User's Guide
Table Of Contents
- ExtremeAnalytics® User GuideVersion 8.4
- Legal Notices
- Trademarks
- Contact
- Extreme Networks® Software License Agreement
- Table of Contents
- ExtremeAnalytics™ Help
- ExtremeAnalytics Licensing
- Configuring Enhanced Netflow for Extreme Analytics and Extreme Wireless Contr...
- How to Deploy ExtremeAnalytics in an MSP or MSSP Environment
- ExtremeAnalytics Tab Overview
- ExtremeAnalytics Dashboard Overview
- ExtremeAnalytics Insights Dashboard
- ExtremeAnalytics Tracked Applications Dashboard
- ExtremeAnalytics Browser Overview
- ExtremeAnalytics Application Flows
- ExtremeAnalytics Fingerprints Overview
- ExtremeAnalytics Custom Fingerprints
- Delete Custom Fingerprints
- Custom Fingerprint Examples
- Create Custom Fingerprints Based on Flow
- Create Custom Fingerprints Based on Destination Address
- Create Custom Fingerprints Based on Application or Application Group
- ExtremeAnalytics Packet Captures
- ExtremeAnalytics Configuration Overview
- Virtual Sensors
- ExtremeAnalytics Engine Advanced Configuration
- Flow Collection Type
- Collection Privacy Levels
- Client Aggregation
- Slow Client Data
- Max End-Systems in Hourly Details
- Sensor Log Levels
- Store Application Site Data
- ExtremeControl Integration
- Flow Sources/Application Telemetry Sources
- Web Credentials
- Configuration Properties
- Sensor Modules
- Auditing
- Network Settings
- ExtremeAnalytics Reports
- ExtremeAnalytics Report Descriptions
- Report Descriptions
- Analytics Events
- Bandwidth for a Client Over Time
- Interface Top Applications Treemap
- Sites Using the Most Bandwidth
- Most Popular Applications
- Most Used Applications for a Client
- Most Used Applications for a User Name
- Network Activity by Site
- Network Activity by Client
- Network Activity by Application
- Slowest Applications by Site
- Top Applications Group Radar
- Top Applications Radar
- Top Applications TreeMap
- Top Applications for Interface
- Top Applications for Server
- Top Clients by Interface
- Top Interfaces by Application
- Top N Applications
- Top N Clients
- Top N Servers
- Report Descriptions
- Add and Modify Fingerprints
- Add Fingerprints
- Enable or Disable Fingerprints
- Modify Fingerprints
- Update Fingerprints
- Custom Fingerprint Examples
- How to Deploy ExtremeAnalytics in an MSP or MSSP Environment
- ExtremeAnalytics Virtual Sensor Configuration in Extreme Management Center
- Stream Flow Data from ExtremeAnalytics into Splunk
- Stream Flow Data from ExtremeAnalytics into Elastic Stack
Client Aggregation
136 of 218
Identifying information is data that identifies the end user, such as a username.
The ExtremeAnalytics engine collects identifying information when the privacy
level is set to Maximum Access or Medium Privacy.
Sensitive information is data an end user may not want to share, such as the
caller ID or contact information from an end user's SIP voice call. The
ExtremeAnalytics engine collects sensitive information when the privacy level is
set to Maximum Access.
Client Aggregation
Use this field to determine how client information is aggregated by the
ExtremeAnalytics engine, either by IP Address or MAC Address.
Slow Client Data
Select Enabled in the drop-down list to collect additional information about
clients with poor response times by the ExtremeAnalytics engine.
Max End-Systems in Hourly Details
Enter the maximum number of client end-systems stored in the Extreme
Management Center database for the ExtremeAnalytics engine. This ensures
your client limit is not collected from one engine. Once the value set in this field
is met, additional end-system data is not collected from the engine.
Sensor Log Levels
The ExtremeAnalytics sensor runs on the ExtremeAnalytics engine and inspects
network traffic to identify applications and other information. The sensor log file
records diagnostic information about sensor operations, which is useful for
troubleshooting engine issues.
In the Configuration view, you can enable different levels of logging for the
selected engine. Each logging level is inclusive of the levels above it. The five
levels are: