54. BYOD Architecture
Identity and Policy
Identity Profiling
VLAN 10
VLAN 20
Wireless LAN
Controller
DHCP
RADIUS
SNMP
NetFlow
HTTP
DNS
CiscoĀ® ISE
Unified Access
Management
IEEE 802.1x EAP
User Authentication
1
HQ
2:38 p.m.
Profiling to
Identify Device
2
6
Full or Partial Access
Granted
Personal
Asset
Company Asset
3
Posture
of the Device
Policy
Decision
4
5
Enforce Policy in the
Network
Corporate
Resources
Internet Only
Cisco Primeā¢ : Central Network Management
Unified Infrastructure: Wired and Wireless Networks
64. BEFORE
Many Windows, Fragmented View
Siloed Inefficient Operational Model
Repetitive Manual correlation of data
Error Prone Consumes time and resources
Wireless
Identity
Wired
Unified Management
Find and Solve Problems Quickly
65. BEFORE
Many Windows, Fragmented View
AFTER
Comprehensive User
and Access Visibility
Unified
Management
Wireless
Wired
Policy
Simple Find and solve user problems fast
Unified View of all devices by user, across networks
Lower Opex More efficient use of IT resources
Siloed Inefficient Operational Model
Repetitive Manual correlation of data
Error Prone Consumes time and resources
Wireless
Identity
Wired
Unified Management
Find and Solve Problems Quickly
72. Video
Mobility
Conferencing
Desktop PC Mac
On the desk
Full immersion TelePresence
Mobile device
BlackBerry iPhone iPad Android
Presence
Instant Messaging
Mobile softphone
Inside and outside the firewall
One link to join meeting
Call back to join meeting
80. 80
WebEx & TelePresence Integration
Brings in-room meeting experiences to remote users with a single touch
TelePresence User WebEx User
Single touch
to join meeting
and share content
Single click
to join meeting
and view content
and video
94. Take a phased approach to BYOD and evaluate use cases
BYOD and Virtualization
Summary
95. Integrate UC and VDI solutions with collaboration and mobility
Take a phased approach to BYOD and evaluate use cases
BYOD and Virtualization
Summary
96. Integrate UC and VDI solutions with collaboration and mobility
Deliver capabilities to your end users, not point products
Take a phased approach to BYOD and evaluate use cases
BYOD and Virtualization
Summary
100. Shifting the Conversation: Whether to HOW
Applications Team:
ā¢ Which applications should I make available on any device?
ā¢ How do I optimize the performance and delivery of
applications?
Network Engineers:
ā¢ How do I troubleshoot wireless access problems?
ā¢ How do I separate device issues from network and policy issues?
ā¢ How do I ensure user experience?
Security Operations:
ā¢ How do I protect my network and data assets from unauthorized
access, malware, DLP, device loss/theft?
ā¢ How do I implement multiple security policies per user, device,
etc.?
Compliance Operations:
ā¢ How do I ensure corporate legal compliance (SOX, HIPAA,
PCI, etc.)?
Network Operations:
ā¢ What devices are on my networks?
ā¢ Which users are using what devices?
What apps are being accessed?
ā¢ What are the real-time app
performance metrics?
Business & Technical Framework:
ā¢ What are Business drivers for BYOD?
ā¢ How does IT positively impact business goals?
103. Cisco BYOD Service Kit
Accelerate BYOD deployment ā from strategy to pre-production
Gather business and IT
imperatives
Create High Level future state
architecture and use cases
Develop Strategy and
Roadmap document
Assess current state environment
(LAN, WLAN, Security)
Develop recommendations based on
Cisco best practices
Create BYOD Architecture Assessment
report
Develop BYOD solution design with
potential risks identified
LAN, WLAN, ISE, CPI integration design
guidance and recommendation
Create BYOD Architecture
Design document
Deploy solution in pre-
production environment
Validate use cases in scope
As-built solution knowledge
transfer
BYOD
Service
Kit