For Clients that require higher levels of overall local area network (LAN) protection
  • Coming 1st Quarter 2023
Unique 4-Stage Security Solution for Enterprise LAN Access, Command and Control
  • Isolation
  • Authorisation
  • Authentication
  • Access Control
Balances security and complexity to provide the optimum cost-benefit to Clients
Security Protocols are:
  • Stage 1 – Isolation
    • Design Virtual LAN’s (VLAN) to isolate and contain Users and Devices, from more sensitive parts of the network
      • Example: Public or Guest WiFi users must be isolated from the core operations network
  • Stage 2 – Authorisation – ensures identity of Client and device
    • MAC Address must be legitimate and known and if approved a dedicated IP address is assigned to the device via DHCP allowing initial access to the LAN
    • Optional: For WiFi Users, they must know the general WiFi password globally unique to each Client
  • Stage 3 – Authentication – ensures identity of the User
    • Access to the Internet (WAN/MAN) is only permissible via a Captive Portal (HotSpot) using Active Directory integrated authentication
  • Stage 4 – Access Control
    • After successful Authentication and Authorisation, Access rights are determined for the User and Device based on defined policies

Feedback

Was this helpful?

Yes No
You indicated this topic was not helpful to you ...
Could you please leave a comment telling us why? Thank you!
Thanks for your feedback.

Post your comment on this topic.

Please do not use this for support questions.
https://x.direct/1/en/topic/welcome

Post Comment