Extreme Visibility Manager version 6.0.0 offers the following features and enhancements.
Feature | Description |
---|---|
Region and zone-based architecture | With Visibility Manager, you can manage devices across multiple data centers and geographic locations. You can separate locations into regions and further separate regions into zones. A zone is a set of locations (at least one and no more than five) where devices reside. |
Support for the new Extreme 9920 device | The device runs the NPB application, which provides network packet broker functionality. For more information, see Supported Devices. |
Support for SLX and MLX devices | Visibility Manager continues support for the devices that you are monitoring with a previous version of the product. For more information, see Supported Devices. |
Device discovery | Devices are specified by location in a Device Definition file, which you add to Visibility Manager by drag-and-drop or browsing. Discovered devices are grouped on the Configure page by location or device type. |
Device types and versions | Device types and device type versions are specified in a Device Type Version Capabilities (DTVC) file, which you add to Visibility Manager by drag-and-drop or browsing. |
Locations | Device locations are specified in a locations.csv file. You create the file and upload it during Visibility Manager installation. |
Library for rule matches and policies | Matches and policies that you create in the library can be applied to any device that you monitor |
Per-device configuration |
Device configuration in Visibility Manager mimics the functionality of command-line interface commands running on device operating systems. You can configure the following:
|
Built-in and custom dashboards | Dashboards display real-time streaming data for at-a-glance monitoring of selected devices and metrics. |
Service chains | Service chains are graphical representations of the relationship between groups and policies for a selected device. You can easily see where a policy is used and how often. |
User, system, and device logs |
User logs identify user transactions related to devices, device configuration, and device type. System logs describe the status of Extreme 9920 devices. Device-specific logs identify events in real time. |
Role-based access control (RBAC) | RBAC determines which functions a user can perform, based on the user's role. Visibility Manager has two roles, System Admin and Network Operator, each with different permissions for various functions. |