Amazon Web Services

Abstract: This document details the requirements, methodologies, and tools required to integrate Amazon Web Services with Extreme Networks Management Center.

Introduction

This integration provides automation and enhanced security regarding AWS EC2 instances and security groups. Main use cases:

  • Manage AWS security groups through XMC (policies)
  • Automatically assign AWS EC2 instances to managed security groups
  • Import AWS instances to XMC
  • Import virtual subnets as switches in XMC (topology)
  • Provide reports on data retrieved from the Amazon cloud

Goals

  1. Import VM instances from AWS as end-systems into XMC
  2. Import
    1. AWS subnets to create XMC switches and
    2. AWS instance interfaces to create XMC switch ports
  3. Use this data on the created XMC switches to
    1. update the created switches’ nick name, location, contact and user data fields
    2. assign the switches to XMC sites
    3. update the created switch ports’ name and description fields
  4. Use this data on the created XMC end-systems to
    1. update the custom fields, state, authorization, device family, hostname, IP address
    2. map them to their connected switch (=AWS subnet) and port (=instance interface on that subnet) which also maps them to sites
  5. Manage security groups based on XMC policies
    1. Import security groups from so called managed VPCs (defined in Connect’s config)
    2. Compare to corresponding policies from so called managed Policy domains
    3. Create / update security groups based on policies / services / rules
  6. Manage EC2 instance assignment to security groups
    1. Based on manual XMC end-system group assignments
  7. Provide custom reports on networks, subnetworks, availability zones and instances

Prerequisites

Th following prerequisites are required:

  • Extreme Management Center

    • The minimum version required is XMC v8.2 (some features, like assigning devices and end-systems to sites require XMC v8.3)

    • The NMS-ADV (advanced) license must be deployed to enable this and other Connect integrations

    • Internet access
      (Connect is running on the XMC server and needs access to the AWS cloud)
  • Amazon Web Services Account

Integration Overview

The overall architecture is centered around the XMC policy domain. Customers can create a dedicated policy domain with policies, service and rules that they want to use to protect their virtual instances. The Connect module’s configuration must mention this policy domain as so called managed domain and must map it to one or more AWS accounts and VPC networks.

Once this domain gets enforced, Connect will

  • compare the policy rules with the existing security groups within the configured account’s network
  • convert policy rules to security group rules and create / update security groups as needed
  • Create / update XMC end-system groups for each managed domain & policy
    • Group name format: policyDomain__policyName
  • Once an admin assigns an XMC end-system to one of the managed groups, Connect will assign the corresponding security groups to the corresponding AWS instance in the cloud to actually apply the corresponding security group rules.

image0

Multi-Account Support

The integration supports synchronization with multiple AWS accounts. Connect will pull all instances from all configured AWS accounts into XMC. It will synchronize the configured list of managed Extreme policy domains to the configured list of AWS VPC networks (configurable per account).

The visualization below shows a setup where two policy domains are created. One provides a set of standard policies that is synchronized to two AWS cloud accounts. Not all VPC networks in those two accounts receive those policies though. The other policy domain provides a set of special policies which is only synchronized into (a different) one AWS account.

image1

Managed Domains, ES Groups & Security Groups

The minimum configuration for this solution requires the admin to define at least one so called managed policy domain and map it to at least one account and VPC network (within that account). A managed policy domain is just a standard policy domain within XMC – it becomes a managed one by adding it to this Connect module’s configuration.

Connect is actually not managing (modifying) the policy domain. Only the XMC admin is modifying it. But such domains are used by Connect to

  • Create XMC end-system groups for each policy
  • Create AWS security groups for each policy within the list of configured VPC networks

Those auto-created XMC end-system groups and AWS security groups are considered managed as they can be created, updated and deleted by Connect. They should not be modified manually.

In regards to managed XMC end-system groups, Connect will only create one end-system group for each managed policy domain and contained policy. No matter how many accounts are being synchronized. The reason for that is that those end-system groups represent exactly one policy and even if that policy is exported to multiple accounts, it is still representing the same policy.

image2

Mapping Domains to VPC Networks

When configuring how to map a managed domain to a VPC network in AWS the following rules apply:

  • One managed policy domain is mapped / exported to one or more VPC networks
  • No VPC network can be assigned to more than one policy domain
  • Policy domains that are not configured within Connect won’t be sync’ed to AWS
  • VPCs that are not configured within Connect won’t be altered (“unmanaged” VPCs)
  • Customers can manually create additional security groups in “managed” VPC networks
  • Changes to “managed” security groups will be overwritten on next policy enforce

The image below visualizes valid and invalid configurations:

  • Valid:
    • Map policy domain “Custom App1” to VPC network “Custom App1”
    • Map policy domain “Standard Apps” to two VPC networks
      • this will create the exact same security groups within both VPC networks
      • very useful for rules that you want to apply to all / most of your VPC networks as they apply some basic set of common rules
      • avoids config errors especially when the same rules have to be managed for many VPC networks
  • Not valid:
    • The red arrow indicates a config error since the destination VPC network “FinTech” is already a managed network from the “Standard Apps” policy domain. A VPC network cannot be “fed” by more than one policy domain.

image3

VMs with multiple Interfaces

AWS allows you to create a VM with multiple NICs. This allows Connect to apply different security groups for each interface of such a VM.

The image below shows two XMC end-systems which belong to a single AWS VM Connect creates an XMC end-system for each NIC on an AWS VM. Based on the different group assignment in XMC (one end-system is assigned to group Cloud__WebServer and the other to group Cloud__AppServer) the corresponding security groups are applied per instance interface in AWS.

image4

Naming Convention

When creating XMC end-system groups and AWS security groups, Connect is following these naming conventions.

Security Group Name & Description

The name of each managed security group uses this syntax: extremePolicyDomain__extremePolicy

Example: Hospital__Doctor

AWS is not using the name of a security group as its unique identifier so it is allowed to use the same names on different VPCs (Connect will never create the same security group name within the same VPC). The security group ID is its identifier and is auto-generated by AWS when a new group is created.

Connect is also setting the description field of all managed groups. The description is not used by Connect and is more meant to be useful for admins to understand that those groups are managed by Connect and should not be edited manually. Example: Managed by Extreme Connect - Referenced Domain / Policy: Hospital / Test

This visualization shows an example of a security group name and how it is built based on the corresponding XMC policy.

image5

Security Group Tag

Connect will add two tags to each managed security group it creates:

  • Name: this is just to indicate the name of the group and has no further use
  • ExtremePolicyId: this tag is a key identifier used by Connect. Each AWS security group that contains this tag is considered a managed group by Connect. Ensure not to delete or modify this tag manually. It encodes the policy domain and the policy name that it is based on (= that is refers to)

Example ExtremePolicyId tag: Hospital__Doctor

This tag is eventually used by Connect to identify the correct security group to be applied to an instance.

This visualization shows an example of the security group tags and how they are built based on the corresponding XMC policy.

image6

Extreme End-System Groups

Each managed Extreme end-system group’s name will use this syntax: extremePolicyDomain—-extremePolicy

Example: Hospital__Patient

These end-system groups represent a specific policy you want to apply to a cloud-based instance (which is represented by an end-system in XMC). The description field lists the accounts and VPC networks that this end-system group is used for. Example:

Managed by Connect for AWS accounts and VPCs: VPCs for account id snappy-bucksaw-168120: [datalab-network], VPCs for account id analytics-research-199618: [kurt-vpc-1, kurt-vpc-2]

This example also shows that it is a valid configuration to synchronize one policy domain into multiple AWS accounts and even multiple VPC networks within a single account.

image7

Sites

Manage XMC Sites

Once enabled, this integration will automatically create the site location

/World/Cloud

This site node will contain all devices that are retrieved from any cloud provider (AWS, Azure and GCP). Beneath the main node, the node that will hold all AWS related devices is created automatically

/World/Cloud/AWS

This is how it looks like in the UI if all three Cloud integration have been enabled:

image8

Assign Devices

When the user clicks on the /World/Cloud/AWS list item the list of all retrieved AWS regions will be displayed as sub-sites and the list of all devices will automatically be filtered for those coming from AWS. Each device will show the site it belongs to:

image9

Assign End-Systems

Since the end-systems are assigned to a switch and that switch belongs to a site, end-systems automatically are assigned to the corresponding sites as well ( the AWS region they run in).

image10

Topology - XMC Devices (Switches)

Connect will create one device (switch) in XMC for each subnet found in AWS (from all configured accounts). Connect will then create one switch port for each instance interfaces that is connected to an AWS subnet. Those switches and ports will then be used to virtually “connect” the end-systems (instances) and thus provide a sense of “location” for each AWS instance.

