Appliances Direct
Laptops Direct
Drones Direct
Better Bathrooms
Furniture 123
Outdoor Living
My Account

Track Order Trade Enquiries Public Sector Enquiries
Inc. VAT vat switch show inc Ex. VAT Inc. VAT vat switch show ex Ex. VAT
£ currency switch £ currency switch

Meraki MR Enterprise Cloud Controller License 3 Years

SKU: LIC-ENT-3YR Quickfind Code: 806232
Why buy me
  • Performance and scalability
  • User management
  • Centralized management

The Meraki Enterprise Cloud Controller lets administrators build secure and scalable wireless networks quickly, easily, and at a lower cost. It provides centralized management, mobility, and security across multiple access points and deployment sites, and facilitates phenomenal real-time support. As the world's ?rst hosted wireless LAN controller, the Meraki Enterprise Cloud Controller eliminates the cost and complexity of traditional hardware-based wireless controllers.

Key Product Info

  • Performance and scalability
  • User management
  • Centralized management

Product Features

  • Performance and scalability
    Scalable coverage create large-scale networks capable of serving thousands of simultaneous 802.11a/b/g/n devices, while providing a single seamless network experience. Meraki's architecture ensures that there are no bottlenecks or single points of failure in the network, and that coverage can be expanded simply by adding access points. Meraki Mesh extend network coverage to areas without wired Ethernet connections. Meraki's industry leading wireless routing algorithms choose the fastest, most reliable paths through multi-radio, single-radio, and mixed-radio mesh networks. Auto RF dynamically adapt to changing interference conditions and fully utilize the available wireless spectrum. System-wide channel optimization maximizes client performance and client density in the network.
  • Security
    Virtual network isolation operate multiple fully isolated virtual wireless networks, each with its own policies and VLAN-tagged traf?c, on a single physical network. Encryption prevent eavesdropping on the wireless network with strong, standards-based encryption methods including WEP, WPA2, and AES. Hosted directory services use best practice WPA2-enterprise with 802.1x authentication. Authenticate against Meraki's hosted directory service, or integrate with existing RADIUS or active directory servers. Rogue AP detection rather than simply reporting all nearby access points, Meraki enables an administrator to quickly identify the access points that may be spoo?ng the of?ce SSID, or that may be improperly connected to the of?ce's wired network.
  • User management
    Traf?c Shaper analyze usage by application and create custom traf?c shaping policies on a per user basis. Create bandwidth limits and prioritize critical application traf?c, preventing heavy bandwidth users from affecting overall service quality. Historical audit trails obtain a report about wireless traf?c in the last hour or the last month. Guest access provide temporary access to an isolated virtual network for guests and vendors. Provide a fully customizable landing page experience without compromising the organization's internal network.
  • Centralized management
    Multi-site management manage multiple branch of?ces or buildings from a single interface. web-based interface access the Meraki Cloud Controller through a web browser, from anywhere in the world, to securely monitor and administer the wireless network in real-time. Manage your network with familiar and search and map-based tools. Summary reports highlight the productivity and ROI of a Meraki wireless network with these reports, which can be e-mailed to interested parties on a recurring schedule. Role-based administration con?gure multiple administrator accounts with read-only or full privileges. High availability redundant systems in multiple data centers around the world provide a level of availability impossible with on-site network controllers. In addition, the out-of-band control architecture assures that your access points continue to operate even if your Internet connection fails. "Remote Hands" test tools check the connectivity and performance of a wireless network, simulate user authentication, and more without setting foot on-site or using a command line interface.


More Enterprise products

See all Enterprise products »

You may also like

Recently viewed

Back to top