Sign In
Upload
Manuals
Brands
Extreme Networks Manuals
Software
Sentriant AG
Extreme Networks Sentriant AG Manuals
Manuals and User Guides for Extreme Networks Sentriant AG. We have
4
Extreme Networks Sentriant AG manuals available for free PDF download: Software User's Manual, User Manual, Installation Manual
Extreme Networks Sentriant AG Software User's Manual (526 pages)
Version 5.2
Brand:
Extreme Networks
| Category:
Software
| Size: 8.87 MB
Table of Contents
Table of Contents
3
List of Figures
15
List of Tables
21
Chapter 1: Introduction
23
Sentriant AG Home Window
23
System Monitor
24
Figure 1: Sentriant AG Home Window
24
Figure 2: System Monitor Window
25
Sentriant AG V5.2 for V4.X Users
26
Figure 3: System Monitor Window Legend
26
Table 1: Sentriant AG V5.2 for V4.X Users
26
Overview
29
Table 2: Test Methods
29
About Sentriant AG
31
Endpoint Testing
31
NAC Policy Definition
31
Automated and Manual Repair
32
Compliance Enforcement
32
Targeted Reporting
33
The Sentriant AG Process
31
Technical Support
33
Additional Documentation
33
Table 3: Sentriant AG Technical Support
33
Installing and Upgrading
34
Conventions Used in this Document
34
Navigation Paragraph
34
Note Paragraph
34
Caution Paragraph
34
Warning Paragraph
35
Bold Font
35
Task Paragraph
35
Italic Text
35
Courier Font
36
Angled Brackets
36
Square Brackets
36
Terms
37
Copying Files
37
Scp
37
Pscp
37
Users' Guide Online Help
38
Figure 4: Online Help
39
Figure 5: Index Tab
40
Figure 6: Search Tab
41
Chapter 2: Clusters and Servers
43
Single-Server Installation
44
Multiple-Server Installations
44
Figure 7: Single-Server Installation
44
Figure 8: Multiple-Server Installation
45
Figure 9: Multiple-Server, Multiple-Cluster Installation
46
Chapter 3: System Configuration
47
Introduction
47
Table 4: Default Menu Options
47
Enforcement Clusters and Servers
48
Enforcement Clusters
49
Adding an Enforcement Cluster
49
Figure 10: System Configuration, Enforcement Clusters & Servers
49
Figure 11: Add Enforcement Cluster
50
Editing Enforcement Clusters
51
Viewing Enforcement Cluster Status
51
Deleting Enforcement Clusters
52
Figure 12: Enforcement Cluster, General
52
Enforcement Servers
53
Adding an es
53
Figure 13: System Configuration, Enforcement Clusters & Servers
53
Cluster and Server Icons
54
Figure 14: Add Enforcement Server
54
Editing Ess
55
Figure 15: Enforcement Cluster Legend
55
Changing the es Network Settings
56
Figure 16: Enforcement Server
56
Changing the es Date and Time
57
Modifying the es SNMP Settings
58
Modifying the es Root Account Password
58
Viewing es Status
58
Deleting Ess
59
Figure 17: Enforcement Server, Status
59
ES Recovery
60
Management Server
60
Viewing Network Settings
60
Figure 18: System Configuration, Management Server
61
Modifying MS Network Settings
62
Figure 19: Management Server Network Settings
62
Selecting a Proxy Server
63
Setting the Date and Time
63
Automatically Setting the Time
64
Manually Setting the Time
64
Figure 20: Date & Time
64
Selecting the Time Zone
65
Enabling SNMP
65
Modifying the MS Root Account Password
66
Checking for Sentriant AG Upgrades
66
Changing the Sentriant AG Upgrade Timeout
67
User Accounts
67
Adding a User Account
67
Figure 21: System Configuration, User Accounts
68
Figure 22: Add User Account
69
Searching for a User Account
70
Table 5: Default User Roles
70
Sorting the User Account Area
71
Copying a User Account
71
Editing a User Account
72
Figure 23: Copy User Account
72
Deleting a User Account
73
Figure 24: User Account
73
User Roles
74
Adding a User Role
74
Figure 25: System Configuration, User Roles
75
Figure 26: Add User Role
76
Table 6: User Role Permissions
76
Editing User Roles
77
Figure 27: User Role
77
Deleting User Roles
78
Sorting the User Roles Area
78
License
78
Updating Your License Key
78
Test Updates
79
Figure 28: System Configuration, License
79
Figure 29: System Configuration, Test Updates
80
Manually Checking for Test Updates
80
Selecting Test Update Times
81
Viewing Test Update Logs
81
