Policies and Profiles

Network policies and profiles are a set of rules that identify, authenticate, authorize, monitor, and account for network-connected devices and users. Policies and profiles can be created and used to configure network rules for handling network security and traffic.

The following processes are automated using the Policies & Profiles feature.
  • Authenticate users and devices.
  • Authorize user and device access.
  • Maintain user and device activity records.
  • Manage network traffic from connected devices.
  • Identify user violations and unauthorized connected devices.
The following are the benefits of creating policies and profiles:
  • You can monitor network performance and traffic.
  • Network violations are detected more efficiently.
  • Threats are detected and contained more quickly.
  • Identify the users and devices that show security risk.
Policies and Profiles

The following Policies and Profiles can be applied to all network devices, users, applications, and Operating Systems (OS):

RADIUS Server Authenticates the user request, identifies if the user is authorized to access the network, and provides the necessary authorization. Once the user accesses the network server, it maintains a record of the user's activities on the network server.
Access Control Identifies, authenticates, and authorizes the devices, OS, and applications requesting network server access.
Client Isolation Prevents wireless devices connected to the same network from communicating with each other.
Wi-Fi Operator Provides a Wi-Fi network comprising guest access APs using a Hotspot 2.0 service.
Identity Provider Provides the necessary authentication and accounting services that enable guest users to gain access to a Wi-Fi network using a Hotspot 2.0 service.
Rogue AP Detection Identifies unauthorized wired or wireless access points connected to the network server.
Syslog Server Specifies the Syslog server address, which allows network connected devices to submit log messages to the specified Syslog server.
VLAN Pools Creates a VLAN pool by grouping together many wireless controller VLANs and reducing network traffic.
SNMP Agent Creates an SNMP Agent Profile with widely accepted protocols to manage and monitor network devices.
Adaptive Policy Creates an Adaptive Policy that configures a destination network to authenticate, authorize, and account for the clients attempting to connect to the network server.