ICT NWT s.r.o.

CISCO Meraki

The industry's only comprehensive solution unifies WAN, LAN, wireless LAN, and mobile device management on a single screen. The Meraki Dashboard provides visibility into network users, their devices and applications. The administrator has powerful analytics tools to quickly create access rules and application usage and optimize user experience and network security.

Overview of Layer 7 applications

Cisco Meraki appliances include integrated Layer 7 applications and client analytics. Hundreds of applications, from enterprise to BitTorrent to YouTube, are automatically identified. This gives administrators visibility into where resources are being consumed. Device tracking allows administrators to identify individual users.
Enterprise Class Security
Extending security down to the port level is easier than ever. All Meraki devices integrate seamlessly with enterprise-class security systems using 802.1X. Access rules can be defined directly from the dashboard, separating corporate and public networks. Applying rules to thousands of ports is a matter of a few clicks - even when ports are spread across multiple sites. Seamless firmware updates, two-factor authentication, and other built-in protections make it easy to create secure networks.
How does cloud management work?
The Cisco Meraki Cloud Networking architecture enables instant deployment of devices across branch offices and provides central visibility and control over any number of distributed sites. It combines the benefits of cloud-based central management and a powerful access platform. With cloud-based management, thousands of ports can be configured instantly via the web. You can commission remote sites without requiring IT staff, make configuration changes across the network, and easily manage enterprise-wide networks without needing training or dedicated staff.

Management

Expandable
unlimited bandwidth, no bottlenecks - add a device or branch in minutes
Stable
high availability of the cloud in several datacenters around the world - the network works even if the connection to the cloud is lost - 99.99% uptime SLA
Safe
user data does not flow through the cloud - automatic firmware updates and security updates

Wireless networks

802.11n/ac wireless access points support more than 100 users per access point, making them ideal for high-density environments such as classrooms. They are also part of a BYOD infrastructure.

802.11ac and 802.11n access points feature high-performance transmitters and improved reception sensitivity. MIMO technology and integrated beamforming maximize capacity without range limitations. The powerful processor enables detailed packet inspection at maximum speed.
Dedicated transmitter for security
In addition to the high-performance transmitters that provide services to clients in the 2.4GHz and 5GHz bands, the access points have an additional radio dedicated to security that constantly scans the radio band and protects against security threats. It senses the RF environment and adapts to interference. Automatically configures settings to achieve maximum performance.
Unrivalled network visibility
MR Meraki access points offer a detailed overview of the network, enabling smarter network management. Powerful and intuitive multi-site management is provided through cloud-based management. At the same time, the complexities and costs everyday in traditional controller-managed wireless networks are eliminated. With fully automated networks, expand in minutes.

Switchers

Gigabit Ethernet switches with unified switching are a complete Meraki solution that includes enhanced remote monitoring capabilities.
Virtual stacking
MS Meraki switches offer a virtual stacking feature that allows you to manage thousands of switch ports as one without requiring a physical connection between switches. It lets you quickly locate and configure switch ports throughout your network, even in geographically distributed locations. With a few simple clicks, you can easily configure ports for accessible devices, assign VLANs, manage POE, and much more. Virtual stacking is a built-in feature of all Meraki MS switches, with no need for expansion modules, special cables, or configurations. Just log in to the Cisco Meraki dashboard and manage your entire access switch infrastructure without worrying about interconnecting them.
Remote online tools and alerts
MS switches offer powerful online tools that allow you to troubleshoot remotely anytime. These tools simplify day-to-day network management, from testing infrastructure performance and uptime to troubleshooting device issues, and significantly reduce resolution time. With integrated Ethernet cable testing, there's no need to go to switch cabinets to verify cable integrity. Select the switch port and run the cable test. The results will be displayed directly in the dashboard even if no device is connected on the other end. Alerts can be set to be sent to administrators via email or text message in the event of configuration changes, switch failures, and even when individual devices are disconnected from their ports.
POE / POE+
Switches are also available in models that support POE and POE+ technologies. They can power up to 30W, allowing high-power devices to operate. A total power output of up to 740W provides enough power to run IP phones, access points, or other POE-powered devices. The switches intelligently allocate power based on reports from devices (LLDP). They also send data on actual consumption compared to planned consumption, and this information is then available to the Meraki dashboard, enabling network-wide energy savings
QoS control for voice and video
Thanks to the high performance of the network, latency-sensitive applications such as voice and video can be deployed. Quality of Service (QoS) features such as VLAN and protocol prioritization provide intuitive and detailed control. The intelligent use of LLDP makes it easy to add devices such as IP phones. Select a voice VLAN in the dashboard and the selected ports will receive the tagged traffic in that VLAN.