Quarantining, General
82
Figure 30: Test Update Log
82
Figure 31: Test Update Log Window Legend
82
Figure 32: System Configuration, Quarantining
83
Selecting the Quarantine Method
83
Selecting the Access Mode
84
Quarantining, 802.1X
84
Entering Basic 802.1X Settings
85
Authentication Settings
85
Selecting the RADIUS Authentication Method
85
Configuring Windows Domain Settings
86
Figure 33: System Configuration, Windows Domain
87
Configuring Openldap Settings
88
Figure 34: System Configuration, Openldap
89
Adding 802.1X Devices
91
Figure 35: Add 802.1X Device
91
Testing the Connection to a Device
92
Figure 36: Add 802.1X Device, Test Connection Area Option 1
92
Figure 37: Add 802.1X Device, Test Connection Area Option 2
92
Cisco IOS
93
Figure 38: Add Cisco IOS Device
94
Cisco Catos
95
Figure 39: Add Cisco Catos Device
96
Catos User Name in Enable Mode
97
Enterasys
98
Figure 40: Add Enterasys Device
98
Extreme Extremeware
99
Figure 41: Add Extremeware Device
100
Extreme XOS
101
Figure 42: Add Extreme XOS Device
101
Foundry
102
Figure 43: Add Foundry Device
103
HP Procurve Switch
104
Figure 44: Add HP Procurve Device
105
HP Procurve WESM Xl or HP Procurve WESM Zl
107
Figure 45: Add HP Procurve WESM Xl/Zl Device
108
HP Procurve 420 AP or HP Procurve 530 AP
110
Figure 46: Add HP Procurve 420/530 AP Device
110
Nortel
112
Figure 47: Add Nortel Device
112
Other
113
Figure 48: Add Other Device
114
Quarantining, DHCP
115
DHCP Server Configuration
115
Setting DHCP Enforcement
115
Figure 49: System Configuration, Quarantining, DHCP Enforcement
116
Adding a DHCP Quarantine Area
117
Figure 50: Add a Quarantine Area
117
Sorting the DHCP Quarantine Area
119
Editing a DHCP Quarantine Area
119
Figure 51: Quarantine Area
119
Deleting a DHCP Quarantine Area
120
Quarantining, Inline
120
Post-Connect
120
Allowing the Post-Connect Service through the Firewall
120
First Time Selection
121
Setting Sentriant AG Properties
121
Configuring a Post-Connect System
121
Figure 52: Post-Connect Configuration Message
121
Figure 53: System Configuration, Post-Connect
122
Launching Post-Connect Systems
123
Post-Connect in the Endpoint Activity Window
123
Figure 54: Post-Connect Launch Window
123
Adding Post-Connect System Logos and Icons
124
Figure 55: Post-Connect Quarantine Details
124
Maintenance
125
Initiating a New Backup
126
Figure 56: System Configuration, Maintenance
126
Restoring from a Backup
127
Downloading Support Packages
127
Cluster Setting Defaults
127
Figure 57: Backup Successful Message
127
Testing Methods
128
Figure 58: System Configuration, Testing Methods
128
Selecting Test Methods
128
Ordering Test Methods
129
Recommended Test Methods
129
Accessible Services
130
Selecting End-User Options
130
Figure 59: System Configuration, Accessible Services
131
Exceptions
132
Always Granting Access to Endpoints and Domains
132
Table 7: Accessible Services and Endpoints Tips
132
Figure 60: System Configuration, Exceptions
133
Always Quarantine Endpoints and Domains
134
Notifications
134
Enabling Notifications
134
Figure 61: System Configuration, Notifications
135
End-User Screens
136
Specifying an End-User Screen Logo
136
Figure 62: System Configuration, End-User Screens
137
Specifying the End-User Screen Text
137
Specifying the End-User Test Failed Pop-Up Window
138
Agentless Credentials
139
Adding Windows Credentials
139
Figure 63: System Configuration, Agentless Credentials
139
Figure 64: Agentless Credentials, Add Windows Administrator Credentials
140
Testing Windows Credentials
140
Deleting Windows Credentials
141
Editing Windows Credentials
141
Sorting the Windows Credentials Area
142
Logging
142
Setting es Logging Levels
142
Figure 65: System Configuration, Logging Option
143
Setting 802.1X Devices Logging Levels
144
Advanced Settings
144
Setting the Agent Read Timeout
144
Setting the RPC Command Timeout
145
Figure 66: System Configuration, Advanced Option
145
Chapter 4: Endpoint Activity
147
Figure 67: Endpoint Activity, All Endpoints Area
147
Filtering the Endpoint Activity Window
148
Filtering by Access Control or Test Status
148
Figure 68: Endpoint Activity, Menu Options
149
Filtering by Time
149
Figure 69: Timeframe Drop-Down List
150
Figure 70: Display Endpoints Drop-Down
150
Limiting Number of Endpoints Displayed
150
Searching
150
Access Control States
151
Figure 71: Search Criteria
151
Figure 72: Highlighted Fields
151
Endpoint Test Status
152
Figure 73: Endpoint Mouseover Pop-Up Window
153
Enforcement Cluster Access Mode
155
Figure 74: Failed Endpoint
155
Viewing Endpoint Access Status
156
Figure 75: Failed Endpoint Allow All Mode
156
Figure 76: Failed Endpoint Allow All Mode Mouse over
156
Selecting Endpoints to Act on
157
Figure 77: Access Control and Endpoint Test Status
157
Acting on Selected Endpoints
158
Immediately Grant Access to an Endpoint
158
Manually Retest an Endpoint
158
Clearing Temporary Endpoint States
159
Immediately Quarantine an Endpoint
159
Viewing Endpoint Information
160
Figure 78: Endpoint, General Option
160
Figure 79: Endpoint Activity, Endpoint Test Results Option
161
Troubleshooting Quarantined Endpoints
162
Table 8: Troubleshooting Quarantined Endpoints
162
Advertisement
Extreme Networks Sentriant AG Software User's Manual (494 pages)
Brand:
Extreme Networks
| Category:
Software
| Size: 8.22 MB
Table of Contents
Table of Contents
3
List of Figures
15
List of Tables
21
Chapter 1: Introduction
23
Sentriant AG Home Window
23
System Monitor
24
Figure 1: Sentriant AG Home Window
24
Figure 2: System Monitor Window
25
Overview
26
Figure 3: System Monitor Window Legend
26
Table 1: Test Methods
27
About Sentriant AG
28
NAC Policy Definition
28
Endpoint Testing
29
Compliance Enforcement
29
Automated and Manual Repair
30
Targeted Reporting
30
The Sentriant AG Process
28
Technical Support
30
Table 2: Sentriant AG Technical Support
30
Additional Documentation
31
Installing and Upgrading
31
Conventions Used in this Document
31
Navigation Paragraph
31
Note Paragraph
32
Caution Paragraph
32
Warning Paragraph
32
Bold Font
32
Task Paragraph
32
Italic Text
33
Courier Font
33
Angled Brackets
33
Square Brackets
34
Terms
34
Copying Files
34
Scp
35
Pscp
35
Users' Guide Online Help
35
Figure 4: Online Help
36
Figure 5: Index Tab
37
Figure 6: Search Tab
38
Chapter 2: Clusters and Servers
39
Single-Server Installation
40
Multiple-Server Installations
40
Figure 7: Single-Server Installation
40
Figure 8: Multiple-Server Installation
41
Figure 9: Multiple-Server, Multiple-Cluster Installation
42
Chapter 3: System Configuration
43
Introduction
43
Table 3: Default Menu Options
43
Enforcement Clusters and Servers
44
Enforcement Clusters
45
Adding an Enforcement Cluster
45
Figure 10: System Configuration, Enforcement Clusters & Servers
45
Figure 11: Add Enforcement Cluster
46
Editing Enforcement Clusters
47
Viewing Enforcement Cluster Status
47
Deleting Enforcement Clusters
48
Figure 12: Enforcement Cluster, General
48
Enforcement Servers
49
Adding an es
49
Figure 13: System Configuration, Enforcement Clusters & Servers
49
Cluster and Server Icons
50
Figure 14: Add Enforcement Server
50
Editing Ess
51
Figure 15: Enforcement Cluster Legend
51
Changing the es Network Settings
52
Figure 16: Enforcement Server
52
Changing the es Date and Time
53
Modifying the es SNMP Settings
53
Modifying the es Root Account Password
54
Viewing es Status
54
Deleting Ess
55
Figure 17: Enforcement Server, Status
55
ES Recovery
56
Management Server
56
Viewing Network Settings
56
Figure 18: System Configuration, Management Server
57
Modifying MS Network Settings
58
Figure 19: Management Server Network Settings
58
Selecting a Proxy Server
59
Setting the Date and Time
59
Automatically Setting the Time
60
Manually Setting the Time
60
Figure 20: Date & Time
60
Selecting the Time Zone
61
Enabling SNMP
61
Modifying the MS Root Account Password
62
Checking for Sentriant AG Upgrades
62
Changing the Sentriant AG Upgrade Timeout
63
User Accounts
63
Adding a User Account
63
Figure 21: System Configuration, User Accounts
64
