Home
Extreme Networks
Software
EPICenter Guide
Extreme Networks EPICenter Guide
268 pages
Manual
To Next Page
To Next Page
To Previous Page
To Previous Page
Loading...
Step 2: Configure t
he PuTTY Client
EPICenter Conce
pts and Solutions
Guide
207
Figure
80:
The basic SSH settings
3
Under SSH, click on
T
unnels
, as shown in
Figur
e
81
.
Figure
81:
SSH T
unneling settings
●
For
X display location
type
localhost:0
.
206
208
Table of Contents
Main Page
Default Chapter
3
Table of Contents
3
Preface
9
Introduction
9
Terminology
9
Conventions
10
Related Publications
11
Chapter 1: Epicenter Overview
13
Introduction
13
Epicenter Features
13
Inventory Management
15
The Alarm System
16
The Configuration Manager and the Firmware Manager
16
The Grouping Manager
16
The IP/MAC Address Finder
17
The Telnet Feature
17
Real-Time Statistics
17
Topology Views
17
Enterprise-Wide VLAN Management
18
The ESRP Manager
18
Epicenter Reports
18
Role-Based Access Management
19
Distributed Server Mode (Epicenter Gold Upgrade)
19
The Epicenter Advanced Upgrade
20
EAPS Monitoring and Configuration Verification
20
The Epicenter Policy Manager
20
Epicenter Software Architecture
20
Extreme Networks Switch Management
21
SNMP and Mibs
21
Traps and Smart Traps
22
Device Status Polling
22
Extreme Networks Device Support
23
Third-Party Device Support
23
Chapter 2: Getting Started with Epicenter
25
Starting Epicenter
25
Starting the Epicenter Server
25
Starting the Epicenter Client
26
The Epicenter Client Login Window
28
Getting Help
30
Working with the Epicenter Features
31
Device Selection Persistence
32
Running Features in Separate Windows
32
Epicenter User Roles
32
Creating the Device Inventory
33
Using Discovery
33
Adding Devices Individually
35
Setting up Default Device Contact Information
36
Creating and Using Device Groups
36
Managing Device Configurations and Firmware
38
Saving Baseline Configuration Files in the Configuration Manager
38
Scheduling Configuration File Archiving
40
Checking for Software Updates
41
Using the Epicenter Alarm System
42
Predefined Alarms
42
The Alarm Log Browser
43
Filtering the Alarm Log Display
44
Creating or Modifying an Alarm Definition
47
Threshold Configuration for RMON and CPU Utilization Alarms
54
Configuring a CPU Utilization Rule
57
Using Topology Views
59
Automated Map Creation Vs. Manual Map Creation
61
Customizing the Look of Your Maps
62
Using Basic Epicenter Reports
62
Chapter 3: Managing Your Network Assets
67
Creating a Network Component Inventory
67
Using Discovery to Find Network Devices
67
Adding Devices Individually
70
Importing Devices Using the Devcli Utility
71
Making Device Contact Information Changes
71
Organizing Your Inventory with Device Groups
73
Monitoring Critical Links with Port Groups
74
Inventory Reports
77
Uploading Inventory Information to Extreme
78
Chapter 4: Configuring and Monitoring Your Network
79
Scalable, Concurrent Multidevice Configuration
79
User-Defined Telnet Macros
79
Creating Telnet Macros for Re-Use
80
Creating Macros to be Run from a Menu
82
Role-Based Telnet Macro Execution
83
Network-Wide VLAN Configuration
84
Graphical and HTML-Based Configuration Monitoring
85
EAPS Protocol Monitoring and Verification
86
EAPS Domain and Device Status
87
Focus Mode
88
EAPS Detail Status Displays
89
Verifying the EAPS Configuration
90
The EAPS Log Report
92
Chapter 5: Managing Vlans
95
Graphical Configuration and Monitoring of Vlans
95
Network-Wide VLAN Membership Visibility
96
Network-Wide Multidevice VLAN Configuration
97
Modifying Vlans from a Topology Map
99
Displaying VLAN Misconfigurations with Topology Maps
100
Chapter 6: Managing Network Device Configurations and Updates
103
Archiving Component Configurations
103
Baseline Configurations
104
Identifying Changes in Configuration Files
105
Automatic Differences Detection
105
Device Configuration Management Log
106
Managing Firmware Upgrades
107
Automated Retrieval of Firmware Updates from Extreme
107
Detection of Firmware Obsolescence for Network Components
107
Multi-Step Upgrade Management
107
Chapter 7: Managing Network Security
109
Security Overview
109
Management Access Security
109
Using RADIUS for Epicenter User Authentication
110
Securing Management Traffic
112
Using Sshv2 to Access Network Devices
113
Securing Epicenter Client-Server Traffic
115
Monitoring Switch Configuration Changes
115
Using the MAC Address Finder
116
Using Alarms to Monitor Potential Security Issues
117
Device Syslog History
118
Network Access Security
118
Using Vlans
118
Using IP Access Lists
120
Chapter 8: Managing Wireless Networks
