Self-Register & Self-Sponsor Solution (Validated )
|
|
|
- Jasper Mitchell
- 10 years ago
- Views:
Transcription
1 Self-Register & Self-Sponsor Solution (Validated ) Derin Mellor Aruba Networks Michael Clarke Secure Data Ltd CPPM v AOS v st July 2014 v 1.4 Overview... 3 Workflow... 4 Controller Configuration... 6 User-Roles... 6 User Session Timeout... 6 RADIUS Accounting & CoA... 7 CPPM Configuration... 8 Create Following Roles... 8 Create Following Enforcement Profiles RADIUS Based Enforcement profiles Session Restriction Enformcement profiles CPPM Guest and MAC Authentication Services CPPM Guest Service Update demo Guest MAC Caching Profile Update Roles and Enforcement to reflect new roles created Update demo Guest MAC Authentication Service... 20
2 Establishing the Sponsor state MAC Authentication Service Role Mapping Enforcement Policy CPPM Account Cleanup CPG Configuration Create a Self-Sponsored Receipt Create Guest Self-Registration Form Configure Self-Registration to send a Self-Sponsored Receipt Edit Registration s Forms& Views SMTP Configuration User Experience Registration State PreAuth State Sponsored State Account Expiry Administrator Guest Account Control CPG Active Account Disconnect CPG Active Account Reauthorize CPG Disable Guest Account CPG Delete Guest Account Extracting Guest Details... 54
3 Overview It is often requested to verify an address for auditing purposes. This can be problematic given our purpose is to limit network access to the user. There are two lines of thought with trying to get a user to validate their . Enforce validation. Restrict access to network unless the user validates their . The preauth role could be restricted in bandwidth, allowed ports and even certain websites. The user experience would be poor unless they validated the . We could also have a short timelimited access. Note: I cannot work out how to stop users continuously registering and getting the short time access. Encourage validation. Rather than restricting access and rights, we may want to encourage the user to validate their and reward them with an enhanced service such as higher bandwidth and opening of vpn ports. This could be useful for retail environments where we want to give the users access, but would like to engage further with the user if they actually go ahead and validate the . This How-To will focus on the first option and step you through granting someone limited short term access to check their , and verify the account. After sponsoring the registration, the account is expired and purged after 4 hours. You should change these values depending on your own requirements. It is largely based on How-to:_Sponsored_Self-Registration. Where you read sponsored, think validated. This solution should be considered as Beta and used with caution in a live environment. This solution does not represent an officially sanctioned Aruba solution, but is merely provided for reference purposes. There are probably alternative or better ways of achieving this. You should not deploy this in a live environment unless you have completely validated and understand it within a test environment. This may break your existing deployment. The authors of this solution take no responsibility whatsoever if it breaks your existing Clearpass, causes your controller to catch fire or makes your hair fall out.
4 Conceptual State Table Workflow This workflow articulates the Conceptual State Table show above: Device Unknown 1) Unknown device connects to Guest SSID 2) Controller forwards MAC Authentication to CPPM Registration 3) CPPM accepts MAC Authentication and assigns Registration captive portal OR CPPM reject MAC Authentication - unknown device This relies on Controller to assign the guest registration role automatically 4) Controller places Guest s device into Registration captive portal (demo-registration) This user-role has a redirect for HTTP/HTTPS traffic to CPPM s guest portal 5) Guest attempts to browse 6) Controller redirects web traffic to CPPM s guest portal 7) CPG presents the guest portal registration page 8) Guest fills in their name and address and submits 9) CPG s the login credentials to the guest (self-sponsor) and presents a login page
5 10) Guest accepts the login page HTTP Post to CPG 11) CPG redirects HTTP login to Controller 12) Controller converts the HTTP Post to a RADIUS Request with the necessary login details PreAuth 13) CPPM accepts the login: moves Device into a demo-preauth role This has internet access for a 10 minute grace period If the Guest is not (self)sponsored within 10 minutes: Device is disassociated from the WiFi and the guest account purged Device Unknown 14) Guest uses this "grace period" to access his/her 15) Guest "confirms" the s self-sponsorship This effectively validates the address 16) CPG receives the sponsor confirmation and update Insight with the information Sponsored 17) CPPM's Lazy Poller polls the Insight and realizes the Self-Sponsorship has occurred: Sends a CoA Disconnect to the Guest device associated NAS During testing the preauth session timeout was set to 5 mins to save time. The CoA seemed to be sent after 8-9 mins. This may have been due to such a short session timeout. Alternatively the Pre-Auth Session-Timeout occurs which as the same effect 18) Device re-associates 19) Controller forwards MAC authentication to CPPM 20) CPPM accepts device based on MAC Cache details Step 17) the Device is disassociated, if there is another available SSID they it will connect to this. If there is only one SSID it will re-associate with this and cause another authentication... NOTE: Subsequent MAC authentications within a state will remain in that state unless something has happened to the user account eg account deleted or disabled or expired.
