Hybrid work, new customer and user experiences, and the need for improved IT efficiencies make it critical for the network to provide the flexibility and security needed to keep up with constantly changing business requirements. Yet advancing key business initiatives while managing a growing volume of network sites and topologies can quickly become overwhelming:
Manual approaches don’t scale – Using spreadsheets and CLI for network configuration and management becomes impractical as the network expands and diversifies
Lock-in makes change disruptive- New protocols and topologies like VXLAN and cloud can provide benefits, but proprietary implementations can limit adoption, forcing rip and replace and vendor lock-in.
Zero Trust and SASE require built-in security- Manually applying and enforcing network access control (NAC) policies across a distributed, global network is labor-intensive and can leave security gaps.
With Central NetConductor, client traffic routing and security policies are decoupled from the underlying physical network, eliminating the need for VLAN and routing table spreadsheets, or manual configuration of ACLs. A fabric wizard based on UI-driven workflows automates network design and policy creation and automatically pushes device configurations to switches and gateways.
Central NetConductor components;
Policy manager – Defines user and device groups and creates the associated traffic routing and access enforcement rules for the physical network.
Group policy identifier (GPID)- Carries configuration and client policy information in traffic for in-line policy enforcement, which reduces configuration and security overhead and increases mobility and scalability.
Fabric wizard- Simplifies the creation of the overlays using an intuitive, graphical user interface, greatly easing the way virtual components are defined and network configuration instructions are generated and pushed to switches and gateways.
Network Insights- Utilizes artificial intelligence to automatically detect network performance and reliability issues while identifying opportunities for optimization based on local and peer-based best practices.
Client Insights- Uses machine learning to eliminate network blind spots from rogue IoT deployments by finding, fingerprinting, and automatically assigning devices the appropriate access role using AI-based behavioral analytics.
Cloud-native Network Access Control (NAC) via Cloud Auth- Enable both RADIUS and non-RADIUS approaches for ensuring entities are properly identified and assigned a role that defines their access privileges.