SlideShare a Scribd company logo
© Copyright Fortinet Inc. All rights reserved.
Secure Access Architecture
Alessandro Berta – Systems Engineer
15 Aprile 2016
2
Trend: Device Growth Continues
More devices and newer device types are entering the network
 33 Billion endpoints projected to
be connected by 2020 – Gartner
 New device types entering the
network
» ‘headless’ IoT, wireless sensor
nodes, beacons, wearables
3
Trend: Devices Going Wireless
Wi-Fi becoming the primary access medium
© Nemertes Research, August 2015
9%
7%
13%
35%
36%
0% 10% 20% 30% 40% 50%
Other
ZigBee
Bluetooth
Wi-Fi
Ethernet
Percent of Respondents
LANAccessTechnologies
2014
• Each generation of Wi-Fi technology accelerates the migration
to wireless for users
IoT Access Technology Predications
© Infonetics, M2M Strategies by Vertical: N. American Enterprise Survey, January 2014
64%
Wireless
• IoT devices going wireless
4
Trend: Need for More Speed
Migration to 802.11ac continues
1st Generation
1997-1998
2nd Generation
1999-2001
3rd Generation
2002-2006
4th Generation
2007-2011
5th Generation
Now
802.11
2 Mbps
802.11b
11 Mbps
802.11g/a
54 Mbps
802.11n
450 Mbps
802.11ac
Gigabit Mbps
Infonetics, Wireless LAN Equipment Quarterly Worldwide and Regional Market Share: 4Q14
Migration to 802.11acWi-Fi Standards Evolution
5
Trend: Seamless User Experience
A unified access experience is the expected norm
 Users utilize multiple devices in the enterprise
» Wireless: smartphone, tablets
» Wired: desktops, workstations
 Consistent user experience is the norm
» Consistent policies for access, application, security
 Seamless device experience
» New device types must be provisioned appropriately
» “Headless” devices – IoT
Access
Points
Switch
Wireless Wired
Authentication
6
Wireless - the Weakest Link
Endpoint
Core network
infrastructure
Wireless Databases Applications Storage Email
Worldwide 45% 29% 49% 25% 17% 11% 25%
Americas 43% 28% 50% 27% 17% 12% 23%
EMEA 47% 27% 52% 22% 17% 10% 24%
APAC 43% 31% 44% 25% 18% 10% 29%
0%
10%
20%
30%
40%
50%
60%
WLAN Ranked as the Most Vulnerable IT infrastructure
Source: Fortinet Security Census 2015, 1490 respondents
7
Expectations are on the Rise
Need More Speed
Migration to 802.11ac
Seamless
Unified Experience
Unified Network
Operations
Application Growth
Move to wireless
Device Growth
8
Combine Security and Access
Need More Speed
Migration to 802.11ac
Seamless
Unified Experience
Unified Network
Operations
Application Growth
Move to wireless
Device Growth
SECURE ACCESS
ARCHITECTURE
9
FortiPresence FortiAuthenticator
FortiManager FortiWLM
FortiClient FortiWiFi
FortiWLC
FortiAP
FortiGate Controller
FortiSwitch (POE)
SECURE ACCESS
ARCHITECTURE
N
Why Fortinet?
10
Complete Secure Access Offerings
Note: formally Meru Networks
Cloud
APSwitch
Cloud
(Cloud Management)
Security
+
WLAN Management
APSwitch
Integrated
(Integrated Controller)
AP
Security
WLAN
Management
Switch
Infrastructure
(Dedicated Controller)
1 2 3
11
Fortinet Offers More Choices
Infrastructure
(Dedicated Controller)
Integrated
(Integrated Controller)
Cloud
(Cloud Management)
Distributed Enterprise
(Retail / QSR)  
Healthcare / Financials  
K-12 / Primary / Secondary
School  
Higher Education 
Large Public Venue 
Infrastructure Wireless
Secure Access Architecture
13
Why Infrastructure?
1
 Mobile: Fit for highly mobile deployments
 Flexible: Many deployment options
 Stand-alone: Able to separate access purchase decision from security
FortiWLC-50D
FortiWLC-200D
FortiWLC-500D
Infrastructure Wireless
14
Infrastructure Wireless
Multi-Channel
One channel to simplify deployment
and seamless roaming
Multiple channels to maximize
spectrum reuse and performance
Single Channel + Virtual Cell
36 36 36
36 36 36 36
36 36 36
Multiple channels to segment
application traffic and add capacity
Channel Layers + Virtual Cells
36 36 36
36 36 36 36
58 58 5844 44 44
44 44 44 44
42 42 42
149 149 149
149 149 149 149
149 149 149
1
15
Infrastructure Wireless
Network In Control
Fortinet decides when clients roam for best
possible user experience in time-sensitive
applications.
Mobile
Fit for highly mobile and scalable deployments
where low latency and roaming support matter
Controlling the User Experience
1
16
Client-in-control: the “Sticky Clients” issue
Scanners and VoIP handsets re-charging in the cradles
1
17
Client-in-control: the “Sticky Clients” issue
WiFi Client tend to stick to the same AP, depending on their NIC driver
1
18
Client-in-control: the “Sticky Clients” issue
The AP-Client links are barely optimized. Many connections are at long distance, weak
signal, low data rate, scarce throughput.
1
19
Network-in-control
Optimized Distribution of Clients
Wi-Fi Clients are always associated to the best AP: higher signal, faster data rate, better
performance, AP’s are not congested by far-away clients.
1
20
Roaming is really Seamless and at the right time
20
X
Multi-Channel
Virtual Cell
100 ms – 3 seconds
between handoff 5 - 10 ms
between handoff
X
1
Integrated Wireless
Secure Access Architecture
22
Integrated Wireless
Security Access
Control
 Enterprise WLAN controller
 Rogue AP and WIDS
 Integrated captive portal
 Tunnel, bridge and mesh
 Single pane of glass
 Unified wired/wireless
 Application control
 FortiGuard Services
Security
2
23
Integrated Wireless
 Every FortiGate includes a WLAN controller
 Largest range of controllers in the industry
 Support ranges from 5 APs (100 users) up to 10K APs
(32,000 users)
2
WiFi > SSID2
FortiView > Device topology (SSID and VLAN)2
FortiView > Applications2
FortiView > Applications > Drill Down > Sessions2
FortiView > Threat Map2
Cloud Wireless
Secure Access Architecture
30
Why Cloud?
3
FAP-S323C
802.11ac
3x3:3
FAP-S321C
802.11ac
3x3:3
 Secure: Industry’s only UTM + AP solution
 Cloud: Roll out remote sites in minutes - not hours and days
 Controller-less: Wi-Fi without the complexity of on premise controllers
Cloud Wireless
31
Competitor Cloud Wi-Fi FortiAP-S Series
Connection
Credential Lookup
Authentication
Gap in Security
Protection
Continue to Wire
Connection
Credential Lookup
Authentication
IPS, AV, Botnet
URL Filter, App Control
Continue to Wire
 Managed by FortiCloud
 No controller required
 FortiGuard services run on each AP
 Simplifies deployment and management
Cloud Wireless3
32
Cloud Wireless
Intrusion Prevention System
Antivirus and Anti-botnet
L7 Application Control
Web Filtering
3
Other Secure Access related products
Secure Access Architecture
34
FortiPlanner
 Wireless LAN Planning and Real-Time Visualization Software
 Free download for deployments of up to 30 FortiAPs.
 Pro license supports unlimited FortiAPs and enables Site Survey and Real-Time
Heat-map features
FortiPlanner wireless deployment planning FortiPlanner wireless site survey
35
FortiPresence
Presence Analytics Solution
Uses existing in-store FortiAP or FortiWiFi access points to collect the WiFi signal information from the
smartphones of visitors.
 Solution Components:
» FortiAP or FortiWiFi - Detects WiFi signal from smartphones
» FortiGate or FortiWLC - Aggregates signal information from multiple APs
» FortiPresence Cloud – Processes data and presents analytics on dashboard
FortiPresence
36
FortiPresence
 Total visitor traffic
 Real time visit capture rate
 Dwell time duration
 A/B comparison across stores
 Repeat visitors, frequency
 VIP Alert
 Heat maps with animated flows
 Real-time density, staff resources
 Measure marketing campaign effectiveness
37
FortiSwitch
Why FortiSwitch?  Control: Managed and secured from FortiGate GUI
 Power: Full PoE+ power for APs and other Power over Ethernet devices
 Stackable: 1GbE, 10GbE and 40GbE with stacking capability
38
FortiGate Switch Management
» Fortilink protocol for secure
management
» Visibility into port speed/status
» Centrally manage VLANs
» Apply security policy
» Authenticate clients centrally via
802.1x or captive portal
FortiSwitch
39
FortiPresence FortiAuthenticator
FortiManager FortiWLM
FortiClient FortiWiFi
FortiWLC
FortiAP
FortiGate Controller
FortiSwitch (POE)
SECURE ACCESS
ARCHITECTURE
N
160415 lan and-wan-secure-access-architecture

