Win every interaction at the edge by delighting customers, empowering staff, and deflecting threats.
Create custom connections for every user and device with greater security and reduced complexity and cost.
Transform your data center with multivendor automation and management to accelerate innovation.
Benefit from flexible network fabrics that provide the automation and visibility to adapt to any application workload on any domain.
Extreme Networks enables Cloud Service Providers to fulfill the promise of digital transformation with flexible and adaptive infrastructure solutions for true business agility.
Get insights, visibility and control with advanced security and superior quality of user experience
Network switching products from Edge to Core—the foundation of a next-gen network
Lightning speed and scalable routers ideal for enterprise, data center, and service providers
Introducing the industry’s first flow-based 802.11ac Wave 2 wireless products
Network solutions consultation and implementation
Dedicated customer advocacy team to ensure that all your services needs are met
Superior, around-the-clock support for your network configuration
Fully managed, ITIL-based network services, defense & infrastructure
A wide selection of instructor-led and self-paced technical courses
A simple way for institutions to obtain Extreme software license access
Hi Ilya,the FortiGate solutions are actually 2 integrations. The first integration is the single sign-on which uses RADIUS accounting. The integration uses the ExtremeControl notification engine and listens for end system updates. When an end system that has a username and IP address transitions to an accept state, we send a RADIUS accounting start message to the FortiGate to start the session. When the end system transitions to the disconnected state, we send a RADIUS accounting stop message to end the session. We have the option to send the RADIUS accounting interim message to keep the session alive. The Fortinet filtering rules are accomplished by adding a RADIUS attribute called profile. The value of profile is the ExtremeControl profile name. This creates a mapping in the FortiGate where the ExtremeControl profile name is associated to a user group. Filtering rules can now be created where rules are applied to specific user groups. The 2nd integration is the distributed IPS. This solution is generic and works with multiple firewalls. It’s an event driven solution that relies on matching a regular expression with the event message. When a regular expression match is found, we parse out the threat IP, threat MAC, or threat name and take action. Currently the action is adding the threat to an end system group and applying different network access for the device. Hope that helps and makes sense.
Already have an account? Login
No account yet? Create an account
Enter your username or e-mail address to receive an e-mail with instructions to reset your password.
Sorry, we're still checking this file's contents to make sure it's safe to download. Please try again in a few minutes.
Sorry, our virus scanner detected that this file isn't safe to download.
We use 3 different kinds of cookies. You can choose which cookies you want to accept. We need basic cookies to make this site work, therefore these are the minimum you can select. Learn more about our cookies.