6 Controller Configuration User-Roles The Controller, or equivalent, has to be configured with three specific user-roles: Registration: Only allows DHCP and DNS, redirects HTTP and HTTPS to CPG s guest authentication portal page Allows HTTP and HTTPS to CPG Redirect to CPG guest portal demo-registration: Only allows DHCP and DNS, redirects HTTP and HTTPS to CPG s guest authentication portal page. demo-preauth: Currently full access, but this could be restricted if needed. demo-sponsored: Allows for normal guest access to the internet. Currently same rights as preauth role. User Session Timeout The Controller must be configured to accept RADIUS Session-Timeout parameter from CPPM:
7 RADIUS Accounting & CoA The Controller must be configured with RADIUS Accounting. If using bandwidth control (not tested) Interim Accounting must also be configured. Need Change of Authorization enabled
8 CPPM Configuration Create Following Roles Create four new roles Unsponsored Device, PreAuth, Sponsored and Expired. These are used to determine the state of the Guest.
9
10 Create Following Enforcement Profiles Aruba RADIUS Enforcement profiles
11 RADIUS Based Enforcement profiles
12 Session Restriction Enformcement profiles
13 CPPM Guest and MAC Authentication Services Use the CPPM s Configuration Service Template Guest MAC Authentication to create the Captive Portal Authentication and MAC Authentication services. Enter the relevant vales and create the Service. CPPM Guest Service The Service s Enforcement has to be enhanced to differentiate between PreAuth and Sponsored states. Create new enforcement profiles to match the preauth and sponsored states. You should copy all the existing ones that were created above and change the details as per the screenshots and below table.
14
15
16 Enforcement Profile Name Details demo PreAuth Guest Bandwidth-Check:Allowed-Limit=0 Bandwidth Limit demo PreAuth Guest Do Expire demo PreAuth Guest Expire Post Login demo PreAuth Guest MAC Caching demo PreAuth Guest Session Limit Expiry-Check:Expiry- Action=%{GuestUser:do_expire} Expire-Time- Update:GuestUser=%{GuestUser:expire_postlogin} Endpoint:Username=%{Authentication:Username} Endpoint:Guest Role ID=4 Session-Check:Active-Session- Count=%{GuestUser:simultaneous_use} Post-Auth-Check:Action=Disconnect and block access Notes Unlimited. This may not work properly anyway if enforced due to 10 mins session timeout and interim accounting interval of 10 mins. This will update the Endpoint database with the appropriate role attributes. This is defined by the initial value specified when creating the service. It can be overridden with a
17 static value if need be. demo PreAuth Guest Session Timeout demo PreAuth Guest User Role demo Sponsored Guest Bandwidth Limit demo Sponsored Guest Do Expire demo Sponsored Guest Expire Post Login demo Sponsored Guest MAC Caching demo Additional Device Sponsored Guest MAC Caching demo Sponsored Guest Session Limit demo Sponsored Guest Session Timeout demo Sponsored Guest User Role Radius:IETF:Session-Timeout=600 Radius:Aruba:Aruba-User-Role=demo-preauth Bandwidth-Check:Allowed-Limit=0 Expiry-Check:Expiry-Action=Disable and Logout Endpoint:Username=%{Authentication:Username} Endpoint:Guest Role ID=5 Expire-Time- Update:GuestUser=%{GuestUser:expire_postlogin} Endpoint:Username=%{Endpoint:Username} Endpoint:Guest Role ID=5 Session-Check:Active-Session- Count=%{GuestUser:simultaneous_use} Post-Auth-Check:Action=Disconnect and block access Radius:IETF:Session-Timeout=1440 Radius:Aruba:Aruba-User-Role=demo-sponsored 10 mins to allow confirmation of . This will update the Endpoint database with the appropriate role attributes. This is for additional devices (if allowed) when logging in for first time. This is defined by the initial value specified when creating the service. It can be overridden with a static value if need be. 4 hours usage
18 Update demo Guest MAC Caching Profile Update Roles and Enforcement to reflect new roles created Policy Conditions Condition 1: Number of devices
19 Only allow one device per user. (This has been set to 3 at the moment for testing purposes) Condition 2: PreAuth This happens when a devices registers and then hits login. They get the preauth role with full access, but with a session-timeout of only 10 mins. NOTE: On testing the roles passed into CPPM s Enforcement Policy at initial login are both PreAuth and [Guest] I believe this is because [Guest] is inherent by the CPPM s guest account. Condition 3: Sponsored This will only be hit if an existing user attempts to login again by entering his username and password credentials this is unlikely due to the MAC Caching. Note: This will also apply if more than one device is allowed for each guest account. When a different device connects and uses a valid username/password, the demo Additional Device Guest MAC Caching with return Endpoint:Username=%{Authentication:Username}. Essentially, this will be the username that the device is using to login with. The endpoint has no value for remaining_expiration yet, so there is no session timeout value sent, though this will be updated in the next mac-auth. Default Condition [Deny Access Profile]
