Efficient and easy-to-use network access control and dynamic vlan management. Date: F r e e N A C. n e t Swisscom

Size: px
Start display at page:

Download "Efficient and easy-to-use network access control and dynamic vlan management. Date: 4.12.2007 http:// F r e e N A C. n e t Copyright @2007, Swisscom"

Transcription

1 Efficient and easy-to-use network access control and dynamic vlan management Date: F r e e N A C. n e t Swisscom 1

2 Connection to the enterprise LAN is often (too) easy LAN sockets may be located in open work spaces: Open-plan offices Meeting rooms Hallways and printing corners Unlocked wiring closets (Too) many people may have physical access to LAN ports: Employees Visitors Cleaning staff, Electricians, etc. 2 The enterprise LAN needs to be easy to use and reliable, however: Many people (visitors, employees, cleaners, temporary staff) may have physical access to the offices Network sockets may be located in open work spaces, or meeting rooms. Network connections may not be documented Mobility requires more flexibility and security The amount of Laptops in companies is growing Potentially more than one user per Network Socket (often there are more hubs or small unmanaged switches than expected) Re-organizations are more frequent, so the network needs to easily adapt 2

3 The need for dynamic LAN management Ethernet cabling is difficult to change and expensive. Is Cabling documented? Does LAN management allow easy segmentation of PCs/Devices? Can Visitors / Externals be given LAN access safely and easily? Is cabling dynamically used, or cables reserved per segment? 3 Current cabling should be dynamically used: on the appropriate network when needed without the need for (expensive) manual intervention or reconfiguration LAN management should allow easy segmentation of PCs/Devices e.g. Printer zone, office zone, lab1, lab2, External zone segments should be configurable by helpdesk/1 st level support, not Switch specialists 3

4 The need for network access control Enterprises may be faced with the following problems: Do we know what is on the LAN? Live inventory? How do we authorise or block end devices? How do we enforce LAN access security policies? 4 Access Control Foreign laptops (or desktops, webcams, ), connected to the enterprise LAN, represent a potential security risk. Security/access rights should be managed. Limit access to devices we know and have some trust in. Live inventory: Access control means having an up-to-date inventory of end devices. It may also mean having an inventory of the topology of the LAN (which switches, hubs, routers, end devices etc. in which rooms) including a cabling plan. The following questions then arise: How can we manage our inventory efficiently? Especially if we have many end devices? Can we prevent having multiple inventories one for network access control and one for hardware management / (financial) accounting? Can we integrate these inventories? 4

5 The need for Compliance with security or governance standards Management System Governance ISO SOX BS 7799 ISO BSI COBIT IT Security ITIL IT 5 Is compliance with security standards such as: Information Security Management System (ISO17799), Sarbanes-Oxley (SOX 404), important for you? Is compliance with IT management/governance standards: ITIL, etc. an issue? NAC can help to: -limit access to network resources -provide tracking of what devices were on the network, where, when -provide a live inventory of devices, and link it to static inventory -provide compliance reports tying together Network, User, Device information. 5

6 The Solution: NAC Technology: Access is granted based on the MAC address (or 802.1x) and an appropriate Virtual LAN assigned. 6 HOW IT WORKS: The Switch detects a new PC and requests authorisation from NAC via the VMPS protocol, which checks its Database and refuses or grants access based on the MAC address 802.1x is supported with User Authentication in the Windows Domain or Certificates, and Vlan assignment based on MAC address VMPS mode: only for Cisco Switches and any kind of network device (PC, Printers, IP phones, Webcams, etc) NAC can directly replace other VMPS solutions, or manual port based MAC lists with major improvements in ease of use. 6

7 Features Dynamic (location based) virtual LAN assignment LAN port access control Automated end-device inventory Switch port programming Can work with Hubs/un-managed switches Friendly User Interface Enterprise features: Linking of enterprise information sources: Users (AD), Devices: (MS- SMS), Anti-virus, DNS, Router tables, static inventory Redundancy, load balancing, advanced monitoring and alerting Documentation of LAN cabling Emergency off for disaster response 7 SQL database provides scalability, flexibility and easier integration, and allows querying of live network inventory: external databases can be linked in, to integrate into your Workflow and processes: user databases (Active Directory, DireX, XML), end-device databases (MS-SMS), MS-WSUS, Anti-Virus (McAfee), DNS, Routers (MAC/IP tables via SNMP), switch (port restarts / detection of unmanaged devices) and customer in-house static inventory databases scanning module to identify operating system version and open ports scanning module to identify devices on unmanaged or static switch ports emergency off tool for disaster recovery redundancy: 1 master and many slaves allow high availability and load distribution (we come back to this in 3 slides) Live inventory: VMPS managed devices and unmanaged devices (switches scanned via SNMP): Mac, I.P. Address, Hostname Operating System & Hostname: via nmap scanning Cross reference data in external databases such as MS-SMS, WSUS, McAfee EPO. 7

8 NAC Benefits No software needed on end devices Allows a more dynamic, efficient LAN/cabling Proven technology: in production since GUI can be used by helpdesk, Cisco expertise is not needed Extensible: open interfaces optimal Workflow integration OpenSource NAC works with (legacy & new) Cisco switches More efficient than manual port-based access or VMPS Easier to implement than classical 802.1x 8 no software is currently needed on end devices Open: Open Standards, open source, open review integrate NAC more easily into your Workflows and existing Processes NAC works with (even old) Cisco switches (Other vendors many be added on request, or as custom developments) Customers who already use manual port-based access will save time and gain effectiveness A dynamic network allows Better use of available switch ports (efficiency, cost savings) quick configuration of new ports, can be configured by Helpdesk easier switch configuration (ports are dynamic) less changes in cabling during re-organisations Extensible: add your own modules, or interfaces to your Systems to better integrate MAC into your Processes and Workflow. NAC runs on standard hardware & Operating Systems (Linux/Unix) 8

9 Reducing the Risk of Unauthorised LAN access NAC offers cost-effective significant risk reduction without affecting Business operations NAC will continue to evolve lowering risk further (e.g. using 802.1x and health checking ) while allowing customers to migrate smoothly x offers stronger device authentication, but is more complex and requires newer switches. NAC strives to offer the best of both worlds: mac-address and 802.1x support. -Currently we can integrate the Patch status from Microsoft WSUS and McAfee EPO. -Long term, our aim is to use a standards based pre and post-connect security checking, such as TNC (Trusted Network Connect) 9

10 Architecture 10 The minimal components required are a VMPS or 802.1x capable switch and one NAC master server 10

11 Architecture 11 NAC consists of One Master server with Database and Control programs Optionally: one or more slave servers for redundancy and load distribution In a fully integrated environment, NAC requires: Syslog messages from switches Access to an server for delivery of alerts Access to DNS for discovering names associated IP addresses Optionally: SNMP read/write access to switches (to restart ports and scan for unmanaged end devices) Optionally: SNMP read access to routers (to query MAC/IP tables) Optionally: Interface to Enterprise Static Inventory, User, Device, Inventory, MS-SMS, MS-Wsus, McAfee EPO, or other database NAC is remotely configured via a Windows-based GUI, that may be installed on one or more a Windows PC or via a Web-based interface. 11

12 Usage scenarios: Where can I use NAC? 12 NOTES NAC is useful Where you need efficient cable/port management and/or LAN access control: Research and development units: with many subnets, and need to build dynamic subnets quickly. Workstation LANS Meeting rooms Rooms exposed to the public, or non-company employees Large Open Floor Plan offices During re-organisations to better track and control network access Where is NAC not needed? (i.e. Dynamic Ports are not needed, but automated port scanning/documentation is still useful) Physically secured Server rooms DMZs (for vmps mode: mac based identification is probably not secure enough, however 802.1x may be interesting.) 12

13 Summary Swisscom NAC enables LAN access control, live inventory and dynamic vlan management requires no software on clients works today in heterogeneous environments allows integration into your IT processes/tools via open interfaces

14 Appendix: Optional slides 14 14

15 How NAC works If Unknown, access is denied or limited to quarantine If OK, access to Corporate Network 15 How version 2 works.. 15

16 How NAC works: vmps mode 16 16

17 17 Version 2.1 Summer 06: nmap scanning modules, OS detection Linking to McAfee EPO Anti-virus server Linking to Microsoft SMS (systems management server) Support of Virtual Machines as client, and also as NAC servers! Version 2.2 Mar 07: ldap integration into MS Active Directory Detection and inventory of other devices on the network not actively managed. Auto documentation of when ports were last used, with what vlan, and mode. Automated switch discovery for initial installations 802.1x support for Wired LANs Version V3.0 Nov.07: configuration of switch ports from the windows GUI configuration of NAC server options from the windows GUI Automated switch scanning for unmanaged systems Microsoft WSUS, McAfee EPO integration Complete code object-oriented rewrite, for better reliability, separation of features, and ease of adding new features. New Policy interface with pre and post-connect methods. 17

18 Network Authentication with 802.1x The 802.1x standard allows authentication of devices in LAN or Wireless networks, using cryptographic techniques it provides higher security x authenticate the user or the device BUT: new switches are usually required Vendor interoperability complexity (support, supplicants, certificate management,..) cost interaction with Hubs. NAC includes 802.1x since V x and MAC address can be combined, by for example authenticating the user via Domain Logon and the Device via MAC address allow a Vlan assignment based on the device identification (MAC address), not the user name

19 Problems With Cisco VMPS and MAC Port Authentication If the above products are already in use for limiting LAN access already, what are the limitations? Lack of management features Monitoring Alerting Ease of use GUI User & device DB integration Lack of support from Cisco 19 19

20 What does the User Interface look like? 20 This is one view in the Windows GUI from Version 2.1. There are also dedicated Web GUIs for specific tasks. 20

21 Windows GUI: system details 21 In blue is the crucial MAC information: mac address and the vlan we assign. In red is information about where the end-device was last seen, and where. 21

22 Windows GUI: system details 22 The Nmap scanning module can detection operating system version and open ports. It can scan one device immediately, or the list of IPs in the NAC database on a scheduled basis. If the McAfee EPO module is enabled, the operating system of end devices, as reported by McAfee, and the current Anti-Virus status, can be displayed. Beside the Anti-Virus tab, we also se an inventory, which is where we link to you in-house static Inventory Database, if required. 22

23 Windows GUI: Switch & Ports 23 23

24 NAC also shows switch/port usage Switch Port Patch PC 24 A Web GUI that maps switch port usage in the last 24 hours. We see one device on port 2/13, it is connected via cable X in room 4.16, where the PC murderdrool is attached and this PC is assigned to the Use ALLGAE We also see a printer on port 2/24 24

25 Web GUI: edit mode 25 25

26 What do automated Alerts look like? 26 A new device has been connected to the network (port 2/40 switch sw0303), but not authorised. -it was in room on Cable socket X (this is the name written on the socket in the wall) -in this room the users Schenker, Wyler and Berger have their offices -The user TGDSCED1 has been documented as using this cable The super-users defined for this switch are Schädler and Rappo, so they receive the Alert, along with the NAC Administrators. 26

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief ForeScout CounterACT Device Host and Detection Methods Technology Brief Contents Introduction... 3 The ForeScout Approach... 3 Discovery Methodologies... 4 Passive Monitoring... 4 Passive Authentication...

More information

ACME Enterprises IT Infrastructure Assessment

ACME Enterprises IT Infrastructure Assessment Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3

More information

Advanced Diploma In Hardware, Networking & Server Configuration

Advanced Diploma In Hardware, Networking & Server Configuration Advanced Diploma In Hardware, Networking & Server Configuration Who should do this course? This course is meant for those persons who have a dream of getting job based on Computer Hardware, Networking

More information

Kaseya IT Automation Framework

Kaseya IT Automation Framework Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation

More information

Ranch Networks for Hosted Data Centers

Ranch Networks for Hosted Data Centers Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch

More information

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,

More information

Using Cisco UC320W with Windows Small Business Server

Using Cisco UC320W with Windows Small Business Server Using Cisco UC320W with Windows Small Business Server This application note explains how to deploy the Cisco UC320W in a Windows Small Business Server environment. Contents This document includes the following

More information

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark The self-defending network a resilient network By Steen Pedersen Ementor, Denmark The self-defending network - a resilient network What is required of our internal networks? Available, robust, fast and

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

StarMOBILE Network Configuration Guide. A guide to configuring your StarMOBILE system for networking

StarMOBILE Network Configuration Guide. A guide to configuring your StarMOBILE system for networking StarMOBILE Network Configuration Guide A guide to configuring your StarMOBILE system for networking INTRODUCTION... 3 BEFORE YOU BEGIN... 3 1) CONFIRM YOU HAVE THE LATEST SOFTWARE... 3 2) INSTALL THE STARMOBILE

More information

VIA COLLAGE Deployment Guide

VIA COLLAGE Deployment Guide VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

SUMMIT ASSET MANAGEMENT DATASHEET

SUMMIT ASSET MANAGEMENT DATASHEET SUMMIT ASSET MANAGEMENT DATASHEET SUMMIT, Symphony SUMMIT, the Symphony SUMMIT logo, and all other Symphony SUMMIT product, brand or service names are registered trademarks or trademarks of Symphony SUMMIT,

More information

Designing a Windows Server 2008 Network Infrastructure

Designing a Windows Server 2008 Network Infrastructure Designing a Windows Server 2008 Network Infrastructure MOC6435 About this Course This five-day course will provide students with an understanding of how to design a Windows Server 2008 Network Infrastructure

More information

Lab 4.5.2 Diagramming Intranet Traffic Flows

Lab 4.5.2 Diagramming Intranet Traffic Flows Lab 4.5.2 Diagramming Intranet Traffic Flows Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1

More information

Sygate Secure Enterprise and Alcatel

Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and

More information

Bypassing Network Access Control Systems

Bypassing Network Access Control Systems 1 Bypassing Network Access Control Systems Ofir Arkin, CTO Blackhat USA 2006 [email protected] http://www.insightix.com 2 What this talk is about? Introduction to NAC The components of a NAC solution

More information

Device Lifecycle Management

Device Lifecycle Management Device Lifecycle Management 1 (8) Table of Contents 1. Executive summary... 3 2. Today's challenges in adapting to lifecycle management... 3 3. How is Miradore different?... 5 4. Conclusion... 8 2 (8)

More information

Network Virtualization Network Admission Control Deployment Guide

Network Virtualization Network Admission Control Deployment Guide Network Virtualization Network Admission Control Deployment Guide This document provides guidance for enterprises that want to deploy the Cisco Network Admission Control (NAC) Appliance for their campus

More information

Module 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design.

Module 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design. SSM6435 - Course 6435A: Designing a Windows Server 2008 Network Infrastructure Overview About this Course This five-day course will provide students with an understanding of how to design a Windows Server

More information

Secure Networks for Process Control

Secure Networks for Process Control Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than

More information

OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an

OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an No one knows the value of an Network Analysis Solution Total integration Total control Total Network SuperVision integrated solution better than network engineers and Fluke Networks. Our Network Analysis

More information

Reliable DNS and DHCP for Microsoft Active Directory Protecting and Extending Active Directory Infrastructure with Infoblox Appliances

Reliable DNS and DHCP for Microsoft Active Directory Protecting and Extending Active Directory Infrastructure with Infoblox Appliances Reliable DNS and DHCP for Protecting and Extending Active Directory Infrastructure with Infoblox Appliances Reliable DNS and DHCP for (AD) is the distributed directory service and the information hub of

More information

Microsoft Windows Server System White Paper

Microsoft Windows Server System White Paper Introduction to Network Access Protection Microsoft Corporation Published: June 2004, Updated: May 2006 Abstract Network Access Protection, a platform for Microsoft Windows Server "Longhorn" (now in beta

More information

Configure ISE Version 1.4 Posture with Microsoft WSUS

Configure ISE Version 1.4 Posture with Microsoft WSUS Configure ISE Version 1.4 Posture with Microsoft WSUS Document ID: 119214 Contributed by Michal Garcarz, Cisco TAC Engineer. Aug 03, 2015 Contents Introduction Prerequisites Requirements Components Used

More information

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment... 2. Adaptive Network Security...

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment... 2. Adaptive Network Security... WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Adaptive Network Security Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with Adaptive

More information

Use of The Information Services Active Directory Service (AD) Code of Practice

Use of The Information Services Active Directory Service (AD) Code of Practice Use of The Information Services Active Directory Service (AD) Code of Practice Introduction This code of practice is intended to support the Information Security Policy of the University and should be

More information

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Course Description and Outline. IT Essential II: Network Operating Systems V2.0 Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs

More information

Information Technology Solutions

Information Technology Solutions Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer

More information

Evolving Network Security with the Alcatel-Lucent Access Guardian

Evolving Network Security with the Alcatel-Lucent Access Guardian T E C H N O L O G Y W H I T E P A P E R Evolving Network Security with the Alcatel-Lucent Access Guardian Enterprise network customers encounter a wide variety of difficulties and complexities when designing

More information

VIA CONNECT PRO Deployment Guide

VIA CONNECT PRO Deployment Guide VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6

Integration Guide. McAfee Asset Manager. for use with epolicy Orchestrator 4.6 Integration Guide Manager for use with epolicy Orchestrator 4.6 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

How To Understand and Configure Your Network for IntraVUE

How To Understand and Configure Your Network for IntraVUE How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of

More information

Detecting rogue systems

Detecting rogue systems Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often

More information

Remote Infrastructure Support Services & Managed IT Services

Remote Infrastructure Support Services & Managed IT Services Remote Infrastructure Support Services & Managed IT Services Remote Desktop Services are designed to optimize the customers IT resource utilization and provide a standardized end-user environment. The

More information

Student Halls Network. Connection Guide

Student Halls Network. Connection Guide Student Halls Network Connection Guide Contents: Page 3 Page 4 Page 6 Page 10 Page 17 Page 18 Page 19 Page 20 Introduction Network Connection Policy Connecting to the Student Halls Network Connecting to

More information

Kaseya 2. User Guide. Version R8. English

Kaseya 2. User Guide. Version R8. English Kaseya 2 Discovery User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

ClearOS Network, Gateway, Server Quick Start Guide

ClearOS Network, Gateway, Server Quick Start Guide ClearOS Network, Gateway, Server Quick Start Guide Welcome ClearOS is computer Operating System (OS) that provides enterprise-level network security and application services to the Small/Medium-sized Business

More information

This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview

This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview Deployment models C H A P T E R 6 Implementing Network

More information

70-682. Microsoft. Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician. http://www.pass4sureofficial.com. www.dumpspdf.

70-682. Microsoft. Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician. http://www.pass4sureofficial.com. www.dumpspdf. 70-682 Microsoft Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician http://www.pass4sureofficial.com Dumpspdf.com is a reputable IT certification examination guide, study guides and

More information

NETWORK ADMINISTRATOR

NETWORK ADMINISTRATOR JOB DESCRIPTION Title: NETWORK ADMINISTRATOR Department: Information Systems Class Code: 1821 FLSA Status: Exempt Effective Date: February 13, 1997 (Rev. 07/2012) Grade Number: 26 GENERAL PURPOSE Under

More information

Auditing the LAN with Network Discovery

Auditing the LAN with Network Discovery Application Note Auditing the LAN with Network Discovery Introduction This application note is one in a series of papers about troubleshooting local area networks (LAN) from JDSU Communications Test and

More information

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The 1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...

More information

OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an

OptiView. Total integration Total control Total Network SuperVision. Network Analysis Solution. No one knows the value of an No one knows the value of an Network Analysis Solution Total integration Total control Total Network SuperVision integrated solution better than network engineers and Fluke Networks. Our Network Analysis

More information

IntraVUE Plug Scanner/Recorder Installation and Start-Up

IntraVUE Plug Scanner/Recorder Installation and Start-Up IntraVUE Plug Scanner/Recorder Installation and Start-Up The IntraVUE Plug is a complete IntraVUE Hardware/Software solution that can plug directly into any network to continually scan and record details

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

LEARNING SOLUTIONS website milner.com/learning email [email protected] phone 800 875 5042

LEARNING SOLUTIONS website milner.com/learning email training@milner.com phone 800 875 5042 Course 6451B: Planning, Deploying and Managing Microsoft System Center Configuration Manager 2007 Length: 3 Days Published: June 29, 2012 Language(s): English Audience(s): IT Professionals Level: 300 Technology:

More information

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

WiNG5 CAPTIVE PORTAL DESIGN GUIDE WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated

More information

IT Assessment Report. Prepared by: Date: BRI Works www.bri.works 321 East Main Street, Suite 200 Charlottesville VA 22902 434.951.

IT Assessment Report. Prepared by: Date: BRI Works www.bri.works 321 East Main Street, Suite 200 Charlottesville VA 22902 434.951. IT Assessment Report Prepared by: Date: BRI Works www.bri.works 321 East Main Street, Suite 200 Charlottesville VA 22902 434.951.7979 Table of Contents Executive Summary 3 IT Summary 3 Assessment Goal

More information

Information and Communication Technology. Patch Management Policy

Information and Communication Technology. Patch Management Policy BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL

More information

IP Telephony Management

IP Telephony Management IP Telephony Management How Cisco IT Manages Global IP Telephony A Cisco on Cisco Case Study: Inside Cisco IT 1 Overview Challenge Design, implement, and maintain a highly available, reliable, and resilient

More information

Agency Pre Migration Tasks

Agency Pre Migration Tasks Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required

More information

6445A - Implementing and Administering Windows Small Business Server 2008

6445A - Implementing and Administering Windows Small Business Server 2008 6445A - Implementing and Administering Windows Small Business Server 2008 Course Number: 6445A Course Length: 5 Days Course Overview This 5 day course provides students with the necessary knowledge to

More information

ManageEngine (division of ZOHO Corporation) www.manageengine.com. Infrastructure Management Solution (IMS)

ManageEngine (division of ZOHO Corporation) www.manageengine.com. Infrastructure Management Solution (IMS) ManageEngine (division of ZOHO Corporation) www.manageengine.com Infrastructure Management Solution (IMS) Contents Primer on IM (Infrastructure Management)... 3 What is Infrastructure Management?... 3

More information

The software can be downloaded from the Spiceworks web site at: http://www.spiceworks.com.

The software can be downloaded from the Spiceworks web site at: http://www.spiceworks.com. Spiceworks 2.0 Review One of the biggest headaches a network or system administrator faces is managing all of the equipment, software and services their network provides. From servers to workstations,

More information

SOLIDserver IPAM for Microsoft

SOLIDserver IPAM for Microsoft Solution Paper SOLIDserver IPAM for Microsoft The volume of hardware and virtual devices connecting to the internet and to corporate networks has led to exponential growth in the number of IP addresses

More information

CHOOSING A RACKSPACE HOSTING PLATFORM

CHOOSING A RACKSPACE HOSTING PLATFORM CHOOSING A RACKSPACE HOSTING PLATFORM Rackspace has years of experience in hosting and has learnt that the unique needs of our customers businesses often determines the level of accountability and project

More information

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network

More information

3.5 EXTERNAL NETWORK HDD. User s Manual

3.5 EXTERNAL NETWORK HDD. User s Manual 3.5 EXTERNAL NETWORK HDD User s Manual Table of Content Before You Use Key Features H/W Installation Illustration of Product LED Definition NETWORK HDD Assembly Setup the Network HDD Home Disk Utility

More information

Automating Infrastructure A connectivity perspective for BICSI SEA meeting, November 2011

Automating Infrastructure A connectivity perspective for BICSI SEA meeting, November 2011 Automating Infrastructure A connectivity perspective for BICSI SEA meeting, November 2011 Opportunities in Automating Infrastructure Why Automation in Data Center? Tiers, compartments and complexity Work

More information

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2 WHITEPAPER Top 4 Network Security Challenges in Healthcare Addressing Them with Secure Network Access Control Executive Summary... 1 Top 4 Network Security Challenges Addressing Security Challenges with

More information

Software. Quidview 56 CAMS 57. XLog NTAS 58

Software. Quidview 56 CAMS 57. XLog NTAS 58 Software Quidview 56 CAMS 57 XLog NTAS 58 55 Quidview Quidview Network Management System Quidview network management software is a suite of scalable tools for simplifying the network management and maintenance.

More information

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

MOC 6435A Designing a Windows Server 2008 Network Infrastructure MOC 6435A Designing a Windows Server 2008 Network Infrastructure Course Number: 6435A Course Length: 5 Days Certification Exam This course will help you prepare for the following Microsoft exam: Exam 70647:

More information

APPENDIX 3 LOT 3: WIRELESS NETWORK

APPENDIX 3 LOT 3: WIRELESS NETWORK APPENDIX 3 LOT 3: WIRELESS NETWORK A. TECHNICAL SPECIFICATIONS MAIN PURPOSE The Wi-Fi system should be capable of providing Internet access directly to a user using a smart phone, tablet PC, ipad or Laptop

More information

RES ONE Automation 2015 Task Overview

RES ONE Automation 2015 Task Overview RES ONE Automation 2015 Task Overview Task Overview RES ONE Automation 2015 Configuration Tasks The library Configuration contains Tasks that relate to the configuration of a computer, such as applying

More information

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your

More information

Architecture Overview

Architecture Overview Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and

More information

Information Technology Mission Statement. Information Technology Goals

Information Technology Mission Statement. Information Technology Goals Ionia County Information Technology Strategic Plan 2008-2013 Table of Contents Information Technology Mission 3 Information Technology Goals 3 Current Network Overview 4-5 Information Technology Focus

More information

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES OVERVIEW OF TYPICAL WINDOWS SERVER ROLES Before you start Objectives: learn about common server roles which can be used in Windows environment. Prerequisites: no prerequisites. Key terms: network, server,

More information

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management

GMI CLOUD SERVICES. GMI Business Services To Be Migrated: Deployment, Migration, Security, Management GMI CLOUD SERVICES Deployment, Migration, Security, Management SOLUTION OVERVIEW BUSINESS SERVICES CLOUD MIGRATION Founded in 1983, General Microsystems Inc. (GMI) is a holistic provider of product and

More information

LANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client

LANDesk White Paper. LANDesk Management Suite for Lenovo Secure Managed Client LANDesk White Paper LANDesk Management Suite for Lenovo Secure Managed Client Introduction The Lenovo Secure Managed Client (SMC) leverages the speed of modern networks and the reliability of RAID-enabled

More information

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary Course Summary Description The objective of this course is to provide the foundational concepts and teach the skills necessary to implement, configure, secure and monitor a Citrix NetScaler system with

More information

ManageEngine Desktop Central Training

ManageEngine Desktop Central Training ManageEngine Desktop Central Training Course Objectives Who Should Attend Course Agenda Course Objectives Desktop Central training helps you IT staff learn the features offered by Desktop Central and to

More information

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills

More information

Network Terminology Review

Network Terminology Review Network Terminology Review For those of you who have experience with IP networks, this document may serve as a reminder of the current lexicon of terms used in our industry. If you re new to it or specialized

More information

CA Desktop Management Suite r11

CA Desktop Management Suite r11 Data Sheet CA Desktop Management Suite r11 CA Desktop Management Suite automates the processes that support an organization s end-user computing needs, helping to ensure the optimum configuration of Windows

More information

Understand VLANs, Wired LANs, and Wireless LANs

Understand VLANs, Wired LANs, and Wireless LANs LESSON 1,2_B Understand VLANs, Wired LANs, and Wireless LANs Lesson Overview In this lesson, you will review: Wired local area networks Wireless local area networks Virtual local area networks (VLANs)

More information

ForeScout Technologies Is A Leader Among Network Access Control Vendors

ForeScout Technologies Is A Leader Among Network Access Control Vendors For ForeScout Technologies Is A Leader Among Network Access Control Vendors Excerpted From The Forrester Wave : Network Access Control, Q2 2011 by John Kindervag with Stephanie Balaouras, Robert Whiteley,

More information

SATO Network Interface Card Configuration Instructions

SATO Network Interface Card Configuration Instructions SATO Network Interface Card Configuration Instructions Table of Contents 1. Reset of wired/wireless interface card... 3 2. Installing the All-In-One Utility (recommended)... 4 3. Configuring wired/wireless

More information

Policy Management: The Avenda Approach To An Essential Network Service

Policy Management: The Avenda Approach To An Essential Network Service End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: [email protected] email: [email protected] Avenda

More information

Cisco TrustSec Solution Overview

Cisco TrustSec Solution Overview Solution Overview Cisco TrustSec Solution Overview 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 10 Contents Introduction... 3 Solution Overview...

More information

Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435

Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435 coursemonster.com/au Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435 View training dates» Overview This course will provide students with an understanding

More information

ACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE. Report Amended October 2011

ACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE. Report Amended October 2011 ACADEMIC PROGRAM REVIEW of PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE May 12-13, 2011 Report Amended October 2011 Table of Contents PC AGE Organizational Profile... 3 Academic Program Review

More information

Enabling Internet Connection Sharing on Windows 2000 15. Enabling ICS On Windows XP As The Host 4 Enabling ICS On Windows XP As The Client 11

Enabling Internet Connection Sharing on Windows 2000 15. Enabling ICS On Windows XP As The Host 4 Enabling ICS On Windows XP As The Client 11 Sharing an Internet Connection with SatDirect Plus Table of Contents Contents Section 1: Section 2: Section 3: Introduction... 1 Physical Setup......2 Enabling Internet Connection Sharing on Windows XP

More information

Models HP IMC Smart Connect Edition Virtual Appliance Software E-LTU

Models HP IMC Smart Connect Edition Virtual Appliance Software E-LTU Models HP IMC Smart Connect Edition Virtual Appliance Software E-LTU JG659AAE Key features Identity-based access, advanced device profiling, and real-time traffic quarantining Converged network support

More information

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

Dramatically simplifying voice and data networking HOW-TO GUIDE. Bundle Quick Start Guide

Dramatically simplifying voice and data networking HOW-TO GUIDE. Bundle Quick Start Guide Dramatically simplifying voice and data networking HOW-TO GUIDE Bundle Quick Start Guide 2 edgebox How-To Guide - Table of Contents Scope of the Quick-Start Guide...3 edgebox bundles...3

More information

UBIQUITI BRIDGE CONFIGURATION PROCEDURE (PowerStation & NanoStation Units ONLY)

UBIQUITI BRIDGE CONFIGURATION PROCEDURE (PowerStation & NanoStation Units ONLY) UBIQUITI BRIDGE CONFIGURATION PROCEDURE (PowerStation & NanoStation Units ONLY) Hardware Installation 1. Initial placement for programming and configuration purposes should be performed in an indoor environment.

More information

IT Onsite Service Contract Proposal. For. <<Customer>> Ltd

IT Onsite Service Contract Proposal. For. <<Customer>> Ltd IT Onsite Service Contract Proposal For Ltd 1 of 14 I N T R O D U C T I O N This Service Contract for Onsite Deskside PC Support (this Service Contract ) is made effective as of February 5th,

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

WhatsUpGold. v3.0. WhatsConnected User Guide

WhatsUpGold. v3.0. WhatsConnected User Guide WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected

More information

Upper Perkiomen School District

Upper Perkiomen School District Upper Perkiomen School District Network Infrastructure Review Executive Summary Prepared by 1001 James Drive, Suite A15 Leesport, PA 19533 610 916 9400 www.jlrconsulting.com Date: March 10, 2015 Report

More information

Network Access Control ProCurve and Microsoft NAP Integration

Network Access Control ProCurve and Microsoft NAP Integration HP ProCurve Networking Network Access Control ProCurve and Microsoft NAP Integration Abstract...2 Foundation...3 Network Access Control basics...4 ProCurve Identity Driven Manager overview...5 Microsoft

More information

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology ARCHITECT S GUIDE: Comply to Connect Using TNC Technology August 2012 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006 Tel (503) 619-0562 Fax (503) 644-6708 [email protected]

More information

Technology Blueprint. Enforcing Endpoint Compliance on the network. Police your managed and unmanaged systems with Network Access Control (NAC)

Technology Blueprint. Enforcing Endpoint Compliance on the network. Police your managed and unmanaged systems with Network Access Control (NAC) Technology Blueprint Enforcing Endpoint Compliance on the network Police your managed and unmanaged systems with Network Access Control (NAC) LEVEL 2 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL

More information