Tested Solution: Protecting your network with Symantec Network Access Control (NAC) and Allied Telesis Switches
|
|
|
- Silas Crawford
- 10 years ago
- Views:
Transcription
1 Network Security Solutions Implementing Network Access Control (NAC) Tested Solution: Protecting your network with Symantec Network Access Control (NAC) and Switches Today s networks increasingly require protection against attacks that originate from within the network. All too often these LAN-based attacks are released accidentally onto a network when a naive or careless user connects a device infected with malicious software into the LAN. To effectively defend against these internal threats, network administrators need secure LAN switches to inhibit network attacks, and to control network access using Health and Security policies. These policies can ensure that only legitimate users access the network and that the connecting devices conform to strict security requirements. x900 Switch Policy and RADIUS Server Policy Decision Point Protection Enforcement Point Access Requestor Diagram 1: Network Access Control The intelligent way to manage Health and Security policies is to set the network to manage itself using a Network Access Control (NAC) solution. NAC is a way of automating policy management on a network, allowing a network administrator to efficiently control network access and manage network security. When a network is secured with a NAC solution, devices must successfully authenticate and conform to the network s security policy before they are allowed normal network access. If a device fails authentication or does not meet the requirements of the security policy, the network can reject access, or grant only limited access until the device has taken remedial action. There are a number of NAC solutions available in the marketplace. This tested solution focuses on how to secure your network using the NAC solution offered by Symantec. For further information about NAC technology, and the NAC features available on switches, see provides advanced edge security for enterprise networks available from Page 1
2 This tested solution uses switches in the following ways: An x900 Series switch and an AT-8600 Series switch are configured as Network Policy Enforcement Points at the edge of the network. An x900 switch is configured as both the RADIUS and DHCP server for the network. An x900 switch is configured as the Layer 3 switch at the heart of the network. It is configured with the Access Control Lists that determine network access for authorized client PCs. The Products section at end of this document lists the products that support NAC solutions. The Symantec Solution The NAC solution offered by Symantec allows network administrators to automate policies to protect their network, such as ensuring that legitimate users have client PCs with the: most recent security patches installed latest anti-malware scanners installed and updated host-based firewall enabled This document explains how to configure a simple network protected by Symantec NAC. The connecting devices in the example network are PCs using 802.1X authentication. VLAN identifiers are used to separate the PCs based on whether they conform to the network Health policies. Symantec NAC requires Microsoft Windows server and client software. For a detailed list of compatible versions, visit Symantec online at The following Symantec components are necessary in this solution: Symantec Endpoint Protection Manager This application runs on a Microsoft Windows server. It provides the interface used to configure the security policy for the network, and distributes the policy to the other devices in the NAC system. Within the application, you can: configure a comprehensive set of information about the setup and security status of client devices display logs from the other devices in the system display charts and statistics relating to the security scans of client devices Symantec LAN Enforcer This component is available as either a dedicated 19 rack-mountable hardware device or a set of software that runs under Linux. In essence, the LAN Enforcer is a RADIUS proxy that forwards authentication requests to a RADIUS server, and then alters the replies in order to implement the NAC policy. Symantec NAC Client Software The Symantec NAC Client software on each client PC communicates with the Endpoint Protection Manager to determine whether the PC meets the current requirements of the network. If a client PC fails this check, the NAC Client software can take remedial action. Page 2
3 Building the Network This tested solution uses the example network in Daigram 2. LAN Enforcer x900-12xt/s VLAN Tagged in VLAN 10 or VLAN 11 Layer 3 switch x900-24xt VLAN AT-8624T/2M VLAN Endpoint Protection Manager RADIUS & DHCP server x900-12xt/s Policy Decision Point Policy Enforcment Point Client PCs Diagram 2: example network In this example network, the client PCs are connected to edge switches acting as Policy Enforcement Points (PEP). Clients that authenticate successfully are assigned into either VLAN 10 (for policy compliant PCs) or VLAN 11 (for policy noncompliant PCs). Network access for noncompliant PCs is limited using Access Control Lists (ACLs) on the Layer 3 switch at the centre of the network. The VLAN assignment is controlled by the LAN Enforcer, which tells the edge switches which VLAN to assign each client to. The following figure shows how network access is decided. Client requests network access Is a valid User ID provided? Yes No Network access denied (port closed) Does device adhere to policy? Yes No Access only to network servers for remediation (VLAN 11) Normal network access granted (VLAN 10) Page 3
4 When a PC first connects to the network, the connected edge switch sends an authentication request. The PC responds with the username and password of the user. The switch forwards this to the LAN Enforcer (configured as the RADIUS server on the edge switch). The LAN Enforcer checks with the RADIUS server that the username and password are correct. If this check fails, the LAN Enforcer sets the network access for the PC as per the policy in this example, the port is closed to the PC (an alternative could be to direct the user to a guest VLAN which has restricted access). If the PC passes this check, then it is allowed network access based on its identity and its conformance to the health and security policy (called the Host Integrity Policy by Symantec). The Symantec client software on the PC checks this conformance with the Endpoint Protection Manager. If the PC does not comply with the health and security policy, it is placed in the noncompliant VLAN, which in this example is set to allow only limited network access. Giving the PC access to the network servers allows the Symantec Client software to download software updates to remedy the compliance issue. Once a PC passes the health and security checks the LAN Enforcer assigns the PC to the compliant VLAN, giving it user-appropriate network access in this example, full network access. Steps to build the Network To build this network, follow the configuration sections of this document summarized here: Configure the Layer 3 Switch on page 5 Configure this switch with the two VLANs used for client PCs. Set