iMC BYOD Configuration Examples-5PW101

HomeSupportNetwork Operations & ManagementIntelligent Management Center 7Configure & DeployConfiguration ExamplesiMC BYOD Configuration Examples-5PW101
Table of Contents
Related Documents

BYOD Configuration Examples

Bring Your Own Device (BYOD) permits employees to access privileged company resources from personal digital devices, such as desktops, laptops, tablets, and smartphones. With BYOD, employees can check their company mailboxes, access company applications, and handle other works from anywhere at anytime. BYOD also allows visitors to access limited company resources from their mobile devices for personal services.

The BYOD configuration examples are intended to help customers deploy various BYOD features in typical network scenarios. These documents provide not only step-by-step configuration procedures but also configuration analysis and guidelines to help customers understand the configuration.

The following are available configuration examples:

·     iMC BYOD WLAN 802.1X Authentication and Security Check Using iNode Configuration Examples

·     iMC BYOD WLAN 802.1X Authentication with Machine and User Certificates Configuration Examples

·     iMC BYOD Quick Deployment on Mobile Device Configuration Examples

·     iMC BYOD WLAN MAC Authentication and Guest Registration Configuration Examples

·     iMC BYOD WLAN MAC Authentication Configuration Examples

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网