More Related Content

What's hot

Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Forescout Technologies Inc
 
Fortinet k
Fortinet kFortinet k
Fortinet k
mrehan2k2
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
Block Armour
 
Sophos Utm Presentation 2016
Sophos Utm Presentation 2016Sophos Utm Presentation 2016
Sophos Utm Presentation 2016
InformatikaFortuno
 
How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System? How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System?
Forescout Technologies Inc
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013
juliankanarek
 
The Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereThe Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's Here
Forescout Technologies Inc
 
ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk ReportForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
Forescout Technologies Inc
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution TaarakMohit8780
 
Presentacion nac
Presentacion nacPresentacion nac
Presentacion nac
Adriana Cardona
 
Fortinet Perspectiva Coporativa
Fortinet Perspectiva CoporativaFortinet Perspectiva Coporativa
Fortinet Perspectiva Coporativa
Suministros Obras y Sistemas
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
Group of company MUK
 
Internet of Things Security Patterns
Internet of Things Security PatternsInternet of Things Security Patterns
Internet of Things Security Patterns
Mark Benson
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
Sophos Benelux
 
Network Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsNetwork Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsIncheon Park
 
IRJET- Network Monitoring & Network Security
IRJET-  	  Network Monitoring & Network SecurityIRJET-  	  Network Monitoring & Network Security
IRJET- Network Monitoring & Network Security
IRJET Journal
 
Positive approach to security of Core networks
Positive approach to security of Core networksPositive approach to security of Core networks
Positive approach to security of Core networks
PositiveTechnologies
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
Clare Nelson, CISSP, CIPP-E
 

What's hot (20)

Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
 
Fortinet k
Fortinet kFortinet k
Fortinet k
 
What is NAC
What is NACWhat is NAC
What is NAC
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
 
Sophos Utm Presentation 2016
Sophos Utm Presentation 2016Sophos Utm Presentation 2016
Sophos Utm Presentation 2016
 
Juniper idp overview
Juniper idp overviewJuniper idp overview
Juniper idp overview
 
How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System? How Secure Is Your Building Automation System?
How Secure Is Your Building Automation System?
 
Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013Fortinet ixia ottawa, june 2013
Fortinet ixia ottawa, june 2013
 
The Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's HereThe Internet of Things Isn't Coming, It's Here
The Internet of Things Isn't Coming, It's Here
 
ForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk ReportForeScout IoT Enterprise Risk Report
ForeScout IoT Enterprise Risk Report
 
NAC Solution Taarak
NAC Solution TaarakNAC Solution Taarak
NAC Solution Taarak
 
Presentacion nac
Presentacion nacPresentacion nac
Presentacion nac
 
Fortinet Perspectiva Coporativa
Fortinet Perspectiva CoporativaFortinet Perspectiva Coporativa
Fortinet Perspectiva Coporativa
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
Internet of Things Security Patterns
Internet of Things Security PatternsInternet of Things Security Patterns
Internet of Things Security Patterns
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
Network Control Access for Non-IT Professionals
Network Control Access for Non-IT ProfessionalsNetwork Control Access for Non-IT Professionals
Network Control Access for Non-IT Professionals
 
IRJET- Network Monitoring & Network Security
IRJET-  	  Network Monitoring & Network SecurityIRJET-  	  Network Monitoring & Network Security
IRJET- Network Monitoring & Network Security
 
Positive approach to security of Core networks
Positive approach to security of Core networksPositive approach to security of Core networks
Positive approach to security of Core networks
 
IoT Security, Mirai Revisited
IoT Security, Mirai RevisitedIoT Security, Mirai Revisited
IoT Security, Mirai Revisited
 

Similar to 160415 lan and-wan-secure-access-architecture

PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
PROIDEA
 
Firetide GSA Wireless Mesh Nodes
Firetide GSA Wireless Mesh NodesFiretide GSA Wireless Mesh Nodes
Firetide GSA Wireless Mesh Nodes
Paul Richards
 
Firetide Wireless Mesh Nodes for Commercial
Firetide Wireless Mesh Nodes for CommercialFiretide Wireless Mesh Nodes for Commercial
Firetide Wireless Mesh Nodes for Commercial
Paul Richards
 
Wireless World
Wireless World Wireless World
Wireless World
bhattsipl
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
ssuser5824cf
 
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
PawachMetharattanara
 
Managing Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless NetworkManaging Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless Network
SecurEdgeNetworks
 
Fortinet
FortinetFortinet
Fortinet
ABEP123
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
DATA SECURITY SOLUTIONS
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access Architecture
Exclusive Networks ME
 
Tropos Sales Overview 081704
Tropos Sales Overview 081704Tropos Sales Overview 081704
Tropos Sales Overview 081704Ayça Apak Tonge
 
ShareTech WiFi UTM
ShareTech WiFi UTMShareTech WiFi UTM
ShareTech WiFi UTM
sharetech
 
ICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOCICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOC
International Communications Corporation
 
Assess security from sensors to api c4 i 20151126
Assess security from sensors to api c4 i 20151126Assess security from sensors to api c4 i 20151126
Assess security from sensors to api c4 i 20151126
Denis Rousset
 
Manging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless NetworkManging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless NetworkSecurEdgeNetworks
 
Tap Into the Health of Your Network
Tap Into the Health of Your NetworkTap Into the Health of Your Network
Tap Into the Health of Your Network
LiveAction Next Generation Network Management Software
 
Taking Wi-Fi Where It’s Never Gone Before
Taking Wi-Fi Where It’s Never Gone BeforeTaking Wi-Fi Where It’s Never Gone Before
Taking Wi-Fi Where It’s Never Gone Before
TelExcell Information Systems Ltd. New Delhi
 

Similar to 160415 lan and-wan-secure-access-architecture (20)

PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
PLNOG16: When and Why use Fortinet Infrastructure Wireless solution, Brian An...
 
Firetide GSA Wireless Mesh Nodes
Firetide GSA Wireless Mesh NodesFiretide GSA Wireless Mesh Nodes
Firetide GSA Wireless Mesh Nodes
 
AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011AirTight Networks - Wireless Security 2011
AirTight Networks - Wireless Security 2011
 
Firetide Wireless Mesh Nodes for Commercial
Firetide Wireless Mesh Nodes for CommercialFiretide Wireless Mesh Nodes for Commercial
Firetide Wireless Mesh Nodes for Commercial
 
Wireless World
Wireless World Wireless World
Wireless World
 
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTXCustomer Presentation - Aruba Wi-Fi Overview (1).PPTX
Customer Presentation - Aruba Wi-Fi Overview (1).PPTX
 
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
5. Firetide Next Generation Wireless Infrastructure for City Surveillance.pdf
 
Retail
RetailRetail
Retail
 
Managing Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless NetworkManaging Student Devices on the School Wireless Network
Managing Student Devices on the School Wireless Network
 
Fortinet
FortinetFortinet
Fortinet
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
 
