User's Guide

Table Of Contents
You can edit existing tree structures using the Import Tree Structure button. Importing a new CSV files
does not replace an existing tree structure; instead, you can use the commands add or delete at the end
of an import line to incrementally add or remove scope levels from the existing tree structure.
The add and remove commands must be added to each line, separated by a comma, after the Path
entry.
Examples:
folder,localhost,The Falls 1125,,Building,,US/Southeast/Alpharetta/Sanctuary Part/The
Falls 1125/Floor 2,add
folder,localhost,The Falls 1125,,Building,,US/Southeast/Alpharetta/Sanctuary Part/The
Falls 1125/Floor3,delete
Note
The add command is assumed when neither add or delete is used in a comma delimited file,
and add is included in the default exportable CSV file.
The path to the new folder must be present in the existing tree or be previously defined in the import
file. For example, in the previous example, the path US/Southeast/Alpharetta/Sanctuary
Park/The Falls 1125 must already exists. Here is how you define that path:
folder,localhost,US,,Country,,
folder,localhost,Southeast,,Region,,US
folder,localhost,Alpharetta,,City,,US/Southeast folder,localhost,Sanctuary
Park,,Campus,,US/Southeast/Alpharetta
folder,localhost,The Falls 1125,,Building,,US/Southeast/Alpharetta/Sanctuary Park
Once you have finished building your network tree, click the Apply button to save your changes. This
applies even when importing Auto-Placement rules with the Import Tree Structure button. You may
click the Reset button to revert back to your previous network tree configuration.
Security Profiles
Security profiles are used to define the security configurations of sanctioned wireless clients on your
wireless LAN. When a Security Profile is applied to your system, if the security thresholds for that
profile are exceeded, a security alarm is generated. This allows you to monitor network security issues
and address them in a timely manner. If there are no Security Profiles applied to your system, no
security alarms are generated.
View Security Profiles
To access security profiles, go to Configuration > Appliance Platform > Security Profiles. Existing
profiles are displayed in the right column.
Configuration
Tab Security Profiles
Extreme AirDefense User Guide for version 10.5. 509