BYOD Architecture Framework

There are many different ways to implement a BYOD solution, and each organization must decide on the level of openness and flexibility it wants to enable its employees in terms of the type of devices they can connect and the amount of access each of these devices will be granted. The bottom line, however, is that the organization’s security policy must be leveraged to govern the level of access for BYOD devices, and then certain technologies will be used to ensure the security policy is managed and enforced.

The Cisco BYOD solution architecture leverages the Cisco Borderless Network Architecture and is based on the assumption that best common practices (BCP) are followed in network designs for campus, branch offices, Internet edge, and home office implementations.

Figure 4-1 shows a high-level view of the Cisco BYOD solution architecture. Each of the components of the Cisco BYOD solution is explained in detail in the following section.

Image
Image

Figure 4-1 High-Level BYOD Solution Architecture

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset