Sign In
Upload
Manuals
Brands
Extreme Networks Manuals
Software
EPICenter 5.0
Extreme Networks EPICenter 5.0 Manuals
Manuals and User Guides for Extreme Networks EPICenter 5.0. We have
1
Extreme Networks EPICenter 5.0 manual available for free PDF download: Manual
Extreme Networks EPICenter 5.0 Manual (208 pages)
Concepts and Solutions Guide
Brand:
Extreme Networks
| Category:
Software
| Size: 4.22 MB
Table of Contents
Table of Contents
3
Preface
9
Introduction
9
Terminology
9
Conventions
10
Related Publications
11
Chapter 1 Epicenter Overview
13
Introduction
13
Epicenter Features
13
Inventory Management
15
The Alarm System
15
The Configuration Manager and the Firmware Manager
16
The Grouping Manager
16
The IP/MAC Address Finder
16
The Telnet Feature
16
Real-Time Statistics
17
Topology Views
17
Enterprise-Wide VLAN Management
18
The ESRP Manager
18
The STP Monitor
18
Epicenter Reports
18
Role-Based Access Management
19
Epicenter Stand-Alone Utilities
19
The Epicenter Policy Manager Upgrade
19
Distributed Server Mode (Epicenter Gold Upgrade)
20
Epicenter Software Architecture
20
Extreme Networks Switch Management
21
SNMP and Mibs
21
Traps and Smart Traps
22
Device Status Polling
22
Extreme Networks Device Support
23
Third-Party Device Support
23
Chapter 2 Getting Started with Epicenter
25
Starting Epicenter
25
Starting the Epicenter Server
25
Starting the Epicenter Client
26
The Epicenter Client Login Window
28
Getting Help
30
Working with the Epicenter Features
31
Device Selection Persistence
31
Running Features in Separate Windows
32
Epicenter User Roles
32
Creating the Device Inventory
33
Using Discovery
33
Adding Devices Individually
35
Setting up Default Device Contact Information
35
Creating and Using Device Groups
35
Managing Device Configurations and Firmware
37
Saving Baseline Configuration Files in the Configuration Manager
37
Scheduling Configuration File Archiving
39
Checking for Software Updates
40
Using the Epicenter Alarm System
41
Predefined Alarms
41
The Alarm Log Browser
42
Filtering the Alarm Log Display
43
Creating or Modifying an Alarm Definition
46
Threshold Configuration for RMON and CPU Utilization Alarms
53
Configuring a CPU Utilization Rule
56
Using Topology Views
58
Automated Map Creation Vs. Manual Map Creation
60
Customizing the Look of Your Maps
61
Using Basic Epicenter Reports
61
Chapter 3 Managing Your Network Assets
65
Creating a Network Component Inventory
65
Using Discovery to Find Network Devices
65
Adding Devices Individually
68
Importing Devices Using the Devcli Utility
69
Making Device Contact Information Changes
69
Organizing Your Inventory with Device Groups
71
Monitoring Critical Links with Port Groups
72
Inventory Reports
74
Uploading Inventory Information to Extreme Networks
75
Chapter 4 Configuring and Monitoring Your Network
77
Scalable, Concurrent Multidevice Configuration
77
User-Defined Telnet Macros
78
Creating Telnet Macros for Re-Use
79
Creating Macros to be Run from a Menu
80
Role-Based Telnet Macro Execution
81
Network-Wide VLAN Configuration
82
Graphical and HTML-Based Configuration Monitoring
83
Chapter 5 Managing Vlans
85
Graphical Configuration and Monitoring of Vlans
85
Network-Wide VLAN Membership Visibility
86
Network-Wide Multidevice VLAN Configuration
88
Modifying Vlans from a Topology Map
89
Displaying VLAN Misconfigurations with Topology Maps
90
Chapter 6 Managing Network Device Configurations and Updates
93
Archiving Component Configurations
93
Baseline Configurations
94
Identifying Changes in Configuration Files
95
Automatic Differences Detection
95
Device Configuration Management Log
96
Managing Firmware Upgrades
97
Automated Retrieval of Firmware Updates from Extreme Networks
97
Detection of Firmware Obsolescence for Network Components
97
Multi-Step Upgrade Management
97
Chapter 7 Managing Network Security
99
Security Overview
99
Management Access Security
99
Using RADIUS for User Authentication
100
Setting up Epicenter Roles Using RADIUS
100
Securing Management Traffic
100
Monitoring Configuration Changes
102
