Case Studies Summary
 Download as PDF
Download as PDFDocument Reference: GEN-DOC-005 - Please see here for additional document control information.
| Scenario Tool | 4.1 Library Kiosks | 4.2.1 Residences | 4.2.2 Work Places | 4.3 Conference Delegates | 4.4 Open Day Guests | 4.5.1 Paper-based Registration | 4.5.2 On-Line Registration | 4.5.3 Identity Management | 4.6 Device Authentication | 4.7 Frequent Guests | 4.8 Visitor Wireless Access | 4.9 Guests and Visitors | 
| 3.1 Supported Equipment | x | |||||||||||
| 3.2 Physical Controls | x | x | x | |||||||||
| 3.3 MAC Addresses | x | x | ||||||||||
| 3.4 SSIDs | x | x | x | x | x | x | ||||||
| 3.5 Shared Secrets | x | |||||||||||
| 3.6 IP addresses | x | x | x | x | x | x | ||||||
| 3.7 VLANs | x | x | x | x | x | |||||||
| 3.8 Port Restrictions | x | x | x | x | x | x | x | x | ||||
| 3.9 Bandwidth Management | x | x | x | x | x | |||||||
| 3.10 NAC/TNC | ||||||||||||
| 3.11.1 Guest Account Pool | x | |||||||||||
| 3.11.2 Individual Guest Accounts | x | x | x | x | ||||||||
| 3.11.3 eduroam | x | x | x | x | ||||||||
| 3.12 Usage Monitoring | x | x | x | x | x | x | x | x | x | x | x | |
| 3.13 Incident Response | x | x | x | x | x | x | x | x | x | x | x | x | 




