Network Access Control (NAC)
7Pages

{{requestButtons}}

Catalog excerpts

Network Access Control (NAC) - 1

DATA SHEET Network Access Control (NAC) End-to-end security and superior user experience NAC HIGHLIGHTS BUSINESS ALIGNMENT • Protect corporate data by proactively preventing unauthorized users, compromised endpoints, and other vulnerable systems from network access • Effectively balance security and availability for users, contractors and guests • Proactively control the security posture of all devices, including employee owned (BYOD), on the network • Efficiently address regulatory compliance requirements • Cost-efficient protection for enterprise remote offices OPERATIONAL EFFICIENCY • Leverage existing assessment servers, authentication servers, software agents and identity sources avoiding forklift upgrades • Complete solution featuring both physical and virtual appliances • Range of policy configuration options enables a uniquely fine-grained network control and flexibility • Comprehensive dashboard reporting and advanced notification engine • Managed guest access control with sponsorship Product Overview Extreme Networks Network Access Control (NAC) is a complete standards-based, multi-vendor interoperable pre-connect and post-connect Network Access Control solution for wired and wireless LAN and VPN users. Using Extreme Networks Identity & Access appliances and/or Identity & Access Virtual Appliance with NetSight NAC management configuration and reporting software, IT administrators • Enable business staff to easily sponsor guests and validate guest registration can deploy a leading-edge NAC solution to ensure only the right users have access • Protect physical and virtualized environments with flexible deployment -physical and virtual appliances (IPS) and Extreme Networks Security Information and Event Manager (SIEM) and to the right information from the right place at the right time. Extreme Networks NAC is tightly integrated with the Extreme Networks Intrusion Prevention System Extreme Networks NetSight Automated Security Manager to deliver best-in-class post-connect access control. The Extreme Networks NAC advantage is business-oriented visibility and control over individual users and applications in multi-vendor infrastructures. NAC protects existing infrastructure investments since it does not require the deployment of new switching hardware or that agents be installed on all end systems. Extreme Networks NAC performs multi-user, multi-method authentication, vulnerability assessment and assisted remediation. It offers the flexibility to choose whether or not to re-strict access for guests/contractors to public Internet services only—and how to handle authenticated internal users/devices that do not pass the security posture assessment. Businesses have the flexibility to balance user productivity and security. The NAC assessment warning capability alerts users that they need to upgrade their system but can allow a grace period before they are quarantined. Network Access Control (NAC) – Data Sheet

Open the catalog to page 1
Network Access Control (NAC) - 2

Extreme Networks NAC policies permit, deny, prioritize, rate-limit, tag, re-direct, SECURITY • Enable the strongest security with fine grained access control based on user, device, time, location and authentication type • Assess end systems of any type for vulnerabilities or threats with agent-based or agent-less assessment • Automate endpoint isolation, quarantine, and remediation, plus ongoing threat analysis, prevention, and containment SERVICE AND SUPPORT • Industry-leading first call resolution rates and customer satisfaction rates • Personalized services, including site surveys,...

Open the catalog to page 2
Network Access Control (NAC) - 3

registration groups allow administrators to give different levels of additions or state changes, guest registration, any custom field access to different types of guests. Location based registration change, and end-system health results. Notification is delivered allows guest access to be limited to specific connection points through traps, syslog, email or web service. The notification (SSID, port, switch) or group of connection points. engine has the ability to run a program triggered by a notification Identity-Aware Networking In an identity-aware network a user’s capabilities are...

Open the catalog to page 3
Network Access Control (NAC) - 4

port or wireless AP and SSID) along with timestamps for each and reduced time to value. Available with different sizing options endpoint—a key requirement for auditing and forensics. IP-to-ID for central locations as well as remote sites. Mapping is also used by NetSight Automated Security Manager to implement location-independent distributed intrusion prevention and by Extreme Networks Security Information and Event Manager (SIEM) or other third party SIEM/IPS solutions to pinpoint the source of a threat. NAC management in NetSight provides centralized visibility and highly efficient...

Open the catalog to page 4
Network Access Control (NAC) - 5

functions. The appliances are capable of supporting both Extreme Networks Identity & Access Virtual Appliance network-based and/or agent-based assessment. A virtual appliance is a software image that runs on a virtual ma- • Extreme Networks NAC is upgradable, allowing assessment to be integrated onto a single box with the other NAC System Requirements & Specifications EXTREME NETWORKS IDENTITY & ACCESS APPLIANCES Physical Specifications chine. The Identity & Access Virtual Appliance is packaged in the .OVA file format defined by VMware and must be deployed on a VMware ESXTM 4.0, 4.1, 5.0,...

Open the catalog to page 5
Network Access Control (NAC) - 6

Red Hat Enterprise Linux WS and ES v5 & v6 (64-bit & 32-bit) SuSE Linux versions 10, 11, and 12.3 (64-bit & 32-bit) Ubuntu 11.10 Desktop version (32-bit , remote NetSight client only) Ubuntu 11.10, 12.04, and 13.04 (64-bit) Mac OS X® 64-bit (remote NetSight client only) Leopard®, Snow Leopard®, Lion®, Mountain Lion®,, or Mavericks® VMware® (64-bit NetSight Virtual Appliance) VMware ESXi™ 4.0, Extreme Networks NetSight provides cost-efficient choices enabling enterprises to address their priorities, optimize their budget use and demonstrate quick time-to-value. NetSight models range from a...

Open the catalog to page 6

All Extreme Networks catalogs and technical brochures

  1. WiNG AP 8432

    4 Pages

  2. SLX 9850

    10 Pages

  3. X440-G2

    13 Pages

  4. WiNG AP 7532

    7 Pages

  5. AP 7612

    5 Pages

  6. SLX 9640

    9 Pages

  7. X590 series

    9 Pages

  8. SLX 9030

    9 Pages

  9. VSP 8400

    9 Pages

  10. 220 Series

    10 Pages

  11. X870

    7 Pages

  12. S-Series

    19 Pages

  13. D-Series-DS

    7 Pages

  14. E4G-200-DS

    6 Pages

  15. A-Series-DS

    7 Pages

  16. Summit-X670-DS

    10 Pages

  17. X670V-48t-DS

    8 Pages

  18. X670-G2-DS

    11 Pages

  19. A-Series

    7 Pages

  20. 800-Series

    8 Pages

  21. 7100G-Series

    7 Pages

  22. AP3825

    12 Pages

  23. Summit X430

    6 Pages

  24. Summit X460-G2

    15 Pages

  25. Summit X670-G2

    11 Pages

  26. K-Series

    13 Pages

  27. Mobile IAM

    3 Pages

  28. Ridgeline

    11 Pages

  29. I-Series

    4 Pages

  30. G-Series

    7 Pages

  31. D-Series

    7 Pages

  32. 7100-Series

    5 Pages

  33. DSSumX670_1777

    10 Pages

  34. PAG_1002.

    9 Pages

  35. DSSummitX460

    12 Pages

  36. Summit 48si

    4 Pages

  37. XENPAK

    3 Pages

  38. ExtremeWare

    5 Pages

  39. EAS Series

    6 Pages

  40. Alpine

    5 Pages

Archived catalogs

  1. S-Series®

    18 Pages