Product overview |
A multi-vendor solution that provides an unparalleled range of choices for fine grained network access control.Network Access Control (NAC) is a complete standards-based, multi-vendor interoperable pre-connect and post-connect Network Access Control solution for wired and wireless LAN and VPN users. Using Extreme Networks NAC Gateway appliances and/or NAC Gateway Virtual Appliance with NetSight NAC management configuration and reporting software, IT administrators can deploy a leading-edge NAC solution to ensure only the right users have access to the right information from the right place at the right time including time of day, location, authentication types, device and OS type, and end system and user groups.Network Access Control BenefitsCentrally manage and control the security posture of all devices connecting to the network, including employee bring your own device (BYOD)It offers the flexibility to choose whether or not to restrict access for guests/contractors to public Internet services onlyManaged guest access control with sponsorship, SMS verification, pre-registration, and other optionsComprehensive dashboard reporting and advanced notification engineEnables the homogeneous configuration of policies across multiple switch and wireless access point vendors. This capability significantly reduces the burden of policy lifecycle management and eases Network Access Control deployment in wired and wireless heterogeneous infrastructuresWorks in any environment – Extreme only network, Extreme and third party network, and non-Extreme networkProtects existing infrastructure investments since it does not require the deployment of new switching hardware or that agents be installed on all end systemsProtect critical corporate data by restricting and/or controlling unauthorized access to network resourcesAddress compliance and regulatory requirements by control access to sensitive data and then providing comprehensive reporting on user activity. Additionally, reporting data can be exported to other third party reporting toolsAutomate endpoint isolation, quarantine, and remediation, plus ongoing threat analysis, prevention, and containmentPerforms multi-user, multi-method authentication, vulnerability assessment and assisted remediationMultiple options on how to handle authenticated internal users/devices that do not pass the security posture assessmentExtreme NAC is adaptable to any device using RADIUS for authorization with configurable RADIUS attributes such as Login-LAT or Filter ID. Enterprises can also apply different policies depending on the RADIUS reject attribute |