Connect Beyond the Network

Connect Beyond the Network Corporate Overview ©2015 Extreme Networks, Inc. All rights reserved Introducing Hardened Small Form Factor Switches   ...
Author: Scarlett Payne
13 downloads 0 Views 5MB Size
Connect Beyond the Network Corporate Overview

©2015 Extreme Networks, Inc. All rights reserved

Introducing Hardened Small Form Factor Switches     

  

Hardened Small Form Factor Switches 10/100 and 10/100/1000 Models Fully Managed with Robust L2+ features set High Power 802.3af and 802.3at POE+ optimized for IP Surveillance Deployments Four DIN & Wall mount options – 4 10/100 POE+, 2 10/100, and 2 SFP uplinks – 8 10/100 POE+, and 4 SFP uplinks – 4 10/100/1000 POE+, 2 10/100, and 2 SFP uplinks – 8 10/100/1000 POE+, and 4 SFP uplinks Resilient Spanning Tree and Fast Fail-over Ring Topologies -40 to + 75°C temp range DIN Rail or Wall Mount IP30 enclosure  Gigabir ©2015 Extreme Networks, Inc. All rights reserved

10/100 Models

10/100/1000 Models

Welcome to the New

Digital Economy Boris Germashev Regional Director Nordics & Eastern Europe Extreme Networks [email protected] ©2015 Extreme Networks, Inc. All rights reserved

4

Proximity

Time

Identity

Personalization in a Digital World  Proximity + Identity + Time = Contextual Insight  Contextual insight provides knowledge to build catered services  Personal touch builds improved experiences and relationship with customers ©2015 Extreme Networks, Inc. All rights reserved

Scheduling/Alerting!

Questions?

How was your experience? Tell us in this short survey.

Example: Increase Patient Satisfaction For Example Notify a patient that their appointment starts in 10 minutes and they are 8 minutes away.

TAKE SURVEY

Do you have any additional questions for your care team?

YES

Proximity In the Cafeteria Time 2:50 PM

©2015 Extreme Networks, Inc. All rights reserved

Identity Patient: Hearing Exam

Capitalize  Drive seamless experiences for customer, visitors, employees  Visualize real-time activity  Recognize customer engagement through integrated solutions ©2015 Extreme Networks, Inc. All rights reserved

OFFICIAL Official Wi-Fi WI-FI Analytics ANALYTICS Provider PROVIDER

NFL & Super Bowl Transforming the in-game mobile fan experience

Wi-Fi and mobile application use details Enabling the interactive event fans desire ©2015 Extreme Networks, Inc. All rights reserved

Your Network Is the Key

EDUCATION

EMPLOYEES

MANUFACTURING

YOUR NETWORK CUSTOMERS

HOSPITALITY

ENTERPRISE & GOVERNMENT

PARTNERS

HEALTHCARE

9

©2015 Extreme Networks, Inc. All rights reserved

Network as a Service Delivery Platform? Use Cases

Contextual policy drives data-plane

Vertical Specific Services

Security Services

Integration of the gathered context with other applications

UCaaS Services

SD-WAN Services

Engagement Services

Cloud and on-premises services ©2015 Extreme Networks, Inc. All rights reserved

Analytic Services

IoT Services

Software-Driven Networking Solutions, Built on our Portfolio Cloud Optimization Network control extended from on-premise to cloud or hybrid infrastructure

Cloud

Integrated SDN Strategy A comprehensive ecosystem for network automation, visibility and control

Edge-to-Core Infrastructure High-performance, wireless network access and wired switching

Control Security Analytics

Wireless Switching

Management Software & Security Software to manage, secure and analyze users, devices and applications ©2015 Extreme Networks, Inc. All rights reserved

Automated QoS and Comprehensive Analytics Across Lync-Qualified SDN, Wired and Wireless Infrastructures ©2015 Extreme Networks, Inc. All rights reserved

Extreme Networks and Microsoft Wired, WiFi, and SDN Qualification

Extreme Networks | ExtremeXOS 15.3.14 Extreme Networks | IdentiFi Wireless Appliances and IdentiFi 802.11 Access Points

©2015 Extreme Networks, Inc. All rights reserved

Solution Architecture for Microsoft Skype for Business  Improved Quality of User Experience  Automated QoS provisioning during Lync call  In-depth, contextual visibility into performance, call quality  Simplified monitoring and troubleshooting of elements impacting user experiences and network performance 14

©2015 Extreme Networks, Inc. All rights reserved

Visibility - quality of calls, network and application latency, information on the end-users and devices

15

©2015 Extreme Networks, Inc. All rights reserved

Visibility - Voice and Video Call Quality in Context      

MOS Start, End, Duration Caller, Callee, URI Location Info Session Info Prioritized Session Info

©2015 Extreme Networks, Inc. All rights reserved

Skype for Business Reporting and Analytics – on any network infrastructure

17

©2015 Extreme Networks, Inc. All rights reserved

How do we do this for Skype for Business?  Single pane of glass for visibility, control and automation – Correlation of multiple parameters; automation – Integration with other solutions (like Skype for Business)

 Rich information on the applications – Latency of the network and application – Who is using what, when and from where

 Information on the end-user, device, place, time – Allows quickly find the root-cause of the issues – Policy-based management is even easier

 Wireless network solutions – policy driven! – Addressing the demands for the density driven by IoT and mobility – 802.11ac wave 2 indoor and outdoor

 Wired network solutions – From 10/100Mbit edge to 100Gbit core – Centrally managed, policy-driven ©2015 Extreme Networks, Inc. All rights reserved

 Role-based access – Roles, Services, Rules

©2015 Extreme Networks, Inc. All rights reserved

Employe e

Deny Bcast

Services group Rules and apply to Roles

Allow HTTP

Allow HTTPS

Allow IPSec

Internet & VPN Access Only

Rate Limit

Allow Email

Allow SAP

Allow Oracle

Roles correspon d to specific user types on the network

Guest

Corporate Productivity Applications

Allow Telnet

– Policy audit reports in OneView – Policy hit reports showing resulting traffic control

Allow TFTP

 Reporting

Allow Ping

Admin. Application s

Allow SNMP

IT Admin

Rules

– Passive policies for what-if scenarios prior to enforcing – Utilize Wireshark captures for before & after comparisons to test new policies before deployment

Roles

 Enforce desired network behavior across switches, routers and APs  “One click” enforcement of policies for QoS, bandwidth and other parameters – No tedious device-by-device ACL modifications for every move/add/change  Network planning

Services

Policy-based Networking

Rules allow, deny, rate limit or contain specific traffic type

Flow Enabled Software – Foundation for Future

Data Plane Control

Policy

Security & QoS (L2-L7)

Unique Session Enforcement

Analytics & Measurements Flow

Flow

Flow

Flow

Flow

Flow

Flow

Flow

Flow

Flow

Flow

Flow

Performance Bottleneck – Eliminated! Packet Processing

Flow Processing

Performance Tests @Extreme Labs

©2015 Extreme Networks, Inc. All rights reserved

Management and

Control

©2015 Extreme Networks, Inc. All rights reserved

Analytics, Management & Control Analytics

22

Management

Control



Layer 7 application management



Alarm and Event management



Role-based granular network access control and priority



1000’s of fingerprints – port independent



Configuration & change management



Enforce AUP



Flexible assessment



Dashboards



Zero Touch provisioning



Compliance enforcement



Diagnostics & troubleshooting



Capacity planning



Guest & Remediation portals



Status, inventory, performance & audit reporting



Discovery & topology mapping



User & end-system tracking



Alarm management



Automated incident response

©2015 Extreme Networks, Inc. All rights reserved

ExtremeManagement  Holistic device, network, location and application visibility  Gather metrics to measure and predict experience  Unify network analytics and integration with other applications ©2015 Extreme Networks, Inc. All rights reserved

Quick & easy on-boarding of users and their devices  Single captive portal supports: – – – – – –

Self-service registration Wired/wireless with same look & feel BYOD, guests, contractors Secure wireless guest access SMS & email verification Sponsorship

 Secure wireless guest & contractor access  Pre-registration capabilities  Also integration with other captive portals – And MDM, etc ©2015 Extreme Networks, Inc. All rights reserved

PBP – Paper Based Portal

©2015 Extreme Networks, Inc. All rights reserved

Quick & easy on-boarding of new network equipment as well!  Mobile App (QR or bar code scan) or manual pre-register of switches – Simply pre-register devices which will be automatically configured upon connecting to the network  Plug and Play Hardware – Unskilled personnel can add or replace devices

 Automated Device on-boarding – Call Home to Extreme

 Apply Configuration from hierarchical templates – System, topology protocols, policy configuration, including Identity and Access configuration ©2015 Extreme Networks, Inc. All rights reserved

 Rich analytics for private and public cloud applications in Extreme and 3rd Party networks  100% L7 application visibility on any wired or wireless network  Easily scales from edge to DC  Pervasive application analytics yields fast decisions with deep insight  See application and network response time by user/device  Massive and Customizable Signature Set with more than 7,000 applications ©2015 Extreme Networks, Inc. All rights reserved

“ExtremeAnalytics provides us with a global view of the overall health of the network from a single pane of glass…and it enables us to pinpoint issues and drill down to a specific closet or client for fast resolution.”

Analytics Application Management  Gain visibility into, and improve, the user experience  Optimize application performance

 Ensure business critical applications are delivered with priority  Eliminate issues before they can occur  Better utilize network resources  Pervasive application visibility and control from datacenter/core => mobile edge  Unmatched scale & performance 28

©2015 Extreme Networks, Inc. All rights reserved

ExtremeAnalytics Future Directions* *FUTURE AVAILABILITY – PRODUCTS AND FEATURES SUBJECT TO CHANGE  ExtremeAnalytics in the cloud, as a service – – – –

Any network related events IoT statistics ExtremeControl (NAC/IAC) events and data Wireless statistics

 Machine learning technology to provide predictive analytics – QoE analytics first – Move towards predictive analytics and actions: “fix and report before it breaks” – Basis for smarter SDN architecture ©2015 Extreme Networks, Inc. All rights reserved

 Subscription-based solution for securely managing your network devices from the public cloud  Addresses both Wired & Wireless equipment – Enterprise-grade switches – Wave2 Gigabit Access Points

 Auto-discovery, cloud connection and registration  Simple user interface to allow non-IT staff to setup and manage network ©2015 Extreme Networks, Inc. All rights reserved

“Single point of management for provisioning, configuration, reporting, firmware management and troubleshooting“

ExtremeCloud – Overview Cloud managed network hosted on Amazon Web Services (AWS)  ExtremeCloud – Built from the ground up, easy to use – visibility and control  High availability – Redundant datacenters; APs will continue full operation in the unlikely event that connectivity to ExtremeCloud is lost  Multi-tenancy - Allows network to expand and contract based on demand, with no overlap  Multi-site management - Allows a centralized IT team to manage a geographically distributed enterprise, regardless of location  Simple - Designed to help organizations that lack the resources to implement and manage network devices  World Class Support – ExtremeCloud backed by the industry’s only 100% insourced service and support ©2015 Extreme Networks, Inc. All rights reserved

ExtremeCloud - Application Visibility And Control Enabling better business decisions and application performance

 Market-unique application visibility and control without sacrificing performance (Flow-based architecture)  Seamlessly identify applications running on your network – Over 3,000 active fingerprints; – Built-into the wireless access points

 Enforce Policies right where your Users Connect – Prioritize traffic your business depends upon; – Eliminate unwanted traffic and applications; – Rate-limit, rate shape, prioritize, prioritize and deny applications ©2015 Extreme Networks, Inc. All rights reserved

ExtremeControl – Identity and Access Control  Understand who and what is using your network – – – – – –

Device Types OS Types User Profiles Authentications Registrations Etc.

 Drill in for detailed information: – – – –

End-system/user details Guest & BYOD Health (vulnerabilities, risks, etc) Switch & appliance info ©2015 Extreme Networks, Inc. All rights reserved

Actionable Information: Who, What, When, Where, How  Dynamically control traffic type, QoS, and access to network resources and services using any combination of: – Who  User role: engineer, HR, professor, student, guest, contractor, etc.

– What  BYOD, corporate laptop, corporate phone, printer, game console, etc.

– When  Time of day, day of week, day of month, etc.

– Where  Wired network, wireless network, AP or group of APs, lobby, cafeteria, conference room, classroom, etc.

– How  802.1X, web auth, MAC auth, Kerberos, Guest registration, social log-in, etc. ©2015 Extreme Networks, Inc. All rights reserved

Integration of ExtremeControl and IPS/SIEM  IPS or SIEM detects threat

Event from IPS to ASM

– Quarantines user at switch port – Notifies ExtremeControl

ASM to NAC

 ExtremeControl applies blacklist for user A

B

 If user moves to another switch or port blacklist prevents access ©2015 Extreme Networks, Inc. All rights reserved

C

D

Integration of Palo Alto and ExtremeControl Identity Mapping, Distributed Threat Response 1.

Precise User ID to IP mapping eliminates potential attacks by providing reliable information to NGFW - without impacting network performance

2.

Internal threat mitigation improves security by blocking/limiting user access at the point of entry – preventing threats from spreading to other users or groups

3.

Unified wired/wireless access control delivers complete visibility into end systems, users, and applications streamlining security processes for IT and ensuring end user validity ©2015 Extreme Networks, Inc. All rights reserved

Let’s build your network together! End-to-end, wired and wireless, software-driven networking solutions to enterprise customers worldwide

 ”Visionary” software-driven solutions: – Application-aware, QOS, Analytics – Built-in identity and access controls – EZ policy assignment and SDN

©2015 Extreme Networks, Inc. All rights reserved

©2015 Extreme Networks, Inc. All rights reserved