EasyManuals Logo

Extreme Networks EPICenter Guide User Manual

Extreme Networks EPICenter Guide
268 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #265 background imageLoading...
Page #265 background image
EPICenter Concepts and Solutions Guide
265
N
Navigation Toolbar, 42
Network Login report, 65
Network Summary Report, 64
Network Summary report, 64
P
policy
definition, 162
description, 162
name, 162
precedence, 175
scope, 162, 172
traffic, 167
type, 162
Policy Access Domain, 172
policy components, 162
applications, 171
device groups, 171
devices, 171
groups, 171
hosts, 171
IP address, 172
policy named components, 170
policy primitive components, 170
ports, 172
QoS profiles, 172
subnets, 172
users, 172
VLANs, 172
Policy Traffic, 162
policy types
access-based security (QoS), 163
description, 162
IP QoS (access lists), 165
Source Physical Port QoS, 168
VLAN, 169
Port Configuration utility, 236
ports
as policy components, 172
changing configuration, 236
correcting conflicts, 236
predefined alarms, 42
Q
QoS profile as policy components, 172
R
RADIUS, 19, 110
Real-Time Statistics, 17
related publications, About This Guide, 11
Release Notes, 9
Remote Authentication Dial In User Service. See
RADIUS
Reports
Network Summary Report, 64
reports, 18, 64
Alarm Log, 64
Client History, 65
Config Mgmt Log, 64
Current Clients, 65
Debug EPICenter, 66
Device Inventory report, 64
Device Status report, 64
eSupport Export, 64
Event Log, 64
MIB Poller Summary, 65
MIB Query, 65
Network Login, 65
Network Summary report, 64
Resource to Attribute, 66
Rogue AP Alarms, 65
Rogue AP Detail report, 65
Rogue APs, 65
Safe AP MAC List, 65
Server State Summary, 66
Slot Inventory report, 64
Spoofed Clients, 65
Syslog, 64
Unconnected Clients, 65
Unused Port, 64
User to Host, 66
VLAN Summary, 64
Voice VLAN Summary, 64
Wireless AP, 65
Wireless Interface report, 65
Wireless Port Detail, 65
Wireless Summary, 65
Resource to Attribute report, 66
rising threshold
CPU utilization, 57
RMON
alarm event generation, 56, 58
alarm examples, 51
event generation (figure), 56
predefined alarms, 42
Startup Alarm, 55
threshold definition, 54
traps, 22, 42, 43
Rogue AP Alarms report, 65
Rogue AP Detail report, 65
Rogue APs report, 65
Role-based macros, 83
rule
CPU utilization threshold configuration, 57

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Extreme Networks EPICenter Guide and is the answer not in the manual?

Extreme Networks EPICenter Guide Specifications

General IconGeneral
BrandExtreme Networks
ModelEPICenter Guide
CategorySoftware
LanguageEnglish

Related product manuals