Você está na página 1de 99

Cisco Customer

Education
Get Your Head In The Cloud with Cisco Meraki Cloud Networking and
Communications

This session was recorded via Cisco WebEx! You can


watch the live session recording via the following URL:

https://acecloud.webex.com/acecloud/lsr.php?RCID=640
1af39c7024374ace8c7b513387fcb

Thanks for your interest and participation!


Cisco Customer
Education
Get Your Head In The Cloud with Cisco Meraki Cloud Networking and
Communications

Connect using the audio conference


box or you can call into the meeting:

1. Toll-Free: (866) 432-9903

2. Enter Meeting ID: 201 033 721


and your attendee ID number.

3. Press “1” to join the conference.


Presentation Agenda About Your Host
Brian Avery
Territory Business Manager
Cisco Systems, Inc.
► Who is Cisco? bravery@cisco.com
Priors:
Cisco Sales and Channels (10.5 yrs)
President and CEO (6 yrs) - Cisco Premier Partner
Director of Sales (2 yrs) - Cisco Silver Partner
► Why Cloud, Why Now… Financial Analyst (7 yrs) - Sprint Corporation

► Introducing Cisco Meraki Cloud Networking

► Cisco Meraki Product Review

► Conclusion
Who Is Cisco?

© 2014 Cis co a nd/or its a ffilia te s . All rights re s e rve d. Cisco Confidential 4
1984
Compute r s cie ntis ts ,
Le n Bos a ck a nd S a ndy Le rne r
found Cis co S ys te ms

Bos a ck a nd Le rne r run ne twork


ca ble s be twe e n two diffe re nt
buildings on the
S ta nford Unive rs ity ca mpus

A te chnology ha s to be inve nte d to de a l


with dis pa ra te loca l a re a protocols ;
the multi-protocol router is born

© 2014 Cis co a nd/or its a ffilia te s . All rights re s e rve d. Cisco Confidential 5
Leading for Nearly 30 Years

Inte rne t of Eve rything


Alca te l HP Micros oft
We llFle e t Ba y Ne tworks S ie me ns J unipe r
As ce nd Extre me Erics s on Che ckpoint Aris ta
P rote on ACC 3Com The La nds ca pe
Norte l Foundry Aruba Rive rbe d
S ynOptics Ne wbridge
Rive rs tone NEC
Ava ya S hore Te l is Cons ta ntly
Fore
3Com DEC Ca ble tron
Luce nt
De ll F5 Hua we i
Fortine t
Cha nging
IBM Xyla n J unipe r Re dba ck Broca de P olycom

1990 – 1995 1996 – 2000 2001 – 2007 2008 – Toda y 2016

© 2013-2014 Cis co a nd/or its a ffilia te s . All rights re s e rve d. Cisco Confidential 6
Who Is Cisco?

• Dow Jones Industrial Average


Fortune 100 Company (AAPL, CSCO, INTC, MSFT)

• $117B Market Capitalization

• $49.6B in Revenue

• $10B in Annual Net Profits


Chuck Robbins,
• $34B More Cash than Debt CEO, Cisco

• $6.3B in Research and Development

http://finance.yahoo.com/q/ks?s=CSCO+Key+Statistics
Cisco Confidential 7
Market Leadership Matters

No. 1 No. 1
Routing No. 1 No. 1 Switching No. 1
Edge/Core/ TelePresence Wireless LAN Modular/Fixed Voice
Access
47% 50% 50% 65% 41%

No. 1 No. 2 No. 1


Web x86 Blade Storage Area No. 1

Conferencing Servers Networks Security


43% 29% 47% 31%

© 2013-2014 Cis co a nd/or its a ffilia te s . All rights re s e rve d. Cisco Confidential 8
What Is the Cisco Customer Education Series?

 CCE is a n e duca tiona l s e s s ion for curre nt a nd


pros pe ctive Cis co cus tome rs
 De s igne d to he lp you unde rs ta nd the ca pa bilitie s a nd
bus ine s s be ne fits of Cis co te chnologie s
 Allow you to inte ra ct dire ctly with Cis co s ubje ct ma tte r
e xpe rts a nd a s k que s tions
 Offe r a s s is ta nce if you ne e d/wa nt more informa tion,
de mons tra tions , e tc.

© 2014 Cis co a nd/or its a ffilia te s . All rights re s e rve d. Cisco Confidential 9
Why Cloud, Why Now?

© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
Too much complexity. The business New approaches
Too hard to change. is frustrated. are required.
IT is frustrated.

The Business Case for Cloud Networking


© 2013 Cisco and/or its affiliates. All rights reserved. 11
Unified Access: Traffic Trends
Fixed/Wi-Fi IP Traffic Surpasses Fixed/Wired IP Traffic

120,000 Mobile Data (70% CAGR)


Fixed/Wired (20% CAGR)
Fixed/Wi-Fi (34% CAGR)
100,000
Petabytes per Month

80,000
53%

60,000

40,000

40%
20,000

7%
-
2011 2012 2013 2014 2015 2016

Source: Cisco VNI Global Mobile Data Traffic Forecast, 2012–2017

© 2013 Cisco and/or its affiliates. All rights reserved. 12


The Internet of Things
What Is the Internet of Things?

“ The Internet of Things is the


intelligent connectivity of physical
devices driving massive gains in
efficiency, business growth, and
quality of life.”

© 2 0 1 3 - 2 014 Cis c o a nd / or its a ffilia te s . All rig hts re s e rve d . Cisco Confidential 14
IoT Is Here Now – and Growing!
50
BILLIONS OF DEVICES
50 Billion
40 “ Smart Objects”

Rapid Adoption
30 Rate of Digital
Inf rastructure:
5X Faster Than
20
The New Essential Infrastructure
Inflection
25 Electricity and
Telephony
Point
12.5
10 World
Population
6.8 7.2 7.6
0
TIMELINE
2010 2015 2020
Source: Cisco IBSG, 2011
© 2 0 1 3 - 2 014 Cis c o a nd / or its a ffilia te s . All rig hts re s e rve d . Cisco Confidential 15
Introducing
Cis co Me raki
Cloud- Manage d Ne tworking

http://me raki.cis co.com/


Cloud Managed WiFi Cloud Managed Network Cloud Managed
(2006) (2010) Enterprise
(2015)

MR Wireless LAN MS Ethernet Switches MX Security Appliances SM EMM MC Communications

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
About Cisco Meraki

Complete cloud-managed IT solution


Wireless, switching, security, MDM, communications
Integrated hardware, software, and cloud services
Single pane–of–glass management over locations, infrastructure, and devices

Leader in simplifying IT
Among Cisco’s fastest-growing portfolios
Over 100,000 customers worldwide
Millions of managed devices online

WiFi • Switching • Security • MDM • Communications

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
Manageability Scalability Cost Savings

• Turnkey installation and management

• Integrated, always up to date features

• Scales from small branches to large networks

• Reduces operational costs


1 billion iOS & HD vide o a nd Ne w bus ine s s
Android de vice s rich me dia opportunitie s

Inte gra te d La ye r 7 Ana lytics


mobile de vice a pplica tion a nd us e r
ma na ge me nt s ha ping e nga ge me nt

A complete solution out of the- box:


No extra hardware, software, or complexity
Cisco
Architecture

Cisco Traditional Cisco Meraki


Meraki Systems Systems Manager
Manager EMM Cisco ISE EMM
Policy & Control

ISR / ASA MX

Cisco Prime MS
Catalyst
Management
& Analytics
Aironet MR

On- Prem Managed Cloud Managed


• Secure out- of- band management: No
user traffic flows through the cloud
• Reliable: Network stays up if
connection to cloud is lost
• Scalable: Supporting customers with
thousands of sites, millions of clients
• Future- proof: New features
delivered seamlessly from the cloud
Wired, Instant
wireless & search
EMM
Location
Client analytics
fingerprints

Security &
Application
bandwidth
visibility
policy

Real-time
control
Integrated
MDM

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
User/device fingerprinting Conte nt filte ring Mobile a pplica tion de ployme nt

