Virtual Management Network Access Controller (VMNAC)

Take network security to the next level

Fon’s Virtual Management Network Access Controller (VMNAC) helps enterprises incorporate a new security layer into their existing network infrastructure to guarantee the security and protection of their business information.

As well as allowing the management of network access policies for different devices and users like a regular NAC, Fon’s VMNAC has two additional strengths:


– Multi-tenant: It allows for the central management of multiple enterprises, no matter what their network structure or operating system. This makes it the perfect product for Managed Service Providers (MSPs) and operators alike.

– Integrability with any user directory database: Both on-premises, such as LDAP or Active Directory, or in the cloud, such as Office 365 or Google G-Suite, as well as any other type, for example Amazon or JumpCloud.

Access control made simple

Our VMNAC handles the access of users and their devices through a variety of different modules:

Admin portal

Manage and control all the service from the administration portal, a multi-tenant user-friendly console.

User management database

A database that contains the profiles of all users, their devices, and their network access type.

RADIUS-based cloud NAC

User and device authentication, network access control from the cloud, and centralized authentication, authorization, and accounting management.

Policy server

A security component that provides authorization services, administers security configuration requirements, and specifies the access control actions for compliant and noncompliant endpoints.

Self-onboarding portal

A web portal that allows employees and new hires to self-configure their devices to authenticate to the enterprise’s network.

Guest WiFi module

Manage the guest WiFi customization flow and invitation management.

WiFi security in 3 steps


Discover, identify, and monitor the devices on your networks in real-time


Authorize every network connection through appropriate, policy-based access controls


Mitigate threats to your networks before it’s too late with automated threat response

Key features

Integration with different directory services

From local users database and guest users, to Google G-Suite, Office 365, Active Directory, and Amazon Directory Services, Jumpcloud, Onelogin, and others

Device management

A device management agent allows for local device inventory and posture checks in addition to MDM/EMM platform integration

Policy management

Multiple access policies per user/group can be configured, as well as mandatory MFA policy, endpoint status verification (device risk assessment), time/date policy based, and concurrency control

Security posture check

Determine the proper level of access based on the security status of an endpoint

Access control

Block, quarantine, or grant limited or full access to an endpoint. This is achieved through different EAP variants (EAP-TLS, EAP-TTLS, PEAP), inner authentication support (PAP, CHAP, MSCHAPv2), and password rotation policy

Network security

IPSec VPN for encrypted, secure communication, and SSL certificate management, and revocation process

Bidirectional integration

VMNAC can be integrated with corporate systems through our API frontend and multi-tenant architecture that provides OSS/BSS integration capabilities; and with other security elements such as next-generation firewalls, advanced threat defense (ATD), and security information and event management (SIEM) solutions

Guest WiFi support

Through an open and customizable SSID and a captive portal customization, guest invitation process and calendar integration


Automation of device configuration through a self-onboarding captive portal. Users can download their enterprise profiles and configure their devices based on their access policies. Different OS (iOS/OSX, Linux, Windows, Android) and policy based onboarding

Network visibility

The network is monitored through a console that displays number of sessions, different dashboards (use, activity, security), reports, security alerts and triggers, as well as audit capabilities


Enterprise Control Solution

Grow your revenue while meeting demand

for security-as-a-service