
Extreme Networks, Inc.
3585 Monroe Street
Santa Clara, California 95051
(888) 257-3000
(408) 579-2800
http://www.extremenetworks.com
Sentriant
®
AG Software Quick-Start Card, Version 5.4
Published: April 2010
Part Number: 120574-00 Rev 01
Central Management
Extreme Networks
®
Sentriant
®
AG software includes enforcement clusters (ECs) and enforcement
servers (ESs). An enforcement cluster is a logical grouping of one or more enforcement servers that are
managed by a single Management server (MS).
The quarantine method is defined per cluster; all of the Enforcement servers in a given cluster use the
same quarantine method (Inline, DHCP, or 802.1x). When using multiple clusters, each cluster can have
a different quarantine method. Clusters cooperate to test and control access to the network.
Physical Deployment
Sentriant AG installs in one of the following ways:
● Inline—When deploying Sentriant AG inline, Sentriant AG monitors and enforces all device traffic.
When Sentriant AG is deployed as a single-server installation, Sentriant AG becomes a Layer 2
bridge that requires no changes to the network configuration settings. When Sentriant AG is installed
in a multiple-server installation, you might have to configure the switch that connects the
Sentriant AG enforcement servers to use Spanning Tree Protocol (STP) if STP is not already
configured.
Sentriant AG allows devices to access the network or blocks devices from accessing the network
based on their Internet Protocol (IP) address with a built-in firewall (iptables).
● DHCP—When deploying Sentriant AG inline with a Dynamic Host Configuration Protocol (DHCP)
server, all DHCP requests pass through the Sentriant AG server(s) Layer 2 bridge. For a quarantined
device, Sentriant AG distributes the quarantined IP address for the device. If Sentriant AG allows the
device to have access, Sentriant AG allows your real DHCP server to distribute a non-quarantined IP
address. Sentriant AG assigns a DHCP IP address based on the quarantine area parameters you
define during configuration. You can place restrictions on network access either at the gateway for
the device using Access Control Lists (ACLs), or on the device by removing the devices gateway and
adding static routes for accessible networks.
Kommentare zu diesen Handbüchern