Alternatives to Sites configuration
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎06-04-2014 06:23 PM
Hello, gentlemen!
We are trying to compete on a big wireless project here in Brazil, (against Aruba and Cisco) where the customer needs local resilience on more than 350 diferent remote locations.
"Sites" wouldn't be an option since he doesn't want to provide 350 radius servers and also only B@AP with wep, wpa and wpa2 seems to be too humble since he wants a voice solution running on the locations with full availability.
What would you recommend?
Any suggestion are very welcome.
Thank you !
Leandro - EXT Brazil
We are trying to compete on a big wireless project here in Brazil, (against Aruba and Cisco) where the customer needs local resilience on more than 350 diferent remote locations.
"Sites" wouldn't be an option since he doesn't want to provide 350 radius servers and also only B@AP with wep, wpa and wpa2 seems to be too humble since he wants a voice solution running on the locations with full availability.
What would you recommend?
Any suggestion are very welcome.
Thank you !
Leandro - EXT Brazil
8 REPLIES 8
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎06-05-2014 03:45 PM
Yeah, the problem is C. has something called Flexconnect where they can reply Radius/AD or part of it straight to the APs.
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎06-05-2014 02:49 PM
In that case bridge@AP would be the best topology for such scenario as the traffic will stay local in the remote site and isn't transported back to the controller.
Still the problem with central authentication for i.e. 802.1X persists and there is not much you'd do about it if you don't plan to have one RADIUS/AD in every remote location.
But I also don't see how the other competitors could solve it as the C. controller works about the same as the Extreme with the site feature.
So either the customer likes to have central authentication and it's OK that the clients can't connect during an WAN outage or he'd need to use PSK encryption without central authentication.
Still the problem with central authentication for i.e. 802.1X persists and there is not much you'd do about it if you don't plan to have one RADIUS/AD in every remote location.
But I also don't see how the other competitors could solve it as the C. controller works about the same as the Extreme with the site feature.
So either the customer likes to have central authentication and it's OK that the clients can't connect during an WAN outage or he'd need to use PSK encryption without central authentication.
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎06-04-2014 07:35 PM
1- Yes, one on every remote location.
2 - They will probably use AES with MAC authentication or 802.1x (not decided yet)
2 - They will probably use AES with MAC authentication or 802.1x (not decided yet)
Options
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Get Direct Link
- Report Inappropriate Content
‎06-04-2014 07:16 PM
I think the design of the wireless network will result from the answer to the following 2 questions...
1) where is the PBX, is there one in every remote location or a big one in the HQ
2) what encryption/authentication should the VoWLAN phones use
1) where is the PBX, is there one in every remote location or a big one in the HQ
2) what encryption/authentication should the VoWLAN phones use
