Education

Extreme Access Control

View Scheduled Classes

Building business-oriented granular visibility and control over individual users and applications

Duration:4.0 Days
Training Method:Instructor Led Classroom and Virtual Classroom
On-site Deliveries:Please contact your local Extreme Networks representative for special pricing
Course Overview:Students will learn methods to properly configure and manage their Extreme Network Access Control (EAC) solution using a combination of the network management software applications including: Extreme Management Center, Policy and Extreme Access Control. This knowledge will be reinforced through actual hands-on experience with networking equipment in a lab environment, where students will perform real world tasks configuring authentication mechanisms as well as creating different assessment methods and policies.
Who Should Attend:Network / Security Managers, and System Administrators / Operators
Course Prerequisite:Due to the nature of this course, Extreme Networks recommends that students should have previous hands-on experience with Extreme Networks wired and wireless as well as having attended Switching and Routing Boot Camp (EXOS & EOS), ExtremeWireless and Extreme Policy courses prior to enrolling.
Course Objectives:Upon completion of this course, students will have gained the working knowledge to successfully configure and manage their Access Control implementation as well as take the EAC Specialist certification exam.
Course Agenda:
  • Introduction and discussions regarding network access control technologies, their role in information security, as well as the capabilities of the ExtremeControl solution.
  • Overview of Extreme Control application including discussions and hands-on labs regarding creation of rules for different users and devices based on several components including authentication method, location, time of day, username, MAC-Address, operating system or security posture.
  • Overview and hands-on lab regarding multiple authentication and assessment configuration parameters including utilizing MAC and 802.1X authentication as well as positioning RFC3580 for 3rd party devices.
  • Discussions regarding the monitoring capabilities of the ExtremeControl Dashboard and including overview of the end system table and report review / exporting.
  • Configuration and implementation of MAC Registration process including change management to existing registrations and maintaining specific user registration accounts.
Recommended Next Course(s):Extreme Application Analytics
For Managers:EAC is targeted for those users that have an understanding of network access control and management fundamentals and now require a more detailed level of knowledge of operating (deploying, configuring and managing) their network environment. Ideal candidates for the course are Network Administrators or Systems Integration Specialists who are tasked with the responsibility of supporting your Extreme Networks domain.
Downloads:Download the Course Overview

View Scheduled Classes