User's Guide
Table Of Contents
- ExtremeAnalytics® User GuideVersion 8.4
- Legal Notices
- Trademarks
- Contact
- Extreme Networks® Software License Agreement
- Table of Contents
- ExtremeAnalytics™ Help
- ExtremeAnalytics Licensing
- Configuring Enhanced Netflow for Extreme Analytics and Extreme Wireless Contr...
- How to Deploy ExtremeAnalytics in an MSP or MSSP Environment
- ExtremeAnalytics Tab Overview
- ExtremeAnalytics Dashboard Overview
- ExtremeAnalytics Insights Dashboard
- ExtremeAnalytics Tracked Applications Dashboard
- ExtremeAnalytics Browser Overview
- ExtremeAnalytics Application Flows
- ExtremeAnalytics Fingerprints Overview
- ExtremeAnalytics Custom Fingerprints
- Delete Custom Fingerprints
- Custom Fingerprint Examples
- Create Custom Fingerprints Based on Flow
- Create Custom Fingerprints Based on Destination Address
- Create Custom Fingerprints Based on Application or Application Group
- ExtremeAnalytics Packet Captures
- ExtremeAnalytics Configuration Overview
- Virtual Sensors
- ExtremeAnalytics Engine Advanced Configuration
- Flow Collection Type
- Collection Privacy Levels
- Client Aggregation
- Slow Client Data
- Max End-Systems in Hourly Details
- Sensor Log Levels
- Store Application Site Data
- ExtremeControl Integration
- Flow Sources/Application Telemetry Sources
- Web Credentials
- Configuration Properties
- Sensor Modules
- Auditing
- Network Settings
- ExtremeAnalytics Reports
- ExtremeAnalytics Report Descriptions
- Report Descriptions
- Analytics Events
- Bandwidth for a Client Over Time
- Interface Top Applications Treemap
- Sites Using the Most Bandwidth
- Most Popular Applications
- Most Used Applications for a Client
- Most Used Applications for a User Name
- Network Activity by Site
- Network Activity by Client
- Network Activity by Application
- Slowest Applications by Site
- Top Applications Group Radar
- Top Applications Radar
- Top Applications TreeMap
- Top Applications for Interface
- Top Applications for Server
- Top Clients by Interface
- Top Interfaces by Application
- Top N Applications
- Top N Clients
- Top N Servers
- Report Descriptions
- Add and Modify Fingerprints
- Add Fingerprints
- Enable or Disable Fingerprints
- Modify Fingerprints
- Update Fingerprints
- Custom Fingerprint Examples
- How to Deploy ExtremeAnalytics in an MSP or MSSP Environment
- ExtremeAnalytics Virtual Sensor Configuration in Extreme Management Center
- Stream Flow Data from ExtremeAnalytics into Splunk
- Stream Flow Data from ExtremeAnalytics into Elastic Stack
ExtremeAnalytics Historical Flow Table
105 of 218
ExtremeAnalytics Fingerprints
Overview
The Fingerprints tab provides detailed information about fingerprints used by
ExtremeAnalytics to identify application flows. A fingerprint is a description of a
pattern of network traffic which can be used to identify an application. They can
be created based on flow, application or application group, or a destination
address. For applications such as Facebook and Google, multiple fingerprints
are included to capture the different ways these applications can be used.
Fingerprints are created and stored on the Extreme Management Center server.
When a fingerprint is changed or enabled, a flag is raised on the
ExtremeAnalyticsengine to show it needs enforcing. Access the Browser from
the Extreme Management Center Analytics tab.
There are two types of fingerprints: system fingerprints and custom fingerprints.
System fingerprints are provided by Extreme Management Center. They cannot
be deleted; however, they can be modified or disabled. When a system
fingerprint is modified, it results in a new custom fingerprint that overrides the
original system fingerprint.
Custom fingerprints are either new user-defined fingerprints or modifications of
system fingerprints. Custom fingerprints can be deleted. If a custom fingerprint
was overriding a system fingerprint, then deleting the custom fingerprint will
reload the original system fingerprint.
Related Information
l ExtremeAnalytics tab