0% found this document useful (0 votes)
22 views

Extremecontrol Data Sheet

This document provides a data sheet for ExtremeControl, which is a network access control solution that allows granular control over network access for users and devices. It highlights key features such as: 1) Providing business-aligned network security policies based on user and device identity and context. 2) Enabling secure BYOD, guest access, and IoT deployment through role-based identity management and device profiling. 3) Integrating with third-party security and management solutions for a comprehensive access control system.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views

Extremecontrol Data Sheet

This document provides a data sheet for ExtremeControl, which is a network access control solution that allows granular control over network access for users and devices. It highlights key features such as: 1) Providing business-aligned network security policies based on user and device identity and context. 2) Enabling secure BYOD, guest access, and IoT deployment through role-based identity management and device profiling. 3) Integrating with third-party security and management solutions for a comprehensive access control system.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Dat a Sheet

Hig hlig ht s
Business A lig ned
- Let your b usiness im p erat ives d rive t he
net w ork w it h cont ext d riven p olicies
- Prot ect corp orat e d at a by p roact ively
p revent ing unaut horized users,
com p rom ised end p oint s, and ot her
vulnerab le syst em s from net w ork access
- Securely enab le crit ical init iat ives like
BYOD and IoT
- Effect ively b alance securit y and
availab ilit y for users, cont ract ors
and g uest s
- Roll out consit ent p olicies from t he
ed g e t o t he d at a cent er
- Leverag e p ricing alig ned w it h your
b usiness need s w it h p er-user p ricing
Ext rem eCo nt ro l ?
Keep your net w ork ed g e secure w it h end -p oint securit y.
A ccess Securit y
- Dynam ic role-b ased net w ork W it h m ost d at a b reaches st art ing at end -p oint s, you need g ranular cont rol
access cont rol b ased on cont ext ual over users and IoT d evices and consist ent p olicies across t he ent ire
id ent it y inform at ion
net w ork int o m ult icloud . Our access cont rol solut ion g ives you cent ralized
- Tig ht int eg rat ion w it h t hird p art y in-d ep t h visib ilit y and cont rol over all end -p oint s across your w ired and
solut ions such NGFW, SIEM, CMDB,
w ireless net w orks t hroug h one sim p le, flexib le and easy t o consum e
int ernet securit y and EMM/ MDM
d ashb oard .
- Proact ively secure g uest access and
BYOD onb oard ing Ext rem eCont rol securely enab les BYOD and Iot t o p rot ect your net w ork
- Built -in d evice p rofiling w it h int ernal
ag ainst ext ernal t hreat s. It let s you cent rally m anag e and d efine g ranular
and ext ernal p rofiling t echniq ues p olicies so you can m eet com p liance ob lig at ions, locat e, aut hent icat e and
Int eg rat ed ag ent -b ased and ag ent less ap p ly t arg et ed p olicies t o users and d evices.
securit y p ost ure assessm ent
For ext end ed access p olicy, you can roll out t he sam e p olicies
- Secure IoT net w ork access
aut om at ically from t he Sm art Om niEd g e t o t he A ut om at ed Cam p us int o
Op erat io nal Efficiency t he A g ile Dat a Cent er.
- A ccelerat e t roub leshoot ing
by sep arat ing net w ork from Our net w ork access cont rol solut ion is int eg rat ed w it h m ajor
ap p licat ion issues ent erp rise p lat form s includ ing solut ions for net w ork securit y, ent erp rise
- Sp end less t im e m onit oring ap p licat ions m ob ilit y m anag em ent , analyt ics, cloud and d at a cent er. In ad d it ion, it
w it h aut om at ic p erform ance alert ing offers an op en nort hb ound A PI for cust om ized int eg rat ions t o key
- Sim p lify m anag em ent across your ent ire ent erp rise p lat form s.
net w ork w it h one sing le p ane of g lass
for m anag em ent , p olicies, access
cont rol and ap p licat ion analyt ics
- A void service d isrup t ions w it h
p ro-act ive p erform ance m onit oring
and alert s

