For Clients that require higher levels of overall local area network (LAN) protection |
Unique 4-Stage Security Solution for Enterprise LAN Access, Command and Control
- Isolation
- Authorisation
- Authentication
- Access Control
|
Balances security and complexity to provide the optimum cost-benefit to Clients |
Security Protocols are:
- Stage 1 – Isolation
- Design Virtual LAN’s (VLAN) to isolate and contain Users and Devices, from more sensitive parts of the network
- Example: Public or Guest WiFi users must be isolated from the core operations network
- Stage 2 – Authorisation – ensures identity of Client and device
- MAC Address must be legitimate and known and if approved a dedicated IP address is assigned to the device via DHCP allowing initial access to the LAN
- Optional: For WiFi Users, they must know the general WiFi password globally unique to each Client
- Stage 3 – Authentication – ensures identity of the User
- Access to the Internet (WAN/MAN) is only permissible via a Captive Portal (HotSpot) using Active Directory integrated authentication
- Stage 4 – Access Control
- After successful Authentication and Authorisation, Access rights are determined for the User and Device based on defined policies
|
Feedback
Thanks for your feedback.
Post your comment on this topic.