the ports attached to the edge switches as tagged for VLAN 10 and 11. Create ACLs to limit access to the network for noncompliant PCs. Install the Symantec LAN Enforcer on page 6 Enter the basic configuration details (advanced configuration is via the Endpoint Protection Manager). Connect the LAN Enforcer to the Layer 3 Switch. Add the connection details and password for the Endpoint Protection Manager. Install the Symantec Endpoint Protection Manager on page 7 Connect the server to the Layer 3 switch. Install the Symantec software. Check that it can communicate with the LAN Enforcer. Configure the RADIUS and DHCP server on page 12 Obtain a certificate for the switch using its local Certificate Authority. Enable the RADIUS server and enter the user details. Create the DHCP pools for compliant and noncompliant PCs. Enable the DHCP server. Configure the Symantec Endpoint Protection Manager on page 13 Define the LAN Enforcer s interactions with the edge switches. Add the details of the RADIUS server for the LAN Enforcer. Create the Host Integrity Policy this defines the system configuration required on a client PC. Define how the Endpoint Protection Manager interacts with client PCs. Create an installation package to download onto client PCs. Configure the edge switches on page 24 Set the LAN Enforcer as the RADIUS server and set it as the authenticator for 802.1X requests. Create the compliant and noncompliant VLANs. Set the ports attached to client PCs as 802.1X authenticating ports. Set the port connected to the Layer 3 switch as non-authenticated and with VLAN tagging for VLANs 10 and 11. Install and configure the client PCs on page 25 Enable 802.1X authentication on the PCs. Connect the PCs to the edge switches. From the Endpoint Protection Manager, find each PC on the network and install the Symantec Client software on them. Check the client status to confirm the installation is successful. Page 4
5 Configure the Layer 3 Switch This example configuration script is for a switch running the AlliedWare Plus TM Operating System. You can configure switches that run the AlliedWare TM Operating System in a similar manner. Creates and enables the VLANs for compliant and noncompliant client devices Creates the ACLs that will restrict network access to the client PCs. Compliant PCs (with an IP address in the subnet) are allowed normal access to the network. Noncompliant PCs (with an IP address in the subnet) are allowed access ONLY to the servers. Allows all DHCP traffic. vlan database vlan 10 name compliant vlan 11 name noncompliant vlan state enable access-list 3001 permit ip /24 any access-list 3002 permit ip / /32 access-list 3003 permit ip / /32 access-list 3004 permit ip / /32 access-list 3005 permit udp any range any range Sets the switch to drop all traffic that does not match the other ACLs. access-list 3006 deny ip any any Configures the ports to which the edge switches attach. These ports are tagged in VLANs 10 and 11, to accept traffic in both the compliant and noncompliant VLANs. The ACLs are applied to these ports, to control client traffic as described above. Attaches a management IP address to the server VLAN (VLAN1). interface port switchport switchport mode trunk switchport trunk allowed vlan add ip access-group 3001 ip access-group 3002 ip access-group 3003 ip access-group 3004 ip access-group 3005 ip access-group 3006 interface vlan1 ip address /24 IP addresses are assigned to the client VLANs, so that this switch can Layer 3 switch traffic to and from those VLANs. DHCP relay is configured, to direct client DHCP requests to the DHCP server at interface vlan10 ip address /24 ip dhcp-relay server-address interface vlan11 ip address /24 ip dhcp-relay server-address Page 5
6 Install the Symantec LAN Enforcer In this section we will: enter the basic configuration details for the LAN Enforcer connect the LAN Enforcer to the Layer 3 Switch add the connection details for the Endpoint Protection Manager Basic Configuration Install the LAN Enforcer appliance, or the software-only version, using the installation guides provided by Symantec. Log into the LAN Enforcer using the default username root and password Symantec. The first time that you log in, the LAN Enforcer prompts you for some basic configuration information. You will need to specify:: 1. The type of Symantec Enforcer appliance this is enter L to specify that it is a LAN Enforcer. 2. The host name of the LAN Enforcer you can either enter a new hostname or leave this as the default name Enforcer. 3. A new root password for logging into the LAN Enforcer. Remote access is not enabled until you change the password. The new password must contain one lowercase letter, one uppercase letter, one digit, and one symbol (for 4. A new admin password. The admin account is a lower-privilege user than the root. 5. The time zone to apply time zone rules. 6. The date and time. 7. The Network Interface Card (NIC) settings. In this example network, the command is: configure interface set eth0 ip subnet mask gateway ip You can now press any key to display a configuration summary. Press Q to complete the configuration. Connect the LAN Enforcer to the Layer 3 switch Connect the Ethernet port of the LAN Enforcer to one of the VLAN1 ports of the Layer 3 switch, and then check that the connection is working by pinging the switch. You should see successful ping responses: Enforcer# Enforcer# ping PING ( ) 56(84) bytes of data. 64 bytes from : icmp_seq=0 ttl=64 time=4.32 ms 64 bytes from : icmp_seq=1 ttl=64 time=14.0 ms 64 bytes from : icmp_seq=2 ttl=64 time=3.28 ms 64 bytes from : icmp_seq=3 ttl=64 time=15.0 ms ping statistics packets transmitted, 4 received, 0% packet loss, time 63ms rtt min/avg/max/mdev = 3.282/9.172/15.074/5.395 ms, piper 2 ipg/ewma /6.479 ms Enforcer# _ Add the connection details for the Endpoint Protection Manager The LAN Enforcer does not operate in any meaningful way until it has received policy information and other instructions from the Endpoint Protection Manager. So, an important step is to configure the LAN Enforcer with information on how to communicate with the Endpoint Protection Manager. To do this: 1. Type configure to enter Configuration mode. 2. Enter the command spm ip group symantecpolicys http 80 key 12Enforcer34 The group Symantecpolicys parameter creates a new group in the Endpoint Protection Manager under which you will find the LAN Enforcer. The key parameter sets a password shared by the LAN Enforcer and the Endpoint Protection Manager. When you configure the Endpoint Protection Manager later you will need to set the same password, in this example 12Enforcer34. Once you have entered the command, the LAN Enforcer will then start trying to connect to the Endpoint Protection Manager. Of course, the connection will not succeed until you have installed the Endpoint Protection Manager, but the LAN Enforcer will keep retrying the connection until it finally succeeds. This ends the configuration tasks you need to perform using the LAN Enforcer s command line interface. You will enter the rest of the LAN Enforcer s configuration using the Management Console of the Endpoint Protection Manager. Page 6
7 Install the Symantec Endpoint Protection Manager In this section we will: install the software check communication with the LAN Enforcer Install the software The Symantec Endpoint Protection Manager software requires a server running a compatible operating system. See Symantec online for an up to date list at Before you can install the Symantec software, you will need to: check that the Microsoft Web Server (IIS) is installed on the PC connect the PC to the Layer 3 switch, so that the software has IP connectivity to the LAN Enforcer. The Symantec Endpoint Protection Manager software does not control the IP address on the PC s NIC, so you will need to configure the NIC using the configuration interface provided by the Windows Control Panel. When you are ready, run the setup program to install the software. The setup program will ask you standard install questions (for example, which directory to install the software into). Once the software is installed, the setup program automatically runs a Configuration Wizard. Some of the configuration windows have important options that you will need to know how to configure: 1. The first window of the Configuration Wizard asks you to choose between Simple and Advanced configuration. Even though the Advanced option is described as being for servers that will manage more than 100 clients, choose this option anyway, as it is the only option that will enable you to specify a password for communication with the LAN Enforcer. Page 7
8 2. The next significant window is the one which asks you whether or not you are installing your first site. In this window, ensure that you choose the default option (Install my first site): 3. In the window that requests a server name and TCP ports, enter a suitable name, and leave the port numbers at the defaults. Page 8
9 4. In the Create encryption password window, you must enter the same password that you entered into the LAN Enforcer as the key parameter in the command used to configure the connection to the Endpoint Protection Manager: spm ip group symantecpolicys http 80 key 12Enforcer34 It is important that this is exactly the same, otherwise the LAN Enforcer and the Endpoint Protection Manager will not be able to communicate with one another. 5. In the window that creates the system administrator account, you do not need to enter an address if you don t want to. Page 9
10 6. In the final window of the configuration wizard, choose not to run the Migration and Deployment Wizard. Check communication with the LAN Enforcer At this point, the installation of the Symantec Endpoint Protection Manager is complete. Right now, it is worth checking that the Endpoint Protection Manager is successfully communicating with the LAN Enforcer. 1. Log in to the Endpoint Protection Manager (the login screen is automatically presented to you after you have completed the Configuration Wizard). 2. From the menu of icons down the Left-hand side of the screen, choose Admin. 3. From the menu near the bottom left of the screen, choose Servers. 4. The View Servers pane will show a tree that displays the servers that the Symantec Endpoint Protection Manager is aware of. Check in this tree for an Enforcer group whose name is the same as the value you entered for the group parameter on the LAN Enforcer in the command: spm ip group symantecpolicys http 80 key 12Enforcer34 Check that within that Enforcer Group there is an Enforcer server. Page 10
11 Similarly, the LAN Enforcer should report that it is in contact with the Endpoint Protection Manager. Entering the command show status on the LAN Enforcer command line should provide an an output similar to the following (in particular, there should be a YES beside Policy Manager Connected) : Enforcer#: show status# Enforcer Status: ONLINE Policy Manager Connected: YES Policy Manager: HTTP 80 Packets Received: 0 Packets Transmitted: 0 Packet Receive Failed: 0 Packet Transfer Failed: 0 Enforcer Health: EXCELLENT Enforcer Uptime: 0 days 01:10:55 It is vital that the LAN Enforcer and the Endpoint Protection Manager establish successful communication with each other. If the Endpoint Protection Manager and the LAN Enforcer are not reporting that they are in contact with each other then: Check that they have IP connectivity to each other, by testing that each one can ping the other. Re-enter the spm ip group symantecpolicys http 80 key 12Enforcer34 command, paying special attention to the IP address, TCP port number, and key string. Shut down the Symantec Endpoint Protection Manager and start it up again. If they still cannot communicate, then you may need to re-install the Endpoint Protection Manager. Page 11
12 Configure the RADIUS and DHCP server In this tested solution, the RADIUS and DHCP server is an x900 switch using the local RADIUS and DHCP server features available with the AlliedWare Plus TM Operating System. The RADIUS server must be configured to accept requests from the LAN Enforcer, as the LAN Enforcer s proxy function will cause it to appear to the RADIUS server as a NAS. Sets the local Certificate Authority (CA) to be the source of certificates for RADIUS. crypto pki trustpoint local Obtains a certificate from the local CA. crypto pki enroll local Enables the local RADIUS server. Configures the server to accept requests from the LAN Enforcer. The parameter key 12Radius34 sets the Shared Secret between this server and the LAN Enforcer. Adds users to the RADIUS server s user database. Attaches a management IP address to the switch. Creates the DHCP pool for client PCs that the Endpoint Protection Manager deems compliant. These PCs are allocated an IP address in the range Creates the DHCP pool for client PCs that the Endpoint Protection Manager deems compliant. These PCs are allocated an IP address in the range Enables the DHCP server on the switch. radius-server local server enable nas key 12Radius34 user joebloggs password ********* user acitizen password ********* user alansmithee password ********* interface vlan1 ip address /24 ip dhcp pool NAC-compliant network range dns-server default-router lease subnet-mask ip dhcp pool NAC-noncompliant network range dns-server default-router lease subnet-mask service dhcp-server Page 12
13 Configure the Symantec Endpoint Protection Manager The Symantec Endpoint Protection Manager is highly configurable, and has numerous options to control all manner of aspects of the Network Access Control system. In this tested solution we configure a subset of the Endpoint Protection Manager functionality to create a small working system. We will configure the: Switch Policy options This defines the LAN Enforcer s interactions with the edge switches. RADIUS server options This adds the details of the RADIUS server to the LAN Enforcer. Host Integrity Policy requirements This defines the system configuration required on a client PC. Client settings This defines how the Endpoint Protection Manager interacts with client PCs. Install Package This creates an installation package to download onto client PCs. Switch Policy options The Switch Policy options define how the LAN Enforcer interacts with each edge switch. The Endpoint Protection Manager sends this configuration to the LAN Enforcer, so that it can correctly enforce the NAC policy using the RADIUS protocol. The Switch Policy options are configured under the Enforcer Group Properties. You will need to add each edge switch separately. To do this: 1. Navigate to the Enforcer Group Properties from the menu of icons down the Left-hand side of the screen, choose Admin; then from the menu near the bottom left of the screen, choose Servers. In the View Servers pane, highlight the Enforcer Group, this will cause a relevant set of links appear in the Tasks area in the lower left pane. Click on the Edit Group Properties task. This will pop up a dialog box containing 5 tabs. 2 Add a switch by selecting the Switch tab in the Dialog and then clicking the Add button. This pops up another dialog with four tabs that you will need to complete. Page 13
