Extreme Networks

 

Extreme Networks was founded more than 20 years ago offering the most comprehensive, high-performance network access and switching products. Today, their products help support your business in bridging the gap between implementation and outcomes

 Infrastructure

Edge Switching

Edge/access switches ensure the performance and reliable operation of your end-user devices and applications. Simple to deploy and manage, they let you easily scale port density, bandwidth, and network services.

 

Aggregation / Core Switches

Designed for the demanding needs of aggregation, top-of-rack and campus core environments, these switches deliver 10Gb, 40Gb and even 100Gb bandwidth with maximum throughput and reliability.

Aggregation / Core Switches

Designed for the demanding needs of aggregation, top-of-rack and campus core environments, these switches deliver 10Gb, 40Gb and even 100Gb bandwidth with maximum throughput and reliability.

The Automated Campus

Bring simplicity, enhanced security and visibility to your campus environment

  • Simplify your network via a fabric-enabled architecture that automates provisioning and eliminates repetitive manual configuration.
  • Deliver end-to-end network security that contains breaches and stops hackers in their tracks.
  • Provide network intelligence with a 360-degree view for faster time to service, enhanced agility, and increased efficiency.

ExtremeWireless Controllers

The award-winning ExtremeWireless Controllers are simple to deploy and manage, yet provide advanced functionality to allow organizations to define how wireless voice/video/data traffic is processed without architectural constraints and in accordance with business needs.

Learn More ExtremeWireless

Read More About the ExtremeWireless Solution

Read how Tulsa University Enhanced Academic Applications

Learn About 802.11ac and Its Impact on Wi-Fi and the Experience Economy

Insights Visibility and Control

Extreme Management Center

 

Extreme Management Center

The Extreme Management Center gives you actionable insights, granular visibility, and automated control over users, devices, and applications.

Extreme Control

In-depth visibility and control over users and devices empower you to gain a unified view of the security across your wired and wireless networks.

Extreme Analytics

ExtremeAnalytics empower organizations to save operational costs, accelerate trouble resolution, and deliver a superior quality of experience with real-time data in one easy-to-read dashboard.

ExtremeManagement

ExtremeManagement delivers integrated management of your wired and wireless infrastructure from a single pane of glass. Zero Touch Provisioning eliminates manual provisioning and configuring when adding network devices. One dashboard aggregates the view of users, devices, and applications.

Management Center (formerly known as NetSight) is a single pane of glass management system that provides wired/wireless visibility and control from the data center to the mobile edge. The intelligence, automation, and integration of your management software enable the IT organization to optimize the efficiency of network operations and reduce total cost of ownership.

Management Center provides centralized visibility and granular control of enterprise network resources end to end. Management Center is distinctive for granularity that reaches beyond ports and VLANs down to individual users, applications, and protocols. No matter how many moves, adds, or changes occur in your environment, Management Center keeps everything in view and under control through role-based access controls. One click can equal a thousand actions when you manage your network with Extreme Networks. Management Center can even manage beyond Extreme Networks switching, routing, and wireless hardware to deliver standards-based control of other vendors’ network equipment.

A single management system for the entire network providing consistent management across all devices.

Integrated wired/wireless management – Provides consistent management of both the wired and wireless network from a single interface. Scripting based automation reduces IT administration.

Dashboard and reports – Provides a graphical user interface for network data collection and reporting of network analytics. Impact analysis dashboard delivers deep insight and simplicity.

Open Application Programmatic Interface (API) – Provides an open and secure two-way interface into Management Center for third-party application integration and control of software defined networking (SDN) implementations.

Network Inventory Management – Advanced network configuration and change management for the wired and wireless infrastructure.

Historical data collection and trend analysis – Provides the ability to take flow-based data to understand how the network is being used up to layer 4. With the addition of Purview this extends the detailed analytics to the application layer (layer 7) for detailed application visibility across the entire network.

Policy-based network – Allows for the centralized creation of policies that follow users and devices across the network. These are not tied to the physical network and can change based on user, device, TOD, location, and connection type.

Identity and access control – Provides visibility and control down to the user and device level.

Intelligent alarm management – Alarm and event intelligence that alert IT when issues occur within the network are automatically cleared when the problem no longer exists and allows thresholds to be set so that warnings are sent prior to an actual failure.

Troubleshooting – Eliminates the guesswork and makes troubleshooting user issues easy. Just enter the username and discover where the user is located, where they are connected on the network, the type of device they are using, and much more.

Third-party network integration – Manage third-party devices to provide a complete picture of the entire infrastructure in a heterogeneous network environment.

Business alignment
  • Transform complex network data into business-centric, actionable information
  • Centralize and simplify the definition, management, and enforcement of policies such as guest access or personal devices
  • Easily integrate with business applications with Software Defined Networking for operational efficiency
Operational efficiency
  • Reduce IT administrative effort with the automation of routine tasks and web-based dashboard
  • Streamline management with the integration of wired and wireless networks
  • Easily enforce policies network-wide for QoS, bandwidth, etc.
  • Troubleshoot with the convenience of a smartphone or tablet
  • Integrate with enterprise management platforms
Security
  • Protect corporate data with centralized monitoring, control, and real-time response
  • Enhance existing investments in network security
  • Preserve LAN/WLAN network integrity with unified policies
Service and support
  • Industry-leading first-call resolution rates and customer satisfaction rates
  • Personalized services, including site surveys, network design, installation, and training
Management Center server and client OS requirements
These are the operating system requirements for both the Management Center server and remote Management Center client machines.

  • Windows (qualified on the English version of the operating systems)
  • Windows Server® 2003 with Service Pack 2 (64-bit and 32-bit)
  • Windows XP® with Service Pack 3 (32-bit only)
  • Windows Server® 2008 Enterprise (64-bit and 32-bit)
  • Windows® 7 (64-bit and 32-bit)
  • Windows® 8 (64-bit and 32-bit)

Linux

  • Red Hat Enterprise Linux WS and ES v5, v6, and v7 (64-bit and 32-bit)
  • SuSE Linux versions 10 and 11 (64-bit and 32-bit)
  • Ubuntu 11.10 Desktop version (32-bit for remote Management Center client only)
  • Ubuntu 11.10 and 12.04 (64-bit)
  • Mac OS X® 64-bit (remote Management Center client only)
  • Leopard®, Snow Leopard®, Lion®, or Mountain Lion®
  • VMware® (64-bit Management Center Virtual Appliance)
  • VMware ESXi™ 4.0, 4.1, 5.0, or 5.1 server

Management Center server and client hardware requirements
These are the hardware requirements for the Management Center server and Management Center client machines:

  • Management Center server
  • Minimum: 32-bit Windows® 7; dual-core 2.4GHz processor, 2GB RAM, 10GB free disk space
  • Medium: 64-bit desktop, Windows 2008 R2, or Linux; quad-core 2.6GHz processor, 8GB RAM, 40GB free disk space
  • Large: 64-bit server Linux; dual quad-core Intel® Xeon CPU
  • E5530 2.4GHz processors, 12GB RAM, 100GB free disk space

Management Center client

  • Recommended: dual-Core 2.4GHz processor, 2GB RAM free
  • Disk space: 100MB (User’s home directory requires 50MB for file storage)
  • Java runtime environment (JRE) 6 or 7 (also referred to as 1.6 or 1.7)

Supported web browsers

  • Internet Explorer version 8 and 9
  • Mozilla Firefox 11 and 12
  • Google Chrome 19.x

OneView™
OneView supports reporting on about 2,500 devices/interfaces in a typical enterprise network which stores: raw data for seven days with a 15-minute polling interval, hourly rollups for eight weeks, and daily rollups for six months. More information on tuning the deployment is available in the OneView Users Guide.

NS-A-20 Management Center Appliance
The NS-A-20 Management Center Appliance includes (2) XEON E5-2620 CPUs (24 cores), dual 1TB hard drives with RAID controller, 24GB RAM, and dual power supplies.

Physical specifications

  • Height: 1.75” (4.45 cm) – 1U
  • Length: 27.95” (70.9 cm)
  • Width: 16.93” (43 cm)
  • Weight: 31.8 lbs (14.4 kg)

Power

  • Wattage: 750 watt (max), each power supply
  • Voltage: 110/240 VAC
  • Frequency: 47-63Hz

Environmental specifications

  • Operating temperature: 10° C to 35° C (50° F to 95° F)
  • Storage temperature: -40° C to 70° C (-40°F  to 158° F)
  • Operating humidity: 5% to 90% (non-condensing)

Standards compliance
Regulatory/safety:

  • UL60950 – CSA 60950
  • (USA/Canada)
  • EN60950 (Europe)
  • IEC60950 (international)
  • CB Certificate & Report, IEC60950
  • GS Certification (Germany)
  • GOST R 50377-92 – Certification (Russia)
  • Ukraine Certification (Ukraine)
  • CE – Low Voltage Directive 2006/95/EC (Europe)
  • IRAM Certification (Argentina)

Emissions/immunity:

  • FCC/ICES-003 – Emissions (USA/Canada)
  • CISPR 22 – Emissions (international)
  • EN55022 – Emissions (Europe)
  • EN55024 – Immunity (Europe)
  • EN61000-3-2 – Harmonics (Europe)
  • EN61000-3-3 – Voltage Flicker (Europe)
  • CE – EMC Directive 2004/108 EC (Europe)
  • VCCI Emissions (Japan)
  • AS/NZS 3548 Emissions (Australia/New Zealand)
  • BSMI CNS13438 Emissions (Taiwan)
  • GOST R 29216-91 Emissions (Russia)
  • GOST R 50628-95 Immunity (Russia)
  • Ukraine Certification (Ukraine)
  • KC Certification (Korea)

Management Center Virtual Appliance
A virtual appliance is a software image that runs on a virtual machine.

The Management Center virtual appliance is packaged in the .OVA file format defined by VMware and must be deployed on a VMware ESX™ 4.0, 4.1, 5.0, or 5.1 server or ESXi™ 4.0, 4.1, 5.0, or 5.1 server with a vSphere™ 4.0, 4.1, 5.0, or 5.1 client. Virtual appliance requires 8GB of memory, four CPUs, two network adapters, and 60GB of thick-provisioned hard drive space.

ExtremeAnalytics

ExtremeAnalytics empower organizations to save operational costs, accelerate trouble resolution, and deliver a superior quality of experience with real-time data in one easy-to-read dashboard.

ExtremeAnalytics lets you understand what applications are running on your network, who is using them and what the response time is for each application. It gives you granular visibility into network and application performance, users, locations and devices. Information from the network and the applications empower you to make data-driven decisions.

When an issue comes up, you can troubleshoot quickly and determine whether the issue is caused by the network or the application. An easy to comprehend dashboard shows you user-behavior and user engagement of an application, so you can better understand the value of your investment into certain applications. By tracking application response-time you can ensure the best quality of experience for your end-users.

Get actionable business insights through granular visibility into your applications

  • Provides actionable context-based knowledge about applications, users, locations and devices
  • Insights Dashboard provides real time insights into the network and application performance empowering you to better manage quality of experience
  • Offers contextual data about your applications without performance degradation
  • An intuitive event analyzer accelerates troubleshooting and visualizes all wireless clients
  • Transport layer independent application fingerprinting for identifying more than 2,300 applications
  • Application Telemetry with Extreme EXOS switches
  • Integration with third party solutions such as Aruba Clearpass and IPFIX

ExtremeAnalytics is a network powered application analytics and optimization solution that captures and analyzes context-based application information to deliver business insights on applications, users, locations and devices

  • Provides actionable business insights from your network for data-driven decisions
  • Gives you granular visibility into network and application performance, users, locations and devices to align the network to business goals
  • Save operational costs, solve issues fast and deliver a superior quality of end user experience with real-time data in one easy-to-read dashboard
  • Speeds up troubleshooting by separating network from application performance so you can quickly identify root-causes
  • Makes your network safer as it monitors shadow IT, identifies and reports malicious or unwanted applications, and monitors security compliance
  • Application telemetry provides valuable analytic information without the need for external sensors or collectors

ExtremeControl

Make your network more secure with control over who gains access, when and where. In-depth visibility and control over users and devices empower you to gain a unified view of the security across your wired and wireless networks.
ExtremeControl lets you manage secure and automated access for both, BYOD and IoT devices from one convenient dashboard. It makes it easy to roll out granular policies across your wired and wireless networks to meet industry and company compliance obligations. Identity based network access control keeps unauthorized people and devices from accessing your network.

Our network access control solution is integrated with major enterprise platforms including solutions for network security, enterprise mobility management, analytics, federated directories, cloud, and datacenter. In addition, it offers an open northbound API for customized integrations to key enterprise platforms.

  • Single pane of glass to configure and monitor end systems, profilers, security posture, guest access
  • Secure and automated network attachment of IoT devices and provide full visibility into what’s connected to your network
  • Threat mitigation and containment workflow based on alerts received from next generation security solutions
  • Out-of-the-box integration with third party security platform including MDM, posture, next generation firewall, SIEM, IDS/IPS and security gateway
  • Customized integration using an open northbound API into major enterprise IT platforms for an automated network infrastructure
  • Guest registration via user’s existing Google, Yahoo, MS or Salesforce accounts
  • Third Party Policy support – user-based ACLs
  • Unifies the security of your wired and wireless networks with in-depth visibility and context-based control over users and endpoint devices for BYOD and IoT devices
  • Secure onboarding for BYOD or guest policies is made easy and auditable with our self-service portal that offers texting and social login based identity.
  • Granular policy controls enable you to comply to company policies and regulatory compliance obligations of your critical business operations.
  • Let’s you locate, authenticate and authorize targeted access policies to users and devices as they connect to the network for secure BYOD, guest access and IoT
  • Integration with IT infrastructure such as Active Directory, LDAP and firewall
  • Enhanced capabilities in convergence with Identity Engines

Networking Technologies Site Map

Your Technology Resource in Erie, PA | Buffalo, NY | Cleveland, OH regions