User's Guide
Table Of Contents
- ExtremeAnalytics® User GuideVersion 8.4
- Legal Notices
- Trademarks
- Contact
- Extreme Networks® Software License Agreement
- Table of Contents
- ExtremeAnalytics™ Help
- ExtremeAnalytics Licensing
- Configuring Enhanced Netflow for Extreme Analytics and Extreme Wireless Contr...
- How to Deploy ExtremeAnalytics in an MSP or MSSP Environment
- ExtremeAnalytics Tab Overview
- ExtremeAnalytics Dashboard Overview
- ExtremeAnalytics Insights Dashboard
- ExtremeAnalytics Tracked Applications Dashboard
- ExtremeAnalytics Browser Overview
- ExtremeAnalytics Application Flows
- ExtremeAnalytics Fingerprints Overview
- ExtremeAnalytics Custom Fingerprints
- Delete Custom Fingerprints
- Custom Fingerprint Examples
- Create Custom Fingerprints Based on Flow
- Create Custom Fingerprints Based on Destination Address
- Create Custom Fingerprints Based on Application or Application Group
- ExtremeAnalytics Packet Captures
- ExtremeAnalytics Configuration Overview
- Virtual Sensors
- ExtremeAnalytics Engine Advanced Configuration
- Flow Collection Type
- Collection Privacy Levels
- Client Aggregation
- Slow Client Data
- Max End-Systems in Hourly Details
- Sensor Log Levels
- Store Application Site Data
- ExtremeControl Integration
- Flow Sources/Application Telemetry Sources
- Web Credentials
- Configuration Properties
- Sensor Modules
- Auditing
- Network Settings
- ExtremeAnalytics Reports
- ExtremeAnalytics Report Descriptions
- Report Descriptions
- Analytics Events
- Bandwidth for a Client Over Time
- Interface Top Applications Treemap
- Sites Using the Most Bandwidth
- Most Popular Applications
- Most Used Applications for a Client
- Most Used Applications for a User Name
- Network Activity by Site
- Network Activity by Client
- Network Activity by Application
- Slowest Applications by Site
- Top Applications Group Radar
- Top Applications Radar
- Top Applications TreeMap
- Top Applications for Interface
- Top Applications for Server
- Top Clients by Interface
- Top Interfaces by Application
- Top N Applications
- Top N Clients
- Top N Servers
- Report Descriptions
- Add and Modify Fingerprints
- Add Fingerprints
- Enable or Disable Fingerprints
- Modify Fingerprints
- Update Fingerprints
- Custom Fingerprint Examples
- How to Deploy ExtremeAnalytics in an MSP or MSSP Environment
- ExtremeAnalytics Virtual Sensor Configuration in Extreme Management Center
- Stream Flow Data from ExtremeAnalytics into Splunk
- Stream Flow Data from ExtremeAnalytics into Elastic Stack
Options
85 of 218
l Application/Client — Information about applications used by clients, or about clients
using an application.
l Application/Device Family — Information about applications used by device
families, or about device families using an application.
l Application/Interface — Information about the applications used by interfaces.
l Application/Profile — Information about applications used by profiles, or about
profiles using an application.
l Application/Server — Information about applications accessed on a particular
server, or about severs using an application.
l Application Groups — Application categories, such as Cloud Computing or Social
Networking, which are implied by the application.
l Device Family — The kind of device determined for a client, such as Windows or iOS.
Device information is only available for some network traffic.
l Interface/Applications — Information about interfaces used by applications.
l Application-Interface Pair/Client — Displays the applications and interfaces used by
clients.
l Interface/Client — Information about the interfaces used by clients.
l Sites — Sites are used by ExtremeAnalytics to identify the physical location for the
client of an application flow. A site is a set of IP address ranges that identify a
portion of your network. Multiple sites can be created to identify different buildings,
sites, or geographical areas of your network.
l Profiles — A profile assigned to a client. Profile information is only collected under
certain circumstances.
l Threat — Displays a list of the threat classifications that occurred during the Time
Period you select.
l Threat/Threat End-System Pair — Displays a list of the threat classifications broken
down by the IPaddresses of the end-systems involved in the flow (the trusted and
untrusted hosts) that occurred during the Time Period you select.
l Clients — The end-point of a flow which has the client role for that connection.
l Servers — The end-point of a flow which has the server role for that connection.
l Total — The total values for all detected traffic for the interval used by the data table
(hourly or high-rate).