Huawei PAN BYOD Converged Network Solution

Similar documents
Huawei One Net Campus Network Solution

Huawei esight Brief Product Brochure

Huawei Agile WAN Solution

1 Network Service Development Trends and Challenges

SDN, a New Definition of Next-Generation Campus Network

United Security Technology White Paper

How To Create A Network Access Control (Nac) Solution

HUAWEI Enterprise AP Series ac Brochure

Huawei AR G3 FAQ TOP14

Huawei Smart Education Solution

HUAWEI TECHNOLOGIES CO., LTD. Huawei AnyOffice Mobile Security Solution

HUAWEI USG6000 Next-Generation Firewall V100R001. Product Description. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

Training Proposal. Training Description for Enterprise Network COMMERCIAL IN CONFIDENCE 1

USG6600 Next-Generation Firewall

USG6300 Next-Generation Firewall

Huawei Remote Access Security Solution for Enterprise Networks. -Secure and Stable Platforms for Network Interconnection and Data Interaction

SVN5800 Secure Access Gateway

Secure Your Mobile Device Access with Cisco BYOD Solutions

Huawei Eudemon200E-N Next-Generation Firewall

Readiness Assessments: Vital to Secure Mobility

Reaping the Full Benefits of a Hybrid Network

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility

Deploy and Manage a Highly Scalable, Worry-Free WLAN

Meru MobileFLEX Architecture

Huawei Network Edge Security Solution

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

Cisco Unified Access Technology Overview: Converged Access

Security Level: HUAWEI TECHNOLOGIES CO., LTD.

Meru MobileFLEX Architecture

Solutions Guide. Secure Remote Access. Allied Telesis provides comprehensive solutions for secure remote access.

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

HUAWEI Secospace USG6600 Next-Generation Firewall Datasheet

CloudEngine Series Data Center Switches. Cloud Fabric Data Center Network Solution

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

EasyConnect. Any application - Any device - Anywhere. Faster, Simpler & Safer Networks

Global Headquarters: 5 Speen Street Framingham, MA USA P F

1.Agile Network: SDN Concepts + 3 Architectural Innovations

Eudemon1000E Series Firewall HUAWEI TECHNOLOGIES CO., LTD.

Wireless Services. The Top Questions to Help You Choose the Right Wireless Solution for Your Business.

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Symantec Mobile Management 7.1

Huawei Agile Network FAQ What is an agile network? What is the relationship between an agile network and SDN?... 2

ealize Your Potential AR200 Series Enterprise Routers Brochure

ALCATEL-LUCENT ENTERPRISE CONVERGED NETWORK SOLUTION Deliver a consistent and quality user experience, streamline operations and reduce costs

Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking

ENTERPRISE CONVERGED NETWORK SOLUTION. Deliver a quality user experience, streamline operations and reduce costs

Best Practices for Outdoor Wireless Security

Bring Your Own Device (BYOD) and 1:1 Initiatives: What Questions Do You Need to Answer Before Jumping In?

Mobile workforce management software solutions. Empowering the evolving workforce with an end-to-end framework

Enterprise Network Solution

White Paper. ZyWALL USG Trade-In Program

TELUS Business Connect Customer Onboarding Guide. How to successfully set up your service

Cisco Virtual Office Express

Emerging Trends in the Network Security Market in India, CY 2013

Symantec Mobile Management 7.2

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access

How To Make Your Phone A Mobile Device Safe And Secure

Taking Charge with Apps, Policy, Security and More. October 16, 2012 Sheraton Denver Downtown Hotel Denver, CO

CloudEngine 1800V Virtual Switch

Intelligent WLAN Controller with Advanced Functions

Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere

Simple, scalable, secure Complete BYOD solution Michael Lloyd HP- Enterprise Group

MR Cloud Managed Wireless Access Points

The All-in-One, Intelligent WLAN Controller

How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility

MR Cloud Managed Wireless Access Points

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

Cloud, SDN and the Evolution of

Designing for Cisco Internetwork Solutions

Symantec Mobile Management 7.1

The All-in-One, Intelligent NXC Controller

Huawei e-hospital Solution

alcatel-lucent converged network solution The cost-effective, application fluent approach to network convergence

AC1200 Multi-Function Concurrent Dual-Band Gigabit Wi-Fi Router

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

The All-in-one Guest Access Solution of

MITEL. NetSolutions. Flat Rate MPLS VPN

Quidway SVN3000 Security Access Gateway

Huawei Eudemon1000E-X series Firewall. Eudemon 1000E-X Series Firewall. Huawei Technologies Co., Ltd.

Preparing your network for the mobile onslaught

MR Cloud Managed Wireless Access Points

Seamless Roaming in a Remote Access VPN Environment

Cloud Security. Securing what you can t touch. Presentation to Malaysia Government Cloud Computing Forum HUAWEI TECHNOLOGIES CO., LTD.

Deploying Firewalls Throughout Your Organization

Transcription:

Huawei PAN BYOD Converged Network Solution

Background According to a report from IDC, by the end of 2015, users will use more mobile devices than PCs to surf the Internet. With the popularity of smart terminals, more and more employees use tablet PCs and smartphones to do work, which improves office work efficiency. Mobile officing brings innovations to enterprise services. For example, tablet PCs are used in hospitals for ward round, in banks for VIP services, and in restaurants for dish ordering. On the other hand, employees are increasingly bringing their own smart devices to the office and taking the files and materials out of the office. This may bring risks to enterprise information security. Networks constructed in traditional ways can no longer support such a variety of terminals, especially mobile terminals, which pose the following challenges to an enterprise: Blurring of Network Boundaries During the time of fixed network, computers or laptops are connected to the Internet at fixed locations and can be easily controlled and managed. So there is a clear network boundary. However, with the popularity of Wi-Fi and 3G/4G networks, more and more mobile devices are connected to enterprise networks, blurring the network boundaries. Unauthorized users may also try to access the enterprise network. Diversification of Application Scenarios Many kinds of users need to access the enterprise network, including employees, employees of partner companies, external visitors, and VIP visitors. The application scenarios include wired access, wireless access, internal access, external access, and scenario switching. Different users have access to different network resources of the enterprise and are authenticated in different policies and modes. Moreover, the location and time of the network access must also be considered. Complicated Management There are many types of mobile devices that run different operating devices and applications, which complicates the work of IT administrators of an enterprise. Security Risks to Services The foremost concern of many enterprises in constructing wireless networks is service security. Network users accessing the enterprise network jeopardize the enterprise data and information. Employees using mobile devices of the enterprise to do office work outside the company may lose the devices, causing data leakage. The openness of the mobile network also increases the possibility of malicious attacks against the enterprise, which may lead to network paralysis. 1

Huawei PAN BYOD Converged Network Solution 2.1 Solution Overview Boasting the best experience and construction ideas of wireless networks, Huawei provides a series of bring your own devices (BYOD) solutions for enterprise to help them build high-efficiency, unified, secure mobile networks. There are different scenarios of wireless network building. Some enterprises already have wired networks and need to build wireless networks as well. Some enterprises need to build brand new wired and wireless networks. Some enterprises already have wireless networks and need to solve the security problem. To satisfy the various scenario requirements, solves the problem of network boundary blurring through integrated wired and wireless networks, the problem of diversified application scenarios through unified access authentication and policies, the problem of complicated management through unified management, and the problem of security risks through impeccable network security policies. Architecture of Huawei Enterprise Networking BYOD Solution 1 Endpoint 2 Infrastructure 3 Management AnyOffice On IOS/Android Public places 3G/4G Headquarters SVN Public Wi-Fi Internet USG Smart Phone SOHO AP WAN S9700 Policy Center PAD AnyOffice On Win/Mac SmallBranch Branch AP AP USG AC6605 S7700 esight Laptops S5700 AR G3 S5700 Special Scenes PC Outdoors AR G3 ATM Emergency Cellular network ewbb AP MDM 2