Applica tion fire wa ll Ne twork a cce s s control WAN optimiza tion


Deploy and grow networks at
branch locations or large campuses
easily and rapidly

Manage and monitor those networks


with robust analytics from a single
pane of glass

Reduce administrative overhead with


simple all-inclusive licensing
models and tools

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Hardware purpose-built for cloud management
3rd radio
integrated with
cloud-based
CPU for layer 7 WIDS/WIPS
security / QoS
at Gigabit rates

Power circuitry
optimized for
802.3af PoE
Flash memory
architected for
fault-tolerant Pre-configured
auto upgrades for zero-touch
provisioning

3-stream
RAM
802.11ac with
provisioned for
custom RF
out-of-band
front-end
management

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
3 stream, dual concurrent radios with 1.75 Gbps
aggregate radio rate for high throughput and density

Layer 7 application fingerprinting classifies and controls


evasive, encrypted, and P2P traffic
- Inspects packets and applies policies at full .11ac
speed
- Prioritize business apps, real-time traffic
- Limit recreational, bandwidth-hungry apps

User and device fingerprinting for identity-based


QoS policies

Airtime fairness algorithms for high-density networks

Cloud-based signature updates respond to new apps


C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Radio dedicated to scanning and protecting RF environment
- Instantly detects and mitigates interference, vulnerabilities, and attacks
on all channels
- 3rd radio enables full-time scanning with full-performance client access
on 2.4 GHz and 5 GHz radios

Deeply-integrated with cloud-based software solutions:


Air Marshal (security), Auto RF (performance)

No added cost or complexity


- Typical deployments: radio operates in background (zero-config)
- Power users: rich tools available for security and RF management
- No added cost: no extra hardware, software, or licenses

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
Protect network with dedicated scanning radio
linked to powerful cloud-based software

Detects and classifies nearby APs using rich


heuristics

Identifies vulnerabilities and attacks:


- Unmanaged / insecure APs plugged into LAN
- Malicious rogues spoofing WLAN
- Packet floods, malicious broadcasts

Contains rogue APs, blocking clients from


associating

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
Scans all channels for interference,
tuning performance with cloud
intelligence

Optimized for mixed 802.11ac and


802.11n environments

Cloud-based engine analyzes RF data,


Visualize interference with high-resolution optimizes channels and power across
spectrum analyzer network

Responds automatically to challenging


or dynamic RF environments

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
Part of a complete solution
Multi-site
management Instant
search

User Location
fingerprints analytics

Real-time
control Application
QoS

Same out-of-the-box feature set as other Meraki MR wireless APs


C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Wireless feature velocity
through
2016

December
2014

Enterprise features driven by demand

Innovative features that redefine the industry standard

© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Cisco Meraki AP Lineup – Spring 2016

Indoor
APs
MR18 MR32 MR34 MR42
2 Stream Triple-Radio 2 Stream Triple-Radio 3 Stream Triple-Radio 3 Stream Triple-Radio
802.11a/b/g/n 802.11ac 802.11ac 802.11ac Wave 2
Bluetooth LE Bluetooth LE

Outdoor
APs
MR62 MR66 MR72
Single-Radio Dual-Radio 2 Stream Triple-Radio
802.11b/g/n 802.11a/b/g/n 802.11ac
Bluetooth LE

36

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
© 2014 Cisco and/or its affiliates. All rights reserved.
Mission critical network infrastructure:
• Rapid deployment across branch/retail locations

• Branch operations and management

• VoWLAN, mobile displays, paperless branch

New possibilities with ubiquitous mobile devices:


• Analyze foot traffic through smartphones
• Extend branding to WiFi sign-on
• Develop location-aware applications
• Create new revenue opportunities and increase
customer loyalty

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Connected Mobile Experiences (CMX) with Cisco Meraki

Detect Connect Engage

Anonymous data Guest WiFi optimized APIs for real-time


about every visitor for branding location based apps

100% cloud-managed user analytics and engagement


with Cisco Meraki wireless networks
C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Cloud-based CMX architecture

Cloud-based Location API (push) Customer CRM


network management & business
& analytics intelligence

Location analytics
dashboard

Location-based
offers and
engagement

Detect visitors via


WiFi probes

Customized
WiFi sign-on

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Optimized for distributed environments
View all sites from Compare visitor
single dashboard metrics between
sites

Provision new
locations without Compare regions,
on-site IT brands, etc. with
tag-based
analytics

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Anonymous visitor analytics
- MAC addresses of unconnected users are
cryptographically hashed for anonymity

Data privacy
- Cisco does not sell, share, or correlate location data
- Cloud infrastructure is strongly secured, PCI compliant,
and subjected to 3rd party security audits

Global opt-out
- End-users may opt out of CMX across all Cisco Meraki
customer networks at http://account.meraki.com/optout

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Applications cut across verticals
Retail & Restaurant Hospitality Education Healthcare

Compare visitor Deliver real-time Determine peak vs Deliver public


conversion rates coupons for nearby slow times at libraries, announcements
between stores amenities student centers via WiFi sign-on

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
Measure visitor trends over time

Determine conversion ratio of visitors to customers

Evaluate marketing effectiveness

Optimize staffing by detecting peak and slow times

Traditional people counters


use thermal, infrared, or video

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Wireless APs count mobile devices
- Count people by their probing mobile
devices (no WiFi connection required)
- Measure dwell time via repeated probes
- Detect repeat visitors by comparing
MACs
- Determine location via signal strength

Advantage over traditional people counters


- Utilize existing WiFi infrastructure
- More precise dwell-time
Wireless APs “hear” every mobile device - Detects repeat visitors
as they look for WiFi networks

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
Powerful analysis and visualizations

Compare locations or groups


of sites

Nearby and on-site foot traffic


determines “capture rate”

High-precision dwell time

First-time, occasional, and


regular visitors

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
Rich comparison and visualization tools

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 49
Analyzes website, application, and device usage

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 50
C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 51
• Customizable splash pages for branding
and promotions
• PCI-compliant firewall isolates guests
from LAN, cardholder data
• Application traffic shaping prevents
network congestion and controls
bandwidth cost

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 52
• Facebook and Cisco partnered for seamless
integration
• “Check in” to company Facebook page for
WiFi sign-on
• Build Facebook following, garner demographic
information, share offers and announcements

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 53
C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54
Presence API

Shopper Presence
(associated or non-
associated)

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 55
Bluetooth and Beacons
Bluetooth Low Energy (BLE) is a form of
Bluetooth designed for very low power
- Found in many consumer devices: smartphones,
headsets, fitness trackers, etc.

Beacons use BLE for location services like


asset tracking, mobile commerce, and nav
- iBeacon is Apple’s BLE trademark

Fast becoming the alternative to WiFi for


location services

MR32, MR72: Integrated Bluetooth to drive location trends


C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 56
1

1
010
011010101110110
11010001001001001
100101011001111
100
1

3 4 5
2
1. AP deployed in contextual area, configured as specific 3. App hears Beacon, alerts on lockscreen.
Beacon. 4. User launches app for location-related engagement.
2.C97-731719-02
User with © 2014 context-aware mobile
Cisco and/or its affiliates. All app walks by Beacon
rights reserved. 5. (Optional) App communicates with backend systems for
Cisco Confidential 57

location. dynamic content or analytics.


How it works

1. App hears a Beacon


Meraki App now

Welcome to Meraki
HQ! Please help 2. Looks up Beacon to determine location
yourself to a snack •UUID/Major/Minor
while waiting for
your host.
slide to view
3. Notifies user with contextual message

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 58
How it works

1. App hears a Beacon


Meraki App now

The wall before you


shows every Meraki 2. Looks up Beacon, determines proximity
employee. Legend •UUID/Major/Minor, RSSI
to the right.
slide to view

