Intrusion Prevention System
5Pages

{{requestButtons}}

Catalog excerpts

Intrusion Prevention System - 1

DATA SHEET Intrusion Prevention System Distributed Intrusion Prevention & Response for Edge-to-Core and Data Center Benefits EXTENDS IPS PROTECTION TO THE NETWORK EDGE • Protect networked resources by removing an attacker’s ability to continue an attack or to mount a new attack • Real-time dynamic attacker containment limits security incident impact • Works with multi-vendor enterprise edge switching products PROTECTS TODAY’S AND TOMORROW’S NEXT GENERATION NETWORKS • Protection against emerging Voice over IP vulnerabilities, Day Zero threats, and advanced Denial of Service attacks • Delivers leading price point and proven effectiveness at Gigabit, Multi-Gigabit • Flexibly deployed as an appliance and/or virtual appliance enabling cost efficient threat detection and monitoring for both the physical and virtual networks • Supports inspection and reporting for IPv6 networks extending IPS/IDS capabilities into next generation networks INDUSTRY-LEADING INTRUSION PREVENTION AND RESPONSE • Unmatched threat detection and containment that leverages sophisticated signature, application, protocol, and behavioral analysis • Unique host-based and network-based protection deployment options LEVERAGES YOUR EXISTING INFRASTRUCTURE INVESTMENTS AND IT EXPERTISE • Ready to protect “out-of-the-box” with powerful configuration tools for customization and advanced control • No fork lift upgrades – works with your existing network switches, routers, wireless access points, and security appliances Threat containment that leverages existing network investments In-line Intrusion Prevention deployment to provide advanced security in a specific location Patented Distributed Intrusion Prevention deployment to automate response to threats in real-time Out-of-band Intrusion Detection deployment that simultaneously utilizes multiple response technologies Forensics tools for session reconstruction to simplify threat mitigation and resolution Product Overview The Extreme Networks Intrusion Prevention System (IPS) is unique in its ability to gather evidence of an attacker’s activity, remove the attacker’s access to the network, and reconfigure the network to resist the attacker’s penetration technique. The IPS stops attacks at the source of the threat and can proactively protect against future threats and vulnerabilities. Offering an extensive range of detection capabilities, host-based and network-based deployment options, a portfolio of IPS appliances, and seamless integration with the Extreme Networks Secure Networks™ architecture, our IPS utilizes a state-of-the-art high-performance, multi-threaded architecture with virtual sensor technology that scales to protect even the largest enterprise networks. The Intrusion Prevention System is a core component of the Extreme Networks Secure Networks architecture. When deployed in combination with Extreme Networks SIEM and NMS Automated Security Manager (ASM), it facilitates the automatic identification, location, isolation, and remediation of security threats. Extreme Networks IPS also integrates seamlessly with Extreme Networks Network Access Control (NAC) for post-connect monitoring of behavior once network access has been granted. Extreme Networks advanced in-line Intrusion Prevention is designed to block attackers, mitigate Denial of Service (DoS) attacks, prevent information theft, and ensure the security of Voice over IP (VoIP) communications - while remaining transparent to the network. Built upon our award-winning intrusion prevention technology, Extreme Networks IPS can alert on the attack, drop the offending packets, terminate the session for TCP and UDP-based attacks, and dynamically Intrusion Prevention System – Data Sheet

Open the catalog to page 1
Intrusion Prevention System - 2

establish firewall or Secure Networks™ policy rules. Extreme Network Sensors are available at 1 Gbps and Multi-Gigabit deep Networks IPS leverages a comprehensive library of vulnerability packet inspection throughput rates. and exploit-based signatures. Extreme Networks’ Distributed Intrusion Prevention (US Patent HOST-BASED THREAT PREVENTION 7581249) and threat containment can block attackers at the Extreme Networks Host Sensors are security applications used source physical port for most multi-vendor edge switches. More to detect attacks on a network server in real time. Extreme granular...

Open the catalog to page 2
Intrusion Prevention System - 3

EMS configuration wizards and group policy rules simplify the configuration of network and host sensors. The EMS aggregates event reporting from individual network and host sensors. It can execute firewall rule changes, switch/router configurations, or other mitigation actions in response to attacks. AGENCY AND REGULATORY STANDARD SPECIFICATIONS Safety: UL 60950-1, CSA 22.1 60950, EN 60950-1, and IEC 60950-1, NOM EMC: FCC Part 15 (Class A), ICES-003 (Class A), BSMI, KCC, VCCI The EMS provides in-depth reporting and archiving of security V-3, AS/NZS CISPR 22 (Class A), EN 55022 (Class A), EN...

Open the catalog to page 3
Intrusion Prevention System - 4

Ordering Information IDS NETWORK SENSOR SOFTWARE/VIRTUAL APPLIANCES PART NUMBER IPS NETWORK SENSOR APPLIANCES PART NUMBER Network IPS appliance, 1 Gbps limit Network IPS appliance - HW only for upgrades, 1 Gbps limit Network IDS software, 100 Mbps limit Network IPS appliance, 6 Gbps limit Network IDS software, 250 Mbps limit Network IDS software, 500 Mbps limit Network IPS appliance - HW only for upgrades, 6 Gbps limit Network IDS software, 1 Gbps limit Network IPS upgrade for existing MG Network IDS sensors HOST SENSOR SOFTWARE PART NUMBER NETWORK INTERFACE CARD (NIC) OPTIONS FOR GIG IPS...

Open the catalog to page 4
Intrusion Prevention System - 5

As a customer-centric company, Extreme Networks is committed Extreme Networks provides comprehensive service offerings that to providing quality products and solutions. In the event that range from Professional Services to design, deploy and optimize one of our products fails due to a defect, we have developed a customer networks, customized technical training, to service and comprehensive warranty that protects you and provides a simple support tailored to individual customer needs. Please contact way to get your products repaired or media replaced as soon your Extreme Networks account...

Open the catalog to page 5

All Extreme Networks catalogs and technical brochures

  1. WiNG AP 8432

    4 Pages

  2. SLX 9850

    10 Pages

  3. X440-G2

    13 Pages

  4. WiNG AP 7532

    7 Pages

  5. AP 7612

    5 Pages

  6. SLX 9640

    9 Pages

  7. X590 series

    9 Pages

  8. SLX 9030

    9 Pages

  9. VSP 8400

    9 Pages

  10. 220 Series

    10 Pages

  11. X870

    7 Pages

  12. S-Series

    19 Pages

  13. D-Series-DS

    7 Pages

  14. E4G-200-DS

    6 Pages

  15. A-Series-DS

    7 Pages

  16. Summit-X670-DS

    10 Pages

  17. X670V-48t-DS

    8 Pages

  18. X670-G2-DS

    11 Pages

  19. A-Series

    7 Pages

  20. 800-Series

    8 Pages

  21. 7100G-Series

    7 Pages

  22. AP3825

    12 Pages

  23. Summit X430

    6 Pages

  24. Summit X460-G2

    15 Pages

  25. Summit X670-G2

    11 Pages

  26. K-Series

    13 Pages

  27. Mobile IAM

    3 Pages

  28. Ridgeline

    11 Pages

  29. I-Series

    4 Pages

  30. G-Series

    7 Pages

  31. D-Series

    7 Pages

  32. 7100-Series

    5 Pages

  33. DSSumX670_1777

    10 Pages

  34. PAG_1002.

    9 Pages

  35. DSSummitX460

    12 Pages

  36. Summit 48si

    4 Pages

  37. XENPAK

    3 Pages

  38. ExtremeWare

    5 Pages

  39. EAS Series

    6 Pages

  40. Alpine

    5 Pages

Archived catalogs

  1. S-Series®

    18 Pages