SlideShare a Scribd company logo
1 of 16
Wi-Fi Challenges...Are you prepared for
  density, identity management and 802.11 AC

                              Meru Networks
                                     July 2012



 Everything Is
Changing Fast
HOT ISSUE: Bring Your Own Device (BYOD)




                           Everything Is
                          Changing Fast
WiFi Meltdown – even smart people had the WiFi fail-
Multil billion $$ Ipad Launch




                                                       3
Traditional Enterprise
WLAN Architecture Cannot
Prepare You
Client-in-control wireless networks
give control to the devices only:
•   Each device chooses how and where to connect
    without regard for other devices
•   Devices decide when to break a connection and
    make a new one as they move through the
    network
The results: CHAOS
•   Inability to scale
•   Inconsistent reliability
•   Compromised QoS
•   Labor-intensive management and operation
•   Inefficient resource management
Next BIG step for WiFi – 802.11ac
• Some early products already released
• Ratification expected next year
• Chip manufactures already released 802.11ac chips
• Clients soon to ship
• 80MHz and 160MHz channel width
• 802.11ac is coming….
And if we are a microcell vendor we still have to
                  have a minimum of 3 channels to play the “Let’s
                  not overlap each other dance”.


       1st Channel                       1st Channel
                        3rd Channel                        3rd Channel
                        ?????????                          ?????????
       2nd Channel                       2nd Channel

                        1st Channel                        1st Channel
       3rd Channel                       3rd Channel
       ?????????                         ?????????
                        2nd Channel                       2nd Channel



So? Where are the microcell vendors going to get the 3rd channel without utilizing 4 of the
channels affected by DFS regulations? The answer is simple. They can’t!
So? Where are the microcell vendors going to get the 3rd channel
80MHz wide bonded channel that they need without utilizing 4 of
the channels affected by DFS regulations?

The answer is simple. They can’t!
 So if you use a Multi Channel Architecture/Microcell you have only
 two choices:

 a.) Utilize the DFS channels and tell your customers that “Yes a
 false positive detection of a radar signal by your Wi-Fi radio chipset
 will cause your Wi-Fi network to complete break because you will
 lose one of the three (minimum) necessary channels for a
 microcell environment to work!

 b.) adopt a Single Channel Architecture.
Meru has been right on target from the beginning!
What are IT ‘s challenges
 • Limited IT Staff
   – Same person for wired/wireless/security


• Wi-Fi is pervasive and primary access network
 – New biz workflows require minimum Wi-Fi downtime




 • BYOD – Bring Your Own Device
   – How to manage flood of devices?

                                                      8
THE CHALLENGES OF DEPLOYING A GUEST
    NETWORK
• How do you:
> Easily create user accounts?
> Provide the details to your
  guests?
> Give different levels of
  access?
> Audit and Record everything
  that happens?
> Meet your security
  requirements?
INTRODUCING GUEST MANAGEMENT
WITH IDENTITY MANAGER
PROVISIONING

• Who should create user accounts?
 – Receptionist/Lobby Ambassador

 – IT Security

 – Managers

 – Help Desk

 – Anyone

• Identity Manager lets you choose
  based upon your security policy
• Allowing anyone to create accounts provides increased
  usage and will be just as secure
  Reduced Cost                     Speed of access
  Full Audit Trail                 Ease of use
PROVISIONING USING THE
 SPONSOR PORTAL

> Policy Based Sponsor
  Web Portal for internal
  users
> Authenticate with
  corporate credentials
      • Local Database
      • Active Directory
      • LDAP
      • RADIUS
      • Kerberos
      • Client Certificates

 12   PROPRIETARY AND CONFIDENTIAL
CREATING GUEST ACCOUNTS
                                    1. Enter user details




                                                                          2. Specify the
                                                                                account length


                                                            3. Add user
13   PROPRIETARY AND CONFIDENTIAL
NOTIFYING GUESTS

   Send account
  information via
print-out, email, or
SMS text message




14   PROPRIETARY AND CONFIDENTIAL
IDM SUITE SOLVES THE KEY PROBLEMS
      • Guest Management

       – Delivers secure, scalable wireless access for
         parents, students, faculty/staff, visitors, and their mobile
         devices

       – Less reliance on IT while enforcing the policies set forth by
         IT

      • Smart Connect

       – Solves the greatest barrier to secure connectivity adoption:
         reliance on the end-user or help desk to configure
         security settings

       – Automatically provisions client devices for secure 802.1x
         based on pre-determined IT policy

       – Process only happens one time. Auto connected every             15
Thank You.

Eric Jorgensen
Territory Sales Manager, Central & Western Canada
ejorgensen@merunetworks.com
 BYOD a Challenge?
Meru Identity Manager Simplifies Guest Access and BYOD
Learn More | Free 30-day Trial

More Related Content

What's hot

Jim smartresort presentation 02
Jim smartresort presentation 02Jim smartresort presentation 02
Jim smartresort presentation 02jglosser
 
Designing and planning_en_genius_wifi_networks
Designing and planning_en_genius_wifi_networksDesigning and planning_en_genius_wifi_networks
Designing and planning_en_genius_wifi_networksTSOLUTIONS
 
CTR350 Cradlepoint Product Brochure (quantum-wireless.com)
CTR350 Cradlepoint Product Brochure (quantum-wireless.com)CTR350 Cradlepoint Product Brochure (quantum-wireless.com)
CTR350 Cradlepoint Product Brochure (quantum-wireless.com)Ari Zoldan
 
8 camera cctv quotation bangladesh
8 camera cctv quotation bangladesh8 camera cctv quotation bangladesh
8 camera cctv quotation bangladeshJamField Solution
 
Ip Cameras
Ip CamerasIp Cameras
Ip CamerasirisZH21
 
Toshiba Business Mobility Solutions-Enterprise Mobility Solutions
Toshiba Business Mobility Solutions-Enterprise Mobility SolutionsToshiba Business Mobility Solutions-Enterprise Mobility Solutions
Toshiba Business Mobility Solutions-Enterprise Mobility Solutionstoshibatele123
 
What is VoIP
What is VoIPWhat is VoIP
What is VoIPnoyon2518
 
SIPfoundry CoLab 2013 - Solving the Bring Your Own Device BYOD problem with o...
SIPfoundry CoLab 2013 - Solving the Bring Your Own Device BYOD problem with o...SIPfoundry CoLab 2013 - Solving the Bring Your Own Device BYOD problem with o...
SIPfoundry CoLab 2013 - Solving the Bring Your Own Device BYOD problem with o...SIPfoundry
 
Cns Brochure 2010
Cns Brochure 2010Cns Brochure 2010
Cns Brochure 2010tdodd
 
hospitals-Brochure
hospitals-Brochurehospitals-Brochure
hospitals-BrochureRAKESH KUMAR
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONKABILESH RAMAR
 
Migrate your ISDN or PSTN to Vocus SIP!
Migrate your ISDN or PSTN to Vocus SIP!Migrate your ISDN or PSTN to Vocus SIP!
Migrate your ISDN or PSTN to Vocus SIP!Ben Castine
 
VIZCAM SECURITY SYSTEMS final profile
VIZCAM SECURITY SYSTEMS final profileVIZCAM SECURITY SYSTEMS final profile
VIZCAM SECURITY SYSTEMS final profilevishal shah
 

What's hot (18)

OSA Church Data Sheet
OSA Church Data SheetOSA Church Data Sheet
OSA Church Data Sheet
 
Jim smartresort presentation 02
Jim smartresort presentation 02Jim smartresort presentation 02
Jim smartresort presentation 02
 
Sub10 dubai case study
Sub10 dubai case studySub10 dubai case study
Sub10 dubai case study
 
Designing and planning_en_genius_wifi_networks
Designing and planning_en_genius_wifi_networksDesigning and planning_en_genius_wifi_networks
Designing and planning_en_genius_wifi_networks
 
CTR350 Cradlepoint Product Brochure (quantum-wireless.com)
CTR350 Cradlepoint Product Brochure (quantum-wireless.com)CTR350 Cradlepoint Product Brochure (quantum-wireless.com)
CTR350 Cradlepoint Product Brochure (quantum-wireless.com)
 
8 camera cctv quotation bangladesh
8 camera cctv quotation bangladesh8 camera cctv quotation bangladesh
8 camera cctv quotation bangladesh
 
Ip Cameras
Ip CamerasIp Cameras
Ip Cameras
 
Toshiba Business Mobility Solutions-Enterprise Mobility Solutions
Toshiba Business Mobility Solutions-Enterprise Mobility SolutionsToshiba Business Mobility Solutions-Enterprise Mobility Solutions
Toshiba Business Mobility Solutions-Enterprise Mobility Solutions
 
Wifi
WifiWifi
Wifi
 
Voip
VoipVoip
Voip
 
What is VoIP
What is VoIPWhat is VoIP
What is VoIP
 
Wi-Fi
Wi-Fi Wi-Fi
Wi-Fi
 
SIPfoundry CoLab 2013 - Solving the Bring Your Own Device BYOD problem with o...
SIPfoundry CoLab 2013 - Solving the Bring Your Own Device BYOD problem with o...SIPfoundry CoLab 2013 - Solving the Bring Your Own Device BYOD problem with o...
SIPfoundry CoLab 2013 - Solving the Bring Your Own Device BYOD problem with o...
 
Cns Brochure 2010
Cns Brochure 2010Cns Brochure 2010
Cns Brochure 2010
 
hospitals-Brochure
hospitals-Brochurehospitals-Brochure
hospitals-Brochure
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
Migrate your ISDN or PSTN to Vocus SIP!
Migrate your ISDN or PSTN to Vocus SIP!Migrate your ISDN or PSTN to Vocus SIP!
Migrate your ISDN or PSTN to Vocus SIP!
 
VIZCAM SECURITY SYSTEMS final profile
VIZCAM SECURITY SYSTEMS final profileVIZCAM SECURITY SYSTEMS final profile
VIZCAM SECURITY SYSTEMS final profile
 

Viewers also liked

The Network Impact of 802.11ac White Paper
The Network Impact of 802.11ac White PaperThe Network Impact of 802.11ac White Paper
The Network Impact of 802.11ac White PaperAerohive Networks
 
80211ac 5th gen_wi-fi
80211ac 5th gen_wi-fi80211ac 5th gen_wi-fi
80211ac 5th gen_wi-filaser9107
 
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014AirTight Networks
 
Gigabit Wi-Fi 802.11AC In Depth
Gigabit Wi-Fi 802.11AC In DepthGigabit Wi-Fi 802.11AC In Depth
Gigabit Wi-Fi 802.11AC In DepthTũi Wichets
 
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014AirTight Networks
 
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint GroupSavvius, Inc
 
Preparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11acPreparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11acCisco Mobility
 
The Impact of 5th Generation WiFi (802.11ac)
The Impact of 5th Generation WiFi (802.11ac)The Impact of 5th Generation WiFi (802.11ac)
The Impact of 5th Generation WiFi (802.11ac)Dr. Mazlan Abbas
 
Webinar NETGEAR - Soluzioni Prosafe Business Wireless ed il nuovo AP WAC740
Webinar NETGEAR - Soluzioni Prosafe Business Wireless ed il nuovo AP WAC740Webinar NETGEAR - Soluzioni Prosafe Business Wireless ed il nuovo AP WAC740
Webinar NETGEAR - Soluzioni Prosafe Business Wireless ed il nuovo AP WAC740Netgear Italia
 
IEEE 802.11ac -- BRIEF INTRO
IEEE 802.11ac  -- BRIEF INTROIEEE 802.11ac  -- BRIEF INTRO
IEEE 802.11ac -- BRIEF INTROPrashantkumar R
 
802.11ac Gigabit Wi-Fi Infographic
802.11ac Gigabit Wi-Fi Infographic802.11ac Gigabit Wi-Fi Infographic
802.11ac Gigabit Wi-Fi InfographicBenjamin Eggerstedt
 
802.11ac WIFI Fundamentals
802.11ac WIFI Fundamentals802.11ac WIFI Fundamentals
802.11ac WIFI Fundamentalscriterion123
 

Viewers also liked (20)

Next gen 802_11ac_webinar_preso
Next gen 802_11ac_webinar_presoNext gen 802_11ac_webinar_preso
Next gen 802_11ac_webinar_preso
 
The Network Impact of 802.11ac White Paper
The Network Impact of 802.11ac White PaperThe Network Impact of 802.11ac White Paper
The Network Impact of 802.11ac White Paper
 
80211ac 5th gen_wi-fi
80211ac 5th gen_wi-fi80211ac 5th gen_wi-fi
80211ac 5th gen_wi-fi
 
802.11ac: Network Readiness Action Plan
802.11ac: Network Readiness  Action Plan802.11ac: Network Readiness  Action Plan
802.11ac: Network Readiness Action Plan
 
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014Air tight 11ac webinar series   session 2 - 11ac feature deep dive - june 2014
Air tight 11ac webinar series session 2 - 11ac feature deep dive - june 2014
 
802.11ac whitepaper
802.11ac whitepaper802.11ac whitepaper
802.11ac whitepaper
 
Gigabit Wi-Fi 802.11AC In Depth
Gigabit Wi-Fi 802.11AC In DepthGigabit Wi-Fi 802.11AC In Depth
Gigabit Wi-Fi 802.11AC In Depth
 
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
AirTight 11ac Webinar Series, Aession 1 - Intro to 802.11ac - June 10 2014
 
802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group802.11ac: Technologies and Deployment Strategies with FarPoint Group
802.11ac: Technologies and Deployment Strategies with FarPoint Group
 
Preparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11acPreparing Your Network for Wave 2 of 802.11ac
Preparing Your Network for Wave 2 of 802.11ac
 
The Impact of 5th Generation WiFi (802.11ac)
The Impact of 5th Generation WiFi (802.11ac)The Impact of 5th Generation WiFi (802.11ac)
The Impact of 5th Generation WiFi (802.11ac)
 
Webinar NETGEAR - Soluzioni Prosafe Business Wireless ed il nuovo AP WAC740
Webinar NETGEAR - Soluzioni Prosafe Business Wireless ed il nuovo AP WAC740Webinar NETGEAR - Soluzioni Prosafe Business Wireless ed il nuovo AP WAC740
Webinar NETGEAR - Soluzioni Prosafe Business Wireless ed il nuovo AP WAC740
 
IEEE 802.11ac -- BRIEF INTRO
IEEE 802.11ac  -- BRIEF INTROIEEE 802.11ac  -- BRIEF INTRO
IEEE 802.11ac -- BRIEF INTRO
 
802.11ac
802.11ac802.11ac
802.11ac
 
802.11ac Gigabit Wi-Fi Infographic
802.11ac Gigabit Wi-Fi Infographic802.11ac Gigabit Wi-Fi Infographic
802.11ac Gigabit Wi-Fi Infographic
 
Wireless LAN & 802.11ac Wi-Fi Fundamentals
Wireless LAN & 802.11ac Wi-Fi FundamentalsWireless LAN & 802.11ac Wi-Fi Fundamentals
Wireless LAN & 802.11ac Wi-Fi Fundamentals
 
802.11ac WIFI Fundamentals
802.11ac WIFI Fundamentals802.11ac WIFI Fundamentals
802.11ac WIFI Fundamentals
 
Aruba 802.11ac networks: Validated Reference Designs
Aruba 802.11ac networks: Validated Reference DesignsAruba 802.11ac networks: Validated Reference Designs
Aruba 802.11ac networks: Validated Reference Designs
 
802.11ac Overview
802.11ac Overview802.11ac Overview
802.11ac Overview
 
Wi-fi and Radio Fundamentals, and 802.11ac Technology Deep Dive
Wi-fi and Radio Fundamentals, and 802.11ac Technology Deep DiveWi-fi and Radio Fundamentals, and 802.11ac Technology Deep Dive
Wi-fi and Radio Fundamentals, and 802.11ac Technology Deep Dive
 

Similar to 802.11ac Byod Linkdin

Cisco Meraki Cloud Managed Networking
Cisco Meraki Cloud Managed NetworkingCisco Meraki Cloud Managed Networking
Cisco Meraki Cloud Managed NetworkingCisco Russia
 
CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1Chaing Ravuth
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes WebinarThousandEyes
 
Securing Applications using WSO2 Identity Server and CASQUE
Securing Applications using WSO2 Identity Server and CASQUESecuring Applications using WSO2 Identity Server and CASQUE
Securing Applications using WSO2 Identity Server and CASQUEWSO2
 
Cisco IT and ThousandEyes
Cisco IT and ThousandEyesCisco IT and ThousandEyes
Cisco IT and ThousandEyesThousandEyes
 
Cisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Canada
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyesThousandEyes
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellNetworkCollaborators
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1Waqas Ahmed Nawaz
 
The Momentum of the Olympics
The Momentum of the OlympicsThe Momentum of the Olympics
The Momentum of the OlympicsAvaya Inc.
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyesThousandEyes
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyesThousandEyes
 
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...ThousandEyes
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overviewStef Coetzee
 
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?SaraPia5
 
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...PROIDEA
 

Similar to 802.11ac Byod Linkdin (20)

MMPL corporate overview mail
MMPL corporate overview mailMMPL corporate overview mail
MMPL corporate overview mail
 
Cisco Meraki Cloud Managed Networking
Cisco Meraki Cloud Managed NetworkingCisco Meraki Cloud Managed Networking
Cisco Meraki Cloud Managed Networking
 
CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1CCNA4 Verson6 Chapter1
CCNA4 Verson6 Chapter1
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
 
Securing Applications using WSO2 Identity Server and CASQUE
Securing Applications using WSO2 Identity Server and CASQUESecuring Applications using WSO2 Identity Server and CASQUE
Securing Applications using WSO2 Identity Server and CASQUE
 
Cisco IT and ThousandEyes
Cisco IT and ThousandEyesCisco IT and ThousandEyes
Cisco IT and ThousandEyes
 
Cisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Meraki- Simplifying IT
Cisco Meraki- Simplifying IT
 
Ruckus brief customer_Medley
Ruckus brief customer_MedleyRuckus brief customer_Medley
Ruckus brief customer_Medley
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
Cisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernellCisco Connect 2018 Singapore - En06 jason pernell
Cisco Connect 2018 Singapore - En06 jason pernell
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
CCNA (R & S) Module 02 - Connecting Networks - Chapter 1
 
The Momentum of the Olympics
The Momentum of the OlympicsThe Momentum of the Olympics
The Momentum of the Olympics
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
Airheads barcelona 2010 securing wireless la ns
Airheads barcelona 2010   securing wireless la nsAirheads barcelona 2010   securing wireless la ns
Airheads barcelona 2010 securing wireless la ns
 
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overview
 
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
TIC-TOC: VPN Is Dead; Are you Monetizing Its Replacement?
 
