Extreme Networks EPICenter Guide Manual page 5

Concepts and solutions guide
Hide thumbs Also See for EPICenter Guide:
Table of Contents

Advertisement

Chapter 5: Managing VLANs........................................................................................................... 95
Graphical Configuration and Monitoring of VLANs ........................................................................95
Network-wide VLAN Membership Visibility...................................................................................96
Network-wide Multidevice VLAN Configuration .............................................................................97
Modifying VLANs from a Topology Map..................................................................................99
Displaying VLAN Misconfigurations with Topology Maps..............................................................100
Chapter 6: Managing Network Device Configurations and Updates ................................................. 103
Archiving Component Configurations .........................................................................................103
Baseline Configurations ...........................................................................................................104
Identifying Changes in Configuration Files ...........................................................................105
Automatic Differences Detection.........................................................................................105
Device Configuration Management Log ......................................................................................106
Managing Firmware Upgrades...................................................................................................107
Automated Retrieval of Firmware Updates from Extreme .......................................................107
Detection of Firmware Obsolescence for Network Components ...............................................107
Multi-Step Upgrade Management........................................................................................107
Chapter 7: Managing Network Security......................................................................................... 109
Security Overview....................................................................................................................109
Management Access Security ...................................................................................................109
Using RADIUS for EPICenter User Authentication ................................................................110
Securing Management Traffic .............................................................................................112
Securing EPICenter Client-Server Traffic .............................................................................115
Monitoring Switch Configuration Changes ..................................................................................115
Using the MAC Address Finder .................................................................................................116
Using Alarms to Monitor Potential Security Issues ......................................................................117
Device Syslog History ..............................................................................................................118
Network Access Security ..........................................................................................................118
Using VLANs ....................................................................................................................118
Using IP Access Lists ........................................................................................................120
Chapter 8: Managing Wireless Networks ...................................................................................... 123
Wireless Networking Overview...................................................................................................123
Inventory Management Using Wireless Reports...........................................................................123
Security Monitoring with Reports ..............................................................................................124
Client MAC spoofing report.................................................................................................125
Monitoring Unauthenticated Clients ....................................................................................125
Detecting Rogue Access Points.................................................................................................126
Enabling Rogue Access Point Detection...............................................................................126
Detecting Clients with Weak or No Encryption............................................................................127
Wireless Network Status with Reports .......................................................................................128
Performance Visibility with Reports...........................................................................................128
Debugging Access Issues with Syslog Reports ............................................................................129
Fault Isolation with Reports......................................................................................................129
EPICenter Concepts and Solutions Guide
5

Advertisement

Table of Contents
loading

This manual is also suitable for:

Epicenter 6.0

Table of Contents