Improve user availability to resources by incorporating clustering design-concepts,
where both client devices and access points have standby or backup paths to the core.
Establish data security for user-groups using a design strategy of separating traffic
at the SSIDs and tunneling data over encrypted links to the controller.
Create role-based security, where users are assigned to established roles made up
of policies built-up from rules (ACLs).
Deploy remote wireless networks using zero-touch deployment, in which each piece of
equipment upon connection to the Internet calls home and obtains its pre-configuration
from the main controller.
Communicate effectively and professionally with peers, managers, customers, and other
stakeholders.
Critically analyze network data to develop inferences and reach sound conclusions.
Work productively with others to network-related tasks. Provide technical expertise
in computer networking to clients or users.