User's Guide
Table Of Contents
- ExtremeAnalytics® User GuideVersion 8.4
- Legal Notices
- Trademarks
- Contact
- Extreme Networks® Software License Agreement
- Table of Contents
- ExtremeAnalytics™ Help
- ExtremeAnalytics Licensing
- Configuring Enhanced Netflow for Extreme Analytics and Extreme Wireless Contr...
- How to Deploy ExtremeAnalytics in an MSP or MSSP Environment
- ExtremeAnalytics Tab Overview
- ExtremeAnalytics Dashboard Overview
- ExtremeAnalytics Insights Dashboard
- ExtremeAnalytics Tracked Applications Dashboard
- ExtremeAnalytics Browser Overview
- ExtremeAnalytics Application Flows
- ExtremeAnalytics Fingerprints Overview
- ExtremeAnalytics Custom Fingerprints
- Delete Custom Fingerprints
- Custom Fingerprint Examples
- Create Custom Fingerprints Based on Flow
- Create Custom Fingerprints Based on Destination Address
- Create Custom Fingerprints Based on Application or Application Group
- ExtremeAnalytics Packet Captures
- ExtremeAnalytics Configuration Overview
- Virtual Sensors
- ExtremeAnalytics Engine Advanced Configuration
- Flow Collection Type
- Collection Privacy Levels
- Client Aggregation
- Slow Client Data
- Max End-Systems in Hourly Details
- Sensor Log Levels
- Store Application Site Data
- ExtremeControl Integration
- Flow Sources/Application Telemetry Sources
- Web Credentials
- Configuration Properties
- Sensor Modules
- Auditing
- Network Settings
- ExtremeAnalytics Reports
- ExtremeAnalytics Report Descriptions
- Report Descriptions
- Analytics Events
- Bandwidth for a Client Over Time
- Interface Top Applications Treemap
- Sites Using the Most Bandwidth
- Most Popular Applications
- Most Used Applications for a Client
- Most Used Applications for a User Name
- Network Activity by Site
- Network Activity by Client
- Network Activity by Application
- Slowest Applications by Site
- Top Applications Group Radar
- Top Applications Radar
- Top Applications TreeMap
- Top Applications for Interface
- Top Applications for Server
- Top Clients by Interface
- Top Interfaces by Application
- Top N Applications
- Top N Clients
- Top N Servers
- Report Descriptions
- Add and Modify Fingerprints
- Add Fingerprints
- Enable or Disable Fingerprints
- Modify Fingerprints
- Update Fingerprints
- Custom Fingerprint Examples
- How to Deploy ExtremeAnalytics in an MSP or MSSP Environment
- ExtremeAnalytics Virtual Sensor Configuration in Extreme Management Center
- Stream Flow Data from ExtremeAnalytics into Splunk
- Stream Flow Data from ExtremeAnalytics into Elastic Stack
Creating Fingerprints Based on an Application or Application Group
121 of 218
Create Custom Fingerprints Based on
Application or Application Group
The ExtremeAnalytics feature uses fingerprints to identify to which application a
network traffic flow belongs. A fingerprint is a description of a pattern of
network traffic which can be used to identify an application. Extreme
Management Center provides thousands of system fingerprints with the
ExtremeAnalytics feature. In addition, you can create new custom fingerprints.
Creating Fingerprints Based on an Application or
Application Group
This example demonstrates how to create a fingerprint for some unclassified
web traffic.
In the Extreme Management Center Application Flows table (with the Show
Unclassified Web Traffic View selected), several flows for the "yahoo ads"
application are part of the Web Applications group. The following instructions
will allow you to create a fingerprint that provides an application and application
group specifically for this traffic, instead of letting it default to the Web
Applications group. The new fingerprint categorizes "yahoo ads" flows into the
Yahoo Ads ld application and the Advertising application group.
Use the following steps to create the fingerprint.
1. Select the Analytics tab in Extreme Management Center.
2. Select the Application Flows tab.
3. In the table, select the Show Unclassified Web Traffic View.
4. Right-click on a flow with the yahoo ads application and select Fingerprints > Add
Fingerprint.