New Features and Enhancements

Extreme Visibility Manager version 6.0.0 offers the following features and enhancements.

Table 1. Features and enhancements
Feature Description
Region and zone-based architecture With Visibility Manager, you can manage devices across multiple data centers and geographic locations. You can separate locations into regions and further separate regions into zones. A zone is a set of locations (at least one and no more than five) where devices reside.
Support for the new Extreme 9920 device The device runs the NPB application, which provides network packet broker functionality. For more information, see Supported Devices.
Support for SLX and MLX devices Visibility Manager continues support for the devices that you are monitoring with a previous version of the product. For more information, see Supported Devices.
Device discovery Devices are specified by location in a Device Definition file, which you add to Visibility Manager by drag-and-drop or browsing. Discovered devices are grouped on the Configure page by location or device type.
Device types and versions Device types and device type versions are specified in a Device Type Version Capabilities (DTVC) file, which you add to Visibility Manager by drag-and-drop or browsing.
Locations Device locations are specified in a locations.csv file. You create the file and upload it during Visibility Manager installation.
Library for rule matches and policies Matches and policies that you create in the library can be applied to any device that you monitor

Per-device configuration

Device configuration in Visibility Manager mimics the functionality of command-line interface commands running on device operating systems.

You can configure the following:
  • Policies
  • Policy rule matches
  • Ingress groups and egress groups
  • Tunnels
  • Port channels and ports
Built-in and custom dashboards Dashboards display real-time streaming data for at-a-glance monitoring of selected devices and metrics.
Service chains Service chains are graphical representations of the relationship between groups and policies for a selected device. You can easily see where a policy is used and how often.

User, system, and device logs

User logs identify user transactions related to devices, device configuration, and device type.

System logs describe the status of Extreme 9920 devices.

Device-specific logs identify events in real time.

Role-based access control (RBAC) RBAC determines which functions a user can perform, based on the user's role. Visibility Manager has two roles, System Admin and Network Operator, each with different permissions for various functions.