Common Objects List

Read about ExtremeCloud IQ common objects in this topic.

Navigation

Configure > Common Objects

Common objects are grouped in eight categories on the Common Objects page. To see a more detailed description, select the specific reference for the object. You can also navigate to the specific Help topic for the category by selecting its banner heading.

  • While you can manage objects on the Common Objects page, Extreme Networks recommends that you configure objects in a network policy workflow. The reason is that some configurations can have multiple objects which are by design more efficiently set up within the context of the workflow. Use the list below to view Common Object Help topics, and where applicable, to view Help topics in the context of its network policy workflow (guided configuration).

Policy Common Objects

Policy objects are configuration settings that are applied to managed devices. They consists of defined categories of policies, profiles, and interfaces that affect client interaction.

Policy Common Objects

Auto Provisioning

"Auto Provisioning Settings"

"Auto Provisioning"

Bonjour Gateway Settings

"Bonjour Gateways"

Network Policy Workflow References

"Bonjour Gateway Rules"

"Bonjour Gateway"

Hives

"Hives"

Port Types

"Port Types"

Radio Profiles

"Radio Profiles"

Schedules

"Schedules"

"SSID Availability Schedules"

SSIDs

"SSIDs"

"User Profiles"

User Profiles

"User Profiles"

Basic Common Objects

Basic objects are commonly used in configuring a network policy. They are also widely used and linked to by other objects.

Basic Common Objects

Supplemental CLI Objects (Visible only if enabled)

"Supplemental CLI"

DHCP Server and Relay

"DHCP Servers and DHCP Relays"

IP Objects/Host Names

"IP Objects and Host Names"

"IP Objects and Host Names"

MAC Objects or MAC OUIs

"MAC Objects and MAC OUIs"

"MAC Objects and MAC OUIs"

Notification Templates

"Notification Templates"

"Notification Templates"

OS Objects

"OS Objects"

"OS Objects"

VLANs

"VLANs"

Security Common Objects

Security objects include protocols that protect network resources from unauthorized client access. Objects also can block certain traffic types from the network. Security objects include captive web portal, IP and MAC firewall policies, traffic filters, and WIPS (wireless intrusion prevention system) policies.

Security Common Objects

IP Firewall Policies:

"IP Firewall Policies"

"IP Firewall Policies"

Network Policy Workflow References

"IP Firewall Policy Rules"

"IP Firewall Rule Services"

MAC Firewall Policies

"MAC Firewall Policies"

"MAC Firewall Policies"

"MAC Firewall Rules"

Traffic Filters

"Traffic Filters"

Network Policy Workflow Reference

"Traffic Filters"

WIPS Policies

Network Policy Workflow Reference

"WIPS"

QoS Common Objects

QoS (Quality of Service) is the prioritizing of different types of traffic to optimize traffic forwarding through a network. In a classifier map, you can map traffic to Extreme Networks QoS classes by service type, by specific MAC OUIs, by individual SSIDs, and by priority numbers in various standard QoS classification systems (802.11e, 802.1p, and DSCP). The Extreme Networks device then prioritizes, processes, and forwards the incoming traffic as determined by the Extreme Networks QoS level to which it is mapped.

QoS Common Objects

Classifier Maps

 

Network Policy Workflow Reference

"QoS Classifier Maps"

Marker Maps

"Marker Maps"

Network Policy Workflow Reference

"Marker Maps"

Rate Control & Queuing

"Rate Control & Queuing"

"Rate Control and Queuing"

Management Common Objects

Management objects allow you to configure management servers that devices use for DNS, NTP, SNMP, and syslog services.

Management Common Objects

DNS Servers

"DNS Servers"

"DNS Servers"

NTP Servers

"NTP Servers"

"NTP Server"

SNMP

"SNMP Servers"

"SNMP Server"

Syslog Servers

"Syslog Servers"

Network Policy Workflow Reference

"Syslog Server"

Network Common Objects

Network objects allow you to set up various specialized services. These services include Bonjour, access control, location-based applications, and others.

Network Common Objects

Access Controls

"Access Consoles"

Network Policy Workflow Reference

"Access Console"

Location Servers

"Location Servers"

LLDP/CDP Profiles

"LLDP/CDP Profiles"

Management Options

"Management Options"

Network Policy Workflow Reference

"Management Options"

Tunnel Policies

"Tunnel Policies"

"Tunnel Policy"

Authentication Common Objects

Authentication objects contain configuration and setting information needed by authentication servers. Extreme Networks devices can act as authentication and captive web portal servers or they can support external servers.

Authentication Common Objects

AAA Server Settings

"AAA Server Profiles"

AD Servers

"Active Directory Servers"

Captive Web Portals

"Captive Web Portals"

External RADIUS Servers

"RADIUS Servers"

"External RADIUS Server Settings"

LDAP Servers

"LDAP Servers"

Certificate Common Objects

Certificate objects help you manage authentication mechanisms for client devices and servers. As ExtremeCloud IQ does not generate client certificates, you must obtain client certificates, server certificates, and the issuing certificate authorities' CA certificate from a trusted third-party.

Certificate Common Object

Certificate Management

"Create a Certificate and Key"

"Certificate Management"