SE300 ExtremeControl Design Guide
SE300 ExtremeControl Design Guide
ExtremeControl Design
Abstract: This document has been created for Extreme Networks SEs and Partners. The primary purpose for this document
is to serve as textbook style training material used in conjunction with the ExtremeControl 300 level training course. The
content in this document focuses on the design concepts necessary to provide Extreme SEs and partners foundational
knowledge supporting the technical skillsets required to both whiteboard and design an ExtremeControl system.
Contents
Use Cases........................................................................................................................... 5
Visibility Only ..............................................................................................................................5
Control & Bring Your Own Device (BYOD) ..............................................................................5
Guest Registration ......................................................................................................................5
End-System Compliance............................................................................................................5
Use Cases
This design documentation covers the four most common use cases of ExtremeControl
when deployed across different types of networks.
The four use cases covered in this document are listed below.
Visibility Only
ExtremeControl keeps track of all user activity from a network location perspective. It keeps
a detailed audit log of an end system, where it has been, which users have logged into it,
and if that end system has changed. In addition to auditing capabilities, notifications and
alarms can be configured based on the information gathered.
Guest Registration
ExtremeControl provides a versatile guest access workflow allowing dynamic access for
different types of users as well as validation mechanisms to ensure information provided by
the users is legitimate.
End-System Compliance
The End System Compliance capabilities provided by ExtremeControl allow an organization
to verify the integrity of an end system before it is granted full access to the network. If the
end system is not compliant, a self-remediation portal can be provided allowing the user to
conform to the network requirements without the need of IT assistance.
For an ExtremeControl deployment it is common to see the Access Control Engines in the
datacenter at the main building. A minimum of two Access Control Engines are
recommended for redundancy and they can be either virtual or physical. Generally, along
with the Access Control Engines, the Management Center server and wireless controllers
also reside in the datacenter. For the wireless deployment it is common to see Bridge at AP
topologies for wireless users within the campus buildings. However, guest services may still
tunnel back to the datacenter with a Bridge at Controller topology before accessing network
resources.
When designing ExtremeControl for a remote site, it is important to consider the size of the
site and how many local resources are available. The remote sites can generally be
categorized into one of two topologies.
A medium to large remote site will generally have dual Internet links with WAN connectivity
(e.g. site-to-site VPN tunnel) back to the main site. Additionally, the large remote site
contains a routed network that looks similar to a Single Site design. A small on premise
datacenter is common in these scenarios so that locally hosted applications and servers
can be provided for local users. ExtremeControl deployments in this type of remote site
commonly have the Management Center server deployed in the main site with one or two
Access Control Engines deployed in the remote data center. A typical medium to large
remote site topology would look like the following:
A small remote site typically will have fewer network users which access Internet and
datacenter resources from the main site. In these types of environments there is typically
only a single router, firewall, and WAN connectivity to the main site. When deploying
ExtremeControl in this type of environment, it’s expected that the Management Center
server and the Access Control Engines are deployed in the main site datacenter. A small
site topology would look similar to the following:
Deployment Models
There are four primary deployment models available in ExtremeControl that allow for the
various use cases across different network types. Each deployment model can be used in
conjunction with other models as long as they are designed appropriately.
When identifying devices at the edge of the network, a visibility mechanism, typically
authentication, needs to be enabled at every entry point to the network. On edge switches,
this requires enabling authentication for each port. For wireless, this means enabling
authentication on the wireless SSID’s. If there are multiple devices attached to a single port
of a switch, then multi-user authentication needs to be enabled on the port in order to detect
all devices and assign them individual authentication sessions.
In the diagram below the orange lines represent the authentication points in the network.
Note that none of the access points have authentication enabled. While authentication can
be enabled when using Bridge at Controller topologies, it is currently not recommended for
Bridge at AP topologies. Additionally, in the diagram below a PC is provided network
connectivity via an IP phone. As a best practice, it’s recommended to enable multi-user
authentication on all edge ports as this allows ExtremeControl to detect all devices attached
to that port and create individual authentication sessions where different levels of control
can be applied.
Datacenter Edge
The Datacenter Edge deployment model is most commonly used in conjunction with the
Extreme Data Center Connector integration. This deployment model allows for tracking and
control of servers and virtual machines in the datacenter.
When using this deployment model in a virtual environment, the datacenter switches need
to be configured with multi-user authentication so that individual authentication sessions are
created for each virtual machine.
This mode is a requirement for virtual environments where virtual machines have the ability
to migrate to different host machines without administrator intervention. For example, it is
possible for a virtual machine to migrate from host machine “A” to host machine “B” and
then back to host machine “A”. During this example migration, the “Layer 2 Data Center”
mode ensures that the old authenticated switch sessions are deleted and new authenticated
sessions created at each step of the migration. Deleting the stale authentication session
and leaving behind only the current authentication session ensures accurate location
information of the virtual machine within ExtremeControl.
Distribution Layer
The Distribution Layer deployment model is used in environments where visibility and
control cannot be applied at the edge of the network. This can be due to multiple reasons
including:
The Distribution Layer model involves using a CoreFlow2 or policy capable EXOS switch
with multi-user authentication capabilities upstream from the edge network switches. Note in
the example below, the Distribution 1 and 2 switches are providing the multi-user
authentication for the Access 1 and 2 edge switches. Essentially, as individual device traffic
flows from the edge switches through the distribution switches, the devices are detected by
the distribution layer switches and the associated end systems are authenticated using
MAC authentication against ExtremeControl.
A key component to keep in mind for a Distribution Layer deployment is that physical
placement of the distribution switch must be prior to the client traffic being routed. Once the
traffic hits the router, the client MAC address is no longer unique and cannot be correctly
identified.
The main benefit of this Distribution Layer deployment model is that it provides visibility to
all end systems downstream of the distribution switch without the need to configure or
replace any edge switches. However, the main disadvantage of this deployment model is
that it is possible for devices downstream of the distribution switch to openly communicate
with other downstream devices since the control is applied at the distribution switch versus
the edge switch.
Cisco ASA
Enterasys XSR
Juniper SA
If, in addition to visibility, control of the VPN users is required for a particular deployment,
then CoreFlow2 switches must be placed in line between the network and the VPN
concentrators. These CoreFlow2 switches act as a Policy Enforcement Point for the user’s
traffic, whereby ExtremeControl configures an IP to Role mapping in the switch for the
assigned IP address of each VPN user.
Visibility Only
When designing ExtremeControl to function in a Visibility Only model, there are three pieces
of information that need to be gathered from the network administrator.
3) Is there existing EXOS switching on the network? If so, is Visibility the only use case
that will be deployed?
Authentication
If 802.1X authentication is currently deployed on the network, gaining visibility is a relatively
seamless configuration exercise. Before IAC implementation, each switch enabled for
802.1X authentication is already configured to utilize a production RADIUS server. Note the
IP address of the production RADIUS server and then alter the RADIUS parameter on each
switch to instead utilize the IP address of the IAC Engine as the RADIUS server. The IAC
Engine then is configured to utilize the production RADIUS server to complete the
authentication process. Essentially, the IAC Engine becomes a proxy RADIUS server.
Similarly, if a wireless controller is in use, then the SSID that has authentication enabled will
follow the same configuration guidelines as a wired switch, whereby the IAC Engine is
configured as the RADIUS server within the wireless controller.
Redundancy
When inserting Access Control as a proxy RADIUS server into an existing RADIUS
environment it is essential to ensure that redundancy is configured in the Access Control
Engine to the existing production RADIUS servers. Furthermore, it is recommended that at
least two RADIUS servers are configured and that they support RADIUS status polling. This
will allow the Access Control Engine to query the production RADIUS servers with a generic
RADIUS request to verify operational status. If the primary RADIUS server is down, it will be
marked as such, and the secondary RADIUS server will be utilized until the primary
RADIUS server is back online.
Load Balancing
Along with RADIUS configuration of the switches, a plan for Access Control redundancy
and load balancing should be designed for each deployment. For redundancy, it is
recommended that at least two Access Control Engines are configured for authentication
regardless of the size of the environment. ExtremeControl also has the ability to specify the
load balancing algorithm used within EXOS and EOS based switching. There are three
modes of load balancing that can be configured in EXOS and EOS. They are:
Standard – Specifies that the primary RADIUS server should always be used for
authentication, if it is available. The standard RADIUS authentication algorithm
focuses on using RADIUS servers for redundancy rather than for scale provisioning.
The only time the secondary RADIUS server is utilized is when the primary server is
unreachable.
