Cisco NAC Guest Server NAC3310-GUEST-K9 Data Sheet
Product codes
NAC3310-GUEST-K9
Data Sheet
All contents are Copyright © 1992–2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.
Page 1 of 5
Cisco NAC Guest Server
Product Overview
Cisco
®
NAC Guest Server facilitates the creation of guest accounts for temporary network access
by permitting any internal user to sponsor a guest and create the guest account in a simple and
secure manner. In addition, the whole process is recorded in a single place and stored for later
reporting, including details of the network access activity.
Applications
Cisco NAC Guest Server is ideal for organizations that may need to provide Internet access to
visiting customers and partners. Productivity demands and advances in mobility have transformed
enterprises into major “hot spots.” The Cisco NAC Guest Server can vastly simplify the process of
offering guest access accounts in a simple, secure, and flexible way.
Features and Benefits
Cisco NAC Guest Server enables your organization to do the following:
●
Decrease deployment and management costs: Cisco NAC Guest Server allows trusted
employees to create guest accounts quickly and securely. This removes the burden from IT
and helpdesk personnel.
●
Reduce deployment risk: Automating temporary account provisioning with a fixed policy
reduces the risk of human error and allows for removal at the correct time.
●
Improve productivity for guests: The simplicity of creating guest accounts will lead to an
uptake of guest usage and the productivity benefits that are associated with providing guest
access.
●
Improve customer and partner satisfaction: Providing guest access for visitors greater
collaboration. Customers and partners alike appreciate this capability.
Sponsor Authentication
Cisco NAC Guest Server provides the ability for sponsors—employees of the host company—to
create guest accounts. Sponsors are authenticated against the Web interface on the guest server
and are granted permissions based upon their role. The administrator decides which policies
should be applied against each user role.
Authentication of the sponsor is performed against either an internal user account database
defined by the administrator, or against the organization’s Active Directory implementation.
Sponsors are assigned to a role based upon the groups they belong to in Active Directory or they
are assigned to a user on a local database. Sponsors can be given role-based permissions to
create accounts, edit accounts, suspend accounts and run reporting. These permissions can be
granted to only accounts they created, all accounts, or not granted at all.