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
 

802.11ac Byod Linkdin

  • 1. Wi-Fi Challenges...Are you prepared for density, identity management and 802.11 AC Meru Networks July 2012 Everything Is Changing Fast
  • 2. HOT ISSUE: Bring Your Own Device (BYOD) Everything Is Changing Fast
  • 3. WiFi Meltdown – even smart people had the WiFi fail- Multil billion $$ Ipad Launch 3
  • 4. Traditional Enterprise WLAN Architecture Cannot Prepare You Client-in-control wireless networks give control to the devices only: • Each device chooses how and where to connect without regard for other devices • Devices decide when to break a connection and make a new one as they move through the network The results: CHAOS • Inability to scale • Inconsistent reliability • Compromised QoS • Labor-intensive management and operation • Inefficient resource management
  • 5. Next BIG step for WiFi – 802.11ac • Some early products already released • Ratification expected next year • Chip manufactures already released 802.11ac chips • Clients soon to ship • 80MHz and 160MHz channel width • 802.11ac is coming….
  • 6. And if we are a microcell vendor we still have to have a minimum of 3 channels to play the “Let’s not overlap each other dance”. 1st Channel 1st Channel 3rd Channel 3rd Channel ????????? ????????? 2nd Channel 2nd Channel 1st Channel 1st Channel 3rd Channel 3rd Channel ????????? ????????? 2nd Channel 2nd Channel So? Where are the microcell vendors going to get the 3rd channel without utilizing 4 of the channels affected by DFS regulations? The answer is simple. They can’t!
  • 7. So? Where are the microcell vendors going to get the 3rd channel 80MHz wide bonded channel that they need without utilizing 4 of the channels affected by DFS regulations? The answer is simple. They can’t! So if you use a Multi Channel Architecture/Microcell you have only two choices: a.) Utilize the DFS channels and tell your customers that “Yes a false positive detection of a radar signal by your Wi-Fi radio chipset will cause your Wi-Fi network to complete break because you will lose one of the three (minimum) necessary channels for a microcell environment to work! b.) adopt a Single Channel Architecture. Meru has been right on target from the beginning!
  • 8. What are IT ‘s challenges • Limited IT Staff – Same person for wired/wireless/security • Wi-Fi is pervasive and primary access network – New biz workflows require minimum Wi-Fi downtime • BYOD – Bring Your Own Device – How to manage flood of devices? 8
  • 9. THE CHALLENGES OF DEPLOYING A GUEST NETWORK • How do you: > Easily create user accounts? > Provide the details to your guests? > Give different levels of access? > Audit and Record everything that happens? > Meet your security requirements?
  • 11. PROVISIONING • Who should create user accounts? – Receptionist/Lobby Ambassador – IT Security – Managers – Help Desk – Anyone • Identity Manager lets you choose based upon your security policy • Allowing anyone to create accounts provides increased usage and will be just as secure  Reduced Cost  Speed of access  Full Audit Trail  Ease of use
  • 12. PROVISIONING USING THE SPONSOR PORTAL > Policy Based Sponsor Web Portal for internal users > Authenticate with corporate credentials • Local Database • Active Directory • LDAP • RADIUS • Kerberos • Client Certificates 12 PROPRIETARY AND CONFIDENTIAL
  • 13. CREATING GUEST ACCOUNTS 1. Enter user details 2. Specify the account length 3. Add user 13 PROPRIETARY AND CONFIDENTIAL
  • 14. NOTIFYING GUESTS Send account information via print-out, email, or SMS text message 14 PROPRIETARY AND CONFIDENTIAL
  • 15. IDM SUITE SOLVES THE KEY PROBLEMS • Guest Management – Delivers secure, scalable wireless access for parents, students, faculty/staff, visitors, and their mobile devices – Less reliance on IT while enforcing the policies set forth by IT • Smart Connect – Solves the greatest barrier to secure connectivity adoption: reliance on the end-user or help desk to configure security settings – Automatically provisions client devices for secure 802.1x based on pre-determined IT policy – Process only happens one time. Auto connected every 15
  • 16. Thank You. Eric Jorgensen Territory Sales Manager, Central & Western Canada ejorgensen@merunetworks.com BYOD a Challenge? Meru Identity Manager Simplifies Guest Access and BYOD Learn More | Free 30-day Trial