Figure 22: Add User Account
65
Searching for a User Account
66
Table 4: Default User Roles
66
Sorting the User Account Area
67
Copying a User Account
67
Figure 23: Copy User Account
67
Editing a User Account
68
Figure 24: User Account
68
Deleting a User Account
69
User Roles
69
Adding a User Role
69
Figure 25: System Configuration, User Roles
70
Figure 26: Add User Role
70
Editing User Roles
71
Table 5: User Role Permissions
71
Deleting User Roles
72
Sorting the User Roles Area
72
Figure 27: User Role
72
License
73
Updating Your License Key
73
Figure 28: System Configuration, License
73
Test Updates
74
Manually Checking for Test Updates
74
Selecting Test Update Times
75
Figure 29: System Configuration, Test Updates
75
Viewing Test Update Logs
76
Figure 30: Test Update Log
76
Figure 31: Test Update Log Window Legend
76
Quarantining, General
77
Selecting the Quarantine Method
77
Figure 32: System Configuration, Quarantining
78
Selecting the Access Mode
79
Quarantining, 802.1X
79
Entering Basic 802.1X Settings
79
Authentication Settings
80
Selecting the RADIUS Authentication Method
80
Configuring Windows Domain Settings
80
Figure 33: System Configuration, Windows Domain
81
Configuring Openldap Settings
82
Figure 34: System Configuration, Openldap
83
Adding 802.1X Devices
85
Figure 35: Add 802.1X Device
85
Testing the Connection to a Device
86
Figure 36: Add 802.1X Device, Test Connection Area Option 1
86
Figure 37: Add 802.1X Device, Test Connection Area Option 2
86
Cisco IOS
87
Figure 38: Add Cisco IOS Device
88
Cisco Catos
89
Figure 39: Add Cisco Catos Device
89
Catos User Name in Enable Mode
91
Enterasys
91
Figure 40: Add Enterasys Device
92
Extremeware
93
Figure 41: Add Extremeware Device
93
Extremexos
94
Figure 42: Add Extremexos Device
95
Foundry
96
Figure 43: Add Foundry Device
96
HP Procurve Switch
97
Figure 44: Add HP Procurve Device
98
HP Procurve WESM Xl or HP Procurve WESM Zl
100
Figure 45: Add HP Procurve WESM Xl/Zl Device
101
HP Procurve 420 AP or HP Procurve 530 AP
102
Figure 46: Add HP Procurve 420/530 AP Device
103
Nortel
104
Figure 47: Add Nortel Device
105
Other
106
Figure 48: Add Other Device
107
Quarantining, DHCP
108
DHCP Server Configuration
108
Setting DHCP Enforcement
108
Adding a DHCP Quarantine Area
109
Figure 49: System Configuration, Quarantining, DHCP Enforcement
109
Figure 50: Add a Quarantine Area
110
Sorting the DHCP Quarantine Area
111
Editing a DHCP Quarantine Area
111
Deleting a DHCP Quarantine Area
112
Quarantining, Inline
112
Figure 51: Quarantine Area
112
Post-Connect
113
Allowing the Post-Connect Service through the Firewall
113
First Time Selection
113
Figure 52: Post-Connect Configuration Message
113
Setting Sentriant AG Properties
114
Configuring a Post-Connect System
114
Figure 53: System Configuration, Post-Connect
115
Launching Post-Connect Systems
116
Post-Connect in the Endpoint Activity Window
116
Figure 54: Post-Connect Launch Window
116
Adding Post-Connect System Logos and Icons
117
Figure 55: Post-Connect Quarantine Details
117
Maintenance
118
Initiating a New Backup
119
Figure 56: System Configuration, Maintenance
119
Restoring from a Backup
120
Downloading Support Packages
120
Figure 57: Backup Successful Message
120
Cluster Setting Defaults
121
Testing Methods
121
Selecting Test Methods
121
Figure 58: System Configuration, Testing Methods
121
Ordering Test Methods
122
Recommended Test Methods
122
Selecting End-User Options
123
Quarantine/Guest Resources
123
Figure 59: System Configuration, Quarantine/Guest Resources Area
124
Table 6: Resource Tips
125
Notifications
126
Enabling Notifications
126
Figure 60: System Configuration, Notifications
127
End-User Screens
128
Specifying an End-User Screen Logo
128
Specifying the End-User Screen Text
129
Figure 61: System Configuration, End-User Screens
129
Specifying the End-User Test Failed Pop-Up Window
130
Agentless Credentials
131
Adding Windows Credentials
131
Figure 62: System Configuration, Agentless Credentials
131
