For Clients that require higher levels of overall local area network (LAN) protection
  • Coming 1st Quarter 2023
Unique 4-Stage Security Solution for Enterprise LAN Access, Command and Control
  • Isolation
  • Authorisation
  • Authentication
  • Access Control
Balances security and complexity to provide the optimum cost-benefit to Clients
Security Protocols are:
  • Stage 1 – Isolation
    • Design Virtual LAN’s (VLAN) to isolate and contain Users and Devices, from more sensitive parts of the network
      • Example: Public or Guest WiFi users must be isolated from the core operations network
  • Stage 2 – Authorisation – ensures identity of Client and device
    • MAC Address must be legitimate and known and if approved a dedicated IP address is assigned to the device via DHCP allowing initial access to the LAN
    • Optional: For WiFi Users, they must know the general WiFi password globally unique to each Client
  • Stage 3 – Authentication – ensures identity of the User
    • Access to the Internet (WAN/MAN) is only permissible via a Captive Portal (HotSpot) using Active Directory integrated authentication
  • Stage 4 – Access Control
    • After successful Authentication and Authorisation, Access rights are determined for the User and Device based on defined policies
Revision: 22
Last modified: Dec 01, 2022


Was this helpful?

Yes No
You indicated this topic was not helpful to you ...
Could you please leave a comment telling us why? Thank you!
Thanks for your feedback.

Post your comment on this topic.

Please do not use this for support questions.

Post Comment