SlideShare a Scribd company logo
IT Professional Wi-Fi Trek 2016
The Evolution Of Guest Access
Ali Youssef CPHIMS PMP CWNE # 133
Sr. Mobility Architect @ Henry Ford Health System
Twitter: Aliyoussef_
Guest Access - The Beginning
• Islands of Wi-Fi coverage
• Autonomous access points
• Best Effort Support
• Limited access point capabilities
• Limited bandwidth and visibility
Guest Access Today
• Ubiquitous reliable connectivity is
expected
• QoE and patient satisfaction can cost you
real dollars.
• Mission critical in some settings
• The name of the game is guest/patient
engagement and collecting useful
analytics
• High priority response
• IT, Marketing, and Security collaboration.
Guest Onboarding Experience
• Guest Access Design heavily dependent on
customer requirements, and desired end
user experience.
• Captive portal with terms and conditions
• Internal, or external
• Sponsored or self registration
• Open Access
• Unique Key/scratch ticket.
• Guest Brochures
Guest Onboarding Example
Internet
Access
Captive Portal
• Branding – Identifying your business
• Key Communications. Driving traffic to
specific sites
• Terms and Conditions – Liability
• Music and Video downloads.
• Multi-lingual Support
• Auto Browser Pop-up
Security Consideration
• Physical and or logical separation from the
enterprise network.
• Protecting guests devices from each other.
• Traffic filtering.
• DNS traffic filtering.
• Stateful packet inspection.
• Port level controls (53, 80, 8080, 443, 21,
22, 23,etc.).
• Layer 7 visibility and control
• Preventing employees from using the guest
network with corporate devices.
Evolution of Design
• In the past the key physical design
components were wireless access points,
controllers, and DMZ / firewall with a robust
internet connection.
• Today guest access design can include
• NAC and automated role provisioning
• Customized splash pages
• End Point Security
• Self Registration
• Scalable DHCP requirement as well as
sophisticated content filtering.
Architecture Overview
BT MPLS
Core Switch
WLAN Controller
@
DMZ inside DMZ outside
Firewall Cluster
Core Switch
BT CE 2
BT CE 1
OfficeNetwork
Guest WLAN traffic
Guest WLAN traffic
CE 2
CE 1
MPLS WLAN Guest
Traffic
MPLS Office Traffic
Rate Limiting
Guest Traffic
BT CE 2BT CE 1
Rate Limiting
Guest Traffic
RF Considerations
• Drawbacks to physical parallel network.
• Ubiquitous vs localized coverage.
• Leveraging a dedicated SSID in the 2.4
GHz band has its pros and cons.
• Role 5 GHz can play for guest access.
• Guest user density
Wild Fire
• Continuous Growth
• Peak of 15K guests on a
given day out of 24K
users
• Capacity planning.
DHCP Considerations
• Scalability. Not unusual to pool VLANs or use larger
networks to accommodate the user load.
• Limiting the Broadcast domain (drop
broadcast/multicast traffic)
• DHCP server on the WLAN Controller vs Dedicated
DHCP server
• Clients can inadvertently and unknowingly use up IP
addresses and take up a lease.
• Appropriate lease times are critical for success.
• Threshold Alerts.
DNS Consideration
• Replicate DNS locally
• Excessive DNS requests appear like DoS
attack.
• Personal vs Corporate licensing
• First line of Defense
Provider Primary DNS Server Secondary DNS Server
Level31 209.244.0.3 209.244.0.4
Verisign2 64.6.64.6 64.6.65.6
Google3 8.8.8.8 8.8.4.4
DNS.WATCH4 84.200.69.80 84.200.70.40
Comodo Secure DNS 8.26.56.26 8.20.247.20
OpenDNS Home5 208.67.222.222 208.67.220.220
DNS Advantage 156.154.70.1 156.154.71.1
Norton ConnectSafe6 199.85.126.10 199.85.127.10
GreenTeamDNS7 81.218.119.11 209.88.198.133
SafeDNS8 195.46.39.39 195.46.39.40
OpenNIC9 162.211.64.20 199.195.249.174
SmartViper 208.76.50.50 208.76.51.51
Dyn 216.146.35.35 216.146.36.36
FreeDNS10 37.235.1.174 37.235.1.177
Alternate DNS11 198.101.242.72 23.253.163.53
Yandex.DNS12 77.88.8.8 77.88.8.1
censurfridns.dk13 91.239.100.100 89.233.43.71
Hurricane Electric14 74.82.42.42
puntCAT15 109.69.8.51
Bluetooth Low Energy
• BLE operates in the 2.4 GHz ISM band.
• Unlike classic Bluetooth, BLE remains in
sleep mode constantly except for when a
connection is initiated. (The actual
connection times are only a few mS)
• Leveraging Beacons for context awareness.
• “Where am I” vs “How Close am I”?
• Battery and smartphone friendly.
• Increased focus on engagement
applications.
*Gartner Hype Cycle
Mobility Strategy
• Mobility encompasses much more than Wi-
Fi
• As the number of RF devices increases so
does the chance and risk of interference.
• Availability and roadmap of spectrum
shapes our mobility strategy including
direction with DAS, LTE-U, Wayfinding,
RTLS, etc. Using DECT is a good example.
• Options for smartphone and tablet indoor
connectivity
• Trend towards Mobility teams.
“Strategy without tactics is the slowest route
to victory.Tactics without strategy is the
noise before defeat.”
-Sun Tsu
Wayfinding
• Indoor Turn by Turn navigation
• Key points of interest
• GPS, BLE, and Wi-Fi Triangulation.
• Guest engagement is the immediate intent
not RTLS.
The Future: End to end engagement
Identity
Time
Proximity
Q & A

More Related Content

What's hot

Fortinet
FortinetFortinet
FortinetABEP123
 
Solo Small Business Gateway
Solo Small Business GatewaySolo Small Business Gateway
Solo Small Business GatewaySOLO Gateway
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...solarisyourep
 
Why choose-3 cx-phone-system
Why choose-3 cx-phone-systemWhy choose-3 cx-phone-system
Why choose-3 cx-phone-systemKarren Alipis
 
Unv banking & finance video surveillance solution v1.00
Unv banking & finance video surveillance solution v1.00Unv banking & finance video surveillance solution v1.00
Unv banking & finance video surveillance solution v1.00Abul Hasnat Sohel
 
VIRTUAL PRIVATE SERVER
VIRTUAL PRIVATE SERVERVIRTUAL PRIVATE SERVER
VIRTUAL PRIVATE SERVERwebhostingguy
 
What’s new in version 5 of AskoziaPBX? - webinar 2016, English
What’s new in version 5 of AskoziaPBX? - webinar 2016, EnglishWhat’s new in version 5 of AskoziaPBX? - webinar 2016, English
What’s new in version 5 of AskoziaPBX? - webinar 2016, EnglishAskozia
 
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)Fatih Ozavci
 
Smart TV. Should Smart TV platform be focus for OTT video & TV products devel...
Smart TV. Should Smart TV platform be focus for OTT video & TV products devel...Smart TV. Should Smart TV platform be focus for OTT video & TV products devel...
Smart TV. Should Smart TV platform be focus for OTT video & TV products devel...Andrey Kholodnyy
 
Mitel MiVoice 5505 Guest IP Phone
Mitel MiVoice 5505 Guest IP PhoneMitel MiVoice 5505 Guest IP Phone
Mitel MiVoice 5505 Guest IP PhoneNorcomLinkedin
 
VoIP Wars: Destroying Jar Jar Lync (Filtered version)
VoIP Wars: Destroying Jar Jar Lync (Filtered version)VoIP Wars: Destroying Jar Jar Lync (Filtered version)
VoIP Wars: Destroying Jar Jar Lync (Filtered version)Fatih Ozavci
 
