dystrybutor extreme networks
tel. +48 61 628 43 70 info@versim.pl PL | EN
extreme networks nac

Solutions

Local Area Networks

Local Area Networks are computer networks consisting of passive and active network devices. LAN networks utilize endpoint devices connected by use of various types of cabling with active network devices. Passive network elements are represented by various types of Ethernet cables (both copper and fiber), RJ-45 sockets and patchpanels. Active network elements are e.g. hubs, switches and routers. In our portfolio we suggest you to take a look at Extreme Networks solutions to consider them for your LAN infrastructure.


ExtremeSwitching™ technology is a comprehensive hardware solutions – a complete set of high performance switches – from the edge to the core of the network. Among core switches we offer two families of devices. The first one offers huge scalability, provides capacity of 2.56 Tb/s per slot and over 20Tb/s per system. These switches are characterized by low latency, high performance and a large number of 1/10GbE, 40GbE and even 100GbE ports. The other line are flow based switches taking advantage of programmable CoreFlow2 ASIC and providing flexible classification of packets, that is unique in the industry – granularity of packet analysis and control process is unrivaled. CoreFlow2 technology automatically classifies and enforces application traffic at wire speed and bi-directionally – classifies and controls traffic in the entire network, up to the application layer. This technology combines over 15 years of advanced research and development activities. A particular advantage of these switches and flow based CoreFlow2 ASIC is capturing of NetFlow data for every packet in data flow without burdening of the CPU and degradation of switching capacity.

foto11In the group of edge/aggregation switches we offer a full range of high performance switches with various port configurations. We offer switches with 1GbE, 10GbE and 40GbE interfaces providing reliable operation through redundant power supplies and fans, as well as modular operating system EXOS. These switches support Extreme Networks dynamic role based policies to secure network and provision services based on user/ device role in the network. Network resources can be precisely tailored to a specific user, system, service or port, by defining of distinctive roles or profiles that represent operational groups within Customer’s environment. A policy role may be configured to include any combination of QoS parameters, rate limiting, VLAN and ACL, at layers 2-4. Policies provide very granular control over what user/device has access to. What is important, the policy is not tied to VLAN, it is associated with user/ device and roams with him as it moves within the network. The three major advantages resulting from network policies are provision of services and control over network resources, security and centralized operational efficiency.

Another differentiator of Extreme Networks switches is a modular operating system ExtremeXOS, which enables dynamic update of individual software modules, without the need to restart the entire system – which translates into higher availability of the network. Each individual system process is monitored in the real time. If the process stops responding or working, then it can be automatically restarted.


Want to know more? Contact Us!
You don’t know which solution will solve your problems?
Try our Security Questionnaire!
answer questions and we will choose the solution for you!

Wireless networking

Wireless Local Area Networks operate based on radio frequency signals on two bands: 2.4 GHz and 5 GHz, with regards to IEEE 802.11 standards. Most popular standard so far is 802.11n ammendment that allows to reach up to 600 Mbps throughput. Key element of WLAN is an access point, which crucial functionality is to convert radio-transmitted 802.11-compliant data frames into electrical signal transmitting Ethernet frames, that are eventually pushed to wired LAN to allow mobile devices reach essential network segments and the Internet. From our portfolio we strongly reccomend Extreme Networks Wireless LAN solutions.


Extreme IdentiFi is a purpose built WLAN solution providing BYOD wireless users experiences comparable to wired network. Extreme IdentiFi solution includes access points, centralized management and WLAN controllers providing scalability, control and density required to meet the needs of users, related with simultaneous transmission of data, voice and HD video. Within the IdentiFi solution, control and management are performed centrally, and then information are pushed to access points, at the edge of the network – it provides unmatched simplicity, optimization and security.

ExtremeWireless controllers provide role based management of users, devices and applications and personalized services including QoS, secure access policies, NAC, Captive Portal and many more. These services are components of unique and flexible IdentiFi VNS (Virtual Network Service) architecture, which allows for easy management using intuitive web based dashboard. Extreme Networks solutions can support form one up to more than 2000 access points per controller, providing linear scalability, from small to large implementations of wireless network. ExtremeWireless access points are a complete range of devices purposely designed for education, healthcare and large hospitality venues. They offer capabilities such load balancing, band preference, band steering and Airtime Fairness, that maximizes the efficiency and throughput of devices.

foto1In addition, access points are equipped with integrated ExtremeAnalytics function. The access point is able to generate relevant data about flows from wireless network users, which in combination with Extreme Application Analytics tool provides useful information about applications and users – including their location and used devices. Such data can be used by IT or marketing departments. Access points also have WIPS and WIDS capabilities implemented, that enhances network security with embedded wireless intrusion prevention through ExtremeWireless Radar technology. When deployed in conjunction with ExtremeSecurity Intrusion Prevention System (IPS) full packet inspection, adaptive signature pattern matching, protocol analysis and behavioral anomaly detection are delivered for both wires and wireless users.