3. Notifies user with contextual message

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 59
How it works

1. App hears multiple Beacons

2. Sends Beacon info to backend server


•UUID/Major/Minor, RSSI

3. Server trilaterates based on floorplan

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 60
Use Case: Asset Tracking with Bluetooth
Track Beacon-tagged assets Seamless site-wide Increased administrative
with Bluetooth scanning and deployment with Bluetooth visibility with both WiFi and
location estimation integrated into the AP Bluetooth inventory built-in

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 61
3rd-party
remote configuration remote
beacon
inventory & site mapping
802.11ac WiFi
nearfield
+ Integrated BLE Beacon
engagement

Dashboard management
Context-
aware
mobile
app

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 62
802.11ac WiFi, integrated BLE
- Site-wide Beaconing
- Client inventory & macro location analytics
- Remote beacon fleet management

TECHNOLOGY PARTNERS

Remote beacon overlay


- “Immediate zone” beaconing
- Micro-location mapping (<1m)
- Beacon-aware SDKs

Mobile app integration

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 63
Intelligent Networking on the Cisco Meraki MS
MS Access Switches

Switch
highlights

PoE / PoE + on all ports


Remote packet capture, cable
testing
Voice and video QoS
Layer 7 app visibility
 Gigabit edge switches in 24 and 48 port configurations with available
Virtual stacking
PoE/PoE+
Fastest Growing Meraki Product
 Layer 2 and 3 options in % Bookings

 Primary Differentiators: Virtual Stacking, visibility and live tools


Centralized cloud
management scales to
thousands of sites

Multi-site visibility and Map-based dashboard; configuration sync; remote diagnostics; automatic monitoring
control and alerts
Zero-touch provisioning Devices automatically provision from the cloud, no staging required;
Traffic acceleration Application-aware QoS prioritizes productivity apps
Layer 7 application traffic Throttle, block, or prioritize application traffic with DPI-based fingerprinting; set user
shaping and group-based shaping rules
Benefits of virtual stacking apply equally to standalone or physically stacked switches

San Francisco
Apply Access Policy
London Standalone
on ports 1-10 switches
Sydney

Step 1: Select ports to edit

Step 2: Configure multiple ports as desired


Stacked
Step 3: Save, you’re done! San Francisco
switches
MX Next Generation Security Appliances

Security
NG Firewall, Site- to- Site VPN,
Client VPN, IDS, IPS

Networking
NAT/DHCP, Routing,
Link Balancing, IWAN

Application Control
Traffic Shaping, Content
Filtering

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 71
SOURCEfire IDS / IPS, updated
Best IPS
every day

Advanced Malware Protection


Anti-Malware powered by Cisco Sourcefire and
Talos

4+ billions URLS, updated in real-


Content Filtering
time

Geo-based
Block attackers from rogue countries
security

AV / anti-phishing Kaspersky AV, updated every hour

PCI L1 certified cloud-based


PCIC97-731719-02
compliance
management
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 72
Dual-active path:
• Active-active VPN + VPN
• Active-active VPN + MPLS

Performance-based routing (PfR):


WAN 1 WAN 2
• Ensures the best uplink is used based on Secure VPN tunnel (active) Secure VPN tunnel (active)
Latency / loss < threshold
latency and loss metrics Latency / loss > threshold

• Dynamic path selection

Policy-based routing (PbR) :


• Allows uplinks to be intelligently
assigned based on traffic protocol,
subnet, source, destination, etc.

Based on L3 / L4 categorization, this data


normally travels out WAN 1 (PbR), but MX
detects optimal path is WAN 2 based on
Data latency / loss on WAN 1 (PfR).

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 73
Advanced Security License
Enterprise License

Stateful firewall All enterprise features, plus

Site to site VPN Content filtering (with Google SafeSearch)

Branch routing Kaspersky Anti-Virus and Anti-Phishing

Internet load-balancing (over dual WAN) SourceFire IPS / IDS

Application control Geo-based firewall rules


`
Web caching Advanced Malware Protection (AMP)

Intelligent WAN (IWAN)

Client VPN

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 74
© 2010 Cisco and/or its affiliates. All rights reserved.
Meraki Systems Manager
Cloud Managed Mobility Management
Provision, monitor, and secure mobile devices

