Cisco Cisco Catalyst 6000 Multilayer Switch Feature Card MSFC2 White Paper
© 2006 Cisco Systems, Inc. All rights reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com.
Page 6 of 9
Based on these different levels of presence, the system can combine presence and location information to improve the effectiveness of call routing.
In a time-conscious environment, this added capability decreases the time needed for patients to receive the level of care they need.
Voice Services
By integrating their voice, data, and wireless networks, enterprises can extend the capability of the existing premises-based telephony system to add
support for wireless telephony. The telephony system recognizes Wi-Fi handsets in the same way that it recognizes traditional desktop phones. This
allows users to be mobile while making and receiving calls, improving productivity by reducing voicemail exchanges and expanding the reach of the
premises-based telephony system.
A voice-over-WLAN system that is integrated with the wired network has the added benefit of allowing a single control point to guarantee the
quality of the call, irrespective of the transport over which the call is carried. This tightly integrated infrastructure allows the call to roam across
different network subnets, while facilitating roaming between wired and wireless networks. To illustrate this, consider the example of a global sales
manager who is on his way from the conference room back to his office when he receives a call from a client who is on the verge of completing a
very large business transaction. The IP communications system recognizes that the sales manager is not at his desk and automatically routes the call
to his voice-over-wireless phone. The sales manager accepts the call while walking back to his office. After he arrives, he can transparently transfer
the call to his desk phone, freeing his hands to access the information on his computer to complete the transaction.
Security Services
Business and IT executives can have increased confidence when dealing with network security because of the unification of wired and wireless
networks. A unified network allows security policies to be extended uniformly across the entire network. No longer isolated, each network has
visibility into what is happening around it and can use network intelligence to mitigate risks.
Mobility and wireless technologies make traditional perimeter-based security insufficient. The dramatic increase in the number of mobile devices
that roam across private and public networks has emphasized the need to apply security from the client device and resource levels. The Cisco
Unified Wireless Network is integrated with the Cisco Self-Defending Network to help ensure that each client is managed for secure, clean access
to the network.
Cisco recognizes the important role that a secure client plays in maintaining the integrity of the network. The proliferation of mobile clients has
dramatically increased the threat of network compromise from infected or malicious clients. The Cisco Compatible Extensions program, part of the
Cisco Unified Wireless Network, helps ensure that client devices have the security features needed to mitigate the risk of a client-initiated security
breach. The promise of Cisco Compatible Extensions, secure and simple connectivity, is delivered through strict third-party interoperability testing,
resulting in 95 percent of today’s Wi-Fi silicon being Cisco compatible.
Rogue access points present a serious threat to the integrity of the enterprise network. Consider an example in which the network management
system detects a rogue access point. Unfortunately for the enterprise, the detection occurs at 3 a.m., and all network administrators are at home
asleep. Instead of allowing the rogue access point to pass traffic unstopped, the system isolates the traffic. When the network administrators arrive
in the morning, they instruct the network to block the access point traffic at the physical wired port and dispatch someone to physically remove the
threat.