SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Bring Your Own Design
SIMPLIFYING BYOD WITH RUCKUS




                     RUCKUS WIRELESS PROPRIETARY AND CONFIDENTIAL
The Realities of BYOD




2 | Meeting Name
What Enterprises REALLY Want

                   1   Simple onboarding

                   2   Automated enforcement of user policies

                   3   Visibility of who and what is on the WLAN

                   4   Extension of wired security to WLAN

                   5   More capacity to deal with flood of devices

                   6   Leverage existing infrastructure


3 | Meeting Name
Don’t Reinvent the Wheel




            FIREWALLS   CONTENT      AAA     ACLs / VLANS
                         FILTERS   SERVERS




4 | Meeting Name
Now What?
SIMPLIFYING BYOD WITH RUCKUS




                  RUCKUS WIRELESS PROPRIETARY AND CONFIDENTIAL
Defining the SSID Structure

        ▪ DOMAIN SSID
            ▪ School owned / managed devices with access to all resources:
              printers, applications, files shares

        ▪ Guest Visitor SSID
            ▪ Users who are not in the OUI with access only to the internet
        ▪ Staff and Student BYOD SSID
            ▪ Non-school owned / managed devices needing Internet access and
              specified school resources, VLAN and content filtering applied
        ▪ Provisioning SSID
            ▪ Hotspot with a walled garden attribute, redirecting all users to
              an activation page



6 | Meeting Name
Automating Role-Based Access

                   DOMAIN   Administrator automatically placed on VLAN W, no rate limits



                   GUEST
                            Allowed on via a Guest Pass, accepting terms and conditions
                            automatically placed on VLAN Z, rate limited at 1 Mbps


                    STAFF   Staff automatically placed on VLAN X, rate limited at 5 Mbps



              STUDENT       Student automatically placed on VLAN Y, rate limited at 1 Mbps



            STRANGER        User does NOT have account and is denied




7 | Meeting Name
How to BYOD with Ruckus

         1         Unknown device associates with provisioning SSID

         2         User challenged to authenticate

         3         ZD queries LDAP (AAA domain)

         4         User placed into requisite role based on security
                   group membership, VLAN dynamically assigned

         5         Unique dynamic PSK automatically
                   generated, bound with device and pushed to client

         6         Policies applied per role and VLAN membership


8 | Meeting Name
What it Looks Like                                                            WHAT HAPPENS WHEN?

                          User           Student          Staff            Guest
                        Database        Resources       Resources        Resources   1. Users connect to a
                                                                                        provisioning SSID and are
                                                                                        re-directed to an
                                                                         Internet       onboarding portal.

                                                                                     2. Users enter domain
                                                                                        credentials which are
                                                                                        verified against a user
                                                                                        database.

                                                                                     3. The user’s role assignment
                                                                                        and permissions are
                                                                                        automatically determined
                                                                                        based on authentcaion.

                                                                                     4. Using Zero-IT, the device is
                                                                      Guest SSID        auto-provisioned with a
                        Onboarding
                          SSID
                                         Student SSID    Staff SSID    (hotspot)        dynamic pre-shared key
                                                                                        and dynamically assigned
                                                                                        to the requisite WLAN.
                                                                                     5. Devices re-connect on a
                                                                                        secure WLAN, receiving
                                                                                        network permissions
              Student           Staff                                     Guest
                                                                                        according to their role.

               New BYOD Devices           Provisioned BYOD                 Guest


9 | Meeting Name
Key Technologies
SIMPLIFYING BYOD WITH RUCKUS




                  RUCKUS WIRELESS PROPRIETARY AND CONFIDENTIAL
Zero IT Automates Onboarding
       ▪ Requirement:
          automatic, secure
          authentication and
          roaming
       ▪ Enabled by SSID and
         authorization protocol
         configuration
       ▪ Easy-to-use Ruckus         Invitation         Branded             „One-Click‟
         approach to push                              Landing            Configuration
         configuration                                  Page

       ▪ Uses mobile OS auto-
                                                              Automatic
         detect and -authenticate                Authentication Enabled
         features, not a separate
         connection manager app

11 | Meeting Name
D-PSK Automates Security/Config




                          ZD applies role,      LDAP sends
                         generates D-PSK        user security
                        pushes dissolvable    group information
                        PROV file to device        to ZD




                        WLAN profile configured
                        device, and on the WLAN
                        based on allowed by role.