20 Update demo Guest MAC Authentication Service The primary challenge is to achieve MAC Caching for only Sponsored devices. The challenge with MAC Caching is the useful information about the recently authenticated guest resides in the Insightdb and the endpoint information resides in the tipsdb. Establishing the Sponsor state When the device connects the MAC Auth service needs to valid the Sponsor state. This exits in the Insightdb. CPPM already uses the IETF Calling StationID (MAC address) to extract the Endpoint:Username from the tipsdb. This name can then be used to search the Insightdb to extract the Sponsor state : We need to add an additional attribute to the Insight Repository. SELECT role_name AS sponsor FROM guests WHERE username = '%{Endpoint:Username}';
21 Remaining Session Timeout We also need to add an attribute to the demo MAC-Guest-Check Authorisation source. This will determine if the session has expired or not. SELECT CAST(EXTRACT(epoch FROM (expire_time - NOW())) AS INTEGER) AS remaining_expiration FROM tips_guest_users WHERE ((guest_type = 'USER') AND (user_id = '%{Endpoint:Username}') and (enabled = 't')) MAC-Expires attribute: Establishes the remaining time prior to the account expiring. Create a new ClearPass Enforcement Profile that returns the remaining session time within the RADIUS Session-Timeout attribute:
22 MAC Authentication Service This is much more important due to aggressive power saving by SmartDevices. Because of this we have to take into consideration the following scenarios: MAC Authentication during first time connect. MAC Authentication during PreAuth stage. MAC Authentication once sponsored (this includes the initial CoA). When the device causes a MAC Authentication it hits the following service: Set the Authentication to Allow All MAC Auth See Note NOTE: By default the sponsorship confirmation in CPPMv6.3 (beta) does not automatically change the associated device s Endpoint repository Sate from Unknown to Known. This can then be forced with the Enforcement Policy on the first successful MAC Authentication within the Sponsored state. Likewise the Guest Do Expire = 2: Disable and Logout at specified time this then relies on CPPM s CleanUp to purge sponsored accounts. The other consequence of this is that in the Registration state CPPM will assign the unknown device s role (rather than rely on the Controller).
23 Role Mapping Enforcement Policy
24 Policy Conditions Condition 1: Non-Expired Sponsored & Unknown Device first MAC Authentication after sponsorship. Note: Originally the role evaluation was set to Evaluate-all, but now set to First-applicable so this rule will probably never be hit, but has been left in. Update Endpoint Known and change attribute in Endpoint DB, RoleID=5 Send Aruba-User-Role=demo-sponsored. Send session-timeout= %{Authorization:demo MAC-Guest-Check:MAC-Expires} Username = %{Endpoint:Username} Condition 2: Non-Expired, sponsored & Unknown device Guest account that has been sponsored by a different device. This is not likely with a short Preauth session, but for longer sessions, this may be relevant. Basically, the account is validated with a different device on a different network (requires Clearpass is accessible, typically over internet). The original device connects, but it is still Unknown. Alternatively, this is the first mac-auth after sponsorship. Update Endpoint Known and change attribute in Endpoint DB, RoleID=5 Send Aruba-User-Role=demo-sponsored. Send session-timeout= demo sponsored session timeout (4 hours) Username = %{Endpoint:Username} Condition 3: Non-Expired, Sponsored & Known device a device that has registered and validated and has previously done a mac-auth and had endpoint marked as Known after hitting condition 2 above. Update Endpoint Known and change attribute in Endpoint DB, RoleID=5 Send Aruba-User-Role=demo-sponsored Send session-timeout= %{Authorization:demo MAC-Guest-Check:MAC-Expires} Username = %{Endpoint:Username} Condition 4: Non-Expired PreAuth Device a device that has registered but not validated , and does mac-auth within the 10 mins. Update Endpoint Unknown. Problems during testing with previously registered devices that had not registered and marked as Known. This ensures that only sponsored devices are marked as Known. Send Aruba-User-Role=demo-preauth Send session-timeout= %{Authorization:demo MAC-Guest-Check:MAC-Expires} Username = %{Endpoint:Username} Condition 5: Unknown Device Registration role
25 Update Endpoint Unknown. Problems during testing with previously registered devices that had not registered and marked as Known. This ensures that only sponsored devices are marked as Known. Send Aruba-User-Role=demo-registration Send session-timeout= 10 mins Condition 6: Expired device- Registration role. Update Endpoint Unknown. Problems during testing with previously registered devices that had not registered and marked as Known. This ensures that only sponsored devices are marked as Known. Send Aruba-User-Role-demo-registration Send session-timeout=10mins Default: [Deny Access Profile] CPPM Account Cleanup Cleaning up CPPM s Guest and Endpoint databases will be important to minimize excessively large obsolete guests and devices. These values may be different depending on the purpose of this solution and circumstances.
26 When the PreAuth Guest expires it is automatically deleted. But the Device in the Endpoint is not. To clean this up I reduce the Unknown endpoints cleanup interval = 1 day. Once a Guest and Device are registered I rely on CPPM s clean up rather than then Guest Do Expire and Guest Expire Post Login profile options. The Sponsored Guest are kept for a longer time so that their information can be exported via an Insight report.
27 CPG Configuration Create a Self-Sponsored Receipt In Configuration Print Templates duplicate the Sponsorship Confirmation template: Edit the Copy of Sponsorship Confirmation : Change the name to Self Confirmation : Edit the template as you see fit. The default wording is narrated towards a sponsor. Edit it to be towards the guest. At minimum, remove A visitor has requested access naming you as the sponsor. It is vital the link itself remain intact. <a href="{'guest_register_confirm.php' NwaGetAppUrl}?token={$u.register_token rawurlencode}" target="_blank">click here</a>
28 Edit the message to the visitor
29 Above shows what the self-sponsorship request looks like. This can be customized as required. Create Guest Self-Registration Form Create a guest self-registration in the normal manner in this example I use demo.
30 Configure Self-Registration to send a Self-Sponsored Receipt Setup for validated access is within the Receipt Actions section of a self-registration. Navigate to Configruation Guest Self-Registration Receipt Header Click Header under the Receipt Page: Edit the Receipt Header and append something along the lines of: <p> You are being ed a confirmation that you must click in order to gain complete access to the network. </p>
31
32 Actions Click Actions under the Receipt Page: Check Sponsorship Confirmation
33 A new section will appear: Make sure this is left blank Select the Self Confirmation printer template
34 Account will expire after 4 hours New user-role to assign
35 Edit Registration s Forms & Views Click Back to Guest Self Registration and then edit the demo page. Click on Form to edit the fields Note, previously in 6.2 we edited the guest_register form and changed the values there, but this didn t work when I tried, or rather it did not use this form.
36 Disable expire_after Disable here Insert After modify_expire_time Select expire_after and click Insert After. In the dropdown select modify_expire_time and allow the page to refresh.
37
38 Insert After do_expire
39 Edit role_id This will be the initial RoleID passed from CPG to CPPM 4 will map to PreAuth role
40 SMTP Configuration This is configured on CPPM: This can be tested from CPG:
41 If all working it will appear in you inbox:
42 User Experience Registration State Guest peers on to SSID Unknown MAC address assign Registration role: Controller: Guest attempts to browse
43 Controller redirects to CPG s Guest portal CPG respond with guest login screen Guest fills in page and submits At this point CPG sends an to the supplied address: CPG presents to the guest a login page: NOTE: This expires in 10 minutes Hitting Log In effectively assigns the PreAuth state. PreAuth State CPG Shows the account created with preauth role CPPM s AccessTracker reports the authentication:
44 CPPM applies the following PreAuth policy: Controller reports the User Role = demo-preauth = Captive Portal.
45 Device does a MAC auth before sponsoring. This is reported in CPPM The controller show the device authenticated with MAC auth but still with demo-preauth role.
46 Sponsored State The user, before their session expires, opens their and confirms their registration. The user is presented with new session details. NOTE: Account extended by 4 hours CPG now shows the account as sponsored.
47 Caution: On the controller, the user remains in the pre-auth state. It would appear that although in CPPM the device s session time has been extended, there has not been a CoA triggered by the sponsoring. The user s role will change with the next MAC auth or when the 10 mins has expired and a CoA sent. This could be resolved with a message on the user s screen saying to disconnect and connect again for full access. To be investigated further. Need to send a CoA upon the user sponsoring their device. A subsequent MAC auth by the client shows the user being put into the demo-sponsored role CPPM reports the MAC auth as such. With the output of
48 The controller now shows the user in a demo-sponsored role with MAC auth. CPPM Endpoint repository reports:
49 These are inserted by the MAC Caching profile
50 On reception of the Sponsorship Confirmation CPG updates the endpoints credentials. If the account s expiry time or enabled/disabled or role_id have changed CPPM will initiate a CoA that disconnects the device. Alas I have found this very unreliable in CPPMv6.3 Beta Thankfully, this CoA is not critical assuming the PreAuth role is similar/identical to the Sponsored role when the PreAuth state expires the device s account is already in a Sponsored state, the MAC Auth will automatically accept it. On subsequent connection the device will be in the Sponsored State. NOTE: This can cause problems if there is another available SSID device will connect to that.
