Deploying an Identity Aware Network
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Extreme Networks Application Note
Table of Contents
5. Business Process Integration
5.1. Generating Reports Using EPICenter (for Compliance and Audits)
5.1.1. Successful Logons by User Name
5.1.2. Failed Logon Attempts by User Name
38
38
38
39
5.1.3. Successful Logon Attempts Reported by Edge Switches Across the Network
5.1.4. Failed Logon Attempts Reported by Edge Switches Across the Network
5.1.5. Successful Logon Indexed by MAC Address of Users/Identities
5.1.6. Failed Logon Attempts Indexed by MAC Address of Users/Identities
5.2. Integration with Custom Enterprise Applications
5.2.1. Retrieving Identity Entries from ExtremeXOS Based Switches
5.2.1.1. soapUI Installation and Initial Setup
5.2.1.2. Creating/Opening a SOAP/XML Session with an Edge Switch
5.2.1.3. Retrieving Details of Active Users from Edge Switch
5.2.2. Receiving Unsolicited Identity Events from Edge Switches
5.3. Integration with Universal Port Manager (UPM)
5.3.1. Edge switch Configuration
5.3.2. UPM Script: Block Traffic from Unauthorized Devices
5.3.2.1. Profile Definition
5.3.2.2. Verifying Profile Triggers and Results of the Script
5.3.3. UPM Script: Isolate Unauthorized Devices
5.3.3.1. Profile Definition
5.3.3.2. Verifying Profile Triggers and Results of the Script
6. Deployment Considerations
6.1. Memory Usage in the Switch
40
41
42
43
43
44
44
51
56
61
62
62
62
62
63
65
65
15
67
67