Ryan, Although I haven't used their setup but Aruba networks can provide what you want. I saw them demonstrate their Wireless option at an Angelbeat conference in Philadelphia last year. I also saw an appliance by Air Defense that did a similar function but sat behind the access point and in front of your network. The nice thing I saw in the Aruba device setup was you could offer a guest portion that sort of was very limited (just Internet and no internal network) it also had a feature where the user could get verified once and then keep the certificate for a set number of days/hours etc. It was slick. While talking to the rep I found that Wireless access points for different networks don't coexist nicely. I wanted to add a separate set of devices on a separate network and he said they would fight for air space. he said it would be better if the current access points could handle two networks (Aerohives do that which are the ones that Aruba uses).
Anyway we use Aerohives in some of our schools and Ciscos in our newest school. The Aerohives and Ciscos can handle multiple networks. John J. Boris Sr. JEN-A-SyS Administrator Archdiocese of Philadelphia Chairman Professional IT Community Conference (PICC'12) www.picconf.org >>> Ryan Frantz <[email protected]> 2/24/2012 9:21 AM >>> List, My company is expanding fast and the more employees we bring on, the more requests I field for folks to bring in their own devices (laptops, tablets, etc.) to be used on our network. We have conference rooms with wide open network jacks accessible to anyone. I am looking for solutions that will allow me to secure my network and enforce policies (i.e. installed, approved anti-virus and firewall software) and/or limit access to certain parts of the network (i.e. for Wifi-enabled devices). I am aware of certain vendors' offerings such as Cloudpath, Bradford Networks, and Aruba Networks, but I've only scratched the surface. I'm looking for feedback from the list on what solutions you have implemented to enable BYOD while enforcing appropriate security policies to protect the soft, squishy innards of your network. For guidance, my goals are as follows: 1. Preventing unauthorized devices from directly accessing the network. 2. Allowing for redirection of unauthorized devices to either a captive portal for registration or limited/throttled Internet access (i.e. via a separate VLAN). 3. Supporting Wi-Fi. 4. Reporting on BYOD utilization including the number and types of devices. Thanks in advance for anything you can offer, Ryan Frantz Technical Services Director InforMed, LLC 410-972-2025 x2131 [email protected] _______________________________________________ Discuss mailing list [email protected] https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss This list provided by the League of Professional System Administrators http://lopsa.org/ _______________________________________________ Discuss mailing list [email protected] https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss This list provided by the League of Professional System Administrators http://lopsa.org/
