Connect Beyond the Network Corporate Overview
©2015 Extreme Networks, Inc. All rights reserved
Introducing Hardened Small Form Factor Switches
Hardened Small Form Factor Switches 10/100 and 10/100/1000 Models Fully Managed with Robust L2+ features set High Power 802.3af and 802.3at POE+ optimized for IP Surveillance Deployments Four DIN & Wall mount options – 4 10/100 POE+, 2 10/100, and 2 SFP uplinks – 8 10/100 POE+, and 4 SFP uplinks – 4 10/100/1000 POE+, 2 10/100, and 2 SFP uplinks – 8 10/100/1000 POE+, and 4 SFP uplinks Resilient Spanning Tree and Fast Fail-over Ring Topologies -40 to + 75°C temp range DIN Rail or Wall Mount IP30 enclosure Gigabir ©2015 Extreme Networks, Inc. All rights reserved
10/100 Models
10/100/1000 Models
Welcome to the New
Digital Economy Boris Germashev Regional Director Nordics & Eastern Europe Extreme Networks
[email protected] ©2015 Extreme Networks, Inc. All rights reserved
4
Proximity
Time
Identity
Personalization in a Digital World Proximity + Identity + Time = Contextual Insight Contextual insight provides knowledge to build catered services Personal touch builds improved experiences and relationship with customers ©2015 Extreme Networks, Inc. All rights reserved
Scheduling/Alerting!
Questions?
How was your experience? Tell us in this short survey.
Example: Increase Patient Satisfaction For Example Notify a patient that their appointment starts in 10 minutes and they are 8 minutes away.
TAKE SURVEY
Do you have any additional questions for your care team?
YES
Proximity In the Cafeteria Time 2:50 PM
©2015 Extreme Networks, Inc. All rights reserved
Identity Patient: Hearing Exam
Capitalize Drive seamless experiences for customer, visitors, employees Visualize real-time activity Recognize customer engagement through integrated solutions ©2015 Extreme Networks, Inc. All rights reserved
OFFICIAL Official Wi-Fi WI-FI Analytics ANALYTICS Provider PROVIDER
NFL & Super Bowl Transforming the in-game mobile fan experience
Wi-Fi and mobile application use details Enabling the interactive event fans desire ©2015 Extreme Networks, Inc. All rights reserved
Your Network Is the Key
EDUCATION
EMPLOYEES
MANUFACTURING
YOUR NETWORK CUSTOMERS
HOSPITALITY
ENTERPRISE & GOVERNMENT
PARTNERS
HEALTHCARE
9
©2015 Extreme Networks, Inc. All rights reserved
Network as a Service Delivery Platform? Use Cases
Contextual policy drives data-plane
Vertical Specific Services
Security Services
Integration of the gathered context with other applications
UCaaS Services
SD-WAN Services
Engagement Services
Cloud and on-premises services ©2015 Extreme Networks, Inc. All rights reserved
Analytic Services
IoT Services
Software-Driven Networking Solutions, Built on our Portfolio Cloud Optimization Network control extended from on-premise to cloud or hybrid infrastructure
Cloud
Integrated SDN Strategy A comprehensive ecosystem for network automation, visibility and control
Edge-to-Core Infrastructure High-performance, wireless network access and wired switching
Control Security Analytics
Wireless Switching
Management Software & Security Software to manage, secure and analyze users, devices and applications ©2015 Extreme Networks, Inc. All rights reserved
Automated QoS and Comprehensive Analytics Across Lync-Qualified SDN, Wired and Wireless Infrastructures ©2015 Extreme Networks, Inc. All rights reserved
Extreme Networks and Microsoft Wired, WiFi, and SDN Qualification
Extreme Networks | ExtremeXOS 15.3.14 Extreme Networks | IdentiFi Wireless Appliances and IdentiFi 802.11 Access Points
©2015 Extreme Networks, Inc. All rights reserved
Solution Architecture for Microsoft Skype for Business Improved Quality of User Experience Automated QoS provisioning during Lync call In-depth, contextual visibility into performance, call quality Simplified monitoring and troubleshooting of elements impacting user experiences and network performance 14
©2015 Extreme Networks, Inc. All rights reserved
Visibility - quality of calls, network and application latency, information on the end-users and devices
15
©2015 Extreme Networks, Inc. All rights reserved
Visibility - Voice and Video Call Quality in Context
MOS Start, End, Duration Caller, Callee, URI Location Info Session Info Prioritized Session Info
©2015 Extreme Networks, Inc. All rights reserved
Skype for Business Reporting and Analytics – on any network infrastructure
17
©2015 Extreme Networks, Inc. All rights reserved
How do we do this for Skype for Business? Single pane of glass for visibility, control and automation – Correlation of multiple parameters; automation – Integration with other solutions (like Skype for Business)
