A large multinational financial institution has contracted you to design a new full-stack wired and wireless network for their new 6-story regional office building. The bottom two floors of this facility will be retail space for a large banking branch. The upper floors will be carpeted office space for corporate users, each floor being approximately 100.000 sq ft (9290 sqm). Data centers are all off site and will be out of scope for this project. The customer is underserved by its existing L2-based network infrastructure and would like to take advantage of modern best practices in the new design. The network should be fully resilient and fault-tolerant, with dynamic segmentation at the edge. The retail space will include public guest Wi-Fi access. Retail associates will have corporate tablets for customer service, and there will be a mix of wired and wireless devices throughout the retail floors. The corporate users will primarily use wireless for connectivity, but several wired clients, printers, and hard VoIP phones will be in use.
The customer is also planning on renovating the corporate office space in order to take advantage of "smart office' technology. These improvements will drive blue-dot wayfinding. presence analytics, and other location-based services
The client decides that they would like for all of their exposed printer, conference room, and VoIP phone connections to be controlled by a stateful firewall
What could be planned to ensure that these ports will meet the customer's requirements?
- Tunneled Node
- Multi-Zone
- Airgroup
- Web Portal
Answer(s): A
Explanation:
To control exposed printer, conference room, and VoIP phone connections with a stateful firewall,
utilizing Tunneled Node functionality would be effective. Tunneled Node allows for the encapsulation of wired Ethernet traffic into a user-based tunnel, similar to how wireless traffic is handled. This means that traffic from these devices can be sent through a centralized controller where stateful firewall policies can be applied. This setup ensures that the specific ports used by these devices are subjected to the same level of security scrutiny and policy enforcement as wireless traffic, aligning with the client's requirements for a secure and controlled network environment.
Reveal Solution Next Question