Deploying an Identity Aware Network
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Extreme Networks Application Note
Table of Contents
1. Introduction
2. References
3. Identity Aware Network
4. Identity-Management Case Study
4.1. Prime Corporation Enterprise Network
4.2. Identity Monitoring
4.2.1. Configurations for Backend Servers
4.2.2. Edge Switch Configuration
4.2.2.1. VLAN Configuration
4.2.2.2. AAA Module Configuration
4.2.2.3. LLDP Configuration
4.2.2.4. NetLogin Configuration
4.2.2.5. NetTools Configuration
4.2.2.6. Web/thttpd Configuration
4.2.2.7. Identity-Management (idMgr) Configuration
4.2.2.8. XML Client (xmlc) Configuration
4.2.3. EPICenter Configuration
4.2.4. Client Configurations
4.2.5. Tracking Identities of Desktop/Workstation Users
4.2.5.1. Information Available at the Edge Switch
4.2.5.1.1. show identity-management entries
4.2.5.1.2. show identity-management entries detail
4.2.5.1.3. show identity-management entries ipaddress
4.2.5.1.4. show identity-management entries mac
4.2.5.1.5. show identity-management entries domain
4.2.5.1.6. show identity-management entries vlan
4
4
5
7
7
9
9
9
10
10
10
10
11
11
11
12
12
21
21
21
22
23
24
25
26
27
4.2.5.2. Information Available in EPICenter
4.2.5.2.1. Dash Boards in the Default Home Page
4.2.5.2.2. Customizing the Home Page to Include Other Dash Boards
4.2.5.2.3. Logon Failures Displayed in the Dashboard
4.2.5.2.4. Detailed Information About Identities Discovered Across the Network
4.2.6. Tracking Identities of VoIP Phones
4.2.6.1. Information Available at the Edge Switch
4.2.6.2. Information Available in EPICenter
27
27
29
32
33
37
37
37