ExtremeIOT Essentials in ExtremeCloud IQ

ExtremeIOT™ Essentials provides security management with a simplified configuration workflow, plus traffic and application visibility of connected end devices. ExtremeIOT Essentials also enables the centralized creation of policies that define network and security settings for groups of IoT devices.
Note

Note

ExtremeIOT Essentials is only for the protection of wired IoT end devices. The ExtremeIOT Essentials setup creates configuration for wired devices. However, Administrators can create additional wireless networks through ExtremeCloud IQ.

ExtremeIOT Essentials can help you manage IoT devices within ExtremeCloud IQ. The configuration is simplified and steps you through network policy configuration that is associated with the device.

You can use the ExtremeCloud IQ Dashboard Essentials icon to list the Essentials applications and choose ExtremeIOT Essentials. The ExtremeIOT Essentials navigation menu launches in ExtremeCloud IQ.

Access to ExtremeIOT Essentials functionality is dependent on your ExtremeCloud IQ user access level.
Note

Note

ExtremeIOT Essentials functionality also requires an ExtremeCloud™ IQ Pilot license.
The following options are available from the ExtremeIOT Essentials navigation menu:
Dashboard
Monitor your network activity and performance on the dashboard. The dashboard provides a graphical representation of information related to protected devices. Depending on the report, the widget represents historical data or a combination of historical and the latest data from shared memory.
Devices
List of supported access points. The devices view displays data for ExtremeIOT Essentials capable devices only.
Clients
List of IoT clients attached to any of the managed devices.
User Profiles
A user profile is a policy role that determines a client's access to the network. Define firewall rules to provide unique treatment of packet types when a user profile is applied.
Policy Groups
Policy groups map a defined user profile to a set of clients. A user profile is a set of network access services that can be applied at various points in a policy-enabled network. All clients in a policy group are subject to the rules defined in the user profile.