Open source Network access control that provide secure access for LAN/WAN. Allows to apply flexible access policies based on rules. It works with wide range of clients (Windows, Mac, Linux, others...) and network devices (Cisco,Alcatel and 3Com). It is based on well proven opensource components like FreeRadius, iTop, Icinga and our own development. Extensible and very flexible, it is easy to add new functionalities. It is open to be integrated with current platforms like accounting, asset management, autentication, Network Intrusion Detection Systems,...
Apart of core Netwrok Access Control has value added services like network configuration and discovery, netwrok devices configuration backup and network monitoring.
Main components are:
Core Network Access control service. Allows to enforce authentication and authorization policies over corporate network. From Management Console administrator can find and manage a user based on username, IP, MAC, network switch, or physical location (if integrated a physical asset management system). Audit and reporting is available in order to review network activity.
Network Configuration module allows to configure network devices from a confortable web gui, based on templates can do bulk config of hundreds or thousends of devices. Based on statefull queu that allow to program when and how to push configs. An API is available to extend functionality.
Automaticaly backup and archive network devices configurations.
Network Discovery module allows to provision network devices automatically and mantain inventory.
Network CMDB module is the backend for all information about inventory, allowing to share information with other platforms in a easy way.
Network Monitor module allows to monitor network health and alarm administrator if some part of the network is not working properly. From CMDB monitoring is auto provisioned.
Distribution of all source code of Opennac code. Instruccions for installing are available in the wiki.
Distribution in packages for Red Hat and CentOS, installation is based on rpm infraestructure. Instruccions for installing are available in the wiki.
All OpenNAC services are packaged in a virtual appliance that can be running in a VMware or a KVM environment.
All the services are in a private cloud, you deploy a vpn connection between customer infraestrcuture and Opennac private cloud. All services are managed by a web frontend. 7X24 monitoring and support service are available.