Logo

Classification Rules Overview

Classification Rules Overview

Read about device classification rules in this topic.

Overview

ExtremeCloud IQ supports multiple classification rules for its DNS servers, VLANs, RADIUS servers, device templates, and user groups, and also supports private client groups (PCGs).

Note

Note

See Network Policy Classification Rules to add network-policy-specific classification rules in the network policy workflow. See Classification Rules to add a new common-object classification rule.

Private Client Group Types and Limitations

When Private Client Groups (PCGs) are enabled, they can be designated as using one of two main operating modes.

A key-based PCG requires the associated wireless network (SSID) use PPSK (Private Pre-Shared Key) access security SSID authentication and Local password database location (see Standard Wireless Network Settings and Guest Access Wireless Network Settings).

Key-based PCGs also require associated user group to use PPSK access security and Local password database location (see Add User Groups).

Note

Note

Each network policy can have only one AP-based PCG wireless network (SSID), one key-based PCG SSID, and any number of non-PCG SSIDs. See Standard Wireless Network Settings or Guest Access Wireless Network Settings for instructions on assigning PCG options to a wireless network (SSID).
Note

Note

Once you select the PCG operating mode for a network policy (see Standard Wireless Network Settings or Guest Access Wireless Network Settings), you cannot change your selection, because the different modes create non-transferrable passwords.

Hardware PCG Considerations

AP150W Ethernet ports can be assigned to a specific key-based or AP-based PCG. (In AP-based PCG, the Ethernet ports were considered shared ports not individual user ports.)

Device Location Details

After you have created your network policy and added Extreme Networks devices to your topology map, you might want to classify the common objects (such as DNS servers and VLANs) that are associated with your devices and network policy. For details on how to add devices, see ML Insights Network 360 Plan.

Device classification eases the workload for the network admin. In organizations with managed devices that span several locations, device classification gives you the flexibility to create and group common objects by location. As a result, you spend less time configuring multiple network policies and objects to achieve your configuration goals. You create only one network policy, configure your object profiles, and then apply the object profiles to devices that are governed by classification rules.

Before you begin configuring your devices using classification by location, you must first understand the following concepts:

Note

Note

Objects used for classification can be first created in the Configure > Common Objects management window, but we recommend that you configure them within the network policy configuration workflow so that you can apply any classification rules.

For example, the Acme Corporation has two campus locations (San Jose and Sunnyvale) that require different classification rules and assigned DNS servers based on their business location and needs. Without device classification, you must create multiple network policies to deploy the necessary DNS server assignments; whereas, using device classification by location requires a single network policy only.

Copyright © 2020 Extreme Networks. All rights reserved. Published March 2020.