Hp Identity Driven Manager Software Series Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Software Hp Identity Driven Manager Software Series. HP Identity Driven Manager Software Series User Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 194
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - Software Release 2.3

www.procurve.comUser’s GuideProCurve Identity Driven ManagerSoftware Release 2.3

Strany 2

1-4About ProCurve Identity Driven ManagerIntroductionWhen using IDM, the authentication process proceeds as described in the first three steps, but fr

Strany 3 - Contents

3-36Using Identity Driven ManagerDefining Access Policy GroupsTo begin, expand the Realms node to display the Access Policy Group node in the IDM tree

Strany 4

3-37Using Identity Driven ManagerDefining Access Policy GroupsFigure 3-27. New Access Policy Group3. Type in a Name and Description for the Access Pol

Strany 5 - B IDM Technical Reference

3-38Using Identity Driven ManagerDefining Access Policy Groups 6. Repeat the process for each rule you want to apply to the APG.7. The Access rules ar

Strany 6

3-39Using Identity Driven ManagerDefining Access Policy GroupsIDM will verify that the rules in the APG are valid. If a rule includes a defined VLAN (

Strany 7

3-40Using Identity Driven ManagerDefining Access Policy GroupsFigure 3-29. Access Rule with Endpoint Integrity optionsSelect the Endpoint Integrity op

Strany 8

3-41Using Identity Driven ManagerDefining Access Policy GroupsModifying an Access Policy Group1. Click the Access Policy Group node in the IDM tree to

Strany 9 - Why IDM?

3-42Using Identity Driven ManagerConfiguring User AccessConfiguring User AccessThe process of configuring User access to network resources using IDM i

Strany 10 - Introduction

3-43Using Identity Driven ManagerConfiguring User AccessThe Users list identifies every defined user and contains the following infor-mation for each

Strany 11 - What’s New in IDM 2.3

3-44Using Identity Driven ManagerConfiguring User Access4. Click Ok to save the assignments and close the window.The new APG assignments are displayed

Strany 12 - IDM Architecture

3-45Using Identity Driven ManagerConfiguring User AccessUsing Global RulesGlobal Rules can be used to provide an "exception process" to the

Strany 13

1-5About ProCurve Identity Driven ManagerIntroductionWhat’s New in IDM 2.3ProCurve Identity Driven Manager version 2.3 includes the following new feat

Strany 14 - Terminology

3-46Using Identity Driven ManagerConfiguring User Access Creating a Global Rule is similar to creating Access Rules for an Access Profile Group.To cre

Strany 15

3-47Using Identity Driven ManagerConfiguring User Access2. Set the Access Properties for the Global Rule. This is similar to the process used to defin

Strany 16 - IDM Specifications

3-48Using Identity Driven ManagerConfiguring User Access4. Click Yes in the confirmation pop-up to complete the process.The rule is removed from the G

Strany 17 - Additional Requirements

3-49Using Identity Driven ManagerDeploying Configurations to the AgentDeploying Configurations to the AgentAn option in the IDM Preferences allows you

Strany 18 - Registering Your IDM Software

3-50Using Identity Driven ManagerUsing Manual ConfigurationUsing Manual Configuration It is simplest to let the IDM Agent run and collect information

Strany 19

3-51Using Identity Driven ManagerUsing Manual Configuration3. Click Ok to save the Realm information and close the window. The new Realm appears in t

Strany 20 - Learning to Use ProCurve IDM

3-52Using Identity Driven ManagerUsing Manual ConfigurationDeleting RADIUS ServersTo delete an existing RADIUS Server:NOTE: Before you can completely

Strany 21 - ProCurve Support

3-53Using Identity Driven ManagerUsing Manual ConfigurationAdding New UsersYou can let the IDM Agent automatically learn about the users from the Acti

Strany 22

3-54Using Identity Driven ManagerUsing Manual Configuration3. If you want to restrict the user’s access to specific systems, click the Systems tab to

Strany 23 - Getting Started

3-55Using Identity Driven ManagerUsing Manual ConfigurationIf the user is allowed to login from more than one system, repeat the process for each syst