Solo Telco Gateway
Solo Telco GatewaySolo Telco Gateway
Solo Telco GatewaySOLO Gateway
 
3 Cx Phone System Brochure
3 Cx Phone System Brochure3 Cx Phone System Brochure
3 Cx Phone System Brochurebkreeger
 

What's hot (19)

3CX V15.5
3CX V15.53CX V15.5
3CX V15.5
 
RSA SecurID Access
RSA SecurID AccessRSA SecurID Access
RSA SecurID Access
 
About 3CX
About 3CXAbout 3CX
About 3CX
 
Fortinet
FortinetFortinet
Fortinet
 
Solo Small Business Gateway
Solo Small Business GatewaySolo Small Business Gateway
Solo Small Business Gateway
 
Presentation network design and security for your v mware view deployment w...
Presentation   network design and security for your v mware view deployment w...Presentation   network design and security for your v mware view deployment w...
Presentation network design and security for your v mware view deployment w...
 
Why choose-3 cx-phone-system
Why choose-3 cx-phone-systemWhy choose-3 cx-phone-system
Why choose-3 cx-phone-system
 
Unv banking & finance video surveillance solution v1.00
Unv banking & finance video surveillance solution v1.00Unv banking & finance video surveillance solution v1.00
Unv banking & finance video surveillance solution v1.00
 
VIRTUAL PRIVATE SERVER
VIRTUAL PRIVATE SERVERVIRTUAL PRIVATE SERVER
VIRTUAL PRIVATE SERVER
 
What’s new in version 5 of AskoziaPBX? - webinar 2016, English
What’s new in version 5 of AskoziaPBX? - webinar 2016, EnglishWhat’s new in version 5 of AskoziaPBX? - webinar 2016, English
What’s new in version 5 of AskoziaPBX? - webinar 2016, English
 
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
VoIP Wars: Destroying Jar Jar Lync (Unfiltered version)
 
Smart TV. Should Smart TV platform be focus for OTT video & TV products devel...
Smart TV. Should Smart TV platform be focus for OTT video & TV products devel...Smart TV. Should Smart TV platform be focus for OTT video & TV products devel...
Smart TV. Should Smart TV platform be focus for OTT video & TV products devel...
 
Mitel MiVoice 5505 Guest IP Phone
Mitel MiVoice 5505 Guest IP PhoneMitel MiVoice 5505 Guest IP Phone
Mitel MiVoice 5505 Guest IP Phone
 
FortiWLC
FortiWLC FortiWLC
FortiWLC
 
VoIP Wars: Destroying Jar Jar Lync (Filtered version)
VoIP Wars: Destroying Jar Jar Lync (Filtered version)VoIP Wars: Destroying Jar Jar Lync (Filtered version)
VoIP Wars: Destroying Jar Jar Lync (Filtered version)
 
Solo Telco Gateway
Solo Telco GatewaySolo Telco Gateway
Solo Telco Gateway
 
R4 b4dcmb 5g
R4 b4dcmb 5gR4 b4dcmb 5g
R4 b4dcmb 5g
 
R4 b4ecmb 5g
R4 b4ecmb 5gR4 b4ecmb 5g
R4 b4ecmb 5g
 
3 Cx Phone System Brochure
3 Cx Phone System Brochure3 Cx Phone System Brochure
3 Cx Phone System Brochure
 

Viewers also liked

Presentation my venue app
Presentation my venue appPresentation my venue app
Presentation my venue appmywifi
 
Sustainable engineering - Measures for Sustainability
Sustainable engineering - Measures for SustainabilitySustainable engineering - Measures for Sustainability
Sustainable engineering - Measures for SustainabilityGauri Nair
 
sme_mediapack_corrected2
sme_mediapack_corrected2sme_mediapack_corrected2
sme_mediapack_corrected2Mark Shepherd
 
