Cisco CiscoWorks Wireless LAN Solution Engine Manuel d'utilisateur Page 3

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 18
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 2
© 2004 Cisco Systems, Inc. All rights reserved.
Important notices, privacy statements, and trademarks of Cisco Systems, Inc. can be found on cisco.com.
Page 3 of 18
tool automatically determines optimal frequency selection, transmit power, and other settings, which the administrator can then apply. The
coverage areas desired can be defined to cover only specified areas.
Mass configuration—Configuring a group with hundreds of devices requires no more effort than configuring a single device. Configuration tasks
may be scheduled or executed on demand. Cisco Works WLSE supports all the configuration settings available on access points, including Wi-Fi
Protected Access (WPA) and Wi-Fi Protected Access 2 (WPA2) security settings. Configuration updates are done using Secure Shell (SSH)
Protocol.
Operations
CiscoWorks WLSE automates a wide range of repetitive time-consuming tasks, simplifying the management of Cisco Aironet access points and
bridges to enhance productivity for network administrators.
Centralized firmware updates—Access point and bridge firmware may be updated in mass. Updates may be assigned to a specific device or to
groups. Tasks may be scheduled or executed on demand.
Mass conversion to Cisco IOS
®
Software—CiscoWorks WLSE can perform mass upgrades of older Cisco Aironet 1200 Series and 350 Series
access points running VxWorks to newer Cisco IOS Software versions. (Many of the RF management and Cisco SWAN features require that
access points run Cisco IOS Software.)
Dynamic grouping—The Device Groups feature makes administering the WLAN more effective and intuitive. Devices may be organized into
hierarchical groups defined by the administrator. Groups may span multiple subnets.
Automated discovery—CiscoWorks WLSE automatically discovers Cisco Aironet access points, bridges, and switches connected to access points
using Cisco Discovery Protocol. Discovery may be scheduled or run on demand.
Configuration archive—The CiscoWorks WLSE is able to store the last four configuration versions for each managed access point, allowing
configuration tasks to be undone.
VLAN configuration—VLANs on access points may be configured and monitored, allowing differentiation of LAN policies and services, such as
security and quality of service, for different users on enterprise and public-access VLANs.
Customizable thresholds—Administrators may define different faults and performance thresholds for specific sites and groups accompanied by
specific actions and fault priorities. A centralized fault screen simplifies quick resolution of problems. Network load, RF usage, errors, and client
associations can be monitored.
Fault status—CiscoWorks WLSE provides a centralized tree view of all access points and device groups. Color coding and group icons indicate
fault status. Faults may be filtered and sorted by priority to facilitate viewing and resolving problems.
Fault notification—Fault notification and forwarding are implemented with syslog messages, SNMP traps, and e-mail.
Switch monitoring—Switches connected to access points are monitored for availability and the utilization of ports, CPU, and memory.
Security and Wireless LAN Intrusion Detection
Wireless LAN threat defense is provided by the Cisco SWAN wireless LAN Intrusion Detection System (IDS). Organizations need to protect their
RF environment and data networks from unauthorized access. Unauthorized (rogue) access points installed by employees or intruders create security
breaches that put the entire network at risk. Cisco SWAN quickly detects, locates, and automatically shuts down rogue access points. CiscoWorks
WLSE also detects unauthorized access points and WLAN networks, quickly locating them and identifying which wireless clients are participating.
It also monitors WPA message integrity failures, which may signal man-in-middle attacks. WLAN IDS protection can be tailored to suit individual
needs:
Integrated WLAN IDS—Standard Cisco Aironet access points are deployed with the radio (IEEE 802.11a, b, or g) placed in multifunction mode to
service client devices and to provide WLAN intrusion monitoring. Intrusion detection information is gathered from the access points that scan the
RF environment. Optionally, Cisco client cards and Cisco Compatible client devices provide additional information about the RF environment.
Dedicated WLAN IDS—A dedicated access point-only WLAN is deployed with the access point radio (802.11a, b, or g) placed in radio scan mode
to support WLAN intrusion monitoring. This solution provides continuous monitoring of the RF environment. Active-but-unassociated client
device monitoring is supported to minimize the risk of clients associating to rogue access points and to protect the network from malicious
intruders probing the RF environment for weaknesses.
Vue de la page 2
1 2 3 4 5 6 7 8 ... 17 18

Commentaires sur ces manuels

Pas de commentaire