51 Account Expiry If the device subsequently connects while the account has expired, it is blocked it and will be placed in the demo-registration role. If the account is disabled, this will trigger a CoA that will then put the device into the demo-registration role. If expired, then the Mac-Expires attribute has been purged and the device will hit the Expired role. This will be given the Expired role within CPPM. With the output as follows.
52
53 Administrator Guest Account Control CPG Active Account Disconnect This forces the device to disconnect. The device immediately performs a new MAC Authentication which is successful as no credentials have changed. CPG Active Account Reauthorize This allows you to dynamically change the role base on the CoA with a Filter-ID = role name. This works fine.
54 CPG Disable Guest Account Connected device is disconnected within 5 minutes. Believe this is related to the Lazy Poller? Note: This seems to happen straight away now, and the device reconnects and is marked as expired and given demo-registration role. CPG Delete Guest Account Connected device is disconnected within 5 minutes. Account is removed. The associated device in CPPM Endpoint Repository is not removed. Extracting Guest Details Use the CPG s Guest Export Accounts to CSV and process in Excel looking for Role=demosponsored.
ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE. Technical Note
ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE Technical Note Copyright 2013 Aruba Networks, Inc. Aruba Networks trademarks include, Aruba Networks, Aruba Wireless Networks, the registered Aruba the
WiNG5 CAPTIVE PORTAL DESIGN GUIDE
WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated
Cisco TrustSec How-To Guide: Guest Services
Cisco TrustSec How-To Guide: Guest Services For Comments, please email: [email protected] Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...
pfsense Captive Portal: Part One
pfsense Captive Portal: Part One Captive portal forces an HTTP client to see a special web page, usually for authentication purposes, before using the Internet normally. A captive portal turns a web browser
How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0
How to set up the HotSpot module with SmartConnect Panda GateDefender 5.0 Content Introduction... 3 Minimum requirements to enable the hotspot module... 4 Hotspot settings... 6 General settings....6 Configuring
Configure Guest Access
Cisco ISE Guest Services, page 1 Guest and Sponsor Accounts, page 2 Guest Portals, page 19 Sponsor Portals, page 31 Monitor Guest and Sponsor Activity, page 36 Guest Access Deployment Scenarios, page 37
On-boarding and Provisioning with Cisco Identity Services Engine
On-boarding and Provisioning with Cisco Identity Services Engine Secure Access How-To Guide Series Date: April 2012 Author: Imran Bashir Table of Contents Overview... 3 Scenario Overview... 4 Dual SSID
Training Module for Customer Portal & Customer Care. Enabling the Next Wave of Connectivity
Training Module for Customer Portal & Customer Care Customer Portal Interface used by the registered end user to interact with the network End user can modify Information, change Password & check the account,billing
Sonian Getting Started Guide October 2008
Sonian Getting Started Guide October 2008 Sonian, Inc. For Authorized Use Only 1 Create your new archiving account 3 Configure your firewall for IMAP collections 4 (Skip this step if you will be using
WEBROOT EMAIL ARCHIVING SERVICE. Getting Started Guide North America. The best security in an unsecured world. TM
WEBROOT EMAIL ARCHIVING SERVICE Getting Started Guide North America Webroot Software, Inc. World Headquarters 2560 55th Street Boulder CO 80301 USA www.webroot.com 800.870.8102 Table of Contents Create
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
Integrating Cisco ISE with GO!Enterprise MDM Quick Start
Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise
How to Configure Captive Portal
How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,
CLEARPASS ONGUARD CONFIGURATION GUIDE
CONFIGURATION GUIDE REVISION HISTORY Revised By Date Changes Dennis Boas July 2015 Version 1 initial release TABLE OF CONTENTS... 1 INTRODUCTION... 3 CONFIGURATION WORKFLOW... 4 CONFIGURE POSTURE POLICIES...
User-ID Best Practices
User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers
TrustSec How-To Guide: On-boarding and Provisioning
TrustSec How-To Guide: On-boarding and Provisioning For Comments, please email: [email protected] Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...
NAC Guest. Lab Exercises
NAC Guest Lab Exercises November 25 th, 2008 2 Table of Contents Introduction... 3 Logical Topology... 4 Exercise 1 Verify Initial Connectivity... 6 Exercise 2 Provision Contractor VPN Access... 7 Exercise
How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (
UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet
Securepoint Network Access Controller (NAC)
Securepoint Network Access Controller (NAC) Administration Guide Business Class Secure Mobility Version 1 2 Securepoint NAC Administration Guide 1 Table of contents 1 Table of contents... 2 2 Table of
Active Directory Self-Service FAQ
Active Directory Self-Service FAQ General Information: [email protected] Online Support: [email protected] CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
How to Configure Guest Management on the DWC-1000
Configuration Guide How to Configure Guest Management on the DWC-1000 Overview This guide describes how to configure and customize a billing profile and generate temporary user account on the D-Link DWC-1000
Frequently Asked Questions Aerohive ID Manager
Frequently Asked Questions Aerohive ID Manager About the Product... 1 Ordering FAQs... 4 Product Strategy... 6 About the Product 1. What is ID Manager? ID Manager is Aerohive s new cloud-based guest management
Managing Identities and Admin Access
CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Administration Guide. BlackBerry Enterprise Service 12. Version 12.0
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
Palo Alto Networks User-ID Services. Unified Visitor Management
Palo Alto Networks User-ID Services Unified Visitor Management Copyright 2011 Aruba Networks, Inc. Aruba Networks trademarks include Airwave, Aruba Networks, Aruba Wireless Networks, the registered Aruba
Welcome to EMP Monitor (Employee monitoring system):
Welcome to EMP Monitor (Employee monitoring system): Overview: Admin End. User End. 1.0 Admin End: Introduction to Admin panel. Admin panel log in. Introduction to UI. Adding an Employee. Getting and editing
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
A Guide to New Features in Propalms OneGate 4.0
A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously
Good MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
Good MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Imran Bashir Date: December 2012 Table of Contents Mobile Device Management (MDM)... 3 Overview... 3
Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.
Acunetix Web Vulnerability Scanner Getting Started V8 By Acunetix Ltd. 1 Starting a Scan The Scan Wizard allows you to quickly set-up an automated scan of your website. An automated scan provides a comprehensive
ClearPass Policy Manager
ClearPass Policy Manager V2 October 2013 Introduction With the release of ClearPass Policy Manager 6.2.0 in July 2013 we have continued to build on our previous industry leading functionality, now with
Web Page Redirect. Application Note
Web Page Redirect Application Note Table of Contents Background... 3 Description... 3 Benefits... 3 Theory of Operation... 4 Internal Login/Splash... 4 External... 5 Configuration... 5 Web Page Redirect
Getting Started Guide
Getting Started Guide Sophos Firewall Virtual Appliance Document Date: November 2015 November 2015 Page 1 of 20 Contents Preface...3 Minimum Hardware Requirement...3 Installation Procedure...3 Configuring
Chapter 9 Monitoring System Performance
Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important
When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.
Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using
About the VM-Series Firewall
About the VM-Series Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/
MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction.... 3 What Is the Cisco TrustSec System?...
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
ClearPass Policy Manager 6.x
ClearPass Policy Manager 6.x Tech Note: ClearPass Palo Alto Networks Integration with CPPM Version Date Modified By Comments 1.0 May 2013 Danny Jump Initial Integration Guide V1 2.0 June 2013 Danny Jump
This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:
CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access
ClearPass Policy Manager 6.1
ClearPass Policy Manager 6.1 Quick Start Guide Copyright Information Copyright 2013 Aruba Networks, Inc. Aruba Networks trademarks include the Aruba Networks logo, Aruba Networks, Aruba Wireless Networks,
Virtual Data Centre. User Guide
Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10
NXC5500/2500. Application Note. Captive Portal with QR Code. Version 4.20 Edition 2, 02/2015. Copyright 2015 ZyXEL Communications Corporation
NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note Captive Portal with QR Code Copyright 2015 ZyXEL Communications Corporation Captive Portal with QR Code What is Captive Portal with QR code?
DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12
DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration
XenMobile Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
XenMobile Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Aaron Woland Date: December 2012 Table of Contents Introduction... 3 What Is the Cisco TrustSec System?...
IP Filtering for Patton RAS Products
RAS Filtering: Applications and Functionality Security PLUS Service Differentiation Did you know you can use IP filtering to boost your revenues? Patton s Remote Access Server (RAS) provides IP Filtering
Guest Access with ArubaOS. Version 1.0
Version 1.0 Copyright 2012 Aruba Networks, Inc. AirWave, Aruba Networks, Aruba Mobility Management System, Bluescanner, For Wireless That Works, Mobile Edge Architecture, People Move. Networks Must Follow,
UAG Series. Application Note. Unified Access Gateway. Version 4.00 Edition 1, 04/2014. Copyright 2014 ZyXEL Communications Corporation
UAG Series Unified Access Gateway Version 4.00 Edition 1, 04/2014 Application Note Copyright 2014 ZyXEL Communications Corporation Table of Contents Scenario 1 How to Activate a Paid Access Hotspot...
qliqdirect Active Directory Guide
qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect
Using RD Gateway with Azure Multifactor Authentication
Using RD Gateway with Azure Multifactor Authentication We have a client that uses RD Gateway to allow users to access their RDS deployment from outside their corporate network. They have about 1000+ users.
