User's Guide

Table Of Contents
Fingerprints Based on a Flow
112 of 218
Custom Fingerprint Examples
The ExtremeAnalytics feature uses fingerprints to identify to which application a
network traffic flow belongs. A fingerprint is a description of a pattern of
network traffic which can be used to identify an application. Extreme
Management Center provides thousands of system fingerprints with the
ExtremeAnalytics feature. In addition, you can create new custom fingerprints.
For additional information, see Getting Started with ExtremeAnalytics.
This Help topic provides examples of three different types of custom
fingerprints you can create:
l Fingerprints Based on a Flow
l Fingerprints Based on an Application or Application Group
l Fingerprints Based on a Destination Address
For additional information, see Add and Modify Fingerprints.
Fingerprints Based on a Flow
This example demonstrates how to create a custom fingerprint based on X
Window System network traffic.
In the Extreme Management Center Flows table (with the Show Unclassified
View selected) you notice several flows that had an X Window System source
port 6049. Since these flows are not currently identified with a fingerprint, you
can create a fingerprint for those flows based on the port that x11 traffic normally
runs over.
Use the following steps to create the fingerprint.
1. Select the Analytics tab.
2. Select the Application Flows tab.
3. In the table, select the Show Unclassified View.
4. Right-click on a flow with the x11 Source Port and select Fingerprints > Add
Fingerprint.