ExtremeCloud IQ Getting Started Guide

About this Guide

This guide provides a brief overview and quick tour of the ExtremeCloud IQ management interface and workflow, where you onboard new devices, configure network policies, and monitor and analyze your network activity.

Introducing the ExtremeCloud IQ User Interface

The ExtremeCloud IQ GUI (graphical user interface) is a streamlined, task-oriented, web-based network management tool that makes it easy for you to navigate the network configuration process, which includes the following steps:

  • Onboard your devices (add device serial numbers to ExtremeCloud IQ so that when you physically deploy your devices, they are automatically recognized. See ).
  • Onboard your devices (add device service tags to ExtremeCloud IQ so that when you physically deploy your devices, they are automatically recognized. See ).
  • Configure your network policies (see "Network Policy Settings").
  • Push your policy configurations to your deployed devices (see "Deploy a Network Policy").
  • Manage your network.

Icons on the right side of every page give you immediate access to on-line functions. Select to view online help, select provide feedback about ExtremeCloud IQ.

  • ExtremeCloud IQ supports Chrome, Firefox, and Internet Explorer browsers.

ExtremeCloud IQ Main Components

The following sections describe the main components of the ExtremeCloud IQ interface. There are five main tabs across the top of the ExtremeCloud IQ GUI:

  • Monitor: View the status of all the devices associated with your network, from access points to connected clients. See "The Monitor Tab".
  • Maps: Plan and build a map of your network, determine the number and placement of network devices, and organize your network locations. Your network locations also appear on and are linked to the information shown on the Health tab Locations view. See Network 360 Plan View i n "ML Insights".
  • Configure: Configure network policies from this tab, and then upload them to your devices. See "The Configure Tab".
  • Dashboard: See a wide variety of data about your network, and drill down into the charts and graphs on this tab for even greater detail. Dashboard data is refreshed every hour. See "The Dashboard Tab".
  • Tools: Investigate network issues here. This tab gives you a list of current network issues, and helps you troubleshoot and correct them. See "The Tools Tab"

In addition to these tabs, icons at the top right side of the GUI window can be accessed at any time. These include:

  • Search: Selecting allows you to search the GUI.
  • Manage organizations: Select to view and manage Hierarchical ExtremeCloud IQ organizations. See "Hierarchical ExtremeCloud IQ Configuration Guide" for more information about HHM.
  • Onboard devices: Selecting takes you to device onboarding pages.
  • View alarms: Select to view network issues.
  • Monitor progress: The icon shows the progress of device upgrades.
  • admin_name: Selecting takes you to the account details page, lets you log out, and displays information about the instance of ExtremeCloud IQ, including version and server data.

The Monitor Tab

The Monitor tab is where you can view and manage your network devices, clients, events, alarms, and security. You can control the information that is displayed using filters and time ranges.


In the Devices section, you can add devices for management, control which devices are displayed, and drill down for detailed information about each device and its clients.

You can create and save view filters to control which devices appear in the list using the filter tools on the left side of the page. Select column headings to reorder devices alphanumerically. Double-click a heading to reverse the order. Select a device host name to see connection uptime, active alarms, unique clients, a map of the physical location, CPU usage, memory usage, and network details. You can also update device configurations from this page.

Use the buttons above the table on the right side of the page to access diagnostic utilities, and perform actions such RADIUS tests, changing the country code, assigning locations, rebooting devices, and other functions.

Select above the table and follow the on-screen instructions to add real or simulated devices to your network from this page. For information, see ).

For detailed information about the Devices section, see .


The Clients section displays information about the clients that are connected to your network. Drag the time window handles in the timeline above the table to see information for specific periods of time.

Create custom filters to display information by OS type, connection type, and connection state. For more information, see "Clients".


The Users section displays information about the users that are connected to or have been disconnected from your network. Drag the time window handles in the timeline above the table to see information for specific periods of time.

Create custom filters to display of information by network location, for all locations on the network, or for users connected to specific SSIDs. For more information, see "Users List".


The Events section provides details about network events, including the time and severity of the event, a description, the hostname and MAC addresses of the devices or clients that experienced the event. Drag the time window handles on the timeline above the events table to see information for specific periods of time. ExtremeCloud IQ automatically updates the total number of events and the event log whenever the time window is changed.

For more information, see "Events"


The Alarms section displays network alerts, including the time, severity, and category of the alert, and the host name, device MAC address, and client MAC address of the device or client that generated the alert. Use the search field at the top right of the table to search for a specific device or client MAC address. Drag the handles of the time window in the timeline above the table to see information for a specific period of time. When you move the time window, ExtremeCloud IQ automatically updates the total number of alerts.

For more information, see "Alarms"

Security View

The Security view displays information about rogue APs or clients on your network using WIPS (wireless intrusion prevention system). You can pinpoint rogue activity using the range filter or by moving the time window handles along the timeline above the table. You can reassign an identified rogue AP as a neighbor.

For more information, see "Rogue APs" and "Rogue Clients".

The Maps Tab

The Maps tab is where you create the locations in your network. You can create a logical and physical network hierarchy that is linked directly to your installed devices. Because the locations function is linked to Google Maps, you can use Google Map views to create building perimeters and floor plans, or you can import or draw your own perimeters and floor plans.

The first time you select the Maps tab, you are presented with two choices. You can either import an existing plan or create a new network plan. After either uploading a plan, or choosing to create one, you will see the page where you build your network hierarchy.

You can add real or simulated devices to the floor plans in your network hierarchy, and view heat maps that show RSSI (received signal strength indication), SNR (signal-to-noise ratio), channels, data rates, and interference issues.

Your network map and locations are automatically linked to the Health tab Locations view.

For detailed information, see "ML Insights" and "ML Insights Network 360 Plan".

The Configure Tab

The Configure tab contains four views: Network Policies, Applications, Common Objects. and Users.

Network Policies

From the Network Policy view, you can create a network policy and deploy it to real or simulated devices.

The configuration and deployment workflow steps are shown in a banner across the top of the page. As you complete each step, select Next to go to the next chronological step, or select any title in the banner to skip directly to that step. The workflow banner clearly shows the configuration steps as you move through them.

For detailed information about configuring network policies, see the following topics:


TheApplications section displays a list of all defined applications. View data usage, unique clients, unique users, historic usage, and other data for individual applications from this page, and create and edit custom application definitions with optional descriptions and detection rules.

For more information, see "Applications", "Application Detection Rules", and "Application Groups".

Common Objects

The Common Objects section is where you can configure network objects that can be used in multiple places in your network setup. Common objects are building blocks that contain settings that you may use repeatedly when configuring your network. Creating common objects in advance simplifies network policy configuration by making the common objects available in drop-down lists. You can configure the following types of common objects:

  • Policy objectss: These include auto provisioning settings, Bonjour Gateway settings, hives, port types, radio profiles, SSIDs, and user profiles. See "Policy Common Objects".
  • Basic objects: Basic objects include DHCP server and Relay, IP object hostnames, MAC objects and MAC OUIs, notification templates, OS objects, and VLANs. See "Basic Common Objects List".
  • Security objects: You can configure security objects such as IP and MAC firewall policies, traffic filters, and WIPS (wireless intrusion prevention system) policies. See "Security Common Objects".
  • QoS objects: Quality of Service objects include classifier maps, marker maps, and rate control and queuing. See "QoS Common Objects".
  • Management objects: DNS servers, NTP servers, SNMP servers and Syslog servers. See "Management Common Objects".
  • Network objects: Access consoles, LLDP/CDP profiles, location servers, Management options, tunnel policies. See "Network Common Objects".
  • Authentication: AAA server settings, AD servers, captive web portals, external RADIUS servers and LDAP servers. See "Authentication Common Objects".
  • Certificate objects: Configure an object for certificate management. See "Certificate Common Objects".

New objects and object categories are continually added with new releases of ExtremeCloud IQ. For general information about common objects, see "Common Objects List".


The table on this page lists all of the user accounts, employee accounts, and user and employee groups in your network. This page is where you create and manage Guest Access to your network. A guest can be any non-employee, visitor, contractor, or VIP. User Groups help you manage the access settings for Guest Access to your network. There are many options for creating Guest Access. For more information, see "Understanding Guest Access".

Ensure that devices onboarded in ExtremeCloud IQ are in their default state before configuring them for the first time via ExtremeCloud IQ. Uploading configuration in ExtremeCloud IQ to devices that have been previously configured outside ExtremeCloud IQ might result in default settings being applied to the devices. If you want to manage a previously configured device within ExtremeCloud IQ, make sure that the device configuration in ExtremeCloud IQ matches the actual device configuration prior to uploading a configuration for the first time.

The Dashboard Tab

The Dashboard gives you a detailed view of your network activity, with data that is updated every hour. The Dashboard contains interactive widgets that present a wide variety of network data including applications, clients, devices, and connections, usage, bandwidth, and activity.

Use the filter tools to create custom filters that control the way Dashboard data is displayed. Use the interactive timeline to display data for periods from one hour to up to seven days, and drill down in the interactive widgets to learn even more about your network activity and status.


Dashboard widgets display detailed information about your network status. For example, you can see the types and number of clients, which devices the clients were connected to, the maximum number of simultaneous connections, and the status of your devices.

To view data for a specific time, drag the timeline slider or move the time window handles below it to the desired time period. Select or hover your cursor over an hour mark (or one of the 10-minute intervals within the last hour shown) to see information about activity for that period of time.

Historical View

The Historical View subsection displays comprehensive data about how your network is performing. Because Dashboard data is refreshed hourly, no data is displayed for the first hour after new ExtremeCloud IQ accounts become active.

My Reports

From the My Reports tab you can view existing reports, and generate new reports, including network summary reports, PCI DSS (payment card industry data security standard) reports, and WIPS (wireless intrusion prevention system) history reports.

The Tools Tab

The Tools tab enables you to proactively detect, analyze, and act to resolve client connectivity issues. From the Issue List section, you can see specific details about an issue, such as client host name, issue type, user profile, device, and the occurrence date. The Diagnosis section shows you what you can do to resolve an issue. The image below shows the components of the Tools tab.

For detailed information, see the following Help topics:


Cloud Terms of ServiceEvaluation AgreementData Privacy and Protection

Copyright ©  Extreme Networks, Inc. 6480 Via Del Oro, San Jose CA, 95119 USA