Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill.

Similar presentations


Presentation on theme: "1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill."— Presentation transcript:

1 1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill Aniszewski Wireless Specialist October 2005 Wireless Networking Business Unit

2 222 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. Long-Term Cisco Portfolio Direction Common Hardware Infrastructure Integration Unified Management Distributed Wireless Network Lightweight Wireless Network Switch-based Controllers Location Services Integrated IDS RF Firewalling Advanced Services Lightweight Access Point Protocol Switch-based Controllers Location Services Integrated IDS RF Firewalling Advanced Services

3 333 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. Basic Concept WLAN Controller Lightweight Access Points L2/L3 Ethernet Switch WCS WLAN MGMT System

4 444 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. The Old World Mobility/VPN (e.g., Bluesocket) AP Air Monitoring (e.g., Air Defense) Rogue Sensor Security Management RF Management (planning tools) Switch/Routed Network Capacity Management Location Tracking (e.g., Newberry)

5 555 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. The New World: A Single Integrated WLAN System Mobility/VPN (e.g., Bluesocket) AP Rogue Sensor Air Monitoring (e.g., Air Defense) Security Management RF Management (planning tools) WLAN service delivery RF management Encryption/authentication Wireless prevention/protection Location tracking Capacity Management Centralized management Dynamic Control Switch/Routed Network Capacity Management Location Tracking (e.g., Newberry) WCS Integrated AP Cisco WLAN Appliance

6 666 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. No Single Point of Failure WLAN Controller Redundancy Cisco WLAN Controller Cisco Aironet Access Points Ethernet Switch Cisco Hardware Layer

7 777 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. No Single Point of Failure AP Redundancy Cisco WLAN Controller Ethernet Switch Cisco Hardware Layer Cisco Aironet Access Points

8 888 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. Real-Time RF Management RF channel “2” RF channel “1” Dynamic Channel Assignment Dynamic Power Optimization RF channel “3” Avoid interference & Improve performance Reduce “hands on” WLAN management Eliminate coverage holes Optimize coverage area Cisco Hardware Layer Cisco Aironet Access Points

9 999 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. Solving Performance & Capacity problems in high density areas (e.g. conference rooms, cafeteria)… Better Network Performance Dynamic Load Balancing

10 10 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. Solving Performance & Capacity problems in high density areas (e.g. conference rooms, cafeteria)… Better Network Performance Dynamic Load Sharing

11 11 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. Solving Performance & Capacity problems in high density areas (e.g. conference rooms, cafeteria)… Better Network Performance Dynamic Load Sharing

12 12 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. A Complete Solution for Handling Rogues 4.View Historical Report 2.Assess Rogue AP (Identity, Location,..) 1.Detect Rogue AP (generate alarm) 3. Contain Rogue AP Multiple rogues contained simultaneously ACS validates that no valid clients are associate to rogue

13 13 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. Identity Networking … User traffic is carried to switch via LWAPP Single SSID User: maria Group: Marketing ACL: Corp_1 QoS: Gold Switch uses Radius server to determine user’s Identity. This information is used for QoS and security policies.

14 14 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. … for Secure Mobility (with QoS) Single SSID ForeignAnchor User: maria Group: Marketing ACL: Corp_1 QoS: Gold

15 15 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. 1st integrated location solution Real-time location services Advanced RF fingerprinting Simultaneous real-time tracking 10,000+ devices API Third Party Applications RF capacity management Intuitive management GUI Cisco 2700 Series Wireless Location Appliance Location Tracking Services

16 16 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. Consistent Management for Indoor and Out Internet Mesh Networking Established Path Potential Path

17 17 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. A Complete Wireless Solution As Users become more Mobile… …And business applications become more Interactive… …Innovative services and applications are critical in helping companies maintain agility and differentiation Cisco networks will provide seamless wired+wireless Integration… …With the industry’s best Security and Investment Protection Cisco I 3 Enables the Secure, Mobile, Interactive Workplace Investment Protection Integration Innovation

18 18 CONFIDENTIAL AND PROPRIETARY INFORMATION © 2005 Cisco Systems, Inc. All rights reserved. 18 © 2001, Cisco Systems, Inc. All rights reserved. Presentation_ID


Download ppt "1 © 2005 Cisco Systems, Inc. All rights reserved. CONFIDENTIAL AND PROPRIETARY INFORMATION Cisco Wireless Strategy Extending and Securing the Network Bill."

Similar presentations


Ads by Google