12.07.2015 Views

Version 3.1 SP2 Reference Guide - Extreme Networks

Version 3.1 SP2 Reference Guide - Extreme Networks

Version 3.1 SP2 Reference Guide - Extreme Networks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Creating and Editing UPM Profiles.......................................................................................................................508Creating UPM Profiles...................................................................................................................................509Modifying or Editing Profiles..........................................................................................................................512Ridgeline UPM Metadata ..............................................................................................................................513Profile Templates ..........................................................................................................................................513Profile Testing Wizard ...................................................................................................................................514Using the Profile Deployment Wizard............................................................................................................514Profile Trigger Events...........................................................................................................................................522Universal Port Event Variables.............................................................................................................................522Common Variables........................................................................................................................................523User Profile Variables ...................................................................................................................................523Device Profile Variables ................................................................................................................................523Chapter 25: Using Identity Management ..............................................................................................525Identity Management Software License ...............................................................................................................526Overview ..............................................................................................................................................................526Role-Based Access Control..................................................................................................................................526Roles, Policies, and Rules ............................................................................................................................526Roles......................................................................................................................................................526Policies...................................................................................................................................................527Role Hierarchy ..............................................................................................................................................528Role Inheritance ............................................................................................................................................529LDAP Attributes and Server Selection ..........................................................................................................530Enabling Monitoring on Switches and Ports.........................................................................................................530Editing Monitored Device Ports ............................................................................................................................535Disabling Monitoring......................................................................................................................................537Enabling Role-based Access Control on New Devices........................................................................................538Disabling Role-based Access Control...........................................................................................................541Creating Roles......................................................................................................................................................541Creating a New Role .....................................................................................................................................542Creating a Child Role with Conditions Inherited from Its Parent............................................................545Creating a Child Role with Conditions Inherited from a Different Role ..................................................547Creating LLDP Roles .............................................................................................................................548Creating User-Defined Roles .................................................................................................................550Refreshing Users and Roles .........................................................................................................................551Configuring White List and Black List Entries................................................................................................555Viewing Roles ...............................................................................................................................................558Viewing Role Details ..............................................................................................................................559Editing Roles .................................................................................................................................................560Deleting Roles...............................................................................................................................................561Attaching Policies to Roles...................................................................................................................................562Detaching a Role from a Policy.....................................................................................................................564Deleting a Policy Attached to a Role.............................................................................................................564Error and Results Handling ..................................................................................................................................564Configuring Directory Servers .......................................................................................................................565Viewing the Server Directory.........................................................................................................................565Adding an Existing or Configuring a New Directory Server...........................................................................565Editing LDAP Client Properties .....................................................................................................................568Deleting a Directory Server ...........................................................................................................................570Managing Global Settings ....................................................................................................................................571Changing Directory Server Settings..............................................................................................................571Changing ACL-Source-Address Type...........................................................................................................573Changing Kerberos-Age-Out-Time Settings..................................................................................................57414Ridgeline <strong>Reference</strong> <strong>Guide</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!