Further, ExtremeControl’s identity based policy privileges are unified across the wired and wireless infrastructure to deliver role-based access control – regardless of connectivity method. The ExtremeControl policies ensure only the right users have access to the right information, from the right place, at the right time.


 

Want to know more? Contact Us!
You don’t know which solution will solve your problems?
Try our Security Questionnaire!
Answer questions and we will choose the solution for you!

Infrastructure
management systems

ExtremeManagement [formerly NetSight] is a tool that provides centralized visibility and highly efficient control of enterprise network resources. It manages both wired and wireless network devices and creates an unified system, that simplifies and automates management tasks across the entire network infrastructure. Unified LAN/WLAN devices management enables simple and network-wide implementation and enforcement of security policies. To enhance IT staff productivity, solution has embedded highly automated functions that allow to avoid time-consuming, manual configuration tasks and tasks related with archiving.

foto2ExtremeManagement have a unified web based control interface – OneView. Graphical and exceptionally easy-to-use, OneView simplifies troubleshooting, help desk support tasks, problem solving and reporting. Additionally, IT administrators using web based OneView interface can monitor and correct network operation from anywhere and at any time, using popular mobile devices. Identity and access management interface provides granular visibility and control for the exploding number of managed and unmanaged devices connecting to network. ExtremeManagement is distinctive for granularity that reaches beyond ports, VLANs and SSIDs down to individual users, applications, and protocols.

ExtremeManagement with wireless management, is the foundation for centralized monitoring and managing all the components in the organizaton’s infrastructure. ExtremeManagement enables the network infrastructure to be viewed as a unified whole rather than as a collection of disparate individual components. It transforms complex network data into graphical, business-centric information making the network less complicated and better aligned with business requirements.

With its distributed client/server architecture, ExtremeManagement is exceptionally convenient to use. A user with appropriate security credentials anywhere on the network can access a launch page and log into any of the Control Center capabilities. ExtremeManagement solution simplifies routine and one-time tasks such as reconfiguring of switches and access points, monitoring of network performance, and isolating faults. It takes advantage of advanced functionality in Extreme Networks switching, routing, and wireless products including topology maps, FlexViews (graphical depictions of a broad range of network parameters), VLAN management,device discovery, and event logging.

 

Want to know more? Contact Us!
You don’t know which solution will solve your problems?
Try our Security Questionnaire!
Answer questions and we will choose the solution for you!

Network traffic analysis

Extreme Application Analytics (formerly Purview) is a network powered application analytics and optimization solution that captures and analyzes application traffic to deliver meaningful intelligence – about applications and users, with their location and used devices.

From a business point of view, Extreme Application Analytics provides data about applications usage. This can be used to better understand customers’ behavior on the network, identify the level of user engagement, and to assure seamless business application delivery. Additionally Extreme Application Analytics may track adoption of individual applications to determine the return on investment associated with new application deployments and also identify the potential for new and so far unknown ways to leverage application data from the network to create new – revenue generating – services. Extreme Application Analytics in-depth view into the network and applications also provides valuable information for up front budget planning when implementing new applications for the business while also ensuring security compliance for approved applications.

foto3From an IT perspective Extreme Application Analytics provides visibility into network and application performance allowing IT to pinpoint and resolve infrastructure performance issues whether they are caused by the network, application, or server. This saves both time and money for the business when the critical applications are running at the best possible performance. By eliminating unnecessary application delays, users become more efficient and can focus on more important aspects of their jobs. An intelligence embedded in Extreme Application Analytics provides visibility and control of applications in the entire network infrastructure, from wired/ wireless access layer to core and data center. All data are aggregated within Extreme Control Center, where are presented in a form of a number of easy to understand dashboards, that allow to create very detailed reports useful for both IT staff and marketing department.

 

Want to know more? Contact Us!
You don’t know which solution will solve your problems?
Try our Security Questionnaire!
Answer questions and we will choose the solution for you!

Cloud solutions

Cloud solutions information