Ridgeline Concepts and Solutions Guide
6
Exporting the Collected Data .................................................................................................................226
The MIB Query Tool ......................................................................................................................................226
Reconfiguring Ridgeline Ports..............................................................................................................................227
Using the Ridgeline Debugging Tools ..................................................................................................................228
Reconfiguring the FreeRadius Server ..................................................................................................................228
Chapter 16: Creating and Running Ridgeline Scripts......................................................................... 229
About Ridgeline Scripts ........................................................................................................................................229
Bundled Ridgeline Scripts .............................................................................................................................230
The Ridgeline Script Interface ..............................................................................................................................230
Managing Ridgeline Scripts..................................................................................................................................232
Creating a New Ridgeline Script ...................................................................................................................233
Specifying Run-Time Settings for a Script.....................................................................................................236
Specifying Permissions and Launch Points for a Script ................................................................................237
Running a Script............................................................................................................................................238
Importing Scripts into Ridgeline ....................................................................................................................242
Categorizing Scripts ......................................................................................................................................243
Specifying an Ridgeline Script as an Alarm Action .......................................................................................244
Configuring Script Tasks ...............................................................................................................................244
Using the Audit Log to Troubleshoot Ridgeline Scripts ........................................................................................246
Audit Log View ..............................................................................................................................................246
Filtering the Audit Log View ...................................................................................................................247
Displaying Audit Log Details for a Script .......................................................................................................247
Rerunning a Script ........................................................................................................................................248
About ExtremeXOS Scripts ..................................................................................................................................248
Chapter 17: Using Identity Management ..............................................................................................249
Identity Management Software License ...............................................................................................................249
Overview ..............................................................................................................................................................249
Role-Based Access Control..................................................................................................................................250
Roles, Policies, and Rules ............................................................................................................................250
Roles......................................................................................................................................................250
Policies...................................................................................................................................................251
Role Hierarchy ..............................................................................................................................................251
Role Inheritance ............................................................................................................................................253
LDAP Attributes and Server Selection ..........................................................................................................254
Enabling Monitoring on Switches and Ports.........................................................................................................254
Editing Monitored Device Ports ............................................................................................................................259
Disabling Monitoring......................................................................................................................................260
Enabling Role-based Access Control on New Devices ........................................................................................261
Disabling Role-based Access Control...........................................................................................................265
Creating Roles......................................................................................................................................................265
Defining a New Role .....................................................................................................................................266
Creating a Child Role with Conditions Inherited from Its Parent............................................................268
Creating a Child Role with Conditions Inherited from a Different Role ..................................................271
Viewing Roles ...............................................................................................................................................272
Viewing Role Details ..............................................................................................................................273
Editing Roles .................................................................................................................................................274
Deleting Roles...............................................................................................................................................275
Policy Match Condition Combinations..................................................................................................................276
Attaching Policies to Roles............................................................................................................................276
Deleting a Policy Attached to a Role .............................................................................................................278
Error and Results Handling ...........................................................................................................................279
Configuring Directory Servers ..............................................................................................................................279
Viewing the Server Directory.........................................................................................................................280
Managing Global Directory Servers ..............................................................................................................280