lucent Wireless LAN Instant AP S. 1 Alcatel Lucent Instant Technology Over-the-air provisioning: Industry only wireless over the air WLAN setup Wizard driven setup: 5 minute WLAN
Network Access Security It's Broke, Now What? June 15, 2010
Network Access Security It's Broke, Now What? June 15, 2010 Jeffrey L Carrell Network Security Consultant Network Conversions SHARKFEST 10 Stanford University June 14-17, 2010 Network Access Security It's
CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE
CLOUD NETWORKING FOR ENTERPRISE CAMPUS APPLICATION NOTE EXECUTIVE SUMMARY This application note proposes Virtual Extensible LAN (VXLAN) as a solution technology to deliver departmental segmentation, business
Cisco TrustSec Solution Overview
Solution Overview Cisco TrustSec Solution Overview 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 10 Contents Introduction... 3 Solution Overview...
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
» WHITE PAPER. 802.1X and NAC: Best Practices for Effective Network Access Control. www.bradfordnetworks.com
» WHITE PAPER 802.1X and NAC: Best Practices for Effective Network Access Control White Paper» 802.1X and NAC: Best Practices for Effective Network Access Control 1 IEEE 802.1X is an IEEE (Institute of
Public Internet Access Done the Right Way
Public Internet Access Done the Right Way Supports 500 concurrent logins by default and up to 800 via license upgrade Integrated account generator, Web-based authentication portal and billing system Supports
Frank Andrus WHITEPAPER. CTO, Bradford Networks. Evolve your network strategy to meet new threats and achieve expanded business imperatives
WHITEPAPER The Emergence of Adaptive Network Security Evolve your network strategy to meet new threats and achieve expanded business imperatives Frank Andrus CTO, Bradford Networks Executive Summary...
TECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents
TECHNICAL WHITEPAPER Author: Tom Kistner, Chief Software Architect Last update: 18. Dez 2014 Table of Contents Introduction... 2 Terminology... 2 Basic Concepts... 2 Appliances... 3 Hardware...3 Software...3
Avaya Identity Engines Portfolio
Key benefits Improved security and granular control: More secured wireless and guest access, role-based access control and compartmentalization of the network to segment and protect data Reduced costs:
alcatel-lucent for small and Simplified communications for businesses on the move
alcatel-lucent OPENTOUCH SUITE for small and medium businesses Simplified communications for businesses on the move To succeed as a small or medium business (SMB), you need to keep customer satisfaction
ALCATEL-LUCENT ENTERPRISE DATA CENTER SWITCHING SOLUTION Automation for the next-generation data center
ALCATEL-LUCENT ENTERPRISE DATA CENTER SWITCHING SOLUTION Automation for the next-generation data center A NEW NETWORK PARADIGM What do the following trends have in common? Virtualization Real-time applications
When SDN meets Mobility
When SDN meets Mobility The result is an automated, simpler network that supports the way you work With wireless increasingly becoming the primary means of access for end users, it is essential that any
Efficient and easy-to-use network access control and dynamic vlan management. Date: 4.12.2007 http:// F r e e N A C. n e t Copyright @2007, Swisscom
Efficient and easy-to-use network access control and dynamic vlan management Date: 4.12.2007 http:// F r e e N A C. n e t Copyright @2007, Swisscom 1 Connection to the enterprise LAN is often (too) easy
The All-in-One, Intelligent NXC Controller
The All-in-One, Intelligent NXC Controller Centralized management for up to 24 APs ZyXEL Wireless Optimizer for easily planning, deployment and maintenance AP auto discovery and auto provisioning Visualized
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
Technical Note. CounterACT: 802.1X and Network Access Control
CounterACT: 802.1X and Contents Introduction...3 What is 802.1X?...3 Key Concepts.... 3 Protocol Operation...4 What is NAC?...4 Key Objectives.... 5 NAC Capabilities.... 5 The Role of 802.1X in NAC...6
Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been
Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been difficult and time-consuming. This paper describes the security
BYOD in Healthcare. Improving Clinician Productivity and Patient Satisfaction May 2013 WHITEPAPER
WHITEPAPER BYOD in Healthcare Improving Clinician Productivity and Patient Satisfaction May 2013 WHITEPAPER Meru BYOD in Healthcare Table of Contents Introduction... 1 BYOD Requirements... 3 BYOD Deployment
VOIP Guide Using ZyXEL Switch
