Meraki MR34 Cloud Managed AP MR34-HW Hoja De Datos

Los códigos de productos
MR34-HW
Descargar
Página de 6
Cisco Systems, Inc.  |  500 Terry A. Francois Blvd, San Francisco, CA 94158  |  (415) 432-1000  |  sales@meraki.com
6
Security Tools for Administrators
In addition to Meraki’s secure out-of-band architecture and hardened datacenters, Meraki provides a number of tools for administrators to 
maximize the security of their network deployments. These tools provide optimal protection, visibility, and control over your Meraki network.
Two-factor authentication
Two-factor authentication adds an extra layer of security to an organization’s network by requiring access to an administrator’s phone, in 
addition to her username and password, in order to log in to Meraki’s cloud services. Meraki’s two factor authentication implementation uses 
secure, convenient, and cost effective SMS technology: after entering their username and password, an administrator is sent an a one-time 
passcode via SMS, which they must enter before authentication is complete. In the event that a hacker guesses or learns an administra-
tor’s password, she still will not be able to access the organization’s account, as the hacker does not have the administrator’s phone. Meraki 
includes two-factor authentication for all enterprise users at no additional cost.
Password policies
Organization-wide security policies for Meraki accounts help protect 
access to the Meraki dashboard. These tools allow administrators to:
•  Force periodic password changes (e.g., every 90 days)
•  Require minimum password length and complexity
•  Lock users out after repeated failed login attempts
•  Disallow password reuse
•  Restrict logins by IP address
 
Role-based administration
Role-based administration lets supervisors appoint administrators for 
specific subsets of an organization, and specify whether they have 
read-only access to reports and troubleshooting tools, administer 
managed guest access, or can make configuration changes to the 
network. This minimizes the chance of accidental or malicious mis-
configuration, and restricts errors to isolated parts of the network.
Configuration change alerts
The Meraki system can automatically send human-readable email 
and text message alerts when configuration changes are made, 
enabling the entire IT organization to stay abreast of new policies. 
Change alerts are particularly important with large or distributed IT 
organizations.
Configuration and login audits
Meraki logs the time, IP, and approximate location (city, state) of 
logged in administrators. A searchable configuration change log indi-
cates what configuration changes were made, who they were made 
by, and which part of the organization the change occurred in.
SSL certificates
Meraki accounts can only be accessed via https, ensuring that all 
communication between an administrator’s browser and Meraki’s 
cloud services is encrypted.
Idle Timeout
30 seconds before being logged out, users are shown a notice that 
allows them to extend their session. Once time expires, users are 
asked to log in again.
Configuration Change Audits
Role-Based Administration
Password Security Policies