Extreme Networks EPICenter Guide Manual page 265

Concepts and solutions guide
Hide thumbs Also See for EPICenter Guide:
Table of Contents

Advertisement

N
Navigation Toolbar, 42
Network Login report, 65
Network Summary Report, 64
Network Summary report, 64
P
policy
definition, 162
description, 162
name, 162
precedence, 175
scope, 162, 172
traffic, 167
type, 162
Policy Access Domain, 172
policy components, 162
applications, 171
device groups, 171
devices, 171
groups, 171
hosts, 171
IP address, 172
policy named components, 170
policy primitive components, 170
ports, 172
QoS profiles, 172
subnets, 172
users, 172
VLANs, 172
Policy Traffic, 162
policy types
access-based security (QoS), 163
description, 162
IP QoS (access lists), 165
Source Physical Port QoS, 168
VLAN, 169
Port Configuration utility, 236
ports
as policy components, 172
changing configuration, 236
correcting conflicts, 236
predefined alarms, 42
Q
QoS profile as policy components, 172
R
RADIUS, 19, 110
Real-Time Statistics, 17
related publications, About This Guide, 11
EPICenter Concepts and Solutions Guide
Release Notes, 9
Remote Authentication Dial In User Service. See
RADIUS
Reports
Network Summary Report, 64
reports, 18, 64
Alarm Log, 64
Client History, 65
Config Mgmt Log, 64
Current Clients, 65
Debug EPICenter, 66
Device Inventory report, 64
Device Status report, 64
eSupport Export, 64
Event Log, 64
MIB Poller Summary, 65
MIB Query, 65
Network Login, 65
Network Summary report, 64
Resource to Attribute, 66
Rogue AP Alarms, 65
Rogue AP Detail report, 65
Rogue APs, 65
Safe AP MAC List, 65
Server State Summary, 66
Slot Inventory report, 64
Spoofed Clients, 65
Syslog, 64
Unconnected Clients, 65
Unused Port, 64
User to Host, 66
VLAN Summary, 64
Voice VLAN Summary, 64
Wireless AP, 65
Wireless Interface report, 65
Wireless Port Detail, 65
Wireless Summary, 65
Resource to Attribute report, 66
rising threshold
CPU utilization, 57
RMON
alarm event generation, 56, 58
alarm examples, 51
event generation (figure), 56
predefined alarms, 42
Startup Alarm, 55
threshold definition, 54
traps, 22, 42, 43
Rogue AP Alarms report, 65
Rogue AP Detail report, 65
Rogue APs report, 65
Role-based macros, 83
rule
CPU utilization threshold configuration, 57
265

Advertisement

Table of Contents
loading

This manual is also suitable for:

Epicenter 6.0

Table of Contents