VOIP Guide Using ZyXEL Switch 2015/8/10 ZyXEL Communications Corporation Barney Gregorio Overview: This article will contain solutions on how to configure Voice over IP (VOIP). Two methods will be discussed:
RAD-Series RADIUS Server Version 7.1
RAD-Series RADIUS Server Version 7.1 Highly Customizable RADIUS Server for Controlling Access & Security in Wireless & Wired Networks Interlink Networks RAD-Series Authentication Authorization, and Accounting
How To Set Up A Cisco Rv110W Wireless N Vpn Network Device With A Wireless Network (Wired) And A Wireless Nvv (Wireless) Network (Wireline) For A Small Business (Small Business) Or Remote Worker
Cisco RV110W Wireless-N VPN Firewall Simple, Secure Connectivity for the Small Office/Home Office Figure 1 Cisco RV110W Wireless-N VPN Firewall The Cisco RV110W Wireless-N VPN Firewall provides simple,
APPENDIX 3 LOT 3: WIRELESS NETWORK
APPENDIX 3 LOT 3: WIRELESS NETWORK A. TECHNICAL SPECIFICATIONS MAIN PURPOSE The Wi-Fi system should be capable of providing Internet access directly to a user using a smart phone, tablet PC, ipad or Laptop
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
ALCATEL-LUCENT OPENTOUCH SUITE FOR SMALL AND MEDIUM BUSINESSES Simplified communications for businesses on the move
ALCATEL-LUCENT OPENTOUCH SUITE FOR SMALL AND MEDIUM BUSINESSES Simplified communications for businesses on the move To succeed as a small or medium business (SMB), you need to keep customer satisfaction
How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility
w h i t e p a p e r How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility So much is happening today to give you a chance to rethink your wireless architecture. Indeed, you
Switching Solution Creating the foundation for the next-generation data center
Alcatel-Lucent Enterprise Data Center Switching Solution Creating the foundation for the next-generation data center a new network paradigm What do the following trends have in common? Virtualization Real-time
CISCO WIRELESS CONTROL SYSTEM (WCS)
CISCO WIRELESS CONTROL SYSTEM (WCS) Figure 1. Cisco Wireless Control System (WCS) PRODUCT OVERVIEW Cisco Wireless Control System (WCS) Cisco Wireless Control System (WCS) is the industry s leading platform
Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks
Cisco IT Article December 2013 End-to-End Security Policy Control Cisco IT Validates Rigorous Identity and Policy Enforcement in Its Own Wired and Wireless Networks Identity Services Engine is an integral
HP Identity Driven Manager Software Series Overview
Overview HP Identity Driven Manager (IDM), a plug-in to HP PCM+, dynamically provisions network security and performance settings based on user, device, location, time, and endpoint posture. Identity Driven
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
How To Use An Ipad Wireless Network (Wi Fi) With An Ipa (Wired) And An Ipat (Wired Wireless) Network (Wired Wired) At The Same Time
IdentiFiTM IDENTIFI Experience Matters IdentiFi wired-like Wi-Fi experience for the wireless world Extreme Networks IdentiFi is a purpose-built Wi-Fi solution that provides a wiredlike Wireless Local Area
STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction
Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,
ALCATEL-LUCENT ENTERPRISE CONVERGED CAMPUS NETWORK SOLUTION Deliver a consistent, high-quality user experience, streamline operations, and reduce
CONVERGED CAMPUS NETWORK SOLUTION Deliver a consistent, high-quality user experience, streamline operations, and reduce costs CHALLENGES TO BECOMING A NEXT-GENERATION ORGANIZATION Technology is essential
Securing Wireless LANs with LDAP
A P P L I C A T I O N N O T E Securing Wireless LANs with LDAP Many organizations have standardized on LDAP (Lightweight Directory Access Protocol) servers as a repository for their users and related security
How to Configure Guest Management on the DWC-1000
Configuration Guide How to Configure Guest Management on the DWC-1000 Overview This guide describes how to configure and customize a billing profile and generate temporary user account on the D-Link DWC-1000
Network Virtualization Network Admission Control Deployment Guide
Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus
Abstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Enterasys Wireless Access Point 3000 (RBT3K-AG) to Support Avaya IP Office, Avaya IP Wireless Telephones and Avaya Phone Manager
Using IEEE 802.1x to Enhance Network Security
Using IEEE 802.1x to Enhance Network Security Table of Contents Introduction...2 Terms and Technology...2 Understanding 802.1x...3 Introduction...3 802.1x Authentication Process...3 Before Authentication...3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3
ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia
