SlideShare a Scribd company logo
OVERVIEW
SOLUTION
REQUIREMENTS
BENEFITS
Copyright © 2015, 4ipnet, Inc. All rights reserved. All other trademarks mentioned are the property of their respective owners.
ENTERPRISE
CASE STUDY
The Federal Court of Malaysia is the highest
court in the country. It is located in the Palace
of Justice in the federal administrative capital of
Putrajaya and was established in 1957, during
Malaysia’s independence.
• Role-based access control and policy
enforcement offers effective management
of privileges for different user groups
• Service Zone function partitions a physical
network into up to 9 virtual networks, each
with its own definable access control and
group policy profiles
• Diverse user authentication methods,
including built-in Local and On-demand
account databases
The following were deployed across the Federal
Court of Malaysia properties:
• WHG405 Wireless LAN Controller
• EAP110 Wireless Access Point
• EAP757 Wireless Access Point
• Differentiated services and policy
enforcement for users based on roles
• Centralized AP management for easily
monitoring the status of distributed APs
• Seamless and fast roaming between
individual access points to ensure
uninterrupted Wi-Fi experience in high-
density environment
• Vendor-agnostic equipment to be
integrated with existing network
infrastructure
A SECURE & RELIABLE WIFI EXPERIENCE
AT THE FEDERAL COURT OF MALAYSIA
The Federal Court of Malaysia, located in the Palace of Justice in Putrajaya, is the highest
court in the country. Established during Malaysia’s independence in 1957, it originally
served as the Court of Judicature of Prince of Wales' Island and received its present
name in 1994. With the recent advances in communication technology and soaring
usage of mobile devices, there is now a stronger demand than ever for stable and
ubiquitous Wi-Fi access. This phenomenon led the Federal Court to acknowledge that its
wireless network infrastructure needed to be expanded and upgraded.
There were several challenges that the Federal Court faced when it came to providing
a reliable and secure Wi-Fi. Firstly, given that the Federal Court could have many users
online at any moment, each with multiple devices, the WLAN infrastructure needed to be
robust and able to operate steadily in a high-density environment. Secondly, the Federal
Court wished to provide differentiated access privileges for staffs and visitors to ensure
the security of sensitive data. Lastly, since the existing wireless network contained APs
from several different vendors, along with the fact that the Federal Court did not wish to
overhaul the entire infrastructure, the new Wi-Fi solution needed to be vendor-agnostic.
After thoroughly evaluating several competing solutions, the Federal Court decided that
4ipnet’s proposed solution, which consisted of the WHG405 Wireless LAN Controller
and EAP110/EAP757 Wireless Access Points, was their best option.
The WHG405 provided centralized management for up to 150 APs, and enabled
browser-based user authentication for users to easily login to Wi-Fi. Once users were
logged in, administrators were then able to enforce firewall rules and bandwidth
limitations through the WHG405’s role-based policy feature. Additionally, in the event of
illegal Internet activities, detailed usage logs like HTTP Web Log and NAT Conversion Log
helped the IT staff quickly trace the source of the activity. These user management and
logging features helped created a secure and reliable Wi-Fi environment for every user
and device in the Federal Court.
In addition to the controller, the EAP access points also played a significant role in
maintaining a high performance wireless network. With the comprehensive performance
and security features such as VLAN tagging and Layer 2 Firewall, the Federal Court was
able to segregate network traffic and limit broadcast domains, and prevent unnecessary
packets from being transmitted onto the wireless medium. The most significant benefit
came from integrating the access points with the controller, giving the Federal Court a
total solution for AP management, user access control, and network traffic monitoring.
In conclusion, 4ipnet’s WLAN solution surpassed the Federal Court's expectations. From
network services to user monitoring and AP management, 4ipnet's features helped
simplify the workload of network administrators and guarantee a stable and secure
wireless network.

More Related Content

What's hot

Juniper sa-sslvpn
Juniper sa-sslvpnJuniper sa-sslvpn
MAC Randomization
MAC RandomizationMAC Randomization
MAC Randomization
Hughes Systique Corporation
 
Wi-Fi Offload Authentication & Security through EAP based approach - White P...
 Wi-Fi Offload Authentication & Security through EAP based approach - White P... Wi-Fi Offload Authentication & Security through EAP based approach - White P...
Wi-Fi Offload Authentication & Security through EAP based approach - White P...
Green Packet
 
5G: The Evolution and Tech Trends Today
5G: The Evolution and Tech Trends Today5G: The Evolution and Tech Trends Today
5G: The Evolution and Tech Trends Today
Hughes Systique Corporation
 
Wireless network appliance solution by sirena cheng 20140508
Wireless network appliance solution by sirena cheng 20140508Wireless network appliance solution by sirena cheng 20140508
Wireless network appliance solution by sirena cheng 20140508
Sirena Cheng
 
WiFi 6 - Usher in the Era of Next-Generation Connectivity
WiFi 6 - Usher in the Era of Next-Generation ConnectivityWiFi 6 - Usher in the Era of Next-Generation Connectivity
WiFi 6 - Usher in the Era of Next-Generation Connectivity
Hughes Systique Corporation
 
WiFi-integration into EPC
WiFi-integration into EPCWiFi-integration into EPC
WiFi-integration into EPC
Franz Edler
 
Wdsi 3G Wi Fi Data Offloading Dashboard Features
Wdsi 3G Wi Fi Data Offloading Dashboard FeaturesWdsi 3G Wi Fi Data Offloading Dashboard Features
Wdsi 3G Wi Fi Data Offloading Dashboard Features
Andy Coney
 
Presentation on Vowifi
Presentation on VowifiPresentation on Vowifi
Presentation on Vowifi
srishti jain
 
Tema Hassan - Xantaro Service Integration
Tema Hassan - Xantaro Service IntegrationTema Hassan - Xantaro Service Integration
Tema Hassan - Xantaro Service Integration
Independent Networks Co-operative Association
 
Frost & Sullivan Global Mobile VPN Products Market
Frost & Sullivan Global Mobile VPN Products MarketFrost & Sullivan Global Mobile VPN Products Market
Frost & Sullivan Global Mobile VPN Products Market
NetMotion Wireless
 
Firetide Mesh Node Mobility Overview
Firetide Mesh Node Mobility OverviewFiretide Mesh Node Mobility Overview
Firetide Mesh Node Mobility Overview
Paul Richards
 
Service Provider Wi-Fi
Service Provider Wi-FiService Provider Wi-Fi
Service Provider Wi-Fi
Cisco Canada
 
Monetizing 4G LTE : How we make money out of LTE
Monetizing 4G LTE : How we make money out of LTEMonetizing 4G LTE : How we make money out of LTE
Monetizing 4G LTE : How we make money out of LTE
Bangladesh Network Operators Group
 
What is IFOM and seamless Wi-Fi offloading?
What is IFOM and seamless Wi-Fi offloading?What is IFOM and seamless Wi-Fi offloading?
What is IFOM and seamless Wi-Fi offloading?
Pranav Desai
 
5 Emerging Innovations In Carrier WiFi
5 Emerging Innovations In Carrier WiFi5 Emerging Innovations In Carrier WiFi
5 Emerging Innovations In Carrier WiFi
Alepo
 
Carrier WiFi Architectures
Carrier WiFi ArchitecturesCarrier WiFi Architectures
Carrier WiFi Architectures
Marc Nader
 
Alepo 5 Emerging Innovations Carrier-WiFi
Alepo 5 Emerging Innovations Carrier-WiFiAlepo 5 Emerging Innovations Carrier-WiFi
Alepo 5 Emerging Innovations Carrier-WiFi
Peerasak C.
 
4G LTE Device Management for Accelerated Wireless Broadband
 4G LTE Device Management for Accelerated Wireless Broadband 4G LTE Device Management for Accelerated Wireless Broadband
4G LTE Device Management for Accelerated Wireless Broadband
Friendly Technologies
 
Understanding Wi-Fi offload
Understanding Wi-Fi offloadUnderstanding Wi-Fi offload
Understanding Wi-Fi offload
Kenan Masic
 

What's hot (20)

Juniper sa-sslvpn
Juniper sa-sslvpnJuniper sa-sslvpn
Juniper sa-sslvpn
 
MAC Randomization
MAC RandomizationMAC Randomization
MAC Randomization
 
Wi-Fi Offload Authentication & Security through EAP based approach - White P...
 Wi-Fi Offload Authentication & Security through EAP based approach - White P... Wi-Fi Offload Authentication & Security through EAP based approach - White P...
Wi-Fi Offload Authentication & Security through EAP based approach - White P...
 
5G: The Evolution and Tech Trends Today
5G: The Evolution and Tech Trends Today5G: The Evolution and Tech Trends Today
5G: The Evolution and Tech Trends Today
 
Wireless network appliance solution by sirena cheng 20140508
Wireless network appliance solution by sirena cheng 20140508Wireless network appliance solution by sirena cheng 20140508
Wireless network appliance solution by sirena cheng 20140508
 
WiFi 6 - Usher in the Era of Next-Generation Connectivity
WiFi 6 - Usher in the Era of Next-Generation ConnectivityWiFi 6 - Usher in the Era of Next-Generation Connectivity
WiFi 6 - Usher in the Era of Next-Generation Connectivity
 
WiFi-integration into EPC
WiFi-integration into EPCWiFi-integration into EPC
WiFi-integration into EPC
 
Wdsi 3G Wi Fi Data Offloading Dashboard Features
Wdsi 3G Wi Fi Data Offloading Dashboard FeaturesWdsi 3G Wi Fi Data Offloading Dashboard Features
Wdsi 3G Wi Fi Data Offloading Dashboard Features
 
Presentation on Vowifi
Presentation on VowifiPresentation on Vowifi
Presentation on Vowifi
 
Tema Hassan - Xantaro Service Integration
Tema Hassan - Xantaro Service IntegrationTema Hassan - Xantaro Service Integration
Tema Hassan - Xantaro Service Integration
 
Frost & Sullivan Global Mobile VPN Products Market
Frost & Sullivan Global Mobile VPN Products MarketFrost & Sullivan Global Mobile VPN Products Market
Frost & Sullivan Global Mobile VPN Products Market
 
Firetide Mesh Node Mobility Overview
Firetide Mesh Node Mobility OverviewFiretide Mesh Node Mobility Overview
Firetide Mesh Node Mobility Overview
 
Service Provider Wi-Fi
Service Provider Wi-FiService Provider Wi-Fi
Service Provider Wi-Fi
 
Monetizing 4G LTE : How we make money out of LTE
Monetizing 4G LTE : How we make money out of LTEMonetizing 4G LTE : How we make money out of LTE
Monetizing 4G LTE : How we make money out of LTE
 
What is IFOM and seamless Wi-Fi offloading?
What is IFOM and seamless Wi-Fi offloading?What is IFOM and seamless Wi-Fi offloading?
What is IFOM and seamless Wi-Fi offloading?
 
5 Emerging Innovations In Carrier WiFi
5 Emerging Innovations In Carrier WiFi5 Emerging Innovations In Carrier WiFi
5 Emerging Innovations In Carrier WiFi
 
Carrier WiFi Architectures
Carrier WiFi ArchitecturesCarrier WiFi Architectures
Carrier WiFi Architectures
 
Alepo 5 Emerging Innovations Carrier-WiFi
Alepo 5 Emerging Innovations Carrier-WiFiAlepo 5 Emerging Innovations Carrier-WiFi
Alepo 5 Emerging Innovations Carrier-WiFi
 
4G LTE Device Management for Accelerated Wireless Broadband
 4G LTE Device Management for Accelerated Wireless Broadband 4G LTE Device Management for Accelerated Wireless Broadband
4G LTE Device Management for Accelerated Wireless Broadband
 
Understanding Wi-Fi offload
Understanding Wi-Fi offloadUnderstanding Wi-Fi offload
Understanding Wi-Fi offload
 

Similar to A Secure & Reliable Wi-Fi Experience at The Federal Court of Malaysia

Wifi offload-through-eap-authentication
Wifi offload-through-eap-authenticationWifi offload-through-eap-authentication
Wifi offload-through-eap-authentication
Justus @GreenPacket
 
Review of Wi-Fi Offloads in LTE Network
Review of Wi-Fi Offloads in LTE NetworkReview of Wi-Fi Offloads in LTE Network
Review of Wi-Fi Offloads in LTE Network
ijsrd.com
 
The definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networksThe definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networks
Aerohive Networks
 
Wi-Fi & Smart E-learning Experience at SOA University
Wi-Fi & Smart E-learning Experience at SOA UniversityWi-Fi & Smart E-learning Experience at SOA University
Wi-Fi & Smart E-learning Experience at SOA University
4ipnet
 
Riaz Rahman (072878056)
Riaz Rahman (072878056)Riaz Rahman (072878056)
Riaz Rahman (072878056)
mashiur
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overview
Stef Coetzee
 
Ap8200 pb
Ap8200 pbAp8200 pb
Wp passpoint wi-fi
Wp passpoint wi-fiWp passpoint wi-fi
Wp passpoint wi-fi
Samuel K. Itotia
 
Network Rightsizing Best Practices Guide
Network Rightsizing Best Practices GuideNetwork Rightsizing Best Practices Guide
Network Rightsizing Best Practices Guide
Aruba, a Hewlett Packard Enterprise company
 
Ruckus wp wifi-into-core
Ruckus wp wifi-into-coreRuckus wp wifi-into-core
Ruckus wp wifi-into-core
warchitect
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by Meraki
Rowell Dionicio
 
Next Generation Wi-Fi at the Valencia Conference Centre
Next Generation Wi-Fi at the Valencia Conference CentreNext Generation Wi-Fi at the Valencia Conference Centre
Next Generation Wi-Fi at the Valencia Conference Centre
4ipnet
 
Public Internet WAN
Public Internet WANPublic Internet WAN
Public Internet WAN
Claudio Bolla, CISM
 
EGLA Licensing and Stadson Technologies
EGLA Licensing and Stadson Technologies EGLA Licensing and Stadson Technologies
EGLA Licensing and Stadson Technologies
Dr. Edwin Hernandez
 
Wi-Fi -3GPP LTE in HetNets
Wi-Fi -3GPP LTE in HetNetsWi-Fi -3GPP LTE in HetNets
Wi fi - 3 gpp hetnet - internal v.2a
Wi fi - 3 gpp hetnet -  internal v.2aWi fi - 3 gpp hetnet -  internal v.2a
Wi fi - 3 gpp hetnet - internal v.2a
Dennis J. Savoie PMP* - AVS - 6σ Yellow Belt
 
Aruba networks webinar_wi-fi_without_interruption_sep20_2012
Aruba networks webinar_wi-fi_without_interruption_sep20_2012Aruba networks webinar_wi-fi_without_interruption_sep20_2012
Aruba networks webinar_wi-fi_without_interruption_sep20_2012
Aruba, a Hewlett Packard Enterprise company
 
Software Based Traffic Separation at the Access Layer
Software Based Traffic Separation at the Access LayerSoftware Based Traffic Separation at the Access Layer
Software Based Traffic Separation at the Access Layer
IJERA Editor
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager Networks
NTS UK - Part of Capita
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
Sergiy Pitel
 

Similar to A Secure & Reliable Wi-Fi Experience at The Federal Court of Malaysia (20)

Wifi offload-through-eap-authentication
Wifi offload-through-eap-authenticationWifi offload-through-eap-authentication
Wifi offload-through-eap-authentication
 
Review of Wi-Fi Offloads in LTE Network
Review of Wi-Fi Offloads in LTE NetworkReview of Wi-Fi Offloads in LTE Network
Review of Wi-Fi Offloads in LTE Network
 
The definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networksThe definitive guide for evaluating enterprise WLAN networks
The definitive guide for evaluating enterprise WLAN networks
 
Wi-Fi & Smart E-learning Experience at SOA University
Wi-Fi & Smart E-learning Experience at SOA UniversityWi-Fi & Smart E-learning Experience at SOA University
Wi-Fi & Smart E-learning Experience at SOA University
 
Riaz Rahman (072878056)
Riaz Rahman (072878056)Riaz Rahman (072878056)
Riaz Rahman (072878056)
 
Net motion mobility_intro_overview
Net motion mobility_intro_overviewNet motion mobility_intro_overview
Net motion mobility_intro_overview
 
Ap8200 pb
Ap8200 pbAp8200 pb
Ap8200 pb
 
Wp passpoint wi-fi
Wp passpoint wi-fiWp passpoint wi-fi
Wp passpoint wi-fi
 
Network Rightsizing Best Practices Guide
Network Rightsizing Best Practices GuideNetwork Rightsizing Best Practices Guide
Network Rightsizing Best Practices Guide
 
Ruckus wp wifi-into-core
Ruckus wp wifi-into-coreRuckus wp wifi-into-core
Ruckus wp wifi-into-core
 
Cisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by MerakiCisco's Cloud Networking Powered by Meraki
Cisco's Cloud Networking Powered by Meraki
 
Next Generation Wi-Fi at the Valencia Conference Centre
Next Generation Wi-Fi at the Valencia Conference CentreNext Generation Wi-Fi at the Valencia Conference Centre
Next Generation Wi-Fi at the Valencia Conference Centre
 
Public Internet WAN
Public Internet WANPublic Internet WAN
Public Internet WAN
 
EGLA Licensing and Stadson Technologies
EGLA Licensing and Stadson Technologies EGLA Licensing and Stadson Technologies
EGLA Licensing and Stadson Technologies
 
Wi-Fi -3GPP LTE in HetNets
Wi-Fi -3GPP LTE in HetNetsWi-Fi -3GPP LTE in HetNets
Wi-Fi -3GPP LTE in HetNets
 
Wi fi - 3 gpp hetnet - internal v.2a
Wi fi - 3 gpp hetnet -  internal v.2aWi fi - 3 gpp hetnet -  internal v.2a
Wi fi - 3 gpp hetnet - internal v.2a
 
Aruba networks webinar_wi-fi_without_interruption_sep20_2012
Aruba networks webinar_wi-fi_without_interruption_sep20_2012Aruba networks webinar_wi-fi_without_interruption_sep20_2012
Aruba networks webinar_wi-fi_without_interruption_sep20_2012
 
Software Based Traffic Separation at the Access Layer
Software Based Traffic Separation at the Access LayerSoftware Based Traffic Separation at the Access Layer
Software Based Traffic Separation at the Access Layer
 
Cisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager NetworksCisco Meraki Overview | Voyager Networks
Cisco Meraki Overview | Voyager Networks
 
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
cisco-20meraki-20overview-20-285-29-140501114803-phpapp01
 

Recently uploaded

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 

Recently uploaded (20)

TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 

A Secure & Reliable Wi-Fi Experience at The Federal Court of Malaysia

  • 1. OVERVIEW SOLUTION REQUIREMENTS BENEFITS Copyright © 2015, 4ipnet, Inc. All rights reserved. All other trademarks mentioned are the property of their respective owners. ENTERPRISE CASE STUDY The Federal Court of Malaysia is the highest court in the country. It is located in the Palace of Justice in the federal administrative capital of Putrajaya and was established in 1957, during Malaysia’s independence. • Role-based access control and policy enforcement offers effective management of privileges for different user groups • Service Zone function partitions a physical network into up to 9 virtual networks, each with its own definable access control and group policy profiles • Diverse user authentication methods, including built-in Local and On-demand account databases The following were deployed across the Federal Court of Malaysia properties: • WHG405 Wireless LAN Controller • EAP110 Wireless Access Point • EAP757 Wireless Access Point • Differentiated services and policy enforcement for users based on roles • Centralized AP management for easily monitoring the status of distributed APs • Seamless and fast roaming between individual access points to ensure uninterrupted Wi-Fi experience in high- density environment • Vendor-agnostic equipment to be integrated with existing network infrastructure A SECURE & RELIABLE WIFI EXPERIENCE AT THE FEDERAL COURT OF MALAYSIA The Federal Court of Malaysia, located in the Palace of Justice in Putrajaya, is the highest court in the country. Established during Malaysia’s independence in 1957, it originally served as the Court of Judicature of Prince of Wales' Island and received its present name in 1994. With the recent advances in communication technology and soaring usage of mobile devices, there is now a stronger demand than ever for stable and ubiquitous Wi-Fi access. This phenomenon led the Federal Court to acknowledge that its wireless network infrastructure needed to be expanded and upgraded. There were several challenges that the Federal Court faced when it came to providing a reliable and secure Wi-Fi. Firstly, given that the Federal Court could have many users online at any moment, each with multiple devices, the WLAN infrastructure needed to be robust and able to operate steadily in a high-density environment. Secondly, the Federal Court wished to provide differentiated access privileges for staffs and visitors to ensure the security of sensitive data. Lastly, since the existing wireless network contained APs from several different vendors, along with the fact that the Federal Court did not wish to overhaul the entire infrastructure, the new Wi-Fi solution needed to be vendor-agnostic. After thoroughly evaluating several competing solutions, the Federal Court decided that 4ipnet’s proposed solution, which consisted of the WHG405 Wireless LAN Controller and EAP110/EAP757 Wireless Access Points, was their best option. The WHG405 provided centralized management for up to 150 APs, and enabled browser-based user authentication for users to easily login to Wi-Fi. Once users were logged in, administrators were then able to enforce firewall rules and bandwidth limitations through the WHG405’s role-based policy feature. Additionally, in the event of illegal Internet activities, detailed usage logs like HTTP Web Log and NAT Conversion Log helped the IT staff quickly trace the source of the activity. These user management and logging features helped created a secure and reliable Wi-Fi environment for every user and device in the Federal Court. In addition to the controller, the EAP access points also played a significant role in maintaining a high performance wireless network. With the comprehensive performance and security features such as VLAN tagging and Layer 2 Firewall, the Federal Court was able to segregate network traffic and limit broadcast domains, and prevent unnecessary packets from being transmitted onto the wireless medium. The most significant benefit came from integrating the access points with the controller, giving the Federal Court a total solution for AP management, user access control, and network traffic monitoring. In conclusion, 4ipnet’s WLAN solution surpassed the Federal Court's expectations. From network services to user monitoring and AP management, 4ipnet's features helped simplify the workload of network administrators and guarantee a stable and secure wireless network.