This kind of access must be easy to use, and usually is not Wired Equivalent Privacy or Wi-Fi. To allow guest users to connect to the net, the SSID must be set to broadcast.
A lot of hotspot guest devices use dynamic host configuration protocol and a logging server to monitor wireless use. Guest users usually access the Wi-Fi network with a browser like internet explorer.
The guest registration system holds the user info and hardware address and then starts recording the internet protocol traffic.
These systems need an application server on the same net segment as the Access Points.
Safe User Access
There are wireless devices on the market that do not support isolated user access.
To protect user access, use a completely isolated wireless local area infrastructure that does not contain guest access. The best practice is to put the internal users on a different virtual local area network.
In regions where protected wireless is limited to a few devices, media access control address filtering can be used to control access.
The enterprise edge is the zone of the net where the corporate network links to external nets. Routers located at the enterprise edge offer connectivity among the internal site and the Internet. Moreover they deliver connectivity to remote wireless area network users. The project requirements at the enterprise edge are different from those inside the campus net.
Cost of Bandwidth
Many local area networks are built on Ethernet technology.
On the other hand, wide area network connectivity at the enterprise edge is typically rented from a third-party service provider. Since these leased services are very expensive, the available bandwidth to a wide area network is frequently considerably less than the bandwidth offered in the LAN.
QoS
The difference in bandwidth among the local area network and the wide area network can create traffic jams. These traffic jams, also called bottlenecks, cause data to form a queue to the edge routers. A Quality of Service strategy helps to manage and avoid the extensive queuing of data.
Consequently, the planning and implementation of wide area network connections can be complex.
Security
Because the users that use the network through the edge routers are not constantly acknowledged, security requirements at the network edge are necessary.
Intrusion detection and stateful firewall filtering must be applied to protect the internal network from possible threats.
Remote Access
In several cases, the LAN services must spread out through the enterprise edge to distant offices and users. This kind of access has different requirements than the level of public access delivered to users logging into the local area network from the Internet.
Nessun commento:
Posta un commento