Categories Search My Account Basket
Ubiquiti Access Points - New
TELTONIKA 4G ROUTERS
Meraki NAC

Meraki NAC provides powerful endpoint compliance assessment and enforcement capabilities to administrators without requiring any additional hardware, software or licenses. Wireless clients are evaluated to determine whether they are protected by antivirus software. Compliant clients are then allowed onto the network while others sent to a quarantine and remediation area. Fine-grained access control policies are then enforced via Meraki's integrated policy firewall, enabling identity-based access control policies for network resources. Unlike many NAC solutions, no LAN reconfiguration or integration is required.

Summary

• Enforce client anti-virus requirements with 1 click
• Create identity-based access control policies
• Easy, scalable management across thousands of sites
• No VLAN reconfiguration or client agent installation required
• Included with the Meraki Enterprise license, no new hardware or software required

Devices that connect to your network will be quarantined behind a captive portal using the AP's stateful firewall. They will then be scanned by a dissolving agent to check that anti-virus software is installed and running. If found to be compliant, the user will then be allowed onto the network and their device will be whitelisted for a specified time period before a rescan will be required. If found to be non-compliant, they will be redirected to a remediation site. This could be either a Meraki default splash page that will allow them to download free anti-virus software, an internal corporate site where anti-virus software is hosted or a public URL in a walled garden such as www.mcafee.com where clients can download the desired anti-virus software. Once remediated, clients will be rescanned and then given access to the network
Identity-Based Access Control Policies

Meraki's integrated policy firewall enables powerful, fine-grained identity-based access control policies. Apply VLAN tags, access access restrictions, and bandwidth limits on a per-user or per-group basis, for example, providing one set of rules for IT staff, another for executives, and a third for general users. Access control policiies are created quickly and easily over the web, even in distributed environments or large-scale campus deployments. Meraki's policy firewall integrates seamlessly with Active Directory and RADIUS environments.

Complete User and Device Visibiility and Control

Combined with the endpoint posture assessment and enforcement of Meraki Network Access Control, the Meraki Dashboard offers full device and user visibility and control across your entire network. Device and OS fingerprinting, traffic analysis, detailed event logging and summary reports offer granular, drill-down capable visiblity into who is using your network and how. Enterprise-grade authentication, applicationaware traffic shaping, content filtering and guest account management provide administrators granular access control and powerful tools to manage exactly how the network is used.

Continue
Call our Wifi Sales Specialists
0330 088 0295
0 items
£0.00
Wifi Services & Solutions
TEP ERROR! (tep_display_banner(dynamic, RHS_A) -> No banners with group 'RHS_A' found!
TEP ERROR! (tep_display_banner(dynamic, RHS_B) -> No banners with group 'RHS_B' found!