Solution Guide Secure Access Architecture
Solution Guide Secure Access ArchitectureSolution Guide Secure Access Architecture
Solution Guide Secure Access Architecture
 
Tropos Sales Overview 081704
Tropos Sales Overview 081704Tropos Sales Overview 081704
Tropos Sales Overview 081704
 
ShareTech WiFi UTM
ShareTech WiFi UTMShareTech WiFi UTM
ShareTech WiFi UTM
 
ICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOCICC Networking handles BYOD & BYOC
ICC Networking handles BYOD & BYOC
 
Assess security from sensors to api c4 i 20151126
Assess security from sensors to api c4 i 20151126Assess security from sensors to api c4 i 20151126
Assess security from sensors to api c4 i 20151126
 
Manging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless NetworkManging Student Devices on the School Wireless Network
Manging Student Devices on the School Wireless Network
 
4ipnet_Product_Catalogue_2016
4ipnet_Product_Catalogue_20164ipnet_Product_Catalogue_2016
4ipnet_Product_Catalogue_2016
 
Tap Into the Health of Your Network
Tap Into the Health of Your NetworkTap Into the Health of Your Network
Tap Into the Health of Your Network
 
Taking Wi-Fi Where It’s Never Gone Before
Taking Wi-Fi Where It’s Never Gone BeforeTaking Wi-Fi Where It’s Never Gone Before
Taking Wi-Fi Where It’s Never Gone Before
 

More from Lan & Wan Solutions

CYBER THREAT ASSESSMENT
CYBER THREAT ASSESSMENTCYBER THREAT ASSESSMENT
CYBER THREAT ASSESSMENT
Lan & Wan Solutions
 
Nuova presentazione Lan & Wan Solutions Fortinet Partner
Nuova presentazione Lan & Wan Solutions Fortinet PartnerNuova presentazione Lan & Wan Solutions Fortinet Partner
Nuova presentazione Lan & Wan Solutions Fortinet Partner
Lan & Wan Solutions
 
Nuova presentazione Lan & Wan Solutions
Nuova presentazione Lan & Wan SolutionsNuova presentazione Lan & Wan Solutions
Nuova presentazione Lan & Wan Solutions
Lan & Wan Solutions
 
Mc business solutions set
Mc business solutions setMc business solutions set
Mc business solutions set
Lan & Wan Solutions
 
Mc partner playbook
Mc partner playbookMc partner playbook
Mc partner playbook
Lan & Wan Solutions
 
Lan & Wan
Lan & WanLan & Wan
Secure Access Architecture
Secure Access ArchitectureSecure Access Architecture
Secure Access Architecture
Lan & Wan Solutions
 
Advanced Threat Protection
Advanced Threat ProtectionAdvanced Threat Protection
Advanced Threat Protection
Lan & Wan Solutions
 
scheda tecnica smartphone zona 1.21 e zona 2.22
scheda tecnica smartphone zona 1.21 e zona 2.22scheda tecnica smartphone zona 1.21 e zona 2.22
scheda tecnica smartphone zona 1.21 e zona 2.22
Lan & Wan Solutions
 
scheda tecnica smartphone zona 1.21 e zona 2.22
scheda tecnica smartphone zona 1.21 e zona 2.22scheda tecnica smartphone zona 1.21 e zona 2.22
scheda tecnica smartphone zona 1.21 e zona 2.22
Lan & Wan Solutions
 
Scheda tecnica hspa 08
Scheda tecnica hspa 08Scheda tecnica hspa 08
Scheda tecnica hspa 08
Lan & Wan Solutions
 
Antenne filari
Antenne filariAntenne filari
Antenne filari
Lan & Wan Solutions
 
Antenne multifilari
Antenne multifilariAntenne multifilari
Antenne multifilari
Lan & Wan Solutions
 
Emea nutanix overview presentation emea
Emea  nutanix overview presentation emeaEmea  nutanix overview presentation emea
Emea nutanix overview presentation emea
Lan & Wan Solutions
 

More from Lan & Wan Solutions (20)

CYBER THREAT ASSESSMENT
CYBER THREAT ASSESSMENTCYBER THREAT ASSESSMENT
CYBER THREAT ASSESSMENT
 
Nuova presentazione Lan & Wan Solutions Fortinet Partner
Nuova presentazione Lan & Wan Solutions Fortinet PartnerNuova presentazione Lan & Wan Solutions Fortinet Partner
Nuova presentazione Lan & Wan Solutions Fortinet Partner
 
Nuova presentazione Lan & Wan Solutions
Nuova presentazione Lan & Wan SolutionsNuova presentazione Lan & Wan Solutions
Nuova presentazione Lan & Wan Solutions
 
CTAP
CTAPCTAP
CTAP
 
Mc business solutions set
Mc business solutions setMc business solutions set
Mc business solutions set
 
Mc partner playbook
Mc partner playbookMc partner playbook
Mc partner playbook
 
Lan & Wan
Lan & WanLan & Wan
Lan & Wan
 
Lan & Wan
Lan & WanLan & Wan
Lan & Wan
 
Secure Access Architecture
Secure Access ArchitectureSecure Access Architecture
Secure Access Architecture
 
ATP
ATPATP
ATP
 
Advanced Threat Protection
Advanced Threat ProtectionAdvanced Threat Protection
Advanced Threat Protection
 
scheda tecnica smartphone zona 1.21 e zona 2.22
scheda tecnica smartphone zona 1.21 e zona 2.22scheda tecnica smartphone zona 1.21 e zona 2.22
scheda tecnica smartphone zona 1.21 e zona 2.22
 
scheda tecnica smartphone zona 1.21 e zona 2.22
scheda tecnica smartphone zona 1.21 e zona 2.22scheda tecnica smartphone zona 1.21 e zona 2.22
scheda tecnica smartphone zona 1.21 e zona 2.22
 
Scheda tecnica hspa 08
Scheda tecnica hspa 08Scheda tecnica hspa 08
Scheda tecnica hspa 08
 
Vmware
VmwareVmware
Vmware
 
Antenne filari
Antenne filariAntenne filari
Antenne filari
 
Antenne multifilari
Antenne multifilariAntenne multifilari
Antenne multifilari
 
Forti web
Forti webForti web
Forti web
 
Emea nutanix overview presentation emea
Emea  nutanix overview presentation emeaEmea  nutanix overview presentation emea
Emea nutanix overview presentation emea
 
Forti web
Forti webForti web
Forti web
 

Recently uploaded

CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
fakeloginn69
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
BBPMedia1
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop.com LTD
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
Nicola Wreford-Howard
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
DerekIwanaka1
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
PaulBryant58
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
Kumar Satyam
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
Operational Excellence Consulting
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
Safe PaaS
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
my Pandit
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
BBPMedia1
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 

Recently uploaded (20)

CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptxCADAVER AS OUR FIRST TEACHER anatomt in your.pptx
CADAVER AS OUR FIRST TEACHER anatomt in your.pptx
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
 
Exploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social DreamingExploring Patterns of Connection with Social Dreaming
Exploring Patterns of Connection with Social Dreaming
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
 
Sustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & EconomySustainability: Balancing the Environment, Equity & Economy
Sustainability: Balancing the Environment, Equity & Economy
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
Lookback Analysis
Lookback AnalysisLookback Analysis
Lookback Analysis
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 

160415 lan and-wan-secure-access-architecture

  • 1. © Copyright Fortinet Inc. All rights reserved. Secure Access Architecture Alessandro Berta – Systems Engineer 15 Aprile 2016
  • 2. 2 Trend: Device Growth Continues More devices and newer device types are entering the network  33 Billion endpoints projected to be connected by 2020 – Gartner  New device types entering the network » ‘headless’ IoT, wireless sensor nodes, beacons, wearables
  • 3. 3 Trend: Devices Going Wireless Wi-Fi becoming the primary access medium © Nemertes Research, August 2015 9% 7% 13% 35% 36% 0% 10% 20% 30% 40% 50% Other ZigBee Bluetooth Wi-Fi Ethernet Percent of Respondents LANAccessTechnologies 2014 • Each generation of Wi-Fi technology accelerates the migration to wireless for users IoT Access Technology Predications © Infonetics, M2M Strategies by Vertical: N. American Enterprise Survey, January 2014 64% Wireless • IoT devices going wireless
  • 4. 4 Trend: Need for More Speed Migration to 802.11ac continues 1st Generation 1997-1998 2nd Generation 1999-2001 3rd Generation 2002-2006 4th Generation 2007-2011 5th Generation Now 802.11 2 Mbps 802.11b 11 Mbps 802.11g/a 54 Mbps 802.11n 450 Mbps 802.11ac Gigabit Mbps Infonetics, Wireless LAN Equipment Quarterly Worldwide and Regional Market Share: 4Q14 Migration to 802.11acWi-Fi Standards Evolution
  • 5. 5 Trend: Seamless User Experience A unified access experience is the expected norm  Users utilize multiple devices in the enterprise » Wireless: smartphone, tablets » Wired: desktops, workstations  Consistent user experience is the norm » Consistent policies for access, application, security  Seamless device experience » New device types must be provisioned appropriately » “Headless” devices – IoT Access Points Switch Wireless Wired Authentication
  • 6. 6 Wireless - the Weakest Link Endpoint Core network infrastructure Wireless Databases Applications Storage Email Worldwide 45% 29% 49% 25% 17% 11% 25% Americas 43% 28% 50% 27% 17% 12% 23% EMEA 47% 27% 52% 22% 17% 10% 24% APAC 43% 31% 44% 25% 18% 10% 29% 0% 10% 20% 30% 40% 50% 60% WLAN Ranked as the Most Vulnerable IT infrastructure Source: Fortinet Security Census 2015, 1490 respondents
  • 7. 7 Expectations are on the Rise Need More Speed Migration to 802.11ac Seamless Unified Experience Unified Network Operations Application Growth Move to wireless Device Growth
  • 8. 8 Combine Security and Access Need More Speed Migration to 802.11ac Seamless Unified Experience Unified Network Operations Application Growth Move to wireless Device Growth SECURE ACCESS ARCHITECTURE
  • 9. 9 FortiPresence FortiAuthenticator FortiManager FortiWLM FortiClient FortiWiFi FortiWLC FortiAP FortiGate Controller FortiSwitch (POE) SECURE ACCESS ARCHITECTURE N Why Fortinet?
  • 10. 10 Complete Secure Access Offerings Note: formally Meru Networks Cloud APSwitch Cloud (Cloud Management) Security + WLAN Management APSwitch Integrated (Integrated Controller) AP Security WLAN Management Switch Infrastructure (Dedicated Controller) 1 2 3
  • 11. 11 Fortinet Offers More Choices Infrastructure (Dedicated Controller) Integrated (Integrated Controller) Cloud (Cloud Management) Distributed Enterprise (Retail / QSR)   Healthcare / Financials   K-12 / Primary / Secondary School   Higher Education  Large Public Venue 
  • 13. 13 Why Infrastructure? 1  Mobile: Fit for highly mobile deployments  Flexible: Many deployment options  Stand-alone: Able to separate access purchase decision from security FortiWLC-50D FortiWLC-200D FortiWLC-500D Infrastructure Wireless
  • 14. 14 Infrastructure Wireless Multi-Channel One channel to simplify deployment and seamless roaming Multiple channels to maximize spectrum reuse and performance Single Channel + Virtual Cell 36 36 36 36 36 36 36 36 36 36 Multiple channels to segment application traffic and add capacity Channel Layers + Virtual Cells 36 36 36 36 36 36 36 58 58 5844 44 44 44 44 44 44 42 42 42 149 149 149 149 149 149 149 149 149 149 1