Figure 63: Agentless Credentials, Add Windows Administrator Credentials
132
Testing Windows Credentials
133
Editing Windows Credentials
133
Deleting Windows Credentials
134
Sorting the Windows Credentials Area
134
Logging
134
Setting es Logging Levels
134
Setting 802.1X Devices Logging Levels
135
Figure 64: System Configuration, Logging Option
135
Advanced Settings
136
Setting Timeout Periods
136
Figure 65: System Configuration, Advanced Option
137
Chapter 4: Endpoint Activity
139
Figure 66: Endpoint Activity, Connected Endpoints
139
Finding Endpoints
140
Figure 67: Endpoint Activity, Primary Filtering Options
140
Primary Endpoint Filtering
140
Figure 68: Endpoint Activity, Secondary Filtering Options
141
Secondary Endpoint Filtering
141
Figure 69: Search Criterion Affecting Endpoint Activity Results
143
Figure 70: Display Endpoints Drop-Down
143
Limiting the Number of Endpoints Displayed at One Time
143
Quickly Viewing Endpoint Access Control Status
144
Figure 71: Access Control Status Rollover
145
Figure 72: Endpoint Activity Icon Legend
146
Quickly Viewing Endpoint Test Status
146
Figure 73: Endpoint Test Status Rollover
147
Viewing Detailed Endpoint Information
147
Figure 74: Endpoint, General Information
148
Figure 75: Endpoint, Test Results
149
Temporarily Granting Access to Endpoints
149
Clearing Temporary Access Control for Endpoints
150
Temporarily Quarantining Endpoints
150
Having Endpoints Retested
151
Managing Endpoints
143
Additional Information
151
Extreme Networks Sentriant AG User Manual (422 pages)
Version 5.0
Brand:
Extreme Networks
| Category:
Software
| Size: 9.47 MB
Table of Contents
Table of Contents
3
List of Figures
15
List of Tables
19
Chapter 1: Introduction
21
Sentriant AG Home Window
21
System Monitor
22
Figure 1: Sentriant AG Home Window
22
Figure 2: System Monitor Window
23
Sentriant AG V5.0 for V4.X Users
24
Figure 3: System Monitor Window Legend
24
Table 1: Sentriant AG V5.0 for V4.X Users
24
Overview
27
Table 2: Test Methods
27
About Sentriant AG
29
Endpoint Testing
29
NAC Policy Definition
29
Automated and Manual Repair
30
Compliance Enforcement
30
Targeted Reporting
31
The Sentriant AG Process
29
Technical Support
31
Additional Documentation
31
Table 3: Sentriant AG Technical Support
31
Installing and Upgrading
32
Conventions Used in this Document
32
Navigation Paragraph
32
Note Paragraph
32
Caution Paragraph
33
Warning Paragraph
33
Bold Font
33
Task Paragraph
33
Italic Text
33
Courier Font
34
Angled Brackets
34
Square Brackets
34
Terms
35
Copying Files
35
Scp
35
Pscp
36
Chapter 2: Clusters and Servers
37
Single-Server Installation
38
Figure 4: Single-Server Installation
38
Multiple-Server Installations
39
Figure 5: Multiple-Server Installation
39
Figure 6: Multiple-Server, Multiple-Cluster Installation
40
Chapter 3: System Configuration
43
Introduction
43
Table 4: Default Menu Options
43
Enforcement Clusters and Servers
44
Enforcement Clusters
45
Adding an Enforcement Cluster
45
Figure 7: System Configuration Window, Enforcement Clusters & Servers Area
45
Figure 8: Add Enforcement Cluster Window
46
Editing Enforcement Clusters
47
Viewing Enforcement Cluster Status
48
Figure 9: Enforcement Cluster Window, General Option
48
Deleting Enforcement Clusters
49
Enforcement Servers
50
Adding an es
50
Figure 10: System Configuration Window, Enforcement Clusters & Servers Area
50
Cluster and Server Icons
51
Figure 11: Add Enforcement Server Window
51
Editing Ess
52
Figure 12: Enforcement Cluster Legend
52
Figure 13: Enforcement Server Configuration Window
53
Changing the es Network Settings
54
Changing the es Date and Time
54
Modifying the es Root Account Password
55
Viewing es Status
55
Deleting Ess
56
Figure 14: Enforcement Server Window, Status Option
56
ES Recovery
57
Management Server
57
Viewing Network Settings
57
Figure 15: System Configuration, Management Server Window
57
Modifying MS Network Settings
58
Selecting a Proxy Server
58
Setting the Date and Time
59
Automatically Setting the Time
60
Manually Setting the Time
60
Figure 16: Date & Time Window
60
Selecting the Time Zone
61
Modifying the MS Root Account Password
61
Checking for Sentriant AG Upgrades
62
Changing the Sentriant AG Console Timeout
62
User Accounts
63
Adding a User Account
63
Figure 17: System Configuration, User Accounts
63
Figure 18: Add User Account
64
Searching for a User Account
65
Table 5: Default User Roles
65
Sorting the User Account Area
66
Copying a User Account
66
Figure 19: Copy User Account
66
Editing a User Account
67
Figure 20: User Account
67
Deleting a User Account
68
User Roles
68
Adding a User Role
69
Figure 21: System Configuration Window, User Roles
69
Figure 22: Add User Role Window
70
Table 6: User Role Permissions
70
Editing User Roles
71
Figure 23: User Role Window
71
Deleting User Roles
72
Sorting the User Roles Area
72
License
72
Updating Your License Key
73
Figure 24: System Configuration Window, License
73
Test Updates
74
Manually Checking for Test Updates
74
Figure 25: System Configuration Window, Test Updates
74
Selecting Test Update Times
75
Viewing Test Update Logs
75
Figure 26: Test Update Log Window
75
Figure 27: Test Update Log Window Legend
75
Quarantining
76
Selecting the Quarantine Method
76
Figure 28: System Configuration Window, Quarantining
76
Entering Basic 802.1X Settings
77
Selecting the RADIUS Authentication Method
78
Configuring Windows Domain Settings
79
Figure 29: System Configuration, Windows Domain Window
79
Configuring Openldap Settings
81
Figure 30: System Configuration Window, Openldap
81
Adding 802.1X Devices
83
Figure 31: Add 802.1X Device Window
83
Testing the Connection to a Device
84
Figure 32: Add 802.1X Device, Test Connection Area
84
Cisco IOS
85
Figure 33: Add Cisco IOS Device Window
85
Cisco Catos
87
Figure 34: Add Cisco Catos Device Window
87
Enterasys
89
Figure 35: Add Enterasys Device Window
89
Extreme Extremeware
90
Figure 36: Add Extremeware Device Window
90
Extreme XOS
92
Figure 37: Add Extreme XOS Device Window
92
Foundry
93
Figure 38: Add Foundry Device Window
93
HP Procurve Switch
95
Figure 39: Add HP Procurve Device Window
95
HP Procurve WESM
98
Figure 40: Add HP Procurve WESM Device Window
98
HP Procurve 420 AP or HP Procurve 530 AP
100
Figure 41: Add HP Procurve 420/530 AP Device Window
100
Nortel
102
Figure 42: Add Nortel Device Window
102
Other
104
Figure 43: Add Other Device Window
104
Setting DHCP Enforcement
106
Figure 44: DHCP Enforcement Window
106
Adding a DHCP Quarantine Area
107
Figure 45: Add a Quarantine Area Window
107
Sorting the DHCP Quarantine Area
109
Editing a DHCP Quarantine Area
109
Figure 46: Quarantine Area
109
Deleting a DHCP Quarantine Area
110
Maintenance
110
Initiating a New Backup
111
Figure 47: System Configuration Window, Maintenance
111
Restoring from a Backup
112
Downloading Support Packages
112
Cluster Setting Defaults
112
Figure 48: Backup Successful Message
112
Testing Methods
113
Figure 49: System Configuration Window, Testing Methods
113
Selecting Test Methods
113
Ordering Test Methods
114
Recommended Test Methods
114
Accessible Services
115
Figure 50: System Configuration Window, Accessible Services
115
Selecting End-User Options
115
Table 7: Accessible Services and Endpoints Tips
116
Exceptions
118
Always Granting Access to Endpoints and Domains
118
Figure 51: System Configuration, Exceptions
118
Always Quarantine Endpoints and Domains
119
Notifications
119
Enabling Notifications
120
Figure 52: System Configuration, Notifications
120
End-User Screens
121
Figure 53: System Configuration Window, End-User Screens
122
Specifying an End-User Screen Logo
122
Specifying the End-User Screen Text
123
Specifying the End-User Test Failed Pop-Up Window
123
Agentless Credentials
124
Adding Windows Credentials
125
Figure 54: System Configuration Window, Agentless Credentials
125
Figure 55: Agentless Credentials, Add Windows Administrator Credentials Window
126
Testing Windows Credentials
126
Deleting Windows Credentials
127
Editing Windows Credentials
127
Sorting the Windows Credentials Area
127