123
Wireless Networking Overview
123
Inventory Management Using Wireless Reports
123
Security Monitoring with Reports
124
Client MAC Spoofing Report
125
Monitoring Unauthenticated Clients
125
Detecting Rogue Access Points
126
Enabling Rogue Access Point Detection
126
Detecting Clients with Weak or no Encryption
127
Wireless Network Status with Reports
128
Performance Visibility with Reports
128
Debugging Access Issues with Syslog Reports
129
Fault Isolation with Reports
129
Chapter 9: Tuning and Debugging Epicenter
131
Monitoring and Tuning Epicenter Performance
131
Polling Types and Frequencies
132
Performance of the Epicenter Server
133
Tuning the Alarm System
133
Disabling Unnecessary Alarms
134
Limiting the Scope of Alarms
135
The Alarm and Event Log Archives
136
Using the MIB Poller Tools
137
Defining a MIB Collection
137
The MIB Poller Summary
139
The Mib Poller Detail Report
141
Viewing the Xml Collection Definition
142
The MIB Query Tool
143
Reconfiguring Epicenter Ports
145
Using the Epicenter Debugging Tools
146
Chapter 10: Voip and Epicenter-Avaya Integrated Management
147
Overview
147
Installation Considerations
148
TFTP Server Coordination
149
Discovering Avaya Devices
149
Avaya Devices in Epicenter
150
Launching the Avaya Device Manager from the Devices Sub-Menu
151
Tools Menu Commands
151
Launching the Avaya Integrated Management Console from Epicenter
153
Monitoring IP Phones on Extreme Devices
153
Importing IP Phones
153
Syncing IP Phones
154
The IP Phones Properties Display
155
IP Phones Reports
156
Epicenter System Properties for Avaya Integration
157
Launching Epicenter from the Avaya Integrated Management Console
159
Chapter 11: Policy Manager Overview
161
Overview of the Policy Manager
161
Basic Epicenter Policy Definition
162
Policy Types
162
Access-Based Security Policies
163
IP-Based Policies (Access List Policies)
165
Source Port Policies
168
VLAN Policies
169
Policy Named Components
170
Policy Access Domain and Scope
172
Using Groups in Policy Definitions
174
Precedence Relationships Within the Policy Manager
175
Policy Configuration
175
Epicenter Policy Limitations
176
Appendix A: Troubleshooting
179
Troubleshooting Aids
179
Using the Stand-Alone Client Application
179
Using the Browser-Based Client (Windows Only)
180
Epicenter Client Issues
181
Epicenter Database
182
Epicenter Server Issues
183
VLAN Manager
187
Alarm System
188
ESRP Monitor
190
Inventory Manager
190
Grouping Manager
191
Printing
191
Topology
192
STP Monitor
192
Reports
192
Appendix B: Configuring Devices for Use with Epicenter
195
Configuring Epicenter as a Syslog Receiver
195
Setting Epicenter as a Trap Receiver
196
The Epicenter Third-Party Device Integration Framework
196
Inventory Manager Integration
197
Telnet Integration
201
Alarm Integration
202
Launching Third Party Applications
204
Appendix C: Using SSH for Secure Communication
205
Overview of Tunneling Setup
205
Step 1: Install Putty on the Epicenter Client
205
Step 2: Configure the Putty Client
206
Step 3: Installing Openssh Server
209
Step 4: Configure Microsoft Firewall to Allow SSH Connects
214
Step 5: Initiate Epicenter Server/Client Communication
216
Appendix D: Configuring RADIUS for Epicenter Authentication
219
Step 1. Create an Active Directory User Group for Epicenter Users
219
Step 2. Associate Users with the Epicenter Group
220
Step 3. Enable Epicenter as a RADIUS Client
222
Step 4. Create a Remote Access Policy for Epicenter Users
223
Step 5. Edit the Remote Access Policy to Add a VSA
228
Step 6. Configure Epicenter as a RADIUS Client
234
Appendix E: Epicenter Utilities
235
Package Epicenter Info Utility
235
Port Configuration Utility
236
The Devcli Utility
237
Using the Devcli Commands
238
Devcli Examples
240
Inventory Export Scripts
241
Using the Inventory Export Scripts
241
Inventory Export Examples
243
The SNMPCLI Utility
244
Using the SNMPCLI Utility
244
SNMPCLI Examples
245
The Alarmmgr Utility
246
Using the Alarmmgr Command
246
Alarmmgr Output
248
Alarmmgr Examples
248
The Findaddr Utility
248
Using the Findaddr Command
249
Findaddr Output
251
Findaddr Examples
251
The Transfermgr Utility
252
Using the Transfermgr Command
252
Transfermgr Examples
254
The Vlanmgr Utility
255
Using the Vlanmgr Command
255
Vlanmgr Output
258
Vlanmgr Examples
258
The Importresources Utility
259
Using the Importresources Command
259
Importresources Examples
260
Index
263
Related product manuals
ExtremeWare XOS Guide
698 pages
Extreme Networks ExtremeWare
2254 pages
Extreme Networks ExtremeWare XOS
2024 pages
Extreme Networks Summit WM
380 pages