ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices. Secure Access How-to User Series

Size: px
Start display at page:

Download "ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices. Secure Access How-to User Series"

Transcription

1 ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices Secure Access How-to User Series Author: Technical Marketing, Policy and Access, Security Business Group, Cisco Systems Date: January 2016

2 Table of Contents Table of Contents... 2 About This Guide... 3 Overview... 3 Using This Guide... 3 Components Used... 3 ISE Configuration for Device Administration... 4 Licensing Device Administration on ISE... 4 Enabling Device Administration on ISE... 4 Device Administration Work Center... 5 Network Device and Network Device Groups... 5 Identity Stores... 7 TACACS Profiles... 8 NX-OS Operator... 8 NX-OS Admin... 9 NX-OS Security... 9 TACACS Command Sets... 9 HelpDesk Commands... 9 Permit All Commands NX-OS Security Commands Device Admin Policy Sets NX-OS Configuration for TACACS TACACS+ Authentication and Fallback TACACS+ Command Authorization TACACS+ Command Accounting What s Next? Cisco Systems 2016 Page 2

3 About This Guide Overview Terminal Access Controller Access Control System Plus (TACACS+) is a client-server protocol that provides centralized security control for management access to routers and many types of network access devices. TACACS+ provides these AAA services: Authentication Who the users are Authorization What they are allowed to do Accounting Who did what and when This document provides configuration examples for TACACS+ with the Cisco Identity Services Engine (ISE) as the TACACS+ server and a Cisco NX-OS network device as the TACACS+ client. Using This Guide This guide divides the activities into two parts to enable ISE to manage administrative access for Cisco NX-OS based network devices. Part 1 Configure ISE for Device Administration Part 2 Configure Cisco NX-OS for TACACS+ Components Used The information in this document is based on the following software and hardware version: ISE VMware virtual appliance, Release 2.0 Cisco Nexus1000V (N1Kv) for VMware vsphere, Cisco NX-OS 5.2(1)SV3(1.10) It works on most of Cisco NX-OS devices. The materials in this document are created from the devices in a lab environment. All of the devices are started with a cleared (default) configuration. Cisco Systems 2016 Page 3

4 ISE Configuration for Device Administration Licensing Device Administration on ISE Device Administration (TACACS+) is licensed per deployment, but requires existing and valid ISE base or mobility licenses. Enabling Device Administration on ISE The Device Administration service (TACACS+) is not enabled by default in an ISE node. The first step is to enable it. Step 1 Step 2 Log in to the ISE admin web portal using one of the supported browsers. Navigate to Administration > System > Deployment. Select the check box next to the ISE node and click Edit. Step 3 Figure 1. ISE Deployment Page Under General Settings, scroll down and select the check box next to Enable Device Admin Service. Figure 2. ISE Deployment General Settings Cisco Systems 2016 Page 4

5 Step 4 Save the configuration. Device Administration Service is now enabled on ISE. Device Administration Work Center ISE 2.0 introduces Work Centers, each of which encompasses all the elements for a particular feature. Step 1 Go to Work Centers > Device Administration > Overview Figure 3. Device Administration Overview The Device Administration Overview provides the high-level steps for the Use Case. Network Device and Network Device Groups ISE provides powerful device grouping with multiple device group hierarchies. Each hierarchy represents a distinct and independent classification of network devices. Step 1 Navigate to Work Centers > Device Administration > Network Device Groups Figure 4. Network Device Groups Cisco Systems 2016 Page 5

6 Step 2 All Device Types and All Locations are default hierarchies provided by ISE. You may add your own hierarchies and define the various components in identifying a Network Device which can be used later in the Policy Conditions. After defining hierarchies, the Network Device Groups will look similar to the following: Figure 5. Network Device Group Tree View Step 3 Now, add an N1Kv as a Network Device. Go to Work Centers > Device Administration > Network Resources. Click Add to add a new Network Device DMZ_BLDO_N1Kv. Figure 6. Adding Network Device Enter the IP address of the Device and make sure to map the Location and Device Type for the Device. Finally, Enable the TACACS+ Authentication Settings and specify the Shared Secret. Cisco Systems 2016 Page 6

7 Identity Stores This section defines an Identity Store for the Device Administrators, which can be the ISE Internal Users and any supported External Identity Sources. Here uses Active Directory (AD), an External Identity Source. Step 1 Go to Administration > Identity Management > External Identity Stores > Active Directory. Click Add to define a new AD Joint Point. Specify the Join Point name and the AD domain name and click Submit. Figure 3. Adding AD Join Point Step 2 Click Yes when prompted Would you like to Join all ISE Nodes to this Active Directory Domain? Input the credentials with AD join privileges, and Join ISE to AD. Check the Status to verify it operational. Figure 4. Joining ISE to AD Step 3 Go to the Groups tab, and click Add to get all the groups needed based on which the users are authorized for the device access. The following example shows the groups used in the Authorization Policy in this guide Figure 5. AD Groups Cisco Systems 2016 Page 7

8 TACACS Profiles The Cisco TACACS+ implements cisco-av-pair, a vendor-specific attribute (VSA) option in the Internet Engineering Task Force (IEFT) specification, in the format protocol : attribute separator value * When Cisco NX-OS devices use TACACS+ for authentication, the TACACS+ server returns user attributes along with authentication results, in Cisco VSAs. For TACACS+ authentications, the Cisco NX-OS software supports: Shell as the protocol in access-accept packets to provide user profile information. Roles as the attribute in access-accept packets to list all the roles to which the user belongs. The role names are delimited by white spaces. Each user role contains one or more rules that define the operations allowed for the users assigned to the role. Each user can have multiple roles so to execute a combination of all commands permitted by the roles. The predefined roles on NX-OS devices differ among NX-OS platforms. Two common ones are: network-admin predefined network admin role has complete read-and-write access to all commands on the switch; available in the default virtual device context (VDC) only if the devices (e.g. Nexus 7000) have multiple VDCs. Use NX-OS CLI command show cli syntax roles network-admin to see the full command list available for this role. network-operator predefined network admin role has complete read access to all commands on the switch; available in the default VDC only if the devices (e.g. Nexus 7000) have multiple VDCs. Use NX-OS CLI command show cli syntax roles network-operator to see the full command list available for this role. The recent NX-OS releases allow to create up to 64 user-defined roles in a VDC. User-defined user roles, by default, permit access to the commands show, exit, end, and configure terminal only, so we need to add rules and role features to grand additional access. To see the list of commands allowed by each role feature, issue NX-OS CLI show role feature name <feature-name>. To see that for all role features, issue NX-OS CLI show role feature detail. The following example shows what available for the feature interface: N1Kv# show role feature name interface interface (Interface configuration commands) show interface * config t ; interface * If TACACS+ users have the same user names defined locally on the Cisco NX-OS device, the Cisco NX-OS software applies the user roles for the local user accounts but not those configured on the TACACS+ server. We will define three TACACS Profiles NX-OS Operator, NX-OS Admin, and NX-OS Security. NX-OS Operator Step 4 On the ISE Administrative Web Portal, go to Work Centers > Device Administration > Policy Results > TACACS Profiles. Add a new TACACS Profile and name it NX-OS Operator. Step 5 Scroll down to the Custom Attributes section to add the attribute as: Cisco Systems 2016 Page 8

9 Step 6 Step 7 Step 8 Type Name Value Mandatory shell:roles network-operator Click the check mark at the end of the entry to keep the line. Click the tab [ Raw View ], and it shows: Profile Attributes shell:roles=network-operator Click Submit to save the profile. NX-OS Admin Step 9 Step 10 Step 11 Step 12 Step 13 Add another profile and name it NX-OS Admin. Scroll down to the Custom Attributes section to add the attribute as: Type Name Value Mandatory shell:roles network-admin Click the check mark at the end of the entry to keep the line. Click the tab [ Raw View ], and it shows: Profile Attributes shell:roles=network-admin Click Submit to save the profile. NX-OS Security Step 14 On the ISE Administrative Web Portal, go to Work Centers > Device Administration > Policy Results > TACACS Profiles. Add a new TACACS Profile and name it NX-OS Operator. Step 15 Scroll down to the Custom Attributes section to add the attribute as: Type Name Value Mandatory shell:roles network-operator demo-security We enclose the value with double quotes because it has two role names, which are separated by a space character. The role demo-security is a user-defined role and will be configured later on the NX-OS device. Step 16 Click the check mark at the end of the entry to keep the line. Step 17 Click the tab [ Raw View ], and it shows: Profile Attributes shell:roles= network-operator demo-security Step 18 Click Submit to save the profile. TACACS Command Sets NX-OS command authorization queries the configured TACACS+ server to verify whether the Device Administrators are authorized to issue the commands. NX-OS normally authorizes on user roles. To fine tune available commands, ISE can provide a list of commands granted to the users. We define three commands sets -- HelpDesk_Commands, Permit_All_Commands, and NX-OS_Security_Commands. HelpDesk Commands This is the same as that in the guide for IOS devices. Please skip this section if it already defined. Cisco Systems 2016 Page 9

10 Step 19 On the ISE Administrative Web Portal, go to Work Centers > Device Administration > Policy Results > TACACS Command Sets. Add a new set and name it HelpDesk_Commands. Step 20 Click +Add to configure entries to the set: Grant Command Argument PERMIT debug PERMIT undebug PERMIT traceroute DENY ping ^([0-9]{1,3})\.([0-9]{1,3})\.([0-9]{1,3})\.255$ PERMIT ping PERMIT show We allow helpdesk analysts to perform debug, undebug, traceroute, and show. For ping, they are restricted from broadcast pings, assuming the network subnets with broadcast addresses ending with.255, as shown in the regular expression in the argument column. Step 21 Step 22 Click the check mark at the end of each entry to keep the line. Click Save to persist the command set. Permit All Commands This is the same as that in the guide for IOS devices. Please skip this section if it already defined. Step 23 Step 24 Step 25 Add a new set and name it Permit_All_Commands. Tick the checkbox next to Permit any command that is not listed below, and leave the command list empty. Grant Command Argument Click Save to persist the command set. NX-OS Security Commands Step 26 On the ISE Administrative Web Portal, go to Work Centers > Device Administration > Policy Results > TACACS Command Sets. Add a new set and name it NX-OS_Security_Commands. Step 27 Tick the checkbox next to Permit any command that is not listed below. Step 28 Click +Add to configure entries to the set: Grant Command Argument DENY interface mgmt0 DENY interface control0 We allow security analysts to execute any commands other than to configure interfaces mgmt0 and control0. Step 29 Click the check mark at the end of each entry to keep the line. Step 30 Click Save to persist the command set. Cisco Systems 2016 Page 10

