Data Center Connect
Contact UsContact UsContact Us

The World’s Most Intelligent Data Center Network is Here

Extreme Networks brings simplicity, agility, and optimized performance to your most strategic business asset.

The data center is critically important to business operations in the enterprise, but often organizations have difficulty leveraging their data centers as a strategic business asset. At Extreme Networks, we focus on providing an Intelligent Enterprise Data Center Network that’s purpose-built for enterprise requirements. Our OneFabric Data Center Solution:

  • Simplifies complex data center processes
  • Makes them more agile with the SDN-based integration of intelligent services
  • Increases the utilization to make them more efficient
  • Allows IT to optimize their performance while providing visibility and control

The result is less time and money spent operating your data center and more time spent making your data center work for you.

From Our Blog

How Community College IT Thrives Despite Constrained Resources: Lessons from Alabama Southern and College of the Canyons

Adaptive, mobile classroom learning solutions are vital to the success of community colleges across the country. At Extreme Networks, we…

Read More

Did you know E-rate funding is still available for your school district? Here Are Tips from McMinn County School System

The US E-rate program provides up to 90% of the funding to help schools and libraries obtain affordable telecommunications and…

Read More

Unified Management

Coordinates the automated assignment of virtual machines (VMs) within both the virtual and physical network fabrics. The use of granular policies, combined with Extreme flow-based switching, helps users realize the goals of high availability and reliable delivery.

Automated Provisioning

Data Center Connect establishes network profiles for physical and virtual machines and distributes them within the network fabric, as well as coordinates the profile assignment of virtual machines to ensure consistent delivery of services regardless of the physical location of the VM. DCM also ensures that when network configurations are made, communication between the network and virtual switch (vSwitch) is greatly improved and configuration mismatches are eliminated.

Visibility, Tracking, and Monitoring

Data Center Connect provides real-time VM asset monitoring and historical location tracking within ExtremeManagement, our network management solution. ExtremeManagement delivers the centralized visibility, granular control, and automation required for the efficient management of this capability.

Integrated Workflow Process

Data Center Connect integrates with existing workflow and lifecycle tools to provide cradle-to-grave visibility into virtualized and physical assets, and to automate the physical and virtual network configurations for virtual machines. DCM requires no software installation on the hypervisors. Instead, it leverages each vendor’s APIs and Extreme Networks published APIs to provide automated inventory discovery and control of the hypervisor switch (VMware, Citrix XEN, Microsoft Hyper-V) configuration, as well as management of the physical network configuration.

Simplified Compliance

Data Center Connect allows administrators to determine who has access to network resources, which devices can access the network and when, as well as the compliance level of each end-system attempting to access the network.

Vendor Agnostic Technology

Extreme Networks Data Center Connect interfaces directly with the native operating system. DCM integrates with popular server virtualization products from Citrix, Microsoft, and VMware.

Automated unified provisioning improves efficiency in the virtualized data center.

Data Center Connect provides IT administrators a transparent, cross-functional service provisioning process that bridges the divide among the server, networking, and storage teams, ensuring each has an integrated view of virtual server and network environments. This enables the unification of the physical and virtual network, ensuring networks will have the high availability necessary for critical applications and business data.

DCM Benefits:
  • High degree of automation within physical and virtual environments to streamline data center network provisioning
  • Predictable behavior and simplified troubleshooting as a result of consistent configuration throughout the network fabric
  • Reduced workload and increased coordination of the network, server, and storage teams in an IT organization
  • More granular visibility over traffic and current/historical data makes it easier to incorporate VMs into the network
    • Better visibility and ability to audit the network via policy-based management
  • Extensible architecture supporting a variety of hypervisor technologies and vSwitches including those from VMware, Citrix, and Microsoft
  • VMware partner
  • Citrix ready

Extreme Networks Data Center Connect leverages a ExtremeManagement deployment with authentication via Extreme Access Control appliances in the data center and requires the following hardware and software elements to be implemented prior to the arrival of the Extreme Networks Professional Services Engineer:

  • Fully functional ExtremeManagement system and Extreme Access Control appliances as described before with access to the hypervisor management APIs. It is recommend to have dedicated physical Extreme Access Control appliances for this but not mandatory. Sharing Extreme Access Control appliances with the access network deployment or using VM-based Extreme Access Control appliances is possible.
  • VMware vSphere 4, Microsoft Windows Server 2008 R2 with Hyper-V or XenServer 5.5 is required in order to support the necessary APIs.
  • Hardware for the management components must be provided by the customer.
  • The recommended product is the S-Series with S150 or S155 class modules. Minimum requirement is either an S-Series with S130 class module and license upgrades for per port capacity or N-Series with similar license upgrades to accommodate the authentication of the number of end-systems (VM) per port and per chassis.
  • Remote VPN connection or collaboration session for the remote install modes.

Minimum requirements

  • ExtremeManagement version or higher, including Identity and Access Control Manager
  • Java 6 Update 18 or higher
  • Extreme Networks switches with appropriate scale (number of sessions) of the multi-user authentication and policy feature at connected server ports

Requirements for use with VMware

  • VMware ESX 4.0 or higher
  • Optional: VMware vCenter Server 4 Standard for vSphere with license “VMware vSphere 4 Enterprise Plus” for using distributed vswitches (if VM isolation is required) or higher

Requirements for use with Citrix XEN

  • XenServer 5.5 with XENCenter or higher

Requirements for use with VMware View
All of the VMware vCenter, ESX requirements apply. The integration of VMware View does not require any special tool or software to integrate beyond the DCM integration. The virtual desktops simply need to be configured to use 802.1x and users have to use the View Client to access those desktops via PCoIP in order to allow user-based authentication.

The S-Series with S150, S155 modules is suitable to authenticate each virtual desktop individually and apply a policy based on the username. In addition to that, standard DCM operation may be used to provision a rule for the connected port group of each VM, if user authentication via 802.1x is not available. Please see the VMware View VDI documentation for further information regarding the setup procedure.

XenDesktop Adapter – additional requirements

  • XenDesktop 5.1
  • Windows Powershell 2.0 and Microsoft .NET Framework 3.5 SP1 or later
  • Extreme Networks DCM XenDesktop Agent
  • ExtremeManagement 4.3.0 or above

Requirements for use with Microsoft Hyper-V

  • Windows Server 2008 R2 with Hyper-V support
  • A domain user account with Administrator rights on the server (to access the COM objects remotely) or in the Remote Users group
  • The following two services must be running on the server: Server Service and Remote Registry Service


The service to be delivered will be limited to the functions and scale as stated herein. The following activities are not part of the scope of work. If needed, these items can be ordered and purchased separately.

  • Extreme Access Control implementation – with Authentication, Authorization or/and with Assessment and Remediation
  • Integration of all network components into ExtremeManagement including topology and alarm/event configuration
  • Network Maintenance