19.10.2021 Views

Deploying an Identity Aware Network

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Extreme Networks Application Note

Table of Contents

5. Business Process Integration

5.1. Generating Reports Using EPICenter (for Compliance and Audits)

5.1.1. Successful Logons by User Name

5.1.2. Failed Logon Attempts by User Name

38

38

38

39

5.1.3. Successful Logon Attempts Reported by Edge Switches Across the Network

5.1.4. Failed Logon Attempts Reported by Edge Switches Across the Network

5.1.5. Successful Logon Indexed by MAC Address of Users/Identities

5.1.6. Failed Logon Attempts Indexed by MAC Address of Users/Identities

5.2. Integration with Custom Enterprise Applications

5.2.1. Retrieving Identity Entries from ExtremeXOS Based Switches

5.2.1.1. soapUI Installation and Initial Setup

5.2.1.2. Creating/Opening a SOAP/XML Session with an Edge Switch

5.2.1.3. Retrieving Details of Active Users from Edge Switch

5.2.2. Receiving Unsolicited Identity Events from Edge Switches

5.3. Integration with Universal Port Manager (UPM)

5.3.1. Edge switch Configuration

5.3.2. UPM Script: Block Traffic from Unauthorized Devices

5.3.2.1. Profile Definition

5.3.2.2. Verifying Profile Triggers and Results of the Script

5.3.3. UPM Script: Isolate Unauthorized Devices

5.3.3.1. Profile Definition

5.3.3.2. Verifying Profile Triggers and Results of the Script

6. Deployment Considerations

6.1. Memory Usage in the Switch

40

41

42

43

43

44

44

51

56

61

62

62

62

62

63

65

65

15

67

67

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!