Policies and Profiles

Network policies and profiles are a set of rules that identify, authenticate, authorize, monitor, and account for network-connected devices and users. Policies and profiles can be created and used to configure network rules for handling network security and traffic.

The following processes are automated using the Policies & Profiles feature.
  • Authenticate users and devices.
  • Authorize user and device access.
  • Maintain user and device activity records.
  • Manage network traffic from connected devices.
  • Identify user violations and unauthorized connected devices.
The following are the benefits of creating policies and profiles:
  • You can monitor network performance and traffic.
  • Network violations are detected more efficiently.
  • Threats are detected and contained more quickly.
  • Identify the users and devices that show security risk.
Policies and Profiles

The following Policies and Profiles can be applied to all network devices, users, applications, and Operating Systems (OS):

RADIUS Server Authenticates the user request, identifies if the user is authorized to access the network, and provides the necessary authorization. Once the user accesses the network server, it maintains a record of the user's activities on the network server.
Access Control Identifies, authenticates, and authorizes the devices, OS, and applications requesting network server access.
Client Isolation Prevents wireless devices connected to the same network from communicating with each other.
Wi-Fi Operator Provides a Wi-Fi network comprising guest access APs using a Hotspot 2.0 service.
Identity Provider Provides the necessary authentication and accounting services that enable guest users to gain access to a Wi-Fi network using a Hotspot 2.0 service.
MAC Registration List Creates MAC address lists to enable device access to wireless networks.
Rogue AP Detection Identifies unauthorized wired or wireless access points connected to the network server.
Syslog Server Specifies the Syslog server address, which allows network connected devices to submit log messages to the specified Syslog server.
VLAN Pools Creates a VLAN pool by grouping together many wireless controller VLANs and reducing network traffic.
SNMP Agent Creates an SNMP Agent Profile with widely accepted protocols to manage and monitor network devices.
Tunnel Profile It provides IP addresses to end-devices.
Adaptive Policy Creates an Adaptive Policy that configures a destination network to authenticate, authorize, and account for the clients attempting to connect to the network server.
Location Based Service Server Creates a Location Based Service (LBS) Server profile that is linked to multiple venues, allowing for efficient tracking and management of location-specific information.
Certificate Template Creates certificates to establish temporary communication and verify the identity of entities in a network.
HQoS Bandwidth Hierarchical Quality of Service (HQoS) bandwidth refers to the allocation and management of network bandwidth using a hierarchical approach.
SoftGRE Soft Generic Routing Encapsulation (SoftGRE) is a tunneling method that lets an AP send traffic to a SoftGRE gateway without needing specific settings for each AP.
Directory Server A Directory Server uses Active Directory or Light Directory Access Protocol (LDAP) to manage directory information, such as user profiles, authentication credentials, and network resource information.