NETWORK ACCESS CONTROL
Protection against unauthorized access
Centralized control and regulation of all network access provides the administrator with comprehensive control. Unknown devices are detected and reported in real time. Unique identification of devices is based on the MAC address or certificates (802.1X). Additional fingerprints created during device learning increase the level of security. Any action can be user-defined and managed centrally for the entire network in the ruleset - from immediate port shutdown to relocation to an appropriate quarantine VLAN segment.
The advantages to you at a glance:
- Protection against unauthorized access
- Rulesets for your network (from quarantine VLAN to port shutdown)
- Maintenance of network integrity with heterogeneous network structures
- Vendor and technology-independent solution (multi-vendor strategy)
- Mixed operation of SNMP, MAC-based RADIUS and 802.1X