2.2 High-Efficient Network for BYOD The popularity of using smart terminals for working and wide application of VoIP, virtual desktop, video conferencing, and telepresence require enterprise core networks with large-capacity and high-performance forwarding capability. Huawei switches provide Gigabit access, 10-Gigabit aggregation, and 40G core processing capabilities for enterprises to cope with these challenges. Catering to the network trend, Huawei, for the first time, introduces the Software-Defined Networking (SDN) architecture into campus networks and redefines the agile network to support the dynamic, cloudized, and changing next generation network. To handle the swams of traffic, Huwei provides highdensity WLAN products with the intelligent scheduling function. With this function, Huawei WLAN products automatically control the transmit power of each packet based on the signal strength of terminals, limit low-rate access, and provide 5GHz/2.4GHz dual-band access to prevent co-channel interference and improve bandwidth. The intelligent scheduling function allows for smooth and environmentally friendly Wi-Fi access. The unique Beamforming+ technology makes wireless signals more stable to improve receive signal strength. In terms of installation, the WLAN products have userfriendly handles and dovetail foundation and are designed for both wall and pole mounting, reducing the WLAN network construction time by 30% and network maintenance cost by 20%.Meanwhile, PHU, a portable test device built on the smartphone hardware platform, is used to provide dynamic and static network evaluation, and intelligent output of optimizing solutions to simplify network planning. 2.3 Unified Access, Polices, and Management to Improve BYOD Experience 2.3.1 Unified Access provides a unified network for users to access at anytime and anyplace. Users can access the enterprise intranet via Wi-Fi, wired, or 3G/4G networks, or from branch offices. This solution ensures secure and seamless switchover of access locations. In addition, provides a unified wired, wireless, and VPN authentication center for centralized access control in different scenarios. This solution integrates the industryleading VPN and MDM technologies to ensure the smooth access switchover between 3G and Wi-Fi networks as well as between Wi-Fi networks. Users do not need to be authenticated again after switching to another access network. 3

2.3.2 Unified Policies IT administrators can provide different users with different policies based on the fine-grained information obtained about the role of the user, the owner of the device, time, location, device type, and the access mode (5W1H). Who: The administrator classifies network visitors into different types: external visitors, employees, managerial personnel, and sales personnel. Whose device: whether the device belongs to the enterprise or a particular person. A personal device shall carry as little information as possible to just meet the employee's work requirements. Meanwhile, the enterprise cannot put too many limitations on the personal device. However, as for a device distributed by the enterprise to an employee, the enterprise can customize the device to either put limitations or realize service innovation. What Device: Smartphones, tablet PCs, laptops, and desktop computers. Different policies are configured for different devices due to their various functions. When: Enterprises put different limitations on network visitors according to when they access the enterprise network, for example, whether they try to visit the network during work time or after-work time. Where: Whether the network visitor is an internal visitor or an external visitor? How: Enterprise can provide individual-based access modes to different users in different scenarios, including 802.1x and SSL VPN access, wired and wireless access, external and internal access. Due to 5W1H, enterprises can implement different control polices including QoS, bandwidth, time period, rights, and routing control policies. 2.3.3 Unified Management is capable of centrally managing users and network and mobile devices. The highly integrated management platform simplifies network maintenance. In terms of network device management, Huawei esight management platform provides resource-specific hierarchical and domain-based management of intranet access from wired and wireless network devices. The visualized management design allows IT maintenance engineers to gain visibility into the operating status of wired and wireless network devices. For wireless network devices, the solution is capable of visualizing radios, locating devices, and identifying and locating interference sources. The one-stop troubleshooting allows for rapid end-to-end fault location and provides a hardware probe detection solution for applications, such as telepresence. In terms of mobile device management, Huawei AnyOffice mobile working platform provides lifecycle device management, including device discovery, registration, access control, device control, data management, device loss management, and deregistration. This solution also allows for self-service management to improve user experience and management efficiency and reduce maintenance cost. In terms of user management, Huawei Policy Center provides user group-specific polices for unified management of employees and guests accessing the intranet via wired or wireless networks from intranets and extranets. To manage guests, you can configure GRE tunnels on the Policy Center to isolate guest and employee traffic and deploy an ASG to audit guest Internet access behaviors to prevent information leaks. 2.4 End-to-End Tridimensional Protection to Secure BYOD Services ensures tridimensional (cloud, pipe, and device) network security. To prevent data loss, Huawei AnyOffice client allows users to remotely lock the lost device and erase the sensitive data on it. The AnyOffice client also provides the sandbox function to isolate enterprise data and personal data on a BYOD device. To prevent employees from leaking information, the AnyOffice solution is capable of comprehensive management and control, such as outgoing file control, jail breaking detection, antiprintscreen, and device lost management. application blacklist and whitelist to control employees' Internet access behaviors. For transmission security, Huawei solution supports wireless air interface encryption, IPSec, and SSL VPN. For threat prevention, Huawei provides anti-ddos, antivirus, IPS, and IDS solutions. To secure wireless devices, Huawei launches device-level WIPS/WIDS solutions. To enhance enterprise information security, Huawei intelligent threat prevention solution provides more refined security defense policies. For application control, Huawei provides dedicated application control gateways. You can configure 4

Benefits, efficient, unified, and secure, frees customers from the hassles in wireless network planning and construction. It is the most comprehensive BYOD network solution in the industry. inherits the network security strengths of Huawei. It can be widely applied to various scenarios and is easy to scale up. The products of this solution deliver high performance and stability. Therefore, Huawei PAN BYOD Converged Network Solution is the first choice for enterprises to construct mobile working networks. 5

Components Network management : esight Huawei Enterprise Network BYOD Solution Network management product Policy management : Policy Center Maintenance audit : UMA Security management : isoc Chassis Ethernet switch Box Ethernet switch Enterprise router WLAN CE12804/12808/12812 S1700-8 S1700-24 S1700-28 S1700-52 AR2220 AR2240 AR3260 CE12804/12808/12812 S2700-9TP S2700-18TP S2700-26TPS2700-52TP AP7120DN AP6010DN S9703/S9706/S9712 S3700-26C S3700-28TP S3700- S3700-52P-48S/T 52P-24S AR1220L AR1240 AR1220V/ 1220VW AP6310SN AP6610DN-AGN S7703/S7706/S7712 S5700-28P/52P S5700- S5700-6TP S5700-24TP 28C/52C AR207V HSPA AR1220/ 1220V AR151/156/ 157/158E AP7110SN AP6310SN DC security gateway NGFW S5700-48TP S5710-28C/52C S6700-24EI/48EI S6850-52Q 48T/48S Firewall/UTM Online behavior management AR157G HSPA Security product SSL VPN AR201/202/ 207/208E AR207V AC6605-24-PWR ACU For S9700/S7700 IDS/IPS Anti-DDoS Anti-virus firewall Mobile terminal client terminal client USG9500 USG3000/6000 USG 2000/5000 ASG2000 SVN 2000/5000 NIP2000/5000 Anti-DDoS1000/8000 AVE2000 AnyOffice Agent 6

Copyright Huawei Technologies Co., Ltd. 2013. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademark Notice, HUAWEI, and are trademarks or registered trademarks of Huawei Technologies Co., Ltd. Other trademarks, product, service and company names mentioned are the property of their respective owners. General Disclaimer The information in this document may contain predictive statements including, without limitation, statements regarding the future financial and operating results, future product portfolio, new technology, etc. There are a number of factors that could cause actual results and developments to differ materially from those expressed or implied in the predictive statements. Therefore, such information is provided for reference purpose only and constitutes neither an offer nor an acceptance. Huawei may change the information at any time without notice.