Strany 24

1-6About ProCurve Identity Driven ManagerIntroductionIDM ArchitectureIn IDM, when a user attempts to connect to the network through an edge switch, th

Strany 25

3-56Using Identity Driven ManagerUsing Manual ConfigurationDeleting a User1. Select the User in the User List 2. Click the Delete User icon in the too

Strany 26 - IDM Usage Strategies

3-57Using Identity Driven ManagerUsing the User Import WizardUsing the User Import WizardThe IDM User Import Wizard lets you add users to IDM from ano

Strany 27 - Understanding the IDM Model

3-58Using Identity Driven ManagerUsing the User Import WizardImporting Users from Active DirectoryImporting users from Active Directory with the IDM I

Strany 28 - IDM GUI Overview

3-59Using Identity Driven ManagerUsing the User Import WizardFigure 3-41. IDM User Import Wizard, Data Source3. Click the radio button to select the A

Strany 29

3-60Using Identity Driven ManagerUsing the User Import Wizard5. Select the scope of Active Directory groups that you want to import user data from. 6.

Strany 30 - IDM Dashboard

3-61Using Identity Driven ManagerUsing the User Import WizardFigure 3-44. IDM User Import Wizard, Import Groups8. Click the Select checkbox to choose

Strany 31 - Using the Navigation Tree

3-62Using Identity Driven ManagerUsing the User Import WizardFigure 3-45. IDM User Import Wizard, Add Users10. Click the Select checkbox to choose the

Strany 32

3-63Using Identity Driven ManagerUsing the User Import WizardIf you have a large number of users that belong to multiple groups, click the checkbox to

Strany 33

3-64Using Identity Driven ManagerUsing the User Import WizardFigure 3-48. IDM User Import Wizard, Import Complete A summary of the IDM Import displays

Strany 34

3-65Using Identity Driven ManagerUsing the User Import WizardFigure 3-49. IDM User Import Wizard, LDAP Authenticationa. To use the SSL authentication

Strany 35 - Toolbars and Menus

1-7About ProCurve Identity Driven ManagerIntroduction• A Decision Manager that receives the user data and checks it against user data in the local IDM

Strany 36

3-66Using Identity Driven ManagerUsing the User Import Wizardb. Select the LDAP Authentication type to be used with the imported user data:c. Click Ne

Strany 37 - Using IDM Reports

3-67Using Identity Driven ManagerUsing the User Import WizardFigure 3-50. IDM User Import Wizard, Simple AuthenticationTo set up Simple authentication

Strany 38

3-68Using Identity Driven ManagerUsing the User Import WizardFigure 3-51. IDM User Import Wizard, SASL Digest MD5 AuthenticationTo set up Digest MD5 a

Strany 39

3-69Using Identity Driven ManagerUsing the User Import WizardFigure 3-52. IDM User Import Wizard, SASL Kerberos V5 AuthenticationTo set up Kerberos V5

Strany 40

3-70Using Identity Driven ManagerUsing the User Import WizardFigure 3-53. IDM User Import Wizard, SASL External AuthenticationTo set up External authe

Strany 41 - Creating Report Policies

3-71Using Identity Driven ManagerUsing the User Import WizardIf you are using a JKS Keystore, the X509 User Certificate must be installed in a keystor

Strany 42

3-72Using Identity Driven ManagerUsing the User Import Wizard3. Optionally, in the Base DN field, type the Distinguished Name. IDM will search only fo

Strany 43

3-73Using Identity Driven ManagerUsing the User Import Wizard// Kerberos authentication module name. If this entry is changed, you must also change th

Strany 44

3-74Using Identity Driven ManagerUsing the User Import Wizard LDAP_DIRECTORY_CONFIG { // Configuration for LDAP directory. Following values are for A

Strany 45

3-75Using Identity Driven ManagerUsing the User Import WizardImporting Users from XML filesIf you select to import users from an XML File, the XML Dat

Strany 46

1-8About ProCurve Identity Driven ManagerTerminologyTerminologyAuthentication The process of proving the user’s identity. In networks this involves th

Strany 47

3-76Using Identity Driven ManagerUsing the User Import WizardXML User Import File ExampleXML files used to import user data to IDM should have the fol

Strany 48 - IDM Session Cleanup Policy

4-14Using the Secure Access WizardChapter ContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 49

4-2Using the Secure Access WizardOverviewOverviewThe Secure Access Wizard (SAW) feature in IDM is designed to simplify the initial setup of IDM by red

Strany 50

4-3Using the Secure Access WizardUsing Secure Access WizardUsing Secure Access WizardNOTE: The following section provides instructions on using the S

Strany 51 - User Session Information

4-4Using the Secure Access WizardUsing Secure Access Wizard2. Click Next to continue to the Device Selection window.Note: If you do not have a license

Strany 52

4-5Using the Secure Access WizardUsing Secure Access Wizard4. Click Next to continue to the next window. 5. If you selected one or more AP530 wireless

Strany 53 - Information tab

4-6Using the Secure Access WizardUsing Secure Access Wizardthat support two authentication methods per port, the options are 801.X and Web-Auth or MAC

Strany 54

4-7Using the Secure Access WizardUsing Secure Access WizardFigure 4-5. Secure Access Wizard, Port Selection example9. To select ports from a list, cli

Strany 55 - Finding a User

4-8Using the Secure Access WizardUsing Secure Access WizardWhen the desired ports are selected, click OK to validate and save your selections.10. To m

Strany 56 - User Reports

4-9Using the Secure Access WizardUsing Secure Access WizardFigure 4-7. Secure Access Wizard, WLAN Selection example13. Click the check box for each SS

Strany 57

1-9About ProCurve Identity Driven ManagerTerminologyRealm A Realm is similar to an Active Directory Domain, but it works across non-Windows (Linux, et

Strany 58 - IDM Preferences

4-10Using the Secure Access WizardUsing Secure Access WizardFigure 4-8. Secure Access Wizard, 802.1X Configuration displayThe configuration options di

Strany 59

4-11Using the Secure Access WizardUsing Secure Access WizardFigure 4-9. Secure Access Wizard, Advanced Settings for Wired 802.1Xc. Click the check box

Strany 60

4-12Using the Secure Access WizardUsing Secure Access WizardRe-auth period - The re-authentication timeout (in seconds, default 0), set to 0 to disabl

Strany 61

4-13Using the Secure Access WizardUsing Secure Access Wizarda. Click the radio button to select the RADIUS authentication protocol. Only one method ca

Strany 62

4-14Using the Secure Access WizardUsing Secure Access WizardDHCP address and mask - The base address and mask for the temporary pool used by DHCP (bas

Strany 63

4-15Using the Secure Access WizardUsing Secure Access Wizarde. Click Next in the configuration window to continue to the Authentication Servers step.

Strany 64

4-16Using the Secure Access WizardUsing Secure Access WizardFigure 4-13. Secure Access Wizard, Advanced (wired) Mac-Auth settings c. Click the check b

Strany 65

4-17Using the Secure Access WizardUsing Secure Access WizardUnauth-vid - The VLAN to which the port is assigned when the user has not been authorized

Strany 66

4-18Using the Secure Access WizardUsing Secure Access WizardNote: If you had previously configured other RADIUS servers for authentication with the de

Strany 67 - IDM Configuration Model

4-19Using the Secure Access WizardUsing Secure Access WizardIf not using the same shared secret on all the devices, enter the Radius shared secret for

Strany 68

1-10About ProCurve Identity Driven ManagerIDM SpecificationsIDM SpecificationsSupported DevicesProCurve Identity Driven Manager (IDM) supports authori

Strany 69

4-20Using the Secure Access WizardUsing Secure Access WizardFigure 4-17. Secure Access Wizard, Save Settings dialog23. Type in a Name to apply to the

Strany 70 - Configuring Locations

4-21Using the Secure Access WizardUsing Secure Access WizardFigure 4-18. Secure Access Wizard, Configuration Preview display27. Review the access secu

Strany 71 - Adding a New Location

4-22Using the Secure Access WizardUsing Secure Access WizardFigure 4-19. Secure Access Wizard, Applying Settings statusThis window displays the progre

Strany 72 - Device Selection option:

5-15Troubleshooting IDMChapter ContentsIDM Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 73 - New Location

5-2Troubleshooting IDMIDM EventsIDM Events The IDM Events window is used to view and manage IDM events generated by the IDM application or the IDM Age

Strany 74

5-3Troubleshooting IDMIDM EventsSortable columns of information are available for each event:You can sort the Events listing by Source, Severity, Stat

Strany 75 - Modifying a Location

5-4Troubleshooting IDMIDM EventsThe details provide additional event description information. The details will vary based on the type of event. Use th

Strany 76 - Deleting a Location

5-5Troubleshooting IDMIDM EventsFigure 5-3. Events Filter display To filter by Source, type in the Source type or name that you want to include. Even

Strany 77 - Configuring Times

5-6Troubleshooting IDMIDM EventsViewing the Events ArchiveThe Archived Events window lists details for each event in the Archive Log, which contains e

Strany 78 - Creating a New Time

5-7Troubleshooting IDMIDM EventsThe Archived Events window provides the following information for each event:You can select the date range for display

Strany 79 - Figure 3-9. Create a New Time

1-11About ProCurve Identity Driven ManagerIDM Specifications Supported Operating Systems for PCM+ and IDM Remote Client:• MS Windows XP Pro (Service

Strany 80 - Modifying a Time

5-8Troubleshooting IDMIDM EventsSetting IDM Event PreferencesUse the IDM Event Preferences to set up archiving and automatic deletion of events from t

Strany 81 - Defining Holidays

5-9Troubleshooting IDMIDM Events5. Use the Severity Percentages to set the events types you want to maintain in the database. These percentages are ba

Strany 82

5-10Troubleshooting IDMIDM EventsUsing Activity LogsIDM also provides an Activity Log you can use to monitor events for specific RADIUS servers. To vi

Strany 83 - Configuring Network Resources

5-11Troubleshooting IDMUsing Decision Manager TracingUsing Decision Manager TracingIDM provides a tracing tool (DMConfig.prp) and log file (DM-IDMDM.l

Strany 84

5-12Troubleshooting IDMUsing Decision Manager TracingMiscellaneousFor authenticating a MAC-Auth user using Funk Steel Belted RADIUS (SBR) with IDM, th

Strany 85 - Adding a Network Resource

A-1AUsing ProCurve Network Access Controller with IDM About ProCurve Network Access Controller 800The ProCurve Network Access Controller 800 (ProCurve

Strany 86 - Modifying a Network Resource

A-2Using ProCurve Network Access Controller with IDMAbout ProCurve Network Access Controller 800Before You BeginFor information on installing the ProC

Strany 87 - Deleting a Network Resource

A-3Using ProCurve Network Access Controller with IDMUsing the NAC Tab DisplaysUsing the NAC Tab DisplaysOnce the ProCurve NAC appliance is installed o

Strany 88 - Configuring Access Profiles

A-4Using ProCurve Network Access Controller with IDMUsing the NAC Tab DisplaysSetting the ProCurve NAC GUI LoginIn addition to the "NAC" tab

Strany 89

A-5Using ProCurve Network Access Controller with IDMUsing the NAC Tab DisplaysUsing the NAC Home TabThe NAC Home tab launches the ProCurve NAC GUI wit

Strany 90 - Creating a New Access Profile

1-12About ProCurve Identity Driven ManagerRegistering Your IDM SoftwareIf you have not purchased an IDM 2.0 or newer license, your installation will i

Strany 91

A-6Using ProCurve Network Access Controller with IDMUsing the NAC Tab DisplaysUsing the NAC Monitor TabIn addition to the NAC Home tab, integration of

Strany 92

A-7Using ProCurve Network Access Controller with IDMUsing the NAC Tab DisplaysFor additional details, refer to the online help, or the section describ

Strany 93

A-8Using ProCurve Network Access Controller with IDMUsing Local Authentication Directory on ProCurve NACThis window also provides access to Maintenanc

Strany 94

A-9Using ProCurve Network Access Controller with IDMUsing Local Authentication Directory on ProCurve NAC2. Click the check box to Enable Local Authent

Strany 95

A-10Using ProCurve Network Access Controller with IDMUsing Local Authentication Directory on ProCurve NACFigure A-7. User Properties, with Local Authe

Strany 96

B-1BIDM Technical ReferenceDevice Support for IDM FunctionalityDue to variations in hardware and software configuration of various ProCurve Devices, n

Strany 97 - Modifying an Access Profile

B-2IDM Technical ReferenceDevice Support for IDM FunctionalitySupport for Secure Access Wizard FeatureProCurve Device ACL's VLAN QoS BW MAC Web

Strany 98 - Deleting an Access Profile

B-3IDM Technical ReferenceBest PracticesBest PracticesAuthentication MethodsThe IDM application is designed to support RADIUS server implementation wi

Strany 99

B-4IDM Technical ReferenceBest PracticesHandling Unknown or Unauthorized usersIf a user is authenticated in RADIUS, but is unknown to IDM, IDM will no

Strany 100

B-5IDM Technical ReferenceBest Practices In this instance, if the user attempts to login in during the times specified for the Weekends, they will be

Strany 101 - New Access Rule dialogue

1-13About ProCurve Identity Driven ManagerRegistering Your IDM SoftwareFigure 1-6. ProCurve License Administration dialogueYou can also get to this sc

Strany 102

B-6IDM Technical ReferenceTypes of User EventsTypes of User EventsThe USER_FAILED_LOGIN event happens whenever RADIUS sends IDM a message of an unsucc

Strany 103

Index–1IndexNumerics802.1X configuration, SAW 4-9AAccess Attributes 3-26Access attributes 3-27Access Information 2-32Access Policyorder 3-38

Strany 104

Index–2Global Rules 3-45, 3-47HHolidays 3-17IIDM Agenttracing 5-11IDM authorization policy 3-49IDM model 3-3IDM Statistics 2-18Importfro

Strany 105

Index–3Rules, evaluation 3-38SSASL Digest MD5 authentication 3-67Save Settings, SAW 4-19Save Template, SAW 4-19SAW 4-2Secure Access Wizard

Strany 106 - Configuring User Access

© Copyright 2008 Hewlett-Packard Development Company, L.P.May 2008Manual Part Number5990-8851

Strany 107

Hewlett-Packard Company 8000 Foothills Boulevard, m/s 5551 Roseville, California 95747-5551 http://www.procurve.com© Copyright 2008 Hewlett-Packard De

Strany 108

1-14About ProCurve Identity Driven ManagerLearning to Use ProCurve IDM7. In the Registration window:a. select the product to register from the Product

Strany 109 - Using Global Rules

1-15About ProCurve Identity Driven ManagerLearning to Use ProCurve IDMGetting ProCurve Documentation From the Web1. Go to the Procurve website at http

Strany 110

1-16About ProCurve Identity Driven ManagerLearning to Use ProCurve IDM

Strany 111 - Changing Global Rules

2-12Getting StartedChapter ContentsGetting StartedBefore You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 112

2-2Getting StartedBefore You BeginBefore You BeginIf you have not already done so, please review the list of supported devices and operating requireme

Strany 113 - RADIUS Servers

2-3Getting StartedBefore You BeginThe IDM Client is included with the PCM+ software. To install a remote PCM/IDM Client, download the PCM Client to a

Strany 114 - Using Manual Configuration

2-4Getting StartedBefore You Begin5. Create the Access Profiles, to set the VLAN, QoS, rate-limits (bandwidth) attributes, and the network resources t

Strany 115 - Modifying and Deleting Realms

2-5Getting StartedBefore You BeginUnderstanding the IDM ModelThe first thing to understand, is that IDM works within the general concept of ‘domains’

Strany 116 - Deleting RADIUS Servers

2-6Getting StartedIDM GUI OverviewIDM GUI OverviewTo use the IDM client, launch the PCM Client on your PC. Select the ProCurve Manager option from the

Strany 117 - Adding New Users

2-7Getting StartedIDM GUI OverviewSelect the IDM Tree tab at the bottom left of the PCM window to display the IDM Home window.Figure 2-2. IDM Home Win

Strany 118 - Configuring User Systems

iiiContents1 About ProCurve Identity Driven ManagerIntroduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 119 - Modifying and Deleting Users

2-8Getting StartedIDM GUI OverviewIDM DashboardThe IDM Dashboard tab (window) contains four separate panels, described below.Identity Management Statu

Strany 120 - Deleting a User

2-9Getting StartedIDM GUI OverviewUsing the Navigation TreeThe navigation tree in the left pane of the IDM window provides access to IDM features usin

Strany 121 - Using the User Import Wizard

2-10Getting StartedIDM GUI OverviewFigure 2-5. Realm Properties tabClick the Users tab, underneath the realm Properties tab, to view a list of users i

Strany 122 - Data Source selection window

2-11Getting StartedIDM GUI OverviewFigure 2-7. Access Policy Groups tabClick the individual group node in the tree to display the group’s Properties.

Strany 123 - Group Scope window

2-12Getting StartedIDM GUI OverviewRADIUS Servers: Clicking the RADIUS Servers node displays the RADIUS List tab, with status and configuration inform

Strany 124

2-13Getting StartedIDM GUI OverviewThe Activity Log tab underneath the properties display contains a listing of IDM application events for that RADIUS

Strany 125 - Add Users window

2-14Getting StartedUsing IDM as a Monitoring ToolUsing IDM as a Monitoring ToolWhether or not you configure and apply access and authorization paramet

Strany 126

2-15Getting StartedUsing IDM ReportsUsing IDM ReportsIDM provides reports designed to help you monitor and analyze usage patterns for network resource

Strany 127

2-16Getting StartedUsing IDM ReportsFigure 2-13. Bandwidth Usage ReportYou can save the report to a file, or print the report. To apply customized Rep

Strany 128 - LDAP Authentication window

2-17Getting StartedUsing IDM ReportsBandwidth Usage Report: The Bandwidth Usage Report lists bandwidth usage per User. the top 25 bandwidth users. You

Strany 129

ivContentsIDM Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-36Using Active Directory Synchroni

Strany 130 - For Simple Authentication

2-18Getting StartedUsing IDM ReportsThe following information is provided for each user included in the Bandwidth Usage report:IDM Statistics: The IDM

Strany 131 - Simple authentication:

2-19Getting StartedCreating Report PoliciesUser Report: The User Report lists information for recent sessions in which the user participated, similar

Strany 132

2-20Getting StartedCreating Report PoliciesFigure 2-14. Policy Manager, Actions displayThe Manage Actions window displays the list of defined Actions.

Strany 133 - Using External Authentication

2-21Getting StartedCreating Report Policies4. Select the Report Manager:Generate Report Action type from the pull-down menu. Figure 2-16. Policy Manag

Strany 134

2-22Getting StartedCreating Report PoliciesFigure 2-17. Policy Manager: Report Manager Action configurationAt this point the other tabs displayed are:

Strany 135

2-23Getting StartedCreating Report PoliciesFigure 2-18. Report Manager Action, Report type selection8. Click the Report Filter tab to select the repor

Strany 136

2-24Getting StartedCreating Report Policies• PDF Produce the report in .pdf format. To view this file format, you will need Adobe Acrobat Reader, whic

Strany 137

2-25Getting StartedCreating Report PoliciesSelecting FTP as the delivery method lets you save the report on an FTP site. However, proxy support is not

Strany 138

2-26Getting StartedCreating Report PoliciesYou can access User Reports by right-clicking on the user in the Users tab display in IDM, then select the

Strany 139

2-27Getting StartedCreating Report PoliciesFigure 2-23. IDM Session Cleanup Schedule properties4. Click the Schedule tab to review and edit the schedu

Strany 140 - XML User Import File Example

vContents4 Using the Secure Access WizardOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 141 - Chapter Contents

2-28Getting StartedCreating Report Policies5. Set the Start Date for enforcement of the policy. The default is the start date and time for IDM. You c

Strany 142 - Overview

2-29Getting StartedUser Session InformationUser Session InformationYou can use IDM to just monitor the network, and receive detailed information about

Strany 143 - Using Secure Access Wizard

2-30Getting StartedUser Session InformationThe Session List provides a listing of recent sessions, including the following information: The User Prop

Strany 144 - Selected Devices list

2-31Getting StartedUser Session InformationThe Session Information tab of the User Status window contains the following information:To track the user’

Strany 145 - Master device

2-32Getting StartedUser Session InformationFigure 2-26. Location Information tabThe Location Information tab of the User Status window contains the fo

Strany 146

2-33Getting StartedUser Session InformationThe Access Information tab of the User Status window contains the following information:Finding a UserThe F

Strany 147 - Selected checkbox for each

2-34Getting StartedUser Session Information2. In the Username field, type the complete user name of the user you want to find and display information

Strany 148

2-35Getting StartedUser Session Information3. Click the check boxes to select the data columns. If wireless settings are enabled the WLAN and BSSID o

Strany 149

2-36Getting StartedUser Session InformationIDM PreferencesThe IDM Preferences window is used to set up global attributes for session accounting and ar

Strany 150

2-37Getting StartedUser Session Information1. The Configuration Deployment option is used to automatically deploy IDM configuration settings (Access P

Strany 151

viContents

Strany 152

2-38Getting StartedUser Session InformationExisting accounting records are not removed by the Reset procedures, the only effect is that currently open

Strany 153

2-39Getting StartedUser Session InformationFigure 2-31. Identity Management Preferences: User Directory Settings.1. Click the checkbox to select the E

Strany 154

2-40Getting StartedUser Session Information4. To Add a group to the "Groups to Synchronize" list, click Add or Remove Groups... to display t

Strany 155

2-41Getting StartedUser Session Information5. Select the Active Directory Groups you want to Synchronize to IDM, then click the >> button to mov

Strany 156

2-42Getting StartedUser Session Information Users deleted from Active Directory while synchronization is disabled are assigned to the default Access

Strany 157 - Unauth-vid

3-13Using Identity Driven ManagerChapter ContentsIDM Configuration Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 158 - Confirm shared secret field

3-2Using Identity Driven ManagerDeleting RADIUS Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-52Adding New Users

Strany 159

3-3Using Identity Driven ManagerIDM Configuration ModelIDM Configuration Model As described in the IDM model on page 2-5, everything relates to the to

Strany 160

3-4Using Identity Driven ManagerIDM Configuration Model2. Define "times" (optional) at which users will be allowed or denied access. This ca

Strany 161

3-5Using Identity Driven ManagerIDM Configuration Model2. Click the Configure Identity Management icon in the Realms window toolbar.The Identity Manag

Strany 162

1-11 About ProCurve Identity Driven ManagerChapter ContentsAbout ProCurve Identity Driven ManagerIntroduction . . . . . . . . . . . . . . . . . . . .

Strany 163 - Troubleshooting IDM

3-6Using Identity Driven ManagerConfiguring LocationsConfiguring LocationsLocations in IDM identify the switch and/or ports on the switch and wireless

Strany 164 - IDM Events

3-7Using Identity Driven ManagerConfiguring LocationsAdding a New LocationTo create a new location:1. Click the New Location icon in the toolbar to di

Strany 165

3-8Using Identity Driven ManagerConfiguring LocationsFigure 3-4. New Device window5. Enter the Device to be added using the Device Selection pull-down

Strany 166 - Using Event Filters

3-9Using Identity Driven ManagerConfiguring Locations6. Use the Port Selection to define the ports on the device that will be associated with the loca

Strany 167

3-10Using Identity Driven ManagerConfiguring LocationsFigure 3-5. Create a New Location, Wireless Devices display11. Click Add Device... to display th

Strany 168 - Viewing the Events Archive

3-11Using Identity Driven ManagerConfiguring LocationsClick the check box to select the radio ports to be included in the location, and then click OK

Strany 169

3-12Using Identity Driven ManagerConfiguring LocationsDeleting a LocationTo remove an existing Location:1. Click the Locations node in the Identity Ma

Strany 170 - Setting IDM Event Preferences

3-13Using Identity Driven ManagerConfiguring TimesConfiguring TimesTimes are used to define the hours and days when a user can connect to the network.

Strany 171

3-14Using Identity Driven ManagerConfiguring TimesFigure 3-8. Times PropertiesCreating a New TimeTo configure a Time:1. Click the Times node in the Id

Strany 172 - Using Activity Logs

3-15Using Identity Driven ManagerConfiguring TimesFigure 3-9. Create a New Time3. Define the properties for the new time. Name Name used to identify t

Strany 173

1-2About ProCurve Identity Driven ManagerIntroductionIntroductionNetwork usage has skyrocketed with the expansion of the Internet, wireless, and conve

Strany 174 - Miscellaneous

3-16Using Identity Driven ManagerConfiguring Times4. Click Ok to save the new "Time" and close the panel. The new time appears in the Times

Strany 175 - Controller 800

3-17Using Identity Driven ManagerConfiguring TimesDefining HolidaysTo add holidays for use when defining Times in IDM: 1. Click the Times node in the

Strany 176 - Before You Begin

3-18Using Identity Driven ManagerConfiguring TimesTo delete a Holiday, select it in the Holidays list, then click Delete... Click Yes in the confirmat

Strany 177 - Using the NAC Tab Displays

3-19Using Identity Driven ManagerConfiguring Network ResourcesConfiguring Network ResourcesThe Network Resources in IDM are used to permit or deny tra

Strany 178

3-20Using Identity Driven ManagerConfiguring Network ResourcesThe Network Resources window lists the name and parameters for defined resources, includ

Strany 179 - Using the NAC Home Tab

3-21Using Identity Driven ManagerConfiguring Network ResourcesAdding a Network ResourceTo define a Network Resource:1. Click the Network Resources nod

Strany 180 - Using the NAC Monitor Tab

3-22Using Identity Driven ManagerConfiguring Network Resources* Valid Friendly port names supported in IDM include: ftp, syslog, ldap, http, imap4, im

Strany 181

3-23Using Identity Driven ManagerConfiguring Network ResourcesDeleting a Network ResourceTo delete a Network Resource:1. Click the Network Resources n

Strany 182 - ProCurve NAC

3-24Using Identity Driven ManagerConfiguring Access ProfilesConfiguring Access ProfilesIDM uses an Access Profile to set the VLAN, QoS, Bandwidth (rat

Strany 183

3-25Using Identity Driven ManagerConfiguring Access Profiles

Strany 184 - Confirm Password field

1-3About ProCurve Identity Driven ManagerIntroductionWhy IDM?Today, access control using a RADIUS system and ProCurve devices (switches or wireless ac

Strany 185 - IDM Technical Reference

3-26Using Identity Driven ManagerConfiguring Access ProfilesClick the Access Profile node in the navigation tree, or double-click on a profile in the

Strany 186 - IDM Device Feature Matrix

3-27Using Identity Driven ManagerConfiguring Access Profiles2. Click the Add Access Profile icon in the toolbar to display the Create a new Access Pro

Strany 187 - Best Practices

3-28Using Identity Driven ManagerConfiguring Access ProfilesThe VLAN that gets set for a user will override the statically configured VLAN, as well as

Strany 188 - Allowing vs. Rejecting Access

3-29Using Identity Driven ManagerConfiguring Access ProfilesFigure 3-19. Network Resource Assignment Wizard, Allowed Network Resources6. To permit acc

Strany 189 - Rate-Limiting

3-30Using Identity Driven ManagerConfiguring Access ProfilesFigure 3-20. Network Resource Assignment Wizard, Denied Network Resources7. To deny access

Strany 190 - Types of User Events

3-31Using Identity Driven ManagerConfiguring Access ProfilesFigure 3-21. Network Resource Assignment Wizard, Priority Assignment8. Set the priority (o

Strany 191

3-32Using Identity Driven ManagerConfiguring Access Profiles10. Select the option to tell IDM what to do if there are no matches found in the network

Strany 192 - Index–2

3-33Using Identity Driven ManagerConfiguring Access ProfilesFigure 3-24. Network Resource Assignment Wizard, Summary14. Click Finish to save the Netwo

Strany 193

3-34Using Identity Driven ManagerConfiguring Access ProfilesThe changes are displayed in the Access Profiles list.NOTE: When modifying Access Profiles

Strany 194 - 5990-8851

3-35Using Identity Driven ManagerDefining Access Policy GroupsDefining Access Policy GroupsAn Access Policy Group (APG) contains rules that define the

Komentáře k této Příručce

Žádné komentáře