14 3. In the Basic Information tab, enter the shared secret that you want between the edge switch and the LAN Enforcer you must enter this password on the edge switch later, as the key value in the command radius-server host key 12PEPSecret34. In the Switch Model field, it is important that you set this to, or if your software version does not have that option, one of Foundry, HP, or Nortel. This sets the LAN Enforcer to send the dynamic VLAN information in RADIUS Accept messages in a format that the switches can recognise. 4. In the Switch Address tab, set the IP address of the switch. The Name you configure in this tab is not significant. Page 14
15 5. In the VLAN tab, configure the VLANs that will be dynamically allocated to the compliant and noncompliant client PCs. The names given to the VLANs are not significant. 6. In the Action tab you enter the information that is key to the operation of the NAC solution. It is in this tab that you specify the way in which the system chooses which VLAN to allocate to client PCs, based on the results of the authentication and the Host Integrity Policy check. In this example, if the authentication succeeds and the Policy Check passes, the client PC is put in the compliant VLAN. If the authentication succeeds and the Policy Check fails, the client PC is put in the noncompliant VLAN. If the authentication fails, the client PC is blocked. 7. Click OK when you have finished configuring the Switch Policy options. The Endpoint Protection Manager automatically sends this configuration to the LAN Enforcer. For this tested solution, repeat these steps to add the second edge switch before continuing on. Page 15
16 RADIUS server options To add the RADIUS server to the policy configuration, select the RADIUS Server Group tab of the Group Settings dialog. You need to create a RADIUS Server Group and add the server to that group. Ensure that the shared secret is exactly the same text as you entered using the key parameter in the command nas key 12Radius34 when you configure the RADIUS server. This completes the properties that you need to configure for the LAN Enforcer. The Endpoint Protection Manager automatically sends this configuration to the LAN Enforcer. Page 16
17 Host Integrity Policy requirements The next step is to set up the policy that defines what Host Integrity means for the client PCs in this network. There are a great variety of options you can configure for the Host Integrity policy, and what you configure will depend on your network. To configure a policy that is applied to all client PCs on the network: 1. Navigate to the Host Integrity Policy configuration choose the Policies icon at the left of the screen; highlight Host Integrity in the View Policies pane, and choose Add a Host Integrity Policy from the task list beneath the policy list. 2. This opens the Host Integrity Policy window. Check that Enable this policy is ticked. Under Groups Using This Policy, check that the Global group is selected. Page 17
18 3. Click on the Requirements option on the left hand menu to add a requirement that client PCs must satisfy before they can pass the Host Integrity check. For any given requirement, you can choose from a number of different Vendors and specify how remediation should be performed on a client that fails this requirement. Page 18
19 4. Add all specific requirements you want for the policy, such as requirements for an Antivirus scanner, Firewall, Service Pack, or other option. Then exit the policy by clicking OK at the bottom of the screen. When you exit the policy, you may get the following warning: Select Yes, then choose Global in the next dialog. Page 19
20 Client settings The Client settings allow you to customise how the Endpoint Protection Manager interacts with client PCs. 1. Navigate to the Client settings in the left-hand menu, choose the Clients icon; in the View Clients pane, highlight Global. This presents a 4-tab dialog in the right-hand pane. Choose the Policies tab. 2. Under Location-independent Policies and Settings, choose General Settings. Page 20
21 3. This pops up the General Settings dialog. The Restart Options governs what will happen on occasions when the Endpoint Protection Manager has to restart client PCs. We recommend you choose the Prompt the user to restart the computer option, as a forced restart is very disconcerting for users. Page 21
22 4. Then, choose the Security Settings tab in the dialog. In this dialog we recommend selecting the Allow user to select the authentication protocol option under Use the client as an 802.1x supplicant. This lets you use the inbuilt 802.1X feature on the client PCs, which is significantly more configurable and controllable than the same feature in the Symantec NAC client software. If you leave this set to Use Symantec Transparent Mode then the clients use the Symantec NAC Client software. If you want to prevent end users from accessing the NAC client on their PCs, then select one or more of the options in the Client Password Protection groupbox. 5. Click OK in this dialog to finish configuring your client policy. Page 22
23 Install Package You are now ready to create a Client Install Package. 1. Choose the Install Packages tab on the main window. 2. Next choose Add Client Install Package from the Tasks menu. This will pop up the Add Client Install Package dialog. You do not need to define a schedule for installations at this stage. Simply click OK in this dialog to create an install package that you will download later on to the client PCs. This completes the configuration tasks on the Endpoint Protection Manager for now. Next we will configure the devices at the edge of the network. Page 23
24 Configure the Edge Switches This tested solution uses two edge switches as Policy Enforcement Points. Once you have configured them, attach them to the Layer 3 switch. The following configuration script is for the x900 Series switch running the AlliedWare Plus TM Operating System. Sends authentication requests to the LAN Enforcer at The key 12PEPSecret34 parameter sets the Shared Secret between the LAN Enforcer and this switch. radius-server host key 12PEPSecret34 Sets the switch to use the configured RADIUS servers for 802.1X authentication requests. aaa authentication dot1x default group radius Creates the compliant and noncompliant VLANs. There are no statically allocated ports on these VLANs. Instead the switch dynamically allocates the ports using the 802.1X VLAN assignment process. Sets the ports attached to client PCs (ports 1 to 23) as authenticating ports X is enabled on these ports and configured to accept dynamic VLAN assignment. Sets the port attached to the Layer 3 switch as nonauthenticating, and sets the connection to send VLAN-tagged Ethernet frames for VLANs 10 and 11. The native (untagged) VLAN remains VLAN1. Attaches a management IP address to VLAN1. vlan database vlan 10 name compliant vlan 11 name noncompliant vlan state enable interface port switchport switchport mode access dot1x port-control auto dot1x control-direction in auth dynamic-vlan-creation interface port switchport switchport mode trunk switchport trunk allowed vlan add interface vlan1 ip address /24 The AT-8600 Series switch runs the AlliedWare TM Operating System. The configuration of this edge switch is: Sends authentication requests to the LAN Enforcer at The secret=12pepsecret34 parameter sets the Shared Secret between the LAN Enforcer and this switch. add radius server= secret=12pepsecret34 port=1812 Creates the compliant and noncompliant VLANs. There are no statically allocated ports on these VLANs. Instead the switch dynamically allocates the ports using the 802.1X VLAN assignment process. create vlan=compliant vid=10 create vlan=noncompliant vid=11 Sets the port attached to the Layer 3 switch as nonauthenticating, and sets the connection to send VLAN-tagged Ethernet frames for VLANs 10 and 11. The native (untagged) VLAN remains VLAN1. add vlan=10 port=24 frame=tagged add vlan=11 port=24 frame=tagged Attaches a management IP address to VLAN1. Sets the ports attached to client PCs (ports 1 to 23) as authenticating ports X is enabled on these ports and configured to accept dynamic VLAN assignment. enable ip add ip int=vlan1 ip= mask= enable portauth=8021x enable portauth=8021x port=1-23 type=authenticator Page 24
25 Install and Configure the Client PCs The NAC infrastructure is now all in place, so the client PCs can be attached. In this section we will: Enable 802.1X authentication on the client PCs Connect the PCs to the network and authenticate Use the Endpoint Protection Manager to find the PCs on the network Install the Symantec Client software on the PCs Check the client status to confirm the installation is successful Enable 802.1X authentication 1. Browse to start > settings > Network Connections. Double-click on the network interface that you are interested in. This opens the Status window for the interface. 2. Click on the Properties button to open the Properties dialog for the interface. Select the Authentication tab and check that the: Enable IEE 802.1X authentication tick box is ticked network authentication method is Protected EAP (PEAP) Page 25
26 3. Click on the Settings button in this dialog to open the PEAP properties dialog. To keep things simple, you can set the PC so that it doesn t require the PC to validate the server s certificate (uncheck the box circled in red below). On the bottom half of the dialog, check that the Select Authentication Method field is set to Secured password (EAP-MSCHAP v2). 4. Click the Configure button in this dialog to open the EAP MSCHAP v2 Properties dialog. Un-tick the checkbox in this dialog. This means that the PC s user will always be prompted for their username and password when the network interface needs to be authenticated. 5. Click OK on all the open dialogs. The interface is now set up. Page 26
27 Connect the PCs to the network and authenticate When you connect the PCs, a balloon appears prompting you for a username and password: Click on the balloon. In the dialog that appears, enter the 802.1X username and password for that PC. You will need to have already configured this username and password on the RADIUS server. The 802.1X authentication should succeed, but the Host Integrity check will fail, as the PC is not yet running the Symantec NAC client. So, the LAN Enforcer will allocate the client to VLAN11. The PC obtains an IP address in the /24 subnet, and is only able to access the NAC servers. At this point, we need to return to the Endpoint Protection Manager to finish the job. Use the Endpoint Protection Manager to find the PCs on the network 1. In the menu at the left of the screen, choose the Clients icon. Then from the Tasks menu, choose Find Unmanaged Computers. Page 27
28 2. In the Find Unmanaged Computers dialog, specify the: IP address range you wish to search username and password that is used to log in to the PC the Workgroup or domain that the PC belongs to 3. Click the Search Now button, and the Endpoint Protection Manager will begin searching the specified IP address range. When it has found the PC, it will appear in the Unmanaged Computers list in the middle of the window. Page 28
29 4. Select the PC from the list. Then use the Change.. button, at the bottom of the dialog, to select the group that you wish to install the client into. Click the Start Installation button to download onto the client the Install Package that you created earlier. This will automatically install the Symantec NAC Client software onto the PC. After a minute or two, a message will pop up on the client PC to inform the user that the NAC Client is being configured: 5. When the installation is complete, exit the Find Unmanaged Computers dialog on the Endpoint Protection Manager. 6. Navigate to the client within the Endpoint Protection Manager choose the appropriate client group in the View Clients pane, and select the Clients tab in the right-hand pane. The PC now appears in the clients list. Page 29
30 7. Right-click on the client, and from the resulting pop-up menu, choose Run Command on Client then Restart Computers. This will cause a Restart Notification to pop up on the client PC If all is well, when the PC restarts it will pass its Host Integrity check, be allocated into VLAN10, and have full access to the network. Page 30
31 Check the client status On the client, there is an icon in the System Tray that indicates the status of the client connection: The plain key icon appears when the Host Integrity is OK, but the computer is not currently in contact with the Symantec Endpoint Protection Manager. The key with green dot icon appears when the Host Integrity is OK, and the computer is currently in contact with the Symantec Endpoint Protection Manager. The key with red dot icon appears when the Host Integrity check has failed. When Host Integrity checks fail, the PC user is informed of the reason: The NAC client will display logs that record events related to Host Integrity checking, and related to interactions with the Symantec Endpoint Protection Manager. Page 31
32 Page 32
33 Products The following Layer 3 switches support the configurations detailed in this solution: SwitchBlade x908 AT8600 series Advanced Layer 3 Modular Switch AT-8600 Series Layer 3 Fast Ethernet Switches AT-8624T/2M SwitchBlade x x 10/100BASE-T ports 2 x Uplink Module Bays 8 x 60Gbps Expansion Bays x900-12x and 24X Series AT-8648T/2SP 48 x 10/100BASE-T ports 2 x SFP ports in combo with 2 x 10/100/1000T uplink ports (RJ- 45) AT-8624POE 24 x 10/100BASE-T ports with PoE 2 x Uplink Module Bays Advanced Gigabit Layer 3+ Expandable Switches x900-24xt 2 x 60Gbps Expansion Bays 24 x 10/100/1000BASE-T (RJ-45) copper ports x900-24xt-n NEBS Compliant 2 x 60Gbps Expansion Bays 24 x 10/100/1000BASE-T (RJ-45) copper ports x900 Family About Inc. is a world class leader in delivering IP/Ethernet network solutions to the global market place. We create innovative, standards-based IP networks that seamlessly connect you with voice, video and data services. Enterprise customers can build complete end-to-end networking solutions through a single vendor, with core to edge technologies ranging from powerful 10 Gigabit Layer 3 switches right through to media converters. also offer a wide range of access, aggregation and backbone solutions for Service Providers. Our products range from industry leading media gateways which allow voice, video and data services to be delivered to the home and business, right through to high-end chassisbased platforms providing significant network infrastructure. x900-24xs 2 x 60Gbps Expansion Bays 24 x 100/1000BASE-X SFP ports x900-12xt/s 1 x 60Gbps Expansion Bay 12 x combo ports (10/100/1000BASE-T copper or SFP) ' flexible service and support programs are tailored to meet a wide range of needs, and are designed to protect your Allied Telesis investment well into the future. Visit us online at Page 33
34 USA Headquarters North Creek Parkway Suite 100 Bothell WA USA T: F: European Headquarters Via Motta Chiasso Switzerland T: F: Asia-Pacific Headquarters 11 Tai Seng Link Singapore T: F: Inc. All rights reserved. Information in this document is subject to change without notice. All company names, logos, and product designs that are trademarks or registered trademarks are the property of their respective owners. C RevA
x900 Switch Access Requestor
Network Security Solutions Implementing Network Access Control (NAC) Tested Solution: Protecting your network with Microsoft Network Access Protection (NAP) and Switches Today s networks increasingly require
Network Security Solutions Implementing Network Access Control (NAC)
Network Security Solutions Implementing Network Access Control (NAC) Tested Solution: Protecting a network with Sophos NAC Advanced and Switches Sophos NAC Advanced is a sophisticated Network Access Control
Use 802.1x EAP-TLS or PEAP-MS-CHAP v2 with Microsoft Windows Server 2003 to Make a Secure Network
How To Use 802.1x EAP-TLS or PEAP-MS-CHAP v2 with Microsoft Windows Server 2003 to Make a Secure Network Introduction This document describes how to create a secure LAN, using two servers and an 802.1xcompatible
Allied Telesis provide virtual customer networks
Solutions Network Virtualization Allied Telesis provide virtual customer networks over shared Ethernet infrastructure Solutions Network Virtualization Today s building management companies can derive revenue
Allied Telesis Solutions. Tested Solution: LAN Client Authentication. LAN Client Authentication. Introduction. Public/Private Zone x600
Solutions LAN Client Authentication Tested Solution: LAN Client Authentication Public/Private Zone x600 Client devices Windows 2008 server Enterprise CA server AR770 8000GS Private Zone x900 stack Internet
LAN Client Authentication
x600 x900 Tested Solution Networking LAN Client Authentication Introduction The key to strong LAN security, and seamless mobility within an Enterprise network, is to identity and authenticate the user
Tested Solution: Network Configuration and Inventory Management using Upgrade Manager
Network Management Solutions Tested Solution: Network Configuration and Inventory Management using Upgrade Manager Upgrading the operating system images across a set of network nodes is an irregular event.
What information will you find in this document?
How To Note How To Use the local RADIUS server to authenticate 802.1x supplicants using X.509 certificates Introduction The local RADIUS server within AlliedWare Plus can authenticate 802.1x supplicants
Comodo MyDLP Software Version 2.0. Installation Guide Guide Version 2.0.010215. Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013
Comodo MyDLP Software Version 2.0 Installation Guide Guide Version 2.0.010215 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1.About MyDLP... 3 1.1.MyDLP Features... 3
Network Access Control (NAC)
Solutions Network Access Control (NAC) Allied Telesis provides advanced edge security for Enterprise networks Security Issues The security issues facing Enterprise networks have evolved over the years,
AlliedWare Plus OS How To Use Web-authentication
AlliedWare Plus OS How To Use Web-authentication Introduction Web-authentication, (also known as Captive Portal), is a simple way to provide secure guestuser access to a network. It is used in a wide range
Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide
Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government
How to configure MAC authentication on a ProCurve switch
An HP ProCurve Networking Application Note How to configure MAC authentication on a ProCurve switch Contents 1. Introduction... 3 2. Prerequisites... 3 3. Network diagram... 3 4. Configuring the ProCurve
Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.
Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of
Astaro Security Gateway V8. Remote Access via L2TP over IPSec Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via L2TP over IPSec Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If
Configuring PA Firewalls for a Layer 3 Deployment
Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step
Broadband Router ESG-103. User s Guide
Broadband Router ESG-103 User s Guide FCC Warning This equipment has been tested and found to comply with the limits for Class A & Class B digital device, pursuant to Part 15 of the FCC rules. These limits
How to Configure Web Authentication on a ProCurve Switch
An HP ProCurve Networking Application Note How to Configure Web Authentication on a ProCurve Switch Contents 1. Introduction... 2 2. Prerequisites... 2 3. Network diagram... 2 4. Configuring the ProCurve
Network Security. Ensuring Information Availability. Security
Ensuring Information Availability Security - Ensuring Information Availability Introduction The advent of the Internet and the huge array of connected devices has led to an insatiable demand for access
This How To Note describes one possible basic VRRP configuration.
AlliedWare TM OS How To Configure VRRP (Virtual Router Redundancy Protocol) Introduction VRRP is a popular protocol for providing device redundancy, for connecting redundant WAN gateway routers or server
Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab
Step-by-Step Guide for Creating and Testing Connection Manager Profiles in a Test Lab Microsoft Corporation Published: May, 2005 Author: Microsoft Corporation Abstract This guide describes how to create
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client
Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Topology Note: ISR G2 devices have Gigabit Ethernet interfaces instead of FastEthernet Interfaces. All contents are Copyright 1992 2012
and Symantec Network Access Control
Getting Started with Symantec Network Access Control For Symantec Network Access Control and Symantec Network Access Control Starter Edition 20983669 Getting started with Symantec Network Access Control
User Guide. Cloud Gateway Software Device
User Guide Cloud Gateway Software Device This document is designed to provide information about the first time configuration and administrator use of the Cloud Gateway (web filtering device software).
Sophos Anti-Virus for NetApp Storage Systems startup guide
Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Product version: 1 Document date: April 2012 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp
VLANs. Application Note
VLANs Application Note Table of Contents Background... 3 Benefits... 3 Theory of Operation... 4 IEEE 802.1Q Packet... 4 Frame Size... 5 Supported VLAN Modes... 5 Bridged Mode... 5 Static SSID to Static
Getting Started. Symantec Client Security. About Symantec Client Security. How to get started
Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for
ProSafe Plus Switch Utility
ProSafe Plus Switch Utility User Guide 350 East Plumeria Drive San Jose, CA 95134 USA September 2010 202-10524-03 v1.0 ProSafe Plus Switch Utility User Guide 2010 NETGEAR, Inc. All rights reserved. No
If you have questions or find errors in the guide, please, contact us under the following e-mail address:
1. Introduction... 2 2. Remote Access via PPTP... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Configuration
CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC
CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC 1 Introduction Release date: 11/12/2003 This application note details the steps for creating an IKE IPSec VPN tunnel
Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide. Revised February 28, 2013 2:32 pm Pacific
Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide Revised February 28, 2013 2:32 pm Pacific Apache CloudStack 4.x (incubating) Network Setup: excerpt from Installation Guide
How To Industrial Networking
How To Industrial Networking Prepared by: Matt Crites Product: Date: April 2014 Any RAM or SN 6xxx series router Legacy firmware 3.14/4.14 or lower Subject: This document provides a step by step procedure
1. Hardware Installation
4 Port 10/100M Internet Broadband Router with USB Printer server Quick Installation Guide #4824904AXZZ0 1. Hardware Installation A. System Requirement Before you getting started, make sure that you meet
Sophos Endpoint Security and Control standalone startup guide
Sophos Endpoint Security and Control standalone startup guide Sophos Endpoint Security and Control version 9 Sophos Anti-Virus for Mac OS X, version 7 Document date: October 2009 Contents 1 Before you
SecuraLive ULTIMATE SECURITY
SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security
TotalCloud Phone System
TotalCloud Phone System Cisco SF 302-08P PoE VLAN Configuration Guide Note: The below information and configuration is for deployment of the Cbeyond managed switch solution using the Cisco 302 8 port Power
6.0. Getting Started Guide
6.0 Getting Started Guide Netmon Getting Started Guide 2 Contents Contents... 2 Appliance Installation... 3 IP Address Assignment (Optional)... 3 Logging In For the First Time... 5 Initial Setup... 6 License
Deploying Windows Streaming Media Servers NLB Cluster and metasan
Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Application Notes for Configuring Yealink T-22 SIP Phones to interoperate with Avaya IP Office - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Configuring Yealink T-22 SIP Phones to interoperate with Avaya IP Office - Issue 1.0 Abstract These Application Notes describe the configuration
Application Note. Using a Windows NT Domain / Active Directory for User Authentication NetScreen Devices 8/15/02 Jay Ratford Version 1.
Application Note Using a Windows NT Domain / Active Directory for User Authentication NetScreen Devices 8/15/02 Jay Ratford Version 1.0 Page 1 Controlling Access to Large Numbers of Networks Devices to
DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and
Step-by-Step Setup Guide Wireless File Transmitter FTP Mode
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Ad Hoc Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited. 1
Single Sign-On in SonicOS Enhanced 5.6
Single Sign-On in SonicOS Enhanced 5.6 Document Scope This document describes how to install and configure the Single Sign-On feature in the SonicOS Enhanced 5.6 release. This document contains the following
What information will you find in this document?
AlliedWare TM OS How To Configure Basic 802.1x Port Authentication Introduction This How To Note is a guide to 802.1x and Port Authentication. It outlines the implementation of the IEEE 802.1x standard
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer
Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Step-by-Step Guide for Setting Up VPN-based Remote Access in a
Page 1 of 41 TechNet Home > Products & Technologies > Server Operating Systems > Windows Server 2003 > Networking and Communications Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test
LifeSize Video Communications Systems Administrator Guide
LifeSize Video Communications Systems Administrator Guide November 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made
QUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance
1 0 0 0 1 1 QUICK START GUIDE Web Security Appliance Web Security Appliance Cisco S170 303417 Cisco S170 Web Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18
Contents Automatic Setup... 1 Manual Setup... 2 Installing the Wireless Certificates... 18 Automatic Setup 1. Click on the Wireless icon in your system tray that looks like. 2. You will see a list of available
Network Scanner Tool R3.1. User s Guide Version 3.0.04
Network Scanner Tool R3.1 User s Guide Version 3.0.04 Copyright 2000-2004 by Sharp Corporation. All rights reserved. Reproduction, adaptation or translation without prior written permission is prohibited,
ACP ThinManager Tech Notes Troubleshooting Guide
ACP ThinManager Tech Notes Troubleshooting Guide Use the F1 button on any page of a ThinManager wizard to launch Help for that page. Visit www.thinmanager.com/technotes/ to download the manual, manual
What information will you find in this document?
AlliedWare TM OS How To Configure an IPsec VPN between Microsoft ISA Server 2004 and an Allied Telesis Router Client Introduction Both Microsoft Internet Security and Acceleration (ISA) Server 2004 and
Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later
Sophos Anti-Virus for NetApp Storage Systems startup guide Runs on Windows 2000 and later Document date: July 2007 Contents About this guide...4 About Sophos Anti-Virus for NetApp Storage Systems...5
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
1. Installation Overview
Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender
Getting Started with Symantec Endpoint Protection
Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only
Comodo Endpoint Security Manager SME Software Version 2.1
Comodo Endpoint Security Manager SME Software Version 2.1 Quick Start Guide Guide Version 2.1.111114 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Endpoint Security Manager - SME Quick
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
Optimum Business SIP Trunk Set-up Guide
Optimum Business SIP Trunk Set-up Guide For use with IP PBX only. SIPSetup 07.13 FOR USE WITH IP PBX ONLY Important: If your PBX is configured to use a PRI connection, do not use this guide. If you need
Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started
Getting started Corporate Edition Copyright 2005 Corporation. All rights reserved. Printed in the U.S.A. 03/05 PN: 10362873 and the logo are U.S. registered trademarks of Corporation. is a trademark of
Step by Step Guide to implement SMS authentication to F5 Big-IP APM (Access Policy Manager)
Installation guide for securing the authentication to your F5 Big-IP APM solution with Nordic Edge One Time Password Server, delivering strong authetication via SMS to your mobile phone. 1 Summary This
Deploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions
XStream Remote Control: Configuring DCOM Connectivity
XStream Remote Control: Configuring DCOM Connectivity APPLICATION BRIEF March 2009 Summary The application running the graphical user interface of LeCroy Windows-based oscilloscopes is a COM Automation
Using Cisco UC320W with Windows Small Business Server
Using Cisco UC320W with Windows Small Business Server This application note explains how to deploy the Cisco UC320W in a Windows Small Business Server environment. Contents This document includes the following
CounterACT 7.0 Single CounterACT Appliance
CounterACT 7.0 Single CounterACT Appliance Quick Installation Guide Table of Contents Welcome to CounterACT Version 7.0....3 Included in your CounterACT Package....3 Overview...4 1. Create a Deployment
Firewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
User Manual Version 4.0.0.5. User Manual A20 / A50 / A100 / A250 / A500 / A1000 / A2000 / A4000
User Manual Version 4.0.0.5 User Manual A20 / A50 / A100 / A250 / A500 / A1000 / A2000 / A4000 I Endpoint Protector Appliance User Manual Table of Contents 1. Endpoint Protector Appliance Setup... 1 1.1.
Multi-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
Configuring SSL VPN on the Cisco ISA500 Security Appliance
Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which
QUICK START GUIDE. Cisco C170 Email Security Appliance
1 0 0 1 QUICK START GUIDE Email Security Appliance Cisco C170 303357 Cisco C170 Email Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance
Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3)
Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3) Manual installation of agents and importing the SCOM certificate to the servers to be monitored:
VCStack - Powerful Simplicity. Network Virtualization for Today's Business
Network Virtualization for Today's Business Introduction Today's enterprises rely on Information Technology resources and applications, for accessing business-critical information and for day-to-day work.
Sophos UTM. Remote Access via PPTP. Configuring UTM and Client
Sophos UTM Remote Access via PPTP Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
HP Device Manager 4.6
Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version 1.0.1. ForeScout Mobile
CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module Version 1.0.1 ForeScout Mobile Table of Contents About the Integration... 3 ForeScout MDM... 3 Additional Documentation...
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs
CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)
How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances 2006 nappliance Networks, Inc.
nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances The information contained in this document represents the current view of Microsoft Corporation on the issues discussed
Global VPN Client Getting Started Guide
Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential
How to Configure the Cisco UC500 for use with Integra Telecom SIP Solutions
How to Configure the Cisco UC500 for use with Integra Telecom SIP Solutions Overview: This document provides a reference for configuration of the Cisco UC500 IP PBX to connect to Integra Telecom SIP Trunks.
Sophos Anti-Virus for NetApp Storage Systems user guide. Product version: 3.0
Sophos Anti-Virus for NetApp Storage Systems user guide Product version: 3.0 Document date: May 2014 Contents 1 About this guide...3 2 About Sophos Anti-Virus for NetApp Storage Systems...4 3 System requirements...5
How to connect to VUWiFi
Wireless Registration Instructions Windows XP How to connect to VUWiFi 1. The first step in setting up your wireless card for VUWiFi is to open your Network Connections window. You can find this by going
CruzNet Secure Set-Up Instructions for Windows Vista
CruzNet Secure Set-Up Instructions for Windows Vista 1. In order to start using CruzNet Secure, you'll first need to create a password at https://vpn.soe.ucsc.edu/. Click on the reset your password link.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643)
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643) Chapter Six Configuring Windows Server 2008 Web Services, Part 1 Objectives Create and configure Web
AlliedWare TM OS How To. Create a VPN between an Allied Telesis Router and a Microsoft Windows XP 1 Client, Without Using NAT-T.
AlliedWare TM OS How To Create a VPN between an Allied Telesis Router and a Microsoft Windows XP 1 Client, Without Using NAT-T Introduction This document describes how to provide secure remote access through
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.
Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the
NAC Guest. Lab Exercises
NAC Guest Lab Exercises November 25 th, 2008 2 Table of Contents Introduction... 3 Logical Topology... 4 Exercise 1 Verify Initial Connectivity... 6 Exercise 2 Provision Contractor VPN Access... 7 Exercise
Setup for Windows XP Connect to your Windows XP machine with: FileBrowser, NetPortal & ServerControl
Connect to your Windows XP machine with: FileBrowser, NetPortal & ServerControl Copyright Stratospherix 2010 Apple, the Apple logo, ipod, ipod touch, and itunes are trademarks of Apple Inc., registered
Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test Lab
Página 1 de 54 Step-by-Step Guide for Setting Up VPN-based Remote Access in a Test Lab This guide provides detailed information about how you can use five computers to create a test lab with which to configure
Installation Overview
Contents Installation Overview... 2 How to Install Ad-Aware Management Server... 3 How to Deploy the Ad-Aware Security Solutions... 5 General Deployment Conditions... 5 Deploying Ad-Aware Management Agent...
Configuring Wired 802.1x Authentication on Windows Server 2012
Configuring Wired 802.1x Authentication on Windows Server 2012 Johan Loos [email protected] Version 1.0 Why 802.1x Authentication? The purpose of this document is to guide you through the procedure
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
How To Configure Windows Server 2008 as a RADIUS Server with MS-CHAP v2 Authentication
How To Configure Windows Server 2008 as a How To Configure Windows Server 2008 as a RADIUS Server with MS-CHAP v2 Authentication RADIUS Server with MS-CHAP v2 Authentication Applicable Version: 10.00 onwards
