0% found this document useful (0 votes)
28 views6 pages

Extremecontrol Data Sheet

This document provides a data sheet for ExtremeControl, which is a network access control solution that allows granular control over network access for users and devices. It highlights key features such as: 1) Providing business-aligned network security policies based on user and device identity and context. 2) Enabling secure BYOD, guest access, and IoT deployment through role-based identity management and device profiling. 3) Integrating with third-party security and management solutions for a comprehensive access control system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views6 pages

Extremecontrol Data Sheet

This document provides a data sheet for ExtremeControl, which is a network access control solution that allows granular control over network access for users and devices. It highlights key features such as: 1) Providing business-aligned network security policies based on user and device identity and context. 2) Enabling secure BYOD, guest access, and IoT deployment through role-based identity management and device profiling. 3) Integrating with third-party security and management solutions for a comprehensive access control system.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Dat a Sheet

Hig hlig ht s
Business A lig ned
- Let your b usiness im p erat ives d rive t he
net w ork w it h cont ext d riven p olicies
- Prot ect corp orat e d at a by p roact ively
p revent ing unaut horized users,
com p rom ised end p oint s, and ot her
vulnerab le syst em s from net w ork access
- Securely enab le crit ical init iat ives like
BYOD and IoT
- Effect ively b alance securit y and
availab ilit y for users, cont ract ors
and g uest s
- Roll out consit ent p olicies from t he
ed g e t o t he d at a cent er
- Leverag e p ricing alig ned w it h your
b usiness need s w it h p er-user p ricing
Ext rem eCo nt ro l ?
Keep your net w ork ed g e secure w it h end -p oint securit y.
A ccess Securit y
- Dynam ic role-b ased net w ork W it h m ost d at a b reaches st art ing at end -p oint s, you need g ranular cont rol
access cont rol b ased on cont ext ual over users and IoT d evices and consist ent p olicies across t he ent ire
id ent it y inform at ion
net w ork int o m ult icloud . Our access cont rol solut ion g ives you cent ralized
- Tig ht int eg rat ion w it h t hird p art y in-d ep t h visib ilit y and cont rol over all end -p oint s across your w ired and
solut ions such NGFW, SIEM, CMDB,
w ireless net w orks t hroug h one sim p le, flexib le and easy t o consum e
int ernet securit y and EMM/ MDM
d ashb oard .
- Proact ively secure g uest access and
BYOD onb oard ing Ext rem eCont rol securely enab les BYOD and Iot t o p rot ect your net w ork
- Built -in d evice p rofiling w it h int ernal
ag ainst ext ernal t hreat s. It let s you cent rally m anag e and d efine g ranular
and ext ernal p rofiling t echniq ues p olicies so you can m eet com p liance ob lig at ions, locat e, aut hent icat e and
Int eg rat ed ag ent -b ased and ag ent less ap p ly t arg et ed p olicies t o users and d evices.
securit y p ost ure assessm ent
For ext end ed access p olicy, you can roll out t he sam e p olicies
- Secure IoT net w ork access
aut om at ically from t he Sm art Om niEd g e t o t he A ut om at ed Cam p us int o
Op erat io nal Efficiency t he A g ile Dat a Cent er.
- A ccelerat e t roub leshoot ing
by sep arat ing net w ork from Our net w ork access cont rol solut ion is int eg rat ed w it h m ajor
ap p licat ion issues ent erp rise p lat form s includ ing solut ions for net w ork securit y, ent erp rise
- Sp end less t im e m onit oring ap p licat ions m ob ilit y m anag em ent , analyt ics, cloud and d at a cent er. In ad d it ion, it
w it h aut om at ic p erform ance alert ing offers an op en nort hb ound A PI for cust om ized int eg rat ions t o key
- Sim p lify m anag em ent across your ent ire ent erp rise p lat form s.
net w ork w it h one sing le p ane of g lass
for m anag em ent , p olicies, access
cont rol and ap p licat ion analyt ics
- A void service d isrup t ions w it h
p ro-act ive p erform ance m onit oring
and alert s

W W W.EXTREMENETW ORKS.COM 1
Secure Your Net work w it h Granular
Policy Cont rol and In-Dept h Visibilit y
Exrem eCont rol enab les you t o ap p ly g ranular cont rols
over w ho, w hat , w hen, w here, and how end p oint s are
allow ed on t he net w ork. You can enab le secure BYOD,
g uest access and IoT by rolling out real-t im e p olicies
b ased on t he securit y p ost ure of d evices. Ext rem eCont rol
m at ches end p oint s w it h at t rib ut es, such as user, t im e,
locat ion, vulnerab ilit y, or access t yp e, t o creat e an
all-encom p assing cont ext ual id ent it y. Role b ased id ent it ies
follow a user, no m at t er from w here or how she connect s
t o t he net w ork. They can b e used t o enforce hig hly secure
access p olicies.
Figure 1: Guest and IoT Manag er

Set t ing g ranular p olicies and scaling t hem across your


net w ork aut om at ically, m akes it p ossib le t o com p ly t o Our id ent it y-aw are solut ion aut om at ically m anag es
int ernal p olicies and ext ernal reg ulat ions. W it h one click exp irat ion, account valid it y and t im e cont rol for g uest
you can enforce cont ext -d riven p olicies across d evices for account s w it hout any IT involvem ent . Securely and easily
QoS, b and w id t h and ot her p aram et ers and alig n t hem t o onb oard g uest s and BYOD d evices w it h ext ensive
your b usiness im p erat ives. A d vanced rep ort ing of all user cust om izat ion, b rand ing and sp onsor-b ased ap p rovals.
valid aut hent icat ions and failures w it h a real-t im e st at e Built -in d evice p rofiling using various int ernal and
t ab le of all connect ed users and d evices alert s you t o ext ernal p rofiling t echniq ues m akes sure only d evices t hat
p ot ent ial issues. com p ly t o your p olicies can access your net w ork. Users
can log int o t heir Yahoo or Salesforce account t o com p let e
In t he face of const ant net w ork t ransform at ion you can g uest reg ist rat ion.
use m icro seg m ent at ion for consist ent securit y w it hout
t he need for com p lex net w ork chang es. W hen rolling out
larg e p roject s, red uce risk by t est ing new p olicies and
using p assive p olicies for w hat -if-scenarios p rior t o
enforcem ent . Ext rem eCont rol let s you id ent ify t hreat s by
p rofiling and t racking users and d evices, as w ell as
m onit oring t he healt h and com p liance of d evices b efore
and aft er access. It assesses your net w ork w it h p olicy
aud it s and hit rep ort s.

Ext rem eCont rol also offers t hird p art y p olicy sup p ort , via
user-b ased A CLs, ensuring g ranular cont rol of your ent ire
net w ork, includ ing Ext rem e and t hird p art y eq uip m ent .

Super Easy and Secure Onboarding


for Guest s and IoT Devices
Our Guest and IoT Mang er enab les IT t o set up easy t o use
onb oard ing t em p lat es t hat enab les non-t echnical st aff t o
p rovision new users and d evices. A d d it ionally, w e offer a
set of REST A PIs t o allow p rog ram m at ic onb oard ing of
users and d evices.

To p rovid e a sm oot h exp erience for visit ors t he Guest and


IoT Manag er also includ es an MS Out look p lug in t hat
aut om at ically creat es a net w ork access account t o p eop le
Figure 2: Microsoft Out look Calend ar Plug in
b ased on Microsoft Out look Calend ar event s.

