![]() ![]() ![]() Today, with laptops, networked applications, and digital phone lines, a visiting guest is disempowered without continued access to these technologies. The need for guest access has evolved as the needs of guests have evolved. By implementing a broad-based solution to guest access, companies can control network access, eliminate ad hoc IT support requirements, track guest network usage and securely separate guest traffic from internal resources. ![]() This expanded network access enables higher productivity, improved collaboration, and better service however, it necessitates that a guest access policy be established to address increased network usage and security issues. 1 Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller August 2006 Contents Overview section on page 1 Configuring Guest Access on the Cisco Wireless LAN Controller section on page 2 Creating Guest Access Accounts section on page 11 Web Authentication Process section on page 17 Troubleshooting section on page 42 Related Documentation section on page 51 Overview Today, leading companies are faced with providing network access for their customers, partners, vendors, contractors and other visitors.
0 Comments
Leave a Reply. |