Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United
States and other countries. The Juniper Networks Logo, the Junos logo, and JunosE are trademarks of Juniper Networks, Inc. All other
trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners.
Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify,
transfer, or otherwise revise this publication without notice.
Products made or sold by Juniper Networks or components thereof might be covered by one or more of the following patents that are
owned by or licensed to Juniper Networks: U.S. Patent Nos. 5,473,599, 5,905,725, 5,909,440, 6,192,051, 6,333,650, 6,359,479, 6,406,312,
6,429,706, 6,459,579, 6,493,347, 6,538,518, 6,538,899, 6,552,918, 6,567,902, 6,578,186, and 6,590,785.
Network and Security Manager Infranet Controller Configuration Guide
READ THIS END USER LICENSE AGREEMENT (“AGREEMENT”) BEFORE DOWNLOADING, INSTALLING, OR USING THE SOFTWARE.
BY DOWNLOADING, INSTALLING, OR USING THE SOFTWARE OR OTHERWISE EXPRESSING YOUR AGREEMENT TO THE TERMS
CONTAINED HEREIN, YOU (AS CUSTOMER OR IF YOU ARE NOT THE CUSTOMER, AS A REPRESENTATIVE/AGENT AUTHORIZED TO
BIND THE CUSTOMER) CONSENT TO BE BOUND BY THIS AGREEMENT. IF YOU DO NOT OR CANNOT AGREE TO THE TERMS CONTAINED
HEREIN, THEN (A) DO NOT DOWNLOAD, INSTALL, OR USE THE SOFTWARE, AND (B) YOU MAY CONTACT JUNIPER NETWORKS
REGARDING LICENSE TERMS.
1. The Parties. The parties to this Agreement are (i) Juniper Networks, Inc. (if the Customer’s principal office is located in the Americas) or
Juniper Networks (Cayman) Limited (if the Customer’sprincipal office is locatedoutside the Americas)(such applicable entity being referred
to herein as “Juniper”), and (ii) the person or organization that originally purchased from Juniper or an authorized Juniper reseller the applicable
license(s) for use of the Software (“Customer”) (collectively, the “Parties”).
2. The Software. In this Agreement, “Software” means the program modules and features of the Juniper or Juniper-supplied software, for
which Customer has paid the applicable license or support fees to Juniper or an authorized Juniper reseller, or which was embedded by
Juniper in equipment which Customer purchased from Juniper or an authorized Juniper reseller. “Software” also includes updates, upgrades
and new releases of such software. “Embedded Software” means Software which Juniper has embedded in or loaded onto the Juniper
equipment and any updates, upgrades, additions or replacements which are subsequently embedded in or loaded onto the equipment.
3. License Grant. Subject to payment of the applicable fees and the limitations and restrictions set forth herein, Juniper grants to Customer
a non-exclusive and non-transferable license, without right to sublicense, to use the Software, in executable form only, subject to the
following use restrictions:
a. Customer shall use Embedded Software solely as embedded in, and for execution on, Juniper equipment originally purchased by
Customer from Juniper or an authorized Juniper reseller.
b. Customer shall use the Software on a single hardware chassis having a single processing unit, or as many chassis or processing units
for which Customer has paid the applicable license fees; provided, however, with respect to the Steel-Belted Radius or Odyssey Access
Client software only, Customer shall use such Software on a single computer containing a single physical random access memory space
and containing any number of processors. Use of the Steel-Belted Radius or IMS AAA software on multiple computers or virtual machines
(e.g., Solaris zones) requires multiple licenses, regardless of whether such computers or virtualizations are physically contained on a single
chassis.
c. Product purchase documents, paper or electronic user documentation, and/or the particular licenses purchased by Customer may
specify limits to Customer’s use of the Software. Such limits may restrict use to a maximum number of seats,registeredendpoints, concurrent
users, sessions, calls, connections, subscribers, clusters, nodes, realms, devices, links, ports or transactions, or require the purchase of
separate licenses to use particular features, functionalities, services, applications, operations, or capabilities, or provide throughput,
performance, configuration, bandwidth, interface, processing, temporal, or geographical limits. In addition, such limits may restrict the use
of the Software to managing certain kinds of networks or require the Software to be used only in conjunction with other specific Software.
Customer’s use of the Software shall be subject to all such limitations and purchase of all applicable licenses.
d. For any trial copy of the Software, Customer’s right to use the Software expires 30 days after download, installation or use of the
Software. Customer may operate the Software after the 30-day trial period only if Customer pays for a license to do so. Customer may not
extend or create an additional trial period by re-installing the Software after the 30-day trial period.
e. The Global Enterprise Edition of the Steel-Belted Radius software may be used by Customer only to manage access to Customer’s
enterprise network. Specifically, service provider customers are expressly prohibited from using the Global Enterprise Edition of the
Steel-Belted Radius software to support any commercial network access services.
The foregoing license is not transferable or assignable by Customer. No license is granted herein to any user who did not originally purchase
the applicable license(s) for the Software from Juniper or an authorized Juniper reseller.
4. Use Prohibitions. Notwithstanding the foregoing, the license provided herein does not permit the Customer to, and Customer agrees
not to and shall not: (a) modify, unbundle, reverse engineer, or create derivative works based on the Software; (b) make unauthorized
copies of the Software (except as necessary for backup purposes); (c) rent, sell, transfer, or grant any rights in and to any copy of the
Software,in any form, to any third party; (d) remove any proprietary notices, labels, or marks on or in any copy of the Software or any product
in which the Software is embedded; (e) distribute any copy of the Software to any third party, including as may be embedded in Juniper
equipment sold in the secondhand market; (f) use any ‘locked’or key-restricted feature,function, service, application, operation,or capability
without first purchasing the applicable license(s) and obtaining a valid key from Juniper, even if such feature, function, service, application,
operation, or capability is enabled without a key; (g) distribute any key for the Software provided by Juniper to any third party; (h) use the
Software in any manner that extends or is broader than the uses purchased by Customer from Juniper or an authorized Juniper reseller; (i)
use Embedded Software on non-Juniper equipment; (j) use Embedded Software (or make it available for use) on Juniper equipment that
the Customer did not originally purchase from Juniper or an authorized Juniper reseller; (k) disclose the results of testing or benchmarking
of the Software to any third party without the prior written consent of Juniper; or (l) use the Software in any manner other than as expressly
provided herein.
5. Audit. Customer shall maintain accurate records as necessary to verify compliance with this Agreement. Upon request by Juniper,
Customer shall furnish such records to Juniper and certify its compliance with this Agreement.
6. Confidentiality. The Parties agree that aspects of the Software and associated documentation are the confidential property of Juniper.
As such, Customer shall exercise all reasonable commercial efforts to maintain the Software and associateddocumentation in confidence,
which at a minimum includes restricting access to the Software to Customer employees and contractors having a need to use the Software
for Customer’s internal business purposes.
7. Ownership. Juniper and Juniper’s licensors, respectively, retain ownership of all right, title, and interest (including copyright) in and to
the Software, associated documentation, and all copies of the Software. Nothing in this Agreement constitutes a transfer or conveyance
of any right, title, or interest in the Software or associated documentation, or a sale of the Software, associated documentation, or copies
of the Software.
8. Warranty, Limitation of Liability, Disclaimer of Warranty. The warranty applicable to the Software shall be as set forth in the warranty
statementthat accompanies the Software(the “Warranty Statement”). Nothing in this Agreement shall give rise to any obligationto support
the Software. Support services may be purchased separately. Any such support shall be governed by a separate, written support services
agreement. TO THE MAXIMUM EXTENT PERMITTED BY LAW, JUNIPER SHALL NOT BE LIABLE FOR ANY LOST PROFITS, LOSS OF DATA,
OR COSTSOR PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES,OR FOR ANY SPECIAL, INDIRECT,OR CONSEQUENTIALDAMAGES
ARISING OUT OF THIS AGREEMENT, THE SOFTWARE,OR ANY JUNIPER OR JUNIPER-SUPPLIED SOFTWARE.IN NO EVENT SHALL JUNIPER
BE LIABLE FOR DAMAGES ARISING FROM UNAUTHORIZED OR IMPROPER USE OF ANY JUNIPER OR JUNIPER-SUPPLIED SOFTWARE.
EXCEPT AS EXPRESSLY PROVIDED IN THE WARRANTY STATEMENT TO THE EXTENT PERMITTED BY LAW, JUNIPER DISCLAIMS ANY
AND ALL WARRANTIES IN AND TO THE SOFTWARE (WHETHER EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE), INCLUDING ANY
IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT DOES
JUNIPER WARRANT THAT THE SOFTWARE, OR ANY EQUIPMENT OR NETWORK RUNNING THE SOFTWARE, WILL OPERATE WITHOUT
ERROR OR INTERRUPTION, OR WILL BE FREE OF VULNERABILITY TO INTRUSION OR ATTACK. In no event shall Juniper’s or its suppliers’
or licensors’ liability to Customer, whether in contract, tort (including negligence), breach of warranty, or otherwise, exceed the price paid
by Customer for the Software that gave rise to the claim, or if the Software is embedded in another Juniper product, the price paid by
Customer for such other product. Customer acknowledges and agrees that Juniper has set its prices and entered into this Agreement in
reliance upon the disclaimers of warranty and the limitations of liability set forth herein, that the same reflect an allocation of risk between
the Parties (including the risk that a contract remedy may fail of its essential purpose and cause consequential loss), and that the same
form an essential basis of the bargain between the Parties.
9. Termination. Any breach of this Agreement or failure by Customer to pay any applicable fees due shall result in automatic termination
of the license granted herein. Upon such termination, Customer shall destroy or return to Juniper all copies of the Software and related
documentation in Customer’s possession or control.
10. Taxes. All license fees payable under this agreement are exclusive of tax. Customer shall be responsible for paying Taxes arising from
the purchase of the license, or importation or use of the Software. If applicable, valid exemption documentation for each taxing jurisdiction
shall be provided to Juniper prior to invoicing, and Customer shall promptly notify Juniper if their exemption is revoked or modified. All
payments made by Customer shall be net of any applicable withholding tax. Customer will provide reasonable assistance to Juniper in
connection with such withholding taxes by promptly: providing Juniper with valid tax receipts and other required documentation showing
Customer’s payment of any withholding taxes; completing appropriate applications that would reduce the amount of withholding tax to
be paid; and notifying and assisting Juniper in any audit or tax proceeding related to transactions hereunder. Customer shall comply with
all applicable tax laws and regulations, and Customer will promptly pay or reimburse Juniper for all costs and damages related to any
liability incurred by Juniper as a result of Customer’s non-compliance or delay with its responsibilities herein. Customer’s obligations under
this Section shall survive termination or expiration of this Agreement.
11. Export. Customer agrees to comply with all applicable export laws and restrictions and regulations of any United States and any
applicable foreign agency or authority, and not to export or re-export the Software or any direct product thereof in violation of any such
restrictions, laws or regulations, or without all necessary approvals. Customer shall be liable for any such violations. The version of the
Software supplied to Customer may contain encryption or other capabilities restricting Customer’s ability to export the Software without
an export license.
12. Commercial Computer Software. The Software is “commercial computer software” and is provided with restricted rights. Use,
duplication, or disclosure by the United States government is subject to restrictions set forth in this Agreement and as provided in DFARS
227.7201 through 227.7202-4, FAR 12.212, FAR 27.405(b)(2), FAR 52.227-19, or FAR 52.227-14(ALT III) as applicable.
13. Interface Information. To the extent required by applicable law, and at Customer's written request, Juniper shall provide Customer
with the interface information needed to achieve interoperability between the Software and another independently created program, on
payment of applicable fee, if any. Customer shall observe strict obligations of confidentiality with respect to such information and shall use
such information in compliance with any applicable terms and conditions upon which Juniper makes such information available.
14. Third Party Software. Any licensor of Juniper whose software is embedded in the Software and any supplier of Juniper whose products
or technology are embedded in (or services are accessed by) the Software shall be a third party beneficiary with respect to this Agreement,
and such licensor or vendor shall have the right to enforce this Agreement in its own name as if it were Juniper. In addition, certain third party
software may be provided with the Software and is subject to the accompanying license(s), if any, of its respective owner(s). To the extent
portions of the Software are distributed under and subject to open source licenses obligating Juniper to make the source code for such
portions publicly available (such as the GNU General Public License (“GPL”) or the GNU Library General Public License (“LGPL”)), Juniper
will make such source code portions (including Juniper modifications, as appropriate) available upon request for a period of up to three
years from the date of distribution. Such request can be made in writing to Juniper Networks, Inc., 1194 N. Mathilda Ave., Sunnyvale, CA
94089, ATTN: General Counsel. You may obtain a copy of the GPL at http://www.gnu.org/licenses/gpl.html, and a copy of the LGPL
at http://www.gnu.org/licenses/lgpl.html .
15. Miscellaneous. This Agreement shall be governed by the laws of the State of California without reference to its conflicts of laws
principles. The provisions of the U.N. Convention for the International Sale of Goods shall not apply to this Agreement. For any disputes
arising under this Agreement, the Parties hereby consent to the personal and exclusive jurisdiction of, and venue in, the state and federal
courts within Santa Clara County, California. This Agreement constitutes the entire and sole agreement between Juniper and the Customer
with respect to the Software, and supersedes all prior and contemporaneous agreements relating to the Software, whether oral or written
(including any inconsistent terms contained in a purchase order), except that the terms of a separate written agreement executed by an
authorized Juniper representative and Customer shall govern to the extent such terms are inconsistent or conflict with terms contained
herein. No modification to this Agreement nor any waiver of any rights hereunder shall be effective unless expressly assented to in writing
by the party to be charged. If any portion of this Agreement is held invalid, the Parties agree that such invalidity shall not affect the validity
of the remainder of this Agreement. This Agreement and associated documentation has been written in the English language, and the
Parties agree that the English version will govern. (For Canada: Les parties aux présentés confirment leur volonté que cette convention de
même que tous les documents y compris tout avis qui s'y rattaché, soient redigés en langue anglaise. (Translation: The parties confirm that
this Agreement and all related documentation is and will be in the English language)).
Removing an Infranet Controller from NSM Management (NSM Procedure) . . . 190
Deactivating a DMI Agent in an Infranet Controller (NSM Procedure) . . . . . . . . . 190
Chapter 18Configuring the Infranet Controller to Interoperate with IDP . . . . . . . . . . . 193
Configuring ISG-IDP as a Sensor on the Infranet Controller (NSM Procedure) . . 193
Configuring Infranet Controller Sensor Settings for Connecting to a Standalone
Network and Security Manager (NSM) is a software application that centralizes control
and management of your Juniper Networks devices. With NSM, Juniper Networks delivers
integrated, policy-based security and network management for all security devices.
Unified Access Control (UAC) solution is an IP-based enterprise infrastructure that
coordinates network, application, and endpoint security compliance and provides the
control required to support network applications, manage network use, and reduce
threats.
This guide provides the information you need to understand, configure, and maintain an
Infranet Controller device using NSM. This guide explains how to use basic and advanced
NSM functionality, including adding new devices, deploying new device configurations,
updating device firmware, viewing log information, and monitoring the status of your
Infranet Controller device.
Audience
This guide is intended for the systemadministratorresponsible for configuring the Infranet
Controller device.
Conventions
Table 1 on page xiv defines notice icons used in this guide.
terminal lengthRepresent keywordsWords in plain text
mask, accessListNameRepresent variablesWords in italics
Words separated by the pipe ( | )
symbol
Words enclosed in brackets followed
by and asterisk ( [ ]*)
variable to the left or right of this symbol. The
keywordor variable can be optional or required.
can be entered more than once.
Represent required keywords or variables.Words enclosed in braces ( { } )
diagnostic | lineRepresent a choice to select one keyword or
[ internal | external ]Represent optional keywords or variables.Words enclosed in brackets ( [ ] )
[ level1 | level2 | 11 ]*Represent optional keywords or variables that
{ permit | deny } { in | out } { clusterId
| ipAddress }
List of Technical Publications
Table 4: Network and Security Manager and Unified Access Control Solutions Publications
Network and Security Manager
Installation Guide
Network and Security Manager
Administration Guide
Details the steps to install the NSM management system on a single server or on separate
servers. It also includes information on how to install and run the NSM user interface.
This guide is intended for IT administrators responsible for the installationand/orupgrade
of NSM.
Describes how to use and configure key management features in the NSM. It provides
conceptual information, suggested workflows, and examples where applicable. This
guide is best used in conjunction with the NSM Online Help, which provides step-by-step
instructions for performing management tasks in the NSM UI.
Network and Security Manager
Configuring Firewall/VPN Devices
Guide
Network and Security Manager
Online Help
Unified Access Control
Administration Guide
Unified Access Control Quick Start
Guide
This guide is intended for application administrators or those individuals responsible for
owning the server and security infrastructure and configuring the product for multi-user
systems. It is also intended for device configuration administrators, firewall and VPN
administrators, and network security operation center administrators.
Describes NSM features that relate to device configuration and management. It also
explains how to configure basic and advanced NSM functionality, including deploying
new device configurations, managing Security Policies and VPNs, and general device
administration.
Provides task-oriented procedures describing how to perform basic tasks in the NSM
user interface. It also includes a brief overview of the NSM system and a description of
the GUI elements.
Provides comprehensive information about configuring the Unified Access Control
solution and the Infranet Controller 4500 and 6500 appliances.
Provides an example of configuring the Unified Access Control solution for a front-end
server deployment scenario.
Table 4: Network and Security Manager and Unified Access Control Solutions
Publications (continued)
Unified Access Control Installation
Guide
Details the steps to install the Infranet Controller and Infranet Enforcer Appliances. This
guide is intended for IT administrators responsible for the installation and/or upgrade
of Infranet Controller.
Requesting Technical Support
Technicalproduct support is available through the Juniper Networks Technical Assistance
Center (JTAC). If you are a customer with an active J-Care or JNASC support contract,
or are covered under warranty, and need post-sales technical support, you can access
our tools and resources online or open a case with JTAC.
•
JTAC policies—For a complete understanding of our JTAC procedures and policies,
review the JTAC User Guide located at
JTAC hours of operation—The JTAC centers have resources available 24 hours a day,
7 days a week, 365 days a year.
Self-Help Online Tools and Resources
For quick and easy problem resolution, Juniper Networks has designed an online
self-service portal called the Customer Support Center (CSC) that provides you with the
following features:
Find solutions and answer questions using our Knowledge Base: http://kb.juniper.net/
•
Download the latest versions of software and review release notes:
http://www.juniper.net/customers/csc/software/
•
Search technical bulletins for relevant hardware and software notifications:
https://www.juniper.net/alerts/
•
Join and participate in the Juniper Networks Community Forum:
http://www.juniper.net/company/communities/
•
Open a case online in the CSC Case Management tool: http://www.juniper.net/cm/
To verify service entitlement by product serial number,use our Serial Number Entitlement
(SNE) Tool: https://tools.juniper.net/SerialNumberEntitlementSearch/
Opening a Case with JTAC
You can open a case with JTAC on the Web or by telephone.
Understanding an Infranet Controller
Configuration
•
NSM and Device Management Overview on page 3
•
Communication Between an Infranet Controller and NSM Overview on page 3
•
Infranet Controller Services and Device Configurations Supported in NSM on page 5
NSM and Device Management Overview
NSM is the Juniper Networks network management tool that allows distributed
administration of network appliances. You can use the NSM application to centralize
status monitoring, logging, and reporting, and to administer Infranet Controller
configurations.
With NSM you can manage the Infranet Enforcer and Intrusion Detection and Prevention
(IDP) devices,and you can administer the completeUnified AccessControl (UAC) solution
from a single management interface.
In addition, NSM lets you manage most of the parameters that you can configure through
the Infranet Controller admin console. The configuration screens rendered through NSM
are similar to the screens in the Infranet Controller admin console.
NSM incorporates a broad configuration management framework that allows
co-management using other methods. To manage the Infranet Controller configuration,
you can also use the XML files import and export feature, or you can manage from the
Infranet Controller admin console.
Related
Documentation
Communication Between an Infranet Controller and NSM Overview on page 3•
• Infranet Controller Services and Device Configurations Supported in NSM on page 5
Communication Between an Infranet Controller and NSM Overview
The Infranet Controller and the NSM application communicate through the Device
Management Interface (DMI). DMI is a collection of schema-driven protocols that run
on a common transport (that is, TCP). DMI is designed to work with Juniper Networks
platforms to make device management consistent across all administrative realms.
NetConf (for inventory management, XML-based configuration, text-based
configuration, alarm monitoring, and device specific commands)
•
Structured syslog
•
Threat flow for network profiling
DMI supports third-party network management systems that incorporate the DMI
standard; however, only one DMI-based agent per device is supported.
The Infranet Controller’s configuration is represented as a hierarchical tree of configuration
items. This structure is expressed in XML and can be manipulated with NetConf. NetConf
is a network management protocol that uses XML. DMI uses NetConf’s generic
configuration management capability to allow remote configuration of the device.
To allow NSM to manage the Infranet Controller using the DMI protocol, NSM must import
the schema and metadatafiles from the Juniper NetworksSchema Repository, a publicly
accessible resource that is updated with each device release. In addition to downloading
the Infranet Controller’s current schema, NSM may also download upgraded software.
The Schema Repository enables access to XSD and XML files defined for each device,
model, and software version.
Before attempting to communicate with NSM, you must first complete the initial
configuration of the Infranet Controller. Initial configuration includes network interface
settings, DNS settings, licensing, and password administration.
If you have severalInfranet Controllers that will be configured in a clustering environment,
the cluster abstraction must first be created in the NSM Cluster Manager. Then you can
add individual nodes.
After you have completed the initial network configuration, you can configure the Infranet
Controller to communicate with NSM using the appropriate network information. Once
the Infranet Controller has been configured to communicate with NSM, the Infranet
Controllercontacts NSM and establishes a DMI session through an initial TCP handshake.
All communications between the Infranet Controller and NSM occur over SSH to ensure
data integrity.
After the Infranet Controller initially contacts NSM and a TCP session is established,
interaction between the Infranet Controller and NSM is driven from NSM, which issues
commands to get hardware, software, and license details of the Infranet Controller. NSM
connectsto the Schema Repository to download the configuration schema that is specific
to the Infranet Controller.
NSM then issues a command to retrieve configuration information from the Infranet
Controller. If NSM is contacted by more than one Infranet Controller as a member of a
cluster, information from only one of the cluster devices is gathered. NSM attempts to
validate the configuration received from the Infranet Controller against the schema from
Juniper Networks.
Chapter 1: Understanding an Infranet Controller Configuration
Once the Infranet Controller and NSM are communicating,the InfranetController delivers
syslog and event information to NSM.
After NSM and the Infranet Controller are connected, you can make any configuration
changes directly on the Infranet Controller, bypassing NSM. NSM automatically detects
these changes and imports the new configuration data. Changes to Infranet Controller
cluster members will similarly be detected by NSM.
When you make changes to the Infranet Controller configuration through NSM you must
push the changes to the device by performing an Update Device operation.
When you double-click the Infranet Controller device icon in the Device Manager and
select the Configuration tab, the configuration tree appears in the main display area in
the same orientation as items appear on the Infranet Controller admin console.
Related
Documentation
NSM and Device Management Overview on page 3•
• Infranet Controller Services and Device Configurations Supported in NSM on page 5
Infranet Controller Services and Device Configurations Supported in NSM
The Infranet Controller supports the following services in NSM:
•
Inventory management service—Enables management of the Infranet Controllers
software, hardware, and licensing details. Adding or deleting licenses and upgrading
or downgrading software are not supported.
•
Status monitoring service—Allows the Infranet Controller’s status to be obtained,
including name, domain, OS version, synchronization status, connection details, and
current alarms.
•
Logging service—Allowsthe Infranet Controller’s logs to be obtained in a time-generated
order. Logging configuration details that are set on the Infranet Controller will apply
to NSM.
•
XML-based configuration management service—Enables NSM to manage the
configurationof the Infranet Controller. NSM uses the same XML schema as the Infranet
Controller, so you can troubleshoot NSM using XML files downloaded from the Infranet
Controller.
The following device configurations are not supported:
•
Editing licensing information, although licenses can be viewed
•
Packaging log files or debug files for remote analysis
Related
Documentation
• NSM and Device Management Overview on page 3
• Communication Between an Infranet Controller and NSM Overview on page 3
NOTE: For important safety information, read Juniper Networks Security
Products Safety Guide.
The UAC components to be installed are the following:
1. Install Infranet Enforcer and/or 802.1X hardware and perform the basic setup. See
the documentation that shipped with the system or visit the Juniper Networks Web
site at http://www.juniper.net/techpubs/ to download the appropriate documentation.
Related
Documentation
2. Install Infranet Controller hardware and perform the basic setup using the serial
console. See the Juniper Networks Unified Access Control Installation Guide.
3. License the Infranet Controller and verify user accessibility. Follow the initial
configurationTask Guide instructions embedded in the Infranet ControllerWebconsole.
4. Configure an SSL connection between the Infranet Controller appliance and your
Infranet Enforcer appliances and/or 802.1X switches. See the Juniper Networks Unified
Access Control Quick Start Guide or Part 1, “Getting Started,” of the Juniper Networks
Unified Access Control Administration Guide.
NSM Installation Overview on page 8•
• NSM and Device Management Overview on page 3
• Communication Between an Infranet Controller and NSM Overview on page 3
NSM is a software application that enables you to integrate and centralize management
of your Juniper Networks environment. Youneed to install two main software components
to run NSM: the NSM management system and the NSM user interface (UI).
See the Network Security Manager Installation Guide for the steps to install the NSM
management system on a single server or on separateservers. It also includes information
on how to install and run the NSM user interface. The Network Security Manager InstallationGuide is intended for IT administrators responsible for installing or upgrading NSM.