W W W.EXTREMENETW ORKS.COM 1
Secure Your Net work w it h Granular
Policy Cont rol and In-Dept h Visibilit y
Exrem eCont rol enab les you t o ap p ly g ranular cont rols
over w ho, w hat , w hen, w here, and how end p oint s are
allow ed on t he net w ork. You can enab le secure BYOD,
g uest access and IoT by rolling out real-t im e p olicies
b ased on t he securit y p ost ure of d evices. Ext rem eCont rol
m at ches end p oint s w it h at t rib ut es, such as user, t im e,
locat ion, vulnerab ilit y, or access t yp e, t o creat e an
all-encom p assing cont ext ual id ent it y. Role b ased id ent it ies
follow a user, no m at t er from w here or how she connect s
t o t he net w ork. They can b e used t o enforce hig hly secure
access p olicies.
Figure 1: Guest and IoT Manag er

Set t ing g ranular p olicies and scaling t hem across your


net w ork aut om at ically, m akes it p ossib le t o com p ly t o Our id ent it y-aw are solut ion aut om at ically m anag es
int ernal p olicies and ext ernal reg ulat ions. W it h one click exp irat ion, account valid it y and t im e cont rol for g uest
you can enforce cont ext -d riven p olicies across d evices for account s w it hout any IT involvem ent . Securely and easily
QoS, b and w id t h and ot her p aram et ers and alig n t hem t o onb oard g uest s and BYOD d evices w it h ext ensive
your b usiness im p erat ives. A d vanced rep ort ing of all user cust om izat ion, b rand ing and sp onsor-b ased ap p rovals.
valid aut hent icat ions and failures w it h a real-t im e st at e Built -in d evice p rofiling using various int ernal and
t ab le of all connect ed users and d evices alert s you t o ext ernal p rofiling t echniq ues m akes sure only d evices t hat
p ot ent ial issues. com p ly t o your p olicies can access your net w ork. Users
can log int o t heir Yahoo or Salesforce account t o com p let e
In t he face of const ant net w ork t ransform at ion you can g uest reg ist rat ion.
use m icro seg m ent at ion for consist ent securit y w it hout
t he need for com p lex net w ork chang es. W hen rolling out
larg e p roject s, red uce risk by t est ing new p olicies and
using p assive p olicies for w hat -if-scenarios p rior t o
enforcem ent . Ext rem eCont rol let s you id ent ify t hreat s by
p rofiling and t racking users and d evices, as w ell as
m onit oring t he healt h and com p liance of d evices b efore
and aft er access. It assesses your net w ork w it h p olicy
aud it s and hit rep ort s.

Ext rem eCont rol also offers t hird p art y p olicy sup p ort , via
user-b ased A CLs, ensuring g ranular cont rol of your ent ire
net w ork, includ ing Ext rem e and t hird p art y eq uip m ent .

Super Easy and Secure Onboarding


for Guest s and IoT Devices
Our Guest and IoT Mang er enab les IT t o set up easy t o use
onb oard ing t em p lat es t hat enab les non-t echnical st aff t o
p rovision new users and d evices. A d d it ionally, w e offer a
set of REST A PIs t o allow p rog ram m at ic onb oard ing of
users and d evices.

To p rovid e a sm oot h exp erience for visit ors t he Guest and


IoT Manag er also includ es an MS Out look p lug in t hat
aut om at ically creat es a net w ork access account t o p eop le
Figure 2: Microsoft Out look Calend ar Plug in
b ased on Microsoft Out look Calend ar event s.

