Руководство По Проектированию для Cisco Cisco Aironet 350 Mini-PCI Wireless LAN Client Adapter
C H A P T E R
10-1
Enterprise Mobility 4.1 Design Guide
OL-14435-01
10
Cisco Unified Wireless Guest Access Services
The introduction of Wireless LAN (WLAN) technologies in the enterprise has changed the way
corporations and small-to-medium businesses function by freeing staff and network resources from the
constraints of fixed network connectivity.
corporations and small-to-medium businesses function by freeing staff and network resources from the
constraints of fixed network connectivity.
WLAN has also changed how individuals access the Internet and their corporate networks from public
locations. The advent of public WLAN (hotspots) has caused mobile workers to become accustomed to
being able to access their corporate network from practically anywhere.
locations. The advent of public WLAN (hotspots) has caused mobile workers to become accustomed to
being able to access their corporate network from practically anywhere.
Introduction
The paradigm of public access has extended to the enterprise itself. Long gone is the scenario where it
was sufficient for a company to provide its partners, visitors, and guests with a place to sit along with
an outside line with which to make phone calls. Our highly mobile, information-on-demand culture
requires on-demand network connectivity. A half-day spent at a partner or customer venue without
access to one’s own network resources can impact the productivity of a meeting, service or sales call,
and reduce the overall personal productivity of an individual who is away from their office. For this
reason, enterprise guest access services are becoming increasingly important and a necessity in the
corporate environment.
was sufficient for a company to provide its partners, visitors, and guests with a place to sit along with
an outside line with which to make phone calls. Our highly mobile, information-on-demand culture
requires on-demand network connectivity. A half-day spent at a partner or customer venue without
access to one’s own network resources can impact the productivity of a meeting, service or sales call,
and reduce the overall personal productivity of an individual who is away from their office. For this
reason, enterprise guest access services are becoming increasingly important and a necessity in the
corporate environment.
While there is broad recognition that guest networking is becoming increasingly important, there is also
well-founded apprehension over how one safeguards their internal company information and
infrastructure assets. Ironically, unbeknownst to many enterprises, their network might already play host
to guests who, in an uncontrolled manner, find ways to access the Internet via improperly implemented
wired or wireless networks. These guests are not hackers in the true sense, but otherwise
well-intentioned individuals trying to get their jobs done. So, on the surface, while it might sound risky
to implement a guest access solution, when implemented correctly, an enterprise that implements a guest
access solution will most likely improve their overall security posture as a result of the network audits
associated with the implementation process.
well-founded apprehension over how one safeguards their internal company information and
infrastructure assets. Ironically, unbeknownst to many enterprises, their network might already play host
to guests who, in an uncontrolled manner, find ways to access the Internet via improperly implemented
wired or wireless networks. These guests are not hackers in the true sense, but otherwise
well-intentioned individuals trying to get their jobs done. So, on the surface, while it might sound risky
to implement a guest access solution, when implemented correctly, an enterprise that implements a guest
access solution will most likely improve their overall security posture as a result of the network audits
associated with the implementation process.
In addition to overall improved security, implementing a guest access network offers these additional
general benefits:
general benefits:
•
Authentication and authorization control of guests based on variables including date, duration, and
bandwidth
bandwidth
•
An audit mechanism to track who is currently using, or has used, the network