W W W.EXTREMENETW ORKS.COM 2
To p revent access of your net w ork from non-com p liant Expand Securit y Int egrat ions w it h
and un-enrolled d evices w e m ake int eg rat ion w it h our
EMM/ MDM p art ners, such as A irw at ch, Cit rix and
Next -Generat ion Firewalls
Mob ileIron easy. A d d it ionally, int eg rat ed ag ent -b ased and Our Ext rem eCont rol is int eg rat ed w it h our ecosyst em of
ag ent less securit y p ost ure assessm ent s w it h t he ab ilit y t o p art ners t o exp and net w ork securit y and t hreat resp onse.
int eg rat e ext ernal solut ions like scanners and end p oint Based on alert s from next -g enerat ion firew all solut ions, w e
securit y solut ions are availab le. orchest rat e end p oint isolat ion and rem ed iat ion. We share
cont ext ual inform at ion such as users, IP ad d ress and
Onb oard ing for BYOD or g uest p olicies is m ad e easy and locat ion for p ow erful p olicy enforcem ent at p erim et er
secure w it h our self-service p ort al t hat offers t ext ing and firew alls. Policies b ased on ID-IP m ap p ing follow users.
social log in b ased id ent it y. It let s users m anag e d evices
accord ing t o b usiness p olicies. Devices are aut om at ically
Appliance Opt ions
p rovisioned , p rofiled , and a securit y p ost ure com p lying t o
your securit y p olicies is set up. A t t he sam e t im e, Hard w are A p p liances
em p loyees can g et t heir d evices ont o t he net w ork w it hout Our Ext rem eCont rol ap p liances are rack-m ount ab le
req uiring IT assist ance. servers w it h all cap ab ilit ies p re-inst alled .
Purchased ap p licat ions ( licensed sep arat ely) are act ivat ed
Get Visibilit y Across Your Net work w it h via license keys:

Advanced Report ing and Alert ing - The Ext rem eCont rol A p p liance IA -A -25, m anag es up
Ext rem eCont rol m akes it easy t o m onit or issues on your t o 12K end syst em s
net w ork ? all on one sim p le-t o-read d ashb oard . It send s - The Ext rem eCont rol A p p liance -IA -A -30 5, m anag es up
you ad vanced , cust om izab le rep ort s and alert s ab out t he t o 24 K end syst em s
aut hent icat ion, g uest access, onb oard ing , d evice p rofiles
Virt ual A p p liances
and aut hent icat ion, as w ell as end -syst em healt h.
Ext rem eCont rol can also b e inst alled as a virt ual
Reduce Securit y Vulnerabilit ies w it h ap p liance t hat cust om ers can d ow nload at p urchase.
The Ext rem eCont rol, virt ual eng ines m ust b e d ep loyed on
End-Syst em Post ure Assessment a VMWare or Hyp er-V server w it h a d isk form at of VHDX.
Ext rem eCont rol offers b ot h, ag ent -b ased and ag ent less
- The VMWare Manag em ent Cent er virt ual eng ines are
assessm ent op t ion. We can inst all eit her a p ersist ent or
p ackag ed in t he.OVA file form at (d efined by VMw are)
d issolvab le ag ent on t he client end syst em or t he ag ent
can b e d ow nload ed via a cap t ive p ort al w eb sit e. It can - The Hyp er-V Manag em ent Cent er virt ual eng ines are
p ackag ed in t he .ZIP file form at
also b e inst alled via a soft w are d ist rib ut ion syst em such as
Group Policy or Syst em Cent er Config urat ion Manag er.
The ag ent less assessm ent d oes not req uire an inst allat ion
or running of any soft w are on t he end syst em .

W W W.EXTREMENETW ORKS.COM 3
Hardware Appliance Specificat ions
Pro d uct Part Num b er IA -A -25 ( 8710 0 ) IA -A -30 5 ( 8710 1)

A p p liance Sp ecif icat io ns

St orag e 150 GB Ent erp rise SSD 24 0 GB Ent erp rise SSD

Net w orking 2 x 1Gb E 2 x 1Gb E

TPM Version 2.0 Yes Yes

A p p liance Scale Num b er

A ccess Cont rol End -Syst em s Up t o 12,0 0 0 Up t o 24 ,0 0 0

Pow er Sp ecif icat io ns

Red und ant Pow er Sup p ly 750 W 80 + Plat inum Hot Plug g ab le 750 W 80 + Plat inum Hot Plug g ab le

A C Inp ut Volt ag e 90 Hz t o 132V and 180 V t o 264 V 90 Hz t o 132V and 180 V t o 264 V

