Category Archives: 802.11ax

Oscium’s Wi-Fi 6E Spectrum Analyzer

With Wi-Fi 6E networks being implemented, 6E access points shipping, and new 6E client devices introduced to market, those of us in the WLAN support game need to make sure we have tools to function in the new and expansive 6 GHz spectrum. Fundamental to wireless support is the ability to display the RF environment through the use of a spectrum analyzer. Oscium has a fairly deep history in the Wi-Fi spectrum analysis realm, and has introduced their Clarity model for the 6 GHz part of the 802.11ax world- in addition to working in 2.4 and 5 as well with a band span of 2.2 GHz to 7.25 GHz.

Physically, Oscium’s Clarity is just gorgeous. It has a solid well-engineered feel to it and is very nice to look at (as silly as that might sound.)

Oscium’s Clarity

Unlike past Oscium spectrum analyzers, you’ll need either a Windows PC or a Mac for Clarity- no mobile devices are supported yet. Also unlike Oscium’s other spectrum analyzers, Clarity cannot natively show 802.11-related information on detected SSIDs in the environment as it does not have that capability under the hood from the chip perspective. It is strictly RF views, unless coupled with a tool like Intuitibits’ Wi-Fi Explorer Pro 3 when run on a 6E Macbook. At the time of this writing, no such Macbook exists so even Wi-Fi Explorer Pro 3 can only show 6E spectrum and not SSIDs when Clarity is used as an external adapter. Hats off to Intuitibits for building in support despite suitable hardware not yet being available.

Here’s Clarity looking at my Meraki 6E environment at Wirednot HQ:

And… what it looks like in the Wi-Fi Explorer environment, so far.

Read more about Oscium’s Clarity at the company’s product page.

Fortinet Leads With Security at Forti-Field Day

You are the reason
I’ve been FortiWaiting for so long
Some FortiThing holds the key
And I’m FortiWasted
And I can’t FortiFind my way home

(Apologies to Steve Winwood there.) Having watched Fortinet do their thing at Mobility Field Day 6 as a delegate at the event, I was struck by a handful of realizations:

  1. Fortinet faithfully gets their message of security-at-every-level out with each presentation. On this point they are remarkably consistent and articulate.
  2. They have a product line that is expansive beyond what I tend to think I know of the company- from hardware, software, monitoring, and performance measurement, they are generally on par with anyone else in the game.
  3. The company continues to buck the trend of licensing the living shit out of EVERYTHING, like their competitors tend to do. In this regard, Fortinet has not flushed their customer empathy chip down the toilet as others have, and their execs aren’t out writing BS-blogs explaining to customers how being gouged with endless micro-subscriptions is somehow innovative.
  4. They overplay the Forti-prefix to the point of FortiDistracting from the FortiMessage. I personally FortiStruggle to FortiFocus during the FortiPresentations. That may just be me, but I’m guessing it’s not, for whatever that is FortiWorth… (hmmm… reminds me of a George Straight song- Does FortiWorth Ever Cross Your Mind?)

Where Fortinet can be FortiFrigginExhausting in their FortiSpeak, I cannot say the same about their security messaging- the company does a solid job of weaving their security priorities through the product narrative without overplaying it. You’ll see the focus on security in all their MFD6 presentations. Given the daily spate of network breeches in the media these days, you’d be a FortiChump not to listen.

For their bits and pieces, I like this slide that summarizes their various network building FortiBlocks:

FortiStuff

Without even watching any of their presentations, this graphic gives the un-FortiFamiliar a sense of the robustness of their offerings. But there’s a heck of a lot more to the FortiStory, so I do recommend watching the presentations.

Having seen a couple of other vendors present before Fortinet, I realized when the FortiAiOps session unfolded that the notion of “AI Ops” is one of those “all the cool kids are doing it” things that every vendor has to have to compete. That’s not to throw dirt in any way, it’s more of a statement on where the industry is right now- AI has become a fact of life as an important underpinning of various solutions, but is still new enough to be held up to the light as if Zeus himself gave birth to it. I’m glad Fortinet has a hand in the AI card game, too.

