Verifying EAPS Information ..................................................................................................................................185
Running EAPS Reports ........................................................................................................................................186
EAPS Summary Report ................................................................................................................................186
EAPS Log Reports ........................................................................................................................................187
Security Overview ................................................................................................................................................189
Management Access Security ..............................................................................................................................189
Securing Management Traffic .......................................................................................................................192
Using the MAC Address Finder ............................................................................................................................196
Device Syslog History...........................................................................................................................................197
Chapter 14: Policies ...............................................................................................................................201
Overview ..............................................................................................................................................................201
Viewing Policies for Devices .........................................................................................................................202
Creating a New Policy ..........................................................................................................................................203
Editing a Policy..............................................................................................................................................210
Deleting a Policy ...........................................................................................................................................211
Detaching a Policy ........................................................................................................................................212
Attaching a Policy..........................................................................................................................................212
Categorizing Policies ............................................................................................................................................213
Categorizing Policy Rules .............................................................................................................................214
Creating and Managing Roles ..............................................................................................................................214
Polling Types and Frequencies .....................................................................................................................216
SNMP Polling .........................................................................................................................................216
MAC Address Polling .............................................................................................................................216
Telnet Polling .........................................................................................................................................217
Tuning the Alarm System .....................................................................................................................................217
Disabling Unnecessary Alarms .....................................................................................................................218
Limiting the Scope of Alarms ........................................................................................................................219
Using the MIB Poller Tools ...................................................................................................................................221
Defining a MIB Collection ..............................................................................................................................222
The MIB Poller Summary ..............................................................................................................................223
The MIB Poller Detail Report .................................................................................................................225
Ridgeline Concepts and Solutions Guide
5