Skip to main content

 

Cisco Meraki Documentation

Access Manager Datasheet

Overview

Access Manager is a cloud-delivered Access Control service that offers a powerful, scalable, and flexible way to ensure only authorized users and endpoints can access your resources - without the need for an external RADIUS server. Access Manager enables IT teams to effortlessly enforce and monitor network access to the users and endpoints based on user identity, endpoint identity, network context, and identity and security context from external integrations like Microsoft Entra ID (Azure AD) etc. 

Note: Access Manager is currently in early access preview and will be rolled out to customer organizations in phases. During this period, there will be no licensing enforcement (free trial for all organizations). Licensing details for general availability will be shared soon.

Once it is available on your organization, you can participate in a free trial by opting-in to Access Manager on Early Access page  (Organization > Early Access). 

Benefits

Following are some of the benefits of Access Manager:

Simplified management from one dashboard reducing fragmented management and troubleshooting Zero trust adoption made easier and faster with seamless integration with micro-segmentation policies to restrict ransomware propagation. 
Reduced overhead by eliminating the need for external RADIUS servers, VPN tunnels, Load balancers etc.   Provides immediate ability to apply conventional access controls like VLANs, ACLs etc. without having to configure additional integrations. 
Built-in scalability and high-availability to support growing number of users and endpoints.  Seamless 3rd party cloud integrations to apply additional context based authorization. (Eg. Entra ID)
Automatic updates ensuring the latest features and patches are applied without user intervention.   

 

Architecture and key use cases

Architecture 

New - Architecture Full.png

 

 

The three major components in Access Manager's flow are: Network devices, External identity and security integrations and Cloud-delivered Access Manager services.

  • When network devices (switch, access point etc.) are configured to use Access Manager as its authentication server, the authentication requests coming in from the endpoints are forwarded to Access Manager services in the cloud through an existing lightweight AES256 tunnel.
  • After a successful authentication (Certificate - EAP-TLS or Username/Password - EAP-TTLS or MAC address - MAB etc.), the session will be evaluated against the rules configured by the administrator on the Access Manager. 
  • If a session matches any rule with the conditions (based on user, endpoint, external integration context or network context like SSIDs, networks etc.) defined by the administrator, the corresponding authorization (SGT, VLAN, Group Policy, Voice Domain etc.) will be applied and sent back to the network devices. 
  • The endpoints will be connected to the network based on the assigned authorization. 

Use cases

Some of the key use cases for Access Manager are: 

Use Case Authentication and authorization
Securing endpoints that are managed by your organization 

Certificate based authentication (EAP-TLS) with Entra ID user lookup to apply user identity based authorization.

Apply authorization (SGT, VLAN, Group Policy etc.) based on Entra ID user group membership like HR, Finance etc. and user attributes like City, State, Job title etc. 

Username and password based authentication (EAP-TTLS/PAP) with Entra ID user lookup to apply user identity based authorization. 

Similar to the above, you can apply authorization (SGT, VLAN, Group Policy etc.)  based on user group membership and user-attributes from Entra ID. 

Securing non 802.1X supported IoT, OT etc. or other endpoints 

MAC Authentication Bypass (MAB) and/or iPSK

Apply authorization (SGT, VLAN, Group Policy etc.) based on specific or part of MAC address or endpoint groups with many MAC addresses.

Also, using iPSK to apply authorization (SGT, VLAN, Group Policy etc.) based on unique pre-shared keys (PSKs) used by endpoints connecting to the network. 

Feature breakdown

 

Feature Details
Authentication methods 

Following are the currently supported authentication methods:

  • Certificate based authentication - EAP-TLS (with Entra ID user lookup)
  • Username and password based authentication - EAP-TTLS/PAP (with Entra ID user lookup)
  • MAC Authentication bypass - MAB
  • Unique pre-shared key based authentication - IPSK (Identity PSK)
Authorization options

Following authorizations can be applied to sessions that are successfully authenticated: 

  • Security Group Tag (SGT)
  • VLAN ID / name
  • Group Policy 
  • Voice Domain permission
  • Identity PSK 

 

Authentication fallback

In the event of Network Devices losing connectivity to Access Manager services in the cloud, existing sessions will stay as is but for new connections, following are some of the available authentication fallback options: 

  • Wireless: Certificate authentication via RADIUS server on MR
  • Wired: Critical auth VLAN / Fail open

Please note that, in this scenario, the new connections will not be evaluated against the configured rules. 

Certificate Authority (CA) integration 

External Certificate Authority (PKI) support with Certificate Revocation List (CRL) check 

 

Attributes available for condition matching  

Access Manager rules have matching criteria and corresponding authorization applied as a result for the matching session. Following are the available attributes that can be included as a part of matching criteria: 

  • Certificate based attributes (like Issuer CN, SAN - RFC822 etc.) 
  • Identity Provider (IdP) attributes (like user groups and user attributes like City, State etc.) 
  • RADIUS attributes (like Calling-station-id, NAS-udentifier etc.) 
  • Authentication methods (like EAP, MAB etc.)
  • Connection methods (like Wired and Wireless) 
  • Networks 
  • SSIDs
  • Endpoint attributes (like MAC address, Group etc.) 

 

Hardware Compatibility 

Following are the switches and access point that can leverage Access Manager as the authentication server:

Switches

Switch Models Minimum Required Firmware
Cloud Managed Catalyst 9300 CS17.1 
MS390 CS17.1 
MS1XX,  MS2XX and MS3XX MS16 

Access Points

Access Points Family Access Points Models Minimum Required Firmware

Meraki MR Wi-Fi 5 Wave 2 (802.11ac Wave 2)

MR20, MR30H, MR33, MR42, MR42E, MR52, MR53, MR53E, MR70, MR74, MR84 MR30.6 (for Extended Local Auth, MR30.7)

Meraki MR Wi-Fi 6 (802.11ax)

MR28, MR36, MR36H, MR44, MR45, MR46, MR46E, MR55, MR56, MR76, MR78, MR86 MR30.6 (for Extended Local Auth, MR30.7)
Meraki MR and Catalyst Wi-Fi 6E (802.11ax)     MR57, CW91XX MR30.6 (for Extended Local Auth, MR30.7)
Wi-Fi 7 (802.11be) CW9176I/D1, CW9178I MR30.6 (for Extended Local Auth, MR30.7)

 

 

 

 

  • Was this article helpful?