  • 15. 15 Infrastructure Wireless Network In Control Fortinet decides when clients roam for best possible user experience in time-sensitive applications. Mobile Fit for highly mobile and scalable deployments where low latency and roaming support matter Controlling the User Experience 1
  • 16. 16 Client-in-control: the “Sticky Clients” issue Scanners and VoIP handsets re-charging in the cradles 1
  • 17. 17 Client-in-control: the “Sticky Clients” issue WiFi Client tend to stick to the same AP, depending on their NIC driver 1
  • 18. 18 Client-in-control: the “Sticky Clients” issue The AP-Client links are barely optimized. Many connections are at long distance, weak signal, low data rate, scarce throughput. 1
  • 19. 19 Network-in-control Optimized Distribution of Clients Wi-Fi Clients are always associated to the best AP: higher signal, faster data rate, better performance, AP’s are not congested by far-away clients. 1
  • 20. 20 Roaming is really Seamless and at the right time 20 X Multi-Channel Virtual Cell 100 ms – 3 seconds between handoff 5 - 10 ms between handoff X 1
  • 22. 22 Integrated Wireless Security Access Control  Enterprise WLAN controller  Rogue AP and WIDS  Integrated captive portal  Tunnel, bridge and mesh  Single pane of glass  Unified wired/wireless  Application control  FortiGuard Services Security 2
  • 23. 23 Integrated Wireless  Every FortiGate includes a WLAN controller  Largest range of controllers in the industry  Support ranges from 5 APs (100 users) up to 10K APs (32,000 users) 2
  • 25. FortiView > Device topology (SSID and VLAN)2
  • 27. FortiView > Applications > Drill Down > Sessions2
  • 30. 30 Why Cloud? 3 FAP-S323C 802.11ac 3x3:3 FAP-S321C 802.11ac 3x3:3  Secure: Industry’s only UTM + AP solution  Cloud: Roll out remote sites in minutes - not hours and days  Controller-less: Wi-Fi without the complexity of on premise controllers Cloud Wireless
  • 31. 31 Competitor Cloud Wi-Fi FortiAP-S Series Connection Credential Lookup Authentication Gap in Security Protection Continue to Wire Connection Credential Lookup Authentication IPS, AV, Botnet URL Filter, App Control Continue to Wire  Managed by FortiCloud  No controller required  FortiGuard services run on each AP  Simplifies deployment and management Cloud Wireless3
  • 32. 32 Cloud Wireless Intrusion Prevention System Antivirus and Anti-botnet L7 Application Control Web Filtering 3
  • 33. Other Secure Access related products Secure Access Architecture
  • 34. 34 FortiPlanner  Wireless LAN Planning and Real-Time Visualization Software  Free download for deployments of up to 30 FortiAPs.  Pro license supports unlimited FortiAPs and enables Site Survey and Real-Time Heat-map features FortiPlanner wireless deployment planning FortiPlanner wireless site survey
  • 35. 35 FortiPresence Presence Analytics Solution Uses existing in-store FortiAP or FortiWiFi access points to collect the WiFi signal information from the smartphones of visitors.  Solution Components: » FortiAP or FortiWiFi - Detects WiFi signal from smartphones » FortiGate or FortiWLC - Aggregates signal information from multiple APs » FortiPresence Cloud – Processes data and presents analytics on dashboard FortiPresence
  • 36. 36 FortiPresence  Total visitor traffic  Real time visit capture rate  Dwell time duration  A/B comparison across stores  Repeat visitors, frequency  VIP Alert  Heat maps with animated flows  Real-time density, staff resources  Measure marketing campaign effectiveness
  • 37. 37 FortiSwitch Why FortiSwitch?  Control: Managed and secured from FortiGate GUI  Power: Full PoE+ power for APs and other Power over Ethernet devices  Stackable: 1GbE, 10GbE and 40GbE with stacking capability
  • 38. 38 FortiGate Switch Management » Fortilink protocol for secure management » Visibility into port speed/status » Centrally manage VLANs » Apply security policy » Authenticate clients centrally via 802.1x or captive portal FortiSwitch
  • 39. 39 FortiPresence FortiAuthenticator FortiManager FortiWLM FortiClient FortiWiFi FortiWLC FortiAP FortiGate Controller FortiSwitch (POE) SECURE ACCESS ARCHITECTURE N