Logging
128
Setting es Logging Levels
128
Figure 56: System Configuration Window, Logging Option
128
Setting 802.1X Devices Logging Levels
129
Advanced Settings
130
Setting the Agent Read Timeout
130
Figure 57: System Configuration Window, Advanced Option
130
Setting the RPC Connection Timeout
131
Setting the RPC Command Timeout
131
Chapter 4: Endpoint Activity
133
Figure 58: Endpoint Activity, All Endpoints Area
133
Filtering the Endpoint Activity Window
134
Figure 59: Endpoint Activity, Menu Options
135
Filtering by Access Control or Test Status
135
Figure 60: View Activity for the Last Drop-Down List
136
Figure 61: Display Endpoints Drop-Down
136
Figure 62: Endpoint Activity Page Navigation Links
136
Filtering by Time
136
Limiting Number of Endpoints Displayed
136
Figure 63: Search Criteria Window
137
Searching
137
Access Control States
138
Test Status States
139
Viewing Endpoint Access Status
141
Figure 64: Access Control and Endpoint Test Status
141
Selecting Endpoints to Act on
142
Acting on Selected Endpoints
142
Manually Retest an Endpoint
142
Immediately Grant Access to an Endpoint
143
Immediately Quarantine an Endpoint
143
Clearing Temporary Endpoint States
144
Viewing Endpoint Information
144
Figure 65: Endpoint, General Option
144
Figure 66: Endpoint Activity, Endpoint Test Results Option
145
Chapter 5: End-User Access
147
Endpoints Supported
147
Browser Version
147
Browser Settings
148
Agentless Settings
148
Ports Used for Testing
149
Firewall Settings
149
Figure 67: Local Area Connection Properties Window
149
Allowing the Windows RPC Service through the Firewall
150
Managed Endpoints
150
Unmanaged Endpoints
150
Allowing Sentriant AG through the os X Firewall
153
Figure 68: Mac System Preferences Window
153
Figure 69: Mac Sharing Window
154
End-User Access Windows
155
Figure 70: Mac Ports Window
155
Figure 71: End-User Opening Window
156
Opening Window
156
Windows NAC Agent Test Windows
157
Automatically Installing the Windows Agent
157
Figure 72: End-User Installing Window
157
Figure 73: End-User Agent Installation Failed
158
Figure 74: End-User Agent Installation Window (Start)
159
Figure 75: End-User Agent Installation Window (Finish)
159
Figure 76: Add/Remove Programs
160
Manually Installing the Windows Agent
160
Removing the Agent
160
Figure 77: Security Certificate Window
161
Figure 78: Run or Save to Disk Window
161
How to View the Windows Agent Version Installed
161
Mac os Agent Test Windows
162
Figure 79: Start Mac os Installer Window
162
Installing the MAC os Agent
162
Figure 80: Mac os Installer Window 1 of 5
163
Figure 81: Mac os Installer Window 2 of 5
163
Figure 82: Mac os Installer Window 3 of 5
164
Figure 83: Mac os Installer Window 4 of 5
164
Figure 84: Mac os Installer Window 5 of 5
165
Figure 85: Applications Window, Utilities Folder
166
Verifying the Mac os Agent
166
Figure 86: Activity Monitor Window
167
Figure 87: Mac Terminal Window
168
Removing the Mac os Agent
169
Activex Test Windows
170
Agentless Test Windows
170
Figure 88: End-User Activex Plug-In Failed Window
170
Figure 89: End-User Login Credentials Window
171
Figure 90: End-User Login Failed
172
Figure 91: End-User Testing Window
173
Figure 92: End-User Testing Successful Window
173
Test Successful Window
173
Testing Window
173
Figure 93: Temporary Quarantine Window
174
Temporary Quarantine Window
174
Figure 94: End-User Testing Cancelled Window
175
Figure 95: End-User Testing Failed Window Example 1
175
Figure 96: End-User Testing Failed, Printable Results Window
176
Setting the Temporary Access Period
176
Testing Cancelled Window
175
Testing Failed Window
175
Error Windows
177
Customizing Error Messages
177
Figure 97: End-User Error Window
177
Table 8: Default Test Names and Descriptions
179
Advertisement
Extreme Networks Sentriant AG Installation Manual (80 pages)
Version 5.0
Brand:
Extreme Networks
| Category:
Network Accessory
| Size: 2.81 MB
Table of Contents
Table of Contents
3
List of Figures
5
List of Tables
7
Chapter 1: What You Need to Get Started
