Specifications

Ridgeline Concepts and Solutions Guide
5
Verifying EAPS Information..................................................................................................................................185
Running EAPS Reports........................................................................................................................................186
EAPS Summary Report ................................................................................................................................186
EAPS Log Reports ........................................................................................................................................187
Chapter 13: Managing Network Security.............................................................................................. 189
Security Overview ................................................................................................................................................189
Management Access Security ..............................................................................................................................189
Using RADIUS for Ridgeline User Authentication.........................................................................................190
Configuring a RADIUS Server for Ridgeline User Authentication..........................................................190
Example: Setting up a VSA to Return Ridgeline Role Information.........................................................191
Example: Setting the Service Type for a Built-in Ridgeline Role ...........................................................192
Securing Management Traffic .......................................................................................................................192
Using SNMPv3 for Secure Management ...............................................................................................192
Using SSHv2 to Access Network Devices. ............................................................................................193
Securing Ridgeline Client-Server Traffic .......................................................................................................194
Monitoring Switch Configuration Changes ...........................................................................................................195
Using the MAC Address Finder............................................................................................................................196
Using Alarms to Monitor Potential Security Issues...............................................................................................196
Device Syslog History...........................................................................................................................................197
Network Access Security with VLANs ..................................................................................................................198
Chapter 14: Policies ...............................................................................................................................201
Overview ..............................................................................................................................................................201
Viewing Policies for Devices .........................................................................................................................202
Creating a New Policy ..........................................................................................................................................203
Copying a Policy to Create a New Policy......................................................................................................209
Editing a Policy..............................................................................................................................................210
Deleting a Policy ...........................................................................................................................................211
Detaching a Policy ........................................................................................................................................212
Attaching a Policy..........................................................................................................................................212
Categorizing Policies............................................................................................................................................213
Categorizing Policy Rules .............................................................................................................................214
Creating and Managing Roles ..............................................................................................................................214
Viewing Active Policies for Devices...............................................................................................................214
Chapter 15: Tuning and Debugging Ridgeline ....................................................................................215
Monitoring and Tuning Ridgeline Performance ....................................................................................................215
Disabling Ridgeline Management for a Device ......................................................................................215
Polling Types and Frequencies .....................................................................................................................216
SNMP Polling.........................................................................................................................................216
MAC Address Polling .............................................................................................................................216
Telnet Polling .........................................................................................................................................217
Performance of the Ridgeline Server ............................................................................................................217
Tuning the Alarm System .....................................................................................................................................217
Disabling Unnecessary Alarms .....................................................................................................................218
Limiting the Scope of Alarms ........................................................................................................................219
Using Device Groups and Port Groups for Alarm Scopes .....................................................................221
The Alarm and Event Log Archives...............................................................................................................221
Using the MIB Poller Tools...................................................................................................................................221
Defining a MIB Collection..............................................................................................................................222
The MIB Poller Summary ..............................................................................................................................223
Loading, Starting and Stopping a Collection ..........................................................................................224
The MIB Collection Detail Report...........................................................................................................224
The MIB Poller Detail Report .................................................................................................................225
Viewing the XML Collection Definition ...................................................................................................226