A C Inp ut Freq uency 47Hz t o 63Hz 47Hz t o 63Hz

Physical

Rackm ount / Dim ensions 1U Rack/ 16.93" x 27.95" x 1.72" 1U Rack/ 16.93" x 27.95" x 1.72"

Weig ht 29 lb. ( 13.15 kg ) Max 29 lb. ( 13.15 kg ) Max

Env iro nm ent al Sp ecif icat io ns

- A SHRA E Class A 2 ? Cont inuous Op erat ion. 10 º - A SHRA E Class A 2 ? Cont inuous Op erat ion. 10 º
C t o 35º C ( 50 º F t o 95º F) w it h t he m axim um C t o 35º C ( 50 º F t o 95º F) w it h t he m axim um
rat e of chang e not t o exceed 10 °C p er hour rat e of chang e not t o exceed 10 °C p er hour
Op erat ing - A SHRA E Class A 3 ? Includ es op erat ion up t o - A SHRA E Class A 3 ? Includ es op erat ion up t o
4 0 C for up t o 90 0 hrs p er year. 4 0 C for up t o 90 0 hrs p er year.
- A SHRA E Class A 4 ? Includ es op erat ion up t o - A SHRA E Class A 4 ? Includ es op erat ion up t o
4 5C for up t o 90 hrs p er year. 4 5C for up t o 90 hrs p er year.

Ship p ing -4 0 º C t o 70 º C ( -4 0 º F t o 158º F) -4 0 º C t o 70 º C ( -4 0 º F t o 158º F)

50 % t o 90 %, non-cond ensing w it h a m axim um 50 % t o 90 %, non-cond ensing w it h a m axim um


Hum id it y ( Ship p ing ) w et b ulb of 28° C ( at t em p erat ures from 25° C t o w et b ulb of 28° C ( at t em p erat ures from 25° C t o
35° C) 35° C)

Vib rat ion ( Unp ackag ed ) 5 Hz t o 50 0 Hz 2.20 g RMS rand om 5 Hz t o 50 0 Hz 2.20 g RMS rand om

W arrant y

Hard w are 1 Year Part s and Lab or 1 Year Part s and Lab or

W W W.EXTREMENETW ORKS.COM 4
Assessment Agent OS Requirement s
The t ab le b elow out lines t he sup p ort ed op erat ing syst em s for end -syst em s connect ing t o t he net w ork t hroug h an
Ext rem eCont rol d ep loym ent t hat is im p lem ent ing ag ent -b ased assessm ent .

A d d it ionally, t he end -syst em m ust sup p ort t he op erat ing syst em d isk sp ace and m em ory req uirem ent s as p rovid ed by
Microsoft ®and A p p le®.

Op erat ing Syst em Op erat ing Syst em Disk Sp ace A vailab le/ Real Mem o ry

W ind ow s* W ind ow s Vist a


W ind ow s XP W ind ow s
W ind ow s 20 0 8 W ind ow s 20 0 3 80 MB 4 0 MB ( 80 MB w it h Service A g ent )
W ind ow s 7 W ind ow s 8
W ind ow s 8.1 W ind ow s 10

Tig er
Snow Leop ard
Lion
Mac OS Mount ain Lion Mavericks 10 MB 120 MB
Yosem it e
El Cap it an
Sierra

Note: Cert ain assessm ent t est s req uire t he W ind ow s A ct ion Cent er ( p reviously know n as W ind ow s Securit y Cent er) w hich is sup p ort ed on W ind ow s XP
SP2+, W ind ow s Vist a, and W ind ow s 7, W ind ow s 8, and W ind ow s 8.1 op erat ing syst em s.

Ext remeCont rol Support ed End-Syst em Browsers


The follow ing t ab le out lines t he sup p ort ed d eskt op and m ob ile end -syst em b row sers connect ing t o t he net w ork t hroug h
t he Mob ile Cap t ive Port al of Ext rem eCont rol.

