Extreme Networks Access Control IAM

Extreme Networks Access Control IAM
Extreme Networks Access Control
Home — SecurityCloud Identity And Access Management — Extreme Networks Access Control IAM

A multi-vendor solution that provides an unparalleled range of choices for fine-grained network access control. Extreme Networks Access Control cloud IAM is a complete standards-based, multi-vendor interoperable pre-connect and post-connect Access Control solution. For wired and wireless LAN and VPN users. Using the Extreme Networks Access Control Gateway appliances and / or Virtual Appliance with Extreme Networks Control Center management configuration and reporting software, IT administrators can deploy a leading-edge Network Access Control solution to ensure only the right users have access to the right information from the right place at the right time including time of day, location, authentication types, device and OS type, and end system and user groups. BYOD and guest account services included — automated BYOD registration allowing users to register their own devices using their credentials with no IT intervention. Guest registration access control features to assure secure guest networking without burdening IT staff.

Fine-grained configuration options provide an unparalleled range of choices for fine-grained network control. These configuration options include time of day, location, authentication types, device and OS type, and end system and user groups. Identity-aware networking provides user identity functionality including discovery, authentication and role based access controls. The process of managing the user’s lifecycle (e.g. enrollment, role changes, termination) can be automated and linked to other business processes with LDAP and RADIUS integration. Endpoint baselining and monitoring provides agent-based or agent-less end-point assessment capabilities to determine the security posture of connecting devices. It is, aligned with industry standards, works with multiple assessment servers, authentication servers and security software agents to match the needs of organizations who may have existing assessment technology.

[embedyt] https://www.youtube.com/watch?v=K0h4L7P-qoU%5B/embedyt%5D

Extreme Networks Access Control — Identity And Access Appliance

The Extreme Networks Identity and Access appliance controls endpoint authentication, security posture assessment and network authorization. For authentication services, the Extreme Networks Identity and Access appliance acts as a RADIUS proxy. Or RADIUS server for MAC Authentication. Which communicates with the organization’s RADIUS authentication services (e.g. interfaces with Active Directory or another LDAP-based directory service). The Identity and Access appliance supports 802.1X (Extensible Authentication Protocol), MAC, web-based and Kerberos Snooping (with certain restrictions) authentication. For endpoint assessment, the Identity and Access appliance connects to multiple security assessment servers. For authorization services, the Identity and Access appliance communicates RADIUS attributes to the authenticating switch. This allows the switch to dynamically authorize and allocate network resources to the connecting endpoint based on authentication and assessment results.

Identity Aware Networking

In an identity-aware network a user’s capabilities are controlled based on the user’s identity and the access policies attributed to the user. Extreme Networks Access Control provides user identity functionality including discovery, authentication and role based access controls. Extreme Networks Access Control integrates with identity sources such as Siemens Enterprise Communications HiPath DirX Identity. And Active Directory leveraging and extending the organization’s existing directory investments. Users are managed centrally in the identity system for the network and all connected applications. The process of managing the user’s lifecycle can be automated and linked to other business processes with LDAP and RADIUS integration. Users can be automatically added or deleted when they join or leave the organization. Extreme Networks identity-aware networking capabilities provide stronger network security and lower operational cost.

BYOD & Guest Account Services Included

Automated BYOD registration allowing users to register their own devices using their credentials with no IT intervention. Guest registration access control features to assure secure guest networking without burdening IT staff. Also supports guest self-registration, sponsored registration, pre-registration, and support for contact verification via SMS or email. Fine-grained configuration options. Configuration options provide an unparalleled range of choices for fine-grained network control. These configuration options include time of day, location, authentication types, device and OS type, and end system and user groups. Identity-aware networking. Provides user identity functionality including discovery, authentication and role based access controls. The process of managing the user’s lifecycle can be automated and linked to other business processes with LDAP and RADIUS integration.
Extreme Networks Access Control IAM
[TABS_B id=19401]