Extreme Defender for IoT

Extreme Defender Application provides security management plus traffic and application visibility of connected end devices. It also enables the centralized creation of policies that define network and security settings for groups of IoT devices. SA201 supports enforcement for up to eight end-systems, connected through the wired client port.

Extreme Defender Application is installed as a container application on ExtremeCloud IQ Controller. The application runs and is upgraded independently from the controller. Before accessing Extreme Defender Application, you must generate an API key on ExtremeCloud IQ Controller and upload it to the controller. Subsequent upgrades can use the previously installed API key file.

ExtremeCloud IQ Controller offers a default configuration template for the Extreme Defender Application. This template cannot be modified.
Note

Note

The Extreme Defender Application is available on the Extreme Networks support site.
To install Extreme Defender Application:
  1. Download and install the Docker application.
  2. Generate the API key.
  3. Associate the API key with the Docker application.
    Note

    Note

    When running more than one ExtremeCloud IQ Controller application that uses an API key file, you need only one generated API key.
  4. Start the application.

From the ExtremeCloud IQ Controller Applications list, select the Extreme Defender Application to display the Defender login screen. Your login credentials will match your ExtremeCloud IQ Controller credentials.

Additionally, the Extreme Defender Application user interface can be accessed using the HTTPS protocol on the TCP port 5825. For example, if your ExtremeCloud IQ Controller has the IP address 192.168.10.10, you can manage Extreme Defender Application in a browser by typing https://192.168.10.10:5825/apps/defender into the URL field.