Extreme Networks Ridgeline Guide Manual page 8

Concepts and solutions guide
Hide thumbs Also See for Ridgeline Guide:
Table of Contents

Advertisement

Exporting the Collected Data .................................................................................................................226
The MIB Query Tool ......................................................................................................................................226
Reconfiguring Ridgeline Ports ..............................................................................................................................227
Using the Ridgeline Debugging Tools ..................................................................................................................228
Reconfiguring the FreeRadius Server ..................................................................................................................228
Chapter 16: Creating and Running Ridgeline Scripts.........................................................................229
About Ridgeline Scripts ........................................................................................................................................229
Bundled Ridgeline Scripts .............................................................................................................................230
The Ridgeline Script Interface ..............................................................................................................................230
Managing Ridgeline Scripts..................................................................................................................................232
Creating a New Ridgeline Script ...................................................................................................................233
Specifying Run-Time Settings for a Script.....................................................................................................236
Specifying Permissions and Launch Points for a Script ................................................................................237
Running a Script............................................................................................................................................238
Importing Scripts into Ridgeline ....................................................................................................................242
Categorizing Scripts ......................................................................................................................................243
Specifying an Ridgeline Script as an Alarm Action .......................................................................................244
Configuring Script Tasks ...............................................................................................................................244
Using the Audit Log to Troubleshoot Ridgeline Scripts ........................................................................................246
Audit Log View ..............................................................................................................................................246
Filtering the Audit Log View ...................................................................................................................247
Displaying Audit Log Details for a Script .......................................................................................................247
Rerunning a Script ........................................................................................................................................248
About ExtremeXOS Scripts ..................................................................................................................................248
Chapter 17: Using Identity Management ..............................................................................................249
Identity Management Software License ...............................................................................................................249
Overview ..............................................................................................................................................................249
Role-Based Access Control..................................................................................................................................250
Roles, Policies, and Rules ............................................................................................................................250
Roles ......................................................................................................................................................250
Policies...................................................................................................................................................251
Role Hierarchy ..............................................................................................................................................251
Role Inheritance ............................................................................................................................................253
LDAP Attributes and Server Selection ..........................................................................................................254
Enabling Monitoring on Switches and Ports .........................................................................................................254
Editing Monitored Device Ports ............................................................................................................................259
Disabling Monitoring......................................................................................................................................260
Enabling Role-based Access Control on New Devices ........................................................................................261
Disabling Role-based Access Control ...........................................................................................................265
Creating Roles......................................................................................................................................................265
Defining a New Role .....................................................................................................................................266
Creating a Child Role with Conditions Inherited from Its Parent ............................................................268
Creating a Child Role with Conditions Inherited from a Different Role ..................................................271
Viewing Roles ...............................................................................................................................................272
Viewing Role Details ..............................................................................................................................273
Editing Roles .................................................................................................................................................274
Deleting Roles ...............................................................................................................................................275
Policy Match Condition Combinations ..................................................................................................................276
Attaching Policies to Roles............................................................................................................................276
Deleting a Policy Attached to a Role .............................................................................................................278
Error and Results Handling ...........................................................................................................................279
Configuring Directory Servers ..............................................................................................................................279
Viewing the Server Directory.........................................................................................................................280
Managing Global Directory Servers ..............................................................................................................280
6
Ridgeline Concepts and Solutions Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ridgeline 3.0

Table of Contents