Support Center

Free Shipping

On all orders shipping to the continental US

Free Technical Support

Pre or post order - we are here to help answer questions

Free Assembly

Hardware integration, firmware updates & burnin

Free Solution Architecting

Consult an expert to ensure you get the right product the first time

LIC-ENT-10YR - Meraki MR Enterprise License, 10YR

MFG Part

LIC-ENT-10YR

Inventory

0

Condition

New

Availability

Available



Highlights

  • Performance and scalability
  • User management
  • Centralized management

Marketing description

The Meraki Enterprise Cloud Controller lets administrators build secure and scalable wireless networks quickly, easily, and at a lower cost. It provides centralized management, mobility, and security across multiple access points and deployment sites, and facilitates phenomenal real-time support. As the world's first hosted wireless LAN controller, the Meraki Enterprise Cloud Controller eliminates the cost and complexity of traditional hardware-based wireless controllers.

Product Features

  • Performance and scalability
    Scalable coverage create large-scale networks capable of serving thousands of simultaneous 802.11a/b/g/n devices, while providing a single seamless network experience. Meraki's architecture ensures that there are no bottlenecks or single points of failure in the network, and that coverage can be expanded simply by adding access points. Meraki Mesh extend network coverage to areas without wired Ethernet connections. Meraki's industry leading wireless routing algorithms choose the fastest, most reliable paths through multi-radio, single-radio, and mixed-radio mesh networks. Auto RF dynamically adapt to changing interference conditions and fully utilize the available wireless spectrum. System-wide channel optimization maximizes client performance and client density in the network.
  • Security
    Virtual network isolation operate multiple fully isolated virtual wireless networks, each with its own policies and VLAN-tagged traffic, on a single physical network. Encryption prevent eavesdropping on the wireless network with strong, standards-based encryption methods including WEP, WPA2, and AES. Hosted directory services use best practice WPA2-enterprise with 802.1x authentication. Authenticate against Meraki's hosted directory service, or integrate with existing RADIUS or active directory servers. Rogue AP detection rather than simply reporting all nearby access points, Meraki enables an administrator to quickly identify the access points that may be spoofing the office SSID, or that may be improperly connected to the office's wired network.
  • User management
    Traffic Shaper analyze usage by application and create custom traffic shaping policies on a per user basis. Create bandwidth limits and prioritize critical application traffic, preventing heavy bandwidth users from affecting overall service quality. Historical audit trails obtain a report about wireless traffic in the last hour or the last month. Guest access provide temporary access to an isolated virtual network for guests and vendors. Provide a fully customizable landing page experience without compromising the organization's internal network.
  • Centralized management
    Multi-site management manage multiple branch offices or buildings from a single interface. web-based interface access the Meraki Cloud Controller through a web browser, from anywhere in the world, to securely monitor and administer the wireless network in real-time. Manage your network with familiar and search and map-based tools. Summary reports highlight the productivity and ROI of a Meraki wireless network with these reports, which can be e-mailed to interested parties on a recurring schedule. Role-based administration configure multiple administrator accounts with read-only or full privileges. High availability redundant systems in multiple data centers around the world provide a level of availability impossible with on-site network controllers. In addition, the out-of-band control architecture assures that your access points continue to operate even if your Internet connection fails. "Remote Hands" test tools check the connectivity and performance of a wireless network, simulate user authentication, and more without setting foot on-site or using a command line interface.