Using Alarms to Monitor Potential Security Issues
103
MAC Address Finder
103
Device Syslog History
104
Network Access Security
105
Using Vlans
105
Using IP Access Lists
107
Chapter 8 Managing Wireless Networks
109
Wireless Networking Overview
109
Inventory Management Using Wireless Reports
110
Security Monitoring with Reports
110
Client MAC Spoofing Report
111
Monitoring Unauthenticated Clients
111
Detecting Rogue Access Points
112
Enabling Rogue Access Point Detection
112
Detecting Clients with Weak or no Encryption
113
Wireless Network Status with Reports
114
Performance Visibility with Reports
114
Debugging Access Issues with Syslog Reports
115
Fault Isolation with Reports
115
Chapter 9 Tuning and Debugging Epicenter
117
Monitoring and Tuning Epicenter Performance
117
Polling Types and Frequencies
118
Performance of the Epicenter Server
119
Tuning the Alarm System
120
Disabling Unnecessary Alarms
120
Limiting the Scope of Alarms
121
The Alarm and Event Log Archives
123
Using the MIB Poller Tools
123
Defining a MIB Collection
124
The MIB Poller Summary
125
The MIB Query Tool
130
Reconfiguring Epicenter Ports
131
Using the Epicenter Debugging Tools
132
Chapter 10 Voip and Epicenter-Avaya Integrated Management
133
Overview
133
Installation Considerations
134
TFTP Server Coordination
135
Discovering Avaya Devices
135
Avaya Devices in Epicenter
136
Launching the Avaya Device Manager from the Devices Sub-Menu
137
Tools Menu Commands
138
Launching the Avaya Integrated Management Console from Epicenter
139
Monitoring IP Phones on Extreme Networks Devices
139
Importing IP Phones
139
Syncing IP Phones
141
The IP Phones Properties Display
141
IP Phones Reports
142
Epicenter System Properties for Avaya Integration
143
Launching Epicenter from the Avaya Integrated Management Console
145
Chapter 11 Policy Manager Overview
147
Overview of the Policy Manager
147
Basic Epicenter Policy Definition
148
Policy Types
149
Access-Based Security Policies
149
IP-Based Policies (Access List Policies)
151
Source Port Policies
154
VLAN Policies
155
Policy Named Components
156
Policy Access Domain and Scope
159
Using Groups in Policy Definitions
160
Precedence Relationships Within the Policy Manager
161
Policy Configuration
161
Epicenter Policy Limitations
162
Appendix A Troubleshooting
165
Troubleshooting
165
Troubleshooting Aids
165
Using the Stand-Alone Client Application
165
Using the Browser-Based Client (Windows Only)
166
Epicenter Client
167
Epicenter Database
168
Epicenter Server Issues
169
VLAN Manager
172
Alarm System
173
ESRP Monitor
174
Inventory Manager
175
Grouping Manager
176
Printing
176
Topology
176
STP Monitor
177
Reports
177
Appendix B Epicenter Utilities
179
The Devcli Utility
179
Using the Devcli Commands
180
Devcli Examples
182
Inventory Export Scripts
183
Using the Inventory Export Scripts
183
Inventory Export Examples
184
The SNMPCLI Utility
185
Using the SNMPCLI Utility
185
SNMPCLI Examples
186
Port Configuration Utility
187
The Alarmmgr Utility
188
Using the Alarmmgr Command
189
Alarmmgr Output
191
Alarmmgr Examples
191
The Findaddr Utility
191
Using the Findaddr Command
192
Findaddr Output
193
Findaddr Examples
194
The Transfermgr Utility
194
Using the Transfermgr Command
194
Transfermgr Examples
197
The Vlanmgr Utility
198
Using the Vlanmgr Command
198
Vlanmgr Output
201
Vlanmgr Examples
201
The Importresources Utility
202
Using the Importresources Command
202
Importresources Examples
203
Index
205
Advertisement
Advertisement
Related Products
Extreme Networks EPICenter Guide
Extreme Networks EPICenter 7.1 Job Scheduler
Extreme Networks EPICenter 6.0
Extreme Networks EPICenter 4.1
Extreme Networks ExtremeSwitching 5520 Series
Extreme Networks ExtremeSwitching 5520-24T
Extreme Networks ExtremeSwitching 5520-24X
Extreme Networks ExtremeSwitching 5520-12MW-36W
Extreme Networks ExtremeSwitching 5520-48W
Extreme Networks ExtremeSwitching 5520-48SE
Extreme Networks Categories
Switch
Wireless Access Point
Software
Network Hardware
Network Router
More Extreme Networks Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL