User Roles- Creating Role Based access to the wireless LAN to be able to control client access based upon who, what, when, where and how they are connecting to the network
Device Roles- Creating roles for specific devices such as wireless phones, tablet PC's, notebooks, and Scanners
Policies- Creating policies to be applied to User Roles and Devices. These policies increase security by limiting users and devices to only the resources necessary for them to function on the network. They also improve functionality by assigning priority to latency sensitive applications running on devices.
Authentication, Authorization, Accounting (AAA)- 802.1X setup authentication method utilizing centralized directory database and strong encryption to secure communications.
Voice Services Automatic Voice Prioritization- Configuration of Voice Services providing classification, recognition and prioritization based upon voice sessions.
Service Set Identifier (SSID)- Configuration broadcast SSID of client WLAN access accross appointed access points.
Discover How Our Approach Can Benefit Your Organization