Flexible, easy Centrally scale 100,000s Auto-tagging, dynamic Integrate seamlessly with
provisioning devices worldwide security compliance the rest of your Cisco
network
© 2010 Cisco and/or its affiliates. All rights reserved. 76
• Secure BYOD
Enable mobile access to corporate email and data
Permit employee devices for day-to-day activities
Allow corporate network access on-site/at home

• Corporate device management


Provide mobile access to corporate email, data
Managed enterprise software & applications
Remotely troubleshoot, maintain, & monitor

• Data Security & Network Access Control


Remotely wipe lost or stolen devices
Restrict enterprise data based on device security
Control network access based on security posture

© 2010 Cisco and/or its affiliates. All rights reserved. 77


1. Deployment and Rollout
Corporate device configuration
Track owner inventory & the unbox/break-fix process
Securely enroll personal and corporate devices

2. Installing/Managing Software and Apps


Inventory software and licenses in-use by device
Remotely install/push corporate applications
Re-use and track app licenses
Remotely troubleshoot problems

3. Protect Corporate Assets and Data


Enable secure VPN into Corporate network
Enable secure email, calendar, contacts access
Remotely wipe/partition corporate data
Monitor device usage and security risks

4. Control Network Access


Manage network access based on user, security posture, location

© 2010 Cisco and/or its affiliates. All rights reserved. 78


One-step Enrollment
• Browser: m.meraki.com with NetworkID
• SM app: NetworkID or QR code
• Email/SMS: enrollment link

Automatic Enrollment
• Meraki integrates directly with Apple’s DEP portal
• Supervise devices, disable profile removal, skip setup

Secure Enrollment by user/group


• Authenticate device enrollment
• Automatically inventory devices
• Automatically license and push apps
• Automatically configure email, network access

© 2010 Cisco and/or its affiliates. All rights reserved. 79


• Grant and revoke VPP licenses directly
from the Meraki Dashboard

• Remotely install and inventory MSI and


PKG files across devices

• Auto push and remove apps by


department/employee/contractor using
AD groups and bulk tagging

• Blacklist/monitor for inappropriate apps


and automatically restrict/lock-down

© 2010 Cisco and/or its affiliates. All rights reserved. 80


© 2010 Cisco and/or its affiliates. All rights reserved. 81
• Containerize email/calendar/contacts on
mobile devices

• Securely share data and enable end


users with a private app store

• Automatically revoke corporate data if


devices violate location/security policies

Prevent data leakage by separating


• Control data access based on AD/LDAP- corporate and private data
authenticated owner identity

© 2010 Cisco and/or its affiliates. All rights reserved. 82


• Apply network group policies based on device security status
• Set mobile-specific network policies
• Automatically grant/revoke WiFi, VPN, and Exchange access

© 2010 Cisco and/or its affiliates. All rights reserved. 83


• Authenticate devices using AD/LDAP/Meraki Authentication before they can access your
network
- Automatically use an MX Security Appliance as an Active Directory Gateway
- Any PC or Mac device with the Systems Manager agent can also be used as an AD Gateway

© 2010 Cisco and/or its affiliates. All rights reserved. 84


Notable Mobile Device deployments
Uber 160,000+
Chicago Public Schools 60,000+
AIA Insurance 50,000
SAP 20,000
United Airline 11,000
IBM 10,000

“One advantage in cloud-based services is the speed in getting


users deployed with MDM.” — Phillip Redman, Gartner

The cloud enables scalable mobile device deployment

© 2010 Cisco and/or its affiliates. All rights reserved. 85


Cloud-based Communications
The Simple
Experience

Cisco confidential 86
• Streamlined deployment
• Simplified management
• Delightful end–user experience
• Single pane–of–glass
management with Meraki
network
• First in a series

Managed through the cloud, integrated with the network

Cisco confidential 87
A Meraki VoIP solution includes a 1:1 ratio of hardware and licenses

Licensing is required and includes:


Centralized management and network-wide
+ visibility and control
Seamless firmware and security updates
24/7 Enterprise support and a 2 year warranty
hardware license