9
Chapter 2: Deployment Flexibility
11
Figure 1: Single-Server Installation, Quarantine Method, Inline
11
Figure 2: Multiple-Server Installation, Quarantine Method, Inline
12
Figure 3: Single-Server Installation, Quarantine Method, DHCP, Flat Network
12
Deploying Sentriant AG Inline
13
Figure 4: Multiple-Server Installation, Quarantine Method, DHCP
13
Deploying Sentriant AG Using DHCP
14
Figure 5: Single-Server Installation, DHCP Mode, Simple Example
15
Figure 6: Single-Server Installation, DHCP Mode, Complex Example
16
Deploying Sentriant AG Using 802.1X
17
Figure 7: Single-Server Installation, Endpoint Static Route Enforcement
17
Installing the Network Interface Cards
18
Inline
18
Figure 8: 802.1X Enforcement
18
Dhcp
19
802.1X
19
Figure 9: Single-Server Installation, Ethernet Card Installation, Inline
19
Figure 10: Single-Server Installation, Ethernet Card Installation, DHCP
19
Determining Eth0 and Eth1
20
Figure 11: Single-Server Installation, Ethernet Card Installation, 802.1X
20
Deploying Sentriant AG in VPN Mode on a Different Network
21
Chapter 3: System Requirements
25
General System Requirements
25
Specific System Requirements
27
Operating Systems Supported
28
Enforcement Methods Requirements
29
Chapter 4: Important Browser Settings
31
Pop-Up Windows
31
Active Content
32
Figure 12: Internet Explorer Security Warning Message
32
Figure 13: IE Security Message Options
32
Figure 14: IE Security Warning Pop-Up Window
32
Minimum Font Size
33
Figure 15: IE Internet Options, Advanced Tab
33
Page Caching
34
Temporary Files
35
Chapter 5: Installing Sentriant AG
37
Installing Sentriant AG for the First Time
37
Downloading the New Install ISO Image
37
Creating the Installation CD from the Sentriant AG Download
38
Installing Sentriant AG
39
Locating and Verifying Server Hardware
40
Information Required During Installation
41
Creating a Single-Server Installation
42
Figure 16: Install Screen, Boot Prompt
43
Figure 17: Install Screen, Installation Confirmation
44
Figure 18: Install Screen, Network Configuration for Eth0
45
Figure 19: Install Screen, Miscellaneous Network Settings
45
Figure 20: Install Screen, Hostname Configuration
46
Figure 21: Install Screen, Time Zone Selection
47
Figure 22: Install Screen, Root Password
47
Figure 23: Install Screen, Database Password
48
Figure 24: Install Screen, Installation Type
49
Figure 25: Install Screen, NTP Server Settings
49
Creating a Multiple-Server Installation
50
Figure 26: Install Screen, Installation Progress
50
Figure 27: Install Screen, Installation Type Screen
51
Figure 28: Install Screen, Installation Type
52
Initial Configuration
53
Figure 29: Install Screen, Node Installation Settings
53
Figure 30: Security Alert Window
54
Figure 31: Accept License Agreement Window
54
Figure 32: Enter Management Server Settings Window
55
Figure 33: Enter License Key Window
57
Figure 34: Create Administrator Account Window
57
Figure 35: Sentriant AG Home Window
58
Figure 36: Enforcement Clusters & Servers
59
Figure 37: Add Enforcement Cluster Window
60
Figure 38: Add Enforcement Server Window
61
Upgrading Sentriant AG to a Newer Version
62
Figure 39: System Configuration, Enforcement Clusters & Servers Window
62
Figure 40: System Configuration Window, Management Server Option
63
Upgrading from the Sentriant AG Console
63
Creating an Upgrade CD from the Download
64
Downloading the Upgrade ISO Image
64
Upgrading from a CD
64
Advertisement
Related Products
Extreme Networks Sentriant NG Operation Console
Extreme Networks Summit WM Series
Extreme Networks Summit WMScanner
Extreme Networks Sentriant Series
Extreme Networks SENTRY
Extreme Networks Summit SummitPx1
Extreme Networks Summit Summit5i
Extreme Networks Summit Family
Extreme Networks ExtremeSwitching SLX 9030-48S
Extreme Networks ExtremeSwitching SLX9150-48Y-8C
Extreme Networks Categories
Switch
Wireless Access Point
Software
Network Hardware
Network Router
More Extreme Networks Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL