<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Wireless authentication assistance in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/wireless-authentication-assistance/m-p/5516643#M306472</link>
    <description>&lt;P&gt;"Trusted Access" might be perfect for your BYOD use case.&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/General_Administration/Cross-Platform_Content/Trusted_Access_for_Secure_Wireless_Connectivity" target="_blank" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/General_Administration/Cross-Platform_Content/Trusted_Access_for_Secure_Wireless_Connectivity&lt;/A&gt;&lt;/P&gt;&lt;P&gt;You could also consider using Meraki Systems Manager for company assets (you can't be using another MDM already for this option).&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/SM/Deployment_Guides/Systems_Manager_Sentry_Overview" target="_self" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/SM/Deployment_Guides/Systems_Manager_Sentry_Overview&lt;/A&gt; &lt;/P&gt;&lt;P&gt;If you are happy to run an internal RADIUS server and Windows CA server you can also use WPA2 Enterprise mode.  This covers a lot of that:&lt;BR /&gt;&lt;A href="https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_RADIUS_Authentication_with_WPA2-Enterprise" target="_self" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_RADIUS_Authentication_with_WPA2-Enterprise&lt;/A&gt; &lt;/P&gt;</description>
    <pubDate>Wed, 28 Feb 2024 20:00:50 GMT</pubDate>
    <dc:creator>Philip D'Ath</dc:creator>
    <dc:date>2024-02-28T20:00:50Z</dc:date>
    <item>
      <title>Wireless authentication assistance</title>
      <link>https://community.cisco.com/t5/wireless/wireless-authentication-assistance/m-p/5516641#M306470</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;They want to change some authentication for Wireless users&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;SPAN&gt;We want to change the way users authenticate to the Internal Private. It doesn't make sense to keep our internal network as an SSID with a password that most people know. How are others authenticating internal users on devices that are on SSO in a easy secure manner?&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;We want to change - Guest into a more secure and segregated VLAN and introducing a new way for guests to authenticate as well instead of having an open password to everyone and no idle time or anything. How are others doing this. What would recommendations be&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;What are ways where we can introduce a BYOD network to users that want to bring their cell phones/tablets to work, where the VLAN is similar to the guest one but with a similar authentication to the - Internal Private? obviously we could take them to a integrated splash page.&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Wed, 28 Feb 2024 14:25:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wireless-authentication-assistance/m-p/5516641#M306470</guid>
      <dc:creator>texasjet79</dc:creator>
      <dc:date>2024-02-28T14:25:25Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless authentication assistance</title>
      <link>https://community.cisco.com/t5/wireless/wireless-authentication-assistance/m-p/5516642#M306471</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Considering what you said, there are some possibilities.&lt;/P&gt;&lt;P&gt;For internal users, you can consider using 802.1X/EAP authentication methods1. This method is more secure and has replaced some outdated methods that have security weaknesses. You can also consider using multi-factor authentication methods to strengthen security while continuing to prioritize usability.&lt;/P&gt;&lt;P&gt;For guest network, you can create a separate VLAN for your guests. This prevents unauthorized access and associated security issues by isolating guest devices from the internal network.&lt;/P&gt;&lt;P&gt;For a BYOD network, you can consider using the same 802.1X/EAP authentication methods as your internal network. Additionally, you can use Single Sign-On tools that let employees use a single password to access a portal of company and cloud applications.&lt;/P&gt;&lt;P&gt;Of course, this is just a general recommendation, there are other options like Meraki's MDM.&lt;/P&gt;&lt;P&gt;&lt;A href="https://meraki.cisco.com/products/systems-manager/" target="_blank" rel="nofollow noopener noreferrer"&gt;https://meraki.cisco.com/products/systems-manager/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2024 14:48:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wireless-authentication-assistance/m-p/5516642#M306471</guid>
      <dc:creator>aleabrahao</dc:creator>
      <dc:date>2024-02-28T14:48:19Z</dc:date>
    </item>
    <item>
      <title>Re: Wireless authentication assistance</title>
      <link>https://community.cisco.com/t5/wireless/wireless-authentication-assistance/m-p/5516643#M306472</link>
      <description>&lt;P&gt;"Trusted Access" might be perfect for your BYOD use case.&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/General_Administration/Cross-Platform_Content/Trusted_Access_for_Secure_Wireless_Connectivity" target="_blank" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/General_Administration/Cross-Platform_Content/Trusted_Access_for_Secure_Wireless_Connectivity&lt;/A&gt;&lt;/P&gt;&lt;P&gt;You could also consider using Meraki Systems Manager for company assets (you can't be using another MDM already for this option).&lt;/P&gt;&lt;P&gt;&lt;A href="https://documentation.meraki.com/SM/Deployment_Guides/Systems_Manager_Sentry_Overview" target="_self" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/SM/Deployment_Guides/Systems_Manager_Sentry_Overview&lt;/A&gt; &lt;/P&gt;&lt;P&gt;If you are happy to run an internal RADIUS server and Windows CA server you can also use WPA2 Enterprise mode.  This covers a lot of that:&lt;BR /&gt;&lt;A href="https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_RADIUS_Authentication_with_WPA2-Enterprise" target="_self" rel="nofollow noopener noreferrer"&gt;https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_RADIUS_Authentication_with_WPA2-Enterprise&lt;/A&gt; &lt;/P&gt;</description>
      <pubDate>Wed, 28 Feb 2024 20:00:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/wireless-authentication-assistance/m-p/5516643#M306472</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2024-02-28T20:00:50Z</dc:date>
    </item>
  </channel>
</rss>

