Specifications

WWW.EXTREMENETWORKS.COM
2
Key Features and Benefits
Supports All Devices and Users on the
Access Network
ExtremeCloud A secures standard wireless and wired
corporate clients, BYOD, IoT and guest devices alike. It
also supports the creation and administration of granular
network access policies (e.g., by access to applications,
time of day, location on the network) depending on the
user’s role.
Complete Onboarding for Guest and
Corporate Devices
ExtremeCloud A includes a highly customizable captive
web portal that supports self-service onboarding for visitor
devices, while a comprehensive management interface
and automated device provisioning of 802.1X certificates
enables onboarding of corporate devices.
Comprehensive Authentication Toolset
For authentication of corporate devices, ExtremeCloud A
supports 802.1X certificates with its built-in RADIUS server.
Where certificates are not practical, ExtremeCloud A
provides alternative authentication methods like Pre-Shared
Keys (PSK) or Social Login (e.g., for Guest authentication).
Compliance and Remediation
ExtremeCloud A provides complete functionality for
security posture enforcement that ensures authorized
devices stay secure over time. Features include device
scanning for security compliance, quarantining of non-
compliant devices to prevent network access, and guided
self-remediation to reduce IT helpdesk calls.
Security for the Internet of Things (IoT)
Connected user-less “things” like thermostats and lighting
systems present a unique set of challenges for IT security.
ExtremeCloud A is equipped to onboard, secure and
control “Things”, with the ability to automatically identify
IOT, and then onboard them with appropriately restricted
network access rights.
Seamless Integration With Existing IT
Security Infrastructure
ExtremeCloud A can directly integrate with the market
leading firewalls, MDM and endpoint security systems,
Intrusion Detection Systems (IDS) and Posture Assessment
solutions they already have installed. These integrations
boost overall network security and allows customers to
continue to leverage their existing security investments.
Cloud or On-premises Management
ExtremeCloud A's industry first cloud-management option
enables centralized deployment and ongoing management
of local A3 instances, which greatly streamlines setup and
maintenance of the solution and ensures consistent policy
application and enforcement. On-premises management of
ExtremeCloud A instances is also supported.
Device Fingerprinting and Profiling
ExtremeCloud A includes the world’s largest continuously
updated device fingerprint database. Device fingerprinting
is the most comprehensive method for identifying a
device type (e.g. laptop vs. smartphone vs. HVAC sensor)
automatically when a device requests network access.
ExtremeCloud A can then leverage this information to
grant appropriate network access rights to each device
based on its type.
Supports Access Networks From All
Leading Vendors
Access networks typically include wired and wireless
infrastructure components from multiple vendors.
ExtremeCloud A supports WLAN equipment and switches
from Extreme Networks and other leading vendors, which
provides customers added deployment flexibility.
Usability
One of the design tenets of ExtremeCloud A is
streamlining workflows to help simplify complex tasks.
For example, the setup of new Virtual Appliances and
clusters can be performed directly from the UI, and can be
completed in as little as 30 minutes. A comprehensive set of
troubleshooting tools is also available through the UI. These
powerful tools remove the need for tedious, error-prone CLI
configuration and allow administrators to be more ecient.