Creating Devices

The screenshot below shows a section of XMC devices that have been created based on AWS subnets and some of the corresponding AWS subnets.

image11

Before trying to create switches, Connect pulls the current list of switches from XMC and tries to parse data from their nick name, location, contact and user data fields. Data encoded here:

  • Nick name:

    • if the subnet has a “Name” tag defined in AWS, that is what will be used.
    • If not, the AWS subnet id is used
  • Site: the XMC site location of the device region of the subnet

  • Location: Zone name of the subnet

  • Contact: Account name id (that this subnet is pulled from)

  • User Data 1: always shows cp=aws
    ( reference that this device originates from AWS)
  • User Data 2: AWS VPC id

  • User Data 3: AWS subnet id

These fields should never be modified manually!

After creating the switch, Connect will create a switch port for each instance interface that is connect to this subnet.

image12

Connect will encode data within the following switch port fields:

  • Name:
    • MAC address of the instance interface
  • Description:
    • Instance name
    • instance id

These fields should never be modified manually!

Autogenerate Switch IP

The IP addresses are automatically generated based off of the CIDR range provided by AWS for each subnet. Since AWS allows you to have the same subnet (with the same CIDR range) in multiple regions, the switch IP is auto-incremented starting at the first IP within the given CIDR range.

The auto-generated switch IP addresses are not relevant (they are not accessible and cannot be used by XMC to talk to any AWS switch) but need to be provided to XMC.

Removing / Resyncing XMC Devices

If a subnet in AWS gets deleted, the corresponding XMC switch will be deleted as well.

If an XMC device that corresponds to a (still existing) AWS subnet get deleted (for example: by accident through the admin) Connect will re-create this switch.

Updating XMC Switch Ports

If a new instance interface is connected to a subnet in AWS, the corresponding XMC switch will get a new switch port. And if an existing instance interface is removed from a subnet in AWS, the corresponding switch port in XMC is removed.

XMC End-Systems

Creating End-Systems

This integration will create an end-system entry in XMC for each AWS instance’s network interface.

The following list shows the attributes mapping from AWS instances to XMC end-systems

  • XMC end-system hostname and IP address:
    • AWS intance’s NIC’s “association” attribute: use Public DNS and IP if provided
  • XMC end-system device family:
    • AWS instance type
  • XMC end-system state:
    • AWS state. If it is RUNNING Connect maps it to ACCEPT. For everything else: DISCONNECTED
  • XMC end-system switch IP:
    • AWS subnet
  • XMC end-system switch port:
    • AWS instance interface. Also shows zone and interface MAC

All end-systems will be shown in XMC as discovered through “Auto-Tracking”. By assigning end-systems to the corresponding switches, they will also be assigned to the corresponding site.

Updating End-Systems

The Connect module holds a cache of already synchronized end-systems in order to avoid having to recreate all end-systems during each poll interval. So if an AWS instance is already on that cache, tests will be executed on the following end-system properties before an update message is sent to the XMC API:

  • IP address (network interface IP – preferred: public IP)
  • Hostname (network interface DNS name – preferred: public DNS name)
  • Switch IP (if the feature to sync AWS subnets to XMC devices is enabled)
  • State
  • Authorization

In case any one of these tests show that an update is required, Connect will update the corresponding end-system in XMC.

