19.10.2021 Views

Deploying an Identity Aware Network

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Extreme Networks Application Note

Table of Contents

1. Introduction

2. References

3. Identity Aware Network

4. Identity-Management Case Study

4.1. Prime Corporation Enterprise Network

4.2. Identity Monitoring

4.2.1. Configurations for Backend Servers

4.2.2. Edge Switch Configuration

4.2.2.1. VLAN Configuration

4.2.2.2. AAA Module Configuration

4.2.2.3. LLDP Configuration

4.2.2.4. NetLogin Configuration

4.2.2.5. NetTools Configuration

4.2.2.6. Web/thttpd Configuration

4.2.2.7. Identity-Management (idMgr) Configuration

4.2.2.8. XML Client (xmlc) Configuration

4.2.3. EPICenter Configuration

4.2.4. Client Configurations

4.2.5. Tracking Identities of Desktop/Workstation Users

4.2.5.1. Information Available at the Edge Switch

4.2.5.1.1. show identity-management entries

4.2.5.1.2. show identity-management entries detail

4.2.5.1.3. show identity-management entries ipaddress

4.2.5.1.4. show identity-management entries mac

4.2.5.1.5. show identity-management entries domain

4.2.5.1.6. show identity-management entries vlan

4

4

5

7

7

9

9

9

10

10

10

10

11

11

11

12

12

21

21

21

22

23

24

25

26

27

4.2.5.2. Information Available in EPICenter

4.2.5.2.1. Dash Boards in the Default Home Page

4.2.5.2.2. Customizing the Home Page to Include Other Dash Boards

4.2.5.2.3. Logon Failures Displayed in the Dashboard

4.2.5.2.4. Detailed Information About Identities Discovered Across the Network

4.2.6. Tracking Identities of VoIP Phones

4.2.6.1. Information Available at the Edge Switch

4.2.6.2. Information Available in EPICenter

27

27

29

32

33

37

37

37

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!