Safety

Security Gateways - Rich all-in-one functionality, firewall, IPS, Anti-virus, CIPA content filtering and SafeSearch support
Automatic VPN creation
Unique, automatically created VPN connections between sites allow you to securely and easily connect individual branch offices. Using IPsec protocols, the MX can connect branch offices to the central and each other in the same way as a virtual Ethernet cable connects them. Connections between sites can be established with a single click in the Cisco Meraki dashboard. Traditional inter-site VPN configuration issues are eliminated: route discovery, key negotiation, authentication, security rules, encryption maps, and access lists are all handled automatically from the cloud. Whole and split tunnel VPNs can be easily configured.
Control applications, users and devices
MX is designed for modern networks that are used in many ways and provide extensive visibility and control of users, content, and applications. These are more than just simple host- and port-based solutions. The Layer 7 identification method used by the MX appliance also classifies applications that are encrypted or try to avoid identification, including P2P applications. Unwanted web traffic can be blocked by filtering content following CIPA rules, limiting applications that consume a large portion of bandwidth, such as streaming video and P2P. The MX appliance also provides an overview of users on the network and identifies clients by device type (e.g., iPads) and even usernames. It can be controlled to restrict or block users and apply different rules to different classes of users through integration with Active Directory.
Prevention of penetration
Each Cisco Meraki MX device supports unique threat prevention through the integrated Sourcefire module. Networks can be secured from the latest exploits, vulnerabilities, viruses, rootkits, and other threats in seconds, with threat definitions automatically updated to ensure protection from even the latest types of attacks. Data is presented in real-time, so IT administrators can quickly assess the current threat status - and past trends - and make appropriate decisions.
Content filtering
The content filter on the MX appliance is CIPA compliant and allows administrators to block entire categories of content and individual URLs. Integrating with AD allows different content filtering rules to be applied to different groups. The MX appliance automatically refreshes filter lists from the cloud, so your rules will always be up-to-date, even if the website changes. Integrated Google SafeSearch and YouTube for School technologies allow you to create a secure learning environment without adding additional devices or complex configuration
WAN optimization
Zařízení MX umožňuje nároky aplikací na šířku pásma v rámci lokality až o 99% zrychlit provoz využívající protokoly CIFS, FTP, http a TCP. Nejnovější modul pro optimalizaci WAN využívá pokročilé algoritmy, odstraňování duplicit, kompresi a mazipaměť na bázi pevného disku k tomu, aby byla síť WAN stejně rychlá a výkonná jako LAN. Integrovaná webová mezipaměť výrazně zrychluje fungování webu pro uživatele, kteří sledují videa nebo používají online aplikace
Application-aware firewall
An integrated firewall that protects your network's application from malicious entities. It's no longer enough to block protocols, hosts, and ports - the firewall must also consider users, content, and applications. It protects your network with an Integrated Prevention System (IPS) and Snort-based intrusion prevention, including signature, protocol, anomaly, and threat isolation. Custom rules can be used to secure the network, allowing only approved services and connections. With a single click, you can easily segregate voice, video, and data traffic and deploy global rules across VPNs
Mobile Device Management - Centrally manage mobile devices, tablets and PCs running iOS, Android, Windows and Mac OS X

Poptávkový formulář

Our specialist

Jaroslav Ondruch
Sales manager
+420 724 030 007
jaroslav.ondruch@ictnwt.cz
Company info
ICT NWT s.r.o.
tř. Tomáše Bati 269
760 01 Zlín

IČ: 08217661
GPS: 49.2200622N, 17.6399244E
Contact
Phone:
+420 607 089 773

E-mail:
ict@nwt.cz
(c) 2024 ICT NWT s.r.o.