Updating Custom Field

The Connect module is updating two custom fields for each end-system/instance imported from AWS:

  1. One custom field contains general data about the corresponding instance. The content and syntax of this custom field can be modified through a configuration option but modifying it will most likely make the reports unavailable. The following data / variables are available:

    1. Available variables from an instance (which the interface belongs to):
      instanceId, instanceState, instanceType, instanceName, tags
    2. Available variables from the instance interface:
      mac, interfaceId, interfaceStatus, vpcId, subnetId, subnetName, publicIpAddress, privateIpAddress, ipAddress, publicDnsName, privateDnsName, description, securityGroups
The default config for this parameter is:
iName=#instanceName#;iStatus=#instanceState#;nwIfNetwork=#vpcId#;nwIfSubnet=#subnetName#;iZone=#availabilityZone#;nwIfIp=#ipAddress#;iType=#instanceType#
  1. Another custom field contains data that is used to identify the AWS instance, its interface and the account name belongs to. Do not manually modify the content of this custom field! Example content:
    cp=aws;iId=i-0b4845152d087a585;nwIfId=eni-216dc071;accName=MainAccount;vpc=vpc-f2ad7195

That data can be used to search and filter for end-systems.

Removing End-Systems

This section describes the mechanisms available to handle end-systems that have been removed/deleted/aged from AWS and thus don’t appear in the result list retrieved via the AWS API.

The following actions can be taken (all configurable):

  • Move deleted end-system to “deletion” group: admins can configured a so called “deletion” group on the Connect module. Once an already synchronized instance has been deleted from AWS, its corresponding MAC address will be deleted from any end-system group in EAC and added to this end-system group. Administrators could use this group to track which end-systems are now “outdated” according to AWS.
  • Delete end-systems from XMC: delete the end-system using its MAC. This won’t remove any group memberships but will delete the end-system from XMC / NAC

XMC End-System Groups

Connect uses XMC end-system groups (MAC-based) for two purposes:

  1. A catch-all group can be configured to put all instance MACs into a single end-system group for awareness – admins can use this group for easy search, grouping and filtering
  2. For each managed policy (from all managed domains), Connect creates an end-system group. When an end-system MAC gets added to such an end-system group the corresponding AWS instance will get assigned to the corresponding security group. That way, pushing XMC end-systems to groups will enforce security groups in AWS.

image13

If those end-systems get added to MAC groups that are not managed by Connect, no change to the corresponding instances’ security group assignment will be performed.

If you configure a valid (existing) MAC-based end-system group for this feature (“Default endsystem group for all instances”) be aware that,

  • if you manually delete entries from this group and
  • you have the feature “Assign AWS security groups based on xmc end-system groups” enabled and
  • you have the feature “Overwrite manual security groupassignment” enabled

Connect will remove any previously, manually configured security group assignment from the corresponding AWS instance which might lead to communication issues with that instance. Connect will only keep automatically assigned security groups on that instance and if the corresponding end-system has only been in that default catch-all group and now is not member of any group, Connect will remove all security group assignments from that instance (apart from the default security group from its VPC) which might impact its connectivity.

Installation and Configuration

First confirm that Extreme Management Center (XMC) is installed.

AWS API Access

To retrieve any data from this API, the following parameters are required:

  • Access key id
  • Access key secret
  • Default region

You can generate the access key and secret access key by following these directions:

http://docs.aws.amazon.com/IAM/latest/UserGuide/ManagingCredentials.html#Using_CreateAccessKey

Ensure that the user you base this API access key off of has sufficient permissions to use the API, manage security groups, managed security groups assigned to instances and pull data on security groups, instances, zones, subnets and managed security groups.

Here is a short abstract from the AWS documentation on how to create an access key and secret:

To create, modify, or delete a user’s access keys (console)

  1. Sign in to the AWS Management Console and open the IAM console at https://console.aws.amazon.com/iam/.
  2. In the navigation pane, choose Users.
  3. Choose the name of the preferred user, and then choose the Security credentials tab.
  4. If needed, expand the Access keys section and do any of the following:
    • To create an access key, choose Create access key. Then choose Download .csv file to save the access key ID and secret access key to a CSV file on your computer. Store the file in a secure location. You will not have access to the secret access key again after this dialog box closes. After you have downloaded the CSV file, choose Close.
    • To disable an active access key, choose Make inactive.
    • To reenable an inactive access key, choose Make active.
    • To delete an access key, choose its X button at the far right of the row. Then choose Delete to confirm.

AWS Default Region

The default region is required for some API calls (that are not region specific) and is set to “us-east-1” by default.

All available regions: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-regions-availability-zones.html

cid:image001.png@01D3D574.45E7D420

Configure Connect

Configuration can be done both from the XMC tab “Connect” and the config file itself.

Customers should not have to use the config file but it is mentioned just for documentation purposes. On an XMC v8.1 server it is located at /usr/local/Extreme_Networks/NetSight/wildfly/standalone/configuration/connect /AwsHandler.xml

Customers will use the XMC web UI for configuration.

AWS Account Specifig Config

The first tab within the “Amazon Web Services” Connect module config section allows admins to configure AWS account specific information:

  • Account Name:
    this is a freely configurable name for each AWS account you want to synchronize to. The name is simply for the customer to be able to know which instances belong to which account. It is not part of the AWS API authorization.
  • Access Key ID:
    Used to authenticate and authorize Connect against the AWS API (see chapter above to create a key)
  • Access Key Secret:
    Used to authenticate and authorize Connect against the AWS API (see chapter above to create a key secret)
  • Managed Domains and VPCs:
    List of managed policy domains and their corresponding managed VPCs. Only policy domains configured here will be used to export policies to AWS. One policy domain can be mapped to one or more VPCs. No VPC can be assigned to more than one policy domain. The managed domains and VPCs must be given in the following format: domainName:vpcId1,vpcId2;domainName2:vpcId5,vpcId7. Example: Hospital:vpc-d8c5ada1
  • Default Region:
    Used when creating new security groups. The AWS API requires to set a default region on this operation. Default value: us-east-1

    All available regions: us-gov-west-1, us-east-1, us-east-2, us-west-1, us-west-2, eu-west-1, eu-west-2, eu-west-3, eu-central-1, ap-south-1, ap-southeast-1, ap-southeast-2, ap-northeast-1, ap-northeast-2, sa-east-1, cn-north-1, cn-northwest-1, ca-central-1

  • Regions to ignore:
    Semicolon separated list of region names that should be ignored when retrieving any data from AWS. Tests have shown that some regions seem to have special authorization and usually (for most enterprise customers) produce errors when trying to query them (China, government). If empty, Connect will try to retrieve data from all regions.

    All available regions: us-gov-west-1, us-east-1, us-east-2, us-west-1, us-west-2, eu-west-1, eu-west-2, eu-west-3, eu-central-1, ap-south-1, ap-southeast-1, ap-southeast-2, ap-northeast-1, ap-northeast-2, sa-east-1, cn-north-1, cn-northwest-1, ca-central-1

    Example (and default value): us-gov-west-1;cn-north-1;cn-northwest-1

image15

General Config

The second tab within the Connect “Amazon Web Services” module configuration section is called “Configuration” and provides more options. Most of them are similar to all other modules and thus won’t be discussed in detail within this document. Some important options are:

  • Custom field to use for identification data:
    The number of the custom data field for each end-system to store the identification data to. This data is used to identify the corresponding AWS instance, network interface and account name. It also encodes the type of cloud provider used to pull this data from (in this case: aws). Format example: cp=aws;iId=4253868206409840076;nwIfFp=u7wnZ-pBoYg=;accN=analytics-research-199618

    This value must not be the same as the configured value for “Custom field to use”!

  • HTTP client socket timeout in milliseconds:
    HTTP socket timeout in milliseconds for all HTTP connections to the AWS API. Defines how much time is allowed for the socket towards the AWS API to be unresponsive. Default: 50000 (=50 seconds)
  • HTTP client connection timeout in milliseconds:
    HTTP connection timeout in milliseconds for all HTTP connections to the AWS API. Defines how much time is allowed for Connect to open up a socket to the AWS API. Default: 10000 (=10 seconds)
  • Sync Policies with AWS Security Groups:
    When set to true, Connect will synchronize (export) the policies from all ‘managed’ policy domains to AWS security groups. It will create one security group for each policy from each ‘managed’ XMC policy domain.
  • Sync Policies with XMC end-system groups:
    When set to true, Connect will synchronize the policies from all managed policy domains to XMC end-system groups. It will create one end-system group for each policy from each managed XMC policy domain.
  • Assign AWS security groups based on XMC end-system groups:
    When set to true will assign EC2 instances interfaces to AWS security groups based on the end-system groups that the corresponding end-system is assigned to in XMC/EAC. The mapping between EC2 instance interface and XMC end-system is based on the MAC address
  • Overwrite XMC end-systems’ Device Family with instance machine type:
    If enabled, uses the instance type from AWS to overwrite the device family field for imported end-systems in XMC.
  • Create switches in XMC for AWS Subnetworks:
    If enabled, imports all subnets from AWS and tries to create one managed device (switch) per subnet in XMC.
  • Delete end-systems from XMC that have been deleted from AWS:
    If enabled, deletes the corresponding end-system from XMC if a AWS instance has been deleted. This actually deletes the end-system entry from NAC’s end-system list - not only the MAC address from any group!
  • End-system group for deleted AWS instances:
    If an instance or any of its network interfaces get deleted in AWS their corresponding end-systems will be pushed to this end-system group
  • Remove end-systems from other groups on decommission:
    Enable this to remove a device from all other groups when it is moved to the decommission group
  • Regularly auto-enforce policies to AWS:
    When enabled, Connect automatically verify whether the “managed” policy domains are correctly synchronized to the configured VPCs. This will ensure that your policy configuration is kept consistent with your security groups within AWS even is someone manually changes those “managed” security groups in AWS
  • Regularly auto-enforce:
    When enabled, Connect automatically verify whether the “managed” policy domains are correctly synchronized to the configured VPCs. This will ensure that your policy configuration is kept consistent with your security groups within AWS even is someone manually changes those “managed” security groups in AWS

Alarm and Event Messages

This chapter lists all customer visible event messages within XMC’s “Alarms & Events” tabs. This Connect module doesn’t generate any alarms but only events. If you want to elevate some of those events to alarms and trigger additional actions, please use the Alarm Configuration feature within XMC.

Policy Verification

There are four types of events generated when Connect verifies policy domains with AWS security groups and XMC end-system groups.

Started Policy Verification with AWS

This event is triggered when the verification process is kicked off. This can occur manually through a domain verify or domain enforce (the verification is done automatically prior to enforcing) or automatically on each module poll cycle (when feature Regularly auto-enforce policies to AWS is enabled).

image16

Started Policy Verification with XMC End-System Groups

This event is triggered when the verification process is kicked off. This can occur manually through a domain verify or domain enforce (the verification is done automatically prior to enforcing) or automatically on each module poll cycle (when feature Regularly auto-enforce policies to XMC End-System Groups is enabled).

Example:

image17

Finished Policy Verification with AWS

This event is triggered when the verification process is finished. It will show the results of the verification.

Example 1: no change required:

image18

Example 2: A new policy (containing two rules) has been created on XMC but has not yet been sync’ed to AWS. This policy is missing in the configured managed AWS VPC network:

image19

Finished Policy Verification with XMC End-System Groups

This event is triggered when the verification process is finished. It will show the results of the verification.

Example 1: no change required:

image20

Example 2: A new policy has been created on XMC but has not yet been sync’ed to an XMC end-system group:

image21

Policy Enforcement

There are four types of events generated when Connect enforces policy domains with AWS security groups and XMC end-system groups.

Started Policy Enforcement with AWS

This event is triggered when the enforcement process is kicked off. This can occur manually through a domain enforce or automatically on each module poll cycle (when feature Regularly auto-enforce policies to AWS is enabled).

Example:

image22

Started Policy Enforcement with XMC End-System Groups

This event is triggered when the enforcement process is kicked off. This can occur manually through a domain enforce or automatically on each module poll cycle (when feature Regularly auto-enforce policies to XMC End-System Groups is enabled).

Example:

image23

Finished Policy Enforcement with AWS

This event is triggered when the enforcement process is finished. It will show the results of the verification.

Example 1: no change required:

image24

Example 2: A new policy (containing two rules) has been created on XMC Connect created 1 new security group within AWS:

image25

Finished Policy Enforcement with XMC End-System Groups

This event is triggered when the enforcement process is finished. It will show the results of the verification.

Example: A new policy has been created on XMC and has been enforced to an XMC end-system group. The name of that new end-system group is provided within the event text:

image26

Security Group Assignment

Whenever an XMC end-system that corresponds to an AWS instance is assigned to / removed from a managed XMC end-system group then the corresponding instance get its assigned security groups updated (to enforce the corresponding policy). To reflect that action, the following event is being logged:

image27

Viewing Data

This section provides information on where to find the data imported from AWS within XMC.

Viewing Device Data

The devices that are automatically created for each AWS subnet will contain the following data:

image28

  • Name: if the subnet has a “Name” tag defined in AWS, that is what will be used. If not, the AWS subnet id is used

  • Site: the XMC site location of the device region of the subnet

  • IP address: auto-generated IP that is NOT the real IP of that subnet!

  • Device Type: always shows AWS-Subnet

  • Family: always shows Cloud Service Platform

  • Location: zone that the subnet runs in

  • Contact: user configured name of the AWS account which holds this subnet

  • User Data 1: always shows cp=aws
    ( reference that this device originates from AWS)
  • User Data 2: AWS VPC id

  • User Data 3: AWS subnet id

  • Network OS: always shows Connect

You can easily filter the list of devices per region by sorting the list of devices by “Sites” and then clicking on the region name you want to filter for:

image29

Another way to simply filter for all devices generated based on AWS subnets is by filtering the list of devices “by Device Type” and then going to
Cloud Service Platfrom AWS-Subnet

image30

Viewing End-System Data

Within the end-system table you should see data on all end-systems that are based on imported AWS instances (from the configured accounts) within the two configured custom fields. In this example screenshots the default custom1 is used for general instance data and custom2 for identifying AWS data.

image31

image32

You will also be able to see the current status, IP address, site, hostname (public or private DNS name), device family (machine type), switch IP, switch nick name (AWS subnet) and port (zone & MAC of instance interface) within the standard table columns. The “Authentication Type” will always be set to “Auto-Tracking” to indicate the source of this data.

image33

Cloud Reports

Introduced with XMC v8.2, the AWS cloud report is part of the new “Multi-Cloud” dashboard within XMC’s “Network” area.

AWS Stats Report

The AWS specific Cloud Reports shows:

  • Statistics
  • Instance Distribution by AWS Account
  • Distribution of VMs per machine type (top 10)
  • Distribution of VMs per zone (top 10)
  • Distribution of VM interfaces per subnets (top 10)

image34

Instance List Report

The report shows the list of all AWS instances with some details on each VM:

image35

Published: May 2019

Extreme Networks, Inc.
145 Rio Robles
San Jose, California 95134
Phone / +1 408.579.2800
Toll-free / +1 888.257.3000

www.extremenetworks.com

© 2012–2014 Extreme Networks, Inc. All Rights Reserved.

AccessAdapt, Alpine, Altitude, BlackDiamond, Direct Attach, EPICenter, ExtremeWorks Essentials, Ethernet Everywhere, Extreme Enabled, Extreme Ethernet Everywhere, Extreme Networks, Extreme Standby Router Protocol, Extreme Turbodrive, Extreme Velocity, ExtremeWare, ExtremeWorks, ExtremeXOS, Go Purple Extreme Solution, ExtremeXOS ScreenPlay, ReachNXT, Ridgeline, Sentriant, ServiceWatch, Summit, SummitStack, Triumph, Unified Access Architecture, Unified Access RF Manager, UniStack, XNV, the Extreme Networks logo, the Alpinelogo, the BlackDiamond logo, the Extreme Turbodrive logo, the Summit logos, and the Powered by ExtremeXOS logo are trademarks or registered trademarks of Extreme Networks, Inc. or its subsidiaries in the United States and/or other countries.

sFlow is the property of InMon Corporation.

Specifications are subject to change without notice.

All other registered trademarks, trademarks, and service marks are property of their respective owners.

For additional information on Extreme Networks trademarks, see www.extremenetworks.com/company/legal/trademarks.