Configuration Procedure - ADTRAN BlueSecure Controller Setup And Administration Manual

Software release version: 6.5
Table of Contents

Advertisement

these roles or create your own IDS role to assign to blocked users. Note that the
Monitoring Mode role is designed to be used only for test purposes as you tweak the BSC
IDS settings for your network.
The blocked host is allowed to get a DHCP address but, only administrator intervention
can transition the host back to the Normal State.
Finally, you may specific a URL to which to redirect blocked users.Typically, you will want
to redirect a blocked user to a web page that informs them of their blocked status and
offers information and links (e.g., to download virus protection software) to possibly
remedy the situation.
A host transitions to the Blocked State either dynamically via the BSC IDS or if an
Administrator adds the host to the blocked list manually.
See "Monitoring a User's IDS Status" on page 15-3 for information about monitoring user
host IDS states and activity, and the actions you may take to block or un-block hosts
manually. See "Defining MAC Address Authentication" on page 5-5 for information
about blocking and unblocking a device configured for MAC authentication. See
"Creating Network Services and Services Groups" on page 8-13 for information about
enabling or disabling access to a network service for blocked users.

Configuration Procedure

To configure the BSC Intrusion Detection System:
Displaying the
Click the General tab in the BSC administrator console, and then click the IDS tab.
1.
Intrusion
The Intrusion Detection page appears as shown in Figure 10-3.
Detection page
BlueSecure™ Controller Setup and Administration Guide
Intrusion Detection System
10-7

Advertisement

Table of Contents
loading

Table of Contents