USG40HE Content Filter Customization
USG40HE Content Filter Customization This guide is designed to help with the setup of the ZyWALL s content filtering feature. Supported Devices USG40HE Firmware version 4.10(AALA.0) or later Overview Content
Provisioning Visitor Accounts Using Cisco IP Phone Services
Provisioning Visitor Accounts Using Cisco IP Phone Services Unified Visitor Management amigopod Technical Note Revision 1.1 1 April 2010 United States of America +1 (888) 590-0882 Europe, Middle East &
BlackShield ID Best Practice
BlackShield ID Best Practice Implementation Guide for a Complex Network Document Scope This document is designed to demonstrate best practice when implementing and rolling out a two-factor authentication
Adobe Marketing Cloud Bloodhound for Mac 3.0
Adobe Marketing Cloud Bloodhound for Mac 3.0 Contents Adobe Bloodhound for Mac 3.x for OSX...3 Getting Started...4 Processing Rules Mapping...6 Enable SSL...7 View Hits...8 Save Hits into a Test...9 Compare
Chatter Answers Implementation Guide
Chatter Answers Implementation Guide Salesforce, Summer 16 @salesforcedocs Last updated: May 27, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
Web Authentication Application Note
What is Web Authentication? Web Authentication Application Note Web authentication is a Layer 3 security feature that causes the router to not allow IP traffic (except DHCP-related packets) from a particular
DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and
User Guide. Cloud Gateway Software Device
User Guide Cloud Gateway Software Device This document is designed to provide information about the first time configuration and administrator use of the Cloud Gateway (web filtering device software).
Chatter Answers Implementation Guide
Chatter Answers Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: October 16, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
UAG4100 Support Notes
2013 UAG4100 Support Notes CSO ZyXEL 2013/07/29 Table of Contents Scenario 1 Activate a Paid Access Hotspot... 2 Print ticket to access the Internet... 3 Pay with PayPal payment service to access the Internet...
c360 Portal Installation Guide
c360 Portal Installation Guide Microsoft Dynamics CRM 2011 compatible c360 Solutions, Inc. www.c360.com [email protected] Table of Contents c360 Portal Installation Guide... 1 Table of Contents... 2 Overview
The HSMX gateway is an internet access solution. It is suitable for small to very large networks and for free / charged or mixed internet access.
1. HSMX 4.6 manual 1.1 Introduction The HSMX gateway is an internet access solution. It is suitable for small to very large networks and for free / charged or mixed internet access. The system can be split
WatchGuard Dimension v1.1 Update 1 Release Notes
WatchGuard Dimension v1.1 Update 1 Release Notes Build Number 442674 Revision Date March 25, 2014 WatchGuard Dimension is the next-generation cloud-ready visibility solution for our Unified Threat Management
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
How to connect to NAU s WPA2 Enterprise implementation in a Residence Hall:
How to connect to NAU s WPA2 Enterprise implementation in a Residence Hall: General Settings To connect to the ResNet-Secure SSID, a device is needed that supports 802.1X authentication and WPA2 Enterprise.
GuestAir Administrators Guide
GuestAir Administrators Guide 1. Introduction 2. Companies 3. Users 4. Zones 5. SonicWALL Configuration 6. Emails 7. User Auth Logins 8. User Registration 9. Facebook Logins 10. Editing Templates 11. File
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0
Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual Document Version 1.0 Table of Contents 1 SWAF... 4 1.1 SWAF Features... 4 2 Operations and User Manual... 7 2.1 SWAF Administrator
D-Link Central WiFiManager Configuration Guide
Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install
Sophos Mobile Control SaaS startup guide. Product version: 6
Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8
User Identification (User-ID) Tips and Best Practices
User Identification (User-ID) Tips and Best Practices Nick Piagentini Palo Alto Networks www.paloaltonetworks.com Table of Contents PAN-OS 4.0 User ID Functions... 3 User / Group Enumeration... 3 Using
email-lead Grabber Business 2010 User Guide
email-lead Grabber Business 2010 User Guide Copyright and Trademark Information in this documentation is subject to change without notice. The software described in this manual is furnished under a license
Tenable for CyberArk
HOW-TO GUIDE Tenable for CyberArk Introduction This document describes how to deploy Tenable SecurityCenter and Nessus for integration with CyberArk Enterprise Password Vault. Please email any comments
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
Policy Based Encryption Gateway. Administration Guide
Policy Based Encryption Gateway Administration Guide Policy Based Encryption Gateway Admin Guide 1 Contents Description of Policy Based Encryption... 2 Policy Based Encryption and Email Content Control...
TREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide
TREENO ELECTRONIC DOCUMENT MANAGEMENT Administration Guide October 2012 Contents Introduction... 8 About This Guide... 9 About Treeno... 9 Managing Security... 10 Treeno Security Overview... 10 Administrator
Using DC Agent for Transparent User Identification
Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify
Customization & Enhancement Guide. Table of Contents. Index Page. Using This Document
Customization & Enhancement Guide Table of Contents Using This Document This document provides information about using, installing and configuring FTP Attachments applications provided by Enzigma. It also
KM Metering Inc. EKM Dash 1.8.3.0 User Manual. EKM Metering Inc. www.ekmmetering.com [email protected] (831)425-7371
EKM Dash 1..3.0 User Manual The EKM Dash is our desktop software solution for your meter data management. It is intended to give you the tools to easily visualize, log, email, and export your data in a
Password Reset PRO INSTALLATION GUIDE
Password Reset PRO INSTALLATION GUIDE This guide covers the new features and settings available in Password Reset PRO. Please read this guide completely to ensure a trouble-free installation. March 2009
ISSUE TRACK FOR WINDOWS INSTALLATION GUIDE VERSION 4.0.0.XX
ISSUE TRACK FOR WINDOWS INSTALLATION GUIDE VERSION 4.0.0.XX Contents CONTENTS Chapter 1 Introduction 1-1 Welcome to Issue Track for Windows 1-1 About this Guide 1-1 Product Name 1-1 Documentation Roadmap
Installation and Setup Guide
Installation and Setup Guide Contents 1. Introduction... 1 2. Before You Install... 3 3. Server Installation... 6 4. Configuring Print Audit Secure... 11 5. Licensing... 16 6. Printer Manager... 17 7.
Multi-Factor Authentication Job Aide
To start your account configuration and begin using Multi-Factor Authentication, log in to the CCHMC Multi-Factor Authentication User Portal at https://mfa.cchmc.org/multifactorauth. For assistance, please
DIGIPASS Authentication for SonicWALL SSL-VPN
DIGIPASS Authentication for SonicWALL SSL-VPN With VACMAN Middleware 3.0 2006 VASCO Data Security. All rights reserved. Page 1 of 53 Integration Guideline Disclaimer Disclaimer of Warranties and Limitations
CA Nimsoft Service Desk
CA Nimsoft Service Desk Configure Outbound Web Services 7.13.7 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject
2X Cloud Portal v10.5
2X Cloud Portal v10.5 URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
SECURE MESSAGING PLATFORM
SECURE MESSAGING PLATFORM WEB ADMIN CONSOLE ADMIN USER GUIDE Introduction... 2 Customer Management... 3 Dashboard... 3 User Account... 5 General & Feature Settings... 7 Secure Message Disclaimers... 9
DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007
DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft Outlook Web
DIGIPASS Authentication for Citrix Access Gateway VPN Connections
DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer
Stoneware Inc. Hyland Software OnBase. Stoneware, Inc.
Stoneware Inc. Hyland Software OnBase Stoneware, Inc. Configuration Sheet Date: March 2005 Introduction This document provides the information necessary to secure and provide single sign-on for Hyland
SOA Software API Gateway Appliance 7.1.x Administration Guide
SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,
INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)
INTEGRATION GUIDE DIGIPASS Authentication for Citrix NetScaler (with AGEE) Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';
SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel
SpamPanel Reseller Level Manual 1 Last update: September 26, 2014 SpamPanel Table of Contents Domains... 1 Add Domain... 2 MX verification Tool... 4 Overview... 5 Incoming... 6 Incoming Bandwidth Overview...
Student Manager s Guide to the Talent Management System
Department of Human Resources 50 Student Manager s Guide to the Talent Management System 1 Table of Contents Topic Page SYSTEM INTRODUCTION... 3 GETTING STARTED... 4 NAVIGATION WITHIN THE TALENT MANAGEMENT
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
DIGIPASS Authentication for GajShield GS Series
DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and
Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15
Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
Ajera 7 Installation Guide
Ajera 7 Installation Guide Ajera 7 Installation Guide NOTICE This documentation and the Axium software programs may only be used in accordance with the accompanying Axium Software License and Services
Certificate Management
Certificate Management Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