Abu Saeed_RTT CV
Abu Saeed_RTT CVAbu Saeed_RTT CV
Abu Saeed_RTT CVAbu Saeed
 
Substance Abuse Keweenaw, Michigan
Substance Abuse Keweenaw, MichiganSubstance Abuse Keweenaw, Michigan
Substance Abuse Keweenaw, Michiganrecoveryrestart2
 
Sadie vining finalproject
Sadie vining finalprojectSadie vining finalproject
Sadie vining finalprojectSadie Vining
 
Enbe project 1 presentation
Enbe project 1 presentationEnbe project 1 presentation
Enbe project 1 presentationCrystal Chia
 
8 2 презентация кухни горизонт
8 2 презентация кухни горизонт8 2 презентация кухни горизонт
8 2 презентация кухни горизонтkolesikmixer
 
Substance Abuse Genesee, Michigan
Substance Abuse Genesee, MichiganSubstance Abuse Genesee, Michigan
Substance Abuse Genesee, Michiganrecoveryrestart2
 
Substance Abuse Wayne, Michigan
Substance Abuse Wayne, MichiganSubstance Abuse Wayne, Michigan
Substance Abuse Wayne, Michiganrecoveryrestart2
 
RailsCarma_Presentation_2015
RailsCarma_Presentation_2015RailsCarma_Presentation_2015
RailsCarma_Presentation_2015Taruna Singh
 
SMS ATA SMS Tech
SMS ATA SMS TechSMS ATA SMS Tech
SMS ATA SMS TechPaul Parker
 
Artur Borycki - Beyond Lambda - how to get from logical to physical - code.ta...
Artur Borycki - Beyond Lambda - how to get from logical to physical - code.ta...Artur Borycki - Beyond Lambda - how to get from logical to physical - code.ta...
Artur Borycki - Beyond Lambda - how to get from logical to physical - code.ta...AboutYouGmbH
 
15 презентация камины
15 презентация камины15 презентация камины
15 презентация каминыkolesikmixer
 
Noam Kfir - There is no Java Script - code.talks 2015
Noam Kfir - There is no Java Script - code.talks 2015Noam Kfir - There is no Java Script - code.talks 2015
Noam Kfir - There is no Java Script - code.talks 2015AboutYouGmbH
 

Viewers also liked (20)

Presentation on MME
Presentation on MMEPresentation on MME
Presentation on MME
 
Presentation my venue app
Presentation my venue appPresentation my venue app
Presentation my venue app
 
Sustainable engineering - Measures for Sustainability
Sustainable engineering - Measures for SustainabilitySustainable engineering - Measures for Sustainability
Sustainable engineering - Measures for Sustainability
 
sme_mediapack_corrected2
sme_mediapack_corrected2sme_mediapack_corrected2
sme_mediapack_corrected2
 
Health management presentation
Health management presentationHealth management presentation
Health management presentation
 
sensitisation
sensitisationsensitisation
sensitisation
 
Abu Saeed_RTT CV
Abu Saeed_RTT CVAbu Saeed_RTT CV
Abu Saeed_RTT CV
 
Substance Abuse Keweenaw, Michigan
Substance Abuse Keweenaw, MichiganSubstance Abuse Keweenaw, Michigan
Substance Abuse Keweenaw, Michigan
 
Sadie vining finalproject
Sadie vining finalprojectSadie vining finalproject
Sadie vining finalproject
 
Enbe project 1 presentation
Enbe project 1 presentationEnbe project 1 presentation
Enbe project 1 presentation
 
8 2 презентация кухни горизонт
8 2 презентация кухни горизонт8 2 презентация кухни горизонт
8 2 презентация кухни горизонт
 
que es la filosofía?
que es la filosofía?que es la filosofía?
que es la filosofía?
 
Substance Abuse Genesee, Michigan
Substance Abuse Genesee, MichiganSubstance Abuse Genesee, Michigan
Substance Abuse Genesee, Michigan
 
Substance Abuse Wayne, Michigan
Substance Abuse Wayne, MichiganSubstance Abuse Wayne, Michigan
Substance Abuse Wayne, Michigan
 
RailsCarma_Presentation_2015
RailsCarma_Presentation_2015RailsCarma_Presentation_2015
RailsCarma_Presentation_2015
 
SMS ATA SMS Tech
SMS ATA SMS TechSMS ATA SMS Tech
SMS ATA SMS Tech
 
Artur Borycki - Beyond Lambda - how to get from logical to physical - code.ta...
Artur Borycki - Beyond Lambda - how to get from logical to physical - code.ta...Artur Borycki - Beyond Lambda - how to get from logical to physical - code.ta...
Artur Borycki - Beyond Lambda - how to get from logical to physical - code.ta...
 
15 презентация камины
15 презентация камины15 презентация камины
15 презентация камины
 
Informatica
InformaticaInformatica
Informatica
 
Noam Kfir - There is no Java Script - code.talks 2015
Noam Kfir - There is no Java Script - code.talks 2015Noam Kfir - There is no Java Script - code.talks 2015
Noam Kfir - There is no Java Script - code.talks 2015
 

Similar to CWNP The Evolution Of Guest Access

Zero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeZero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeRebekah Rodriguez
 
FreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBCFreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBCTelcoBridges Inc.
 
FreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBCFreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBCAlan Percy
 
CENTRAL MANAGEMENT OF NETWORK AND CALL SERVICES
CENTRAL MANAGEMENT OF NETWORK AND CALL SERVICESCENTRAL MANAGEMENT OF NETWORK AND CALL SERVICES
CENTRAL MANAGEMENT OF NETWORK AND CALL SERVICESNazmul Hossain Rakib
 
AzureConf 2014 - Azure hybrid connections (Sam Vanhoutte)
AzureConf 2014 - Azure hybrid connections (Sam Vanhoutte)AzureConf 2014 - Azure hybrid connections (Sam Vanhoutte)
AzureConf 2014 - Azure hybrid connections (Sam Vanhoutte)Sam Vanhoutte
 
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Cisco Enterprise Networks
 
NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...
NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...
NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...Nebraska Library Commission
 
PLNOG15 :Scale and Secure the Internet of Things with Intelligent DNS Services
PLNOG15 :Scale and Secure the Internet of Things with Intelligent DNS ServicesPLNOG15 :Scale and Secure the Internet of Things with Intelligent DNS Services
PLNOG15 :Scale and Secure the Internet of Things with Intelligent DNS ServicesPROIDEA
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5 Networks
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5 Networks
 
Barracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileBarracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileAliza Ayub
 
Barracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileBarracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileIqra Hameed
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best PracticesMike Sherwood
 
Private cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austinPrivate cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austinChiradeep Vittal
 
Evolving Architectures for Small Cells in the Enterprise
Evolving Architectures for Small Cells in the EnterpriseEvolving Architectures for Small Cells in the Enterprise
Evolving Architectures for Small Cells in the EnterpriseAndy Odgers
 
The right Wireless Architecture for you
The right Wireless Architecture for youThe right Wireless Architecture for you
The right Wireless Architecture for youCisco Canada
 
S5068 Presentation Live
S5068 Presentation LiveS5068 Presentation Live
S5068 Presentation LiveInsight24
 
FYP%3A+Peer-to-Peer+Communication+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communication+Framework+on+Android+PlatformFYP%3A+Peer-to-Peer+Communication+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communication+Framework+on+Android+PlatformTianwei_liu
 

Similar to CWNP The Evolution Of Guest Access (20)

Zero Trust for Private 5G and Edge
Zero Trust for Private 5G and EdgeZero Trust for Private 5G and Edge
Zero Trust for Private 5G and Edge
 
F5 TMOS v13.0
F5 TMOS v13.0F5 TMOS v13.0
F5 TMOS v13.0
 
FreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBCFreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBC
 
FreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBCFreeSBC - A New Approach to the SBC
FreeSBC - A New Approach to the SBC
 
