Solved

Securing Conference Rooms

Posted on 2010-11-19
6
319 Views
Last Modified: 2012-05-10
Hello,

 Can anyone offer any suggestions/best practices on how to effectively secure non-domain users from plugging into meeting room switches?
0
Comment
Question by:sin20
6 Comments
 
LVL 9

Accepted Solution

by:
Barry Gill earned 250 total points
ID: 34174855
Create multiple DHCP scopes and make use of VLAN's.
Have VLAN 1 service your internal network and VLAN 2 service your meeting rooms.
Have DHCP scope 1 serviceVLAN 1s and DHCP scope 2 service VLAN 2.
VLAN 2 then gets internet access only (as why else are you letting people connect) and any user from VLAN 1 that wants to connect to internal services must log into a VPN in order to gain access.
Your users will be annoyed by this at first, so manage their expectations and let them know why you are doing this.
0
 

Author Comment

by:sin20
ID: 34175145
Thank you for your reply and suggestion.  I'm not sure the VPN solution is our best bet as we use RSA and I'm sure I won't sell management on distrbiuting tokens for this.

0
 
LVL 9

Expert Comment

by:Barry Gill
ID: 34177252
create an internal secondary vpn, one that does not require tokens
0
 
LVL 3

Assisted Solution

by:Nasir-Siddique
Nasir-Siddique earned 250 total points
ID: 34182013
If your switch is capable....you can use 802.1x based VLANs. 802.1x based VLAn uses authentication which can be integrated to the AD or any other users database, thus if a user without proper credential tries to plug into your network using those conference room sockets, he/she will be asked for use name and password. Untill the credentialsare not verified, no IP address will be provided to the user. You will have a secure access from that area using 802.1x.
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 35814071
This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Smart phones, smart watches, Bluetooth-connected devices—the IoT is all around us. In this article, we take a look at the security implications of our highly connected world.
Do you know what to look for when considering cloud computing? Should you hire someone or try to do it yourself? I'll be covering these questions and looking at the best options for you and your business.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

685 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question