11 Device Admin Policy Sets Policy Sets are enabled by default for Device Administration. Policy Sets can divide polices based on the Device Types so to ease application of TACACS profiles. For example, Cisco IOS devices use Privilege Levels and/or Command Sets whereas Cisco NX-OS devices use Custom Attributes. Step 1 Navigate to Work Centers > Device Administration > Device Admin Policy Sets. Add a new Policy Set NX-OS Devices: S Name Description Conditions NX-OS Devices DEVICE:Device Type EQUALS Device Type#All Device Types#Network Devices#NX-OS Devices Figure 6. Policy Set Condition Step 2 Create the Authentication Policy. For Authentication, we use the AD as the ID Store. Authentication Policy Default Rule (if no match) : Allow Protocols : Default Device Administration and use: demoad Figure 7. Authentication Policy Step 3 Define the Authorization Policy. Here we define the authorization policy based on the user groups in AD and the location of the device. For example, the users in AD group West Coast can access only the devices located in West Coast. S Rule Name Conditions Command Sets Shell Profiles HelpDesk DEVICE:Location CONTAINS All West Locations#West_Coast securitydemo.net/demogroups/west_coast HelpDesk_Commands NX-OS Operator HelpDesk East Security West securitydemo.net/demogroups/helpdesk DEVICE:Location CONTAINS All Locations#East_Coast securitydemo.net/demogroups/east_coast securitydemo.net/demogroups/helpdesk DEVICE:Location CONTAINS All Locations#West_Coast securitydemo.net/demogroups/west_coast securitydemo.net/demogroups/security_operators HelpDesk_Commands NX-OS_Security_Commands NX-OS Operator NX-OS Admin Cisco Systems 2016 Page 11

12 S Rule Name Conditions Command Sets Shell Profiles Security DEVICE:Location CONTAINS All East Locations#East_Coast securitydemo.net/demogroups/east_coast NX-OS_Security_Commands NX-OS Admin Admin West Admin East securitydemo.net/demogroups/security_operators DEVICE:Location CONTAINS All Locations#West_Coast securitydemo.net/demogroups/west_coast securitydemo.net/demogroups/network_operators DEVICE:Location CONTAINS All Locations#East_Coast securitydemo.net/demogroups/east_coast securitydemo.net/demogroups/network_operators Default if no matches, then DenyAllCommands Figure 8. Authorization Policy Permit_All_Commands Permit_All_Commands NX-OS Admin NX-OS Admin We are now done with the ISE configuration for Device Administration for NX-OS devices. Cisco Systems 2016 Page 12

13 NX-OS Configuration for TACACS+ SSH is enabled by default on Cisco NX-OS devices so we need only to ensure proper IP addressing for the management interface, before configuring TACACS+. ip domain-name securitydemo.net switchname N1Kv interface mgmt0 ip address /24 no shutdown vrf context management ip route / !!! disable DNS lookup!!! no ip domain-lookup!!! VLANs!!!! vlan 100 name mgt!!! Define VTY access!!! ip access-list vtyaccess 10 permit tcp / /32 eq deny ip any any line console exec-timeout 0 line vty access-class vtyaccess in Since we have a valid IP address for the above sample network device at this stage, we can SSH to this NX-OS device from a client in /24. Note that we disable EXEC timeout for CONSOLE so to avoid possible access issue during AAA configuration. TACACS+ AAA on a Cisco NX-OS device can be configured in the following sequence: 1. Enable TACACS+ Authentication and Fallback 2. Enable TACACS+ Command Authorization 3. Enable TACACS+ Command Accounting Cisco Systems 2016 Page 13

14 TACACS+ Authentication and Fallback TACACS+ authentication can be enabled with a configuration similar to the following: tacacs+ enable role name demo-security description A user-defined role example for demo purposes rule 10 permit read-write feature interface interface policy deny permit interface Vethernet1 tacacs-server host key ISEisC00L timeout 10 tacacs-server host test username tp-test password tp-test idle-time 60 aaa group server tacacs+ demotg server deadtime 10 use-vrf management source-interface mgmt 0 aaa authentication login ascii-authentication aaa authentication login default group demotg aaa authentication login console local We have thus switched to TACACS+ to authenticate the VTY lines. Since no TACACS+ command authorization yet, the TACACS+ users are currently authorized based on their user roles. In the events that the configured TACSACS+ server becomes unavailable, the login authentication falls back to use the local user database. TACACS+ Command Authorization This is optional, as users can be authorized on their roles. TACACS+ Command Authorization for the configuration mode and for the EXEC mode can be enabled by adding the following: aaa authorization config-commands default group demotg local aaa authorization commands default group demotg local TACACS+ Command Accounting Command accounting sends info about each command executed, which includes the command, the date, and the username. The following adds to the previous configuration example to enable this accounting feature: aaa accounting default group demotg We are done with the NX-OS configuration for TACACS+. Cisco Systems 2016 Page 14

15 What s Next? Configuration for Device Administration for Cisco NX-OS is completed. We will need to validate the configuration. Step 1 Step 2 Step 3 SSH and log into the NX-OS devices as various roles. Once on the device command-line interface (CLI), verify that the user has access to the right commands. For example, a Helpdesk user should be able to ping a regular IP address (e.g ) but denied to ping a broadcast address (e.g ). To show the user connections and role(s), issue show users show user-account [<user-name>] A sample output is shown below: N1Kv# show users NAME LINE TIME IDLE PID COMMENT admin ttys0 Jan 11 02: hellen pts/0 Jan 11 02: ( ) session=ssh * N1Kv# show user-account hellen user:hellen roles:network-operator account created through REMOTE authentication Credentials such as ssh server key will be cached temporarily only for this user account Local login not possible... Step 4 The following debugs are useful in troubleshooting TACACS+: debug tacacs+ aaa-request Here is a sample debug output: 2016 Jan 11 03:03: tacacs[6288]: process_aaa_tplus_request:checking for state of mgmt0 port with servergroup demotg 2016 Jan 11 03:03: tacacs[6288]: process_aaa_tplus_request: Group demotg found. corresponding vrf is management 2016 Jan 11 03:03: tacacs[6288]: process_aaa_tplus_request: checking for mgmt0 vrf:management against vrf:management of requested group 2016 Jan 11 03:03: tacacs[6288]: process_aaa_tplus_request:port_check will be done 2016 Jan 11 03:03: tacacs[6288]: state machine count Jan 11 03:03: tacacs[6288]: is_intf_up_with_valid_ip(1258):proper IOD is found Jan 11 03:03: tacacs[6288]: is_intf_up_with_valid_ip(1261):port is up Jan 11 03:03: tacacs[6288]: debug_av_list(797):printing list 2016 Jan 11 03:03: tacacs[6288]: 35 : 4 : ping 2016 Jan 11 03:03: tacacs[6288]: 36 : 12 : Jan 11 03:03: tacacs[6288]: 36 : 4 : <cr> 2016 Jan 11 03:03: tacacs[6288]: debug_av_list(807):done printing list, exiting function 2016 Jan 11 03:03: tacacs[6288]: tplus_encrypt(659):key is configured for this aaa sessin Jan 11 03:03: tacacs[6288]: num_inet_addrs: 1 first s_addr: s6_addr : 0a01:64b4:: 2016 Jan 11 03:03: tacacs[6288]: non_blocking_connect(259):interface ip_type: IPV Jan 11 03:03: tacacs[6288]: non_blocking_connect(369): Proceeding with bind 2016 Jan 11 03:03: tacacs[6288]: non_blocking_connect(388): setsockopt success error:22 Cisco Systems 2016 Page 15

16 2016 Jan 11 03:03: tacacs[6288]: non_blocking_connect(489): connect() is in-progress for server Jan 11 03:03: tacacs[6288]: tplus_decode_authen_response: copying hostname into context Step 5 From the ISE GUI, navigate to Operations > TACACS Livelog. All the TACACS authentication and authorization requests are captured here, and the details button provides detailed information about why a particular transaction passed/failed. Figure 9. TACACS Livelogs Step 6 For historic reports: Go to Work Centers > Device Administration > Reports > Device Administration to get the authentication, authorization, and accounting reports. Cisco Systems 2016 Page 16

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations

PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations PT Activity: Configure Cisco Routers for Syslog, NTP, and SSH Operations Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

Using LiveAction with Cisco Secure ACS (TACACS+ Server)

Using LiveAction with Cisco Secure ACS (TACACS+ Server) LiveAction Application Note Using LiveAction with Cisco Secure ACS (TACACS+ Server) September 2012 http://www.actionpacked.com Table of Contents 1. Introduction... 1 2. Cisco Router Configuration... 2

More information

Send document comments to nexus7k-docfeedback@cisco.com.

Send document comments to nexus7k-docfeedback@cisco.com. CHAPTER 4 This chapter describes how to configure the Domain Name Server (DNS) client. This chapter includes the following sections: Information About DNS Clients, page 4-1 Licensing Requirements for DNS

More information

ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example

ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example Document ID: 113571 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information

More information

Lab 8.3.1.2 Configure Basic AP Security through IOS CLI

Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following

More information

Device Interface IP Address Subnet Mask Default Gateway

Device Interface IP Address Subnet Mask Default Gateway Felix Rohrer Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway S1 VLAN 99 192.168.99.11 255.255.255.0 192.168.99.1 S2 VLAN 99 192.168.99.12 255.255.255.0 192.168.99.1

More information

Configuring CSS Remote Access Methods

Configuring CSS Remote Access Methods CHAPTER 11 Configuring CSS Remote Access Methods This chapter describes how to configure the Secure Shell Daemon (SSH), Remote Authentication Dial-In User Service (RADIUS), and the Terminal Access Controller

More information

Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client

Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Topology Note: ISR G2 devices have Gigabit Ethernet interfaces instead of FastEthernet Interfaces. All contents are Copyright 1992 2012

More information

Configuring the Firewall Management Interface

Configuring the Firewall Management Interface Configuring the Firewall Management Interface The firewall management interface can be configured under each firewall context to provide a virtualized management interface (see Figure 7). The management

More information

Cisco TrustSec How-To Guide: Guest Services

Cisco TrustSec How-To Guide: Guest Services Cisco TrustSec How-To Guide: Guest Services For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...

More information

Firewall Authentication Proxy for FTP and Telnet Sessions

Firewall Authentication Proxy for FTP and Telnet Sessions Firewall Authentication Proxy for FTP and Telnet Sessions First Published: May 14, 2003 Last Updated: August 10, 2010 Before the introduction of the Firewall Authentication Proxy for FTP and Telnet Sessions

More information

Basic System. Vyatta System. REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging VYATTA, INC.

Basic System. Vyatta System. REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging VYATTA, INC. VYATTA, INC. Vyatta System Basic System REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com

More information

F-SECURE MESSAGING SECURITY GATEWAY

F-SECURE MESSAGING SECURITY GATEWAY F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE

More information

HTTP 1.1 Web Server and Client

HTTP 1.1 Web Server and Client HTTP 1.1 Web Server and Client Finding Feature Information HTTP 1.1 Web Server and Client Last Updated: August 17, 2011 The HTTP 1.1 Web Server and Client feature provides a consistent interface for users

More information

- The PIX OS Command-Line Interface -

- The PIX OS Command-Line Interface - 1 PIX OS Versions - The PIX OS Command-Line Interface - The operating system for Cisco PIX/ASA firewalls is known as the PIX OS. Because the PIX product line was acquired and not originally developed by

More information

How To - Implement Clientless Single Sign On Authentication with Active Directory

How To - Implement Clientless Single Sign On Authentication with Active Directory How To Implement Clientless Single Sign On in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable Version:

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Lab 9.1.1 Organizing CCENT Objectives by OSI Layer

Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Objectives Organize the CCENT objectives by which layer or layers they address. Background / Preparation In this lab, you associate the objectives of

More information

Objectives. Background. Required Resources. CCNA Security

Objectives. Background. Required Resources. CCNA Security Chapter 8 Lab B, Configuring a Remote Access VPN Server and Client Topology IP Addressing Table Device Interface IP Address Subnet Mask Default Gateway Switch Port R1 FA0/1 192.168.1.1 255.255.255.0 N/A

More information

NetIQ Advanced Authentication Framework - MacOS Client

NetIQ Advanced Authentication Framework - MacOS Client NetIQ Advanced Authentication Framework - MacOS Client Installation Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 About MacOS Client 4 System Requirements

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example

Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example Telnet, Console and AUX Port Passwords on Cisco Routers Configuration Example Document ID: 45843 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure Passwords

More information

How to Configure an Initial Installation of the VMware ESXi Hypervisor

How to Configure an Initial Installation of the VMware ESXi Hypervisor How to Configure an Initial Installation of the VMware ESXi Hypervisor I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide

More information

Configuring Auto Policy-Based Routing

Configuring Auto Policy-Based Routing This chapter describes how to configure the Auto Policy-Based Routing (PBR) feature on the Citrix NetScaler Application Delivery Controller (ADC) appliance to ensure that return traffic from the real server

More information

Configuring the Content Routing Software

Configuring the Content Routing Software CHAPTER 2 This chapter describes the basic steps for configuring the Content Router software. Performing a Basic Startup Configuration After you physically install the Content Router hardware, configure

More information

You can specify IPv4 and IPv6 addresses while performing various tasks in this feature. The resource

You can specify IPv4 and IPv6 addresses while performing various tasks in this feature. The resource The feature enables the configuration of a Virtual Private Network (VPN) routing and forwarding instance (VRF) table so that the domain name system (DNS) can forward queries to name servers using the VRF

More information

Using the Advanced GUI

Using the Advanced GUI This chapter contains the following sections: Toggling Between Basic and Advanced GUI Modes, page 1 About Getting Started with APIC Examples, page 2 Switch Discovery with the APIC, page 2 Configuring Network

More information

Managing User Accounts

Managing User Accounts Managing User Accounts This chapter includes the following sections: Configuring Local Users, page 1 Active Directory, page 2 Viewing User Sessions, page 6 Configuring Local Users Before You Begin You

More information

Configuring SSH and Telnet

Configuring SSH and Telnet This chapter describes how to configure Secure Shell Protocol (SSH) and Telnet on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information About

More information

Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series

Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series Good MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Imran Bashir Date: December 2012 Table of Contents Mobile Device Management (MDM)... 3 Overview... 3

More information

Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5

Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5 Configuring Devices for Use with Cisco Configuration Professional (CCP) 2.5 Objectives Part 1: Configure CCP Access for Routers Enable HTTP/HTTPS server. Create a user account with privilege level 15.

More information

Web Authentication Proxy on a Wireless LAN Controller Configuration Example

Web Authentication Proxy on a Wireless LAN Controller Configuration Example Web Authentication Proxy on a Wireless LAN Controller Configuration Example Document ID: 113151 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Proxy on

More information

From Release 8.0, IPv6 can also be used to configure the LDAP server on the controller.

From Release 8.0, IPv6 can also be used to configure the LDAP server on the controller. Information About LDAP, page 1 (GUI), page 2 (CLI), page 4 Information About LDAP An LDAP backend database allows the controller to query an LDAP server for the credentials (username and password) of a

More information

Cisco ISE Command-Line Interface

Cisco ISE Command-Line Interface This chapter provides information on the Cisco Identity Services Engine (Cisco ISE) command-line interface (CLI) that you can use to configure and maintain Cisco ISE. Cisco ISE Administration and Configuration

More information

Installing and Using the vnios Trial

Installing and Using the vnios Trial Installing and Using the vnios Trial The vnios Trial is a software package designed for efficient evaluation of the Infoblox vnios appliance platform. Providing the complete suite of DNS, DHCP and IPAM

More information

Configuring Password Encryption

Configuring Password Encryption This chapter describes how to configure password encryption on Cisco NX-OS devices. This chapter includes the following sections: Information About Password Encryption, page 1 Licensing Requirements for

More information

Configuring RADIUS Authentication for Device Administration

Configuring RADIUS Authentication for Device Administration Common Application Guide (CAG) Configuring RADIUS Authentication for Device Administration Introduction Configuring RADIUS Authentication for Device Administration The use of AAA services (Authentication,

More information

Network Load Balancing

Network Load Balancing Network Load Balancing Step by Step installation of Network Load Balancing in Windows Server 2008 R2. Prerequisite for NLB Cluster 1. Log on to NODE1 Windows Server 2008 R2 system with a domain account

More information

Configuring Password Encryption

Configuring Password Encryption This chapter describes how to configure password encryption on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information About Password Encryption,

More information

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these

More information

NetSpective Global Proxy Configuration Guide

NetSpective Global Proxy Configuration Guide NetSpective Global Proxy Configuration Guide Table of Contents NetSpective Global Proxy Deployment... 3 Configuring NetSpective for Global Proxy... 5 Restrict Admin Access... 5 Networking... 6 Apply a

More information

Managing User Accounts

Managing User Accounts Managing User Accounts This chapter includes the following sections: Active Directory, page 1 Configuring Local Users, page 3 Viewing User Sessions, page 5 Active Directory Active Directory is a technology

More information

Providing Credentials

Providing Credentials ManageEngine DeviceExpert Tutorial Providing Credentials (With Explanatory Screenshots for Each Device Type) Overview After adding the devices to the DeviceExpert inventory, you need to provide device

More information

On-boarding and Provisioning with Cisco Identity Services Engine

On-boarding and Provisioning with Cisco Identity Services Engine On-boarding and Provisioning with Cisco Identity Services Engine Secure Access How-To Guide Series Date: April 2012 Author: Imran Bashir Table of Contents Overview... 3 Scenario Overview... 4 Dual SSID

More information

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including

More information

Dynamic DNS How-To Guide

Dynamic DNS How-To Guide Configuration Guide Dynamic DNS How-To Guide Overview This guide will show you how to set up a Dynamic DNS host name under the D-Link DDNS service with your D-Link ShareCenter TM. Dynamic DNS is a protocol

More information

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above. Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A

More information

Configuring the Cisco Secure PIX Firewall with a Single Intern

Configuring the Cisco Secure PIX Firewall with a Single Intern Configuring the Cisco Secure PIX Firewall with a Single Intern Table of Contents Configuring the Cisco Secure PIX Firewall with a Single Internal Network...1 Interactive: This document offers customized

More information

Lab 7.2.9 Load Balancing Across Multiple Paths

Lab 7.2.9 Load Balancing Across Multiple Paths Lab 7.2.9 Load Balancing Across Multiple Paths Objective Configure Load balance across multiple paths. Observe the load balancing process. Background/Preparation Cable a network similar to the one in the

More information

Siteminder Integration Guide

Siteminder Integration Guide Integrating Siteminder with SA SA - Siteminder Integration Guide Abstract The Junos Pulse Secure Access (SA) platform supports the Netegrity Siteminder authentication and authorization server along with

More information

Lab 2 - Basic Router Configuration

Lab 2 - Basic Router Configuration CS326 Fall 2001 Room: PAI 5.48 Name: Lab 2 - Basic Router Configuration In this lab you will learn: the various configuration modes of Cisco 2621 routers how to set up IP addresses for such routers how

More information

Configuring a Leased Line

Configuring a Leased Line CHAPTER 4 Configuring a Leased Line The configuration in this chapter describes how to configure a Cisco 1700 router for IP and IPX over a synchronous serial line. Before You Begin The configuration in

More information

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router

1 Basic Configuration of Cisco 2600 Router. Basic Configuration Cisco 2600 Router 1 Basic Configuration of Cisco 2600 Router Basic Configuration Cisco 2600 Router I decided to incorporate the Cisco 2600 into my previously designed network. This would give me two seperate broadcast domains

More information

SevOne NMS Download Installation and Implementation Guide

SevOne NMS Download Installation and Implementation Guide SevOne NMS Download Installation and Implementation Guide 5.3.X 530 V0002 Contents 1. Get Started... 3 2. SevOne Download Installation... 6 3. Appliance Network Configuration... 9 4. Install License and

More information

Deployment Guide A10 Networks/Infoblox Joint DNS64 and NAT64 Solution

Deployment Guide A10 Networks/Infoblox Joint DNS64 and NAT64 Solution Deployment Guide A10 Networks/Infoblox Joint DNS64 and NAT64 Solution DG_ACC_062011.1 TABLE OF CONTENTS 1 Introduction... 3 2 Deployment Guide Overview... 3 3 Lab Setup Requirements... 3 4 Architecture

More information

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (

How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap ( WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...

More information

7750 SR OS System Management Guide

7750 SR OS System Management Guide 7750 SR OS System Management Guide Software Version: 7750 SR OS 10.0 R4 July 2012 Document Part Number: 93-0071-09-02 *93-0071-09-02* This document is protected by copyright. Except as specifically permitted

More information

Configuring Global Protect SSL VPN with a user-defined port

Configuring Global Protect SSL VPN with a user-defined port Configuring Global Protect SSL VPN with a user-defined port Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be Global Protect SSL VPN Overview This document gives you an overview on how to configure

More information

Configuring Basic Settings

Configuring Basic Settings CHAPTER 9 This chapter describes how to configure basic settings on your ASASM that are typically required for a functioning configuration. This chapter includes the following sections: Configuring the

More information

Enabling Remote Access to the ACE

Enabling Remote Access to the ACE CHAPTER 2 This chapter describes how to configure remote access to the Cisco Application Control Engine (ACE) module by establishing a remote connection by using the Secure Shell (SSH) or Telnet protocols.

More information

ICND1-100-101 IOS CLI Study Guide (CCENT)

ICND1-100-101 IOS CLI Study Guide (CCENT) ICND1-100-101 IOS CLI Study Guide (CCENT) Hostname: 2. hostname SW1 SWITCH CONFIGURATION Mgmt IP: 2. interface vlan 1 3. ip address 10.0.0.2 4. no shut Gateway: 2. ip default-gateway 10.0.0.1 Local User/Pwd:

More information

SOA Software API Gateway Appliance 7.1.x Administration Guide

SOA Software API Gateway Appliance 7.1.x Administration Guide SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,

More information

Geschreven door Administrator woensdag 13 februari 2013 17:37 - Laatst aangepast woensdag 13 februari 2013 18:05

Geschreven door Administrator woensdag 13 februari 2013 17:37 - Laatst aangepast woensdag 13 februari 2013 18:05 Nexus 1000V returns the control of networking back to network administrators so that there is a clear boundary between server administrators and network administrators. For small businesses, one administrator

More information

Configuring Sponsor Authentication

Configuring Sponsor Authentication CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five

More information

Using RADIUS Agent for Transparent User Identification

Using RADIUS Agent for Transparent User Identification Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 5 This chapter describes how to configure system message logging on Cisco NX-OS devices. This chapter includes the following sections: Information About System Message Logging, page 5-1 Licensing

More information

Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller

Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller August 2006 Contents Overview section on page 1 Configuring Guest Access on the Cisco Wireless LAN Controller section on page

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

Application Note. Using a Windows NT Domain / Active Directory for User Authentication NetScreen Devices 8/15/02 Jay Ratford Version 1.

Application Note. Using a Windows NT Domain / Active Directory for User Authentication NetScreen Devices 8/15/02 Jay Ratford Version 1. Application Note Using a Windows NT Domain / Active Directory for User Authentication NetScreen Devices 8/15/02 Jay Ratford Version 1.0 Page 1 Controlling Access to Large Numbers of Networks Devices to

More information

Skills Assessment Student Training Exam

Skills Assessment Student Training Exam Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (8 points, 5 minutes) Part 2: Configure Device Basic Settings (28 points, 30 minutes) Part 3: Configure

More information

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface

More information

Router Lab Reference Guide

Router Lab Reference Guide Router Lab Reference Guide 1 PURPOSE AND GOALS The routing lab allows testing different IP-related protocols and solutions in a close to live environment. You can learn how to configure Cisco routers and

More information

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access Integration Handbook Document Version 1.1 Released July 16, 2012 ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access

More information

NetBrain Discovery Appliance Manual

NetBrain Discovery Appliance Manual NetBrain Discovery Appliance Manual NetBrain Technologies, Inc. 2009-07-20-1 - Table of Contents 1. Overview... 4 2. Installation... 5 2.1 Installation Software... 5 2.1.1 Install ActivePerl... 5 2.1.2

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

NAC Guest. Lab Exercises

NAC Guest. Lab Exercises NAC Guest Lab Exercises November 25 th, 2008 2 Table of Contents Introduction... 3 Logical Topology... 4 Exercise 1 Verify Initial Connectivity... 6 Exercise 2 Provision Contractor VPN Access... 7 Exercise

More information

Configuring DNS. Finding Feature Information

Configuring DNS. Finding Feature Information The Domain Name System (DNS) is a distributed database in which you can map hostnames to IP addresses through the DNS protocol from a DNS server. Each unique IP address can have an associated hostname.

More information

Quick Start Guide. for Installing vnios Software on. VMware Platforms

Quick Start Guide. for Installing vnios Software on. VMware Platforms Quick Start Guide for Installing vnios Software on VMware Platforms Copyright Statements 2010, Infoblox Inc. All rights reserved. The contents of this document may not be copied or duplicated in any form,

More information

Wavelink Avalanche Mobility Center Java Console User Guide. Version 5.3

Wavelink Avalanche Mobility Center Java Console User Guide. Version 5.3 Wavelink Avalanche Mobility Center Java Console User Guide Version 5.3 Revised 17/04/2012 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway,

More information

Tracking Network Changes Using Change Audit

Tracking Network Changes Using Change Audit CHAPTER 14 Change Audit tracks and reports changes made in the network. Change Audit allows other RME applications to log change information to a central repository. Device Configuration, Inventory, and

More information

Lab Configuring Syslog and NTP (Instructor Version)

Lab Configuring Syslog and NTP (Instructor Version) (Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Objectives Device Interface IP Address Subnet Mask

More information

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces

More information

Configuring NTP. Information About NTP. NTP Overview. Send document comments to nexus7k-docfeedback@cisco.com. CHAPTER

Configuring NTP. Information About NTP. NTP Overview. Send document comments to nexus7k-docfeedback@cisco.com. CHAPTER 3 CHAPTER This chapter describes how to configure the Network Time Protocol (NTP) on Cisco NX-OS devices. This chapter includes the following sections: Information About NTP, page 3-1 Licensing Requirements

More information

Laboration 3 - Administration

Laboration 3 - Administration Laboration 3 - Administration During this laboration we will learn how to install, configure and test servers that will allow you to have access remote machines, copy files between computers and file sharing.

More information

NAT TCP SIP ALG Support

NAT TCP SIP ALG Support The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the

More information

DIGIPASS Authentication for Cisco ASA 5500 Series

DIGIPASS Authentication for Cisco ASA 5500 Series DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505 INTEGRATION GUIDE DIGIPASS Authentication for Cisco ASA 5505 Disclaimer DIGIPASS Authentication for Cisco ASA5505 Disclaimer of Warranties and Limitation of Liabilities All information contained in this

More information

Configuring the Switch with the CLI Setup Program

Configuring the Switch with the CLI Setup Program APPENDIXC Configuring the Switch with the CLI Setup Program This appendix provides a command-line interface (CLI) setup procedure for a standalone switch. To set up the switch by using Express Setup, see

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

Managing User Accounts

Managing User Accounts Managing User Accounts This chapter includes the following sections: Configuring Local Users, page 1 Active Directory, page 3 Viewing User Sessions, page 6 Configuring Local Users Before You Begin You

More information

Remote Management. Vyatta System. REFERENCE GUIDE SSH Telnet Web GUI Access SNMP VYATTA, INC.

Remote Management. Vyatta System. REFERENCE GUIDE SSH Telnet Web GUI Access SNMP VYATTA, INC. VYATTA, INC. Vyatta System Remote Management REFERENCE GUIDE SSH Telnet Web GUI Access SNMP Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada)

More information

- Basic Router Security -

- Basic Router Security - 1 Enable Passwords - Basic Router Security - The enable password protects a router s Privileged mode. This password can be set or changed from Global Configuration mode: Router(config)# enable password

More information

Network Monitoring User Guide Pulse Appliance

Network Monitoring User Guide Pulse Appliance Network Monitoring User Guide Pulse Appliance 2007 Belkin Corporation. All rights reserved. F1DUXXX All trade names are registered trademarks of respective manufacturers listed. Table of Contents Pulse

More information

User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1

User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1 The (UMT): Is a stand-alone Windows command-line application that performs migration in the granularity of a Unified ICM instance. It migrates only Unified ICM AD user accounts (config/setup and supervisors)

More information

Using Two-Factor Authentication Configuration to Combat Cybersecurity Threats

Using Two-Factor Authentication Configuration to Combat Cybersecurity Threats Using Two-Factor Authentication Configuration to Combat Cybersecurity Threats Guidelines for Deploying Cisco IOS SSH with X.509v3 PIV and CAC Smartcards Contents page Introduction 3 Requirements 3 Resolved

More information

School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management. Lab 4: Remote Monitoring (RMON) Operations

School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management. Lab 4: Remote Monitoring (RMON) Operations School of Information Technology and Engineering (SITE) CEG 4395: Computer Network Management Lab 4: Remote Monitoring (RMON) Operations Objective To become familiar with basic RMON operations, alarms,

More information

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved.

IP Addressing and Subnetting. 2002, Cisco Systems, Inc. All rights reserved. IP Addressing and Subnetting 2002, Cisco Systems, Inc. All rights reserved. 1 Objectives Upon completion, you will be able to: Discuss the Types of Network Addressing Explain the Form of an IP Address

More information