User's Guide
Table Of Contents
- ExtremeAnalytics® User GuideVersion 8.4
- Legal Notices
- Trademarks
- Contact
- Extreme Networks® Software License Agreement
- Table of Contents
- ExtremeAnalytics™ Help
- ExtremeAnalytics Licensing
- Configuring Enhanced Netflow for Extreme Analytics and Extreme Wireless Contr...
- How to Deploy ExtremeAnalytics in an MSP or MSSP Environment
- ExtremeAnalytics Tab Overview
- ExtremeAnalytics Dashboard Overview
- ExtremeAnalytics Insights Dashboard
- ExtremeAnalytics Tracked Applications Dashboard
- ExtremeAnalytics Browser Overview
- ExtremeAnalytics Application Flows
- ExtremeAnalytics Fingerprints Overview
- ExtremeAnalytics Custom Fingerprints
- Delete Custom Fingerprints
- Custom Fingerprint Examples
- Create Custom Fingerprints Based on Flow
- Create Custom Fingerprints Based on Destination Address
- Create Custom Fingerprints Based on Application or Application Group
- ExtremeAnalytics Packet Captures
- ExtremeAnalytics Configuration Overview
- Virtual Sensors
- ExtremeAnalytics Engine Advanced Configuration
- Flow Collection Type
- Collection Privacy Levels
- Client Aggregation
- Slow Client Data
- Max End-Systems in Hourly Details
- Sensor Log Levels
- Store Application Site Data
- ExtremeControl Integration
- Flow Sources/Application Telemetry Sources
- Web Credentials
- Configuration Properties
- Sensor Modules
- Auditing
- Network Settings
- ExtremeAnalytics Reports
- ExtremeAnalytics Report Descriptions
- Report Descriptions
- Analytics Events
- Bandwidth for a Client Over Time
- Interface Top Applications Treemap
- Sites Using the Most Bandwidth
- Most Popular Applications
- Most Used Applications for a Client
- Most Used Applications for a User Name
- Network Activity by Site
- Network Activity by Client
- Network Activity by Application
- Slowest Applications by Site
- Top Applications Group Radar
- Top Applications Radar
- Top Applications TreeMap
- Top Applications for Interface
- Top Applications for Server
- Top Clients by Interface
- Top Interfaces by Application
- Top N Applications
- Top N Clients
- Top N Servers
- Report Descriptions
- Add and Modify Fingerprints
- Add Fingerprints
- Enable or Disable Fingerprints
- Modify Fingerprints
- Update Fingerprints
- Custom Fingerprint Examples
- How to Deploy ExtremeAnalytics in an MSP or MSSP Environment
- ExtremeAnalytics Virtual Sensor Configuration in Extreme Management Center
- Stream Flow Data from ExtremeAnalytics into Splunk
- Stream Flow Data from ExtremeAnalytics into Elastic Stack
Flow Information Sources
51 of 218
l Profile — The client's profile is derived from the ExtremeControl profile assigned to
the client end-system. ExtremeControl integration must be enabled.
l Username — The client's username is derived from network packet inspection. The
username can also be provided by ExtremeControl, if ExtremeControl integration is
enabled.
It is possible that different sources may provide different values for the same
information. For example, network packet inspection may provide the device
family name of Window 7, whereas ExtremeControl may provide the device
family name of Windows.
Enabling ExtremeControl Integration
If your network configuration includes ExtremeControl, ExtremeControl data can
be integrated with flow data to provide additional information. ExtremeControl
integration is only useful if you are collecting flows for end-systems managed by
ExtremeControl.
When ExtremeControl integration is enabled, if a client in a flow matches an
end-system in ExtremeControl, then:
l The client hostname in the flow is derived from the end-system.
l The device family in the flow is derived from the end-system.
l The username in the flow is derived from the end-system.
l The profile in the flow is derived from the end-system's ExtremeControl profile.
l The detailed site in the flow is derived from end-system data.
If a server in a flow matches an end-system in ExtremeControl, then:
l The server hostname in the flow is derived from the end-system.
To enable ExtremeControl integration on the ExtremeAnalytics engine:
1. If the ExtremeControl distributed end-system cache is not enabled on the Extreme
Management Center server, you must enable it using the following steps.
a. Select Administration > Options from the menu bar to open the Access
Control Options window.
b. Click on Advanced Settings.