We all have our own frames of reference, and to me Fortinet is still somewhat exotic in that I don’t see a lot of their wireless gear in my own corner of the world. I do know colleagues in other areas that use Fortinet, and also truly appreciate several Fortinet employees as just awesome people. With the likes of Wi-Fi 6/6E, AI in the house, and many customers considering how to evolve their WLANs (and frequently being tired of the incumbent vendor) all potentially catalyzing market shifts, perhaps we’ll see more Fortinet in more places in the days to come. They certainly are equipped to compete and do have interesting differentiators, from what I can see.

I Friggin LOVE You, NetAlly LANBERT

His name was LANBERT and he came from the west
To show which cables sucks and which are best
With a push of a button it’s doing it’s stuff
Hopefully for mGig the existing wire is enough…
Oh looky there, this one passes just fine
That LANBERT just saved us money and time

–Ode to LANBERT, by Wendall Pissmont Jr

There’s a new Bert in town… forget about Reynolds*, Bacharach*, and that whiny neurotic muppet from Sesame Street. Them cats is yesterday. NetAlly has recently introduced LANBERT (at Mobility Field Day 6), and if you are in the business of network wiring then you should pay attention.

This was easily one of the more thought provoking sessions of MFD6, says I. Let’s set the stage: you have an installed cable base, and are migrating access points to Wi-Fi 6 and 6E, and at long last we hopefully will see the massive throughputs that WLAN industry marketers have been telling us we should expect for years… like to the point where the old reliable 1 Gig uplink may not cut it. Do you need to replace that cable to get mGig performance?

LANBERT to the rescue! There should be no mystery when it comes to cabling performance capabilities. Many of us grew up knowing the value of cable certification testing, and now the free LANBERT app adds a much needed evolution to the notion.

Working with NetAlly’s Etherscope nXG and and LinkRunner 10G portable analyzers, LANBERT “generates and measures the transmission of line rate Ethernet frames over your network cabling infrastructure, qualifying its ability to support 1G/10G on fiber and 100M/1G/2.5G/5G/10G on copper links.” You are proving what an installed UTP or fiber run can really do despite what a certification report might say, without needing a standalone certification tester.

Test that existing cable for mGig before the new AP goes in, and don’t assume that “old” runs can’t support the new speeds.

I’ve long beaten the drum that the physical layer is critical to good networking. I’ve always viewed each part of a structured wiring system as it’s own component, worthy of note when it comes time for labeling, troubleshooting, and yes- performance testing. I’ve seen old cable work surprisingly well, and new cable disappoint for a number of reasons. There is simply no reason to guess how UTP and fiber will perform FOR REAL, with LANBERT. It’s the shizzle, baby!

View this fascinating Field Day presentation here.

*Yes, I know these dudes are actually named Burt and not Bert. Shut up.

Mist Systems Has an Advantage- but Also Gets a Yellow Card

Now the race is on
And here comes pride up the backstretch
Heartaches are goin’ to the inside
My tears are holdin’ back
They’re tryin’ not to fall
My heart’s out of the runnin’
True love’s scratched for another’s sake
The race is on and it looks like heartache
And the winner loses all

-Sang by George Jones

Though events like Mobility Field Day 6 may not be typically thought of as being contests, I can only imagine that those participating from the vendor side feel the competitive heat. The spotlight is on, the dollars to participate have been spent, the camera is rolling, and there is a tight window to differentiate your offerings and approach from the rest of the pack- all while a group of delegates interrupts your presentation and peppers you with questions. Success is measured by Twitter conversations, blog posts, and ultimately sales numbers. As a long-time Field Day participant from the delegate side of the paradigm, I can’t help but think that Mist still has an advantage of sorts when they present. I’ll explain that here, but will also point out that cockiness can sometimes cost you based on one comment made by Mist during MFD6.

The Mist Advantage

Mist was a late-comer to the mature WLAN industry, being founded in 2014. But those involved with starting the company are hardly newcomers to the game, and they have done a good job of making a start-up extremely relevant in a competitive market. I’d dare say they have been disruptive. And of course they were bought for a zillion dollars by Juniper. So what is The Mist Advantage when it comes to these presentation-oriented events?

Their short history.

Sure, they have decent technology, and even if you get tired of AI-everything in the company’s messaging, that is obviously working for them. But it’s what Mist DOESN’T have that’s just as significant to their appeal: they don’t have years and years of messaging fog and technical bloat to overcome. Their story is still fresh, and when you sit down to listen to them, your mind doesn’t involuntarily think about their long history of bugs, frequently changing “campaigns” and named networking frameworks, and all the ways customers have been frustrated with their licensing and support. Because… that history doesn’t exist yet.

The irony with Mist is that many of their key corporate players have come from companies that DO suffer from the effects of simply having a long history, and were likely personally responsible on some level for at least some of the baggage left behind at the companies they left. Such is life in Silly Valley, and I applaud anyone who recreates themselves and learns from the past.

How long will the Mist story remain untainted by it’s own longevity? This will be an interesting question to watch play out. But I have yet to hear of any customer switching FROM having a Mist WLAN to a legacy vendor, and the continual development of products and underlying magic is impressive on Mist’s part as evidenced by what you’ll see in the MFD videos.

Yellow Card Thrown

I recommend that anyone interested in Mist or wireless networking in general watch the Mobility Field Day videos from the company’s presentations. These folks know their stuff, and the enthusiasm is palpable. But I do have to call out one thing that didn’t set well, and sounded maybe a bit beneath the Mist Team.

The day before Mist presented, Aruba Networks showed their Wi-Fi 6E AP630, a fairly ground-breaking offering that brings real-world networking in new 6 GHz spectrum to the wireless space. For months now we’ve all been giddy about 6 GHz being made available for use by the FCC, so Aruba giving the world an early 6E AP and being able to show what it does in a controlled environment is a good thing.

I’ve heard every single vendor so far at Mobility Field Day 6, including Mist, say things like “you gotta start somewhere” or “this is just our first step towards blah blah blah”- reasonable utterances for companies who need to innovate or wither. So when the topic of 6E access points came up and Mist seemingly slighted Aruba for putting out a lowly 2×2 6E AP while Mist has nothing to show yet in 6E, it seemed a bit low-brow. The comment was noticed by a few other folks out there as well, and I’m curious your take on this if you happened to catch the dialogue.

Wyebot Brings Wi-Fi 6, More to Its WLAN Monitoring Platform

I’ve been using and evaluating Wyebot in different wireless environments for the last 18 months or so. One of the things that I most like about the company behind the sensor product and their Wireless Intelligence Platform (WIP) is their willingness to listen to what tech-savvy customers want, versus just adopting the mindset of “we’ll tell YOU what you need in a dashboard” that comes with competing products. My own requests have helped to shape the product, and I’ve listened in on calls where other wireless processionals have described what they feel is important. Wyebot listens, and iterates where it makes sense while not necessarily duplicating what everyone else is doing, or diluting their core strengths by trying to be all things to all people. This strikes me as a small, smart, agile company with a good product (and some good competition). My past coverage:

Now, we have a new 802.11ax sensor and version 3.1 code to improve Wyebot’s already impressive capabilities of WLAN/LAN characterization, troubleshooting, and alerting.

Continuous Improvement

Here’s the latest incarnation of the main page in the Wyebot dashboard, to get the juices flowing:


Whether you install Wyebot sensors for long-term monitoring, or use them more in a tactical role for point-in-time troubleshooting, there is a lot to appreciate. I love that with three radios, you get the flexibility of using wireless backhaul from the sensor when no network wiring is available. But what about the new magic in 3.1?


Unfortunately, you have to be logged in to see the details of each feature, but most of these are probably fairly intuitive to those in the business of Wi-Fi. Let’s talk about a couple.

Access Point Classification Feature

The Wyebot sensor does a fantastic job of characterizing a given WLAN environment. You may see a list of SSIDs on your phone or PC, but Wyebot will distill it all down to how many APs are in each SSID (within it’s receive range, of course) along with all of the 802.11-related particulars you’d ever need to know. From there, you can add your own classification- is it a friendly? A threat? an unknown? Sounds simple, perhaps, but this on-the-fly graphical note-taking with security overtones helps keep busy environments straight as you pick them apart.

Available Test Profiles

At the bottom of the list of test profiles, we see a new option- Link Doctor. With this, you exercise core network services and device-to-destination connectivity to get a sense of network health. Run it on demand, or at regular intervals for trending.

