Ridgeline Concepts and Solutions Guide
5
Verifying EAPS Information ..................................................................................................................................185
Running EAPS Reports ........................................................................................................................................186
EAPS Summary Report ................................................................................................................................186
EAPS Log Reports ........................................................................................................................................187
Chapter 13: Managing Network Security.............................................................................................. 189
Security Overview ................................................................................................................................................189
Management Access Security ..............................................................................................................................189
Using RADIUS for Ridgeline User Authentication .........................................................................................190
Configuring a RADIUS Server for Ridgeline User Authentication ..........................................................190
Example: Setting up a VSA to Return Ridgeline Role Information.........................................................191
Example: Setting the Service Type for a Built-in Ridgeline Role ...........................................................192
Securing Management Traffic .......................................................................................................................192
Using SNMPv3 for Secure Management ...............................................................................................192
Using SSHv2 to Access Network Devices. ............................................................................................193
Securing Ridgeline Client-Server Traffic .......................................................................................................194
Monitoring Switch Configuration Changes ...........................................................................................................195
Using the MAC Address Finder ............................................................................................................................196
Using Alarms to Monitor Potential Security Issues...............................................................................................196
Device Syslog History...........................................................................................................................................197
Network Access Security with VLANs ..................................................................................................................198
Chapter 14: Policies ............................................................................................................................... 201
Overview ..............................................................................................................................................................201
Viewing Policies for Devices .........................................................................................................................202
Creating a New Policy ..........................................................................................................................................203
Copying a Policy to Create a New Policy ......................................................................................................209
Editing a Policy..............................................................................................................................................210
Deleting a Policy ...........................................................................................................................................211
Detaching a Policy ........................................................................................................................................212
Attaching a Policy..........................................................................................................................................212
Categorizing Policies ............................................................................................................................................213
Categorizing Policy Rules .............................................................................................................................214
Creating and Managing Roles ..............................................................................................................................214
Viewing Active Policies for Devices...............................................................................................................214
Chapter 15: Tuning and Debugging Ridgeline .................................................................................... 215
Monitoring and Tuning Ridgeline Performance ....................................................................................................215
Disabling Ridgeline Management for a Device ......................................................................................215
Polling Types and Frequencies .....................................................................................................................216
SNMP Polling .........................................................................................................................................216
MAC Address Polling .............................................................................................................................216
Telnet Polling .........................................................................................................................................217
Performance of the Ridgeline Server ............................................................................................................217
Tuning the Alarm System .....................................................................................................................................217
Disabling Unnecessary Alarms .....................................................................................................................218
Limiting the Scope of Alarms ........................................................................................................................219
Using Device Groups and Port Groups for Alarm Scopes .....................................................................221
The Alarm and Event Log Archives...............................................................................................................221
Using the MIB Poller Tools ...................................................................................................................................221
Defining a MIB Collection ..............................................................................................................................222
The MIB Poller Summary ..............................................................................................................................223
Loading, Starting and Stopping a Collection ..........................................................................................224
The MIB Collection Detail Report...........................................................................................................224
The MIB Poller Detail Report .................................................................................................................225
Viewing the XML Collection Definition ...................................................................................................226
Summary of Contents for Ridgeline 3.0
Page 14: ...Related Publications Ridgeline Concepts and Solutions Guide 12 ...
Page 26: ...Ridgeline Overview Ridgeline Concepts and Solutions Guide 24 ...
Page 52: ...Getting Started with Ridgeline Ridgeline Concepts and Solutions Guide 50 ...
Page 78: ...Using Map Views Ridgeline Concepts and Solutions Guide 76 ...
Page 88: ...Provisioning Network Resources Ridgeline Concepts and Solutions Guide 86 ...
Page 103: ...6 Ridgeline Concepts and Solutions Guide 101 Figure 63 E Line Service Details Window ...
Page 104: ...Managing Ethernet Services Ridgeline Concepts and Solutions Guide 102 ...
Page 114: ...Importing Services Ridgeline Concepts and Solutions Guide 112 ...
Page 132: ...Managing and Monitoring VPLS Domains Ridgeline Concepts and Solutions Guide 130 ...
Page 146: ...Managing VLANs Ridgeline Concepts and Solutions Guide 144 ...
Page 190: ...Managing Your EAPS Configuration Ridgeline Concepts and Solutions Guide 188 ...
Page 202: ...Managing Network Security Ridgeline Concepts and Solutions Guide 200 ...
Page 350: ...Book Title Ridgeline Concepts and Solutions Guide 348 ...
Page 372: ...Book Title Ridgeline Concepts and Solutions Guide 370 ...