Importing an Infranet Controller Device Through Not Reachable Workflow on page 11
•
Requirements for Importing an Infranet Controller into NSM Through a Reachable
Workflow on page 15
•
Importing an Infranet Controller Through Reachable Workflow on page 15
•
Importing Multiple Infranet Controllers on page 16
•
Verifying Imported Device Configurations on page 19
Importing an Infranet Controller Device Through Not Reachable Workflow
You can add an Infranet Controller to your existing network using NSM and import its
configurations. Using the Add Device Wizard, you can configure a connection between
the management system and the physical device, and then import all device parameters,
policies, objects, VPNs, and so on.
Import an Infranet Controller through Not Reachable workflow into NSM by following
these procedures:
1.
Installing and Configuring the Infranet Controller Device on page 12
2.
Adding the Infranet Controller Device Through NSM on page 12
3.
Configuring and Enabling the DMI Agent on the Infranet Controller Device on page 13
4.
Confirming Connectivity and Importing the Infranet Controller Device
Configuration on page 14
Installing and Configuring the Infranet Controller Device
Before you can add the Infranet Controller to NSM, you must install and configure the
Infranet Controller device to have logon credentials for an NSM administrator.
To install and configure the Infranet Controller:
1. Select System > Network > Overview on the device’s admin console and ensure that
basic connection information such as the following are configured on the Infranet
Controller.
•
Network interface settings
•
DNS settings
•
Password
2. Select Authentication > Auth Servers and enter the username and password of the
NSM administrator in the applicable authentication server.
NOTE: Only password-based authentication servers can be used. One-time
password authentication is not supported.
3. Select Administrators > Admin Roles and create a DMI agent role.
4. Select Administrators > Admin Realms and create a DMI agent administrator realm
for the DMI agent on the device and use role mapping to associate the DMI agent role
and realm.
NOTE: Ensure that the Host Checker, browser, and certificate restrictions
are not applied for the DMI agent role or realms.
For complete details on installing and configuring Infranet Controller devices, see the
Juniper Networks Unified Access Control Administration Guide.
Adding the Infranet Controller Device Through NSM
To add the Infranet Controller device through the NSM UI:
1. From the left pane of the NSM UI, click Configure.
2. Expand Device Manager and select Devices. The Devices workspace appears on the
right side of the screen.
3. Click the Device Tree tab, click the New button, and select Device. The New-Device
dialog box appears.
4. Select Device is Not Reachable and click Next.
5. Enter the device name, and select the required color, OS name (IC), platform, and
6. From the Choose Device Server Connections Parameter area, select:
•
Use Default Device Server IP Address and Port—Connects the device to the NSM
device server IP address and port.
•
Use Device ServerThrough MIP—Connects the NSM device server through a mapped
IP address and port.
7. Click Next, and a unique external ID gets generated automatically. This ID represents
the device within the management system.
8. Enter an admin username for the device admin.
9. Set the Admin User Password and the First Connection One-Time Password:
a. Select Set Password and enter a new password.
b. Confirm your new password and click OK.
NOTE:
•
Make a note of the unique external ID. The device administrator will
need it to configure connectivity with NSM. The wizard automatically
enters this value for the device. This ID number represents the device
within the management system.
•
Specify the administrator username and password for the SSH
connection. This name and password must match the name and
password already configured on the device.
•
Specify the First Connection One Time Password (OTP) that
authenticates the device. Make a note of this password. The device
administrator will need it to configure the connectivity with NSM.
10. Click Finish to add the device to the NSM UI. The Infranet Controller appears in the
Devices workspace.
Configuring and Enabling the DMI Agent on the Infranet Controller Device
You must configure and activate the DMI agent on the Infranet Controller device. It helps
to establish SSH communications with the NSM application and to control the Infranet
Controller from the NSM application.
To configure and enable the DMI agent:
1. Select System> Configuration> DMI Agent to add the NSM management application.
2. Under DMI settings for outbound connections, enter the device server's IP address in
the Primary Server box..
3. Enter 7804 in the Primary Port box.
4. Fill in the Backup Server and Backup Port boxes, if a device server is configured for
5. Enter the unique external ID provided by the NSM administrator in the Device ID box.
6. Enter the first connection one-time password provided by the NSM administrator in
the HMAC Key box.
7. Click Enable to activate the DMI agent.
8. Click Save Changes, and the device attempts to establish a session with the NSM
application.
The device software initiates the TCP connection to NSM and identifies itself using the
specified device ID and HMAC. Both sides then engage in SSH TransportLayer interactions
to set up an encrypted tunnel. The NSM application authenticates itself to the Infranet
Controller based on the username and password.
Confirming Connectivity and Importing the Infranet Controller Device Configuration
In NSM, validate connectivity with the device, and then import the device configuration:
1. From the Devices workspace, select the Device List tab.
2. Check the newly added device in the Connection Status column. The connection
status must change from Never Connected to Up.
Related
Documentation
If the connection status appears as Device Platform Mismatch or Device Firmware
Mismatch, delete the device from the application and add it back using the correct device
platform and managed OS, respectively.
To import the device configuration:
1. From the Devices workspace, select the Device List tab.
2. Right-click the newly added Infranet Controller device and select Import Device. The
Save Changes dialog box appears.
3. If you are prompted to savepolicy or VPN changes, click Yes. The DeviceImport Option
dialog box appears.
4. Select Run Summarize Delta Config, and click OK and Yes. The Job Information dialog
box displays the progress of the delta config summary. You can also monitor the
progress in Job Manager.
The next step is to verify the imported configuration using either the Device Monitor
or the Device Manager in NSM. See “Verifying Imported Device Configurations (NSM
Procedure)” for details.
Importing an Infranet Controller Through Reachable Workflow on page 15•
• Creating and Applying an Infranet Controller Template on page 29
• Verifying Imported Device Configurations on page 19
the hostname configured on the device. You can either use the hostname as the NSM
device name or you can enter a new name in the text box provided.
9. Click Next after verifying the auto detected device information.
10. Click Finish to add the device to the NSM UI. The Infranet Controller appears in the
Devices workspace.
Related
Documentation
Importing an Infranet Controller Device Through Not Reachable Workflow on page 11•
• Requirements for Importing an Infranet Controller into NSM Through a Reachable
Workflow on page 15
• Verifying Imported Device Configurations on page 19
Importing Multiple Infranet Controllers
If your network includes a large number of devices, you can save time by adding multiple
devices in a single workflow.Youcan add up to 4000 devices at a time to a single domain
(but you cannot add multiple devices to different domains at one time).
Add multiple Infranet Controllers by following these procedures:
1.
Creating the CSV File on page 16
2.
Validating the CSV File on page 18
3.
Adding and Importing Multiple Infranet Controllers on page 18
Creating the CSV File
The CSV file defines all the required and optional values for each Infranet Controller
device. Within a .csv file, you define the Infranet Controller configuration values that you
want to add. The required and optional values depend not only on how the Infranet
Controllers are deployed on your network but also on the device family.
Juniper Networks provides CSV templates in Microsoft Excel format for each type of CSV
file. These templates are located in the utils subdirectory where you have stored the
program files for the UI client. For example:
C:\Program Files\Network and Security Manager\utils
For each CSV file, each row defines a single Infranet Controller’s values for each parameter.
For text files, columns are separated by commas.
Creating Infranet Controller Parameters in CSV File
For an Infranet Controller, Table 5 on page 16 lists the parameters to be set in the CSV
file.
Table 5: CSV File Information for Infranet Controllers
When you add the Infranet Controllers, NSM validates the configuration information in
the .csv file and creates a validation report. The report lists any incorrect or duplicate
configurations, and indicates the exact line that contains invalid data.
Select Cancel to quit adding multiple Infranet Controllers, or select Add Valid Devices
to begin adding the Infranet Controllers for which you have provided valid device
configurations.
If the validation report listed incorrect configurations, you can still select Add ValidDevices; however, only the devices with correct configurations are added. If the .csv file
contains duplicate configurations, NSM ignores the duplicates.
NOTE: The validation report displays only the first error in the line. If the line
contains additional errors, those errors do not appear in the validation report.
After you have added multiple Infranet Controllers, you cannot roll back or undo your
changes. To edit or delete Infranet Controllers, select the Infranet Controller in the NSM
UI and make the necessary changes.
Adding and Importing Multiple Infranet Controllers
To add and import multiple Infranet Controllers in the NSM UI:
1. From the left pane of the NSM UI, click Configure.
2. Expand Device Manager and select Devices. The Devices workspace appears on the
right side of the screen.
3. Click the Device Tree tab, click the New button, and select Many Devices. The
New-Device dialog box appears.
4. In the New-Device dialog box:
•
Select Device is Not Reachable.
•
Specify the location of the CSV file.
•
Specify the output directory for the .cli file. For each valid device configuration that
uses a dynamic IP address, NSM creates a .cli output file. By default, the .cli file is
saved to the following GUI server directory:
Select Add Valid Devices to begin adding the devices for which you have provided
valid device configurations.
6. From the Choose Device Server Connections Parameter area select:
•
Use Default Device Server IP Address and Port—Connects the device to the NSM
device server IP address and port.
•
Use Device ServerThrough MIP—Connects the NSM device server through a mapped
IP address and port.
7. Click Finish to add the Infranet Controllers.
The time it takes for NSM to activate and import the Infranet Controllers depends on the
number of Infranet Controllers and the management system configuration.
Related
Documentation
Importing an Infranet Controller Device Through Not Reachable Workflow on page 11•
• Adding an Infranet Controller Cluster with Imported Cluster Members on page 24
• Creating and Applying an Infranet Controller Template on page 29
• Verifying Imported Device Configurations on page 19
Verifying Imported Device Configurations
After importing an Infranet Controller, you should verify whether all device information
has been imported.
The imported device configurations can be verified in any of the following ways:
•
Using Device Monitor on page 19
•
Using Device Manager on page 20
•
Using Job Manager on page 20
•
Using Configuration Summaries on page 20
Using Device Monitor
The Device Monitor in NSM tracks the status of individual devices, systems, and their
processes. To check the status of the imported device in the Device Monitor, from the
left pane click Investigate, expand Realtime Monitor, and select Device Monitor. From
the Device Monitor workspace, check the following parameters for your imported device:
•
The Configured Status column says “Managed In Sync”.
Using the Device Manager in NSM, you can verify the configuration settings of the imported
device. To verify the configuration settings, click Configure, expand Device Manager,
select Devices and click the Device List tab.
Ensure that the following parameters are indicated:
•
Imported device serial number matches the serial number on the physical device
•
Imported device IP address matches the IP address for the physical device
Using Job Manager
Job Manager tracks the status of major administrativetasks, such as importing or updating
a device. After you import a device, view the report for the import task to ensure that the
management system imported the device configuration as you expected. To track the
status of the imported Infranet Controllers in NSM, from the left pane click Administer
and select Job Manager.
Job Manager also tracks the status of configuration summaries, described in “Using
Configuration Summaries.”
Using Configuration Summaries
NSM provides three configuration summaries to help you manage device configurations
and preventaccidental misconfigurations. Use configuration summaries afteryou import
a device to ensure that the management system imported the physical device
configuration as you expected.
Configurationsummaries help with ongoing device maintenance, particularly for devices
on which a local device administrator has been troubleshooting using CLI commands or
the Web UI. Because the device object configuration in the NSM UI can overwrite the
physical device configuration, you should always confirm the commands that are sent
to the device.
The three configuration summaries that help you to manage device configurations are:
•
Configuration Summary
•
Delta Configuration Summary
•
Running Configuration Summary
Configuration Summary
A configuration summary shows you the exact CLI commands that will be sent to the
managed device during the next device update. To get a configuration summary in NSM,
from the Devices menu, click Configuration and select Summarize Config. The Summarize
Config dialog box appears. You see a list of security devices to which you have access.
Select the device you just imported and click OK. NSM analyzes the UI device object
configuration and generates a summary report that lists the CLI commands or XML
messages to send to the physical device during the next device update.
For a just-imported device, the configuration summary report displays the device
configuration that matches the configuration currently running on the physical device.
Delta Configuration Summary
A delta configuration summary shows you the differences between the configuration
you see in the NSM UI and the configuration on the physical device. To get a delta
configuration summary in NSM, from the Devices menu click Configuration and select
Get Summarize Delta Config. The Get Delta Config Summary dialog box appears with
a list of devices to which you have access. Select the device you just imported and click
OK. NSM queries the physical device to obtain a list of all CLI commands or XML messages
used in the device configuration, compares that list with the UI device configuration, and
generates a summary report of all differences, or deltas, discovered.
Get Running Configuration
A running configuration summary shows you the exact CLI commands or XML messages
that were used to create the current device configuration on the physical device. To get
the running config summary in the NSM application, from the Devices menu click
Configurationand selectGet Running Config. The Get Running Config dialog box appears.
You see a list of devices to which you have access. Select the device you just imported
and click OK.
Related
Documentation
NSM queries the physical device to obtain a list of all CLI commands used in the device
configuration and generates a summary report that lists those commands. For a
just-imported device, the get running config summary report displays the device
configuration currently running on the physical device.
• Importing an Infranet Controller Device Through Not Reachable Workflow on page 11
• Importing an Infranet Controller Through Reachable Workflow on page 15
Infranet Controllers Clusters in NSM Overview on page 23
•
Adding an Infranet Controller Cluster with Imported Cluster Members on page 24
Infranet Controllers Clusters in NSM Overview
When you add an Infranet Controller cluster in NSM, you first add the cluster object and
then add each member. Adding a member is similar to adding a standalone device.
Infranet Controller clusters can be configured by the device administrator to operate in
active/passive mode or in active/active mode. Clusters in active/passive mode are made
up of a primary member and a secondary member. All authentication requests are handled
by the primary member. If a primary member fails, then the secondary member takes
over.
In active/active mode, authentication requests are load-balanced across all cluster
members. If one member fails, then load balancing takes place among the surviving
members.
The number of members permitted in a cluster depends on the Infranet Controllerplatform
and whether the cluster is configured in active/active mode or in active/passive mode.
You can have no more than two cluster members in active/passive mode. In active/active
mode you can have up to four members.
Beforeyou can add a cluster member in NSM, the device administrator must have already
created the cluster and added, configured, and enabled the physical cluster member.
See the Juniper Networks Unified Access Control AdministrationGuide for details on creating
and configuring clusters.
Infranet Controller devices configuredin a cluster must have a cluster object and member
objects defined in the NSM before the Infranet Controller Cluster nodes can be recognized
by NSM. Nodes from this cluster that subsequently contact NSM will be represented by
fully functional member icons in the Cluster Manager.Cluster members whose DMI agents
do not contact NSM will be displayedin the NSM Device Monitor as unconnected devices.
InfranetController devices use member IDs to identify each clustermember object. When
importing cluster members, the member ID is imported as part of the cluster, so the Add
Cluster Member wizard does not prompt for the member ID.
To add an Infranet Controller cluster to NSM, first add the cluster object, and then add
its members. You add cluster members one at a time, in a similar manner to adding
standalone devices.
Once an Infranet Controller cluster is managed by NSM, subsequent changes applied to
the cluster by NSM will be synchronized by the cluster across all cluster members.
Similarly, changes to an Infranet Controller cluster membership that occur through
administrator action on the native device UI will be reflected back to NSM, and NSM will
display the modified cluster after the cluster configuration is imported to NSM.
You can add an Infranet Controller cluster from your existing network into NSM and
import their configurations. Using the Add Device Wizard, you configure a connection
between the management system and the physical device, and then import all device
parameters.
Related
Documentation
Infranet Controller Services and Device Configurations Supported in NSM on page 5•
• Adding an Infranet Controller Cluster with Imported Cluster Members on page 24
Adding an Infranet Controller Cluster with Imported Cluster Members
To add an Infranet Controller cluster to NSM, first add the cluster object, and then add
its members. You add cluster members one at a time, in a similar manner to adding
standalone devices.
Add and import an Infranet Controller cluster in NSM by following these procedures:
1.
Installing and Configuring the Cluster on page 24
2.
Adding the Cluster in NSM on page 24
3.
Adding the Cluster Members in NSM on page 25
4.
Configuring and Enabling the DMI Agent on the Cluster on page 27
5.
Importing Cluster Configuration on page 27
Installing and Configuring the Cluster
You must install and configure the cluster to have logon credentials for an NSM
administrator before you can add the cluster to NSM.
Adding the Cluster in NSM
Before you can add an Infranet Controller cluster to NSM, you must first add the cluster
object, and then add its members.
To add a new cluster to NSM:
1. From the left pane of the NSM UI, click Configure.
2. Expand Device Manager and select Devices. The Devices workspace appears on the
right side of the screen.
3. Click the Device Tree tab, click the New button, and select Cluster. The New - Cluster
10. Click Finish to add the cluster member to the NSM GUI. The cluster member as a child
of the Infranet Controller cluster in the Devices workspace.
Adding Cluster Members through Reachable Workflow
NOTE:
•
Make a note of the unique external ID. The device administrator will
need it to configure connectivity with NSM. The wizard automatically
enters this value for the device. This ID number represents the device
within the management system.
•
Specify the administrator username and password for the SSH
connection. This name and password must match the name and
password already configured on the device.
•
Specify the first connection one time password(OTP)that authenticates
the device. Make a note of this password. The device administrator will
need it to configure the connectivity with NSM.
To add a cluster member:
1. From the left pane of the NSM UI, click Configure.
2. Expand Device Manager and select Devices. The Devices workspace appears on the
right side of the screen.
3. Click the Device Tree tab, and select the cluster to which you want to add the members.
4. Click the New button and select Cluster Member. The New–Cluster Member dialog
box appears.
5. Enter the cluster member name, select Device Is Reachable and click Next.
6. Specify the device connection settings:
•
IP Address—IP address of the Infranet Controller.
•
Admin User Name—Administrator user name created for the Infranet Controller.
•
Password—Administrator password created for the Infranet Controller.
NOTE: The ssh port number for cluster member is 22 by default and the
port number cannot be modified.
7. Click Next, The Infranet Controllerdevice is detected and the Infranet Controller details
8. Enter a new name for the Infranet Controller device in Device Name to change the
host name of the Infranet Controller device. An error message is displayedif the device
name is not unique.
9. Click Finish to add the cluster member to the NSM GUI. The cluster member as a child
of the Infranet Controller cluster in the Devices workspace.
Configuring and Enabling the DMI Agent on the Cluster
On each cluster member device, configure and activate the DMI agent and establish an
SSH session with NSM.
Importing Cluster Configuration
After adding the cluster members, you must import the cluster configurations. You do
this only once and for the entire cluster because the configurationis identical for all cluster
members.
To import the cluster configuration:
1. From the left pane of the NSM UI, click Configure.
Chapter 4: Adding Infranet Controller Clusters
Related
Documentation
2. Expand Device Manager and select Devices. The Devices workspace appears on the
right side of the screen.
3. Click the Device Tree tab. Right-click the cluster to which you want to import the
configurations, and select Import Device.
NSM starts to import the configuration and a job window reports the progress of the job.
When the job finishes, the configuration status for each cluster member in the Device
List tab changes from Import Needed to Managed.
After importing, the configuration appears at the cluster level in NSM. To edit the
configuration, open the cluster icon, not the individual cluster members.
• Importing an Infranet Controller Device Through Not Reachable Workflow on page 11
• Importing an Infranet Controller Through Reachable Workflow on page 15
• Creating and Applying an Infranet Controller Template on page 29
• Verifying Imported Device Configurations on page 19
• Infranet Controllers Clusters in NSM Overview on page 23
7. Double-click the newly created template, to enter the configuration information. The
Device Template screen appears.
8. Click the Configuration tab; select the required parameters on the left pane and
specify the appropriate values.
9. Click OK to create an Infranet Controller template.
You can now use this template when configuring Infranet Controllers.
NOTE: In the new template, default values for the configuration parameters
are displayed based on the default values from the schema. Default values
are not displayed for configuration parameters that are based on match
conditions such as device platform or release version.
NOTE: You can create a custom expression in a device template, but you
cannot validate the custom expression. The Validate button is not enabled
in the Custom Expressions editor for device templates.
Applying the Template
Related
Documentation
To apply a template to an Infranet Controller:
1. From the left pane of the NSM UI, click Configure.
2. Expand Device Manager and select Devices. The Devices workspace appears on the
right side of the screen.
3. Double-click the Infranet Controller to open the device editor.
4. From the Device Info tab, select Templates. The templates configuration screen
appears.
5. Click the Edit icon. The Edit Templates dialog box appears.
6. Select the required template from the list, and click OK in the Edit Templates dialog
box.
7. In the templates configuration screen, select Retain template values on removal to
retain template values if a template is removed from the device.
8. Click Apply to save your changes to the device configuration.
To apply the settings to the device itself, run the Update Device directive to push the
configuration to the device.
Promoting an Infranet Controller Configuration to a Template on page 31•
• Verifying Imported Device Configurations on page 19
Promoting an Infranet Controller Configuration to a Template
NSM allows you to import an Infranet Controller configuration and then convert, or
promote,it to a template. You can then use that template to make identical configurations
on other Infranet Controllers.
To promote an Infranet Controller configuration to a template:
1. From the Devices workspace in NSM, double-click the Infranet Controller whose
configuration settings you want to promote to a template. The Infranet Controller
Device dialog box appears.
2. Select the Configuration tab. The Device configuration tree appears.
3. From the Device configuration tree, select the configuration node that you want to
promote to a template, and select Promote Template. The Select templates dialog
box appears.
4. Select the template to which you want to apply the configuration settings and click
OK. The Infranet Controller configuration is promoted to the selected template.
Chapter 5: Using Templates
Related
Documentation
Creating and Applying an Infranet Controller Template on page 29•
• Adding an Infranet Controller Cluster with Imported Cluster Members on page 24
Reverting an Infranet Controller Configuration to Default Values of a Template
NSM allows you to revert the device configuration values to that of the template default
values. The default value is inherited from the template based on the order of priority in
which the templates are applied to the device.
To revert an Infranet Controller configuration to the default values in a template:
1. From the Devices workspace in NSM, double-click the Infranet Controller whose
configuration settings you want to revert. The Infranet Controller Device dialog box
appears.
2. Select the Configuration tab. The Device configuration tree appears.
3. From the Device configuration tree, right-click the configuration node that you want
to revert and select Revert to template/default value.
4. Click OK. The Infranet Controller configuration reverts to the template default values.
Related
Documentation
• Creating and Applying an Infranet Controller Template on page 29
• Promoting an Infranet Controller Configuration to a Template on page 31
Configuring Infranet Controller User Roles (NSM Procedure) on page 35
•
Configuring Access Options on an Infranet Controller User Role (NSM
Procedure) on page 40
•
Configuring OAC Settings for a User Role (NSM Procedure) on page 42
•
Creating and Configuring Infranet Controller Administrator Roles (NSM
Procedure) on page 48
•
Delegating Management Tasks to Infranet Controller Administrator Roles (NSM
Procedure) on page 55
Configuring Infranet Controller User Roles (NSM Procedure)
A user role defines user session parameters and personalization settings. You can
customizea user role by specifying access restrictions, enabling Host Enforcer (Windows)
or agentless or Java agent access, and configuring session settings. You can create and
configure user roles through the User Roles page from the Infranet Controller device
configuration tree.
To configure a user role:
1. In the NSM navigation tree, select Device Manager > Devices.
2. Click the Device Tree tab, and then double-click the Infranet Controller device for
which you want to configure the user roles.
3. Click the Configuration tab. In the configuration tree, select Users > User Roles. The
corresponding workspace appears.
4. Click the New button, the New dialog box appears.
5. Add or modify settings on the General tab as specified in Table 6 on page 36.
Chapter 6: Configuring User Roles and Administrator Roles
Table 6: User Role Configuration Details (continued)
Your ActionFunctionOption
Max. Session
Length
(minutes)
Heartbeat
Interval
(seconds)
Heartbeat
Timeout
(seconds)
Specifies the number of minutes an
active nonadministrative user session
may remain open before ending.
During an end-user session, prior to
the expiration of the maximum session
length, the Infranet Controller prompts
the user to reenter authentication
credentials, which avoids the problem
of terminating the user session without
warning.
Specifies the frequency at which the
endpoint should send out a heartbeat
to the Infranet Controller to keep the
session alive. For agentless access,
the browser refreshes the page with
every heartbeat.
Specifies the amount of time that the
Infranet Controller should “wait”
beforeterminating a session when the
endpoint does not send a heartbeat
response.
Enter the session length in minutes.
The default is five minutes, and the
minimum is six minutes.
Enter the heartbeat interval in
seconds.
Users should not navigateaway from
the browser, as this interrupts the
heartbeat and ends the session. The
Odyssey Access Client and the Java
agent respectively provide the
heartbeat.Youshould ensure that the
heartbeat interval of the agent is
greater than the Host Checker
interval,otherwise performancecould
be affected.
Table 6: User Role Configuration Details (continued)
Your ActionFunctionOption
Roaming
session
•
Enabled—Enables roaming user
sessions for users mapped to this
role. A roaming user session works
across source IP addresses, which
allows mobile users (laptop users)
with dynamic IP addresses to sign
in to the Infranet Controller from
one location and continue working
from another. Disable this feature
to prevent users from accessing a
previouslyestablished session from
a new source IP address. This helps
protect against an attack spoofing
a user’s session, providedthe hacker
was able to obtain a valid user's
session cookie.
•
Limit to subnet—Limits the roaming
session to the local subnet specified
in the Netmask field. Users may sign
in from one IP address and continue
using their sessions with another IP
address as long as the new IP
address is within the same subnet.
•
Disabled—Disables roaming user
sessions for users mapped to this
role. Users who sign in from one IP
address may not continue an active
Infranet Controller session from
another IP address; user sessions
are tied to the initial source IP
address.
Select this option to enable, limit, or
disable the roaming session.
Roaming
netmask
Enable Session
Extension
Displays the netmask for the local
subnet.
Allows users with a Layer 2 or Layer 3
connection to continue a session
beyond the maximum session length.
General > UI Options tab
Headers > Logo
image
Headers >
Background
color
Controller welcome page.
Displays the background color for the
header area of the Infranet Controller
welcome page.
