Author
@Bill_Banks
Abstract:
Extreme Networks provides software-driven networking solutions for Enterprise and Service Provider customers. Providing a combined end-to-end solution from the Data Center to the Access Point, Extreme Networks designs, develops, and manufactures wired and wireless network infrastructure equipment and develops the software for network management, policy, analytics, security and access controls. In 2017, Extreme Networks acquired Enterasys Networks that included their Network Access Control software.
The Extreme Networks ExtremeControl NAC solution is business-oriented visibility and control over individual users and applications in multi-vendor infrastructures. NAC protects existing infrastructure investments since it does not require the deployment of new switching hardware or that agents be installed on all end systems. Extreme Networks NAC performs multi-user, multi-method authentication, vulnerability assessment and assisted remediation.
ExtremeControl can integrate with Check Point Threat Protection to accept threat intelligence and use that intelligence to enforce NAC policy changes to endpoints. Check Point forwards the threat logs to the Extreme Networks ExtremeControl solution, which then can quarantine devices that have been flagged by the Check Point Threat Policy.
This integration works with Check Point Log Exporter built into R80.20. The Log Exporter package for R77.30 and R80.10 can be found at SK122323. This document assumes you are using R80.20 or have installed Log Exporter.
For the full list of White Papers, go here.