Cisco Bring Your Own Device (BYOD) CVD
Preface
Downloads: This chapterpdf (PDF - 201.0KB) The complete bookPDF (PDF - 62.3MB) | Feedback

Table of Contents

Preface

How to Use this Document

BYOD Design Overview

Configuring the Infrastructure

BYOD Use Cases

BYOD Operations and Services

Appendices

For Experienced Users

For New Users

Where to Find Additional Information

Revision History

Command Syntax Conventions

Preface

Revised: March 6, 2014

This document is a Cisco Validated Design (CVD) for Cisco Bring Your Own Device (BYOD) Solutions. It presents system-level requirements, recommendations, guidelines, and best practices for deploying personal, corporate, and guest devices onto a network to fit your business needs. As Cisco continues to develop and enhance the technologies required to implement a BYOD solution, this CVD will continue to evolve and be updated to provide the latest guidelines, recommendations, and best practices for designing and deploying a BYOD solution.

How to Use this Document

This document is organized into five main parts after the initial Chapter1, “BYOD Solution Overview”

BYOD Design Overview

The chapters in this part of the document describe the main components of Cisco BYOD solution and explain how these components work together to form a complete end-to-end solution:

Configuring the Infrastructure

The chapters in this part of the document describe the network infrastructure design and configuration foundations to deploy a BYOD solution in a customer environment:

BYOD Use Cases

The chapters in this part of the document describe the following four BYOD use case examples of access requirements an organization may enforce as well as a user interaction with ISE during on-boarding:

BYOD Operations and Services

The chapters in this part of the document describe various services in addition to the use cases described in the previous section:

Appendices

The appendices contain useful information that is not covered in the main chapters of this CVD:

For Experienced Users

Readers who are familiar with previous versions of this CVD or who are experienced at designing a BYOD solution can use this document as a reference source. Rather than reading every page or every chapter, this document has been broken into modules that can be easily searched for a particular topic. Updates to the topics in this CVD will be published periodically.

For New Users

This document is long and contains an extensive amount of complex technical information. It can seem intimidating, particularly, if you are a first time reader of this document or do not have much experiencing a BYOD solution.

To orient yourself to the document, we recommend you begin with “Summary of Design Overview,”which provides an overview of the major components required to deploy a BYOD solution and typical access control use cases. From this section, you can then determine if you need particular design guidance around the infrastructure, the uses cases, or a set operation such as Remote Access.

Where to Find Additional Information

Because the document covers a wide spectrum of Cisco Network Infrastructure, Security, and Mobility products and possible solution designs, it cannot provide all the details of individual products, features, or configurations. For that type of detailed information, refer to the specific product documentation available at: http://www.cisco.com .

This document provides general guidance on how to design your own BYOD solution. Cisco has developed, tested, and documented specific solutions for certain applications and has made those solutions available for customers to copy and deploy. They are part of the Cisco Validated Design program described and documented at: http://www.cisco.com/go/designzone .

Revision History

This document may be updated at any time without notice. You can obtain the latest version of this document online at: http://www.cisco.com/en/US/solutions/ns340/ns414/ns742/ns743/ns1050/own_device.html .

Visit this website periodically and check for documentation updates by comparing the revision date of your copy with the revision date of the online document.

Table 1 lists the revision history for this document.

 

Table 1 Revision History

Revision Date
Comments

August 7, 2013

Initial version of this BYOD CVD.

September 27, 2013

Added note on potential incompatibilities introduced by Apple iOS 7 to chapters 10, 19, and 21. Corrected table 21-2.

March 6, 2014

Added the following to the CVD: TrustSec/SGT support for Converged Access campus designs, introduction of the MSE and location services, Converged Access QoS discussion, enhancements to High Availability (HA) on WLC platforms, and Application Visibility (AV) support on Converged Access platforms.

Command Syntax Conventions

Table 2 describes the syntax used with the commands in this document.

 

Table 2 Command Syntax Guide

Convention
Description

boldface

Commands and keywords.

italic

Command input that is supplied by you.

[ ]

Keywords or arguments that appear within square brackets are optional.

{ x | x | x }

A choice of keywords (represented by x) appears in braces separated by vertical bars. You must select one.

^ or Ctrl

Represent the key labeled Control . For example, when you read ^D or Ctrl-D , you should hold down the Control key while you press the D key.

screen font

Examples of information displayed on the screen.

boldface screen font

Examples of information that you must enter.

< >

Nonprinting characters, such as passwords, appear in angled brackets.

[ ]

Default responses to system prompts appear in square brackets.