ExtremeIOT Essentials in ExtremeCloud IQNEW!
ExtremeIOT™ Essentials provides security management with a simplified configuration
workflow,
plus traffic
and application visibility of connected end devices.
ExtremeIOT Essentials also enables the centralized creation of policies that define
network and security settings for groups of IoT devices.
Note
ExtremeIOT Essentials is
only for the protection of wired IoT end devices. The
ExtremeIOT Essentials setup
creates configuration for wired devices. However, Administrators can create
additional wireless networks through
ExtremeCloud IQ.
ExtremeIOT Essentials can help you manage IoT devices within ExtremeCloud IQ. The configuration is simplified
and steps you through network policy configuration that is associated with the
device.
You can use the ExtremeCloud IQ Dashboard Essentials icon to
list the Essentials applications and choose ExtremeIOT Essentials. The ExtremeIOT Essentials navigation menu launches in ExtremeCloud IQ.
Access to
ExtremeIOT Essentials functionality is dependent on your
ExtremeCloud IQ user access level.
Note
ExtremeIOT Essentials functionality also requires an
ExtremeCloud™ IQ Pilot license.
The following options are available from the
ExtremeIOT Essentials
navigation menu:
- Dashboard
- Monitor your network activity
and performance on the dashboard. The dashboard provides a graphical
representation of information related to protected
devices. Depending on the report, the widget represents historical
data or a combination of historical and the latest data from shared
memory.
- Devices
- List of supported access
points. The devices view displays data for ExtremeIOT Essentials capable devices only.
- Clients
- List of IoT clients attached
to any of the managed devices.
- User Profiles
- A user profile is a policy role that determines a client's access to the
network. Define firewall rules to provide unique treatment of packet types when a user
profile is applied.
- Policy Groups
- Policy groups map a defined user profile to a set of clients. A user
profile is a set of network access services that can be applied at various points in
a policy-enabled network. All clients in a policy group are subject to the rules
defined in the user profile.