Extreme Policy

View Scheduled Classes

Understand Extreme Networks Policy to implement and manage a secure, reliable and intelligent policy-enabled infrastructure

Duration:4.0 Days
Training Method:Instructor Led Classroom and Virtual Classroom
On-site Deliveries:Please contact your local Extreme Networks representative for special pricing
Course Overview:Students will learn methods to properly implement, configure, and manage their policy-enabled network environment. This knowledge will be reinforced through actual hands-on experience with networking equipment in a lab environment, where students will perform real world tasks designing security policies for infrastructure applications.
Who Should Attend:Network & Security Managers, Architects, and Systems Integrators
Course Prerequisite:Students should possess an understanding of network fundamentals, traffic classifications, and general network management concepts, as well as network security concepts and technologies. Extreme Networks recommends the following courses prior to enrolling in the Policy course: Extreme Management Center Boot Camp, Extreme Wireless and/or Switching and Routing Boot Camp
Course Objectives:Upon completion of this course, students will have gained the working knowledge to successfully configure and manage their Policy implementation as well as take the Policy Specialist certification exam.
Course Agenda:
  • Overview of Extreme Networks Policy concepts, as well as discussions regarding the Extreme Networks Policy solution.
  • Overview and discussions of traffic management challenges and general assumptions, traffic classifications using Extreme Networks Management Software (ExtremeManagement) Policy implementations, policy configuration guidelines, hardware considerations for effective traffic classification and traffic marking.
  • Introduction to Policy deployment, including policy configuration approaches, deploying static policy for trusted and un-trusted (guest) users and the deployment of dynamic policy for trusted users. Extreme Management Policy configurations, enforcement, deployment methods and additional considerations for the overall approaches are also covered.
  • Hands-on instruction for creating roles, services and rules as well as basic Class of Service (CoS) implementation for assigning rate limits and CoS priority.
  • Authentication methods including RADIUS client configurations, authentication services including RADIUS configuration and 802.1X supplicant configurations and interaction.
Recommended Next Course(s):Extreme Control
For Managers:Policy is targeted for those users that have acquired a solid understanding of Extreme Networks infrastructure and security solutions and now require design methodology skills in order to effectively perform their respective functions. Ideal candidates for the Policy course are Network Security Administrators / Architects or Systems Integration Specialists who are tasked with the responsibility of building and managing Policy for their network domains.
Downloads:Download the Course Overview

View Scheduled Classes

close [x]

We use cookies for traffic analytics and ad and content personalization. By clicking on any of the content or interacting with any section of this website, you are agreeing to this use of cookies in the manner described in our Privacy and Cookies Policy.