Cisco Wireless Service Module 2 Manuel d'utilisateur Page 4

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 10
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 3
Data Sheet
© 1992-2011 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 10
Specific intelligent RF capabilities managed by the Cisco WiSM include:
Dynamic channel assignment: 802.11 channels are adjusted to optimize network coverage and
performance based on changing RF conditions.
Interference detection and avoidance: The system detects interference and recalibrates the network to
avoid performance problems.
Load balancing: The system provides automatic load balancing of users across multiple access points for
optimum network performance, even under a heavy load.
Coverage hole detection and correction: RRM software detects coverage holes and attempts to correct
them by adjusting the power output of access points.
Dynamic power control: The system dynamically adjusts the power output of individual access points to
accommodate changing network conditions, helping to ensure predictable wireless performance and
availability.
Robust Security
The Cisco WiSM adheres to the strictest level of security standards, including:
802.11i Wi-Fi Protected Access 2 (WPA2), WPA, and Wired Equivalent Privacy (WEP)
802.1X with multiple Extensible Authentication Protocol (EAP) types, including Protected EAP (PEAP), EAP
with Transport Layer Security (EAP-TLS), EAP with Tunneled TLS (EAP-TTLS), and Cisco LEAP
The result is the industry’s most comprehensive WLAN security solution.
In Cisco’s WLAN solution, access points act as air monitors, communicating real-time information about the wireless
domain to Cisco wireless LAN controllers. All security threats are rapidly identified and presented to network
administrators via Cisco WCS, where accurate analysis takes place and corrective action can be taken.
Cisco provides the only wireless LAN system that offers simultaneous wireless protection and wireless LAN service
delivery. This helps to ensure complete wireless LAN protection, with no unnecessary overlay equipment costs or
extra monitoring devices. This solution can be deployed initially as a standalone wireless IPS, and reconfigured later
to add wireless LAN data service. This allows network managers to create a “defense shield” around their RF
domains, containing unauthorized wireless activity until they are ready to deploy wireless LAN services.
Cisco addresses wireless LAN security by offering multiple layers of protection (Figure 4), including:
RF security: Detect and avoid 802.11 interference and control unwanted RF propagation.
Wireless LAN intrusion protection and location: The solution not only detects rogue devices or potential
wireless threats, but also locates these devices. This helps administrators to quickly assess the threat level
and take immediate action to mitigate threats as required.
Identity-based networking: Network managers must support many different user access rights, device
formats, and application requirements when securing wireless LANs. The Cisco WLAN solution enables
organizations to deliver individualized security policies to wireless users or groups of users. These include:
Layer 2 security: 802.1X (PEAP, LEAP, EAP-TTLS), WPA, 802.11i (WPA2), and Layer 2 Tunneling
Protocol (L2TP)
Layer 3 security (and above): IP Security (IPsec), Web authentication.
VLAN Assignments
Access control lists (ACLs): IP restrictions, protocol types, port, and differentiated services code point
(DSCP) value.
QoS: Multiple service levels, bandwidth contracts, traffic shaping, and RF utilization.
Vue de la page 3
1 2 3 4 5 6 7 8 9 10

Commentaires sur ces manuels

Pas de commentaire