EasyManua.ls Logo

Extreme Networks EPICenter Guide User Manual

Extreme Networks EPICenter Guide
268 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #120 background imageLoading...
Page #120 background image
Managing Network Security
EPICenter Concepts and Solutions Guide
120
Figure 53: Creating NetBIOS VLAN
See Chapter 5 “Managing VLANs” for more information about how EPICenter can help you manage
the VLANs on your network.
Using IP Access Lists
IP access lists (ACLs) determine what traffic is allowed on your network. ACLs use a set of access rules
you create to determine if each packet received on a switch port is allowed to pass through the switch,
and if so, at what priority and with how much bandwidth, or is denied (dropped) at the ingress port.
ACLs can be use to regulate both the type of traffic, the priority and minimum and maximum
bandwidth (via a QoS profile), and the source or destination of the traffic allowed on your network.
This is done by setting up access lists for the traffic, and determining if the traffic is allowed or denied
on the network, and if allowed, what QoS Profile applies. The access list controls can be set based on
the source or destination addresses. Refer to the ExtremeWare Software User Guide for complete
description and syntax for ACLs.
You should use access lists to provide basic controls on what kind of traffic you will allow on your
network. Without access lists, any traffic from anywhere can traverse your entire network. For example,
you use access lists to allow HTTP traffic across your network, but deny online gaming traffic.
Designing IP Access Lists Through Policies
Access lists are configured based on policies created through EPICenter. Before creating these policies,
you need to translate your security requirements into appropriate IP or security policies. To design your
access list requirements, follow these steps:
1 Determine what traffic types you want to allow and deny on your network. Be sure to include both
protocol types and source or destination addresses you need to allow or block. This should be based
on your corporate security guidelines and the acceptable use guidelines for the hosts on your
network.
2 Set your access control requirements in order of precedence. Traffic will be checked against access
lists in order, using the first matching access list as the control for that traffic pattern.

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Extreme Networks EPICenter Guide and is the answer not in the manual?

Extreme Networks EPICenter Guide Specifications

General IconGeneral
BrandExtreme Networks
ModelEPICenter Guide
CategorySoftware
LanguageEnglish

Summary

EPICenter Overview

EPICenter Features

Comprehensive overview of the EPICenter software's capabilities and advantages for network management.

Inventory Management

Manages a database of all devices, enabling discovery and status tracking of network components.

The Alarm System

Provides fault detection and alarm handling for network devices, allowing custom alarm definitions.

Getting Started with EPICenter

Starting EPICenter

Details on launching the EPICenter server and client components for initial use.

Creating the Device Inventory

First step in using EPICenter to populate the inventory database through discovery or manual addition.

Managing your Network Assets

Using Discovery to Find Network Devices

Utilizes the Inventory Manager's discovery feature to automatically find network devices running SNMP agents.

Organizing Your Inventory with Device Groups

Groups devices with common characteristics for unit management, simplifying tasks like alarm scoping.

Configuring and Monitoring Your Network

User-Defined Telnet Macros

Enables creation and execution of Telnet macros for automating configuration tasks on multiple devices.

Network-wide VLAN Configuration

Manages VLANs across multiple devices, providing network-wide visibility and configuration capabilities.

Managing Network Security

Management Access Security

Secures switch configuration and traffic monitoring, controlling user access and ensuring confidentiality.

Using RADIUS for EPICenter User Authentication

Configures EPICenter to use an external RADIUS server for robust user authentication and authorization.

Tuning and Debugging EPICenter

Monitoring and Tuning EPICenter Performance

Addresses factors affecting EPICenter performance and provides tuning strategies for optimal operation.

Tuning the Alarm System

Optimizes alarm system performance by disabling unnecessary alarms and scoping them to relevant devices.

EPICenter Utilities

The DevCLI Utility

Command-line utility for managing devices and device groups, useful for bulk operations and automation.

Inventory Export Scripts

Scripts to export device or slot information from EPICenter inventory into CSV format for analysis.

Related product manuals