Professional Documents
Culture Documents
Soluciones de Control de Acceso Are You Ready?: Guillermo Arroyave CSE Networking
Soluciones de Control de Acceso Are You Ready?: Guillermo Arroyave CSE Networking
Guillermo Arroyave
CSE Networking
garroyaveper@avaya.com
Evolution of a Problem
Multiple
Access Wireless Wired Remote/VPN
Methods
Multiple
Identity MSFT AD Sun, Novell, Oracle RSA Token
Stores
Across multiple
locations, buildings, for
multiple users Auxiliary
Distance Bookstore
Learning Food services
Science Music
Engineering Library
Business Hosted Events
Concerts
Health Athletics
Housing Summer programs
Center
Community
Access
Library
Fitness Center
Guest Users?
What is Network Access Control (NAC)
Ensures consistent and predictable network
access for managed and unmanaged devices
Controls who can use the network to access
which resources, when and where they may do so
Supports any device, any network, any vendor
WITHOUT NAC
Administrator
Each port is pre-assigned
speed, VLAN, filters, etc…
Need Changes?
WITH NAC
Each port is locked down
by default
Port is dynamically
configured at access time
Wireless Local
Personal Corporate Network Network Surveillan Fax Medical
No administrator IP Phone Visitor Access Server/A
Machine Desktop Printer Device ce Camera Machine Device
intervention Point pp
(auto
THE BYOD REVOLUTION
It started
Then
The came
rest here…
this…
is history…
NO
YESyou cannot
bring your bring your iPad
own iPad
NO
YESyou
youcannot connecttooutdoor
are welcome do mobile collaboration
NO
YESyou
youcannot bring your
are welcome fancy
to use laptop
virtual desktop
NO
YESyou
youcannot do video
are welcome toconferencing
use Wifi VOIP
What is BYOD?
Is Your
Company
Network Ready
for BYOD?
BYOD Challenges
14
Guest Access Use Case Scenario
Guest arrives
Security/reception checks identification
and creates a guest access account in
real-time
Guest is given temporary and restricted
access to the network
Guest account is automatically deleted
after authorized duration
15
Conference Room Access Use Case
Scenario
Grant varying levels of network authorization to different user types
using the same resources
Give employees unrestricted network access within a conference
room while giving restricted access to guests in the same room
16
Validated Remote Access Use Case
Scenario
Validate end users’ non corporate assets (e.g., home PC) prior to
allowing them remote access to the network
Prevent high-risk or infected assets from accessing the network
and risking greater infection
18
Healthcare Use Case Scenario
GUILLERMO ARROYAVE
CSE NETWORKING
Email: garroyaveper@avaya.com
22