Cloud licenses can be purchased in 1, 3, 5, 7, or 10 year durations contingent on the needs of the
customer
Cisco confidential 88
Hardware Feature
Highlights

Two USB Ports


One 3.5mm Headset Jack
Gigabit switch for PC and LAN
Voice VLAN capable
High Resolution Touch Screen

Support for third party USB headsets from Plantronics and Jabra

Built in switch so the entire desktop workstation only consumes one network port resulting in
capacity cost savings

Cisco confidential Check the MC Datasheet for the latest features 89


UI Feature Highlights

Web Self Service portal


Call forwarding
Voicemail
Outbound calls
Contact photos for directory entries
Directory Integration with Google
Apps

All configuration and call monitoring is done right from one central location in Dashboard

Cisco confidential Check the MC Datasheet for the latest features 90


Visual Voicemail

Conferencing

Workgroups (beta)

Music On Hold

Automated attendant/IVR Menus


Basic call features (hold, transfer,
multiple simultaneous incoming calls,
caller ID)

Secure end to end calls via Secure SIP


(TLS) for signaling and SRTP for media
streams

Phones assigned extensions (4-6


digits) and DIDs (10 digits)Check the MC Datasheet for the latest features
Cisco confidential 91
Retail Commercial Offices Teleworkers
Quick and easy deployment Scale easily as you grow Remove VPN/complex design

Management anywhere Reduce OpEx Live with Internet connection

Sleek design adds to Advanced features deployed in Streamline employee


customer brand seconds onboarding

Cisco confidential 92
• Makes incredible home cooking
available to everyone

• Innovation in supply chain, logistics,


customer service

• Deployed Meraki MC to employees &


conference rooms
“Just the whole thing of creating
somebody in the directory, plugging a • “The fact that you can manage your
phone in, and linking the two and just entire network…from one place is
amazing for us. That to me is the
having it work, has been…this is by far biggest win for the whole thing.”
and away the best SIP phone hardware
configuration I’ve ever used.”

Cisco confidential Internal case study 93


Conclusion

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 94
94 © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 94
1. Meraki provides a complete solution right out of the box (all features are included)

2. Meraki has high feature development velocity. All future features are pushed out to
customers via zero-touch firmware updates, for FREE

3. Meraki’s cloud allows customers to manage an unlimited number of sites from a


single pane of management glass. More sites + more Meraki products = greater value
prop.

4. Meraki gives you the ability to manage your entire LAN (Wireless, Switching,
Firewall) in a single pane of glass (only Cisco Enterprise can offer this)

5. Meraki is incredibly simple to configure and provides detailed network visibility

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 95
• PCI DSS 3.1

• MPOS

• Breach Security

• Next-Gen WAN SaaS, Bundled Feature Licensing (1 LIC per 1 HW device)


Includes: Support, Advanced Replacement, All Current and Lifetime New Features, Automatically Co-Terminated

• Auto Deploy
• 802.11ac • Identity-based • Physical/Virtual • Network Settings
• BTLE F/W Stacking • Device Location
• Central Mgmt • Dedicated • IDS/IPS • Voice/Video QoS • App Deployment
Security Radio • Anti- • Network Topology • Device & Data
• Application Visibility • BYOD Malware/phishing • Remote Live Tools Restrictions
• Auto RF • Content Filtering • Enterprise • Troubleshooting
• Identity Based • Auto-VPN Security • Provisioning
F/W
C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 96
Thank You and Next Steps

Contact Your Cisco Partner


w w w. https://tools.cisco.com/WWChannels/L
OCATR/performBasicSearch.do

Brian Avery
bravery@cisco.com

Learn more about Cisco Cloud Networking:


http://meraki.cisco.com/
C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 97
Join us again for a future Cisco Customer Education Event

 CCE sessions are held weekly on a variety of


topics
 CCE sessions can help you understand the
capabilities and business benefits of Cisco
technologies
 Watch replays of past events and register for
upcoming events!

Visit http://cs.co/cisco101 for details

C97-731719-02 © 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 98
Thank you.

Você também pode gostar