Presentation is loading. Please wait.

Presentation is loading. Please wait.

Система контроля доступа ExtremeControl как информационный центр сети

Similar presentations


Presentation on theme: "Система контроля доступа ExtremeControl как информационный центр сети"— Presentation transcript:

1 Система контроля доступа ExtremeControl как информационный центр сети

2 Demonstration

3 Partner system ekosystem
20+ Partners integrations 40+ Partners interoperability Unified and new soltuion partners/tsp/ .

4 Security integrations
Next Generation Firewalls integrations (Palo Alto, Fortinet, Check Point) Distributed IPS solution Location based URL filtering ( iBoss, LightSpeed) Single Sign On No hijacking session

5 PaloAlto, Check Point User ID information to Palo Alto firewalls
Exchanges UserID & IP mapping to PaloAlto firewalls. Distributed IPS Quarantines EndSystem upon notification from Palo Alto Firewall No session hijacking Delete all open sessions at Firewall if the endsystem is disconnected.

6 FortiNet Integration User ID information and profile to FortiGate firewalls Exchanges UserID & IP mapping & network profile to FortiGate firewalls. Distributed IPS Quarantines EndSystem upon notification from FortiAnalyzer No session hijacking Delete all open sessions at Firewall if the endsystem is disconnected.

7 iBoss Integration User ID information to iBoss appliances
Exchanges UserID & IP mapping Location aware web filtering Notifies user location to web filter so web filtering rules can adapt to user location

8 LightSpeed Integration
Single sign on plugin for LightSpeed web filter Exchanges user and ip mapping from Management Center to LightSpeed web filter User only logs in once, credentials are mapped to LightSpeed for web filtering.

9 Security Information and Event Management
Identity and location information SIEM The SIEM can see the asset information Endsystem identity (hostname & MAC & OS) User identity (username) Switch and port or AP and SSID where the endsystem is connected Access profile assigned All the above including the history Distributed IPS Quarantines EndSystem or user upon notification from SIEM

10 McAfee ePO (now Intel) Health status - assessment Visibility
Only devices with an updated McAfee VirusScan Enterprise (VSE) signature database are able to use the network and its resources. Out-of-date devices can be forced to update their signature database automatically, and optionally also quarantined in case of non-compliance. Visibility Automatic grouping of devices managed in ePO within IAC. Easily distinguishing devices managed by ePO from those which are not. Enforce corresponding security profiles. Database is enriched with detailed device information from ePO like the DAT version, device name, operating system, … Populates the username retrieved from ePO within IAC. Populates detailed operating system information retrieved from ePO.

11 MDM & BYOD Easy onboarding
One helpdesk tool with complete endsystem information Security posture & Compliance check

12 Integration with MDM Network Control: Mobile Control: Bandwidth
Wipe Memory Block apps Lock, etc Network Control: Bandwidth Port Access, etc Change VM colors Move policy along with first VM Expand this diagram to show a number of servers off the VM manager, one of which has a couple of VMs on it. Add more VMs until it flashes red, then Onefabric Control taking to the VM manager and then the VMs spread out onto the rest of the servers, the flashing stops, popup explains this is all automatic. Management Center Automated control/policy based on shared intelligence Unwanted app? (MDM) Allow registration, block app network access (Extreme Management) Malicious behavior? (Extreme Management) Lock the phone. (MDM)

13 MDM integration - Details
Populates endsystem database within Management Center with MDM information Phone Number Compliance status IMEI Device Ownership and more Performs policy decisions based on MDM information Network access based on device ownership. Enforce registration in MDM to allow network access. Quarantine based on MDM security policy

14 Audio & Video Skype 4 Business – QoS deployment, reporting
VoIP devices deployment

15 Integration With Skype 4 BIZ
More Than Instant Messaging Integration With Skype 4 BIZ But deploying Lync is highly complex – especially for IT departments with limited resource, and high user expectations. The impact of a deployment Application and network response times, poor interaction quality, and lack of visibility into overall performance can slow ROI and user adoption Lync administrators must ensure high performance across all parts of the network and applications, while proactively identifying potential issues impacting user experiences Aruba will tell you about what Lync is doing but not the other 50 applications on your network. Lync connections are built dynamically with various TCP orts and physical ports – install guide says open all the ports – security problem, workaround, not a good allocation of resourecs – today Lync, tomorrow NetFlix. QOS must be created and destroyed as calls are initiated and terminated. Skype4B: Deployment requirements are complex Often involve separate UC, application and network owners Skype4B: Lack of visibility into performance, metrics, and diagnostics Skype4B: Low quality experiences slow adoption, increase trouble tickets, reduce ROI

16 Avaya Easy manager Automatically detect Avaya VoIP phones and assign corresponding connectivity and security profiles Avaya administrator can get access to OneView to get detailed network information on all Avaya phones Receive data on phone number, device hardware, software and gatekeeper from Avaya VoIP manager Automatically assign ES group

17 Polycom Automatically detect Polycom devices and assign corresponding connectivity and security profiles Polycom administrator can get access to OneView dashboard to get detailed network information on all Polycom devices Receive data on device type and status from Polycom‘s CMA management server Automatically assign ES group = device based policy

18 Data Center Connect Network Orchestration = physical and virtual netork is configured on one place with one click Easy troubleshooting of the networking in datacenter Visibility to VM world Hypervisor agnostic

19 Data Center Connect Assigns network connectivity based on virtualization connectivity selection Network configuration moves as Virtual servers move in the datacenter Full visibility in virtualization platform and network management platform: Connection port Virtual server name or UUID Approval workflow Orchestrates and synchronizes Networking configuration in Networking platform and virtualization platform

20 Data Center Connect Automation & control Visibility Vendor agnostic
vSphere (vCenter, ESX Server) XenCenter, Microsoft Hyper-V and SCVMM Data Center Connect VM Management Pre-provision network connectivity & VLANs Synchronize VM asset information Automation & control Dynamic configuration of the vSwitch and physical infrastructure for each VM, vNIC Visibility Integrated tracking of VM and its applications along with centralized view of virtual and physical network infrastructure Vendor agnostic Integrates with popular server virtualization products from Citrix, Microsoft and VMware Northbound API Report on VM location, switch port status and assigned connectivity profile Management Center Assign network connectivity profile to VM Soutbound API

21 VDI VDI version of DCM User VDI broker data to map username to VDI
Apply policy to VDI based on user Policy follows VDI

22 On demand integration Custom built integration
Develop your own integration using API

23 Спасибо


Download ppt "Система контроля доступа ExtremeControl как информационный центр сети"

Similar presentations


Ads by Google