CENTRAL MANAGEMENT OF NETWORK AND CALL SERVICES
CENTRAL MANAGEMENT OF NETWORK AND CALL SERVICESCENTRAL MANAGEMENT OF NETWORK AND CALL SERVICES
CENTRAL MANAGEMENT OF NETWORK AND CALL SERVICES
 
AzureConf 2014 - Azure hybrid connections (Sam Vanhoutte)
AzureConf 2014 - Azure hybrid connections (Sam Vanhoutte)AzureConf 2014 - Azure hybrid connections (Sam Vanhoutte)
AzureConf 2014 - Azure hybrid connections (Sam Vanhoutte)
 
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
 
NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...
NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...
NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...
 
PLNOG15 :Scale and Secure the Internet of Things with Intelligent DNS Services
PLNOG15 :Scale and Secure the Internet of Things with Intelligent DNS ServicesPLNOG15 :Scale and Secure the Internet of Things with Intelligent DNS Services
PLNOG15 :Scale and Secure the Internet of Things with Intelligent DNS Services
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference Architecture
 
F5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference ArchitectureF5’s VMware Horizon View Reference Architecture
F5’s VMware Horizon View Reference Architecture
 
Barracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileBarracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_Profile
 
Barracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_ProfileBarracuda_NG_Firewall_Profile
Barracuda_NG_Firewall_Profile
 
Network Design and Security Best Practices
Network Design and Security Best PracticesNetwork Design and Security Best Practices
Network Design and Security Best Practices
 
Private cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austinPrivate cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austin
 
Evolving Architectures for Small Cells in the Enterprise
Evolving Architectures for Small Cells in the EnterpriseEvolving Architectures for Small Cells in the Enterprise
Evolving Architectures for Small Cells in the Enterprise
 
The right Wireless Architecture for you
The right Wireless Architecture for youThe right Wireless Architecture for you
The right Wireless Architecture for you
 
S5068 Presentation Live
S5068 Presentation LiveS5068 Presentation Live
S5068 Presentation Live
 
heng+hong
heng+hongheng+hong
heng+hong
 
FYP%3A+Peer-to-Peer+Communication+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communication+Framework+on+Android+PlatformFYP%3A+Peer-to-Peer+Communication+Framework+on+Android+Platform
FYP%3A+Peer-to-Peer+Communication+Framework+on+Android+Platform
 

