Call a Specialist Today! (02) 9388 1741
Free Delivery! Free Delivery!

Extreme Networks Control
Software-Driven Session Intelligence for Scalable, Agile Network Visibility


ExtremeControl


Centralize the optimization of tools across the network.


Single pane of glass

Context-based control

Simple, secure onboarding

Click here to jump to more pricing!

Please Note: All Prices are Inclusive of GST

Overview:


Keep your network edge secure with end-point security

With most data breaches starting at end-points, you need granular control over users and IoT devices and consistent policies across the entire network into multicloud. Our access control solution gives you centralized in-depth visibility and control over all end-point s across your wired and wireless networks through one simple, flexible and easy to consume dashboard.

ExtremeControl securely enables BYOD and Iot to protect your network against external threats. It let s you centrally manage and define granular policies so you can meet compliance obligations, locate, authenticate and apply targeted policies to users and devices.

Overview

Our identity-aware solution automatically manages expiration, account validit y and time control for guest account s without any IT involvement. Securely and easily onboard guests and BYOD devices with extensive customization, branding and sponsor-based approvals. Built-in device profiling using various internal and external profiling techniques makes sure only devices that comply to your policies can access your network. Users can log into their Yahoo or Salesforce account to complete guest registration.


Secure Your Network with Granular Policy Control and In-Depth Visibility

Overview 2

ExremeControl enables you to apply granular controls over who, what, when, where, and how endpoint s are allowed on the network. You can enable secure BYOD, guest access and IoT by rolling out real-time policies based on the securit y posture of devices. ExtremeControl matches endpoint s with attributes, such as user, time, location, vulnerabilit y, or access t ype, to create an all-encompassing contextual identit y. Role based identities follow a user, no matter from where or how she connect s to the network. They can be used to enforce highly secure access policies.

Setting granular policies and scaling them across your network automatically, makes it possible to comply to internal policies and external regulations. With one click you can enforce context-driven policies across devices for QoS, bandwidth and other parameters and align them to your business imperatives. Advanced reporting of all user valid authentications and failures with a real-time state table of all connected users and devices alert s you to potential issues.


Features:


On-Demand Network Visibility


IoT

Enable Secure Guests and IoT Access

Customizing onboarding of guests and IoT devices is easy and secure with predefined templates for non-IT personnel

Consistent Policies

Ensure Consistent Policies Across the Network

Enables consistent policy roll-out across the entire network

Security

Reduce Security Vulnerabilities

Enhances security with agent-based and agentless assessment option


Get Visibility Across Your Network with Advanced Reporting and Alerting

ExtremeControl makes it easy to monitor issues on your network ? all on one simple-to-read dashboard. It sends you advanced, customizable reports and alerts about the authentication, guest access, onboarding, device profiles and authentication, as well as end-system health.

Reduce Security Vulnerabilities with End-System Posture Assessment

ExtremeControl offers both, agent-based and agentless assessment option. We can install either a persistent or dissolvable agent on the client end system or the agent can be downloaded via a captive portal website. It can also be installed via a software distribution system such as Group Policy or System Center Configuration Manager. The agentless assessment does not require an installation or running of any software on the end system.

Expand Security Integrations with Next-Generation Firewalls

Our ExtremeControl is integrated with our ecosystem of partners to expand network security and threat response. Based on alerts from next-generation firewall solutions, we orchestrate endpoint isolation and remediation. We share contextual information such as users, IP address and location for powerful policy enforcement at perimeter firewalls. Policies based on ID-IP mapping follow users.


240
Product Part Number IA-A-25 (87100 ) IA-A-305 (87101)
Appliance Specifications
Storage 150 GB Enterprise SSDGB Enterprise SSD
Networking 2 x 1GbE 2 x 1GbE
Appliance Scale Number
Access Control End-Systems Up to 12,000 Up to 24,000
Power Specifications
Redundant Power Supply 750 W 80 + Platinum Hot Pluggable 750 W 80 + Platinum Hot Pluggable
AC Input Voltage 90 Hz to 132V and 180V to 264V 90 Hz to 132V and 180V to 264V
AC Input Frequency 47Hz to 63Hz 47Hz to 63Hz
Physical
Rackmount/ Dimensions 1U Rack/ 16.93" x 27.95" x 1.72" 1U Rack/ 16.93" x 27.95" x 1.72"
Weight 29 lb. (13.15 kg) Max 29 lb. (13.15 kg) Max
Environmental Specifications
Operating

ASHRAE Class A2 - Continuous Operation. 10 º C to 35º C (50 º F to 95º F) with the maximum rate of change not to exceed 10 °C per hour

ASHRAE Class A3 - Includes operation up to 40 C for up to 90 0 hrs per year.

ASHRAE Class A4 - Includes operation up to 45C for up to 90 hrs per year.

ASHRAE Class A2 - Continuous Operation. 10 º C to 35º C (50 º F to 95º F) with the maximum rate of change not to exceed 10 °C per hour

ASHRAE Class A3 - Includes operation up to 40 C for up to 90 0 hrs per year.

ASHRAE Class A4 - Includes operation up to 45C for up to 90 hrs per year

Shipping -40 º C to 70 º C (-40 º F to 158º F) -40 º C to 70 º C (-40 º F to 158º F)
Humidity (Shipping) 50 % to 90 %, non-condensing with a maximum wet bulb of 28° C (at temperatures from 25° C to 35° C) 50 % to 90 %, non-condensing with a maximum wet bulb of 28° C (at temperatures from 25° C to 35° C)
Vibration (Unpackaged) 5 Hz to 50 0 Hz 2.20 g RMS random 5 Hz to 50 0 Hz 2.20 g RMS random

Documentation:

Download the ExtremeControl Datasheet (.PDF)

It appears you don't have a PDF plugin for this browser. No biggie... you can click here to download the PDF file.


 

Extreme Networks Products
ExtremeControl Licenses
ExtremeControl Enterprise License for 1K end-systems
#IA-ES-1K
Our Price: Request a Quote
ExtremeControl Enterprise License for 3K end-systems
#IA-ES-3K
Our Price: Request a Quote
ExtremeControl Enterprise License for 5K end-systems
#IA-ES-5K
Our Price: Request a Quote
ExtremeControl Appliances
ExtremeControl Appliance for 12k end systems
#IA-A-25
Our Price: Request a Quote
ExtremeControl Appliance for 24k end systems
#IA-A-305
Our Price: Request a Quote