borderless access - cisco.com · network access challenges device growth driven by new business...
TRANSCRIPT
The Key to Business AgilityBorderless Access
Network Access: Then and Now
The Right Approach to Network Choices
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 2
The Cisco Difference: Proof Points
How long have you been around?Can you Identify the following?
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 3
Network Access Challenges
Device Growth
Driven by New Business Requirements
ApplicationsEvolution
Adds Complexity and Cost
Inconsistent ExperienceWhile Traversing Networks
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 4Define an Access Strategy that aligns with your Business Needs
Support of Directives
UserDiversity
Increases Operational Expense
DirectivesApplication Evolution
Let user and application needs drive the right mix of wired, wireless and remote
access technologies
Email ContactCenter Compliance Green
Take The Right Approach to Define anAccess Strategy
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 5
Device Proliferation
Diverse Users
Smart-phones
SmartMeters Engineer Sales Exec
An Architectural Approach Provides A Holistic View Of Your Access Network5
Challenges to Enabling a Borderless Access ExperienceProviding
hi-performance connectivity at all times
Integrating multiple,
disconnected management platforms
Managing multivendor relationships
Building a “future proof” network
© 2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 6
Top Challenges
It’s About The Architecture
It’s NOT About
Point Technologies
© 2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 7
It’s About
It’s About Allowing these to determine the right network architecture
Understanding the application and user requirements of the business
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 8
Client Monitoring and TroubleshootingProblem Statement
Mis-Directed IT DispatchWithout complete and accurate visibility into the network, IT teams waste time and effort in pinpointing the exact location of trouble spots and missing assets
© 2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 9
trouble spots and missing assets
Client Monitoring and TroubleshootingHow Cisco Can Help
Location ServicesThe industry’s first Network Location Services enable tracking of assets and the users of those assets for both wired (connected to Catalyst switches) and wireless (Cisco Unified Wireless Network)
© 2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 10
� Centralized visibility into all network elements
� Follows and tracks network devices as they move from location to location
� Accurately identifies interference zones and dead spots
� Assesses WLAN utilization by physical location
Client Monitoring and TroubleshootingBenefits
Simplified Network VisibilityCisco Context Aware Mobility Solution with Cisco Catalyst Portfolio offers complete network visibility and control� Easy real-time tracking of wired
© 2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 11
� Easy real-time tracking of wiredand wireless assets for quickproblem resolution
� Dynamic Helpdesk resource shows how clients are accessing and using the network
� Easy-to-read historical reportinginto usage patterns
Wired and Wireless Access Policy Problem Statement
The RogueAccess PointIT must be able to quickly identify and block unauthorized network access form any unknown, non-conformant, or rogue devices
© 2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 12
rogue devices
Wired and Wireless Access Policy How Cisco Can Help
Locate Rogues, Trace and Disable Switch PortEnable tracking of assets and the users of those assets for both wired (connected to Catalyst switches) and wireless (Unified architecture)
Rogue APManaged AP
L2 Switched Network
1. Detect rogue over air
© 2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 13
architecture)� Assesses WLAN utilization by physical
location to flag unusual usage patterns� Enhanced network security proactively
tracks and locates rogues
2. Discover nearby switches
3.Trace for rogue footprint on nearby switches
4. Trace location
5. Option to disable port
Wired and Wireless Access Policy Benefits
Simplified Network VisibilityCisco’s Cisco Catalyst Portfolio -2k, 3k and 4k offers complete network visibility and control� Enhanced network security
Rogue Location Identified, switch port traced and disabled
© 2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 14
� Enhanced network security proactively tracks & locates rogues
� Facilitates quick IT action to remove and remediate rogue threats
RogueDetected
Flexible and Secure Guest Access Problem Statement
Failure to ConnectToday’s highly collaborative workplace environment includes customers, partners, suppliers, and guests who require network connectivity to allow them to do their job effectively at the client’s
© 2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 15
their job effectively at the client’s location.The lack of Internet access with hi-performance connectivity drives down productivity and creates frustration.
Flexible and Secure Guest Access How Cisco Can Help
Guest Services with Cisco NAC Guest ServerCisco’s NAC Guest Service offers a flexible, secure and simple way to provide guest users with wired and wireless network connectivity. SiSi
Add NAC Guest Server in cloud
for wired
Provisions Wired and Wireless Guests� Integral part of user authentication system� Guest account creation & management
© 2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 16
� Captive Portal for Guest services� Integrated with WLC, NAC Appliance &
Switches� Single sign-on for sponsor
authentication� Detailed auditing and reporting� Open API � Visitor Management Solutions� Hospitality Solutions� Credit Card Billing for Internet access
Control and Audit� Limit access: Internet only� Prevent access to internal resources� Track and report activity
Flexible and Secure Guest Access Benefits
Fast, Efficient and Secure Guest Provisioning� Enhanced visitor experience and productivity
� Enforce corporate security policies� Not required to deploy and
© 2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 17
� Not required to deploy and maintain an overlay network for guests
� Reduced deployment costs� Monetization capabilities with enhanced accounting/billing
Simplifying Network Access ConfigurationProblem Statement
Hidden Cost and Time in the Network Closet� IT’s #1 goal is expense reduction� IT managers are overspending to support ports no longer in use
� Identifying, locating, repurposing,
© 2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 18
� Identifying, locating, repurposing, and configuring these ports can be a time consuming, difficult task
Simplifying Network Access ConfigurationHow Cisco Can Help
Catalyst Smart OperationsCisco Auto SmartPorts addresses the hidden costs associated with unused and improperly configured ports and simplifies wireless deployments
© 2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 19
deployments� Recognizes and configures phones,
desktops, APs, Routers, Switches� Automatically applied pre-defined
macros to Cisco access points to optimize port configuration for QoS, Security and 802.11n
� Expedites initial install of switchand devices
Port 1-12(Phone, AP)
Port 12-24(Phone, AP, Switch)
Port 2 Port 24Port 1 Port 12
Simplifying Network Access ConfigurationBenefits
Reduced OPEXCisco’s Auto SmartPorts make the networks even smarter by automatically enabling it to configure itself for new devices� Smart Install
�Plug-n-play makes installation,
© 2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 20
�Plug-n-play makes installation, replacements, and upgrades easy
� Smart Configuration �Recognition of new devices allow for port re-use if its current device is replaced by a new one�Automatic application of the right network configuration parameters such as QoS and security
� Smart Troubleshooting�Easy to manage and maintain
Seamless Collaboration ExperienceProblem Statement
Next-Generation CollaborationRising Expectations60% of enterprises are planning to adopt video conferencing in the next 12 months, with 72% of users viewing on laptops
© 2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 21
viewing on laptopsInability to DeliverRF limitations impede the enterprise’s ability to deliverquality video to users, thereby crippling collaboration
Seamless Collaboration ExperienceHow Cisco Can Help
Introducing VideoStream TechnologyCisco VideoStream Technology is a new system-wide set of features that enable reliable and consistent delivery of quality video over the wireless network
© 2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 22
wireless network
Seamless Collaboration ExperienceBenefits
Improves Quality & Scale of Streaming ContentCisco media-ready WLAN With Cisco Videostream technology delivers a quality visual experience throughout the network so that your business can focus on innovation
© 2009 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 23
business can focus on innovation� Solves challenges associated with RF
and wired/wireless integration� Provides quality and speeds for great
end-user experience� Improves efficiency and reduces costs� Increases employee impact and
flexibility� Empowers the next generation
workforce
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 24
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco ConfidentialPresentation_ID 25