Specifications
W W W.EXTREMENETW ORKS.COM 1
Defender Adapter
In-line Security for Vulnerable Wired Devices
Product Overview
The Defender for IoT Adapter delivers enterprise-grade performance and
personalized protection for vulnerable wired devices. Placed between the
network and the device, the Defender Adapter works in conjunction with
the Defender Application (a value add application on the ExtremeCloud
Appliance) to secure, isolate, track and monitor IoT devices.
Secures
The primary function of the Defender Adapter is to enforce policies that
are centrally created by the Defender Application, ensuring that the IoT
device connected to it operates according to its expected behavior.
The profile provides a list of authorized devices and traffic flows to limit
what the IoT device receives and transmits, as well as who or what the
device can communicate with. The Defender Adapter will then monitor all
traffic to and from the device w ith full L2-7 visibility and block any traffic
that is out of profile.
Isolates
A unique attribute of the Defender for IoT solution is that it can isolate
groups of IoT devices into their own secure zone / network segment. The
role of the Defender Adapter is to ensure the secure attachment of IoT
devices into the specified secure zone. These secure zones can be IPSec
tunnels overlaid onto 3rd party networks, Fabric Connect virtualized
hyper-segments, or just VLAN-based.
Highlights
- Critical component of the Defender
for IoT solution which consists of
the Defender Application (a
value-added Application available
on the ExtremeCloud
TM
Appliance),
the Defender Adapter (SA201) and/ or
the ExtremeWireless 3912i Indoor
Access Point
- Provides in-line protection of
critical and potentially vulnerable
wired IoT devices.
- Enforces policies that are centrally
created by the Defender Application,
ensuring that the IoT device it is
connected to operates according to its
expected behavior.
- Monitors and filters traffic w ith full
L2-7 visibility.
- Provides network attachment of IoT
devices to IPSec Tunnels, Fabric
Connect Hyper-segments or VLANs.
- Offers an integrated IoT Radio for
BLE/ 802.15.4 (iBeacon, Eddystone,
Thread) to support extended
connectivity of IoT sensors and devices
as well as to help locate critical assets.
- Support for PoE pass-through, enabling
efficient powering of attached devices
such as IP cameras and IP phones.
Data Sheet