Cisco Blogs


Cisco Blog > Mobility

Announcing Cisco Wireless Release 7.5

With the prevalence of mobile devices connecting people and things today, we are seeing a base expectation for uncompromised wireless connectivity. There is no doubt that the trend for high performance, pervasive wireless is on the rise and will continue for the foreseeable future. We at Cisco strive to help organizations get ahead of these trends with solutions that can be deployed with confidence today.  That’s why I am proud to announce the latest Cisco Wireless Release 7.5, the third feature-rich release we’ve had in the last 12 months.

Release 7.5 enables mission critical wireless deployments with sub-second stateful failover for wireless clients, wire-like Gigabit performance with the 802.11ac Module, and a bevy of other features.

Key Features in 7.5:

Tags: , , , , , , , , , , , , ,

Higher Education Races Towards 802.11ac

[Webinar] 802.11ac in Higher Education | Wednesday July 24 at 3pm PST < REGISTER

It’s no secret that mobile devices are playing a larger part in today’s businesses. With the fast pace of mobility adoption by consumers, network usage has started to outrun the infrastructure of most enterprises’ mobile networks. Enterprise IT managers are struggling to keep up with mobility’s effects on workplace productivity and requirements.

Among the growing trends that weigh heavily on the minds of most network IT professionals is bring your own device (BYOD). The growth of bandwidth-intensive applications, like video streaming, and the user expectations of always-on network and application performance also place heavy demand on organizational infrastructure.

802.11ac is the next generation of Wi-Fi, designed to give enterprises the tools to meet the demands of BYOD, high-bandwidth applications, and the always-on connected user. This Wednesday we will be hosting a workshop to discuss the benefits of 802.11ac, and how to optimize it for high density and high bandwidth to benefit higher education. Students, typically early adopters of wireless technology, usually bring 802.11ac in the form of the latest laptop, smartphone, and tablet that support this new technology. Read More »

Tags: , , , , , , , , , , , , , , , , , ,

[Cartoon Catalyst Blog Series] K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?

Students bounding into schools touting the latest device is creating big problem for K-12 IT departments. How can schools support BYOD initiatives while securing these mobile devices and the student information embedded within them if IT staff numbers aren’t growing?

In his latest blog, K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?, Cisco’s Rahul Chohan discusses how Identity Services Engine policy deployment as a part of Cisco BYOD Solutions for K12 Education helps simplify mobile device security streamlines the IT security processes required to deploy BYOD. Rahul’s blog covers how ISE helps protect minors, ensure performance, and simplify IT over the wired and wireless infrastructure. How exactly can it do this? You’ll have to read his blog to find out.

For more on Cisco BYOD Solutions for K12 Education page.

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

[Cartoon Catalyst Blog Series] K-12 BYOD. Secure Students, Determine Internet Access, and Yet Provide Awesome Network Performance?

So many students, so many devices, yet zero increase in number of IT staffers. The increasingly unbalanced ratio is enough to cause a few nightmares for any IT professional.  Luckily, supporting student IT requirements, while remaining secure, has become a bit simpler with Identity Service Engine (ISE)  Policy Deployment, part of Cisco BYOD Solutions for K12 Education.   With ISE, IT staffers can quickly add and support student’s devices like laptops, smart phones and tablets and at the same time ensure the protection of student information access, dynamically control who gets access to what and provide optimal network user experience.  You can be rest assured that we have your back while you balance it all.

K-12 TightRope1    

Protection of Minors – Let’s face it – K-12 means we’re talking about minors, so we need to tread quite carefully. Extending network access across wired and wireless opens education to a world of innovation; yet it also opens the network up to security threats. 64% of parents feel it is a schools responsibility to effectively teach students how to use their mobile devices safely [Info graphic].  Protection of access to and access by students is a high-priority.  It is critical to restrict access to confidential student records while making sure students get the right access to resources they need for learning. The ISE component of the  K12 BYOD Solution protects student information through secure,   role-based, application access – simply -- over the wired and wireless infrastructure. Read More »

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Wireless Controller Redundancy with No Client Reauthentication Needed

July 12, 2013 at 5:00 am PST

Last fall, I blogged about No SSID Outage or Access Point Stateful Switchover introduced with the AireOS 7.3 release whereby if your wireless LAN Controller fails due to some hardware failure, thousands of Access Points fail over sub-second to the standby controller! This is possible due to continuous synchronization of CAPWAP states, Configuration Changes, Radio Channel and Power, Roaming Keys and Access Point licenses between the two Controllers. This means even if the administrator changes the configuration, channel plans or the clients roam and the primary controller fails; the Access Points will simply fail over in a stateful fashion to the secondary. In this blog, I will share details on the upcoming enhancements to High Availabilty with the 7.5 release.

In the upcoming AireOS 7.5 release, we take High Availability to the next level with two critical enhancements.

1. Today, after Access Points fail over from the primary to the standby controller, each client tries to re-authenticate and the standby controller then checks against its CCKM database whether the client has already authenticated. At the rate of several tens of authentications per second, it can take anywhere from zero to a few hundred seconds for the tens of thousands of clients that are connected to a controller to re-authenticate. The client stateful essentially eliminates this downtime with sub-second failover. Thus the total downtime that any user running a voice-call or Citrix session experiences is 2-3 seconds that the application requires to reconnect.

sso1 Read More »

Tags: , , , , , , , , , , , , , , ,