Select this option to view the
netmask for the local subnet.
Select this option to allow users with
Odyssey Access Client and agentless
access to reauthenticate and extend
their current session without
interruption.
Browse to your custom image file.Displays the logo in the Infranet
Typethe hexadecimal number for the
background color, or click the Color
Palette icon and pick the desired
color.
Chapter 6: Configuring User Roles and Administrator Roles
Table 6: User Role Configuration Details (continued)
Your ActionFunctionOption
Show
notification
message
Greeting >
Notification
Message
Enables the notification text box.Greeting >
Displays the notification message at
the top of the Infranet Controller
welcome page.
Select the Show notificationmessage check box (optional).
Enter the message that you want to
display.
You may format text and add links
using the following HTML tags: <i>,
<b>, <br>, <font>, and <a href>.
However, the Infranet Controller does
not rewrite links on the sign-in page
(because the user has not yet
authenticated), so you should only
point to external sites. Links to sites
behind a firewall will fail. You may
also use Infranet Controller system
variables and attributes in this field.
NOTE:
•
The length of the personalized
greeting cannot exceed 12K or
12288 characters.
•
If you use unsupported HTML tags
in your custom message, the
Infranet Controller may displaythe
end user’s Infranet Controller home
page incorrectly.
Related
Documentation
Other > Show
copyright
notice and
Displaysthe copyright notice and label
in the footer.
Select the Show copyright notice
and ’Secured by Juniper Networks’
label in footers check box (optional).
’Secured by
Juniper
Networks’label
in footer
This setting applies only to those
users whose license permits disabling
the copyright notice. For more
information about this feature, call
Juniper Networks Support.
Configuring Access Options on an Infranet Controller User Role (NSM Procedure) on
•
page 40
• Configuring OAC Settings for a User Role (NSM Procedure) on page 42
• Creating and Configuring Infranet Controller Administrator Roles (NSM Procedure) on
page 48
• Delegating Management Tasks to Infranet Controller Administrator Roles (NSM
Procedure) on page 55
• Verifying Imported Device Configurations on page 19
Chapter 6: Configuring User Roles and Administrator Roles
Table 7: User Role Access Configuration Details (continued)
Your ActionFunctionOption
Enable Host
Enforcer
Session start
script / Session
stop script
Enables Host Enforcer
on the endpoint and
sends Host Enforcer
policies to Odyssey
Access Client for this
role (Windows only).
Executes the script
after the start or stop
of the OAC session.
Select this option to enable the Host Enforcer for
this role.
NOTE:
•
By default, after you enable the Host Enforcer
option on a role, Odyssey Access Client denies
all traffic on the endpoint except for the following
allowed types: traffic to and from the Infranet
Controller and Infranet Enforcer, WINS, DNS,
IPsec, DHCP, ESP, IKE, outgoing TCP traffic, and
some ICMP messages (for example, PING from
the endpoint to other devices is allowed).
Therefore, it’s important that you configure Host
Enforcer policies to specify the additional types
of traffic you want to allow on each endpoint. For
example, you must configure Host Enforcer
policies to allow any incoming TCP traffic. See
“Configuring Infranet Enforcer Resource Access
Policies (NSM Procedure)”.
•
To avoid blocking all traffic on endpoints and
preventing users from accessing all network and
Internet resources, we recommend that you
configure Host Enforcer policies to allow the
specific types of traffic on endpoints before you
enable the Host Enforcer option on a role.
Specify the location of the session start scripts /
session stop script you want to run on Windows
endpoints after Odyssey Access Client connects or
disconnects with the Infranet Controller. You can
specify a fully qualified path. Scripts can be
accessed locally or remotely by means of file share
or other permanently available local network
resource. You can also use environment variables,
such as %USERNAME% in the script path name.
For example:
odyssey-settings
Agentless tab
Specifies the IC Access
and Preconfigured
Installer settings
\\abc\users\%USERNAME%\myscript.bat
Click the odyssey-settings button. See “Configuring
OAC Settings for a User Role (NSM Procedure)”.
Table 7: User Role Access Configuration Details (continued)
Your ActionFunctionOption
Select this option to allow access to endpoints in
addition to using Odyssey AccessClient on Windows
machines. If you don’t select the agentless option,
the Infranet Controller allows access to protected
resources by means of Odyssey Access Client only.
NOTE: To configure agentless access, you must
also configure a permit infranet auth policy on the
Infranet Enforcer to allow access for agentless
endpoint platforms. For configuration instructions,
see “Configuring Infranet Controller Source IP
Access Restrictions (NSM Procedure)”.
Select this option to disable use of AJAX for
heartbeats.
Related
Documentation
EnableAgentless
Access for this
role
Disable use of
AJAX for
heartbeats
Delegating Management Tasks to Infranet Controller Administrator Roles (NSM
•
Allows users to use
agentless access to
access protected
resources.
Disables use of AJAX
for heartbeats.
Procedure) on page 55
• Configuring Infranet Controller User Roles (NSM Procedure) on page 35
• Creating and Configuring Infranet Controller Administrator Roles (NSM Procedure) on
page 48
Configuring OAC Settings for a User Role (NSM Procedure)
Each time the user accesses a resource that is protected by the Infranet Controller, the
Odyssey Access Client configuration settings you specify will be used.
NOTE: Except for the login name in the profile, all of the other configuration
settings you specify on the Infranet Controller overwrite any existing settings
on the endpoint if Odyssey Access Client is already installed when the user
accesses the Infranet Controller.
To configure odyssey settings:
1. In the NSM navigation tree, select Device Manager > Devices.
2. Click the Device Tree tab, and then double-click the Infranet Controller device for
which you want to configure the user-role access option.
3. Click the Configuration tab. In the configuration tree, select Users > User Roles.
4. Add or open a user role and click the Agent tab.
5. Click the odyssey–settings button and configure the settings as specified in Table 8
Chapter 6: Configuring User Roles and Administrator Roles
There are two tabs under Odyssey Settings. The first tab, IC Access, allows you to
configure authentication and connection settings for the Odyssey Access Client. The
second tab, Preconfigured Installer, provides an interface that allows you to upload
a preconfigured version of Odyssey Access Client that you can deploy to users when
they access a role.
6. Click one:
•
OK — Saves the changes.
•
Cancel — Cancels the modifications.
Table 8: OAC Configuration Details
Your ActionFunctionOption
IC Access tab
Name of Profile
and Infranet
Controller
Displays the hostname or
the Infranet Controller
URL.
Select the profile name.
•
Use Infranet Controller's host
name—Specifies the name of the profile and
the Infranet Controller instance in Odyssey
Access Client. If the Infranet Controller does
not have a hostname configured, the URL for
the Infranet Controller or the redirect URL
from a captive portal is used instead.
•
Use this name:—Specifies the name of the
profile and the Infranet Controller instance in
Odyssey Access Client.
Profile name
Require
connection to
this Infranet
Controller
Specifies the profile name.
The field is enabled only if
the Use this name option
is selected in Name of
Profile and Infranet
Controller box.
Requires Odyssey Access
Client to always attempt
to connect to this Infranet
Controller and prevents
the user from
disconnecting from this
Infranet Controller. The
user also cannot delete
the properties of this
Infranet Controller from
the Odyssey Access Client
configuration.
Enter the name for the profile and the Infranet
Controller instance in Odyssey Access Client.
Select this option to require connection to the
Infranet Controller.
Specifies the settings that
you want to configure in
the Odyssey Access Client
profile.
Specifies the login prompt
to be displayed.
Select the login name.
•
Use qualified Windows login name (domain
name).— Configures the login name with the
user’s Windows domain name and username
in the format domain name\username. Use
this option if you are using an Active Directory
authentication server that requires a domain
name in addition to a username for
authentication.
•
Use unqualified Windows login name—
Configures the login name with the user’s
Windows user name only. Use this option for
authentication servers that require a user
name only for authentication.
•
Prompt for login name using the following
Prompt:— Displays a dialog box for the user
to enter a name during the initial Odyssey
AccessClient installation only. The login name
is then configured and the user is not
prompted again. You can also configure the
text string used for the prompt in the dialog
box.
Enter the login prompt if you have selected the
Prompt for login name using the following
Prompt: in the Login name box.
Permit login
using password
Select password
type to use
authentication for how
you want Odyssey Access
Client to obtain the user’s
credentials to sign into the
Infranet Controller.
Specifies the password
type to use. This field
appears only if you select
Permit login using
password field.
Select to enable password authentication.Enables password
Select the option for how you want Odyssey
Access Client to obtain the user’s credentials.
•
Use Windows password — Enables Odyssey
Access Client to automatically authenticate
the user to the Infranet Controllerby using the
user’s Windows password. During the initial
Odyssey Access Client installation, the user
must enter a password once, but then the
Odyssey Access Client automaticallyuses the
Windows password after that.
•
Prompt for password— Enables Odyssey
Access Client to prompt the user to enter a
password when the user is authenticated the
first time after startup. Odyssey Access Client
reuses the user’s credentials for the duration
of the Windows session. If you choose this
option and if you have configured single
sign-on, Odyssey Access Client does not
prompt the user for the password.
Chapter 6: Configuring User Roles and Administrator Roles
Table 8: OAC Configuration Details (continued)
Your ActionFunctionOption
Select protocol
for outer
authentication
Specifies whether the
outer authentication
protocol for traffic
between Odyssey Access
Client and the Infranet
Controller are Tunneled
TLS (TTLS) or Protected
EAP (PEAP).
Select the protocol for outer authentication:
•
If you select Use EAP-TTLS as outer
authentication protocol and you want to use
a client certificate as part of the EAP-TTLS
authentication, click the eap-ttls button and
select Use the user's certificate and performinner authentication. This option uses
EAP-TTLS certificate-based authentication
and tunnels password credentials with inner
authentication.Note that the most typical use
of EAP-TTLS authentication is without a client
certificate.
•
If you select Use EAP-PEAP as outer
authentication protocol and you want to use
a client certificate as part of the EAP-PEAP
authentication,click the eap-peap button and
select Inner authentication is required.
NOTE:
•
Only enable the personal client certificate
option for either EAP-TTLS or EAPPEAP to
use a client certificate if you also configure a
realm or role to require a client certificate on
the endpoint. If you enable the personal client
certificate option and do not configure the
realm or role certificate restriction, you will
cause unnecessary restrictions on the use of
this Odyssey Access Client profile.
•
If you enable the personal client certificate
option, the Infranet Controller automatically
selectsPermit login using my Certificate andUse automatic certificate selection in the
Odyssey Access Client profile.
Anonymous
name
Enables users to appear
to log in anonymously
while passing the user’s
login name (called the
inner identity) through an
encrypted tunnel. As a
result, the user’s
credentials are secure
from eavesdropping and
the user’s inner identity is
protected.
As a general rule enter anonymous in the
Anonymous name box, which is the default
value. In some cases, you may need to add
additional text. For example, if the outer identity
is used to route the user’s authentication to the
proper server, you may be required to use a
format such as anonymous@acme.com. If you
leavethe Anonymous name box blank, Odyssey
AccessClient passes the user’s login name (inner
identity) as the outer identity.
adapter to use for wired
access to the Infranet
Controller at a later time,
if the user is accessing the
Infranet Controller through
a wireless adapter during
Odyssey Access Client
installation.
Specifies the network
settings you want to
configure in Odyssey
Access Client for wireless
adapters.
Specifies the network
name.
Specifies the association
mode you want Odyssey
AccessClient to use when
associating to the access
point hardware on your
network.
Select the option.Configures a wired
Selectthe wireless adapter option. The Networkname (SSID) option, Association mode option
and Encryption method option are enabled only
if the wireless adapter option is selected.
Enter the network name, which can use up to 32
alphanumeric characters and is case-sensitive.
You must enter the name correctly to connect
successfully. For example: <MyCorpNet>.
Select the association mode:
•
open—Connects to a network through an
access point or switch that implements
802.1X authentication. Select this mode if
users are not required to use shared mode or
Wi-Fi Protected Access (WPA).
•
WPA—Connects to a network through an
access point that implements WPA.
•
WPA2—Connects to a network through an
access point that implements WPA2, the
second generation of WPA that satisfies
Chapter 6: Configuring User Roles and Administrator Roles
Table 8: OAC Configuration Details (continued)
Your ActionFunctionOption
Encryption
method
Specifies the encryption
method you want Odyssey
Access Client to use. The
available choices depend
on the association mode
you selected.
Select the encryption mode:
•
none—Uses 802.1X authentication without
WEP keys. This option is available only if you
configure access point association in open
mode. This is a typical setting to use for
wireless hotspots.
•
WEP—Uses WEP keys for data encryption.
You can select this option if you selectedopen
mode association. Select WEP encryption if
the access points in your network require WEP
encryption. Odyssey Access Client
automatically generates the WEP keys.
•
AES—Uses the advancedencryption standard
protocol. Select AES if the access points in
your network require WPA or WPA2
association and are configured for AES data
encryption.
•
TKIP—Uses the temporal key integrity
protocol. Select TKIP if the access points in
your network require WPA or WPA2
association and are configured for TKIP data
encryption.
NOTE: If you select WEP encryption, the Infranet
Controller automatically selects the Keys will
be generated automatically for data privacy
option in the Odyssey Access Client Network
properties for the wireless adapter on Odyssey
Access Client.
Related
Documentation
Preconfigured Installer tab
Current
Preconfiguration
file
Preconfiguration
file
zip containing the
preconfiguredinstaller file.
containing the
Enter the filename.Specifies the name of the
Browse to locate the preconfigured installer file.Specifies the location
preconfiguredinstaller file.
Creating and Configuring Infranet Controller Administrator Roles (NSM Procedure) on
•
page 48
• Configuring Infranet Controller User Roles (NSM Procedure) on page 35
• Configuring Access Options on an Infranet Controller User Role (NSM Procedure) on
page 40
• Delegating Management Tasks to Infranet Controller Administrator Roles (NSM
Creating and Configuring Infranet Controller Administrator Roles (NSM Procedure)
An administrator role defines administrator session and personalization settings. You
can create and configure an administrator role from the Infranet Controller configuration
tree.
To create an administrator role:
1. In the NSM navigation tree, select Device Manager > Devices.
2. Click the Device Tree tab, and then double-click the Infranet Controller device for
which you want to configure administrator role.
3. Click the Configuration tab. In the configuration tree, select Administrators > Admin
Roles.
4. Add or modify settings on the Admin Role tab as specified in Table 9 on page 48.
5. Click one:
•
OK — Saves the changes.
•
Cancel — Cancels the modifications.
NOTE: To create individual administrator accounts, you must add the users
through the appropriate authentication server (not the role). For example,
to create an individual administrator account, select Authentication > Auth.
Servers > Administrators > Users from the NSM UI.
Table 9: Administrator Role Configuration Details
Your ActionFunctionOption
Admin Role > General tab
Name
the administrator role.
Admin Role > General > Overview tab
Description
Session
Options
Describes the administrator
role.
Specifies the maximum
session length, roaming
capabilities, and session
persistence.
Enter a name.Specifies a unique name for
Enter a brief description for the administrator
role.
Select General > Session Options to apply the
settings to the role.
UI Options
Specifies the logo, color,
navigation menus and the
copyright notice.
Select General > UI Options to apply the
settings to the role.
Chapter 6: Configuring User Roles and Administrator Roles
Table 9: Administrator Role Configuration Details (continued)
Your ActionFunctionOption
Admin Role > General > Restrictions > Source IP Restrictions tab
•
Allow
Specifies from which IP
addresses users can access
an Infranet Controller sign-in
page, be mapped to a role, or
access a resource.
Select Users from any IP address to enable
users to sign into the Infranet Controller from
any IP address in order to satisfy the access
management requirement.
•
Select Users from IP addresses which pass
the specifies matching policies to allow you
to specify user access to the listed IP
addresses.
Source IP
Address
addresses.
Enter the IP address.Specifies the source IP
Enter the IP netmask.Specifies the IP netmask.Source IP
Netmask
•
Access
Specifies whether to allow or
deny access.
Select Allow to allow the user to use the IP.
•
Select Deny to prevent users from using the
IP.
Admin Role > General > Restrictions > Browser Restrictions tab
•
Allow
Specifies from which web
browsers users can access
an Infranet Controller sign-in
page or be mapped to a role.
Select Browsers with any user-agent to
allow users to access the Infranet Controller
or resourcesusing any of the supported Web
browsers.
•
SelectBrowserswhose user-agent pass the
matching policies defined below to allow
you to define browser access control rules.
Specifies the format.User agent
Enter a string in the format
pattern
*<browser_string>*
where start (*) is an optional character used to
match any character and <browser_string>is a
case-sensitive pattern that must match a
substring in the user-agent header sent by the
browser.
Action
Admin Role > General > Restrictions >Certificate Restrictions tab
Specifies whether to allow or
deny access.
NOTE: You cannot include escape characters
(\) in browser restrictions.
•
Select Allow access to allow users to use a
browser that has a user-agent header
containing the<browser_string> substring.
•
Select Deny access to prevent users from
using a browser that has a user-agent header
containing the <browser_string> substring.
Table 9: Administrator Role Configuration Details (continued)
Allow
Field
Value
Admin Role > General > Restrictions >Host Checker Restrictions tab
Restricts Infranet Controller
and resource access by
requiring client-side
certificates
Your ActionFunctionOption
•
Select All users to allow users to access the
Infranet Controller or resources from any
machine.
•
SelectUsers with a trusted client certificate
to allow users to access the Infranet
Controller from a machine with a trusted
client certificate.
Enter the certificate field.Specifies the certificatefield.Certificate
Enter the expected value.Specifies the expectedvalue.Expected
Enforce
Specifies the Host Checker
policy at the role level.
•
Select Allow all users to restrict Host
Checker to be installed in order for the user
to meet the access requirement.
•
Select Allow users whose workstations
meet the requirements specified by the
Host Checker policies to requires that Host
Checker is running the specified Host Checker
policies in order for the user to meet the
access requirement.
Host Checker
policies
to the role if
policies.
Specifies access to the roleAllow access
Select the required Host Checker policies.Specifies the Host Checker
•
Select All of the selected policies pass to
allow access only if all the policy
requirements are met.
•
SelectAny ONE of the selectedpolicies pass
to allow access even if one policy
requirement is met.
Admin Role > General > Users > Roles > Delegate User Roles
Administrators
can manage
ALL roles
Specifies whether the
administratorcan manage all
roles
Select the user roles. If you only want to allow
the administrator role to manage selected user
roles, select those roles in the Non-members
list and click Add to move it to the Members
list.
Access
Specifies which user role
pages the delegated
administrator can manage.
•
Select Write All to specify that members of
the administrator role can modify all user role
pages.
•
Select Custom Settings to allow you to pick
and choose administrator privileges (Deny,
Read, or Write) for the individual user role
pages.
Chapter 6: Configuring User Roles and Administrator Roles
Table 9: Administrator Role Configuration Details (continued)
Your ActionFunctionOption
Admin Role > General > Users > Role > Delegate As Read-Only Role
Administrator
can view (but
not modify)
ALL roles
Allows the administrator to
view the user roles, but not
manage.
Admin Role > General > Users > Realms > Delegate User Realms
Administrators
can manage
ALL realms
Specifies whether the
administratorcan manage all
user authentication realms
Select the user role that you want to allow the
administrator to view.
NOTE: If you specify both write access and
read-only access for a feature, the Infranet
Controller grants the most permissive access.
For example, if you select the Administratorscan manage ALL roles check box under
Delegate User Roles, and then select the Users
role on the Delegate As Read-Only Roles page,
then the Infranet Controller allows the
delegated administrator role full management
privileges to the Users role.
Select the user realm. If you only want to allow
the administrator role to manage selected
realms, select those realms from
theNon—members list and add to the Members
list.
•
Access
Specifies which user
authentication realms pages
that the delegated
administrator can manage.
Select Write All to specify that members of
the administrator role can modify all user
authentication realm pages.
•
Select Custom Settings to allow you to pick
and choose administrator privileges (Deny,
Read, or Write) for the individual user
authentication realm pages.
Admin Role > General > Users > Realms > Delegate As Read-Only Realms
Administrator
can view (but
not modify)
ALL realms
Allows the administrator to
view the user authentication
realms, but not modify.
Select the user authentication realms that you
want to allow the administrator to view.
NOTE: If you specify both write access and
read-only access for an authentication realm
page, the Infranet Controller grants the most
permissive access. For example, if you select
the Administrators can manage ALL realms
check box under Delegate User Realms, and
then select the Users role on the Delegate As
Read-Only Realms page, then the Infranet
Controller allows the delegated administrator
role full management privileges to the Users
realm.
Admin Role > General > DelegatedAdministratorSettings > Management of Admin roles
Select to manage all the admin roles.Manages all admin roles.Manage ALL
Table 9: Administrator Role Configuration Details (continued)
Your ActionFunctionOption
Allow
Add/Delete
admin roles
Allows the security
administrator the ability to
create administrator roles,
Select to allow the security administrator to
add and delete admin roles.
even if the security
administrator is not part of
the Administrators role.
•
Access
Indicates the level of access
that you want to allow the
security administrator role to
set for system
administrators.
Select Deny All to specify that members of
the security administrator role cannot see or
modify any settings in the category.
•
Select Read All to specify that members of
the security administrator role can view, but
not modify, all settings in the category.
•
Select Write All to specify that members of
the security administrator role can modify all
settings in the category.
•
Select Custom Settings to allow you to pick
and choose security administrator privileges
(Deny, Read, or Write) for the individual
features within the category.
Admin Role > General > Delegated Administrator Settings > Management of Admin
realms
Select to manage all the admin realms.Manages all admin realms.Manage ALL
admin realms
Allow
Add/Delete
admin realms
Allows the security
administrator to create and
delete administrator realms,
Select to allow the security administrator to
add and delete admin realms.
even if the security
administrator is not part of
the administrators role.
Access
Indicates the level of realm
access that you want to
allow the security
administrator role to set for
system administrators for
each major set of admin
console pages.
•
Select Deny All to specify that members of
the security administrator role cannot see or
modify any settings in the category.
•
Select Read All to specify that members of
the security administrator role can view, but
not modify, all settings in the category.
•
Select Write All to specify that members of
the security administrator role can modify all
settings in the category.
•
Select Custom Settings to allow you to pick
and choose security administrator privileges
(Deny, Read, or Write) for the individual
features within the category.
NOTE: All administrators that can manage
admin roles and realms have at least read-only
access to the admin role’s Name and
Description and to the realm's Name and
Description, as displayed on the General page.
Chapter 6: Configuring User Roles and Administrator Roles
Table 9: Administrator Role Configuration Details (continued)
Your ActionFunctionOption
Admin Role > General > Delegated Resource Policies > All tab
•
Access
Indicates the level of access
that you want to allow the
administrator role for each
Resource Policies submenu.
Admin Role > General > Delegated Resource Policies > Custom Settings
Additional
AccessPolicies
Sets custom access levelsfor
an individual policy
Select Deny All to specify that members of
the administrator role cannot see or modify
any resource policies.
•
Select Read All to specify that members of
the administrator role can view, but not
modify, all resource policies.
•
Select Write All to specify that members of
the administrator role can modify all resource
policies.
•
Select Custom Settings to allow you to pick
and choose administrator privileges (Deny,
Read, or Write) for each type of resource
policy or for individual resource policies.
Select the access level for the policy (Deny,
Read, or Write).
Policies
Provides custom access
level.
Select the resource policy for which you want
to provide a custom accesslevel, and click Add.
Default Options for Delegated Admins > Session Options tab
Idle Timeout
(minutes)
minutes an administrator
Enter the idle timeout duration in minutes.Specifies the number of
session may remain idle
before ending. The minimum
is 5 minutes. The default idle
session limit is ten minutes,
which means that if an
administrator’s session is
inactive for ten minutes, the
Infranet Controller ends the
session and logs the event in
the system log (unless you
enable session timeout
warnings described below).
Max. Session
Length
(minutes)
Specifies the number of
minutes an active
administrator session may
Enter the session length in minutes. The default
is 300 seconds, and the minimum is six minutes.
remain open before ending.
The minimum is 6 minutes.
The default time limit for an
administrator session is sixty
minutes, after which the
Infranet Controller ends the
session and logs the event in
the system log.
Table 9: Administrator Role Configuration Details (continued)
Roaming
session
Roaming sessions allow
users to work across source
IP addresses. This is useful
for mobile users with
dynamically assigned IP
addresses, as it allows them
to sign in from their desk and
continue working.
Your ActionFunctionOption
•
Select Enabled to enable roaming user
sessions for users mapped to this group. A
roaming user session works across source IP
addresses, which allows mobile
administrators (laptop users) with dynamic
IP addresses to sign in to the Infranet
Controller from one location and continue
working from another. Disable this feature to
prevent users from accessing a previously
established session from a new source IP
address. This helps protect against an attack
spoofing a user’s session, provided the hacker
was able to obtain a valid user's session
cookie.
•
Select Limit to subnet to limit the roaming
session to the local subnet specified in the
Netmask field. Administrators may sign in
from one IP address and continue using their
sessions with another IP address as long as
the new IP address is within the same subnet.
•
Select Disabled to disable roaming sessions
for administrators mapped to this role.
Administrators who sign in from one IP
address may not continue an active Infranet
Controller session from another IP address;
administrator sessions are tied to the initial
source IP address.
Default Options for Delegated Admins >UI Options tab
Logo image
Displays the logo in the
Current appearance box only
Click the Browse button and locate your custom
image file.
after you save your changes.
Background
color
Updates the current
appearance of the box.
Type the hexadecimal number for the
background color or click the Color Paletteicon
and pick the desired color.
•
Navigation
Menus
Displays hierarchical
navigation menus.
Select Auto-enabled to determine whether
the administrator is signed in from a
supported platform and enables or disables
the hierarchical menus accordingly.
•
SelectEnabled to enable hierarchical menus,
regardless of your platform. If the
administrator is signed in from an
unsupported platform, they may not be able
to use the hierarchical menus, even though
they are enabled.
•
Select Disabled to disable hierarchical
menus for all members of the role.
Chapter 6: Configuring User Roles and Administrator Roles
Table 9: Administrator Role Configuration Details (continued)
Your ActionFunctionOption
Select or clear the check box (optional).
NOTE: If you do not want user roles to see the
copyright notice, you can also deselect the
option in the Default Settings for user roles, in
general. That way, all subsequent roles you
create do not allow the notice to appear on the
end-user UI.
Related
Documentation
Show
copyright
notice in footer
Delegating Management Tasks to Infranet Controller Administrator Roles (NSM
•
Specifies the copyright notice
and label in the footer.
Procedure) on page 55
• Configuring Infranet Controller User Roles (NSM Procedure) on page 35
• Configuring Access Options on an Infranet Controller User Role (NSM Procedure) on
page 40
• Configuring OAC Settings for a User Role (NSM Procedure) on page 42
Delegating Management Tasks to Infranet Controller Administrator Roles (NSM
Procedure)
You can delegate management tasks to various delegated administrator roles.
To delegate management tasks to administrator roles:
1. In the navigation tree, select Device Manager > Devices.
2. Click the Device Tree tab, and then double-click the Infranet Controller device for
which you want to configure administrator role.
3. Click the Configuration tab. In the configuration tree, select Administrators > Admin
Roles.
4. Add or modify settings under Admin Role as specified in Table 10 on page 55.
5. Click one:
•
OK — Saves the changes.
•
Cancel — Cancels the modifications.
Table 10: Administrator Role Configuration for Delegation
Your ActionFunctionOption
Users > Roles > Delegate User Roles
Administrators
can manage
ALL roles
Specifies whether the
administrator can manage
all roles
Select the user roles. If you only want to allow
the administrator role to manage selecteduser
roles, select those roles in the Non-members
list and click Add to move it to the Members
list.
Table 10: Administrator Role Configuration for Delegation (continued)
Access
Users > Role > Delegate As Read-Only Role
Administrator
can view (but
not modify) ALL
roles
Specifies which user role
pages the delegated
administrator can manage.
Allows the administrator to
view the user roles, but not
manage.
Your ActionFunctionOption
•
Select Write All to specify that members of
the administrator role can modify all user
role pages.
•
Select Custom Settings to allow you to pick
and choose administrator privileges (Deny,
Read, or Write) for the individual user role
pages.
Selectthe user roles that you want to allow the
administrator to view.
NOTE: If you specify both write access and
read-only access for a feature, the Infranet
Controller grants the most permissive access.
For example, if you select the Administratorscan manage ALL roles check box under
Delegate User Roles, and then select the Users
role on the Delegate As Read-Only Roles page
then the Infranet Controller allows the
delegated administrator role full management
privileges to the Users role.
Users > Realms > Delegate User Realms
Administrators
can manage
ALL realms
Specifies whether the
administrator can manage
all user authentication
realms
Select the user realm. If you only want to allow
the administrator role to manage selected
realms, select those realms in the
Non-members list and click Add to move it to
the Members list.
Access
Specifies which user
•
authenticationrealms pages
that the delegated
administrator can manage.
•
Users > Realms > Delegate As Read-Only Realms
Administrator
can view (but
not modify) ALL
realms
Allows the administrator to
view the user authentication
realms, but not modify.
Select the user authentication realms that you
want to allow the administrator to view.
NOTE: If you specify both write access and
read-only access for an authentication realm
page, the Infranet Controller grants the most
permissive access. For example, if you select
the Administrators can manage ALL realms
check box under Delegate User Realms, and
then select the Users role on the Delegate As
Read-Only Realms page, then the Infranet
Controller allows the delegated administrator
role full management privileges to the Users
realm.
Select Write All to specify that members of
the administrator role can modify all user
authentication realm pages.
Select Custom Settings to allow you to pick
and choose administrator privileges (Deny,
Read, or Write) for the individual user
authentication realm pages.
Chapter 6: Configuring User Roles and Administrator Roles
Table 10: Administrator Role Configuration for Delegation (continued)
Your ActionFunctionOption
Delegated System Settings tab
•
System Tasks
Log/Monitoring
Authentication
Maintenance
Tasks
Indicates the level of access
that you want to allow for
system tasks.
Indicates the level of access
that you want to allow for
log/monitoring.
Indicates the level of access
that you want to allow for
authentication.
Indicates the level of access
that you want to allow for
maintenance tasks.
Select Deny All to specify that members of
the administrator role cannot view or modify
any settings.
•
Select Read All to specify that members of
the administrator role can view, but not
modify settings.
•
Select Write All to specify that members of
the administrator role can modify all settings.
•
Select Custom Settings to allow you to pick
and choose privileges (Deny, Read, or Write)
for System, Archiving and Troubleshooting
pages.
Delegated Administrator Settings > Management of Admin roles
Select to manage all the admin roles.Manages all admin roles.Manage ALL
admin roles
Allow
Add/Delete
admin roles
Allows the security
administrator to create
administrator roles, even if
Select to allow the security administrator to
add and delete admin roles.
the security administrator is
not part of the
administrators role.
•
Access
Indicates the level of access
that you want to allow the
security administrator role to
set for system
administrators.
Select Deny All to specify that members of
the security administrator role cannot see or
modify any settings in the category.
•
Select Read All to specify that members of
the security administrator role can view, but
not modify, all settings in the category.
•
Select Write All to specify that members of
the security administrator role can modify
all settings in the category.
•
Select Custom Settings to allow you to pick
and choose security administratorprivileges
(Deny, Read, or Write) for the individual
features within the category.
Delegated Administrator Settings > Management of Admin realms
Select to manage all the admin realms.Manages all admin realms.Manage ALL
Table 10: Administrator Role Configuration for Delegation (continued)
Your ActionFunctionOption
Allow
Add/Delete
admin realms
Allows the security
administrator to create and
delete administrator realms,
even if the security
administrator is not part of
the administrators role.
Access
Indicates the level of realm
access that you want to
allow the security
administrator role to set for
system administrators for
each major set of admin
console pages (General,
Authentication Policy, and
Role Mapping.)
Delegated Resource Policies > All tab
Access
Indicates the level of access
that you want to allow the
administrator role for each
Resource Policies sub-menu
Select to allow the security administrator to
add and delete admin realms.
•
Select Deny All to specify that members of
the security administrator role cannot see or
modify any settings in the category.
•
Select Read All to specify that members of
the security administrator role can view, but
not modify, all settings in the category.
•
Select Write All to specify that members of
the security administrator role can modify
all settings in the category.
•
Select Custom Settings to allow you to pick
and choose security administratorprivileges
(Deny, Read, or Write) for the individual
features within the category.
NOTE: All administrators that can manage
admin roles and realms have at least read-only
access to the admin role’s Name and
Description and to the realm's Name and
Description, as displayed on the General tab.
•
Select Deny All to specify that members of
the administrator role cannot see or modify
any resource policies.
•
Select Read All to specify that members of
the administrator role can view, but not
modify, all resource policies.
•
Select Write All to specify that members of
the administrator role can modify all
resource policies.
•
Select Custom Settings to allow you to pick
and choose administrator privileges (Deny,
Read, or Write) for each type of resource
policy or for individual resource policies.
Delegated Resource Policies > All (Custom Settings for Infranet Enforcer, Network
Access, and Host Enforcer)
Additional
Access Policies
Policies
Sets custom access levels
for an individual policy
Provides custom access
level.
Select the access level for the policy (Deny,
Read, or Write.)
Select the resource policy for which you want
to provide a custom accesslevel, and click Add.
Configuring Infranet Controller RADIUS Request Attribute Restrictions for User Realms
(NSM Procedure) on page 69
•
Configuring the Number of Concurrent Sessions and Concurrent Users for Infranet
Controller Users (NSM Procedure) on page 70
Configuring Infranet Controller Source IP Access Restrictions (NSM Procedure)
SourceIP access restrictions control from which IP addresses users can access an Infranet
Controller sign-in page, be mapped to a role, or access a resource.
To configure Infranet Controller source IP access restrictions:
1. In the navigation tree, select Device Manager> Devices.
2. Click the Device Tree tab, and then double-click the Infranet Controller device for
which you want to configure source IP access restrictions.
3. Click the Configuration tab. In the Configuration tree, select:
•
Administrators > Admin Roles > Select Role > General > Restrictions > Source IP
Restrictions to configure source IP access restrictions for admin roles.
•
Administrators > Admin Realms > Select Realm > AuthenticationPolicies > Source
IP to configure source IP access restrictions for admin realms.
Browser restrictions control from which Web browsers users can access an Infranet
Controller sign-in page or be mapped to a role. If a user tries to sign into the Infranet
Controllerusing an unsupported browser,the sign-in attempt fails and a messagedisplays
stating that an unsupported browser is being used. This feature also ensures that users
sign into the Infranet Controller from browsers that are compatible with corporate
applications or are approved by corporate security policies.
To configure Infranet Controller browser access restrictions:
1. In the NSM navigation tree, select Device Manager > Devices.
2. Click the Device tree tab, and then double-click the Infranet Controller device for
which you want to configure browser access restrictions.
3. Click the Configuration tab. In the configuration tree, select the level at which you
want to implement browser access restrictions:
•
Realm level—Select:
•
Administrators > Admin Realms >Select Realm > Authentication Policies >
Browser to configure browser access restrictions for admin realms.
•
Users > User Realms > Select Realm > Authentication Policies > Browser to
configure browser access restrictions for user realms.
•
Role level—Select:
•
Administrators > Admin Roles > Select Role > General > Restrictions > Browser
Restrictions to configure browser access restrictions for admin roles.
•
Users > User Roles> SelectRole > General > Restrictions > Browser Restrictions
to configure browser access restrictions for user roles.
4. Add or modify settings as specified in Table 12 on page 64.
Specifies from which
Web browsers users can
access an Infranet
Controllersign-in pageor
be mapped to a role.
Your ActionFunctionOption
•
SelectBrowserswith any user-agent to allow users
to access the Infranet Controller or resources using
any of the supported Web browsers.
•
Select Browsers whose user-agent pass the
matching policies defined below to allow you to
define browser access control rules.
Related
Documentation
User—Agent
pattern
Action
Configuring Infranet Controller Source IP Access Restrictions (NSM Procedure) on
•
Specifies the user agent
string pattern.
Specifies whether to
allow or deny browser
access.
Enter a string in the format
*<browser_string>*
where start (*) is an optional characterused to match
any character and <browser_string>is a case-sensitive
patternthat must matcha substring in the user-agent
header sent by the browser.
NOTE: You cannot include escape characters (\) in
browser restrictions.
•
SelectAllowaccess to allow users to use a browser
that has a user-agent header containing
the<browser_string> substring.
•
Select Deny access to prevent users from using a
browser that has a user-agent header containing
the <browser_string> substring.
page 61
• Configuring Infranet Controller Certificate Access Restrictions (NSM Procedure) on
page 64
• Configuring Infranet Controller Password Access Restrictions (NSM Procedure) on
You can restrict Infranet Controller and resource access by password-length when
administrators or users try to sign in to an Infranet Controller. The user must enter a
password whose length meets the minimum password-length requirement specified for
the realm.
To configure Infranet Controller password access restrictions:
1. In the NSM navigation tree, select Device Manager > Devices.
2. Click the Device tree tab, and then double-click the Infranet Controller device for
which you want to configure password access restrictions.
3. Click the Configuration tab. In the configuration tree, select the level at which you
want to implement password access restrictions. Then select:
•
Administrators > Admin Realms >Select Realm > Authentication Policies >
Password to configure password access restrictions for admin realms.
•
Users > User Realms >Select Realm > Authentication Policies > Password to
configure password access restrictions for user realms.
4. Add or modify settings as specified in Table 14 on page 67.
Configuring Infranet Controller Source IP Access Restrictions (NSM Procedure) on
•
Specifies that the selected
policies are to be evaluated.
be enforced.
Specifies that the selected
policies are to be enforced.
Specifies access to the realm.Allow access to the
Selectthe policies that must be evaluated
and add them to the Members list.
Select to enforce all policies.Specifies if all policies must
Select the policies that must be enforced
and add them to the Members list.
•
SelectAll of the enforcedpolicies pass
to allow access only if all the enforced
policy requirements are met.
•
Select Any ONE of the enforced
policies pass to allow access even if
one enforced policy requirement is met.
page 61
• Configuring Infranet Controller Browser Access Restrictions (NSM Procedure) on
page 63
• Configuring Infranet Controller Certificate Access Restrictions (NSM Procedure) on
page 64
• Configuring Infranet Controller Password Access Restrictions (NSM Procedure) on
page 66
• Configuring the Number of Concurrent Sessions and Concurrent Users for Infranet
Controller Users (NSM Procedure) on page 70
• Configuring Infranet Controller User Roles (NSM Procedure) on page 35
• Creating and Configuring Infranet Controller Administrator Roles (NSM Procedure) on
page 48
Configuring InfranetController RADIUS Request AttributeRestrictions for User Realms
(NSM Procedure)
You can create RADIUS request attribute policies to require authentication requests to
contain specific RADIUS attribute values. If an endpoint attempts to access a realm with
a RADIUS request attribute policy, the endpoint must meet the conditions specified in
the policy.
