Professional Documents
Culture Documents
Customer Experience June 2020 - Meraki Access
Customer Experience June 2020 - Meraki Access
Customer Experience June 2020 - Meraki Access
2
They have networks that are
4
Determining OpEx in Network Operations and
Management
• Number of devices and ports under management
• Each device has to be: provisioned, monitored, audited, insured and backed up
• Number of management points
• “Controller-based architectures are designed to provide central points of control
through which entire networks can be managed, reducing the number of
administrative touch points in the network.” (1)
• Better visibility / More agility / Easier Integration
• Amount of integration points
• Switching + Wireless / Switching + Wireless + WAN
• Number of management models
1) https://www.datacenterknowledge.com/archives/2014/02/24/5-major-drivers-opex-enterprise-network
C97-740150-02 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Partner Confidential
Network Architecture Evolution
SW SW AP AP Branch 1 Branch 2
MPLS
SW SW AP AP Branch 3 Branch 4
SW SW AP AP Branch 5 Branch 6
SW SW AP AP Branch 1 Branch 2
MPLS
O
SW SW AP AP Branch 3 WWW Branch 4
SW SW AP AP Branch 5 Branch 6
Virtualized
Management SNMP WLC Controller every
Controller
SD-WAN?
Plane “Single Panes of Glass” WLC “X” APs
WLC
C97-740150-02 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Partner Confidential
Network Architecture Evolution
SW SW AP AP Branch 1 Branch 2
WWW
MPLS+
SW SW AP AP Branch 3 WWW Branch 4
SW SW AP AP Branch 5 Branch 6
Dashboard Dashboard
Meraki Meraki
C97-740150-02 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Partner Confidential
Network Architecture Evolution
Unified Architecture
SW SW AP AP Branch 1 Branch 2
WWW
MPLS+
SW SW AP AP Branch 3 WWW Branch 4
SW SW AP AP Branch 5 Branch 6
Dashboard
Meraki
C97-740150-02 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Partner Confidential
The Meraki Platform
A Complete Cloud-Managed IT Portfolio from a Single Pane of Glass
MR MS MX MG
Wireless Access Ethernet Security & SD-WAN Cellular
Points Switches Appliances Gateways
MI SM MV
Insight Endpoint Smart
[Application & WAN] Management Cameras
Built on top of the most battle-tested cloud networking
solution
C97-740150-02 © 2019 Cisco and/or its affiliates. All rights reserved. Cisco Partner Confidential
Why customers choose Meraki for Wired Access
Intuitive, centralized management
• All Meraki devices are configured through a single-pane-of-glass
• No training or complex command line script required
• Visualize and manage all switch ports on the Meraki dashboard
with Virtual Stacking
Industry-leading visibility
• User, application, and device analytics
• Network-wide monitoring and alerts to reduce response times
• Remote packet capture and other diagnostics tools
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Meraki Access Benefits
Zero Touch Provisioning
and Configuration Virtual Stacking Staged Upgrades Fullstack Visibility and
Templates Assurance
No need to get rid of your old Switch when the cloud controller upgrades
Simplified Assurance
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Introducing Meraki Health
© 2020
2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Meraki Health, Full Stack Assurance
10%
100%
100%
100%
80%
© 2020
2019 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Policy and Security Automation
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco Meraki SecureConnect
BETWEEN MR + MS DEVICES
On MS210 and above
On MR 802.11ac Wave 2 and 802.11ax APs
MS authorizes
MR requests port based on
MR connected certificate from configured
to MS Cisco PKI profile
1 2 3 4 5
MS permits MR
Meraki authenticates
dashboard with acquired
connection for certificate
MR
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Securing the Network
can be Hard
Securing various network
devices is manual and difficult
C97-740150-00 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
1
Securing the
Application Layer
can be Complicated
Malicious cyber-attacks are
evolving
C97-740150-00 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
2
Securing the devices
and users adds to the
complexity
IOT devices don't support
802.1x and BYOD policies
stress security postures
C97-740150-00 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
3
Too Many Obstacles
for Comprehensive
Security
Everything is manual and done
through
multiple dashboards
C97-740150-00 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
4
The Perimeter is
evolving into
micro-perimeters
Customers need a security
posture and a framework that
works across the whole network
C97-740150-00 © 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
5
Introducing Adaptive Policy
Policy decoupled from IP addressing delivers scale and consistency
organization-wide, simply
Internal
Services
IoT
IT Admins Employees
Devices
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Flexible Tag Assignment
LAB VLAN
10.10.10.0/24
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
One Consistent Policy Across All Sites
M
SRC | DST Employee IoT IoT Server
Employee
IoT
IoT Server
M
M
M
Policy & Groups are configured in dashboard and pushed to
Adaptive Policy nodes like any other Meraki configuration change
© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Live Demo