User's Guide
Table Of Contents
- ExtremeAnalytics® User GuideVersion 8.4
- Legal Notices
- Trademarks
- Contact
- Extreme Networks® Software License Agreement
- Table of Contents
- ExtremeAnalytics™ Help
- ExtremeAnalytics Licensing
- Configuring Enhanced Netflow for Extreme Analytics and Extreme Wireless Contr...
- How to Deploy ExtremeAnalytics in an MSP or MSSP Environment
- ExtremeAnalytics Tab Overview
- ExtremeAnalytics Dashboard Overview
- ExtremeAnalytics Insights Dashboard
- ExtremeAnalytics Tracked Applications Dashboard
- ExtremeAnalytics Browser Overview
- ExtremeAnalytics Application Flows
- ExtremeAnalytics Fingerprints Overview
- ExtremeAnalytics Custom Fingerprints
- Delete Custom Fingerprints
- Custom Fingerprint Examples
- Create Custom Fingerprints Based on Flow
- Create Custom Fingerprints Based on Destination Address
- Create Custom Fingerprints Based on Application or Application Group
- ExtremeAnalytics Packet Captures
- ExtremeAnalytics Configuration Overview
- Virtual Sensors
- ExtremeAnalytics Engine Advanced Configuration
- Flow Collection Type
- Collection Privacy Levels
- Client Aggregation
- Slow Client Data
- Max End-Systems in Hourly Details
- Sensor Log Levels
- Store Application Site Data
- ExtremeControl Integration
- Flow Sources/Application Telemetry Sources
- Web Credentials
- Configuration Properties
- Sensor Modules
- Auditing
- Network Settings
- ExtremeAnalytics Reports
- ExtremeAnalytics Report Descriptions
- Report Descriptions
- Analytics Events
- Bandwidth for a Client Over Time
- Interface Top Applications Treemap
- Sites Using the Most Bandwidth
- Most Popular Applications
- Most Used Applications for a Client
- Most Used Applications for a User Name
- Network Activity by Site
- Network Activity by Client
- Network Activity by Application
- Slowest Applications by Site
- Top Applications Group Radar
- Top Applications Radar
- Top Applications TreeMap
- Top Applications for Interface
- Top Applications for Server
- Top Clients by Interface
- Top Interfaces by Application
- Top N Applications
- Top N Clients
- Top N Servers
- Report Descriptions
- Add and Modify Fingerprints
- Add Fingerprints
- Enable or Disable Fingerprints
- Modify Fingerprints
- Update Fingerprints
- Custom Fingerprint Examples
- How to Deploy ExtremeAnalytics in an MSP or MSSP Environment
- ExtremeAnalytics Virtual Sensor Configuration in Extreme Management Center
- Stream Flow Data from ExtremeAnalytics into Splunk
- Stream Flow Data from ExtremeAnalytics into Elastic Stack
Application Flows
56 of 218
Application Flows
You can choose from the View drop-down list to show you several options in the
table on the Application Flows tab, including the latest flows from the specified
ExtremeAnalytics engine, the worst network and application response times,
classified and unclassified flows, and flows during a specified time frame. The
table presents bidirectional flow data (aggregate flows) or unidirectional flow
data (base flows).
Fingerprints
A fingerprint is a description of a pattern of network traffic which can be used to
identify an application. The Fingerprints tab provides detailed information about
fingerprints used by ExtremeAnalytics to identify application flows. You can
choose to view in-use and customized fingerprint data.
Packet Captures
Use the Packet Captures tab to analyze the packets from the flows displayed on
the Application Flows tab. The packet captures you create are presented in a
table, which allows you to view details about the packet capture. Additionally,
using this tab you can select a packet capture and view it in a packet analyzer.
Configuration
The Configuration tab provides detailed information on the ExtremeAnalytics
engines you configure. It also lets you add and enforce your engines, and access
engine reports and diagnostics. You must be a member of an authorization
group assigned the Extreme Management Center ExtremeAnalytics Read/Write
Access capability to view the Configuration tab.
Reports
On the Reports tab, you can access a selection of reports that provide detailed
information on application usage on your network, as well as network activity
statistics based on application, user name, client, and site. For many of the