Network Common Objects

Read about network common objects in this topic.

Network Common Objects

Network objects allow you to set up various specialized services. These services include access control, location-based applications, and others.

Access Controls

"Access Consoles"

Workflow Reference

"Access Console"

Location Servers

"Location Servers"

LLDP/CDP Profiles

"LLDP/CDP Profiles"

Management Options

"Management Options"

Workflow Reference

"Management Options"

Tunnel Policies

"Tunnel Policies"

"Tunnel Policy"

Network Objects Description Summary

Access Consoles: You can add, modify, and delete access control objects. An access console is a special SSID that provides wireless console access to a Extreme Networks device when it is not accessible through the wired or wireless network. This feature is especially useful in cases where the device is mounted in a place where getting a physical console cable to it is very difficult.

LLDP/CDP Profiles:  you can add, modify, and delete LLDP/CDP profiles on this page. Extreme Networks supports two protocols that network devices can use to exchange information about their identities and capabilities with other devices on the same subnet: LLDP (Link Layer Discovery Protocol) and CDP (Cisco Discovery Protocol).

Location Servers: You can add, modify, and delete location server objects. Extreme Networks devices can perform location services to track currently associated clients or work with an Extreme Networks location server, an AeroScout location server, or a Tazmen Sniffer protocol system (Ekahau Positioning Engine) to track the location of clients (or "stations"), rogue APs, and devices carrying RFID (radio frequency identification) tags.

Management Options: You can add, modify, and delete management options objects. You can configure how administrators are authenticated and how they can access the devices they manage. You can also manage several global and device-level settings including OS detection, health thresholds, global logging for Firewall policies, and LED brightness control.

Tunnel Policies: You can add, modify, and delete tunnel policy objects. A tunnel policy sets parameters for Layer 3 roaming or identity-based tunnels. Extreme Networks devices use dynamic tunnels to support client roaming between different subnets. Extreme Networks devices use identity-based tunnels to transport user traffic from one part of the network to another.