{% set baseFontFamily = "Open Sans" %} /* Add the font family you wish to use. You may need to import it above. */

{% set headerFontFamily = "Open Sans" %} /* This affects only headers on the site. Add the font family you wish to use. You may need to import it above. */

{% set textColor = "#565656" %} /* This sets the universal color of dark text on the site */

{% set pageCenter = "1100px" %} /* This sets the width of the website */

{% set headerType = "fixed" %} /* To make this a fixed header, change the value to "fixed" - otherwise, set it to "static" */

{% set lightGreyColor = "#f7f7f7" %} /* This affects all grey background sections */

{% set baseFontWeight = "normal" %} /* More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set headerFontWeight = "normal" %} /* For Headers; More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set buttonRadius = '40px' %} /* "0" for square edges, "10px" for rounded edges, "40px" for pill shape; This will change all buttons */

After you have updated your stylesheet, make sure you turn this module off

How Meraki Helps Identify all Networking Devices On Your WiFi

by Jason Blalock on February 4, 2016

netowrking devices

One of the hardest parts of maintaining a WiFi system is keeping track of who's on your system, and what they're doing with it.  Yet this is also one of the most crucial aspects of WiFi management.

There have been tools available for years which help WiFi administrators try to keep track of networking devices on their system, but there were no real magic-bullet solutions.  Usually, your best bet was two combine two or more tools, such as a network scanner along with a packet-sniffer, and try to correlate the results based on IP or MAC address.  However, this is often imprecise, as well as being difficult to do quickly or easily. The only other viable option was expensive pieces of dedicated hardware.

Short on time? Download our free guide to connecting thousands of users

This is another area where Meraki shines, thanks to their innovative cloud-based networking system.  Technologies specific to Meraki allow it to actively monitor all networking devices downstream, from VoIP appliances to BYOD smartphones, and keep the administrator fully informed via the Meraki Dashboard interface.

 

BYOD

Layer 7 Visibility Brings Unparalleled WiFi Oversight

Meraki is (currently) the only vendor on the network who builds full Layer 7 app-level visibility directly into their networking products.  

Their packet processing engine is consistently scanning all packets, mining them for data and clues as to their contents.  These are matched with accurate profiles of every connected device, based on reported data.  These systems track packets at a much deeper level than hostnames and IP addresses.  The heuristic scanners can even penetrate deliberately-obfuscated packet types.

Meraki then takes things a step further yet, thanks to their cloud system.  Meraki maintains an ongoing packet signature database, with thousands of apps profiled and more added every day.  This system harnesses the power of all Meraki users to create a comprehensive database which can instantly identify packets from a vast variety of applications, both legitimate and not.

All this is displayed through the Meraki Dashboard in real-time, allowing admins to instantly see what networking devices are attached to their Meraki WiFi network, and what those devices are doing.

The Benefits Of App-Level WiFi Awareness

There are, of course, the obvious security benefits of being able to monitor all attached WiFi networking devices.  However, because the Meraki Layer 7 Visibility system is so robust, it can pay off in several different ways:

  • Monitor employee's data usage and potentially block access to bandwidth-hogging sites like Netflix or Pandora.
  • Watch out for questionable or illegal internal activity using company resources, such as seeding BitTorrents or mining for Bitcoins.  
  • Ensuring secure BYOD implementations with a minimal amount of direct intrusion onto employee's devices.   
  • Optimization of your network with precise prioritization of packets on a per-app basis.
  • Custom security settings for specific apps, or even specific packet types, to ensure safe usage of every potential app.
  • Spot cloaked or hidden devices through their bandwidth usage.
  • Watching out for sites that aren't on your blacklist, but should be.  

cisco refurbished cisco refresh
Because the Meraki Dashboard is a single-pane-of-glass interface, all this information is easy to manage.  Advanced WiFi network management which used to require a high degree of expertise and specialized tools\hardware is now simple enough that nearly anyone can do it.  

Good WiFi Oversight Is Good Security 

You really can't keep too close an eye on your WiFi, especially if you have public-facing networks.  Meraki systems bring a new level of oversight and simplified management that can improve security across the board.

And if you're looking to implement your own Bring-Your-Own-Device policies in the near future, be sure to check out our free ebook "10 Steps For A Successful BYOD Deployment Strategy."

 

Topics: BYOD, Meraki

Recent Posts

Popular Posts