W W W.EXTREMENETW ORKS.COM 2
To p revent access of your net w ork from non-com p liant Expand Securit y Int egrat ions w it h
and un-enrolled d evices w e m ake int eg rat ion w it h our
EMM/ MDM p art ners, such as A irw at ch, Cit rix and
Next -Generat ion Firewalls
Mob ileIron easy. A d d it ionally, int eg rat ed ag ent -b ased and Our Ext rem eCont rol is int eg rat ed w it h our ecosyst em of
ag ent less securit y p ost ure assessm ent s w it h t he ab ilit y t o p art ners t o exp and net w ork securit y and t hreat resp onse.
int eg rat e ext ernal solut ions like scanners and end p oint Based on alert s from next -g enerat ion firew all solut ions, w e
securit y solut ions are availab le. orchest rat e end p oint isolat ion and rem ed iat ion. We share
cont ext ual inform at ion such as users, IP ad d ress and
Onb oard ing for BYOD or g uest p olicies is m ad e easy and locat ion for p ow erful p olicy enforcem ent at p erim et er
secure w it h our self-service p ort al t hat offers t ext ing and firew alls. Policies b ased on ID-IP m ap p ing follow users.
social log in b ased id ent it y. It let s users m anag e d evices
accord ing t o b usiness p olicies. Devices are aut om at ically
Appliance Opt ions
p rovisioned , p rofiled , and a securit y p ost ure com p lying t o
your securit y p olicies is set up. A t t he sam e t im e, Hard w are A p p liances
em p loyees can g et t heir d evices ont o t he net w ork w it hout Our Ext rem eCont rol ap p liances are rack-m ount ab le
req uiring IT assist ance. servers w it h all cap ab ilit ies p re-inst alled .
Purchased ap p licat ions ( licensed sep arat ely) are act ivat ed
Get Visibilit y Across Your Net work w it h via license keys:

Advanced Report ing and Alert ing - The Ext rem eCont rol A p p liance IA -A -25, m anag es up
Ext rem eCont rol m akes it easy t o m onit or issues on your t o 12K end syst em s
net w ork ? all on one sim p le-t o-read d ashb oard . It send s - The Ext rem eCont rol A p p liance -IA -A -30 5, m anag es up
you ad vanced , cust om izab le rep ort s and alert s ab out t he t o 24 K end syst em s
aut hent icat ion, g uest access, onb oard ing , d evice p rofiles
Virt ual A p p liances
and aut hent icat ion, as w ell as end -syst em healt h.
Ext rem eCont rol can also b e inst alled as a virt ual
Reduce Securit y Vulnerabilit ies w it h ap p liance t hat cust om ers can d ow nload at p urchase.
The Ext rem eCont rol, virt ual eng ines m ust b e d ep loyed on
End-Syst em Post ure Assessment a VMWare or Hyp er-V server w it h a d isk form at of VHDX.
Ext rem eCont rol offers b ot h, ag ent -b ased and ag ent less
- The VMWare Manag em ent Cent er virt ual eng ines are
assessm ent op t ion. We can inst all eit her a p ersist ent or
p ackag ed in t he.OVA file form at (d efined by VMw are)
d issolvab le ag ent on t he client end syst em or t he ag ent
can b e d ow nload ed via a cap t ive p ort al w eb sit e. It can - The Hyp er-V Manag em ent Cent er virt ual eng ines are
p ackag ed in t he .ZIP file form at
also b e inst alled via a soft w are d ist rib ut ion syst em such as
Group Policy or Syst em Cent er Config urat ion Manag er.
The ag ent less assessm ent d oes not req uire an inst allat ion
or running of any soft w are on t he end syst em .

W W W.EXTREMENETW ORKS.COM 3
Hardware Appliance Specificat ions
Pro d uct Part Num b er IA -A -25 ( 8710 0 ) IA -A -30 5 ( 8710 1)

A p p liance Sp ecif icat io ns

St orag e 150 GB Ent erp rise SSD 24 0 GB Ent erp rise SSD

Net w orking 2 x 1Gb E 2 x 1Gb E

TPM Version 2.0 Yes Yes

A p p liance Scale Num b er

A ccess Cont rol End -Syst em s Up t o 12,0 0 0 Up t o 24 ,0 0 0

Pow er Sp ecif icat io ns

Red und ant Pow er Sup p ly 750 W 80 + Plat inum Hot Plug g ab le 750 W 80 + Plat inum Hot Plug g ab le

A C Inp ut Volt ag e 90 Hz t o 132V and 180 V t o 264 V 90 Hz t o 132V and 180 V t o 264 V

A C Inp ut Freq uency 47Hz t o 63Hz 47Hz t o 63Hz

Physical

Rackm ount / Dim ensions 1U Rack/ 16.93" x 27.95" x 1.72" 1U Rack/ 16.93" x 27.95" x 1.72"

Weig ht 29 lb. ( 13.15 kg ) Max 29 lb. ( 13.15 kg ) Max

Env iro nm ent al Sp ecif icat io ns

- A SHRA E Class A 2 ? Cont inuous Op erat ion. 10 º - A SHRA E Class A 2 ? Cont inuous Op erat ion. 10 º
C t o 35º C ( 50 º F t o 95º F) w it h t he m axim um C t o 35º C ( 50 º F t o 95º F) w it h t he m axim um
rat e of chang e not t o exceed 10 °C p er hour rat e of chang e not t o exceed 10 °C p er hour
Op erat ing - A SHRA E Class A 3 ? Includ es op erat ion up t o - A SHRA E Class A 3 ? Includ es op erat ion up t o
4 0 C for up t o 90 0 hrs p er year. 4 0 C for up t o 90 0 hrs p er year.
- A SHRA E Class A 4 ? Includ es op erat ion up t o - A SHRA E Class A 4 ? Includ es op erat ion up t o
4 5C for up t o 90 hrs p er year. 4 5C for up t o 90 hrs p er year.

Ship p ing -4 0 º C t o 70 º C ( -4 0 º F t o 158º F) -4 0 º C t o 70 º C ( -4 0 º F t o 158º F)

50 % t o 90 %, non-cond ensing w it h a m axim um 50 % t o 90 %, non-cond ensing w it h a m axim um


Hum id it y ( Ship p ing ) w et b ulb of 28° C ( at t em p erat ures from 25° C t o w et b ulb of 28° C ( at t em p erat ures from 25° C t o
35° C) 35° C)

Vib rat ion ( Unp ackag ed ) 5 Hz t o 50 0 Hz 2.20 g RMS rand om 5 Hz t o 50 0 Hz 2.20 g RMS rand om

W arrant y

Hard w are 1 Year Part s and Lab or 1 Year Part s and Lab or

W W W.EXTREMENETW ORKS.COM 4
Assessment Agent OS Requirement s
The t ab le b elow out lines t he sup p ort ed op erat ing syst em s for end -syst em s connect ing t o t he net w ork t hroug h an
Ext rem eCont rol d ep loym ent t hat is im p lem ent ing ag ent -b ased assessm ent .

A d d it ionally, t he end -syst em m ust sup p ort t he op erat ing syst em d isk sp ace and m em ory req uirem ent s as p rovid ed by
Microsoft ®and A p p le®.

Op erat ing Syst em Op erat ing Syst em Disk Sp ace A vailab le/ Real Mem o ry

W ind ow s* W ind ow s Vist a


W ind ow s XP W ind ow s
W ind ow s 20 0 8 W ind ow s 20 0 3 80 MB 4 0 MB ( 80 MB w it h Service A g ent )
W ind ow s 7 W ind ow s 8
W ind ow s 8.1 W ind ow s 10

Tig er
Snow Leop ard
Lion
Mac OS Mount ain Lion Mavericks 10 MB 120 MB
Yosem it e
El Cap it an
Sierra

Note: Cert ain assessm ent t est s req uire t he W ind ow s A ct ion Cent er ( p reviously know n as W ind ow s Securit y Cent er) w hich is sup p ort ed on W ind ow s XP
SP2+, W ind ow s Vist a, and W ind ow s 7, W ind ow s 8, and W ind ow s 8.1 op erat ing syst em s.

Ext remeCont rol Support ed End-Syst em Browsers


The follow ing t ab le out lines t he sup p ort ed d eskt op and m ob ile end -syst em b row sers connect ing t o t he net w ork t hroug h
t he Mob ile Cap t ive Port al of Ext rem eCont rol.

Brow ser Versio n

Microsoft Ed g e 41 and lat er


Microsoft Int ernet Exp lorer 11 and lat er
Deskt op Mozilla Firefox 34 and lat er
Goog le Chrom e 33.0 and lat er
Safari A ll Versions
Int ernet Exp lorer Mob ile 11 and lat er ( W ind ow s Phone)
Microsoft Ed g e A ll Versions
Microsoft W ind ow s 10 Touch Screen Nat ive ( Surface Tab le) N/ A
Safari 7 and lat er
Mob ile iOS Nat ive 9 and lat er
A nd roid Chrom e 4 .0 and lat er
A nd roid Nat ive A ll Versions
Dolhin A ll Versions
Op era

W W W.EXTREMENETW ORKS.COM 5
Ordering Informat ion Warrant y
Ext rem eCont rol offers t w o t yp es of p ricing m od els: A s a cust om er-cent ric com p any, Ext rem e Net w orks is
com m it t ed t o p rovid ing q ualit y p rod uct s and solut ions. In
- Perp et ual licenses m od el
t he event t hat one of our p rod uct s fails d ue t o a d efect , w e
- Sub scrip t ion licenses m od el
have d evelop ed a com p rehensive w arrant y t hat p rot ect s
Perp et ual Licenses you and p rovid es a sim p le w ay t o g et your p rod uct
rep aired or m ed ia rep laced as soon as p ossib le.
Part Num b er Descrip t io n
The ap p liance com es w it h a one year w arrant y ag ainst
NA C Ent erp rise Licenses m anufact uring d efect s. Soft w are w arrant ies are ninet y
IA -ES-1K NA C Ent erp rise License for 1K end -syst em s ( 90 ) d ays and cover d efect s in m ed ia only. For full
w arrant y t erm s and cond it ions p lease g o t o:
IA -ES-3K NA C Ent erp rise License for 3K end -syst em s
ht t p :// learn.ext rem enet w orks.com / rs/ 641-VMV-60 2/
IA -ES-12K NA C Ent erp rise License for 12K end -syst em s im ag es/ Ext rem e-Net w orks-Prod uct -Warrant y.p d f
Op t io nal Sec Po st ure A ssessm ent Licenses
Service and Support
IA -PA -3K Op t ional Sec Post ure A ssessm ent for 3K
Po st ure A ssessm ent
endLicenses
-syst em s Ext rem e Net w orks p rovid es com p rehensive service
IA -PA -12K Op t ional Sec Post ure A ssessm ent for 12K offering s t hat rang e from Professional Services t o d esig n,
end -syst em s d ep loy and op t im ize cust om er net w orks, cust om ized
Op t io nal Guest and Io T Onb o rad ing Licences t echnical t raining , t o service and sup p ort t ailored t o
ind ivid ual cust om er need s. Please cont act your Ext rem e
IA -GIM-1K Op t ional Guest and IoT Onb oard ing 1K
users/ d evices Net w orks account execut ive for m ore inform at ion ab out
Ext rem e Net w orks Service and Sup p ort .
IA -GIM-3K Op t ional Guest and IoT Onb oard ing 3K
users/ d evices

IA -GIM-12K Op t ional Guest and IoT Onb oard ing 12K


users/ d evices

Sub scrip t io n Licenses


Ext rem eCont rol ( 9720 7-270 0 1)
Includ es unlim it ed num b er of end -syst em licenses up t o
p erform ance lim it and Ext rem eWorks for t hese licenses,
p riced p er user p er year.

ht t p :// w w w.ext rem enet w orks.com / cont act

©20 18 Ext rem e Net w orks, Inc. A ll rig ht s reserved . Ext rem e Net w orks and t he Ext rem e Net w orks log o are t rad em arks or reg ist ered t rad em arks of Ext rem e Net w orks, Inc. in t he
Unit ed St at es and / or ot her count ries. A ll ot her nam es are t he p rop ert y of t heir resp ect ive ow ners. For ad d it ional inform at ion on Ext rem e Net w orks Trad em arks p lease see
ht t p :// w w w.ext rem enet w orks.com / com p any/ leg al/ t rad em arks. Sp ecificat ions and p rod uct availab ilit y are sub ject t o chang e w it hout not ice. 4 334 -1218-10

W W W.EXTREMENETW ORKS.COM 6

You might also like