ENABLING companies to DEPLOY wireless data solutions Application Development Tools Remote Deployment and Management LAN/WAN environments.

Slides:



Advertisements
Similar presentations
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Advertisements

IBM SMB Software Group ® ibm.com/software/smb Maintain Hardware Platform Health An IT Services Management Infrastructure Solution.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 6 Managing and Administering DNS in Windows Server 2008.
Ch. 6 – Switch Configuration CCNA 3 version Overview Identify the major components of a Catalyst switch Monitor switch activity and status using.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
LMS2000 SYSTEM. Introduction World’s 1st truly integrated wireless Internet system Provides Wireless Internet access 11 Mbps raw data rates using DSSS.
Ch. 7 – Switch Configuration
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 8: Implementing and Managing Printers.
Network Management Management Tools –Desirable features Management Architectures Simple Network Management Protocol.
A Guide to major network components
Maintaining and Updating Windows Server 2008
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 1: Introduction to Windows Server 2003.
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Managing Client Access
Module 4 Managing Client Access. Module Overview Configuring the Client Access Server Role Configuring Client Access Services for Outlook Clients Configuring.
Lesson 3 Introduction to Networking Concepts Lesson 3.
Implementing Dynamic Host Configuration Protocol
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
IGEL UMS Product Marketing Manager October 2011 Florian Spatz Universal Management Suite.
Implementing Dynamic Host Configuration Protocol
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
1 Week #7 Network Access Protection Overview of Network Access Protection How NAP Works Configuring NAP Monitoring and Troubleshooting NAP.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Robert E. Meyers CCNA, CCAI Youngstown State University Manager, Cisco Regional Academy Cisco Networking Academy Program Semester 4, v Chapter 7:
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
1 Guide to Novell NetWare 6.0 Network Administration Chapter 13.
Module 6 – Switch Configuration CCNA 3 Cabrillo College.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 5: Managing File Access.
Ripple Technologies, Inc 7/98 LogCaster. Ripple Technologies, Inc 7/98 LogCaster NT Real Time System Monitoring.
Security Planning and Administrative Delegation Lesson 6.
Module 4: Planning, Optimizing, and Troubleshooting DHCP
Week 7 Objectives Installing a DHCP Server Role Configuring DHCP Scopes Managing a DHCP Database Securing and Monitoring DHCP.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 8: Configuring Network Access Protection
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
Windows Small Business Server 2003 Setting up and Connecting David Overton Partner Technical Specialist.
What is a “Network Intrusion Detection System (NIDS)"?
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
Week #3: Configuring and Troubleshooting DHCP
Overview Managing a DHCP Database Monitoring DHCP
D-Link Confidential Tony Thomas AP Manager II AP Manager II.
Enabling Port Security
Configuring Network Access Protection
® BayTech The Power to Control Global Power Management.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Chapter 13: LAN Maintenance. Documentation Document your LAN so that you have a record of equipment location and configuration. Documentation should include.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Chapter 4 Version 1 Virtual LANs. Introduction By default, switches forward broadcasts, this means that all segments connected to a switch are in one.
Allocating IP Addressing by Using Dynamic Host Configuration Protocol.
1 Chapter 13: RADIUS in Remote Access Designs Designs That Include RADIUS Essential RADIUS Design Concepts Data Protection in RADIUS Designs RADIUS Design.
IS3220 Information Technology Infrastructure Security
1 A Look at the Application Authorized users can access Communicator! NXT from any Internet-capable computer via the Web.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Administering Microsoft Response Point How to deploy and manage Microsoft Response Point hardware and software Joe Schurman Founder, Executive Director.
Basic Edge Core switch Training for Summit Communication.
Module 1: Understanding Local Area Networks
Introduction to Networking Concepts
Cisco Unified Operations Manager Proactive Voice Troubleshooting
Configuring Attendant Console
Optical-Based Switching Solutions
Implementing Network Access Protection
© 2003, Cisco Systems, Inc. All rights reserved.
STP Enhancements for z10 EC, z10 BC, z9 EC, z9 BC
Allocating IP Addressing by Using Dynamic Host Configuration Protocol
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

ENABLING companies to DEPLOY wireless data solutions Application Development Tools Remote Deployment and Management LAN/WAN environments

INTERNET DEPLOYED WLAN WLAN ENTERPRISE- WIDE WLANs Simplified Deployment and Management of Wireless LANs.

Remote Deployment and Management Value Added “Agent” Profiles Proactive Monitoring and Alerts Security SNC24 Features

SNMP Agent Internet SNMP Agent Administrator SNC24 Management SNMP Agent Internet SNMP Agent Management Console SNMP Management SNC24 Uses an Intelligent “Agent” On the Segment to be Managed SNC24 Differentiator SNC24 Service

Ethernet Based “Agent” SNC24 Network Management

Simple Remote Deployment –Plug in Power and RJ-45 –Access Points and Mobile Units Auto-Discovered –Configure Access Points Remotely –No equipment staging and configuring required No IP address needs to be pre-assigned Ethernet Based Agent Plug in Locally INTERNET Configure and Manage Remotely

Auto-Detect –Any change to the wireless network New Access Point Deleted Access Point Changed IP Address Change in Settings –Alerts for any unauthorized modifications Ethernet Based Agent

Performance Warnings –Proactively identify possible failure conditions –Set thresholds for desired network performance parameters –An Alert is generated for any network performance that falls outside threshold – or Page IS staff Ethernet Based Agent

Secure Administration –SNC24 agent required on every network segment to be managed –Uses Windows NT “challenge/response” to verify the security ID of the administration station prior to allowing it access to the segment

Built in Redundancy –Primary Agent –Secondary Agent –Run Agents on different PCs for hardware redundancy –Secondary agent takes over with complete functionality until Primary comes back on line. Ethernet Based Agent

Profiles SNC24 Network Management

Automated Deployment –Pre-define multiple profiles –Reserve an IP Address List per Profile –Configure simply by applying a Profile to the access point when it is plugged in –Define a “Default” profile Automatically assigned to any access point not otherwise defined Profiles Default

Proactive Maintenance –Once a profile is assigned to an access point it is “associated” to that Access Point by its MAC address –If a Profile gets dropped, it is automatically re- instated by the SNC24 agent –If an Access Point’s settings inadvertently get changed, they will automatically reset to desired profile. Profiles

Access Control –Prevent unwanted mobile devices from connecting to the wireless network –Identify the MAC addresses of the mobile devices you wish to allow to connect Profiles

Agent issues Challenge/Response to ensure Network Administration is authenticated Mobile unit access control can be defined by MAC address Alerts for Unauthorized Activity –Administrator attempting to modify the network –Attempts by mobile units to access the network –Addition or removal of an Access Point Automated Profile re-assignment in the event of any unauthorized modifications Security Summary

ASP SERVER 1) The server sends an XML request to the remote workstation. 2) The remote workstation sends a “Get” request to the server. 4) The remote LAN can be managed locally, or by the service provider across the Internet 3) The server transmits the SNC24 service to the remote location. SNC24 Service REMOTE Location INTERNET DEPLOYABLE INTERNET

Significantly Reduced IS Costs Maximized Operations Up Time –Reduction of “recovery costs” Enhanced Customer Satisfaction Summary of Benefits

WaveLink: 1,500 Customers LUCENT TECHNOLOGIES MICRON U.S. DEPARTMENT OF DEFENSE

ENABLING companies to DEPLOY wireless data solutions Application Development Tools Remote Deployment and Management LAN/WAN environments