Enterprise wireless LAN networking solutions

Because wireless network security is relatively low, wireless networking enterprises and institutions need to consider the following factors:

  1. Wired and wireless network segments separated from each other.

  2. Office and guest wireless radio also needs to be isolated from each other.

  3. Wireless terminal each segment of recommended control in less than 150 to avoid broadcast storms.

  4. Employees within the network access authentication or equipment to do the binding.

  5. Visitors real-name authentication (optional)

Usually such a network structure:

201909051567653926138121.png

  1. Because the wireless router's stability is not high, it is the primary route is not recommended to use the wireless device. We can do with a wired router gateway, behind series online behavior management equipment. You can also manage gateway or firewall to make direct use of online behavior.

  2. Recommended networking using the thin AP. Unified management by AC controller.

1. Different VLAN division

Wired, wireless office, guest wireless uses different VLAN.

201909051567654288886535.png

Configure firewall policies to prevent visitors wireless access to the network. This can effectively protect the enterprise network information security, to avoid unauthorized access from unknown sources.

201909051567654353149981.png

2. Binding wired network and office wireless network equipment

201808201534737310140023.png

201806261529991933795659.png

Internal network access device to be strictly limited, even if the wireless password leak, but also to avoid unsafe devices to access the corporate intranet.

3. Turn on the wireless segment Verified guests

Guests must go through before they can access real-name authentication, and retained access log.

201812271545897246463395.png

201812271545897483313621.png


In summary, such a network architecture not only meet the needs of network security, but also for the guests and provide the real-name certification audit and record Internet behavior management.



Guess you like

Origin blog.51cto.com/12800391/2437310