Page 206 - CITS - Electronic Mechanic - TT - 2024
P. 206

ELECTRONICS MECHANIC - CITS




           Role based access control: Role based access control (RBAC) allows you to assign roles based on what, who,
           where when and how a user or device is trying to access your network.
           Once the end user or role of the devices is defined, access control policies or rules can be enforced.

           Indoor as well as outdoor coverage options: It is important that your wireless system has the capability of
           adding indoor coverage as well as outdoor coverage.
           Network access control: Network access control can also be called mobile device registration. It is essential to
           have secure registration.
           Network access control (NAC) controls the role of the user and enforces policies. NAC can allow your users to
           register themselves to the network. It is a helpful feature that enhances the user experience.

           Mobile device management: Suppose many mobile devices are accessing your wireless network; now think
           about the thousands of applications that are running on those mobile devices.
           How do you plan on managing all these devices and their applications, especially as devices come and go from
           your business?
           Mobile device management can provide control of how you will manage access to programs and applications.
           Even you can remotely wipe the device if it is lost or stolen.























           Roaming: You don’t need to worry about dropped connections, slower speeds or any disruption in service as you
           move throughout your office or even from building to building wireless needs to be mobile first.
           Roaming allows your end-users to successfully move from one access point to another without ever noticing a
           dip in performance.
           For example, allowing a student to check their mail as they walk from one class to the next.
           Redundancy:  The  level  or  amount  of  redundancy  your  wireless  system  requires  depends  on  your  specific
           environment and needs.
           For example: A hospital environment will need a higher level of redundancy than a coffee shop. However, at the
           end of the day, they both need to have a backup plan in place.
           Proper Security means using the right firewall: The backbone of the system is your network firewall. With the
           right firewall in place, you will be able to:

           See and control both your applications and end users.
           Create the right balance between security and performance.
           Reduce the complexity with:
           Antivirus protection.
           Deep Packet Inspection (DPI)

           Application filtering
           Protect your network and end users against known and unknown threads including:


                                                           191

                                   CITS : E & H - Electronics Mechanic - Lesson 118 - 126
   201   202   203   204   205   206   207   208   209   210   211