I've done a lab on the integration between the TMMC and the Extreme Networks solution using the Distributed IPS connect module present on the EMC server.
Lab environment
Extreme Management Center (EMC) version 8.0.4
ExtremeControl version 8.0.4
Trend Micro Control Manager version 6.0 Build 1327
Trend Micro Officescan version 12.1
Lab network: actors and data flows
![81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-89672-m7nq6m-Schema_inline.png 81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-89672-m7nq6m-Schema_inline.png](/t5/image/serverpage/image-id/5990iEBF00AF35816AE51/image-size/large?v=v2&px=999)
All conversations beetween different vendor are done using standard protocols: Trend Micro TMCM speaks with EMC using syslog and EMC speaks with switches using Radius or SNMP.
Lab configurations
First of all I have configured TMCM to export via syslog the relevant security events to EMC server:
![81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-78418-1f5zcf-TMCM_Syslog_inline.png 81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-78418-1f5zcf-TMCM_Syslog_inline.png](/t5/image/serverpage/image-id/5868i4AE62D6F16614284/image-size/large?v=v2&px=999)
This is a global configuration. After that I have configured TMCM to send only some kind of syslog messages to the EMC (for example C&C botnet callback):
![81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-70483-1t9vtu8-TMCM_Syslog_events_inline.png 81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-70483-1t9vtu8-TMCM_Syslog_events_inline.png](/t5/image/serverpage/image-id/1182i21F5E99D225928FD/image-size/large?v=v2&px=999)
In my lab I have configured TMCM in order to not send messages related to blocked malware.
This is all for TMCM.
After that I have configured EMC Distributed IPS Connect module. I have enabled the module:
![81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-125897-1qsrvjr-EMC_IPS_inline.png 81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-125897-1qsrvjr-EMC_IPS_inline.png](/t5/image/serverpage/image-id/5744iA95D067B155D67E4/image-size/large?v=v2&px=999)
and then I have configured the rules to add infected or hacked host to the Quarantine_MAC group:
![81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-54337-1o7xcf-EMC_IPS_rules_inline.png 81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-54337-1o7xcf-EMC_IPS_rules_inline.png](/t5/image/serverpage/image-id/4271i1199D9037AB45AE6/image-size/large?v=v2&px=999)
And finally, I have created a NAC rule to move the hosts in Quarantine_MAC Group in a quarantine VLAN. This rule should be placed before other client rules:
![81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-28316-16u8tol-NAC_Rule_inline.png 81abea7522d14c7cb9b0e97d148d30e6_RackMultipart20171207-28316-16u8tol-NAC_Rule_inline.png](/t5/image/serverpage/image-id/373iF2147DF9AC418F23/image-size/large?v=v2&px=999)