Hopefully you get a taste for Wyebot’s look, feel, and general aspirations as a test and monitoring platform. For a more analytical look at the entire platform, check out this presentation from Bryan Daugherty.

What Do I Like Best?

From the first time I experienced Wyebot, I fell in love with a few aspects of the sensor and it’s cloud framework, That affinity continues, and here’s what keeps me smitten:

  • As a permanently-mounted sensor, Wyebot would be welcome in any WLAN environment. But to me it has as much value as a pop-it-in short-term analysis tool, almost like a NetAlly hand-held product. Even if you don’t buy into sensor overlays, a Wyebot sensor two on hand could bring unique troubleshooting value.
  • You just don’t get as many false alarms with Wyebot as you do with certain competitors.
  • It’s awesome to take wireless packet captures gathered elsewhere and to load them into Wyebot, and have them displayed as if Wyebot did the capture. Pretty slick.

It’s Time for YOU to Get Wise About CBRS

CBRS search

It stands for Citizens Broadband Radio Service, and has nothing to do with CB radio despite the similarities in the acronym. It’s time for my fellow Wi-Fi types to start paying attention to CBRS for real, and I’ll explain why in a bit.

A Quick Look Back to 2105

The CBRS thing been simmering for at least a half-dozen years. Let me quickly take you back to 2015, where I sat in on a related session at Wireless Network Field Day 8, by Dave Wright. Back then, Dave worked for Ruckus Wireless, now he’s the Director of Regulatory Affairs & Network Standards at CommScope, and President of the CBRS Alliance. Dave’s a fantastic gent, if you ever get the chance to talk with him. But even though that 2015 presentation could not have been delivered by anyone better, it still felt kinda faraway and foreign to the ears of a room full of Wi-Fi folks.

Almost There- 2019

But 2015 gave way to the future, and Dave’s vision very much would come to fruition. Sticking with Field Day, I was fortunate enough to go to Mobility Field Day 4 in 2019. This time the presenting vendor on the topic was startup Celona (new company, but staffed with some deep wireless experience and familiar names to us in the WLAN industry). At the time Celona presented, CBRS had long since advanced from being a twinkle in the eye of folks like Dave Wright, but still wasn’t quite ready for market as a production option for Private LTE and other applications. (What other applications? There’s a good paragraph on that in this Network World article.)

Early 2020- The FCC Opens the Floodgates for CBRS

Just a few weeks ago (it’s mid-February as I write this), the FCC delivered the news that everyone with a stake in CBRS, Private LTE, and in-building cellular was waiting for: the 3.5 GHz spectrum was officially available for sharing for these applications. Here’s a good article on that, along with the FCC’s own reference pages on 3.5 GHz.

Now things are moving… and we get to why we as Wi-Fi folks need to start paying attention.

Our Turf is Soon to Be Trampled On

I find the marketing blather that has 5G making Wi-Fi extinct, or that has Wi-Fi 6 making cellular irrelevant, to be pretty asinine. But then again…marketers. Whatever. It’s pretty clear that several trains have left the station, and they all will impact our environments and possibly/hopefully our employment, skills, and project opportunities.

Wi-Fi 6 is a given- it’s what comes next for us WLAN doers. 5G has new relevance given that a small cell will need to bolted up to every street light, cactus, bus stop and homeless person to get the coverage and performance that the mobile industry is promising out of Millimeter-wave 5G systems. Bringing 5G (or even 4G) inside of modern RF-unfriendly buildings gets us back to discussions of CBRS and private LTE. And so does the notion of industrial settings where maybe LTE-style wireless makes more sense than Wi-Fi for wireless connectivity, for a number of reasons.

We need to not only understand the changing wireless landscape, but also to embrace it and try to stake our claims in it.

Get Educated

There are no shortage of general-information articles out there for CBRS, private-LTE, etc. here’s a great one from Corning (I just spoke with them on this topic, but that will be it’s own blog). And there is certainly a lot of marketing floofypoo to be stepped around.

But if you want more formalized learning, check out this offering from CommScope. I have not taken it yet, but have heard good things from esteemed colleagues who have. Coursera also has a CBRS offering, and I have every reason to believe that CBRS will eventually manifest itself through CWNP’s excellent training materials in some form or fashion.

So… why care about CBRS? It’s here, for real, for starters. It’s being deployed. Someone needs to design it’s coverage, and tools like iBwave are already being used by many of us to do Wi-Fi. Why not get a piece of the new pie? If we don’t, someone else will. People are gonna luuuuuuv their Wi-Fi 6, yet are still going to demand rock-sold in-building cellular after spending fat coin on those $1K+ mobile devices and as more devices become “wireless” in every possible definition of the word.

This is the new world, my friends. Digital transformation, blah blah blah. There’s no escaping it.

NetAlly Unleashes the Right Tester, at the Right Time: EtherScope nXG

 Change is both inevitible, and fickle. Vendors come, go, and buy each other. Some product lines that we love die on the vine, others thankfully go on to only get better with time. I sat in a room with the NetAlly folks at Mobility Field Day 4 and got an eyefull/earfull of teaser information on a slick new tester that would be released later in the year that would bear these notions out in spades.

I’m here to tell you- “later” is now, and the product line that we have grown to appreciate from its start at Fluke Networks, through it’s run as part of NETSCOUT, and now as the baby of spin-off NetAlly continues its tradition of excellence with the new Etherscope nXG.

Does this look vaguely familiar?
EtherScopenXG

If you own (or have Jonesed for) either the AirCheck G2 or the Link Runner G2, that color scheme will look familiar. But the EtherScope nXG’s overall feature set makes the very-capable G2 units suddenly feel a litlle less-than, despite each being a testing powerhouse in its own right. (And if you’ve been around a while, you might remember the old yellow EtherScope from the Fluke Networks

NetAlly brings the EtherScope to market right when it is needed. What do I mean by that?

  • With the 802.11ax tide starting to rise, troubleshooting tools need to keep up
  • On the wired side, NBASE-T and 10G are becoming facts of life
  • Bluetooth is penetrating the enterprise in interesting new ways
  • “Convergence” is one of those overplayed words in networking, but the reality is that both operations and support of those operations has very much seen a convergence and fewer of us do one or the other (not to mention work in data centers and server rooms)
  • Senior engineers can’t be everywhere, and it’s not uncommon to rely on others to gather data that we then analyze from some other location
  • Performance testing and detailed path analysis of different network segments can be daunting as topologies get more sophisticated.
  • Uploading of results to a cloud repository brings huge advantages in baselining, team-wide scrutiny, and reporting.

Networks are getting more complicated. Tolerance for time-to-problem-resolution is decreasing. The EtherScope nXG is marketed as a “Portable Network Expert”, and despite my frequent disdain for grandiose marketing plattitudes, I find this to be an apt description.

Rather than regurgitate the tester’s specs, let me point you to them here (scroll down).  The full data sheet from the product docs is here and shows the product’s impressive range nicely. And to get a feel for just what the EtherScope nXG can do, have a look at these videos that show several different testing scenarios.

I’m going to cap this one here. There is just sooooo much to talk about with this new tester. Yes, I know I sound borderline giddy and buzzed on the Kool-Aid- and I’m OK with that. I can tell you that the new tester feels good in the hand, and casual kicking of the tires is in itself impressive. I have an eval unit, and will be putting it through it’s paces for real in the near future. Watch for the next blog on the EtherScope nXG.

 

 

160 MHz Wide Channels: Just the Tip of an Iceberg of WLAN Industry Dysfunction

What lies ahead in this blog isn’t so much a rant, as it is an analysis. That sounds classier, and implies critical thought rather than just someone bitching about things. With that in mind, I give you the following image, stolen from Matthew Seymour (on Twitter at @realmattseymour) and sourced from this year’s Aruba Atmosphere conference in Europe:

The topic of the slide is 802.11ax, but that is tangential to the points I want to make here. Read that first caveat- this requires the use of 160MHz channels, which is generally not possible or just not a good idea wow.

I’m not sure who actually presented this session, but I’m assuming it is a trusted voice from a trusted company- Aruba folks generally know their stuff (as evidenced by their growing customer base and industry longevity). When I saw this come across Twitter, something in my mind clicked and this simple thought bubbled up:

Why does the WLAN industry do this idiotic shit to itself?

