12.07.2015 Views

Version 3.1 SP2 Reference Guide - Extreme Networks

Version 3.1 SP2 Reference Guide - Extreme Networks

Version 3.1 SP2 Reference Guide - Extreme Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 1Chapter 23, “Administering Ridgeline” describes how to change a user password for users with orwithout Administration access, add and delete users, set and modify user permissions, configure theRidgeline server as a RADIUS client for user authentication, enable or disable Syslog receiverfunctionality, modify server properties, and execute a distributed server configurationChapter 24, “Using the Universal Port Manager” explains the Universal Port Manager (UPM) tools tomanage and create <strong>Extreme</strong>XOS profiles, and deploy them on the network.Chapter 25, “Using Identity Management” explains how to set up the authentication system thatauthorizes network access to users for specific network services and information, monitor usersconnected to ports on a switch, and use tools that define users’ roles, policies, and rules.Chapter 26, “Managing Network Security” describes how use Ridgeline features to help you ensure thesecurity of your network.Chapter 27, “Ridgeline Reports” describes how to access reports, interpret the Network SummaryReport, export data to <strong>Extreme</strong> <strong>Networks</strong> Technical Assistance Center, view predefined status reportsfrom a browser.Chapter 28, “Enhancing Ridgeline Performance” describes how to tune performance and features tomore effectively manage a network, use advanced features available to a user with an Administratorrole to help analyze device operation.Chapter 29, “Managing Network Device Configurations and Updates” describes how to manage<strong>Extreme</strong> device configurations to archive device configuration files, create and use Baselineconfigurations, monitor configuration changes, manage firmware upgrades, perform per-device changelog audit of device configuration eventsAppendix A, “Configuring Devices for Use With Ridgeline” describes how to configure certain featureson <strong>Extreme</strong> and third-party devices, configure Ridgeline as a Syslog receiver, set a Trap Receiver. Itprovides information about configuring an external RADIUS server. the Ridgeline third-party DeviceIntegration Framework.Appendix B, “Using SSH for Secure Communication” explains how to set up secure tunneling betweenthe server and the client.Appendix C, “Event Types for Alarms” describes the events that can be detected through the AlarmSystem, SNMP Trap Events, how to configure SNMP trap events and RMON rising and falling trapevents.Appendix D, “Ridgeline Backup” describes the Alarm Log and Event Log backup files, the DBVALIDcommand-line database validation utility and the DBBACKUP command-line database backup utility.Appendix E, “Ridgeline Utilities” describes utilities and scripts, and software commands installed onthe server.Appendix F, “Configuring RADIUS for Ridgeline Authentication” describes how to set up an externalRADIUS server to provide authentication services to users, when Ridgeline is configured to act as aRADIUS client.Appendix G, “Troubleshooting” describes how to resolve problems you might encounter with Ridgeline.Ridgeline <strong>Reference</strong> <strong>Guide</strong>25

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!