Extreme Networks Access Control
SecurityCloud Identity And Access Management — Extreme Networks Access Control IAM

A multi—vendor solution that provides an unparalleled range of choices for fine—grained network access control. Extreme Networks Access Control cloud IAM is a complete standards—based, multi—vendor interoperable pre—connect and post—connect Access Control solution for wired and wireless LAN and VPN users. Using the Extreme Networks Access Control Gateway appliances and/or Virtual Appliance with Extreme Networks Control Center management configuration and reporting software, IT administrators can deploy a leading—edge Network Access Control solution to ensure only the right users have access to the right information from the right place at the right time including time of day, location, authentication types, device and OS type, and end system and user groups. BYOD and guest account services included — automated BYOD registration allowing users to register their own devices using their credentials with no IT intervention. Guest registration access control features to assure secure guest networking without burdening IT staff.

Fine—grained configuration options provide an unparalleled range of choices for fine—grained network control. These configuration options include time of day, location, authentication types, device and OS type, and end system and user groups. Identity—aware networking provides user identity functionality including discovery, authentication and role based access controls. The process of managing the user’s lifecycle (e.g. enrollment, role changes, termination) can be automated and linked to other business processes with LDAP and RADIUS integration. Endpoint baselining and monitoring provides agent—based or agent—less end—point assessment capabilities to determine the security posture of connecting devices. It is, aligned with industry standards, works with multiple assessment servers, authentication servers and security software agents to match the needs of organizations who may have existing assessment technology.

Extreme Networks Access Control – Identity And Access Appliance

The Extreme Networks Identity and Access appliance controls endpoint authentication, security posture assessment and network authorization. For authentication services, the Extreme Networks Identity and Access appliance acts as a RADIUS proxy, or RADIUS server for MAC Authentication, which communicates with the organization’s RADIUS authentication services (e.g. interfaces with Active Directory or another LDAP—based directory service). The Identity and Access appliance supports 802.1X (Extensible Authentication Protocol), MAC, web—based and Kerberos Snooping (with certain restrictions) authentication. For endpoint assessment, the Identity and Access appliance connects to multiple security assessment servers. For authorization services, the Identity and Access appliance communicates RADIUS attributes to the authenticating switch. This allows the switch to dynamically authorize and allocate network resources to the connecting endpoint based on authentication and assessment results.

Identity Aware Networking

In an identity—aware network a user’s capabilities are controlled based on the user’s identity and the access policies attributed to the user. Extreme Networks Access Control provides user identity functionality including discovery, authentication and role based access controls. Extreme Networks Access Control integrates with identity sources such as Siemens Enterprise Communications HiPath DirX Identity and Active Directory leveraging and extending the organization’s existing directory investments. Users are managed centrally in the identity system for the network and all connected applications. The process of managing the user’s lifecycle (e.g. enrollment, role changes, termination) can be automated and linked to other business processes with LDAP and RADIUS integration. Users can be automatically added or deleted when they join or leave the organization. Extreme Networks identity—aware networking capabilities provide stronger network security and lower operational cost.

Extreme Networks Access Control IAM

Extreme Access Control is a complete standards-based, multi—vendor interoperable solution for wired and wireless LAN and VPN users. The Extreme Access Control advantage is business—oriented visibility and control over individual users and applications in multi—vendor infrastructures. Centrally manage and control the security posture of all devices connecting to the network, including employee bring your own device (BYOD). It offers the flexibility to choose whether or not to restrict access for guests/contractors to public Internet services only. Managed guest access control with sponsorship, SMS verification, pre—registration, and other options. Comprehensive dashboard reporting and advanced notification engine.

Enables the unified configuration of policies across multiple switch and wireless access point vendors. This capability significantly reduces the burden of policy lifecycle management. Protects existing infrastructure investments since it does not require the deployment of new switching hardware or that agents be installed on all end systems. Address compliance and regulatory requirements by controlling access to sensitive data and then providing comprehensive reporting on user activity. Additionally, reporting data can be exported to other third party reporting tools. Automate endpoint isolation, quarantine, and remediation, plus ongoing threat analysis, prevention, and containment. Performs multi—user, multi—method authentication, vulnerability assessment and assisted remediation.

Extreme Application Analytics is a Network—Powered Application Analytics and Optimization solution that captures network data and aggregates, analyzes, correlates, and reports on it to enable better decision making and improved business performance. It is the industry’s very first and only — patent pending — solution to transform the Network into a Strategic Business Asset — by enabling the mining of network—based business events and strategic information that help business leaders make faster and more effective decisions.

Application Analytics allows IT operations to optimize the network for each and every application, enhance security for those applications and provide data for business analytics. This empowers IT to turn the network into a strategic business asset that can now provide value to other lines of business, and it enables business innovation powered by the network infrastructure. Application Analytics intelligence provides IT with the visibility and control of applications and websites (including related sub—web sites) resident in all parts of the network, from the wired or wireless edge all the way through the core and datacenter.

Extreme Networks Management Center is the heart of the ExtremeManagement family of management and security solutions. Management Center (formerly known as NetSight) is a single pane of glass management system that provides wired/wireless visibility and control from the data center to the mobile edge. The intelligence, automation, and integration of your management software enable the IT organization to optimize the efficiency of network operations and reduce total cost of ownership. Management Center provides centralized visibility and granular control of enterprise network resources end to end.

Extreme Networks Management Center is distinctive for granularity that reaches beyond ports and VLANs down to individual users, applications, and protocols. No matter how many moves, adds, or changes occur in your environment, Management Center keeps everything in view and under control through role—based access controls. One click can equal a thousand actions when you manage your network with Extreme Networks. Management Center can even manage beyond Extreme Networks switching, routing, and wireless hardware to deliver standards—based control of other vendors’ network equipment.

Easy integration with third—party management tools for MDM, Next—Generation Firewall (NGFW), SIEM, IPS and more. Extreme Networks Access Control is a complete standards—based, multi—vendor interoperable solution for wired and wireless LAN and VPN users. The Extreme Access Control advantage is business—oriented visibility and control over individual users and applications in multi—vendor infrastructures. Centrally manage and control the security posture of all devices connecting to the network, including employee bring your own device (BYOD). It offers the flexibility to choose whether or not to restrict access for guests/contractors to public Internet services only.

Protects existing infrastructure investments since it does not require the deployment of new switching hardware or that agents be installed on all end systems. Address compliance and regulatory requirements by controlling access to sensitive data and then providing comprehensive reporting on user activity. Additionally, reporting data can be exported to other third—party reporting tools. Automate endpoint isolation, quarantine, and remediation, plus ongoing threat analysis, prevention, and containment.

A multi—vendor solution that provides an unparalleled range of choices for fine grained network access control. Extreme Access Control is a complete standards—based, multi—vendor interoperable pre—connect and post—connect Access Control solution for wired and wireless LAN and VPN users.

Using the Extreme Access Control Gateway appliances and/or Virtual Appliance with Control Center management configuration and reporting software, IT administrators can deploy a leading—edge Network Access Control solution to ensure only the right users have access to the right information from the right place at the right time including time of day, location, authentication types, device and OS type, and end system and user groups.