When I say the WLAN industry, I’m including the IEEE, the Wi-Fi Alliance, and the vendors that provide the hardware and the marketing of wireless networking products. Let me state the underlying problem as clearly as I can: the IEEE creates the 802.11 standards, and since 802.11n each standard has had a nonsensical top end- you simply cannot reach the high part of the spec. Evuh. The Wi-Fi Alliance does nothing to bring any sanity to the situation, and WLAN vendors build in configuration options with high-end settings that actually do WLAN operational damage and so let us create operational situations that are…

just not a good idea

Has anyone TOLD the IEEE that no one is really impressed with the promise of high end specs that can’t actually be leveraged? That it’s all a big stupid tease? Got some bait-and-switch going on here… The entire professional WLAN community knows that 160 MHz channels are…

just not a good idea

So why do WLAN vendors present 160 as an option in the UI? Why don’t the Wi-Fi Alliance and the vendor community repaint their messaging with reality-based promises of what each new WLAN technology can do? Wi-Fi 6 will STILL be impressive- but market it as if 160 MHz channels don’t exist- and watch the Sun of Truth rise over the wireless landscape (can I get a witness?).

I’m guessing some of you are thinking “you idiot, the FCC is going to give us more spectrum and then we’ll be rockin’ 160 for sure”. To that I say- pffft. I’ll believe it when I see it- and even then the ability to toggle 160- to even see it in configs- should not be a default.

The argument might also be made that “Maybe people AT HOME can use 160 MHz channels so you should shut up about it already”. Don’t go there, girlfriend. That only amplifies my beef with the Wi-Fi Alliance members who refuse to draw a clean line between Enterprise Grade gear and Wonky Shit That Plays Well at Home But Shouldn’t Be Dragged Into The Enterprise environment.

And that loops us back to the “tip of the iceberg” thing- and a couple more examples of general industry dysfunction. We have cheap printers that come up in default 40 MHz wide channels in 2.4 GHz, which also is…

just not a good idea

And an industry-wide trend where pretty much most 5 GHz gear comes up with 80 MHz channels enabled. Which also happens to be…

just not a good idea

We’re at an odd place where all the players involved are obviously aware of all the things that are

just not a good idea

yet they MARKET bad ideas and then we have to explain to those we support why we can’t really USE those bad ideas which have been marketed to us.

We kinda need our collective wireless head examined. Thus ends my analysis. 

Future-Proofing Networks with Fabric-Attached Wi-Fi: Q&A with Extreme Networks’ Director of Wireless Product Management & Strategy

It’s easy to become desensitized to the onslaught of marketing that surrounds networking concepts like “fabric” and “unified networks” when every vendor has their own version of them. Naturally, each marketing department promises that their solution is the best, but reality shines through when you start to look past the buzzwords for substance. I was recently  introduced to (and impressed by) Extreme Networks’ own fabric accomplishments, and wrote about my impressions here. Soon after, I had the chance to talk with Extreme’s director of wireless product management and strategy, Mike Leibovitz, about where WLAN specifically fits into the company’s fabric approach.

Leibovitz is one of those people that I’m always glad to catch up with. I’ve spent time with him at different Tech Field Day events and  IT conferences, and have had opportunities to socialize with him. Beyond just being an all-around nice guy, Leibovitz has a passion for his job and believes strongly in Extreme’s products, methods and his company’s future. Our most recent conversation evolved into an informal Q& A about the Extreme Automated Campus solution and Wi-Fi. Here are the highlights from that discussion (I’m in italics).

Mike, Extreme has been busy integrating the likes of ExtremeWireless WiNG from Zebra/Motorola and Avaya’s fabric portfolio (from recent acquisitions) with Extreme’s own wireless product lines. How’s all that going?

It’s been a great run, for us and our customers. We’re fully supporting all product lines, and it’s only getting better for the end users, regardless of which hardware they use. Looking forward, the best of all our product lines will be fused into new feature options that customers of either ExtremeWireless WiNG or ExtremeWireless can take advantage of without forklift upgrades.

We’ll get to fabric and Wi-Fi in a bit, but first- is there anything on the horizon that is particularly driving Extreme’s WLAN-specific evolution, and do you have any examples of where ExtremeWireless WiNG might bring something new to Extreme’s story that customers can appreciate?

Aside from our fabric architecture taking deeper root, we see the coming of 802.11ax as significant, and that does figure into our current product evolution. As the radio side of the equation gets higher in performance, we’ll continue to leverage things like Motorola’s unique excellence in access point design for challenging and high-ceiling environments, for instance. Also, we have the successful integration of the Azara Cloud into ExtremeCloud as an example of how we make what’s good even better.

It seems that Extreme goes to great lengths to make sure that new customers gained through acquisitions are treated just as well as long-time Extreme customers. Is that a fair characterization?

Absolutely, and that’s something we work hard at. You’ve experienced and written first-hand about being a customer on the losing end of an acquisition, when the purchasing company doesn’t get it right when it comes to integrating support for its new customers. Despite being well-established, Extreme has more of a start-up mentality in that all of our customers matter. We take none of them for granted. No one should have to guess at what’s going to happen when they need support just because their vendor was acquired.

Amen to that, Mike. Now onto fabric, Extreme Automated Campus, and wireless specifically. I know that you are pumped up about this area. What’s the first thing that potential customers should know about Extreme when it comes to fabric and WLAN?

I’d say first that people should realize that our fabric offering is mature, proven, and is shipping now. That includes how our Wireless solution connects to the fabric. Other market leaders have their fabric stories ahead of their deliverables to a certain degree, but Extreme doesn’t use customers as guinea pigs while we figure out how to keep promises.

Give me a sense of how that integration of Wi-Fi to the fabric works. Do you have any  examples?

Sure. Let’s start with ExtremeControl, which competes with ISE and Clearpass for functions like onboarding, authorization, and role-based policies. ExtremeControl has always excelled at extremely granular policy constructs used to program per-session behavior of the access point, the data plane, and the likes of QoS and analytics. That’s what we’ve been doing for years. Now add in the Avaya fabric contribution. Instead of just bridging traffic to a controller or to an AP you can now bridge wireless sessions to different fabric segments, uniquely for each connected device. That’s a new level of micro-segmentation that basically means you can traffic engineer wireless user traffic literally anywhere in the enterprise campus with the policies you set for RBAC, Layer7 control, QoS, and analytics carried all the way through.

So… we’re used to thinking of wireless access points or AP/controller pairings as bridges that have 802.11 on the radio side, and 802.3 Ethernet on the wired side. Am I reasonable in suggesting that now we can replace Ethernet with fabric on the wired side when we think about access at the WLAN edge?

That’s a good way of picturing it for functional discussion.

Can you give a specific scenario where fabric-attached Wi-Fi yields obvious, easy-to-highlight benefits that solve real-world problems?

We’re already leveraging fabric-connected WLAN in healthcare environments. As a wireless networker, you know the technical importance of reducing the number of SSIDs in a given wireless environment. Think about having one single SSID for everything, with a slew of different security and policy constructs going on behind it with no dependence on VLANs. From doctors’ unique security requirements to guest access to IoT devices and their various limitations – all are configured via ExtremeControl and micro-segmentation on the fabric. We can bridge traffic anywhere it needs to be for any user or use case. It’s really impressive, and no other vendor is even close to this level of functionality yet.

 Does the new magic come at the cost of CPU or memory utilization anywhere?

 That’s a great question, but actually the opposite is true. You can even add new policies on the fly, non-disruptively, directly on our access points. The flow technology that came way back from our Enterasys purchase works wonders in keeping resource utilization low.

This is great information, Mike. It’s awesome to learn of real-world, low-hype network fabric technology that is proven, shipping, and mature. What else do you want people to know as we close?

It sounds silly to say that “fabric is the future” because for Extreme Networks, fabric is now. At the same time, our fabric today does future-proof customer environments by providing unparalleled flexibility in security, segmentation, simplicity, control, and analytics that will only evolve for the better. Extreme will be ready to add 802.11ax into our fabric-connected Wi-Fi strategy when it comes, and we’re a natural fit for IoT in its many incarnations. Our roadmap is exciting, and I encourage our customers and analysts like you to watch us as we evolve.

FTC-required disclosure: I was compensated to comment on the Extreme Networks Automated Campus referenced in this blog, by PR company Racepoint Global. I have no direct business relationship with Extreme Networks, and in no way claim to be an Extreme Networks customer or representative of Extreme Networks. At the same time, I have known Mike Leibovitz for years.