Introduction

This section provides an overview of policy configuration. Policy is implemented on an Extreme Networks platform by associating users and devices in the network with defined enterprise roles (such as sales, engineering, or administration) that are configured in a policy role. The policy role is associated with rules that define how network resources will be provisioned and controlled for role members, as well as how security will be applied to the role member. An administrative profile associates a specific role member traffic classification with a policy role.

Note

Note

In a CLI configuration context, the policy role is configured within a policy profile using the set policy profile command. throughout this discussion, policy role and policy profile mean the same thing.