Hp Identity Driven Manager Software Series Manuale Utente Pagina 1

Navigare online o scaricare Manuale Utente per Software Hp Identity Driven Manager Software Series. HP Identity Driven Manager Software Series User Manual Manuale Utente

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa

Sommario

Pagina 1 - Software Release 2.3

www.procurve.comUser’s GuideProCurve Identity Driven ManagerSoftware Release 2.3

Pagina 2

1-4About ProCurve Identity Driven ManagerIntroductionWhen using IDM, the authentication process proceeds as described in the first three steps, but fr

Pagina 3 - Contents

3-36Using Identity Driven ManagerDefining Access Policy GroupsTo begin, expand the Realms node to display the Access Policy Group node in the IDM tree

Pagina 4

3-37Using Identity Driven ManagerDefining Access Policy GroupsFigure 3-27. New Access Policy Group3. Type in a Name and Description for the Access Pol

Pagina 5 - B IDM Technical Reference

3-38Using Identity Driven ManagerDefining Access Policy Groups 6. Repeat the process for each rule you want to apply to the APG.7. The Access rules ar

Pagina 6

3-39Using Identity Driven ManagerDefining Access Policy GroupsIDM will verify that the rules in the APG are valid. If a rule includes a defined VLAN (

Pagina 7

3-40Using Identity Driven ManagerDefining Access Policy GroupsFigure 3-29. Access Rule with Endpoint Integrity optionsSelect the Endpoint Integrity op

Pagina 8

3-41Using Identity Driven ManagerDefining Access Policy GroupsModifying an Access Policy Group1. Click the Access Policy Group node in the IDM tree to

Pagina 9 - Why IDM?

3-42Using Identity Driven ManagerConfiguring User AccessConfiguring User AccessThe process of configuring User access to network resources using IDM i

Pagina 10 - Introduction

3-43Using Identity Driven ManagerConfiguring User AccessThe Users list identifies every defined user and contains the following infor-mation for each

Pagina 11 - What’s New in IDM 2.3

3-44Using Identity Driven ManagerConfiguring User Access4. Click Ok to save the assignments and close the window.The new APG assignments are displayed

Pagina 12 - IDM Architecture

3-45Using Identity Driven ManagerConfiguring User AccessUsing Global RulesGlobal Rules can be used to provide an "exception process" to the

Pagina 13

1-5About ProCurve Identity Driven ManagerIntroductionWhat’s New in IDM 2.3ProCurve Identity Driven Manager version 2.3 includes the following new feat

Pagina 14 - Terminology

3-46Using Identity Driven ManagerConfiguring User Access Creating a Global Rule is similar to creating Access Rules for an Access Profile Group.To cre

Pagina 15

3-47Using Identity Driven ManagerConfiguring User Access2. Set the Access Properties for the Global Rule. This is similar to the process used to defin

Pagina 16 - IDM Specifications

3-48Using Identity Driven ManagerConfiguring User Access4. Click Yes in the confirmation pop-up to complete the process.The rule is removed from the G

Pagina 17 - Additional Requirements

3-49Using Identity Driven ManagerDeploying Configurations to the AgentDeploying Configurations to the AgentAn option in the IDM Preferences allows you

Pagina 18 - Registering Your IDM Software

3-50Using Identity Driven ManagerUsing Manual ConfigurationUsing Manual Configuration It is simplest to let the IDM Agent run and collect information

Pagina 19

3-51Using Identity Driven ManagerUsing Manual Configuration3. Click Ok to save the Realm information and close the window. The new Realm appears in t

Pagina 20 - Learning to Use ProCurve IDM

3-52Using Identity Driven ManagerUsing Manual ConfigurationDeleting RADIUS ServersTo delete an existing RADIUS Server:NOTE: Before you can completely

Pagina 21 - ProCurve Support

3-53Using Identity Driven ManagerUsing Manual ConfigurationAdding New UsersYou can let the IDM Agent automatically learn about the users from the Acti

Pagina 22

3-54Using Identity Driven ManagerUsing Manual Configuration3. If you want to restrict the user’s access to specific systems, click the Systems tab to

Pagina 23 - Getting Started

3-55Using Identity Driven ManagerUsing Manual ConfigurationIf the user is allowed to login from more than one system, repeat the process for each syst

Pagina 24

1-6About ProCurve Identity Driven ManagerIntroductionIDM ArchitectureIn IDM, when a user attempts to connect to the network through an edge switch, th

Pagina 25

3-56Using Identity Driven ManagerUsing Manual ConfigurationDeleting a User1. Select the User in the User List 2. Click the Delete User icon in the too

Pagina 26 - IDM Usage Strategies

3-57Using Identity Driven ManagerUsing the User Import WizardUsing the User Import WizardThe IDM User Import Wizard lets you add users to IDM from ano

Pagina 27 - Understanding the IDM Model

3-58Using Identity Driven ManagerUsing the User Import WizardImporting Users from Active DirectoryImporting users from Active Directory with the IDM I

Pagina 28 - IDM GUI Overview

3-59Using Identity Driven ManagerUsing the User Import WizardFigure 3-41. IDM User Import Wizard, Data Source3. Click the radio button to select the A

Pagina 29

3-60Using Identity Driven ManagerUsing the User Import Wizard5. Select the scope of Active Directory groups that you want to import user data from. 6.

Pagina 30 - IDM Dashboard

3-61Using Identity Driven ManagerUsing the User Import WizardFigure 3-44. IDM User Import Wizard, Import Groups8. Click the Select checkbox to choose

Pagina 31 - Using the Navigation Tree

3-62Using Identity Driven ManagerUsing the User Import WizardFigure 3-45. IDM User Import Wizard, Add Users10. Click the Select checkbox to choose the

Pagina 32

3-63Using Identity Driven ManagerUsing the User Import WizardIf you have a large number of users that belong to multiple groups, click the checkbox to

Pagina 33

3-64Using Identity Driven ManagerUsing the User Import WizardFigure 3-48. IDM User Import Wizard, Import Complete A summary of the IDM Import displays

Pagina 34

3-65Using Identity Driven ManagerUsing the User Import WizardFigure 3-49. IDM User Import Wizard, LDAP Authenticationa. To use the SSL authentication

Pagina 35 - Toolbars and Menus

1-7About ProCurve Identity Driven ManagerIntroduction• A Decision Manager that receives the user data and checks it against user data in the local IDM

Pagina 36

3-66Using Identity Driven ManagerUsing the User Import Wizardb. Select the LDAP Authentication type to be used with the imported user data:c. Click Ne

Pagina 37 - Using IDM Reports

3-67Using Identity Driven ManagerUsing the User Import WizardFigure 3-50. IDM User Import Wizard, Simple AuthenticationTo set up Simple authentication

Pagina 38

3-68Using Identity Driven ManagerUsing the User Import WizardFigure 3-51. IDM User Import Wizard, SASL Digest MD5 AuthenticationTo set up Digest MD5 a

Pagina 39

3-69Using Identity Driven ManagerUsing the User Import WizardFigure 3-52. IDM User Import Wizard, SASL Kerberos V5 AuthenticationTo set up Kerberos V5

Pagina 40

3-70Using Identity Driven ManagerUsing the User Import WizardFigure 3-53. IDM User Import Wizard, SASL External AuthenticationTo set up External authe

Pagina 41 - Creating Report Policies

3-71Using Identity Driven ManagerUsing the User Import WizardIf you are using a JKS Keystore, the X509 User Certificate must be installed in a keystor

Pagina 42

3-72Using Identity Driven ManagerUsing the User Import Wizard3. Optionally, in the Base DN field, type the Distinguished Name. IDM will search only fo

Pagina 43

3-73Using Identity Driven ManagerUsing the User Import Wizard// Kerberos authentication module name. If this entry is changed, you must also change th

Pagina 44

3-74Using Identity Driven ManagerUsing the User Import Wizard LDAP_DIRECTORY_CONFIG { // Configuration for LDAP directory. Following values are for A

Pagina 45

3-75Using Identity Driven ManagerUsing the User Import WizardImporting Users from XML filesIf you select to import users from an XML File, the XML Dat

Pagina 46

1-8About ProCurve Identity Driven ManagerTerminologyTerminologyAuthentication The process of proving the user’s identity. In networks this involves th

Pagina 47

3-76Using Identity Driven ManagerUsing the User Import WizardXML User Import File ExampleXML files used to import user data to IDM should have the fol

Pagina 48 - IDM Session Cleanup Policy

4-14Using the Secure Access WizardChapter ContentsOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Pagina 49

4-2Using the Secure Access WizardOverviewOverviewThe Secure Access Wizard (SAW) feature in IDM is designed to simplify the initial setup of IDM by red

Pagina 50

4-3Using the Secure Access WizardUsing Secure Access WizardUsing Secure Access WizardNOTE: The following section provides instructions on using the S

Pagina 51 - User Session Information

4-4Using the Secure Access WizardUsing Secure Access Wizard2. Click Next to continue to the Device Selection window.Note: If you do not have a license

Pagina 52

4-5Using the Secure Access WizardUsing Secure Access Wizard4. Click Next to continue to the next window. 5. If you selected one or more AP530 wireless

Pagina 53 - Information tab

4-6Using the Secure Access WizardUsing Secure Access Wizardthat support two authentication methods per port, the options are 801.X and Web-Auth or MAC

Pagina 54

4-7Using the Secure Access WizardUsing Secure Access WizardFigure 4-5. Secure Access Wizard, Port Selection example9. To select ports from a list, cli

Pagina 55 - Finding a User

4-8Using the Secure Access WizardUsing Secure Access WizardWhen the desired ports are selected, click OK to validate and save your selections.10. To m

Pagina 56 - User Reports

4-9Using the Secure Access WizardUsing Secure Access WizardFigure 4-7. Secure Access Wizard, WLAN Selection example13. Click the check box for each SS

Pagina 57

1-9About ProCurve Identity Driven ManagerTerminologyRealm A Realm is similar to an Active Directory Domain, but it works across non-Windows (Linux, et

Pagina 58 - IDM Preferences

4-10Using the Secure Access WizardUsing Secure Access WizardFigure 4-8. Secure Access Wizard, 802.1X Configuration displayThe configuration options di

Pagina 59

4-11Using the Secure Access WizardUsing Secure Access WizardFigure 4-9. Secure Access Wizard, Advanced Settings for Wired 802.1Xc. Click the check box

Pagina 60

4-12Using the Secure Access WizardUsing Secure Access WizardRe-auth period - The re-authentication timeout (in seconds, default 0), set to 0 to disabl

Pagina 61

4-13Using the Secure Access WizardUsing Secure Access Wizarda. Click the radio button to select the RADIUS authentication protocol. Only one method ca

Pagina 62

4-14Using the Secure Access WizardUsing Secure Access WizardDHCP address and mask - The base address and mask for the temporary pool used by DHCP (bas

Pagina 63

4-15Using the Secure Access WizardUsing Secure Access Wizarde. Click Next in the configuration window to continue to the Authentication Servers step.

Pagina 64

4-16Using the Secure Access WizardUsing Secure Access WizardFigure 4-13. Secure Access Wizard, Advanced (wired) Mac-Auth settings c. Click the check b

Pagina 65

4-17Using the Secure Access WizardUsing Secure Access WizardUnauth-vid - The VLAN to which the port is assigned when the user has not been authorized

Pagina 66

4-18Using the Secure Access WizardUsing Secure Access WizardNote: If you had previously configured other RADIUS servers for authentication with the de

Pagina 67 - IDM Configuration Model

4-19Using the Secure Access WizardUsing Secure Access WizardIf not using the same shared secret on all the devices, enter the Radius shared secret for

Pagina 68

1-10About ProCurve Identity Driven ManagerIDM SpecificationsIDM SpecificationsSupported DevicesProCurve Identity Driven Manager (IDM) supports authori

Pagina 69

4-20Using the Secure Access WizardUsing Secure Access WizardFigure 4-17. Secure Access Wizard, Save Settings dialog23. Type in a Name to apply to the

Pagina 70 - Configuring Locations

4-21Using the Secure Access WizardUsing Secure Access WizardFigure 4-18. Secure Access Wizard, Configuration Preview display27. Review the access secu

Pagina 71 - Adding a New Location

4-22Using the Secure Access WizardUsing Secure Access WizardFigure 4-19. Secure Access Wizard, Applying Settings statusThis window displays the progre

Pagina 72 - Device Selection option:

5-15Troubleshooting IDMChapter ContentsIDM Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Pagina 73 - New Location

5-2Troubleshooting IDMIDM EventsIDM Events The IDM Events window is used to view and manage IDM events generated by the IDM application or the IDM Age

Pagina 74

5-3Troubleshooting IDMIDM EventsSortable columns of information are available for each event:You can sort the Events listing by Source, Severity, Stat

Pagina 75 - Modifying a Location

5-4Troubleshooting IDMIDM EventsThe details provide additional event description information. The details will vary based on the type of event. Use th

Pagina 76 - Deleting a Location

5-5Troubleshooting IDMIDM EventsFigure 5-3. Events Filter display To filter by Source, type in the Source type or name that you want to include. Even

Pagina 77 - Configuring Times

5-6Troubleshooting IDMIDM EventsViewing the Events ArchiveThe Archived Events window lists details for each event in the Archive Log, which contains e

Pagina 78 - Creating a New Time

5-7Troubleshooting IDMIDM EventsThe Archived Events window provides the following information for each event:You can select the date range for display

Pagina 79 - Figure 3-9. Create a New Time

1-11About ProCurve Identity Driven ManagerIDM Specifications Supported Operating Systems for PCM+ and IDM Remote Client:• MS Windows XP Pro (Service

Pagina 80 - Modifying a Time

5-8Troubleshooting IDMIDM EventsSetting IDM Event PreferencesUse the IDM Event Preferences to set up archiving and automatic deletion of events from t

Pagina 81 - Defining Holidays

5-9Troubleshooting IDMIDM Events5. Use the Severity Percentages to set the events types you want to maintain in the database. These percentages are ba

Pagina 82

5-10Troubleshooting IDMIDM EventsUsing Activity LogsIDM also provides an Activity Log you can use to monitor events for specific RADIUS servers. To vi

Pagina 83 - Configuring Network Resources

5-11Troubleshooting IDMUsing Decision Manager TracingUsing Decision Manager TracingIDM provides a tracing tool (DMConfig.prp) and log file (DM-IDMDM.l

Pagina 84

5-12Troubleshooting IDMUsing Decision Manager TracingMiscellaneousFor authenticating a MAC-Auth user using Funk Steel Belted RADIUS (SBR) with IDM, th

Pagina 85 - Adding a Network Resource

A-1AUsing ProCurve Network Access Controller with IDM About ProCurve Network Access Controller 800The ProCurve Network Access Controller 800 (ProCurve

Pagina 86 - Modifying a Network Resource

A-2Using ProCurve Network Access Controller with IDMAbout ProCurve Network Access Controller 800Before You BeginFor information on installing the ProC

Pagina 87 - Deleting a Network Resource

A-3Using ProCurve Network Access Controller with IDMUsing the NAC Tab DisplaysUsing the NAC Tab DisplaysOnce the ProCurve NAC appliance is installed o

Pagina 88 - Configuring Access Profiles

A-4Using ProCurve Network Access Controller with IDMUsing the NAC Tab DisplaysSetting the ProCurve NAC GUI LoginIn addition to the "NAC" tab

Pagina 89

A-5Using ProCurve Network Access Controller with IDMUsing the NAC Tab DisplaysUsing the NAC Home TabThe NAC Home tab launches the ProCurve NAC GUI wit

Pagina 90 - Creating a New Access Profile

1-12About ProCurve Identity Driven ManagerRegistering Your IDM SoftwareIf you have not purchased an IDM 2.0 or newer license, your installation will i

Pagina 91

A-6Using ProCurve Network Access Controller with IDMUsing the NAC Tab DisplaysUsing the NAC Monitor TabIn addition to the NAC Home tab, integration of

Pagina 92

A-7Using ProCurve Network Access Controller with IDMUsing the NAC Tab DisplaysFor additional details, refer to the online help, or the section describ

Pagina 93

A-8Using ProCurve Network Access Controller with IDMUsing Local Authentication Directory on ProCurve NACThis window also provides access to Maintenanc

Pagina 94

A-9Using ProCurve Network Access Controller with IDMUsing Local Authentication Directory on ProCurve NAC2. Click the check box to Enable Local Authent

Pagina 95

A-10Using ProCurve Network Access Controller with IDMUsing Local Authentication Directory on ProCurve NACFigure A-7. User Properties, with Local Authe

Pagina 96

B-1BIDM Technical ReferenceDevice Support for IDM FunctionalityDue to variations in hardware and software configuration of various ProCurve Devices, n

Pagina 97 - Modifying an Access Profile

B-2IDM Technical ReferenceDevice Support for IDM FunctionalitySupport for Secure Access Wizard FeatureProCurve Device ACL's VLAN QoS BW MAC Web

Pagina 98 - Deleting an Access Profile

B-3IDM Technical ReferenceBest PracticesBest PracticesAuthentication MethodsThe IDM application is designed to support RADIUS server implementation wi

Pagina 99

B-4IDM Technical ReferenceBest PracticesHandling Unknown or Unauthorized usersIf a user is authenticated in RADIUS, but is unknown to IDM, IDM will no

Pagina 100

B-5IDM Technical ReferenceBest Practices In this instance, if the user attempts to login in during the times specified for the Weekends, they will be

Pagina 101 - New Access Rule dialogue

1-13About ProCurve Identity Driven ManagerRegistering Your IDM SoftwareFigure 1-6. ProCurve License Administration dialogueYou can also get to this sc

Pagina 102

B-6IDM Technical ReferenceTypes of User EventsTypes of User EventsThe USER_FAILED_LOGIN event happens whenever RADIUS sends IDM a message of an unsucc

Pagina 103

Index–1IndexNumerics802.1X configuration, SAW 4-9AAccess Attributes 3-26Access attributes 3-27Access Information 2-32Access Policyorder 3-38

Pagina 104

Index–2Global Rules 3-45, 3-47HHolidays 3-17IIDM Agenttracing 5-11IDM authorization policy 3-49IDM model 3-3IDM Statistics 2-18Importfro

Pagina 105

Index–3Rules, evaluation 3-38SSASL Digest MD5 authentication 3-67Save Settings, SAW 4-19Save Template, SAW 4-19SAW 4-2Secure Access Wizard

Pagina 106 - Configuring User Access

© Copyright 2008 Hewlett-Packard Development Company, L.P.May 2008Manual Part Number5990-8851

Pagina 107

Hewlett-Packard Company 8000 Foothills Boulevard, m/s 5551 Roseville, California 95747-5551 http://www.procurve.com© Copyright 2008 Hewlett-Packard De

Pagina 108

1-14About ProCurve Identity Driven ManagerLearning to Use ProCurve IDM7. In the Registration window:a. select the product to register from the Product

Pagina 109 - Using Global Rules

1-15About ProCurve Identity Driven ManagerLearning to Use ProCurve IDMGetting ProCurve Documentation From the Web1. Go to the Procurve website at http

Pagina 110

1-16About ProCurve Identity Driven ManagerLearning to Use ProCurve IDM

Pagina 111 - Changing Global Rules

2-12Getting StartedChapter ContentsGetting StartedBefore You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Pagina 112

2-2Getting StartedBefore You BeginBefore You BeginIf you have not already done so, please review the list of supported devices and operating requireme

Pagina 113 - RADIUS Servers

2-3Getting StartedBefore You BeginThe IDM Client is included with the PCM+ software. To install a remote PCM/IDM Client, download the PCM Client to a

Pagina 114 - Using Manual Configuration

2-4Getting StartedBefore You Begin5. Create the Access Profiles, to set the VLAN, QoS, rate-limits (bandwidth) attributes, and the network resources t

Pagina 115 - Modifying and Deleting Realms

2-5Getting StartedBefore You BeginUnderstanding the IDM ModelThe first thing to understand, is that IDM works within the general concept of ‘domains’

Pagina 116 - Deleting RADIUS Servers

2-6Getting StartedIDM GUI OverviewIDM GUI OverviewTo use the IDM client, launch the PCM Client on your PC. Select the ProCurve Manager option from the

Pagina 117 - Adding New Users

2-7Getting StartedIDM GUI OverviewSelect the IDM Tree tab at the bottom left of the PCM window to display the IDM Home window.Figure 2-2. IDM Home Win

Pagina 118 - Configuring User Systems

iiiContents1 About ProCurve Identity Driven ManagerIntroduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Pagina 119 - Modifying and Deleting Users

2-8Getting StartedIDM GUI OverviewIDM DashboardThe IDM Dashboard tab (window) contains four separate panels, described below.Identity Management Statu

Pagina 120 - Deleting a User

2-9Getting StartedIDM GUI OverviewUsing the Navigation TreeThe navigation tree in the left pane of the IDM window provides access to IDM features usin

Pagina 121 - Using the User Import Wizard

2-10Getting StartedIDM GUI OverviewFigure 2-5. Realm Properties tabClick the Users tab, underneath the realm Properties tab, to view a list of users i

Pagina 122 - Data Source selection window

2-11Getting StartedIDM GUI OverviewFigure 2-7. Access Policy Groups tabClick the individual group node in the tree to display the group’s Properties.

Pagina 123 - Group Scope window

2-12Getting StartedIDM GUI OverviewRADIUS Servers: Clicking the RADIUS Servers node displays the RADIUS List tab, with status and configuration inform

Pagina 124

2-13Getting StartedIDM GUI OverviewThe Activity Log tab underneath the properties display contains a listing of IDM application events for that RADIUS

Pagina 125 - Add Users window

2-14Getting StartedUsing IDM as a Monitoring ToolUsing IDM as a Monitoring ToolWhether or not you configure and apply access and authorization paramet

Pagina 126

2-15Getting StartedUsing IDM ReportsUsing IDM ReportsIDM provides reports designed to help you monitor and analyze usage patterns for network resource

Pagina 127

2-16Getting StartedUsing IDM ReportsFigure 2-13. Bandwidth Usage ReportYou can save the report to a file, or print the report. To apply customized Rep

Pagina 128 - LDAP Authentication window

2-17Getting StartedUsing IDM ReportsBandwidth Usage Report: The Bandwidth Usage Report lists bandwidth usage per User. the top 25 bandwidth users. You

Pagina 129

ivContentsIDM Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-36Using Active Directory Synchroni

Pagina 130 - For Simple Authentication

2-18Getting StartedUsing IDM ReportsThe following information is provided for each user included in the Bandwidth Usage report:IDM Statistics: The IDM

Pagina 131 - Simple authentication:

2-19Getting StartedCreating Report PoliciesUser Report: The User Report lists information for recent sessions in which the user participated, similar

Pagina 132

2-20Getting StartedCreating Report PoliciesFigure 2-14. Policy Manager, Actions displayThe Manage Actions window displays the list of defined Actions.

Pagina 133 - Using External Authentication

2-21Getting StartedCreating Report Policies4. Select the Report Manager:Generate Report Action type from the pull-down menu. Figure 2-16. Policy Manag

Pagina 134

2-22Getting StartedCreating Report PoliciesFigure 2-17. Policy Manager: Report Manager Action configurationAt this point the other tabs displayed are:

Pagina 135

2-23Getting StartedCreating Report PoliciesFigure 2-18. Report Manager Action, Report type selection8. Click the Report Filter tab to select the repor

Pagina 136

2-24Getting StartedCreating Report Policies• PDF Produce the report in .pdf format. To view this file format, you will need Adobe Acrobat Reader, whic

Pagina 137

2-25Getting StartedCreating Report PoliciesSelecting FTP as the delivery method lets you save the report on an FTP site. However, proxy support is not

Pagina 138

2-26Getting StartedCreating Report PoliciesYou can access User Reports by right-clicking on the user in the Users tab display in IDM, then select the

Pagina 139

2-27Getting StartedCreating Report PoliciesFigure 2-23. IDM Session Cleanup Schedule properties4. Click the Schedule tab to review and edit the schedu

Pagina 140 - XML User Import File Example

vContents4 Using the Secure Access WizardOverview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Pagina 141 - Chapter Contents

2-28Getting StartedCreating Report Policies5. Set the Start Date for enforcement of the policy. The default is the start date and time for IDM. You c

Pagina 142 - Overview

2-29Getting StartedUser Session InformationUser Session InformationYou can use IDM to just monitor the network, and receive detailed information about

Pagina 143 - Using Secure Access Wizard

2-30Getting StartedUser Session InformationThe Session List provides a listing of recent sessions, including the following information: The User Prop

Pagina 144 - Selected Devices list

2-31Getting StartedUser Session InformationThe Session Information tab of the User Status window contains the following information:To track the user’

Pagina 145 - Master device

2-32Getting StartedUser Session InformationFigure 2-26. Location Information tabThe Location Information tab of the User Status window contains the fo

Pagina 146

2-33Getting StartedUser Session InformationThe Access Information tab of the User Status window contains the following information:Finding a UserThe F

Pagina 147 - Selected checkbox for each

2-34Getting StartedUser Session Information2. In the Username field, type the complete user name of the user you want to find and display information

Pagina 148

2-35Getting StartedUser Session Information3. Click the check boxes to select the data columns. If wireless settings are enabled the WLAN and BSSID o

Pagina 149

2-36Getting StartedUser Session InformationIDM PreferencesThe IDM Preferences window is used to set up global attributes for session accounting and ar

Pagina 150

2-37Getting StartedUser Session Information1. The Configuration Deployment option is used to automatically deploy IDM configuration settings (Access P

Pagina 151

viContents

Pagina 152

2-38Getting StartedUser Session InformationExisting accounting records are not removed by the Reset procedures, the only effect is that currently open

Pagina 153

2-39Getting StartedUser Session InformationFigure 2-31. Identity Management Preferences: User Directory Settings.1. Click the checkbox to select the E

Pagina 154

2-40Getting StartedUser Session Information4. To Add a group to the "Groups to Synchronize" list, click Add or Remove Groups... to display t

Pagina 155

2-41Getting StartedUser Session Information5. Select the Active Directory Groups you want to Synchronize to IDM, then click the >> button to mov

Pagina 156

2-42Getting StartedUser Session Information Users deleted from Active Directory while synchronization is disabled are assigned to the default Access

Pagina 157 - Unauth-vid

3-13Using Identity Driven ManagerChapter ContentsIDM Configuration Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Pagina 158 - Confirm shared secret field

3-2Using Identity Driven ManagerDeleting RADIUS Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-52Adding New Users

Pagina 159

3-3Using Identity Driven ManagerIDM Configuration ModelIDM Configuration Model As described in the IDM model on page 2-5, everything relates to the to

Pagina 160

3-4Using Identity Driven ManagerIDM Configuration Model2. Define "times" (optional) at which users will be allowed or denied access. This ca

Pagina 161

3-5Using Identity Driven ManagerIDM Configuration Model2. Click the Configure Identity Management icon in the Realms window toolbar.The Identity Manag

Pagina 162

1-11 About ProCurve Identity Driven ManagerChapter ContentsAbout ProCurve Identity Driven ManagerIntroduction . . . . . . . . . . . . . . . . . . . .

Pagina 163 - Troubleshooting IDM

3-6Using Identity Driven ManagerConfiguring LocationsConfiguring LocationsLocations in IDM identify the switch and/or ports on the switch and wireless

Pagina 164 - IDM Events

3-7Using Identity Driven ManagerConfiguring LocationsAdding a New LocationTo create a new location:1. Click the New Location icon in the toolbar to di

Pagina 165

3-8Using Identity Driven ManagerConfiguring LocationsFigure 3-4. New Device window5. Enter the Device to be added using the Device Selection pull-down

Pagina 166 - Using Event Filters

3-9Using Identity Driven ManagerConfiguring Locations6. Use the Port Selection to define the ports on the device that will be associated with the loca

Pagina 167

3-10Using Identity Driven ManagerConfiguring LocationsFigure 3-5. Create a New Location, Wireless Devices display11. Click Add Device... to display th

Pagina 168 - Viewing the Events Archive

3-11Using Identity Driven ManagerConfiguring LocationsClick the check box to select the radio ports to be included in the location, and then click OK

Pagina 169

3-12Using Identity Driven ManagerConfiguring LocationsDeleting a LocationTo remove an existing Location:1. Click the Locations node in the Identity Ma

Pagina 170 - Setting IDM Event Preferences

3-13Using Identity Driven ManagerConfiguring TimesConfiguring TimesTimes are used to define the hours and days when a user can connect to the network.

Pagina 171

3-14Using Identity Driven ManagerConfiguring TimesFigure 3-8. Times PropertiesCreating a New TimeTo configure a Time:1. Click the Times node in the Id

Pagina 172 - Using Activity Logs

3-15Using Identity Driven ManagerConfiguring TimesFigure 3-9. Create a New Time3. Define the properties for the new time. Name Name used to identify t

Pagina 173

1-2About ProCurve Identity Driven ManagerIntroductionIntroductionNetwork usage has skyrocketed with the expansion of the Internet, wireless, and conve

Pagina 174 - Miscellaneous

3-16Using Identity Driven ManagerConfiguring Times4. Click Ok to save the new "Time" and close the panel. The new time appears in the Times

Pagina 175 - Controller 800

3-17Using Identity Driven ManagerConfiguring TimesDefining HolidaysTo add holidays for use when defining Times in IDM: 1. Click the Times node in the

Pagina 176 - Before You Begin

3-18Using Identity Driven ManagerConfiguring TimesTo delete a Holiday, select it in the Holidays list, then click Delete... Click Yes in the confirmat

Pagina 177 - Using the NAC Tab Displays

3-19Using Identity Driven ManagerConfiguring Network ResourcesConfiguring Network ResourcesThe Network Resources in IDM are used to permit or deny tra

Pagina 178

3-20Using Identity Driven ManagerConfiguring Network ResourcesThe Network Resources window lists the name and parameters for defined resources, includ

Pagina 179 - Using the NAC Home Tab

3-21Using Identity Driven ManagerConfiguring Network ResourcesAdding a Network ResourceTo define a Network Resource:1. Click the Network Resources nod

Pagina 180 - Using the NAC Monitor Tab

3-22Using Identity Driven ManagerConfiguring Network Resources* Valid Friendly port names supported in IDM include: ftp, syslog, ldap, http, imap4, im

Pagina 181

3-23Using Identity Driven ManagerConfiguring Network ResourcesDeleting a Network ResourceTo delete a Network Resource:1. Click the Network Resources n

Pagina 182 - ProCurve NAC

3-24Using Identity Driven ManagerConfiguring Access ProfilesConfiguring Access ProfilesIDM uses an Access Profile to set the VLAN, QoS, Bandwidth (rat

Pagina 183

3-25Using Identity Driven ManagerConfiguring Access Profiles

Pagina 184 - Confirm Password field

1-3About ProCurve Identity Driven ManagerIntroductionWhy IDM?Today, access control using a RADIUS system and ProCurve devices (switches or wireless ac

Pagina 185 - IDM Technical Reference

3-26Using Identity Driven ManagerConfiguring Access ProfilesClick the Access Profile node in the navigation tree, or double-click on a profile in the

Pagina 186 - IDM Device Feature Matrix

3-27Using Identity Driven ManagerConfiguring Access Profiles2. Click the Add Access Profile icon in the toolbar to display the Create a new Access Pro

Pagina 187 - Best Practices

3-28Using Identity Driven ManagerConfiguring Access ProfilesThe VLAN that gets set for a user will override the statically configured VLAN, as well as

Pagina 188 - Allowing vs. Rejecting Access

3-29Using Identity Driven ManagerConfiguring Access ProfilesFigure 3-19. Network Resource Assignment Wizard, Allowed Network Resources6. To permit acc

Pagina 189 - Rate-Limiting

3-30Using Identity Driven ManagerConfiguring Access ProfilesFigure 3-20. Network Resource Assignment Wizard, Denied Network Resources7. To deny access

Pagina 190 - Types of User Events

3-31Using Identity Driven ManagerConfiguring Access ProfilesFigure 3-21. Network Resource Assignment Wizard, Priority Assignment8. Set the priority (o

Pagina 191

3-32Using Identity Driven ManagerConfiguring Access Profiles10. Select the option to tell IDM what to do if there are no matches found in the network

Pagina 192 - Index–2

3-33Using Identity Driven ManagerConfiguring Access ProfilesFigure 3-24. Network Resource Assignment Wizard, Summary14. Click Finish to save the Netwo

Pagina 193

3-34Using Identity Driven ManagerConfiguring Access ProfilesThe changes are displayed in the Access Profiles list.NOTE: When modifying Access Profiles

Pagina 194 - 5990-8851

3-35Using Identity Driven ManagerDefining Access Policy GroupsDefining Access Policy GroupsAn Access Policy Group (APG) contains rules that define the

Commenti su questo manuale

Nessun commento