Sticky Round Robin – This algorithm uses round-robin when assigning a RADIUS
server to each unique authentication session, but specifies that the same RADIUS
server should be used for any given authentication session once a session is
initiated. In large-scale ExtremeControl deployments, this algorithm is used for
switches that are authenticating more users than an Access Control Engine
supports. For example, an ExtremeControl deployment might have an S-Series
device that supports 9000 users deployed at the distribution level and authenticating
users to three Access Control Engines that support 3000 users each. In this
scenario, the sticky round-robin algorithm allows the S-Series or K-Series device to
spread the load across all three Access Control Engines while using the same
Engine for all RADIUS transactions for a given session (MAC address).
IDM Notifications
If the answer to the third question is that EXOS switching is currently used on the network
and visibility is the only desired use case, then Identity Management (IDM) notifications can
be used at the edge of the network. Utilization of IDM does not require any authentication
configurations, however, IDM does need to be enabled on the switch. In addition, the switch
must be configured to send an XML notification message to the ExtremeManagement. This
notification message can be enabled via a script available on the Management Center
server. Right-clicking a switch and navigating to the menu option shown below allows for
the configuration of the Notification message.
The best available option to ensure proper resolution of the IP address, Device Type, and
Username is in a virtual environment where both a Kerberos server and DHCP server are
virtualized. The ideal scenario is for the Access Control Engine to be virtualized and the
virtual environment configured in a way that all three servers reside on the same virtual
switch. Enabling promiscuous mode on that virtual switch then allows for the Access Control
Engine to snoop both sides of the DHCP and Kerberos messages that occur on the
network. If the three servers must reside on separate virtual switches, multiple NICs can be
enabled on the Access Control Engine and assigned to the various virtual switches.
If a virtual environment is not in use, or cannot have promiscuous mode enabled, the next
best option is to have an IP helper address configured on the router interfaces to forward a
copy of the DHCP request messages to the Access Control Engine.
To do this, the router interfaces that clients are connecting to should be identified. In
addition to the existing IP Helper addresses that forward DHCP requests to the DHCP
servers, another entry needs to be added for the Access Control Engine. If there are
multiple Engines in the deployment, it is recommended that the messages are sent to at
least two of the Access Control Engines for redundancy. The Access Control Engines will
then share the DHCP information between the other Engines in the network.
In addition to adding the IP Helper information on the routers, a SNMPv3 read only profile
should be configured on the routers that can be shared with ExtremeControl. This will allow
the Access Control Engines to poll the routers’ IPNetToMedia table to finalize the IP
address resolution.
NOTE
Configurations where the DHCP addresses are provided by the router have limited support. A
traditional DHCP server is highly recommended as it will provide the easiest method for
ExtremeControl to retrieve IP resolution details of end systems. If the DHCP addresses must be
served by the router, it is recommended to have an interface of the Access Control Engine on the
broadcast domain of the router.
1) The Distribution Layer edge needs to occur before the layer 3 boundary. In order for
a device to be authenticated at the distribution layer, the distribution layer switch
needs to be able to see the MAC address of the edge device connecting. Any
attempts to authenticate a device after it hits a router will result in only a single
device being detected – the router. This is because when a device’s traffic is routed,
the source MAC address is replaced with the router’s MAC address.
3) Ensure the switch that is used for the distribution is licensed for the correct number
multi-user authentications. Depending on the switch model and license installed,
there are different numbers of maximum authenticated users allowed by the switch.
If the switch goes over that maximum number of users, an alarm will be triggered in
Management Center and the switch will apply the default policy on the port.
Additionally, the end systems over the maximum will not be seen in ExtremeControl.
4) If 802.1X is desired for user authentication it typically needs to occur at the edge of
the network. The 802.1X standard does not allow for EAPOL frames (used in
802.1X) to be forwarded by the switch. Similar to spanning tree BPDU’s, the EAPOL
frames must be consumed or utilized by the switch. With that said, some switch
models have configuration modes that allow for the forwarding of EAPOL frames so
that they can be used by the distribution switch. This is rather uncommon though
and is generally not recommended as it can prove faulty upon upgrading the edge
switch firmware. If 802.1X if required, implementation at the edge is recommended.
1) Since Visibility mode does not have enforcement enabled, a CoreFlow2 switch is not
required to be inline as the authentication is coming from the VPN concentrator.
Additionally, the authentication process will produce the end system’s IP address for
ExtremeControl to collect.
2) Device Type fingerprinting will be limited. Since the IP address will be assigned by
the VPN Concentrator, no DHCP request will be seen on the LAN. Because of this,
no DHCP snooping will happen and therefore it’s unlikely that a reliable device type
will be detected.
To define these, the use cases required in the network need to be understood. Some
example questions that should be asked are:
4) What are the example use cases for restricted or elevated access?
Based on the answers to these questions, plans can be made that detail how the
ExtremeControl solution will function on the customer network.
Rules Engine
Once the base level of access that will be allowed is understood, that access level will be
configured for the “Catchall Rule” in ExtremeControl. Additional rules for other use cases
only need to be created if the use case represents an exception to the Catchall Rule. If it is
indeed an exception, a rule should be created with an appropriately named Access Control
Profile that assigns an appropriate Accept Policy.
An example is a rule for “Printers”. Most customers that utilize a limited access Catchall
Rule need an additional rule for Printers. An example rule will look like the following:
This type of rule will generally match on an End System Group consisting of MAC OUI’s or
individual MAC Addresses and are assigned a profile named “Printer Profile (Auto)”. This
profile will then assign an Accept Policy of “Printer”. The Printer policy that is assigned will
provide a level of access that is different from the “Catchall Rule”.
As a best practice, rules for different devices should only be created if the level of access
needed for the device is different from other devices on the network. There are two general
exceptions to this best practice. The first is if there are reporting metrics that are driven
based on the assigned Access Control Profile or policy. The second is if the Notification
Engine will be triggered based upon the assignment of the Profile.
While creating different rule types based on rule components, it is important to keep in mind
dependencies for resolution of these different components. For instance, in most
environments the IP address, hostname, and device type may not be resolved immediately.
If rules are created using these components, a plan should be in place to define the level of
access assigned to these devices while the additional information is resolved.
In this example the first rule matches domain computers based on the hostname of the
device (End-System is in Domain Computers).
Since the hostname will not be resolved immediately, the connecting device will fall to the
less specific rule without the hostname component. As soon as the hostname has been
resolved, the end system will be re-authenticated and re-run through the rules engine.
The last best practice is to create a Whitelist Rule near the top of the Rules Engine. The
purpose for a whitelist rule is to provide temporary open access in case a user has access
issues that need to be resolved immediately.
The Whitelist Rule contains one rule component matching an empty End System Group
based on MAC Addresses. This allows an administrator to add a device to the Whitelist by
right-clicking the entry in the End System table and selecting the “Add To Group” option.
Install valid SSL Certificates – Installing valid SSL certificates on each Access
Control Engine allows the captive portal to run over HTTPS. This is highly
recommended when using authenticated registration since passwords will be
entered on the portal.
Modify the text in the web pages – The verbiage used within each of the captive
portal web pages may not be specific to the customer environment. It is highly
recommended to review the wording used in each page to ensure that it matches
what is expected from a user experience.
Modify the Look and Feel – There is a simple UI to modify colors and images used
within the captive portal.
Authenticated Registration
When using Authenticated Registration with ExtremeControl for BYOD users, there are
some best practices that should be considered during the design and configuration process.
2) Define an expiration date for registrations. This expiration date is set by the number
of days from registration or can be set to never expire. Most customers define a
relatively large number of days or set the parameter to not expire so that users will
not need to register their devices multiple times.
3) Enable Survivable Registration. The Management Center server must be online and
functional for the registration process to operate. Because of this, it is recommended
that Survivable Registration be enabled for instances when the Management Center
server is offline. This functionality allows for temporary access to the network for
anyone that is redirected to the Captive Portal for registration. The user will be
provided a message stating that they are being granted temporary access. Once the
Management Center server is back online, the system re-authenticates the device
and the user will proceed with the registration process. Survivable Registration
requires that the Failsafe policy for the Unregistered Access Control Profile is
enabled and defined. The user will receive the Failsafe policy when the Survivable
Registration is triggered.
Redirection
If a BYOD environment is being deployed where a captive portal is required for a user to
authenticate to the network, a choice of redirection method must be determined. Policy
Based Routing (PBR) should be used whenever possible. If PBR is not possible on the
wireless edge, then External Captive Portal is suggested. If neither of those options is
available, DNS Proxy should be used for web redirection.
spread the web redirects across both next-hop IP addresses but the unique requests will
maintain a connection to a specific next-hop IP address.
To add a pseudo-load balancing of web traffic to multiple Access Control Engines, multiple
PBR statements need to be created. Similar to the way that the IP-Hash statement
functions in EOS, different ACL’s are created for EXOS that match a mask of the source IP
address or source TCP port. Then an additional flow redirect is created to allow for both
redundancy and load sharing.
NOTE
At the time of publishing this document, the PBR redundancy and load balancing configuration could
not be validated. While it should function as expected, caution should be used when implementing
as the configuration may vary from what is published. It is recommended if this task is being
attempted, to contact Corporate Systems Engineering to assist with the design.
DNS Proxy
DNS Proxy requires that the secondary DNS option in the DHCP scope be configured with
the Access Control Engine IP address. Because the secondary DNS server for the DHCP
scope is now the Access Control Engine, it is recommended that during initial configuration
of the Access Control Engine, the secondary DNS server be used in place of the primary.
With this configuration in place, if the primary DNS server is offline, the Access Control
Engine will receive the DNS Request and proxy it immediately to the secondary DNS
server. The exception to this rule is if a VLAN change occurs after registration or when
remediation occurs. In this case, the primary DNS server can be set to the Access Control
Engine.
Another best practice pertains to how a user is redirected out of the captive portal upon
successful registration or remediation. Some web browsers will cache a DNS response
regardless of whether or not a ‘no-cache’ directive is given by the DNS server. Because of
this, when a user connects to the network for the first time and negotiates to a homepage
and is also redirected to the same website after successful registration or remediation, the
user may be redirected back to the captive portal.
To prevent this from happening, one of two suggestions is recommended. The first is to set
the redirection URL to an internal website that will not be used as a home page. The other
is to disable the automatic redirection for the captive portal and supply a custom message
instructing the user to restart the web browser therefore clearing the DNS cache in the
browser.
When rules are created using locations, keep in mind that the location will be the
port where the distribution layer switch sees the end system. If there is a 3rd-party
switch downstream, ExtremeControl will not see the physical edge port where the
end system is connected.
A rule should be created to allow all traffic from the networking devices downstream
of the distribution layer switch. This should be based on MAC address and is
typically based on the MAC OUI of the devices.
1) The first and most recommended way is to use a CoreFlow2 switch as a Policy
Enforcement Point (PEP) in line with the user’s traffic. As a user authenticates
through the VPN concentrator, the Access Control Engine authenticates the user
and can apply a policy to the user’s IP address at the CoreFlow2 switch.
2) The second and less commonly used method of control is to assign an ACL to the
VPN Concentrator via RADIUS authentication. For instance, a Filter-ID can be
passed to a Cisco ASA VPN concentrator that assigns a pre-defined ACL to the
authenticated session.
Guest Registration
When using Access Control for BYOD it is common that a guest registration system needs
to be designed. There are also cases where Guest Access is the primary purpose for the
Access Control implementation. When this is being designed the following questions should
be asked:
2) Is a valid piece of identity information required for the user? For instance, a phone
number or email address?
5) How long should the guest be allowed on the network before needing to re-register?
Registration Workflow
When designing the guest registration process, it is assumed that the “Catchall Rule” in the
rules engine assigns the Unregistered Access Control Profile. Once this is assigned, the
user is redirected to the Access Control Engine to complete the registration process. For
mobile devices and devices that use WiSPr to check for a network login page, the Access
Control Engine will automatically intercept the messages and prompt a user to log into the
network without the need for the user to open a web browser.
The next portion of the design is deciding what the users should see in the web page. If
authenticated registration is used in combination with guest registration, it is typical that
both a username / password screen and a guest registration screen are shown on the same
page.
A possible issue with having both of these options on the same page is that some
customers will find their internal users logging in through guest registration versus using
their valid credentials and thus be provided a Guest Access profile. In some environments
this is not an issue, however, in others where an authenticated user has a higher level of
access than a guest, it becomes problematic.
There are multiple ways to solve this issue, however the methods are customer specific. For
instance, separate captive portal pages based on the SSID can be used. Another method
that can be utilized if domain machines are used on the network, is to not allow registration
for devices where the hostname matches a domain computer name.
Redundancy
Similar to using Authenticated Registration, survivable registration is generally
recommended when using Guest Registration. This ensures that guest users that need to
access the network while the Management Center server is offline can gain some type of
access.
Sponsorship
There are multiple types of sponsorship workflows that are available. If security has a higher
priority than user experience, a required sponsorship mode should be enabled. This mode
will dictate that the user remains at the guest registration screen until a sponsor approves
the user. There are multiple options for specifying a sponsor. The guest user can select an
email address from a drop down list, enter a full email address of a sponsor, or a pre-
configured email list can be specified and the guest does not need to select anything.
Sponsors can be tied to an LDAP group, a RADIUS group, or a local user account. The best
practice in an Active Directory environment is to create a new Security group for sponsors
and add appropriate users to the group. Once that group is created, an LDAP User group
can be specified for Sponsor Access.
An alternative, but lesser used, method of sponsorship is Optional Sponsorship. This mode
allows a user to gain a standard level of Guest Access on the network prior to being
approved by a sponsor. A sponsor will receive an email showing that sponsorship was
requested, and is given the ability to set the expiration time and whether or not to add the
guest user to a different end system group allowing a higher level of access. This mode is
typically used for allowing network access to contractors.
The SMS Gateway integration is done via an email API. Variables are replaced as needed
to integrate with the SMS Gateway providers. The formatting and substitution is done via
the Message Strings modification of the Portal Configuration similar to the way the verbiage
in the Captive Portal is modified. Any SMS Gateway provider that supports an email API
should work. Review the Control Center release notes for validated SMS Gateway
providers.
If email integration is desired for the verification method, email services need to be allowed
for the policy assigned to unregistered users.
Best Practices for SMS Text / email verification is to use SMS text whenever possible as
email may be difficult to access while still on the captive portal page. If possible, an SMS
Gateway provider is also recommended, as they tend to have existing relationships with
SMS providers and can take ownership of issues when they arise such as when customers
are not receiving text messages.
Facebook Registration
When using Facebook Registration, there are two main design aspects to take into
consideration.
2) Because the user is redirected to Facebook to sign in, the Unregistered policy in
ExtremeControl must allow access to Facebook over HTTPS.
End-System Compliance
When designing for End-System Compliance it is important to have a clear goal of what
information is desired from the compliance checks. There is a vast array of configuration
options and test cases that can be selected, so a detailed knowledge of what is desired
must be understood. Some of the questions that should be asked are:
1) Is the goal to look for vulnerabilities on the computer? i.e. Is the end system
vulnerable to the Heartbleed exploit?
2) Is the goal to detect the current state of applications or settings on the computer? i.e.
is anti-virus software running and is it up to date?
5) Which users or user groups will be scanned? All? Some? Guests? CxO’s?
Once these requirements are gathered, there are multiple decisions that need to be made in
regards to the design of what features are implemented.
Agent-Based Assessment
If the assessment requirements are to determine the current state of the computer and to
check for specific settings, agent-based assessment should be considered. The answers to
the questions above should determine the type of control restrictions needed.
Typically, both an Assessing policy and a Quarantine policy are defined. The base level of
access needed for these policies is for TCP ports 8080 and 8443 to be allowed to the
Access Control Engines. These two ports represent both the discovery and data
communication channels that the agent uses to communicate with the Access Control
Engines.
Once the agent is downloaded and installed, it will attempt to connect to an Access Control
Engine based on the IP address that is included in the file name. For example, if the name
of the file is NACAgent_10.1.2.3.exe then it will attempt to connect to an Access Control
Engine at 10.1.2.3. Once the agent connects to the first Access Control Engine, a list of all
other available engines will be downloaded in the background to allow for redundancy.
If the Access Control Engine IP address is not available in the filename of the agent or if it
cannot be reached, the Access Control Agent will perform a DNS lookup for
“Enterasys_NACAppliance1” and “Enterasys_NACAppliance2”. If those names resolve to IP
addresses of Access Control Engines, the agent will connect to them and download a list of
any other available Access Control Engines.
Remediation Options
When determining the tests to run against an end system, it is necessary to understand
whether a failed test requires remediation, and if so if the user will be required to fix the
issue before gaining access to the network. Tests can be configured to be informational,
warning, or mandatory. Some tests also allow for auto-remediation. These tests include
Service State Checks, Process State Checks, Firewall Checks, and Patch Auto-Update
Checks.