Brow ser Versio n

Microsoft Ed g e 41 and lat er


Microsoft Int ernet Exp lorer 11 and lat er
Deskt op Mozilla Firefox 34 and lat er
Goog le Chrom e 33.0 and lat er
Safari A ll Versions
Int ernet Exp lorer Mob ile 11 and lat er ( W ind ow s Phone)
Microsoft Ed g e A ll Versions
Microsoft W ind ow s 10 Touch Screen Nat ive ( Surface Tab le) N/ A
Safari 7 and lat er
Mob ile iOS Nat ive 9 and lat er
A nd roid Chrom e 4 .0 and lat er
A nd roid Nat ive A ll Versions
Dolhin A ll Versions
Op era

W W W.EXTREMENETW ORKS.COM 5
Ordering Informat ion Warrant y
Ext rem eCont rol offers t w o t yp es of p ricing m od els: A s a cust om er-cent ric com p any, Ext rem e Net w orks is
com m it t ed t o p rovid ing q ualit y p rod uct s and solut ions. In
- Perp et ual licenses m od el
t he event t hat one of our p rod uct s fails d ue t o a d efect , w e
- Sub scrip t ion licenses m od el
have d evelop ed a com p rehensive w arrant y t hat p rot ect s
Perp et ual Licenses you and p rovid es a sim p le w ay t o g et your p rod uct
rep aired or m ed ia rep laced as soon as p ossib le.
Part Num b er Descrip t io n
The ap p liance com es w it h a one year w arrant y ag ainst
NA C Ent erp rise Licenses m anufact uring d efect s. Soft w are w arrant ies are ninet y
IA -ES-1K NA C Ent erp rise License for 1K end -syst em s ( 90 ) d ays and cover d efect s in m ed ia only. For full
w arrant y t erm s and cond it ions p lease g o t o:
IA -ES-3K NA C Ent erp rise License for 3K end -syst em s
ht t p :// learn.ext rem enet w orks.com / rs/ 641-VMV-60 2/
IA -ES-12K NA C Ent erp rise License for 12K end -syst em s im ag es/ Ext rem e-Net w orks-Prod uct -Warrant y.p d f
Op t io nal Sec Po st ure A ssessm ent Licenses
Service and Support
IA -PA -3K Op t ional Sec Post ure A ssessm ent for 3K
Po st ure A ssessm ent
endLicenses
-syst em s Ext rem e Net w orks p rovid es com p rehensive service
IA -PA -12K Op t ional Sec Post ure A ssessm ent for 12K offering s t hat rang e from Professional Services t o d esig n,
end -syst em s d ep loy and op t im ize cust om er net w orks, cust om ized
Op t io nal Guest and Io T Onb o rad ing Licences t echnical t raining , t o service and sup p ort t ailored t o
ind ivid ual cust om er need s. Please cont act your Ext rem e
IA -GIM-1K Op t ional Guest and IoT Onb oard ing 1K
users/ d evices Net w orks account execut ive for m ore inform at ion ab out
Ext rem e Net w orks Service and Sup p ort .
IA -GIM-3K Op t ional Guest and IoT Onb oard ing 3K
users/ d evices

IA -GIM-12K Op t ional Guest and IoT Onb oard ing 12K


users/ d evices

Sub scrip t io n Licenses


Ext rem eCont rol ( 9720 7-270 0 1)
Includ es unlim it ed num b er of end -syst em licenses up t o
p erform ance lim it and Ext rem eWorks for t hese licenses,
p riced p er user p er year.

ht t p :// w w w.ext rem enet w orks.com / cont act

©20 18 Ext rem e Net w orks, Inc. A ll rig ht s reserved . Ext rem e Net w orks and t he Ext rem e Net w orks log o are t rad em arks or reg ist ered t rad em arks of Ext rem e Net w orks, Inc. in t he
Unit ed St at es and / or ot her count ries. A ll ot her nam es are t he p rop ert y of t heir resp ect ive ow ners. For ad d it ional inform at ion on Ext rem e Net w orks Trad em arks p lease see
ht t p :// w w w.ext rem enet w orks.com / com p any/ leg al/ t rad em arks. Sp ecificat ions and p rod uct availab ilit y are sub ject t o chang e w it hout not ice. 4 334 -1218-10

W W W.EXTREMENETW ORKS.COM 6

You might also like