12 | Meeting Name
Client Fingerprinting
                                                       Hostname: dstiff‟s iPhone
                                                       MAC: 50:ea:d6:7c:30:e4
           Device-Specific Policy Enforcement

       ▪ Visibility “Who‟s device is this?”
       ▪ Self-registration
          ▪ Automatically registers and maintains
            client info on WLAN and Wired interfaces
              ▪ Operating System
              ▪ Operating System Hostname
       ▪ Control by device type
          ▪ Permit/allow
          ▪ Assign to VLAN
          ▪ Rate limit (Down/Up)
       ▪ Management
          ▪ WLAN controller or standalone
              ▪ WLAN dashboard
              ▪ Client monitor
              ▪ Client details

13 | Meeting Name

Weitere ähnliche Inhalte

Was ist angesagt?

Ds tz series_us_10_april10
Ds tz series_us_10_april10Ds tz series_us_10_april10
Ds tz series_us_10_april10
Yustinus Malawau
 
2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a
alwayson
 
Java Everywhere. Descubra la Internet de las Cosas
Java Everywhere. Descubra la Internet de las Cosas Java Everywhere. Descubra la Internet de las Cosas
Java Everywhere. Descubra la Internet de las Cosas
GeneXus
 
Lecture2 network attack
Lecture2 network attackLecture2 network attack
Lecture2 network attack
rajakhurram
 
Regulatory compliant cloud computing rethinking web application architectures...
Regulatory compliant cloud computing rethinking web application architectures...Regulatory compliant cloud computing rethinking web application architectures...
Regulatory compliant cloud computing rethinking web application architectures...
Khazret Sapenov
 

Was ist angesagt? (13)

802.11w Tutorial
802.11w Tutorial802.11w Tutorial
802.11w Tutorial
 
Goingwimax.Com Demystifying Wi Max Public Key Infrastructure Pki For Operator...
Goingwimax.Com Demystifying Wi Max Public Key Infrastructure Pki For Operator...Goingwimax.Com Demystifying Wi Max Public Key Infrastructure Pki For Operator...
Goingwimax.Com Demystifying Wi Max Public Key Infrastructure Pki For Operator...
 
Ap6532 spec sheet
Ap6532 spec sheetAp6532 spec sheet
Ap6532 spec sheet
 
Ds tz series_us_10_april10
Ds tz series_us_10_april10Ds tz series_us_10_april10
Ds tz series_us_10_april10
 
2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a2p Mta Data Sheet V1.7 X1a
2p Mta Data Sheet V1.7 X1a
 
[SOS 2009] D-Link: Red Segura L2 L3
[SOS 2009] D-Link: Red Segura L2 L3[SOS 2009] D-Link: Red Segura L2 L3
[SOS 2009] D-Link: Red Segura L2 L3
 
Java Everywhere. Descubra la Internet de las Cosas
Java Everywhere. Descubra la Internet de las Cosas Java Everywhere. Descubra la Internet de las Cosas
Java Everywhere. Descubra la Internet de las Cosas
 
JavaOne Keynote: Programmable Networking is SFW
JavaOne Keynote: Programmable Networking is SFWJavaOne Keynote: Programmable Networking is SFW
JavaOne Keynote: Programmable Networking is SFW
 
Lecture2 network attack
Lecture2 network attackLecture2 network attack
Lecture2 network attack
 
Nx9000 spec sheet
Nx9000 spec sheetNx9000 spec sheet
Nx9000 spec sheet
 
Regulatory compliant cloud computing rethinking web application architectures...
Regulatory compliant cloud computing rethinking web application architectures...Regulatory compliant cloud computing rethinking web application architectures...
Regulatory compliant cloud computing rethinking web application architectures...
 
