Руководство По Проектированию для Cisco Cisco Aironet 350 Mini-PCI Wireless LAN Client Adapter

Скачать
Страница из 368
C H A P T E R
10-1
Enterprise Mobility 4.1 Design Guide
OL-14435-01
10
Cisco Unified Wireless Guest Access Services
The introduction of Wireless LAN (WLAN) technologies in the enterprise has changed the way 
corporations and small-to-medium businesses function by freeing staff and network resources from the 
constraints of fixed network connectivity. 
WLAN has also changed how individuals access the Internet and their corporate networks from public 
locations. The advent of public WLAN (hotspots) has caused mobile workers to become accustomed to 
being able to access their corporate network from practically anywhere. 
Introduction
The paradigm of public access has extended to the enterprise itself. Long gone is the scenario where it 
was sufficient for a company to provide its partners, visitors, and guests with a place to sit along with 
an outside line with which to make phone calls. Our highly mobile, information-on-demand culture 
requires on-demand network connectivity. A half-day spent at a partner or customer venue without 
access to one’s own network resources can impact the productivity of a meeting, service or sales call, 
and reduce the overall personal productivity of an individual who is away from their office. For this 
reason, enterprise guest access services are becoming increasingly important and a necessity in the 
corporate environment.
While there is broad recognition that guest networking is becoming increasingly important, there is also 
well-founded apprehension over how one safeguards their internal company information and 
infrastructure assets. Ironically, unbeknownst to many enterprises, their network might already play host 
to guests who, in an uncontrolled manner, find ways to access the Internet via improperly implemented 
wired or wireless networks. These guests are not hackers in the true sense, but otherwise 
well-intentioned individuals trying to get their jobs done. So, on the surface, while it might sound risky 
to implement a guest access solution, when implemented correctly, an enterprise that implements a guest 
access solution will most likely improve their overall security posture as a result of the network audits 
associated with the implementation process.
In addition to overall improved security, implementing a guest access network offers these additional 
general benefits:
  •
Authentication and authorization control of guests based on variables including date, duration, and 
bandwidth
  •
An audit mechanism to track who is currently using, or has used, the network