1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.

Slides:



Advertisements
Similar presentations
© 2011 Aerohive Networks CONFIDENTIAL WI-FI DESIGN 101: QUESTIONS EVERY MANAGER SHOULD ANSWER BEFORE PURCHASING WI-FI.
Advertisements

Wireless Technology.
The Problems With Microcell (1) How cochannel interference destroys microcell throughput.
Stonesoft Roadmap WHAT FEATURES WILL COME IN
Agenda Product Overview Hardware Interfaces Software Features
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 1 © 2011 Cisco and/or its affiliates. All rights reserved. Ingram Micro:
Enterprise Wireless Solutions: Controller-based vs. Controller-less What should you be implementing in 2014?
Is Your Network Ready for the iPad? George Bentinck MBCS MIET Sales Engineer, EMEA +44 (0) Twitter: meraki_se.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
 Category 6 Ethernet Cable, Single-mode Fiber Cable, and RJ45 Jacks  APC Netshelter SX 48U Racks and NetShelter AV Roof Fan Tray 825mm  Cisco 3800 ISR.
The Cable Guys Inc. Drew Leach Tom McLoughlin Philip Mauldin Bill Smith.
USRobotics Professional Access Point  Yosi Rafael.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Configure a Wireless Router LAN Switching and Wireless – Chapter 7.
Chapter 14 Wireless Attacks, Intrusion Monitoring and Policy
Cisco Wireless Overview Covering Cisco’s Wireless LAN Strategy and Airespace Acquisition August 9, 2005 Michael Glew.
The world is going to wireless …. Wireless Networking Part 2 CCNP Switch Hossein Shamloo.
Confidential 2009 Health and the Wireless Revolution.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
1 © 2005 Cisco Systems, Inc. All rights reserved. Cisco Confidential Session Number Presentation_ID Cisco Unified Wireless Network Webinar Commercial WLAN.
Emerging Technologies in Wireless LANs. Replacement for traditional Ethernet LANs Several Municipalities Portland, OR Philadelphia, PA San Francisco,
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
WIRELESS SECURITY DEFENSE T-BONE & TONIC: ALY BOGHANI JOAN OLIVER MIKE PATRICK AMOL POTDAR May 30, /30/2009.
Wireless Security Ysabel Bravo Fall 2004 Montclair State University - NJ.
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Cisco Confidential 1 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Small Business RV320/RV325 Product Overview.
WLAN Architecture - Considerations Christoffer Jacobsson.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Mobility at CERN 29/10/2013 HEPiX Fall IT/Communication Systems HEPiX Fall 2013.
Wireless Security Techniques: An Overview Bhagyavati Wayne C. Summers Anthony DeJoie Columbus State University Columbus State University Telcordia Technologies,
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Wireless Infrastructures Wireless. Wireless Infrastructures Wireless LAN Predominantly IEEE A, B, G, N Wireless MAN WiMax and its.
Dartmouth’s Wireless Network May 16, 2005 David W. Bourque.
High Performance, Easy to Deploy Wireless. Agenda Foundry Key Differentiators Business Value Product Overview Questions.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
The world is going to wireless …
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
© 2003, Cisco Systems, Inc. All rights reserved _03_2003_c4 © 2003, Cisco Systems, Inc. All rights reserved _03_2003_c4.
Sybex CCNA Chapter 12: Wireless Networks.
1 © 2006 Cisco Systems, Inc. All rights reserved. Cisco Public Session Number Presentation_ID W2I Digital Communities Conference Transforming Our World.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
Wireless Hotspots: Current Challenges and Future Directions CNLAB at KAIST Presented by An Dong-hyeok Mobile Networks and Applications 2005.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Confidential 1 US&C FE Cisco Next Generation Wireless Launch Chris Kozup, Manager, Mobility Solutions.
Bluesocket vWLAN Overview. Its ALL about n……
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Living in a Network Centric World Network Fundamentals – Chapter 1.
Enterprise-Class Telephony on Wireless LANs Tom Alexander CTO VeriWave, Inc.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Living in a Network Centric World Network Fundamentals – Chapter 1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Leading provider of secure mobility for the enterprise Aruba MOVE Architecture Industry’s most secure WLAN Easiest BYOD & Guest Access Zero-touch.
7.4 Update - ISE Session.
Wireless – What lies ahead
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
RouterOS, in a Distributed Internet Services Delivery Environment Mike Everest, DuxTel Pty Ltd.
Cisco Aironet 350 Series: The Right Choice for the Enterprise.
IS3220 Information Technology Infrastructure Security
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Network Architecture Characteristics  Explain four characteristics that are addressed by.
Networks and Security Great Demo
1 © 2000, Cisco Systems, Inc. 1 Cisco Internet Mobile Office: Extending the Abilities of the Business Traveler.
© 2003, Cisco Systems, Inc. All rights reserved. FWL 1.0— © 2003, Cisco Systems, Inc. All rights reserved.
Instructor Materials Chapter 6 Building a Home Network
Improving the WiFi Customer Experience
Cisco WLAN Overview and Vision
IS4680 Security Auditing for Compliance
UT Gert Meijerink Service Departement for Information Technology, Library and Education (ITBE) TERENA 2004.
Presentation transcript:

