4
5. When guest user’s account expires, the Enterprise Guest Access
appliance automatically logs the user off of the network and
does not allow network access until the guest receives new,
updated guest user credentials.
Features and Benefits
Enterprise Guest Access offers a number of important features and benefits.
FEATURE
BENEFIT
Sleek, small form-factor appliance design
The Enterprise Guest Access appliance takes up less space and is not meant to be hidden away
in a networking closet, making it easier to deploy and use.
Agentless
No agent to deploy on a guest user’s endpoint device means the Enterprise Guest Access
appliance is a zero configuration solution, simple to deploy and maintain, and for a guest user
to operate, minimizing guest-related help desk or support calls.
Identity- and role-based guest access
Limit guest user access based on the user’s identity or role. Know which guest users are on your
network and when. Store guest user data for regulatory compliance audits.
Comprehensive pre-authentication endpoint
integrity checks and posture assessment
The Enterprise Guest Access appliance’s support of Host Checker ensures that a guest’s
endpoint device meets a previously decided baseline of security and access policy before it can
be granted access to the network and its resources.
Support for wired and wireless guest access
Ensures that endpoint devices will meet a baseline security criteria—regardless of the guest
user’s access method, whether wired or wireless—and that the user will be authenticated
before being allowed to access the network.
Consistent endpoint baselining across the network
For medium to large enterprises with many guest users, the Enterprise Guest Access appliance
ensures that a minimum baseline of endpoint device security and access policy, and endpoint
integrity is met and maintained.
Secure network access for up to 200 guest users
Purpose-built to address the network access control needs of SMBs and enterprises with many
guest users.
Simplified guest user creation
Enables the administrative and support staff of an SMB or enterprise to create and distribute
guest user access rights and credentials, relieving the already overworked IT staff of this task.
Secure Layer 2 bridge
The secure Layer 2 bridge of the Enterprise Guest Access appliance provides guest users with
an IP address, ensuring their secure network access.
Flexible time-based guest user network access
Limits guest user network access based on specific hours, a specific number of hours, or a
specific number of days (in hours).
Guest administrator user database
The list of guest administrators, stored in a database local to the Enterprise Guest Access
appliance as determined by the organization, can be used to address regulatory compliance
requirements.
Guest user database
The list of guest users passing policy checks and receiving guest access rights and credentials
to access the network is stored in a database on the Enterprise Guest Access appliance, helping
to address regulatory compliance needs.
Consistent access control
The Enterprise Guest Access appliance, when deployed in smaller branch offices or sites,
can ensure that an enterprise secures its distributed network, whether remote or local, with
consistent, identity-enabled access control and shared security policies.
Simple upgrade to full-blown NAC
Delivers a simple upgrade path to IC Series Unified Access Control Appliances delivering
comprehensive network and application access control for small to large enterprises and
government agencies while leveraging existing, previously developed policies.
Enterprise
Guest Access
appliance