EasyManua.ls Logo

Extreme Networks Summit 300-48 - Page 108

Extreme Networks Summit 300-48
244 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
108 Summit 300-48 Switch Software User Guide
Unified Access Security
Make the network infrastructure as secure as possible.
Be able to track and identify wired and wireless rogues.
To achieve these objectives, it is necessary to work within the constraints of your environment:
Technology of all the clients
802.11 radio technology (b, a, g, a/b, a/g)
Operating system (W2K, XP, Pocket PC, ….)
Client readiness for 802.1x; client upgrades
Authentication servers available or planned
Operating System Login only (i.e. Domain Access, LDAP)
RADIUS for Users
PKI Infrastructure
Nature of the user population
Ability to divide users into meaningful groups
Network resources required by users
Desired access restrictions based on resources, locations, times, and security level
Acceptable level of network management and user training
Anticipated changes in the network

Table of Contents

Related product manuals