background image

Wireless IPS monitors the network for network 
intruders, including rogue access points, client 
devices, and ad hoc networks that may have made 
an automatic connection to an employee’s computer.  
The software also detects wrong confi gurations 
and weak or missing encryption implementa-
tions.  And it provides real-time detection of all 
rogue access points, unauthorized client devices, 
and ad-hoc networks.  The software immediately 
alerts the IT managers of any problems, allowing 
them to terminate rogue device or ad-hoc network 
connections.

Setting up a hotspot in your own 
offi ce. It makes sense!

Again, wireless hotspots are becoming prevalent 
enough that business travelers expect access to a 
wireless network, wherever they go.  They expect 
it in airport terminals, they expect it in their hotels, 
they expect it while they’re getting coffee, and they 
expect it when they visit your offi ce.  Wi-Fi is mature 
and prevalent enough that some of your clients may 
consider it practically a birthright.  For both security 
and business reasons, it makes good sense to set 
up a wireless hotspot in your offi ce lobby.

Setting up a guest hotspot for your visitors does 
a couple of things.  One, it helps you to be a 
hospitable host.  Two, it protects you.  You may not 
know these guests very well, and you may not know 
whether they are network spies.  If your guests have 
their own wireless network, or at least a separate 
SSID, then they won’t insist on using your corporate 
network, and you can worry less about whether
they pose security risks.   

Most enterprise-level wireless LAN infrastructures 
include the ability to support multiple SSIDs from 
a single wireless LAN switch, meaning you can set 
aside one for guest access.  Some include the ability 
to support VLANs (virtual, logically-independent 
networks), which means you can support guests 
without compromising the corporate network. 
Guest users can be provisioned on a separate VLAN 
keeping them completely isolated.

Motorola’s RFS7000, WS5100 and WS2000 wireless 
switch and the AP-5131 Access Point support 
multiple SSIDs and multiple VLANs.

Motorola provides the ability to make a guest 
network look and feel like a commercial hotspot.
It makes a guest network easier to manage, too.

The latest version of the WS5100 switch includes a 
feature that will redirect a guest user to an offi cial 
log-in page immediately after the user opens a Web 
browser — much like a commercial hotspot, except 
you will probably not charge your guests for access.  
The IT administrator has the ability to customize the 
log-in page.  Your front desk administrator then easily 
can provision guest users on the wireless network 
and even set time limits for network access.  The 
switch also includes integrated authentication 
features designed for guest access.

The WS5100 switch can be set up to receive all the 
guest user information automatically, keeping track 
of log-in times and any odd usage behavior.

In Summary

With some 150,000 hotspots blanketing airspace 
all over the world, your employees have the luxury 
of easy access to the corporate network, wherever 
they may roam.  But it’s important to make sure they 
do so without compromising the personal data or 
the corporate network.  

For more information about Motorola’s RFS7000, 
WS5100 and WS2000 Wireless Switches, AP-5131 
Access Point, or Wireless Intrusion Protection 
System visit www.motorola.com/enterprisewlan. 

5

   WHITE PAPER:  A Manager’s Guide To Wireless Hotspots — How To Take Advantage Of Them While Protecting The Security Of Your Corporate Network

Содержание WS5100 - Wireless Switch - Security Appliance

Страница 1: ...A Manager s Guide To Wireless Hotspots How To Take Advantage Of Them While Protecting The Security Of Your Corporate Network WHITE PAPER ...

Страница 2: ...es for business travelers who want to use hotspots The majority of corporate enterprises use Microsoft Windows so this paper assumes a Windows environment Windows 2000 and XP are set up by default to encourage information sharing and sharing information is the last thing you want to do at a public hotspot To that end you ll want to change the default settings to secure your employees computers IT ...

Страница 3: ... 5 Run a firewall With a wireless hotspot a group of strangers are sharing the same IP subnet Odds are that most of these strangers have no ill intentions but they might unknowingly have malware or viruses on their computers Thus they might unknowingly infect the computers of those around them Installing and running firewall software will help to prevent successful attacks from both on and off the s...

Страница 4: ... the right hand corner of your screen Click disable 4 WHITE PAPER A Manager s GuideTo Wireless Hotspots HowToTake Advantage OfThem While ProtectingThe Security OfYour Corporate Network Basic rules for business travelers who want to use hotspots Nobody wants to think of employees as intruders but they can be an unintentional threat to the network Alas there s always the chance that your employees h...

Страница 5: ...eaning you can set aside one for guest access Some include the ability to support VLANs virtual logically independent networks which means you can support guests without compromising the corporate network Guest users can be provisioned on a separate VLAN keeping them completely isolated Motorola s RFS7000 WS5100 and WS2000 wireless switch and the AP 5131 Access Point support multiple SSIDs and mul...

Страница 6: ...US Patent Trademark Office All other product or service names are the property of their respective owners Motorola Inc 2007 All rights reserved For system product or services availability and specific information within your country please contact your local Motorola office or Business Partner Specifications are subject to change without notice ...

Отзывы: