Page 206 - CITS - Electronic Mechanic - TT - 2024
P. 206
ELECTRONICS MECHANIC - CITS
Role based access control: Role based access control (RBAC) allows you to assign roles based on what, who,
where when and how a user or device is trying to access your network.
Once the end user or role of the devices is defined, access control policies or rules can be enforced.
Indoor as well as outdoor coverage options: It is important that your wireless system has the capability of
adding indoor coverage as well as outdoor coverage.
Network access control: Network access control can also be called mobile device registration. It is essential to
have secure registration.
Network access control (NAC) controls the role of the user and enforces policies. NAC can allow your users to
register themselves to the network. It is a helpful feature that enhances the user experience.
Mobile device management: Suppose many mobile devices are accessing your wireless network; now think
about the thousands of applications that are running on those mobile devices.
How do you plan on managing all these devices and their applications, especially as devices come and go from
your business?
Mobile device management can provide control of how you will manage access to programs and applications.
Even you can remotely wipe the device if it is lost or stolen.
Roaming: You don’t need to worry about dropped connections, slower speeds or any disruption in service as you
move throughout your office or even from building to building wireless needs to be mobile first.
Roaming allows your end-users to successfully move from one access point to another without ever noticing a
dip in performance.
For example, allowing a student to check their mail as they walk from one class to the next.
Redundancy: The level or amount of redundancy your wireless system requires depends on your specific
environment and needs.
For example: A hospital environment will need a higher level of redundancy than a coffee shop. However, at the
end of the day, they both need to have a backup plan in place.
Proper Security means using the right firewall: The backbone of the system is your network firewall. With the
right firewall in place, you will be able to:
See and control both your applications and end users.
Create the right balance between security and performance.
Reduce the complexity with:
Antivirus protection.
Deep Packet Inspection (DPI)
Application filtering
Protect your network and end users against known and unknown threads including:
191
CITS : E & H - Electronics Mechanic - Lesson 118 - 126