EasyManuals Logo

Extreme Networks EPICenter Guide User Manual

Extreme Networks EPICenter Guide
268 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #5 background imageLoading...
Page #5 background image
EPICenter Concepts and Solutions Guide
5
Chapter 5: Managing VLANs........................................................................................................... 95
Graphical Configuration and Monitoring of VLANs ........................................................................95
Network-wide VLAN Membership Visibility...................................................................................96
Network-wide Multidevice VLAN Configuration .............................................................................97
Modifying VLANs from a Topology Map..................................................................................99
Displaying VLAN Misconfigurations with Topology Maps..............................................................100
Chapter 6: Managing Network Device Configurations and Updates ................................................. 103
Archiving Component Configurations.........................................................................................103
Baseline Configurations ...........................................................................................................104
Identifying Changes in Configuration Files ...........................................................................105
Automatic Differences Detection.........................................................................................105
Device Configuration Management Log......................................................................................106
Managing Firmware Upgrades...................................................................................................107
Automated Retrieval of Firmware Updates from Extreme .......................................................107
Detection of Firmware Obsolescence for Network Components ...............................................107
Multi-Step Upgrade Management........................................................................................107
Chapter 7: Managing Network Security......................................................................................... 109
Security Overview....................................................................................................................109
Management Access Security ...................................................................................................109
Using RADIUS for EPICenter User Authentication ................................................................110
Securing Management Traffic.............................................................................................112
Securing EPICenter Client-Server Traffic .............................................................................115
Monitoring Switch Configuration Changes..................................................................................115
Using the MAC Address Finder .................................................................................................116
Using Alarms to Monitor Potential Security Issues ......................................................................117
Device Syslog History ..............................................................................................................118
Network Access Security..........................................................................................................118
Using VLANs ....................................................................................................................118
Using IP Access Lists ........................................................................................................120
Chapter 8: Managing Wireless Networks ...................................................................................... 123
Wireless Networking Overview...................................................................................................123
Inventory Management Using Wireless Reports...........................................................................123
Security Monitoring with Reports ..............................................................................................124
Client MAC spoofing report.................................................................................................125
Monitoring Unauthenticated Clients ....................................................................................125
Detecting Rogue Access Points.................................................................................................126
Enabling Rogue Access Point Detection...............................................................................126
Detecting Clients with Weak or No Encryption............................................................................127
Wireless Network Status with Reports .......................................................................................128
Performance Visibility with Reports...........................................................................................128
Debugging Access Issues with Syslog Reports ............................................................................129
Fault Isolation with Reports......................................................................................................129

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Extreme Networks EPICenter Guide and is the answer not in the manual?

Extreme Networks EPICenter Guide Specifications

General IconGeneral
BrandExtreme Networks
ModelEPICenter Guide
CategorySoftware
LanguageEnglish

Related product manuals