
Table 18: End-System Event Fields (continued)
Field
Description
Timestamp
Indicates date and time of the event.
User Name
Logged in user associated with the client.
Related Links
on page 168
Client Widgets
The following widget reports are available from the Client dashboard:
•
Client Utilization. Provides metrics on client throughput and data usage.
•
RF Management. Provides metrics on radio frequency quality.
•
Clients. Provides metrics on Transmission Control Protocol (TCP) and Return Trip Time (RTT) per
client.
•
Expert: Client metrics for the expert user related to RFQI, RTT, RSS, and RX and TX Rates.
•
Application Visibility. Provides details about applications the client is accessing and metrics on
application groups related to throughput and usage.
To view widgets for an individual client:
1 Go to
Clients
.
2 Select a client from the list and review the widgets on the Dashboard page.
Related Links
on page 24
Policy
You can define policy rules for a role to specify network access. Network policies are a set of rules,
defined in a specific order, that determine how connections are authorized or denied. If you do not
define policy rules for a role, the role's default action is applied to all traffic subject to that role. However,
if you require user-specific filter definitions, then the filter ID configuration identifies the specific role
that is applied to the user.
Related Links
Roles List
A role is a set of network access services that can be applied at various points in a policy-enabled
network. Roles are usually named for a type of user such as Student or Engineering. Often, role names
Monitor
ExtremeCloud Appliance User Guide for version 4.36.03
58