1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill Aniszewski Wireless Specialist October 2005 Wireless Networking Business Unit

222 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. Long-Term Cisco Portfolio Direction Common Hardware Infrastructure Integration Unified Management Distributed Wireless Network Lightweight Wireless Network Switch-based Controllers Location Services Integrated IDS RF Firewalling Advanced Services Lightweight Access Point Protocol Switch-based Controllers Location Services Integrated IDS RF Firewalling Advanced Services

333 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. Basic Concept WLAN Controller Lightweight Access Points L2/L3 Ethernet Switch WCS WLAN MGMT System

444 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. The Old World Mobility/VPN (e.g., Bluesocket) AP Air Monitoring (e.g., Air Defense) Rogue Sensor Security Management RF Management (planning tools) Switch/Routed Network Capacity Management Location Tracking (e.g., Newberry)

555 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. The New World: A Single Integrated WLAN System Mobility/VPN (e.g., Bluesocket) AP Rogue Sensor Air Monitoring (e.g., Air Defense) Security Management RF Management (planning tools) WLAN service delivery RF management Encryption/authentication Wireless prevention/protection Location tracking Capacity Management Centralized management Dynamic Control Switch/Routed Network Capacity Management Location Tracking (e.g., Newberry) WCS Integrated AP Cisco WLAN Appliance

666 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. No Single Point of Failure WLAN Controller Redundancy Cisco WLAN Controller Cisco Aironet Access Points Ethernet Switch Cisco Hardware Layer

777 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. No Single Point of Failure AP Redundancy Cisco WLAN Controller Ethernet Switch Cisco Hardware Layer Cisco Aironet Access Points

888 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. Real-Time RF Management RF channel “2” RF channel “1” Dynamic Channel Assignment Dynamic Power Optimization RF channel “3” Avoid interference & Improve performance Reduce “hands on” WLAN management Eliminate coverage holes Optimize coverage area Cisco Hardware Layer Cisco Aironet Access Points

999 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. Solving Performance & Capacity problems in high density areas (e.g. conference rooms, cafeteria)… Better Network Performance Dynamic Load Balancing

10 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. Solving Performance & Capacity problems in high density areas (e.g. conference rooms, cafeteria)… Better Network Performance Dynamic Load Sharing

11 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. Solving Performance & Capacity problems in high density areas (e.g. conference rooms, cafeteria)… Better Network Performance Dynamic Load Sharing

12 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. A Complete Solution for Handling Rogues 4.View Historical Report 2.Assess Rogue AP (Identity, Location,..) 1.Detect Rogue AP (generate alarm) 3. Contain Rogue AP Multiple rogues contained simultaneously ACS validates that no valid clients are associate to rogue

13 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. Identity Networking … User traffic is carried to switch via LWAPP Single SSID User: maria Group: Marketing ACL: Corp_1 QoS: Gold Switch uses Radius server to determine user’s Identity. This information is used for QoS and security policies.

14 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. … for Secure Mobility (with QoS) Single SSID ForeignAnchor User: maria Group: Marketing ACL: Corp_1 QoS: Gold

15 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. 1st integrated location solution Real-time location services Advanced RF fingerprinting Simultaneous real-time tracking 10,000+ devices API Third Party Applications RF capacity management Intuitive management GUI Cisco 2700 Series Wireless Location Appliance Location Tracking Services

16 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. Consistent Management for Indoor and Out Internet Mesh Networking Established Path Potential Path

17 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. A Complete Wireless Solution As Users become more Mobile… …And business applications become more Interactive… …Innovative services and applications are critical in helping companies maintain agility and differentiation Cisco networks will provide seamless wired+wireless Integration… …With the industry’s best Security and Investment Protection Cisco I 3 Enables the Secure, Mobile, Interactive Workplace Investment Protection Integration Innovation

18 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. 18 © 2001, Cisco Systems, Inc. All rights reserved. Presentation_ID