After developing the mobility and application plan, IT staff should also clarify the following important issues to the WLAN supplier during WLAN evaluation:
1. What features does the supplier provide in its WLAN solution? Currently, WLAN products can be divided into two categories-controller-based and non-controller-based (fat access end ). A controller-based solution uses a controller node to manage a group of access terminals (APS ). Therefore, to some extent, adding more aps means adding controllers. However, the more intelligence the supplier adds to the AP, the more aps each controller can support.
A controller-less solution means that no controller is used, because all the hardware and software used to create WLAN are integrated in the AP. This architecture is ideal, which is why all WLAN vendors are switching to this solution (some have already been adopted, and some will be used later ). Integrating all intelligence into the AP can achieve better scalability. You do not need to add a new controller when adding an AP. Employees can take the fat AP home, but there is still a centralized application policy, through a secure VPN connection, this method is very suitable for remote office.
2. Who is the main partner of the supplier? Most vendors expand their product lines through partnerships, such as collaborating with cloud providers to host and integrate software-as-a-service (SaaS) management features. Certified partners and value-added retailers (VAR) can reduce implementation difficulty and improve delivery speed, which is usually well supported.
3. What are the delivery models? The real AP and/or controller are some local hardware, but this does not mean that WLAN vendors cannot minimize the number of enterprise devices. Specifically, the WLAN supplier can minimize the cost of special devices with special features and add more flexible virtual devices or cloud solutions.
Some features (such as deep packet detection (DPI) still require dedicated devices. Virtual devices allow enterprises to add firewall and VPN functions in a modular manner, without the need to add expensive or vendor-dependent dedicated devices. Some vendors transfer these features to the cloud, SaaS products, to further reduce costs and reduce the difficulty of on-site implementation. In some cases, enterprises can purchase solutions hosted by WLAN suppliers or cloud partner data centers.
4. What standards does the provider support? Suppliers can use a large number of published standards, unpublished standards, and completely proprietary technologies to implement increasingly complex WLAN solutions. At the very least, IT personnel should ensure that their WLAN solution uses the fully approved 802.11x standard. As we all know, suppliers Release Products Based on unofficially approved standards, so specific features (usually few) will become unique to suppliers.
Other functions that enterprises should look for include good authentication, access and Identity Authentication frameworks (best 802.11x), channel/VPN technology (most vendors support SSL/TLS, SSH and IPSec ), and easy integration with the existing background directory system through LDAP. Without private solutions, you can avoid relying too much on suppliers.
5. What methods can be used to manage the solution? Centralized and simple management of WLAN is an important condition for IT departments to successfully provide secure and stable services. Proactive features such as configuration management and regular performance testing can reduce the overall workload of IT while facilitating delivery of higher performance, stability, and security. Management can be completed on site or through SaaS. Cloud solutions simplify multi-site management and even simplify network management, even if they are not on site.
6. What features does it support mobile policies? Similarly, WLAN and mobile devices cannot be separated. WLAN determines the functions of Enterprise mobile devices, and mobile devices are the main reasons for improvement of WLAN. Many WLAN suppliers have released NAC control and professional management Websites designed for BYOD and guest devices. This design is important if you expect a large number of devices to connect to enterprise WLAN. You must use mobile devices to support mobile office work and ensure that the use of devices complies with the company's policies and regulations.
7. What security controls does the supplier provide? WLAN security control is very important because WLAN is the entrance of most devices. The basic features of the WLAN solution should include encryption and rogue detection. Similarly, the more active and automated the solution, the better. You certainly do not want to passively handle WLAN problems.
8. How to Integrate WLAN into existing and future applications? Due to the large number of applications deployed by enterprises (especially mobile applications), the WLAN solution must support application access, management, and optimization. For example, companies with a large number of remote access/virtual desktop infrastructure (VDI) applications need to use QoS and the Best optimization tool, because VDI is extremely vulnerable to latency and throughput. In addition, it is necessary to know whether the supplier has tools to support functions such as band manipulation, flow control, and adaptive antenna required by applications.
9. How can you help me complete a business case? Although WLAN business cases do not support hard indicators, the success of mobile deployment is closely related to WLAN deployment and capacity increase plans. More accurately, compared with traditional and expensive controller-based systems, a non-controller-based operating cost solution is easier to pass budget review. This is especially important because the IT budget is limited and the overall macroeconomic conditions are unclear. Pre-establishment of mobile and application strategies will help lay a solid foundation for the comprehensive WLAN plan. You will find that, if you are fully prepared, WLAN providers will be more willing to invest time in developing business cases and scenarios no matter how large your company is.
10. How does the supplier support external WLAN? In most solutions, the details of a WLAN are likely to be ignored at the other end of the WAN firewall. To ensure optimal implementation, QoS and routing commands must be transmitted to the WAN. Most companies must purchase WAN QoS from their MPLS providers. WLAN vendors have released alternative products, which have protocols similar to common Routing Encapsulation (GRE). They can transmit traffic through channels to maintain QoS of different networks. To ensure that WLAN providers use QoS, they also need to do their best to maintain your QoS rules, but the intermediate network is usually their own rules.