Cisco Confidential© 2011 Cisco and/or its affiliates. All rights reserved. 1
Unified AccessEnables BYODVaibhav KatkadeProduct Manager, Catalyst 2K/3K/4K
12th June 2012
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID
The New Reality: Seamless Connection Across Networks, Devices, Workspaces
Aironet 3600Catalyst
UNIFIEDACCESSCAPABILITIES Cisco Prime ISE AnyConnect
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Uncompromised User Experience - Challenges
Securing Any
Access
Managing ComplexityAnd Scale
Delivering High-Quality Experience
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Basic Connectivity Unified Access
Device Onboarding and Guest Access
OnePolicy
One Management
OneNetwork
Uncompromised Experience for Any WorkspaceUnified Access
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
SINGLE BUSINESS POLICYWired, Wireless, and VPN -- Managed & BYOD assets
With MDM integration
CONTEXT-BASED CONTROL Central access to authorize access based on who, what, when, where – with advanced segmentation
USER-SPECIFIC SERVICESSelf-service on-boarding, with lifecycle guest handling
and context-based monitoring
One PolicyIdentity Services Engine
Identityand Policy
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
COMPREHENSIVE VISIBILITY Single management console for user/device-centric visibility across users, devices, location, posture
OPERATIONAL EFFICIENCY Intuitive workflows
LOWER TCO Simplified troubleshooting and service assurance
Prime ManagementOne Management
Management
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
GAME/PRINTER THIN/VIRTUALCLIENTS
DESKTOP/NOTEBOOKSTABLETS
SMARTPHONES
ISE
CiscoPrime
Unified Policy
Unified Management
Scalable, Resilient AccessUnmatched Performance for Wired and Wireless
Context-aware Security
WiredWireless Unified Network
Application Optimization
SmartOperations
• Profile devices, identify users
• Develop device, user, location, role & application context
• Apply policy based on context, everywhere
• Segment user or application groups
• Simulate application traffic
• Locate performance problems
• Analyze directly in the network
• Store for trending and capacity planning
• Plug-n-play switches
• Dynamically configure ports
• Automatically diagnose and report faults
• Program event based actions
One Network – Secure Access, Uncompromised User ExperienceUnified Network
CoreNetwork
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
CDPLLDPDHCPMAC
CDPLLDPDHCPMAC
DEVICE CLASSIFICATION
LAPTOP Video Phone
Laptop Policy
[place on VLAN X]
Video Phone Policy
[restricted access]
ISE
POLICY
Collection—Switch collects device related data and sends report to ISE
Classification—ISE classifies device, collects flow information and provides device usage report
Authorization—ISE executes policy based on user and device
The Solution Deployment Scenario with Cisco Device SensorDevice Profiling + Device Sensor
Authorized Access and Policy EnforcementDevice Profiling Automated with Device Sensor
AccessPoint
Profiling for both wired and wireless devices
CoreNetwork
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
Mediatrace automatically traces the mediapath
Hop by hop statistics collected to find the problem node; enabled remotely
Allows easy recreation of problems with built-in traffic simulator, yielding time and resource savings
The SolutionAutomate Monitoring and
Troubleshooting
SiSi
SiSi
MPLSSiSi
SiSi
IT
?
?
? ?
? ? ?
Prime
Deployment Scenario
MediaTraceDiagnostics, Logs
CoreNetwork
Monitor and Control with Medianet
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
Cost Savings: $15,000 (or 230 Hours) per 100 Switches*
ISR or 3K (“Director”), 4K, 6K Roadmap
AccessSwitches
Zero Touch Deployments and Maintenance
New Switch is Connected
Software image downloaded; Configuration automatically applied
Smart Install
New Device Attached
Port Configuration: AppliedQoS Policy: EnforcedSecurity Policy: Enforced
Plug and Play for End Devices
Auto Smart Ports
Anomaly Detected
Proactive diagnosticsAlert created in real-timeWeb-based reportsRouted to correct TAC teamRemediation initiated with EEM
Quickly Identify and Resolve Network Issues
Smart Call Home
CoreNetwork
Automate Network Provisioning and Diagnostics
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
One Management Unified management for wired and wireless
One Policy Centralized, context-aware policy platform
One Network Consistent, rich services across wired & wireless
Cisco Unified Access Enables BYOD
Seamless ExperienceAny Device | Any Location | Any Connection
Thank you.
Top Related