Sonic wall tz series
Sonic wall tz seriesSonic wall tz series
Sonic wall tz series
 
Data Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information PresentationData Securities Corporate Technology Information Presentation
Data Securities Corporate Technology Information Presentation
 

Andere mochten auch

802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
Savvius, Inc
 
Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)
Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)
Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)
Alphorm
 

Andere mochten auch (16)

PACE-IT: Troubleshooting Wireless Networks (part 1)
PACE-IT: Troubleshooting Wireless Networks (part 1)PACE-IT: Troubleshooting Wireless Networks (part 1)
PACE-IT: Troubleshooting Wireless Networks (part 1)
 
PACE-IT: Troubleshooting Wireless Networks (part 2)
PACE-IT: Troubleshooting Wireless Networks (part 2)PACE-IT: Troubleshooting Wireless Networks (part 2)
PACE-IT: Troubleshooting Wireless Networks (part 2)
 
Pace IT - Troubleshooting Wireless Networks
Pace IT - Troubleshooting Wireless NetworksPace IT - Troubleshooting Wireless Networks
Pace IT - Troubleshooting Wireless Networks
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
802.11ac - Wireless Gigabit Speeds Driving Changes in Wireless Analysis
 
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
PACE-IT, Security + 5.2: Authentication and Authorization Basics (part 2)
 
Brocade PartnerWebinar: Network Edge キャンパス・スイッチ新製品&新機能、および有線&無線統合ソリューションアップデー...
Brocade PartnerWebinar: Network Edge キャンパス・スイッチ新製品&新機能、および有線&無線統合ソリューションアップデー...Brocade PartnerWebinar: Network Edge キャンパス・スイッチ新製品&新機能、および有線&無線統合ソリューションアップデー...
Brocade PartnerWebinar: Network Edge キャンパス・スイッチ新製品&新機能、および有線&無線統合ソリューションアップデー...
 
Introduction to Ruckus Carrier Solutions
Introduction to Ruckus Carrier SolutionsIntroduction to Ruckus Carrier Solutions
Introduction to Ruckus Carrier Solutions
 
Iuwne10 S06 L01
Iuwne10 S06 L01Iuwne10 S06 L01
Iuwne10 S06 L01
 
A Conversation About Location - With Ruckus Wireless Smart Positioning Techno...
A Conversation About Location - With Ruckus Wireless Smart Positioning Techno...A Conversation About Location - With Ruckus Wireless Smart Positioning Techno...
A Conversation About Location - With Ruckus Wireless Smart Positioning Techno...
 
Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)
Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)
Alphorm.com Support de la Formation Cisco CCNP SWITCH (examen 300-115)
 
Alphorm.com Formation Cisco ICND2
Alphorm.com Formation Cisco ICND2Alphorm.com Formation Cisco ICND2
Alphorm.com Formation Cisco ICND2
 
Troubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized ControllersTroubleshooting Wireless LANs with Centralized Controllers
Troubleshooting Wireless LANs with Centralized Controllers
 
Informar Sobre la Renuncia de un Auditor Fiscal
Informar Sobre la Renuncia de un Auditor FiscalInformar Sobre la Renuncia de un Auditor Fiscal
Informar Sobre la Renuncia de un Auditor Fiscal
 
Avaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBaseAvaya VoIP on Cisco Best Practices by PacketBase
Avaya VoIP on Cisco Best Practices by PacketBase
 
Cisco Case Analysis
Cisco Case AnalysisCisco Case Analysis
Cisco Case Analysis
 

Ähnlich wie BYOD - Ruckus way. Right way.

Daniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDaniel künzli cloudgateway.next
Daniel künzli cloudgateway.next
Digicomp Academy AG
 
Vfm security with aruba wireless
Vfm security with aruba wirelessVfm security with aruba wireless
Vfm security with aruba wireless
vfmindia
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environment
Ramesh Nagappan
 
Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise Insights
Courtland Smith
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
Nick Owen
 
Introducing DirectReader
Introducing DirectReaderIntroducing DirectReader
Introducing DirectReader
DirectReader
 

Ähnlich wie BYOD - Ruckus way. Right way. (20)

Cisco Study: State of Web Security
Cisco Study: State of Web Security Cisco Study: State of Web Security
Cisco Study: State of Web Security
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
 
Juniper Enterprise Guest Access
Juniper Enterprise Guest AccessJuniper Enterprise Guest Access
Juniper Enterprise Guest Access
 
Daniel künzli cloudgateway.next
Daniel künzli cloudgateway.nextDaniel künzli cloudgateway.next
Daniel künzli cloudgateway.next
 
Vfm security with aruba wireless
Vfm security with aruba wirelessVfm security with aruba wireless
Vfm security with aruba wireless
 
PIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environmentPIV Card based Identity Assurance in Sun Ray and IDM environment
PIV Card based Identity Assurance in Sun Ray and IDM environment
 