If auto-remediation is enabled and the agent was not installed with privileges to take action,
auto-remediation will fail and the user will be provided with the Quarantine policy.
The other remediation option available is for Warning tests, which allows for a “Click-
through” portal when the user is redirected. After a failed test, the user is assigned a
Notification Profiles instead of a Quarantine Profile. Once the warning is acknowledged, the
user is granted the standard Accept policy. If the test is set as Mandatory, the user is
assigned the Quarantine policy and will have access restricted until self-remediation is
completed.
The Access Control Agent can also provide a pop-up message to inform the user that their
access has been restricted. This is beneficial since it does not require the user to open a
web page.
Agentless Assessment
If it is determined that the end system vulnerability state is a concern, Agentless
Assessment should be considered. Since Agentless Assessment is a network-based scan,
there are general considerations that need to be understood.
Firstly, an Assessing policy may or may not be used when using Agentless Assessment. If a
policy is implemented, it is important to ensure that full IP connectivity is allowed to the
Access Control Engines by the policy. This is needed because the Access Control Engine
will query multiple ports on the end system to discover as much information as possible.
If only certain Access Control Engines are desired to run agentless assessments, an
assessment pool can be created containing the desired Access Control Engines. The test
set can then specify which assessment pool to utilize.
For small remote sites, where there is no local Access Control Engine, it is not
recommended to use agentless assessment due to the amount of traffic that would pass
over the WAN connection to a central site where the Access Control Engine would normally
reside.
Scan Intervals
As part of the Access Control Profile, a Scan Interval is set in the Assessment configuration
to define how often the end system should be scanned. This is used primarily with
Agentless Assessment and should be set for a number of days that an end system is
considered healthy before scanning again. The first time an end system connects to the
network it will be scanned and then will not be scanned again until the Scan Interval expires
or if an administrator forces a “Re-Auth and Scan”.
Management Center
There are also three licensing components that need to be taken into account:
Software Components
The first software component is the Management Center server.
The Management Center server can be installed as a virtual appliance in a VMWare ESXi
virtual environment, a Microsoft Hyper-V virtual environment, or installed as software on an
underlying OS. Regardless of the installation method, the software itself is licensed the
same way.
In addition to the virtual appliance a physical appliance is also available for purchase (NS-
A-20). The Management Center software can also be installed on a Windows or Linux host
as a separate installation.
NOTE
The Management Center server can support up to 100,000 end systems in its database. If designing
for a customer with more than 100,000 end systems, please contact Corporate Solutions
Engineering for assistance.
The second software component is the Access Control Engine. The Access Control Engine
is available as both a physical appliance and a virtual appliance using for VMWare ESXi or
Microsoft Hyper-V.
The physical appliance is available in two different hardware models, IA-A-20 and IA-A-
300.
The two models are manufactured with different hardware configurations. Hence they offer
different scaling capabilities.
Licensing Components
The first licensing component needed when building the ExtremeControl Kit List is the
Management Center software. The Management Center server must be using either a
Standard NMS (NMS-XX) or Advanced (NMS-ADV-XX) license. Additionally, if Control
Center API’s are used for integration with third-party services such as a virtual
infrastructure, MDM server, or Next-Gen Firewall, NMS-Advanced (NMS-ADV-XX) must be
used. Once the level of NMS software is chosen, the device count must be included. Each
switch or wireless controller that authenticates to the Access Control Engine must be
included in that device count. Additionally, each Access Control Engine is included in the
device count since the engines are managed by Management Center.
For example, if there are 40 switches that are authenticating users, two wireless controllers,
and two Access Control Engines, the total device count is 44. Hence the license required is
NMS-50. If the Management Center API is utilized in the same scenario, the license
required is NMS-ADV-50.
Looking at the following chart, a 24-hour window is shown in purple. Notice that within that
24-hour period, the highest number of Active End Systems was 300.
In this next chart the number of Active End Systems is much lower for a 24-hour period.
Within this period, only 200 End System licenses are used.
Finally, this chart displays how a spike in Active End Systems remains in place for the 24-
hour period after the spike occurred. Regardless of the fact that the next day starts with 200
Active End Systems, 400 End System licenses are needed since 400 were seen within the
last 24 hours.
