02-28-2024 06:25 AM
They want to change some authentication for Wireless users
02-28-2024 06:48 AM
Hi,
Considering what you said, there are some possibilities.
For internal users, you can consider using 802.1X/EAP authentication methods1. This method is more secure and has replaced some outdated methods that have security weaknesses. You can also consider using multi-factor authentication methods to strengthen security while continuing to prioritize usability.
For guest network, you can create a separate VLAN for your guests. This prevents unauthorized access and associated security issues by isolating guest devices from the internal network.
For a BYOD network, you can consider using the same 802.1X/EAP authentication methods as your internal network. Additionally, you can use Single Sign-On tools that let employees use a single password to access a portal of company and cloud applications.
Of course, this is just a general recommendation, there are other options like Meraki's MDM.
https://meraki.cisco.com/products/systems-manager/
02-28-2024 12:00 PM
"Trusted Access" might be perfect for your BYOD use case.
You could also consider using Meraki Systems Manager for company assets (you can't be using another MDM already for this option).
https://documentation.meraki.com/SM/Deployment_Guides/Systems_Manager_Sentry_Overview
If you are happy to run an internal RADIUS server and Windows CA server you can also use WPA2 Enterprise mode. This covers a lot of that:
https://documentation.meraki.com/MR/Encryption_and_Authentication/Configuring_RADIUS_Authentication_with_WPA2-Enterprise
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide