Specifications

W W W.EXTREMENETW ORKS.COM 3
Analyze and Record Suspicious
Traffic for Security Forensics
Smart Packet Capture lets you capture data packets with a
click of the mouse from a centralized console for any site.
You can analyze data packets that look suspicious even when
they exist for only a short time to keep your network secure.
Figure 5: Smart Packet Capture
Troubleshoot and Visualize All
Wireless Clients with Our Intuitive
Event Analyzer
An employee walks into her office in the morning and pulls
out her cell phone. She automatically connects to the
nearest AP. After lunch she walks up to the second floor of
the office building for a meeting, where her phone
connects automatically to a different AP.
While staff moves around their offices, monitoring users?
quality of experience and troubleshooting can be
challenging for IT, especially given the large number of
events generated by disparate systems. Extreme?s Wireless
Event Analyzer makes it efficient to track down issues
related to w ireless client roaming, AP RF load, or client
stickiness with an AP.
Rich Contextual Data
ExtremeAnalytics combines flow-based technology with a
rich set of application fingerprint techniques to detect and
measure on-prem applications (SAP, SOA traffic, Exchange,
SQL, etc.), public cloud applications (Salesforce, Google,
email, YouTube, P2P, file sharing, etc.), and social media
applications (Facebook, Twitter, etc.). This set of contextual
data provides a full understanding of the applications
running on the network, who?s using the application, the
devices being used, and where they are located within the
network. ExtremeAnalytics works closely with our
ExtremeControl that provides visibility and control of wired
and wireless devices, IoT devices and corporate/ guest users.
Information such as user, role, device type, and location are
integrated with the application flows. ExtremeAnalytics also
offers integration into select third party equipment, such as
Aruba Clearpass and Wireless IPFIX. Application telemetry
across a wide variety of Extreme infrastructure analytics
delivers insights without the need for standalone sensors or
collectors. his set of contextual data provides a full
understanding of the applications.
Application Fingerprinting
ExtremeAnalytics can identify more than 2,300
applications and includes more than 10,0 0 0 behavioral
detection-based fingerprints to ensure that even
applications that attempt to conceal themselves, such as
P2P, are detected appropriately. Through its robust
fingerprinting technology, our solution is able to identify
an application regardless of whether they run on
well-known ports or use non-standard ports. The
application fingerprints are regularly updated by us and
available to you w ithout code updates.
ExtremeAnalytics fingerprints and application groups are
open and customizable allowing our customers, partners,
and professional services teams to create new fingerprints
and application groups to handle custom applications,
specific reporting requirements and other needs. For
example, many government organizations run custom
applications that they do not wish to share fingerprint
information for. With the customization capabilities, they
are able to measure and control the quality of experience
for these applications.