Ryan,
Although I haven't used their setup but Aruba networks can provide what
you want. I saw them demonstrate their Wireless option at an Angelbeat
conference in Philadelphia last year. I also saw an appliance by Air
Defense that did a similar function but sat behind the access point and
in front of your network. The nice thing I saw in the Aruba device setup
was you could offer a guest portion that sort of was very limited (just
Internet and no internal network) it also had a feature where the user
could get verified once and then keep the certificate for a set number
of days/hours etc. It was slick. While talking to the rep I found that
Wireless access points for different networks don't coexist nicely. I
wanted to add a separate set of devices on a separate network and he
said they would fight for air space. he said it would be better if the
current access points could handle two networks (Aerohives do that which
are the ones that Aruba uses).

Anyway we use Aerohives in some of our schools and Ciscos in our newest
school. The Aerohives and Ciscos can handle multiple networks. 

John J. Boris Sr.
JEN-A-SyS Administrator Archdiocese of Philadelphia
Chairman Professional IT Community Conference (PICC'12)
www.picconf.org   


>>> Ryan Frantz <[email protected]> 2/24/2012 9:21 AM >>>
List, 

My company is expanding fast and the more employees we bring on, the
more requests I field for folks to bring in their own devices (laptops,
tablets, etc.) to be used on our network. We have conference rooms with
wide open network jacks accessible to anyone. I am looking for solutions
that will allow me to secure my network and enforce policies (i.e.
installed, approved anti-virus and firewall software) and/or limit
access to certain parts of the network (i.e. for Wifi-enabled devices).
I am aware of certain vendors' offerings such as Cloudpath, Bradford
Networks, and Aruba Networks, but I've only scratched the surface. 

I'm looking for feedback from the list on what solutions you have
implemented to enable BYOD while enforcing appropriate security policies
to protect the soft, squishy innards of your network. For guidance, my
goals are as follows: 

    1. Preventing unauthorized devices from directly accessing the
network. 
    2. Allowing for redirection of unauthorized devices to either a
captive portal for registration or limited/throttled Internet access
(i.e. via a separate VLAN). 
    3. Supporting Wi-Fi. 
    4. Reporting on BYOD utilization including the number and types of
devices. 

Thanks in advance for anything you can offer, 

Ryan Frantz 
Technical Services Director 
InforMed, LLC 
410-972-2025 x2131 
[email protected] 
_______________________________________________
Discuss mailing list
[email protected] 
https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss 
This list provided by the League of Professional System Administrators
 http://lopsa.org/
_______________________________________________
Discuss mailing list
[email protected]
https://lists.lopsa.org/cgi-bin/mailman/listinfo/discuss
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to