

Catalog excerpts

DATA SHEET Network Access Control (NAC) End-to-end security and superior user experience NAC HIGHLIGHTS BUSINESS ALIGNMENT • Protect corporate data by proactively preventing unauthorized users, compromised endpoints, and other vulnerable systems from network access • Effectively balance security and availability for users, contractors and guests • Proactively control the security posture of all devices, including employee owned (BYOD), on the network • Efficiently address regulatory compliance requirements • Cost-efficient protection for enterprise remote offices OPERATIONAL EFFICIENCY • Leverage existing assessment servers, authentication servers, software agents and identity sources avoiding forklift upgrades • Complete solution featuring both physical and virtual appliances • Range of policy configuration options enables a uniquely fine-grained network control and flexibility • Comprehensive dashboard reporting and advanced notification engine • Managed guest access control with sponsorship Product Overview Extreme Networks Network Access Control (NAC) is a complete standards-based, multi-vendor interoperable pre-connect and post-connect Network Access Control solution for wired and wireless LAN and VPN users. Using Extreme Networks Identity & Access appliances and/or Identity & Access Virtual Appliance with NetSight NAC management configuration and reporting software, IT administrators • Enable business staff to easily sponsor guests and validate guest registration can deploy a leading-edge NAC solution to ensure only the right users have access • Protect physical and virtualized environments with flexible deployment -physical and virtual appliances (IPS) and Extreme Networks Security Information and Event Manager (SIEM) and to the right information from the right place at the right time. Extreme Networks NAC is tightly integrated with the Extreme Networks Intrusion Prevention System Extreme Networks NetSight Automated Security Manager to deliver best-in-class post-connect access control. The Extreme Networks NAC advantage is business-oriented visibility and control over individual users and applications in multi-vendor infrastructures. NAC protects existing infrastructure investments since it does not require the deployment of new switching hardware or that agents be installed on all end systems. Extreme Networks NAC performs multi-user, multi-method authentication, vulnerability assessment and assisted remediation. It offers the flexibility to choose whether or not to re-strict access for guests/contractors to public Internet services only—and how to handle authenticated internal users/devices that do not pass the security posture assessment. Businesses have the flexibility to balance user productivity and security. The NAC assessment warning capability alerts users that they need to upgrade their system but can allow a grace period before they are quarantined. Network Access Control (NAC) – Data Sheet
Open the catalog to page 1
Extreme Networks NAC policies permit, deny, prioritize, rate-limit, tag, re-direct, SECURITY • Enable the strongest security with fine grained access control based on user, device, time, location and authentication type • Assess end systems of any type for vulnerabilities or threats with agent-based or agent-less assessment • Automate endpoint isolation, quarantine, and remediation, plus ongoing threat analysis, prevention, and containment SERVICE AND SUPPORT • Industry-leading first call resolution rates and customer satisfaction rates • Personalized services, including site surveys,...
Open the catalog to page 2
registration groups allow administrators to give different levels of additions or state changes, guest registration, any custom field access to different types of guests. Location based registration change, and end-system health results. Notification is delivered allows guest access to be limited to specific connection points through traps, syslog, email or web service. The notification (SSID, port, switch) or group of connection points. engine has the ability to run a program triggered by a notification Identity-Aware Networking In an identity-aware network a user’s capabilities are...
Open the catalog to page 3
port or wireless AP and SSID) along with timestamps for each and reduced time to value. Available with different sizing options endpoint—a key requirement for auditing and forensics. IP-to-ID for central locations as well as remote sites. Mapping is also used by NetSight Automated Security Manager to implement location-independent distributed intrusion prevention and by Extreme Networks Security Information and Event Manager (SIEM) or other third party SIEM/IPS solutions to pinpoint the source of a threat. NAC management in NetSight provides centralized visibility and highly efficient...
Open the catalog to page 4
functions. The appliances are capable of supporting both Extreme Networks Identity & Access Virtual Appliance network-based and/or agent-based assessment. A virtual appliance is a software image that runs on a virtual ma- • Extreme Networks NAC is upgradable, allowing assessment to be integrated onto a single box with the other NAC System Requirements & Specifications EXTREME NETWORKS IDENTITY & ACCESS APPLIANCES Physical Specifications chine. The Identity & Access Virtual Appliance is packaged in the .OVA file format defined by VMware and must be deployed on a VMware ESXTM 4.0, 4.1, 5.0,...
Open the catalog to page 5
Red Hat Enterprise Linux WS and ES v5 & v6 (64-bit & 32-bit) SuSE Linux versions 10, 11, and 12.3 (64-bit & 32-bit) Ubuntu 11.10 Desktop version (32-bit , remote NetSight client only) Ubuntu 11.10, 12.04, and 13.04 (64-bit) Mac OS X® 64-bit (remote NetSight client only) Leopard®, Snow Leopard®, Lion®, Mountain Lion®,, or Mavericks® VMware® (64-bit NetSight Virtual Appliance) VMware ESXi™ 4.0, Extreme Networks NetSight provides cost-efficient choices enabling enterprises to address their priorities, optimize their budget use and demonstrate quick time-to-value. NetSight models range from a...
Open the catalog to page 6All Extreme Networks catalogs and technical brochures
-
ExtremeWireless™ Appliances
10 Pages
-
E4G-200 Cell Site Router
6 Pages
-
D-Series
7 Pages
-
Extreme Networks S-Series®
18 Pages
-
Extreme Networks 800-Series
8 Pages
-
ExtremeSwitching™ X870
7 Pages
-
ExtremeSwitching™ 220 Series
10 Pages
-
ExtremeSwitching™ SLX 9030
9 Pages
-
ExtremeSwitching™ SLX 9030
9 Pages
-
SLX 9640
6 Pages
-
ExtremeWireless™ WiNG 7612
5 Pages
-
ExtremeSwitching™ X440-G2
13 Pages
-
WiNG AP 8432
4 Pages
-
ExtremeAnalytics
5 Pages
-
WiNG AP 7532
7 Pages
-
A-Series A4
7 Pages
-
3825i/e Indoor Access Point
11 Pages
-
Summit X670 Series®
10 Pages
-
Summit x670V-48t
8 Pages
-
X670-G2-DS
11 Pages
-
A-Series
7 Pages
-
800-Series
8 Pages
-
7100G-Series
7 Pages
-
10GBase X Optics
3 Pages
-
Altitude 4600
7 Pages
-
AP376x Series Access Point
10 Pages
-
AP3610 Access Point
6 Pages
-
AP3715 Access Point
9 Pages
-
AP3825
12 Pages
-
AP3710 Access Point
10 Pages
-
Summit X430
6 Pages
-
Software-Defined Networking
5 Pages
-
Summit X460-G2
15 Pages
-
OneController
4 Pages
-
Summit X670-G2
11 Pages
-
3805i/e Indoor Access Point
5 Pages
-
Data Center Manager (DCM)
5 Pages
-
ExtremeXOS Operating System
24 Pages
-
Intrusion Prevention System
5 Pages
-
K-Series
13 Pages
-
Mobile IAM
3 Pages
-
Ridgeline
11 Pages
-
Summit X770 Series
8 Pages
-
Summit x670V-48t
8 Pages
-
I-Series
4 Pages
-
G-Series
7 Pages
-
E4G-200 Cell Site Router
6 Pages
-
D-Series
7 Pages
-
7100-Series
5 Pages
-
100BASE SFP Optics
3 Pages
-
100GE CFP2 Optics
3 Pages
-
E4G-400 datasheet
9 Pages
-
E4G-200 datasheet
6 Pages
-
Altitude 4522 datasheet
4 Pages
-
Altitude 4022 datasheet
5 Pages
-
altitude 4021 datasheet
5 Pages
-
DSSumX670_1777
10 Pages
-
PAG_1002.
9 Pages
-
DSSummitX460
12 Pages
-
DSSummitX770_1945_01
9 Pages
-
DSAltitude_4762_4763_1722
6 Pages
-
DSAltitude4700
7 Pages
-
DSAltitude4600
7 Pages
-
DSAltitude4532
5 Pages
-
DSAltitude4521
5 Pages
-
DSAltitude4511
3 Pages
-
DSAltitude4021_1722
5 Pages
-
Summit WM200 & Summit WM2000
9 Pages
-
Summit 48si
4 Pages
-
Summit X440 Series
10 Pages
-
Summit WM3411
7 Pages
-
XENPAK
3 Pages
-
Sentriant NG300
6 Pages
-
Ridgeline Network
10 Pages
-
ReachNXT 100-8t
5 Pages
-
10/100/1000BASE-T SFP
3 Pages
-
1000BASE SFP Optics
3 Pages
-
ExtremeWare
5 Pages
-
EAS Series
6 Pages
-
BlackDiamond X Series
7 Pages
-
BlackDiamond 20800 Series
10 Pages
-
Altitude 4521 Access Point
5 Pages
-
Altitude 4511
3 Pages
-
Altitude 4762/4763
6 Pages
-
Alpine
5 Pages
-
Sentriant AG200
8 Pages
-
ReachNXT 100-8t
5 Pages
-
Summit WM20 series
9 Pages
-
Summit X250e series
18 Pages
-
Summit X450e series
17 Pages
-
BlackDiamond 10808
11 Pages
-
BlackDiamond 12804C
9 Pages
-
BlackDiamond 8800 Series
18 Pages
-
Summit X480 series
19 Pages
-
Summit X350 series
10 Pages
-
Summit X450a series
19 Pages
-
Summit X150 series
12 Pages
-
Ridgeline Datasheet
9 Pages
-
Summit X650 series
20 Pages
-
Summit X460 Series
23 Pages
Archived catalogs
-
SLX 9850
10 Pages
-
S-Series®
18 Pages
-
Summit X670 Series
10 Pages