• Configuring the Number of Concurrent Sessions and Concurrent Users for Infranet
Controller Users (NSM Procedure) on page 70
• Configuring Infranet Controller User Roles (NSM Procedure) on page 35
• Creating and Configuring Infranet Controller Administrator Roles (NSM Procedure) on
page 48
Configuring the Number of Concurrent Sessions and Concurrent Users for Infranet
Controller Users (NSM Procedure)
You can limit the number of concurrent sessions and concurrent users for Infranet
Controller users. A user who enters a URL to one of this realm’s sign-in pages must meet
any access management and concurrent user requirements specified for the
authentication policy before the Infranet Controller presents the sign-in page to the user.
Chapter 7: Configuring Security Requirements for Administrators and Users
To configure the number of concurrent sessions and concurrent users for Infranet
Controller users:
1. In the NSM navigation tree, select Device Manager > Devices.
2. Click the Device tree tab, and then double-click the Infranet Controller device for
which you want to configure the number of concurrent sessions and concurrent users.
3. Click the Configuration tab. In the configuration tree, select the level at which you
want to implement concurrent session restrictions. Then select:
•
Administrators > Admin Realms >SelectRealm > Authentication Policies > Limits
to configure the number of concurrent sessions for admin realms.
•
Users > User Realms >SelectRealm > Authentication Policies > Limits to configure
the number of concurrent sessions for user realms.
NOTE: The number of concurrent users can be configured only for user
realms.
4. Add or modify settings as specified in Table 17 on page 71.
5. Click one:
•
OK—Saves the changes.
•
Cancel—Cancels the modifications.
Table 17: Number of Concurrent Sessions and Concurrent Users for Infranet
Controller User Configuration Details
Your ActionFunctionOption
Limit number of
concurrentusers
Guaranteed
minimum
Limit the
number of
concurrent
sessions per user
Limits the number of concurrent users
on the realm.
Specifies the number of users
between zero (0) and the maximum
number of concurrent users defined
for the realm, or you can set the
number to the maximum allowed by
your license if there is no realm
maximum.
Specifies whether the number of
concurrent sessions per user is
limited.
Select this option to limit the number
of concurrent users.
Select or enter the number of users
between zero (0) and the maximum
number of concurrent users defined
for the realm.
Select this option to limit the number
of concurrent sessions per user.
Table 17: Number of Concurrent Sessions and Concurrent Users for Infranet
Controller User Configuration Details (continued)
Your ActionFunctionOption
Related
Documentation
Session limit
Maximum
• Configuring Infranet Controller Source IP Access Restrictions (NSM Procedure) on
Specifies the number of sessions
permissible.
NOTE: You can configure this option
only for user realms.
Specifies the maximum number of
concurrent users.
NOTE: You can configure this option
only for user realms.
Specify the number of sessions
permitted. By default, the number is 1
if the realm maximum is greater than
0; otherwise, the default is 0. The
maximum number must be no greater
than the maximum number of
concurrent users for the realm.
Selector enter the maximum number
of concurrent users permissible.
page 61
• Configuring Infranet Controller Browser Access Restrictions (NSM Procedure) on
page 63
• Configuring Infranet Controller Certificate Access Restrictions (NSM Procedure) on
Configuring the Infranet Controller RADIUS
Server and Layer 2 Access
•
Configuring the Infranet Controller as a RADIUS Server (NSM Procedure) on page 73
•
Using the Infranet Controller for 802.1X Network Access (NSM Procedure) on page 75
•
Configuring Location Groups (NSM Procedure) on page 76
•
Configuring RADIUS Clients (NSM Procedure) on page 77
•
Configuring RADIUS Return Attributes Policies (NSM Procedure) on page 80
•
Configuring RADIUS Request Attributes Policies (NSM Procedure) on page 83
•
Configuring an Infranet Enforcer as a RADIUS Client of the Infranet Controller (NSM
Procedure) on page 84
•
Non-Juniper 802.1X Supplicant Configuration Overview on page 85
Configuring the Infranet Controller as a RADIUS Server (NSM Procedure)
The Infranet Controller contains an internal RADIUS server that can be configured to
perform Extensible Authentication Protocol (EAP) inner and outer authentication,
non-tunneled Web authentication without EAP, and MAC address authentication.
To configure the Infranet Controller as a RADIUS server, the following configurations
must be performed:
1.
Configuring Authentication Protocol Sets on page 73
2.
Using RADIUS Proxy on page 75
Configuring Authentication Protocol Sets
To configure an authentication protocol set:
1. In the NSM navigation tree, select Device Manager > Devices.
2. Click the Device Tree tab, and then double-click the Infranet Controller device for
which you want to configure authentication protocol sets.
3. Click the Configuration tab. In the configurationtree, select Authentication > Signing
NOTE: The default 802.1X protocol set is configured to work with either
EAP-TTLS or EAP-PEAP as the primary outer authentication protocol,
and EAP-JUAC or EAP-MSCHAP- V2 for inner authentication (if EAP-PEAP
is used) and EAP-JUAC, PAP, MSCHAP- V2, EAP-MS-CHAP-V2, or
EAP-GenericTokenCard (if EAP-TTLS is used).
Your ActionFunctionOption
Authentication Protocol
Name
Description
for the authentication
protocol.
Describes the
authentication protocol.
Enter a name for the authentication protocol.Specifies a unique name
Chapter 8: Configuring the Infranet Controller RADIUS Server and Layer 2 Access
You can configure the Infranet Controller to proxy RADIUS inner or outer authentication
to an external RADIUS server.
With RADIUS proxy, the Infranet Controller RADIUS server can forward authentication
requests from a network access device to an external RADIUS server. The proxy target
receives the request, performs the authentication, and returns the results. The Infranet
Controller RADIUS server then passes the results to the network access device.
NOTE: When RADIUS proxy is used, realm or role restrictions cannot be
enforced. Host Checker policies, source IP restrictions, and any other limits
that have been assigned are bypassed. RADIUS proxy should be used only if
no restrictions have been applied. The exception is that session limitations
can be enforced for inner proxy. With outer proxy, no session is established.
You configure RADIUS proxy at the realm level. If the authentication server for the realm
is a RADIUS server, option buttons on the page allow you to select inner proxy, outer
proxy, or do not proxy. Do not proxy is selected by default. If the authentication server is
not a RADIUS server, the proxy option buttons are hidden.
If the authentication server selected for a realm is a RADIUS server, the Proxy Outer
Authentication option button controls whether outer authentication is proxied, and the
ProxyInner Authentication option button controls whether inner authentication is proxied.
You can also choose the Do not proxy option button if you do not want inner or outer
authentication to be proxied. In this case, the Infranet Controller handles both inner and
outer authentication. You must enable the JUAC protocol for this option.
Related
Documentation
Configuring Role Mapping Rules (NSM Procedure) on page 90•
• Configuring RADIUS Clients (NSM Procedure) on page 77
• Using the Infranet Controller for 802.1X Network Access (NSM Procedure) on page 75
Using the Infranet Controller for 802.1X Network Access (NSM Procedure)
The IEEE 802.1X protocol provides authenticatedaccess to a LAN. The Infranet Controller
RADIUS server can fulfill RADIUS authentication requests from RADIUS clients that
support 802.1X. (If you are using an external RADIUS server for authentication, you can
use the Infranet Controller RADIUS proxy feature.)
To configure the Infranet Controller as a RADIUS server for an 802.1X network access
device, perform these tasks:
Configuring Location Groups (NSM Procedure) on page 76•
• Configuring RADIUS Clients (NSM Procedure) on page 77
• Configuring a New RADIUS Vendor (NSM Procedure) on page 78
Configuring Location Groups (NSM Procedure)
You can use location groups to organize or logically group network access devices by
associating the devices with specific sign-in policies. Location groups associate sign-in
policies with network access devices.
To configure location groups:
1. In the NSM navigation tree, select Device Manager > Devices.
2. Click the Device Tree tab, and then double-click the Infranet Controller device for
which you want to configure location groups.
3. Click the Configuration tab. In the configuration tree, select UAC > Network Access
> Location Groups.
4. Add or modify Location Groups tab as specified in Table 19 on page 76.
To enable the Infranet Controller to respond to a network access device, you must
configure a RADIUS client in the Infranet Controller.
Configure RADIUS clients by following these procedures:
1.
Uploading a New RADIUS Client Dictionary on page 77
2.
Creating a RADIUS Dictionary Based on an Existing Model on page 78
3.
Configuring a New RADIUS Vendor (NSM Procedure) on page 78
4.
Creating a RADIUS Client on page 79
Uploading a New RADIUS Client Dictionary
To upload a new RADIUS client dictionary to the Infranet Controller:
1. In the NSM navigation tree, select Device Manager > Devices.
2. Click the Device Tree tab, and then double-click the Infranet Controller device for
which you want to upload the RADIUS client dictionary.
3. Click the Configuration tab. In the configuration tree, select UAC > Network Access
> RADIUS Dictionary.
4. Add or modify settings on the RADIUS Dictionary tab as specified in Table 20 on
page 77.
5. Click one:
•
OK—Saves the changes.
•
Cancel—Cancels the modifications.
NOTE:
•
You can only remove dictionaries that are not associated with a vendor.
•
You can download any dictionary from the list, including preinstalled
dictionaries. You can modify the downloaded dictionary, and then upload
it as a new make or model.
Validates communications between the
Infranet Controller and network access
device.
attributes to be used by the Infranet
Controllerwhen communicating with this
client.
this network access device.
Allows the Infranet Controller to send
unsolicited disconnect requests to the
network access device. When a user
session is deleted on the Infranet
Controller, the disconnect messages
cause the user’s session to be terminated
immediately, and all session information
is removed.
Enables the RADIUS clients.Enabled
Enter the shared secret.
The Infranet Controller supports
shared secrets of up to 127
alphanumeric characters, including
spaces and the following special
characters:
~!@#$%^&*()_+|\=-‘{}[]:”’;<>?/.,
Select the make or model.Specifies the dictionary of RADIUS
Select the location group.Specifies the location group to use with
Selectthis option to send terminate
session requests to network access
devices that support RFC 3576.
Selectthis option to enable RADIUS
clients.
Related
Documentation
Configuring Location Groups (NSM Procedure) on page 76•
You can configure RADIUS attributes policies on the Infranet Controller to send return
list attributes to an 802.1X network access device. You can also configure other functions
on a network access device's port based on the role assigned to the user who is currently
using that port.
To configure RADIUS attributes policies:
1. In the NSM navigation tree, select Device Manager > Devices.
2. Click the Device Tree tab, and then double-click the Infranet Controller device for
which you want to configure RADIUS return attributes policies.
Specifies a name for the
RADIUS return attributepolicy.
Describes the RADIUS return
attribute policy.
Specifies the location groups
for the RADIUS attributes
policies.
Disables assigning endpoints
to a VLAN or returning any
RADIUS attributes.
Enables VLAN assignment
according to RFC 3580 by
returning the RADIUS tunnel
attributes to the network
access device.
Enter a name for the RADIUS
return attribute policy.
Enter a brief description for the
RADIUS return attributepolicy.
Selectthe locationgroup from
the Non-member list and click
Add to move them to the
Members list.
NOTE: To apply the policy to
all locationgroups, do not add
any location groups and leave
the default setting (all) listed
in the Selected Location
Groups list.
Selectthis option to disable all
other RADIUS attributes
options.
Select this option to configure
VLAN assignment.
NOTE: Selecting this option is
equivalent to manually
specifying the three RFC 3580
RADIUS tunnel attributes in
the Enable Return Attribute
section.
VLAN
Enable Return Attribute
on the network infrastructure
that you want to use for the
role(s) to which this policy
applies.
Enables the return-attribute
option.
Specify the existing VLAN ID.Specifies the existing VLAN ID
Enable addition of
Session-Timeout attribute
with value equal to the Session
Lifetime
Interface
Specifies the return attributes
to be sent to the network
access device.
Sends the Infranet Controller
a session timeout value equal
to the timeout value of the
configured session length on
all RADIUS accepts.
Specifies the Infranet
Controller network interface
for use by endpoints using
RADIUS attributes policies to
connect to the Infranet
Controller.
Click return-attribute and add
the return attribute.
1. From the Attribute
drop-down list, select the
return attribute you want
to send.
2. For Value, enter the value
for the selected attribute,
and then click OK.
Clearthis check box to prevent
the Infranet Controller from
sending a session timeout
value equal to the timeout
value of the configured session
length on all RADIUS accepts.
This allows you to set the
reauthentication timer
statically on the switch port, if
required
•
Select Automatic to use
VLAN tagging . You must
also connect the Infranet
Controller internal interface
to the trunk port on a
VLAN-enabled switch that
sees all of the VLAN traffic.
•
Select Internal if the
endpoints using RADIUS
attributes policies should
use the IP address of the
Infranet Controller's internal
interface.
•
Select External if the
endpoints on the configured
VLAN should use the IP
address of the Infranet
Controller's external
interface.