CWNP The Evolution Of Guest Access

  • 1. IT Professional Wi-Fi Trek 2016 The Evolution Of Guest Access Ali Youssef CPHIMS PMP CWNE # 133 Sr. Mobility Architect @ Henry Ford Health System Twitter: Aliyoussef_
  • 2. Guest Access - The Beginning • Islands of Wi-Fi coverage • Autonomous access points • Best Effort Support • Limited access point capabilities • Limited bandwidth and visibility
  • 3. Guest Access Today • Ubiquitous reliable connectivity is expected • QoE and patient satisfaction can cost you real dollars. • Mission critical in some settings • The name of the game is guest/patient engagement and collecting useful analytics • High priority response • IT, Marketing, and Security collaboration.
  • 4. Guest Onboarding Experience • Guest Access Design heavily dependent on customer requirements, and desired end user experience. • Captive portal with terms and conditions • Internal, or external • Sponsored or self registration • Open Access • Unique Key/scratch ticket. • Guest Brochures
  • 6. Captive Portal • Branding – Identifying your business • Key Communications. Driving traffic to specific sites • Terms and Conditions – Liability • Music and Video downloads. • Multi-lingual Support • Auto Browser Pop-up
  • 7. Security Consideration • Physical and or logical separation from the enterprise network. • Protecting guests devices from each other. • Traffic filtering. • DNS traffic filtering. • Stateful packet inspection. • Port level controls (53, 80, 8080, 443, 21, 22, 23,etc.). • Layer 7 visibility and control • Preventing employees from using the guest network with corporate devices.
  • 8. Evolution of Design • In the past the key physical design components were wireless access points, controllers, and DMZ / firewall with a robust internet connection. • Today guest access design can include • NAC and automated role provisioning • Customized splash pages • End Point Security • Self Registration • Scalable DHCP requirement as well as sophisticated content filtering.
  • 9. Architecture Overview BT MPLS Core Switch WLAN Controller @ DMZ inside DMZ outside Firewall Cluster Core Switch BT CE 2 BT CE 1 OfficeNetwork Guest WLAN traffic Guest WLAN traffic CE 2 CE 1 MPLS WLAN Guest Traffic MPLS Office Traffic Rate Limiting Guest Traffic BT CE 2BT CE 1 Rate Limiting Guest Traffic
  • 10. RF Considerations • Drawbacks to physical parallel network. • Ubiquitous vs localized coverage. • Leveraging a dedicated SSID in the 2.4 GHz band has its pros and cons. • Role 5 GHz can play for guest access. • Guest user density
  • 11. Wild Fire • Continuous Growth • Peak of 15K guests on a given day out of 24K users • Capacity planning.
  • 12. DHCP Considerations • Scalability. Not unusual to pool VLANs or use larger networks to accommodate the user load. • Limiting the Broadcast domain (drop broadcast/multicast traffic) • DHCP server on the WLAN Controller vs Dedicated DHCP server • Clients can inadvertently and unknowingly use up IP addresses and take up a lease. • Appropriate lease times are critical for success. • Threshold Alerts.
  • 13. DNS Consideration • Replicate DNS locally • Excessive DNS requests appear like DoS attack. • Personal vs Corporate licensing • First line of Defense Provider Primary DNS Server Secondary DNS Server Level31 209.244.0.3 209.244.0.4 Verisign2 64.6.64.6 64.6.65.6 Google3 8.8.8.8 8.8.4.4 DNS.WATCH4 84.200.69.80 84.200.70.40 Comodo Secure DNS 8.26.56.26 8.20.247.20 OpenDNS Home5 208.67.222.222 208.67.220.220 DNS Advantage 156.154.70.1 156.154.71.1 Norton ConnectSafe6 199.85.126.10 199.85.127.10 GreenTeamDNS7 81.218.119.11 209.88.198.133 SafeDNS8 195.46.39.39 195.46.39.40 OpenNIC9 162.211.64.20 199.195.249.174 SmartViper 208.76.50.50 208.76.51.51 Dyn 216.146.35.35 216.146.36.36 FreeDNS10 37.235.1.174 37.235.1.177 Alternate DNS11 198.101.242.72 23.253.163.53 Yandex.DNS12 77.88.8.8 77.88.8.1 censurfridns.dk13 91.239.100.100 89.233.43.71 Hurricane Electric14 74.82.42.42 puntCAT15 109.69.8.51
  • 14. Bluetooth Low Energy • BLE operates in the 2.4 GHz ISM band. • Unlike classic Bluetooth, BLE remains in sleep mode constantly except for when a connection is initiated. (The actual connection times are only a few mS) • Leveraging Beacons for context awareness. • “Where am I” vs “How Close am I”? • Battery and smartphone friendly. • Increased focus on engagement applications. *Gartner Hype Cycle
  • 15. Mobility Strategy • Mobility encompasses much more than Wi- Fi • As the number of RF devices increases so does the chance and risk of interference. • Availability and roadmap of spectrum shapes our mobility strategy including direction with DAS, LTE-U, Wayfinding, RTLS, etc. Using DECT is a good example. • Options for smartphone and tablet indoor connectivity • Trend towards Mobility teams. “Strategy without tactics is the slowest route to victory.Tactics without strategy is the noise before defeat.” -Sun Tsu
  • 16. Wayfinding • Indoor Turn by Turn navigation • Key points of interest • GPS, BLE, and Wi-Fi Triangulation. • Guest engagement is the immediate intent not RTLS.
  • 17. The Future: End to end engagement Identity Time Proximity
  • 18. Q & A