Tiho Strabc, Wireless Specialist, Juniper Networks
From time to time we thought we could use this blog to post answers to questions submitted via our webinars. For starters please see below a response from Tiho Strabc, Wireless Specialist, Juniper Networks in answer to a question submitted via our latest webinar ‘BYOD & Mobile Threats – Is Your Network Simply Connected?’
What happens when a user with an untrusted device tries to access my network?
There are a few aspects to consider here: security, protection of the network and user experience. In short if a user tries to access a network that is simply connected with an untrusted device their access will be denied. However, what is equally important here is that this unauthorised access attempt is recorded and stored for any potential auditing purposes. It’s important to assess what kind of access this is and also to review if anyone is continually trying to access the network illegally, as this may affect the bandwidth performance for authorised users. There should be counter measures in place to ensure bandwidth is not wasted and that continual unauthorised access attempts don’t affect the network experience for the rest of your wireless users.