The simplest example of licensing is for an enterprise environment where a relatively static
number of devices appear each day. If each user is only allowed to use their company
issued computer and there is no guest network, it can be assumed that only those devices
will appear on the network. If ExtremeControl is only enabled on the wired network, a direct
1:1 mapping of devices to users can be used to calculate computers. The next step is to
account for any printers or other devices attached to the network. For example, if there are
950 users, 10 printers, and 30 IP cameras, 990 devices will exist on the network. Therefore
1,000 End System licenses would be sufficient. However, if a wireless network is going to
be used as well and these devices swap between a wired and wireless connection, that
number should be doubled since a device on the wired network will show up separately
from a device on the wireless network. Therefore, 2,000 End System licenses would be
sufficient.
If BYOD or mobile devices are allowed on the network, it should be assumed that each user
on the network will have two or three devices that they attach to the network. Therefore, for
the 1,000 users in the previous example, 3,000 End System licenses would be sufficient.
The number becomes much more difficult to predict when a guest network becomes a
requirement. Since guest users generally do not connect every day, a guest user’s license
can be re-used once they have not been seen for 24 hours. The easiest way to estimate
this number on an existing guest network is to examine the number of DHCP leases that
have been issued over the course of a few days. The maximum number of leases issued is
the maximum number of guests that have connected.
The estimation of End System licenses required becomes a bit more difficult when planning
for implementation of a new guest network. For this scenario it’s best to look at the type of
environment that is being designed. These can generally be grouped by vertical.
For a K-12 environment, a “Guest” will generally be a number of parents that come
to visit each day. Most K-12 environments will track the number of visitors coming
each day, so that can be used for estimation.
Using a combination of the known daily users, the type of environment, and the number of
guests that are expected to appear on the network each day, a fair estimation of the End
System count can be determined.
Vertical Estimation
If a quick estimation of the End System licenses is needed, a rough count can be
determined based on the vertical. Some of these verticals do require additional thought and
questioning of the customer to get values.
Higher Education Environment – Faculty and Staff members should be counted for
their deployed device as well as any mobile devices they may have. On campus
students can generally be expected to have three devices each. Commuting
students can generally be expected to have two devices each. Lastly add in any
guests that are expected.
Healthcare Environment – The number of doctors, nurses, and staff members should
be added together for number of users. If they are allowed to connect their mobile
devices on the network, they should be added as well. In addition, medical devices
connected to the network must be added. Lastly, to calculate the patients, the
number of beds at the facility should be counted and then that number should be
rounded up to account for visitors for these patients.
When calculating this number, keep in mind that a user is not equivalent to a device. It is
standard practice to assume that each user on the network will have two or three devices
connected to network at any one time. This is typically a computer, smart phone, and / or a
tablet. So once a number of users is determined, it is important to account for their multiple
devices.
For example, a Kit List to cover 15,300 end systems will include:
1x IA-ES-12K
1x IA-ES-3K
Assessment Licenses
If assessment is part of the ExtremeControl solution, an additional license must be included.
This license does not need to cover every end system. It only needs to cover those being
assessed. Similar to the way End System licensing functions, assessment licenses count
devices seen in a 24-hour sliding window. Assessment licenses are available for 3,000
Devices (IA-PA-3K) and 12,000 Devices (IA-PA-12K). These licenses are cumulative so
multiple licenses can be added together to reach the needed license count.
This document and the information contained herein are intended solely for informational
use. Extreme Networks, Inc. makes no representations or warranties of any kind, whether
expressed or implied, with respect to this information and assumes no responsibility for its
accuracy or completeness. Extreme Networks, Inc. hereby disclaims all liability and
warranty for any information contained herein and all the material and information herein
exists to be used only on an “as is” basis. More specific information may be available on
request. By your review and/or use of the information contained herein, you expressly
release Extreme from any and all liability related in any way to this information. A copy of
the text of this section is an uncontrolled copy, and may lack important information or
contain factual errors. All information herein is Copyright ©Extreme Networks, Inc. All rights
reserved. All information contain in this document is subject to change without notice.
Revision History
Date Revision Changes Made Author
2/19/16 1.0 Initial Draft T. Marcotte
2/23/16 1.0.1 Minor Grammatical Edits T. Marcotte
2/29/16 1.0.2 Fixed a typo in the PBR configuration for EXOS T. Marcotte
1/16/17 1.0.3 Update naming conventions and screenshots for K. Jones
7.0