BranchOffice Szenarios
BranchOffice SzenariosBranchOffice Szenarios
BranchOffice Szenarios
 
Private cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud securityPrivate cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud security
 
Ct 1 Danielson
Ct 1 DanielsonCt 1 Danielson
Ct 1 Danielson
 
Securing a public cloud infrastructure : Windows Azure
Securing a public cloud infrastructure : Windows AzureSecuring a public cloud infrastructure : Windows Azure
Securing a public cloud infrastructure : Windows Azure
 
Data Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise InsightsData Sheet: OpenDNS Enterprise Insights
Data Sheet: OpenDNS Enterprise Insights
 
Aerohive-GuestManager
Aerohive-GuestManagerAerohive-GuestManager
Aerohive-GuestManager
 
Extending your Data Centre with AWS Sydney Customer Appreciation Day
Extending your Data Centre with AWS Sydney Customer Appreciation DayExtending your Data Centre with AWS Sydney Customer Appreciation Day
Extending your Data Centre with AWS Sydney Customer Appreciation Day
 
Two factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guideTwo factor authentication-in_your_network_e_guide
Two factor authentication-in_your_network_e_guide
 
Workshop: Advanced Federation Use-Cases with PingFederate
Workshop: Advanced Federation Use-Cases with PingFederateWorkshop: Advanced Federation Use-Cases with PingFederate
Workshop: Advanced Federation Use-Cases with PingFederate
 
Ruckus brief customer_Medley
Ruckus brief customer_MedleyRuckus brief customer_Medley
Ruckus brief customer_Medley
 
“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with Everything“Secure Portal” or WebSphere Portal – Security with Everything
“Secure Portal” or WebSphere Portal – Security with Everything
 
Mobilizing Your Enterprise, Why & How?
Mobilizing Your Enterprise, Why & How?Mobilizing Your Enterprise, Why & How?
Mobilizing Your Enterprise, Why & How?
 
Introducing DirectReader
Introducing DirectReaderIntroducing DirectReader
Introducing DirectReader
 
OpSource cloud hosting
OpSource cloud hostingOpSource cloud hosting
OpSource cloud hosting
 

Mehr von Michal Jarski

carnet-wifi-test-results
carnet-wifi-test-resultscarnet-wifi-test-results
carnet-wifi-test-results
Michal Jarski
 

Mehr von Michal Jarski (10)

carnet-wifi-test-results
carnet-wifi-test-resultscarnet-wifi-test-results
carnet-wifi-test-results
 
Location - the new battlefield
Location - the new battlefieldLocation - the new battlefield
Location - the new battlefield
 
How do the 802.11u and HotSpot 2.0 work?
How do the 802.11u and HotSpot 2.0 work?How do the 802.11u and HotSpot 2.0 work?
How do the 802.11u and HotSpot 2.0 work?
 
802.11ac Overview
802.11ac Overview802.11ac Overview
802.11ac Overview
 
Wi fi-stress-test
Wi fi-stress-testWi fi-stress-test
Wi fi-stress-test
 
802.11ac whitepaper
802.11ac whitepaper802.11ac whitepaper
802.11ac whitepaper
 
Rate My Wi-Fi
Rate My Wi-FiRate My Wi-Fi
Rate My Wi-Fi
 
Interworking Wi-Fi and mobile networks
Interworking Wi-Fi and mobile networksInterworking Wi-Fi and mobile networks
Interworking Wi-Fi and mobile networks
 
Adaptive Antennas vs. TxBF
Adaptive Antennas vs. TxBFAdaptive Antennas vs. TxBF
Adaptive Antennas vs. TxBF
 
ZoneFlex 7982 - the best access point ever
ZoneFlex 7982 - the best access point everZoneFlex 7982 - the best access point ever
ZoneFlex 7982 - the best access point ever
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 

BYOD - Ruckus way. Right way.

  • 1. Bring Your Own Design SIMPLIFYING BYOD WITH RUCKUS RUCKUS WIRELESS PROPRIETARY AND CONFIDENTIAL
  • 2. The Realities of BYOD 2 | Meeting Name
  • 3. What Enterprises REALLY Want 1 Simple onboarding 2 Automated enforcement of user policies 3 Visibility of who and what is on the WLAN 4 Extension of wired security to WLAN 5 More capacity to deal with flood of devices 6 Leverage existing infrastructure 3 | Meeting Name
  • 4. Don’t Reinvent the Wheel FIREWALLS CONTENT AAA ACLs / VLANS FILTERS SERVERS 4 | Meeting Name
  • 5. Now What? SIMPLIFYING BYOD WITH RUCKUS RUCKUS WIRELESS PROPRIETARY AND CONFIDENTIAL
  • 6. Defining the SSID Structure ▪ DOMAIN SSID ▪ School owned / managed devices with access to all resources: printers, applications, files shares ▪ Guest Visitor SSID ▪ Users who are not in the OUI with access only to the internet ▪ Staff and Student BYOD SSID ▪ Non-school owned / managed devices needing Internet access and specified school resources, VLAN and content filtering applied ▪ Provisioning SSID ▪ Hotspot with a walled garden attribute, redirecting all users to an activation page 6 | Meeting Name
  • 7. Automating Role-Based Access DOMAIN Administrator automatically placed on VLAN W, no rate limits GUEST Allowed on via a Guest Pass, accepting terms and conditions automatically placed on VLAN Z, rate limited at 1 Mbps STAFF Staff automatically placed on VLAN X, rate limited at 5 Mbps STUDENT Student automatically placed on VLAN Y, rate limited at 1 Mbps STRANGER User does NOT have account and is denied 7 | Meeting Name
  • 8. How to BYOD with Ruckus 1 Unknown device associates with provisioning SSID 2 User challenged to authenticate 3 ZD queries LDAP (AAA domain) 4 User placed into requisite role based on security group membership, VLAN dynamically assigned 5 Unique dynamic PSK automatically generated, bound with device and pushed to client 6 Policies applied per role and VLAN membership 8 | Meeting Name
  • 9. What it Looks Like WHAT HAPPENS WHEN? User Student Staff Guest Database Resources Resources Resources 1. Users connect to a provisioning SSID and are re-directed to an Internet onboarding portal. 2. Users enter domain credentials which are verified against a user database. 3. The user’s role assignment and permissions are automatically determined based on authentcaion. 4. Using Zero-IT, the device is Guest SSID auto-provisioned with a Onboarding SSID Student SSID Staff SSID (hotspot) dynamic pre-shared key and dynamically assigned to the requisite WLAN. 5. Devices re-connect on a secure WLAN, receiving network permissions Student Staff Guest according to their role. New BYOD Devices Provisioned BYOD Guest 9 | Meeting Name
  • 10. Key Technologies SIMPLIFYING BYOD WITH RUCKUS RUCKUS WIRELESS PROPRIETARY AND CONFIDENTIAL
  • 11. Zero IT Automates Onboarding ▪ Requirement: automatic, secure authentication and roaming ▪ Enabled by SSID and authorization protocol configuration ▪ Easy-to-use Ruckus Invitation Branded „One-Click‟ approach to push Landing Configuration configuration Page ▪ Uses mobile OS auto- Automatic detect and -authenticate Authentication Enabled features, not a separate connection manager app 11 | Meeting Name
  • 12. D-PSK Automates Security/Config ZD applies role, LDAP sends generates D-PSK user security pushes dissolvable group information PROV file to device to ZD WLAN profile configured device, and on the WLAN based on allowed by role. 12 | Meeting Name
  • 13. Client Fingerprinting Hostname: dstiff‟s iPhone MAC: 50:ea:d6:7c:30:e4 Device-Specific Policy Enforcement ▪ Visibility “Who‟s device is this?” ▪ Self-registration ▪ Automatically registers and maintains client info on WLAN and Wired interfaces ▪ Operating System ▪ Operating System Hostname ▪ Control by device type ▪ Permit/allow ▪ Assign to VLAN ▪ Rate limit (Down/Up) ▪ Management ▪ WLAN controller or standalone ▪ WLAN dashboard ▪ Client monitor ▪ Client details 13 | Meeting Name

Hinweis der Redaktion

  1. School SSID – easy – the school owns all devices – 100% control – only those devices have access to the resources, anti-virus control, device imaging control, etc., behind the firewallGuest SSID – Also easy – guests have access to only the internet – BYOD SSID – This is where it gets interesting…because you have teachers and students bringing in their own devices – Teachers needing access to specific resources, students needing access to specific resources.
  2. Web
  3. Web