Rich information on the applications – Latency of the network and application – Who is using what, when and from where
Information on the end-user, device, place, time – Allows quickly find the root-cause of the issues – Policy-based management is even easier
Wireless network solutions – policy driven! – Addressing the demands for the density driven by IoT and mobility – 802.11ac wave 2 indoor and outdoor
Wired network solutions – From 10/100Mbit edge to 100Gbit core – Centrally managed, policy-driven ©2015 Extreme Networks, Inc. All rights reserved
Role-based access – Roles, Services, Rules
©2015 Extreme Networks, Inc. All rights reserved
Employe e
Deny Bcast
Services group Rules and apply to Roles
Allow HTTP
Allow HTTPS
Allow IPSec
Internet & VPN Access Only
Rate Limit
Allow Email
Allow SAP
Allow Oracle
Roles correspon d to specific user types on the network
Guest
Corporate Productivity Applications
Allow Telnet
– Policy audit reports in OneView – Policy hit reports showing resulting traffic control
Allow TFTP
Reporting
Allow Ping
Admin. Application s
Allow SNMP
IT Admin
Rules
– Passive policies for what-if scenarios prior to enforcing – Utilize Wireshark captures for before & after comparisons to test new policies before deployment
Roles
Enforce desired network behavior across switches, routers and APs “One click” enforcement of policies for QoS, bandwidth and other parameters – No tedious device-by-device ACL modifications for every move/add/change Network planning
Services
Policy-based Networking
Rules allow, deny, rate limit or contain specific traffic type
Flow Enabled Software – Foundation for Future
Data Plane Control
Policy
Security & QoS (L2-L7)
Unique Session Enforcement
Analytics & Measurements Flow
Flow
Flow
Flow
Flow
Flow
Flow
Flow
Flow
Flow
Flow
Flow
Performance Bottleneck – Eliminated! Packet Processing
Flow Processing
Performance Tests @Extreme Labs
©2015 Extreme Networks, Inc. All rights reserved
Management and
Control
©2015 Extreme Networks, Inc. All rights reserved
Analytics, Management & Control Analytics
22
Management
Control
•
Layer 7 application management
•
Alarm and Event management
•
Role-based granular network access control and priority
•
1000’s of fingerprints – port independent
•
Configuration & change management
•
Enforce AUP
•
Flexible assessment
•
Dashboards
•
Zero Touch provisioning
•
Compliance enforcement
•
Diagnostics & troubleshooting
•
Capacity planning
•
Guest & Remediation portals
•
Status, inventory, performance & audit reporting
•
Discovery & topology mapping
•
User & end-system tracking
•
Alarm management
•
Automated incident response
©2015 Extreme Networks, Inc. All rights reserved
ExtremeManagement Holistic device, network, location and application visibility Gather metrics to measure and predict experience Unify network analytics and integration with other applications ©2015 Extreme Networks, Inc. All rights reserved
Quick & easy on-boarding of users and their devices Single captive portal supports: – – – – – –
Self-service registration Wired/wireless with same look & feel BYOD, guests, contractors Secure wireless guest access SMS & email verification Sponsorship
Secure wireless guest & contractor access Pre-registration capabilities Also integration with other captive portals – And MDM, etc ©2015 Extreme Networks, Inc. All rights reserved
PBP – Paper Based Portal
©2015 Extreme Networks, Inc. All rights reserved
Quick & easy on-boarding of new network equipment as well! Mobile App (QR or bar code scan) or manual pre-register of switches – Simply pre-register devices which will be automatically configured upon connecting to the network Plug and Play Hardware – Unskilled personnel can add or replace devices
Automated Device on-boarding – Call Home to Extreme
Apply Configuration from hierarchical templates – System, topology protocols, policy configuration, including Identity and Access configuration ©2015 Extreme Networks, Inc. All rights reserved
Rich analytics for private and public cloud applications in Extreme and 3rd Party networks 100% L7 application visibility on any wired or wireless network Easily scales from edge to DC Pervasive application analytics yields fast decisions with deep insight See application and network response time by user/device Massive and Customizable Signature Set with more than 7,000 applications ©2015 Extreme Networks, Inc. All rights reserved
“ExtremeAnalytics provides us with a global view of the overall health of the network from a single pane of glass…and it enables us to pinpoint issues and drill down to a specific closet or client for fast resolution.”
Analytics Application Management Gain visibility into, and improve, the user experience Optimize application performance
Ensure business critical applications are delivered with priority Eliminate issues before they can occur Better utilize network resources Pervasive application visibility and control from datacenter/core => mobile edge Unmatched scale & performance 28
©2015 Extreme Networks, Inc. All rights reserved
ExtremeAnalytics Future Directions* *FUTURE AVAILABILITY – PRODUCTS AND FEATURES SUBJECT TO CHANGE ExtremeAnalytics in the cloud, as a service – – – –
Any network related events IoT statistics ExtremeControl (NAC/IAC) events and data Wireless statistics
Machine learning technology to provide predictive analytics – QoE analytics first – Move towards predictive analytics and actions: “fix and report before it breaks” – Basis for smarter SDN architecture ©2015 Extreme Networks, Inc. All rights reserved
Subscription-based solution for securely managing your network devices from the public cloud Addresses both Wired & Wireless equipment – Enterprise-grade switches – Wave2 Gigabit Access Points
Auto-discovery, cloud connection and registration Simple user interface to allow non-IT staff to setup and manage network ©2015 Extreme Networks, Inc. All rights reserved
“Single point of management for provisioning, configuration, reporting, firmware management and troubleshooting“
ExtremeCloud – Overview Cloud managed network hosted on Amazon Web Services (AWS) ExtremeCloud – Built from the ground up, easy to use – visibility and control High availability – Redundant datacenters; APs will continue full operation in the unlikely event that connectivity to ExtremeCloud is lost Multi-tenancy - Allows network to expand and contract based on demand, with no overlap Multi-site management - Allows a centralized IT team to manage a geographically distributed enterprise, regardless of location Simple - Designed to help organizations that lack the resources to implement and manage network devices World Class Support – ExtremeCloud backed by the industry’s only 100% insourced service and support ©2015 Extreme Networks, Inc. All rights reserved
ExtremeCloud - Application Visibility And Control Enabling better business decisions and application performance
Market-unique application visibility and control without sacrificing performance (Flow-based architecture) Seamlessly identify applications running on your network – Over 3,000 active fingerprints; – Built-into the wireless access points
Enforce Policies right where your Users Connect – Prioritize traffic your business depends upon; – Eliminate unwanted traffic and applications; – Rate-limit, rate shape, prioritize, prioritize and deny applications ©2015 Extreme Networks, Inc. All rights reserved
ExtremeControl – Identity and Access Control Understand who and what is using your network – – – – – –
Device Types OS Types User Profiles Authentications Registrations Etc.
Drill in for detailed information: – – – –
End-system/user details Guest & BYOD Health (vulnerabilities, risks, etc) Switch & appliance info ©2015 Extreme Networks, Inc. All rights reserved
Actionable Information: Who, What, When, Where, How Dynamically control traffic type, QoS, and access to network resources and services using any combination of: – Who User role: engineer, HR, professor, student, guest, contractor, etc.
– What BYOD, corporate laptop, corporate phone, printer, game console, etc.
– When Time of day, day of week, day of month, etc.
– Where Wired network, wireless network, AP or group of APs, lobby, cafeteria, conference room, classroom, etc.
– How 802.1X, web auth, MAC auth, Kerberos, Guest registration, social log-in, etc. ©2015 Extreme Networks, Inc. All rights reserved
Integration of ExtremeControl and IPS/SIEM IPS or SIEM detects threat
Event from IPS to ASM
– Quarantines user at switch port – Notifies ExtremeControl
ASM to NAC
ExtremeControl applies blacklist for user A
B
If user moves to another switch or port blacklist prevents access ©2015 Extreme Networks, Inc. All rights reserved
C
D
Integration of Palo Alto and ExtremeControl Identity Mapping, Distributed Threat Response 1.
Precise User ID to IP mapping eliminates potential attacks by providing reliable information to NGFW - without impacting network performance
2.
Internal threat mitigation improves security by blocking/limiting user access at the point of entry – preventing threats from spreading to other users or groups
3.
Unified wired/wireless access control delivers complete visibility into end systems, users, and applications streamlining security processes for IT and ensuring end user validity ©2015 Extreme Networks, Inc. All rights reserved
Let’s build your network together! End-to-end, wired and wireless, software-driven networking solutions to enterprise customers worldwide
”Visionary” software-driven solutions: – Application-aware, QOS, Analytics – Built-in identity and access controls – EZ policy assignment and SDN
©2015 Extreme Networks, Inc. All rights reserved
©2015 Extreme Networks, Inc. All rights reserved