If you are a professional photographer or even an amateur like me, you want to have ready access to various control dials on your camera to capture the moment perfectly. Professional cameras provide high level of control to get the best outcome. But there are times when you want to put the camera and the lens in Auto mode or wish that the camera could automate some decisions that make your workflow easier.
Likewise, Cisco Wireless LAN products provides the level of quality, functionality and control that is unmatched and hands-down the best enterprise wireless networking portfolio in the industry. But there are scenarios where it is preferable to expedite wireless configuration with best practices automatically enabled and easy access to data to simplify monitoring and troubleshooting workflow. For example, a small business owner manages his own network or in a K-12 a librarian acting like a part-time IT administrator. This not only provides operational efficiencies for the IT organization but also improves end-user and partner experience.
Cisco WLAN Express Setup is an attempt in this direction. It is now available on 2500 Series Controller (CT2504) starting with software release 18.104.22.168.
It includes three components
- Easy-to-use setup wizard: This eliminates the need for console cable and command line setup. Instead, 3-step web-wizard is used to quickly boot strap a Controller and configure employee and Guest WLAN out of the box.
Read More »
Tags: 11ac, 802.11ac, access point, aireOS, analytics, App, application, AVC, best-in-class, Bonjour, cellular, chromecast, Cisco, cmx, configuration, connection, control, controller, data, device, Express, LAN, mag on ap, mobile, mobility, network, networking, optimized roaming, policies, protocol, release, rx-sop, setup, software, Speed, technology, traffic, users, visibility, VLAN, vni, wi-fi, wifi, wired, wireless, wlan, WLC
Cisco Wireless Release 8.0 is now available: Product Bulletin
The Cisco VNI Global Mobile Data Traffic Forecast, 2013 – 2018 revealed some stunning trends with growth projections that are sure to have a dramatic impact on wireless networks worldwide.
In 2013, globally, there were nearly 22 million wearable devices generating 1.7 petabytes of monthly traffic. There were about 7 billion mobile-ready devices and connections with mobile network connection speeds that have more than doubled, to 1.4Mbps up from 526 Kbps in 2012.
By 2018, there will be more than 10 billion mobile-ready devices and connections. The average mobile connection speed will nearly double, from 1.4 Mbps in 2013 to 2.5 Mbps and over 4.9 billion devices will be IPv6-capable. There will be more traffic offloaded from cellular networks (on to Wi-Fi) than remain on cellular networks.
Read More »
Tags: 11ac, 802.11ac, access point, aireOS, analytics, App, application, AVC, Bonjour, cellular, chromecast, Cisco, cmx, connection, control, controller, data, device, fastlocate, HDX, IPv6, LAN, lbs, location, mag on ap, mbps, mobile, mobility, multicast, network, networking, optimized roaming, Packet, patterns, pmipv6, policies, Presence, protocol, q-in-q, q-in-q tagging, release, rx-sop, software, Speed, technology, traffic, users, visibility, VLAN, vni, wi-fi, wifi, wired, wireless, wlan, WLC
“It’s not secure enough… so we are not going to allow it to happen.”
Does this phrase seem all too familiar?
Today, IT and business leaders are faced with the challenge of securing any user from any location on any device with access to any information. At times, it can be a daunting road to travel on the path towards true enterprise mobility security. This is especially true as the combination of sophisticated threats and new mobile capabilities and applications are continuing to shape the role and evolution of security controls and policies.
As the mobile endpoint becomes the new perimeter, how can organizations evolve their mobility security policies to mitigate risk? Is protecting information at the data or device level the way to keep employees and assets secure when users conduct business on untrusted networks?
Recently, I had a chance to participate in a new Future of Mobility podcast with Dimension Data’s Stefaan Hinderyckx, to discuss the biggest challenges our customers are seeing as they deploy enterprise mobility security solutions.
Many CSOs that Stefaan speaks with are seeing the clear and present danger of opening their networks, devices and applications to a new mobile world. Yet, many are not shying away from the benefits that enterprise mobility offers. They say:
“Mobility is inevitable. It’s happening and we need to embrace it and deliver it for the business.”
With this in mind, how can IT and business leaders address key challenges and embrace a holistic approach to secure enterprise mobility?
Complexity: There Are No Boundaries Anymore
One of the biggest challenges our customers are seeing is the increase in complexity as they work to meet business needs through mobility, all while keeping users and assets secure.
Simply put, there are no boundaries anymore. There is no place you can put a firewall to make things secure on the inside and insecure on the outside.
A major reason for this complexity is the result of approaching security in a siloed manner. It can be complex to try to secure the device, data on the device, the user and the network in a disparate way!
IT and business leaders need to work together to make the whole environment secure. It is no longer enough to find point solutions to data-centric or device-centric controls, the only way to be confident in your approach is to build a holistic strategy.
Read More »
Tags: access control, Data Classification, Holistic Strategy, mobility, policies, security, Security Control
As the famous saying goes, “Good things come to those who wait”. Delayed gratification -- person’s ability to forgo a smaller reward now for a larger reward in the future -- has been linked to better life outcomes as demonstrated by the often cited Stanford Marshmallow experiment and others. In most cases though, it requires a degree of self-control not easily achievable in today’s fast paced, ever-changing world with new mobile devices, protocols and technologies.
If you are one of the Cisco Wireless customers currently deploying Release 7.0 MD and waiting for the next Cisco Wireless Software Maintenance Deployment Release, the wait is over!
Release 22.214.171.124 has achieved Maintenance Deployment (MD) status.
Release 126.96.36.199 is the recommended MD release for all non-802.11ac deployments. For 802.11ac deployments, Release 188.8.131.52 (Release 7.6 Maintenance release 1) is the recommended release.
For additional details on Software Release Recommendations and Guidelines, see Guidelines for Cisco Wireless Software Release Migration
Below are top 10 reasons (in no particular order) to upgrade from the current 7.0 MD release to the latest 7.4MD Release.
10. FlexConnect (improved and rebranded H-REAP) with efficient AP upgrade across WAN, BYOD policies support, Flex ACLs and split tunneling. Read More »
Tags: 11ac, 802., 802.11, access point, ACL, analytics, AP, App, Apple, application, Bonjour, byod, Cisco, client, controller, customer behavior, deploy, device, flex, flexconnect, guideline, H-REAP, High Availability, hop security, IPv6, L3 domain, licensing, maintenance deployment, management, MD, migration, mobile, mobility, network, onboarding, outage, Packet, packet optimization, policies, policy, protocol, recommend, release, scale, security, services, SKU, software, split tunneling, standby, stateful switchover, support, technology, tunneling, upgrade, virtual, virtual footprint, WAN, wi-fi, wifi, wireless, WLC