Datasheet
4
Extreme Networks Data Sheet: Summit X150 Series
Comprehensive Security Management
Implementing a secure network means providing protection at the network perimeter as well as the core. Summit X150
series switches use advanced security functions to help protect your network from known or potential threats. Security
oerings from Extreme Networks encompass three key areas: user and host integrity, threat detection and response,
and hardened network infrastructure.
IP Security
ExtremeXOSIPSecurityFrameworkhelpsprotectthenetwork
infrastructure,networkservicessuchasDHCPandDNSand
hostcomputersfromspoongandman-in-themiddleattacks.
Italsohelpsprotectthenetworkfromstaticallycongured
and/orspoofedIPaddressesandbuildsanexternaltrusted
databaseofMAC/IP/portbindingsprovidingthetrac’ssource
fromaspecicaddressforimmediatedefense.
Identity Manager
IdentityManagerallowsnetworkmanagerstotrackuserswho
accesstheirnetwork.Useridentityiscapturedbasedon
NetLoginauthentication,LLDPdiscoveryandKerberos
snooping.ExtremeXOSusestheinformationtothenreporton
theMAC,VLAN,computerhostname,andportlocationofthe
user.Further,IdentityManagercancreatebothrolesand
policies,andthenbindthemtogethertocreaterole-based
prolesbasedonorganizationalstructureorotherlogical
groupings,andapplythemacrossmultipleuserstoallow
appropriateaccesstonetworkresources.
Network Intrusion Detection and
Response
Hardware-Based sFlow Sampling
sFlow®isasamplingtechnologythatprovidestheabilityto
continuouslymonitorapplication-leveltracowsonall
interfacessimultaneously.ThesFlowagentisasoftware
processthatrunsonSummitX150switchesandpackagesdata
intosFlowdatagramsthataresentoverthenetworktoan
sFlowcollector.Thecollectorgivesanup-to-theminuteview
oftracacrosstheentirenetwork,providingtheabilityto
troubleshootnetworkproblems,controlcongestionanddetect
networksecuritythreats.
Port Mirroring
Toallowthreatdetectionandprevention,SummitX150
switchessupportmany-to-oneandone-to-manyport
mirroring.Thisallowsthemirroringoftractoanexternal
networkappliancesuchasanintrusiondetectiondevicefor
trendanalysisorforutilizationbyanetworkadministratorfor
diagnosticpurposes.
User Authentication and Host
Integrity Checking
Network Login
NetworkLogincapabilityenforcesuseradmissionandusage
policies.SummitX150seriesswitchessupportacomprehensive
rangeofNetworkLoginoptionsbyprovidingan802.1x
agent-basedapproach,aWeb-based(agent-less)login
capabilityforguests,andaMAC-basedauthenticationmodel
fordevices.WiththesemodesofNetworkLogin,only
authorizedusersanddevicesarepermittedtoconnecttothe
networkandbeassignedtotheappropriateVLAN.
Multiple Supplicant Support
Sharedportsrepresentapotentialvulnerabilityinanetwork.
Multiplesupplicantcapabilityonaswitchallowsittouniquely
authenticateandapplytheappropriatepoliciesandVLANsfor
eachuserordeviceonasharedport.
MultiplesupplicantsupporthelpssecureIPTelephonyand
wirelessaccess.Convergednetworkdesignsofteninvolvethe
useofsharedports(seeFigure2).
Host Integrity Checking
Hostintegritycheckinghelpskeepinfectedornon-compliant
machinesothenetwork.SummitX150seriesswitches
supportahostintegrityorendpointintegritysolutionthatis
basedonthemodelfromtheTrustedComputingGroup.
Extensive MAC and IP Security
Functionality
Media Access Control (MAC) Lockdown
MACsecurityallowsthelockdownofaporttoagivenMAC
addressandlimitingthenumberofMACaddressesonaport.
MACsecuritycanbeusedtodedicateportstospecichostsor
devicessuchasVoIPphonesorprintersandavoidabuseofthe
port—acapabilitythatisparticularlyusefulinenvironments
suchashotels.Inaddition,anagingtimercanbeconguredfor
theMAClockdown,protectingthenetworkfromtheeectsof
attacksusing(oftenrapidly)changingMACaddresses.










