Datasheet
5
domains that can span multiple floors,
an entire building or campus. Within
the mobility domain, each user’s security,
QoS and access policies follow them as
they roam from access point to access
point. Regardless of where a user roams,
their traffic will always be tunneled back
to the WLAN Security Switch that can
put them on to the appropriate network
VLAN and subnet. This roaming archi-
tecture ensures a symmetrical data flow
and won’t break multi-cast memberships
like competing solutions.
Virtual service groups for
management exibility
EachWLANSecuritySwitchcansupport
up to 32 independent virtual WLANs
overasingleinfrastructure.Eachvirtual
WLAN can be set up as a unique service
group that can be assigned its own
VLAN, subnet and AAA server(s), along
with specific security and QoS policies.
In shared environments or managed
services implementations, each virtual
service group can have its own Web
authentication page to request usernames
and passwords or display instructions,
welcome banners, corporate identities or
advertisements.
AAA management/ofoading
offers authentication options
WLAN Security Switches are capable of
enforcing multiple authentication options
includingclientMACaddress,802.1Xor
Web-based authentication, and can map
any SSID or virtual service group to a
primary and backup AAA server, or load
balance requests among multiple AAA
servers for service resiliency. The WLAN
Security Switch offloads back-end AAA
servers by terminating and processing
ExtensibleAuthenticationProtocol
(EAP)for802.1Xusers,includingkey
generation and management functions
forEAP-TLS,EAP-MD5andPEAP.
The WLAN Security Switch will also
offload Transport Layer Security (TLS)
processing,includingX.509certicate
generation and management.
Centralized access point
management provides simplied
administration
EachWLANSecuritySwitchprovides
centralized management for the access
points under its control. Firmware
updates, configuration changes and RF
management can all be performed by
the WLAN Security Switch through a
management interface or via Wireless
ManagementSoftware.TheWLAN
Security Switch management system
provides administrators with detailed
tracking and reporting of activity on all
access points.
Dynamic RF management
ensures optimal coverage
The WLAN Security Switch continually
receives RF data from associated access
points and processes important informa-
tion such as traffic load, interference from
nearby devices, noise levels, client signal
strength and signal-to-noise ratios. Using
this data, the WLAN Security Switch
calculates the optimal 802.11 channel
assignments and radio power transmission
levels for all associated access points. The
WLAN Security Switch can automati-
cally apply these settings to the respective
access points and keep the WLAN system
operating at peak performance and effi-
ciency even when adverse or unexpected
conditionsarise such as outages, interfer-
ence or radio jamming attacks.
User RF optimization provides
personalized performance
The WLAN Security Switch 2300 Series
takes RF management to a new level by
assimilating client RF data and client
Figure 4. Mobility management
—
Control of the mobility domain
Device
(MAC 00XXXX)
Group
(NE Sales)
Geography
(Boston 1)
Site location
(4th oor E.)
Time of day
(Wed. 08:30 ET)
SSID
VLAN
Subnet
AAA
ACL (Layer 3/4)
Bandwidth allocation
Roaming permissions
QoS priority
Multicast membership
Time-out
User (Bob Smith)
User
identity
extensions
Mobility
service
prole
• An identity-based networking option shifts the management focal point
from physical location and ports to the user
• User identity extensions are dynamically acquired during authentication
• User mobility prole denes policies based on user identity, location and
time of day
• User mobility prole follows roaming user and dynamically adapts for
location and time










