Sign In
Upload
Manuals
Brands
Extreme Networks Manuals
Software
Sentriant AG 5.2
Extreme Networks Sentriant AG 5.2 Manuals
Manuals and User Guides for Extreme Networks Sentriant AG 5.2. We have
1
Extreme Networks Sentriant AG 5.2 manual available for free PDF download: Software User's Manual
Extreme Networks Sentriant AG 5.2 Software User's Manual (526 pages)
Version 5.2
Brand:
Extreme Networks
| Category:
Software
| Size: 8.87 MB
Table of Contents
Table of Contents
3
List of Figures
15
List of Tables
21
Chapter 1: Introduction
23
Sentriant AG Home Window
23
System Monitor
24
Figure 1: Sentriant AG Home Window
24
Figure 2: System Monitor Window
25
Sentriant AG V5.2 for V4.X Users
26
Figure 3: System Monitor Window Legend
26
Table 1: Sentriant AG V5.2 for V4.X Users
26
Overview
29
Table 2: Test Methods
29
About Sentriant AG
31
Endpoint Testing
31
NAC Policy Definition
31
Automated and Manual Repair
32
Compliance Enforcement
32
Targeted Reporting
33
The Sentriant AG Process
31
Technical Support
33
Additional Documentation
33
Table 3: Sentriant AG Technical Support
33
Installing and Upgrading
34
Conventions Used in this Document
34
Navigation Paragraph
34
Note Paragraph
34
Caution Paragraph
34
Warning Paragraph
35
Bold Font
35
Task Paragraph
35
Italic Text
35
Courier Font
36
Angled Brackets
36
Square Brackets
36
Terms
37
Copying Files
37
Scp
37
Pscp
37
Users' Guide Online Help
38
Figure 4: Online Help
39
Figure 5: Index Tab
40
Figure 6: Search Tab
41
Chapter 2: Clusters and Servers
43
Single-Server Installation
44
Multiple-Server Installations
44
Figure 7: Single-Server Installation
44
Figure 8: Multiple-Server Installation
45
Figure 9: Multiple-Server, Multiple-Cluster Installation
46
Chapter 3: System Configuration
47
Introduction
47
Table 4: Default Menu Options
47
Enforcement Clusters and Servers
48
Enforcement Clusters
49
Adding an Enforcement Cluster
49
Figure 10: System Configuration, Enforcement Clusters & Servers
49
Figure 11: Add Enforcement Cluster
50
Editing Enforcement Clusters
51
Viewing Enforcement Cluster Status
51
Deleting Enforcement Clusters
52
Figure 12: Enforcement Cluster, General
52
Enforcement Servers
53
Adding an es
53
Figure 13: System Configuration, Enforcement Clusters & Servers
53
Cluster and Server Icons
54
Figure 14: Add Enforcement Server
54
Editing Ess
55
Figure 15: Enforcement Cluster Legend
55
Changing the es Network Settings
56
Figure 16: Enforcement Server
56
Changing the es Date and Time
57
Modifying the es SNMP Settings
58
Modifying the es Root Account Password
58
Viewing es Status
58
Deleting Ess
59
Figure 17: Enforcement Server, Status
59
ES Recovery
60
Management Server
60
Viewing Network Settings
60
Figure 18: System Configuration, Management Server
61
Modifying MS Network Settings
62
Figure 19: Management Server Network Settings
62
Selecting a Proxy Server
63
Setting the Date and Time
63
Automatically Setting the Time
64
Manually Setting the Time
64
Figure 20: Date & Time
64
Selecting the Time Zone
65
Enabling SNMP
65
Modifying the MS Root Account Password
66
Checking for Sentriant AG Upgrades
66
Changing the Sentriant AG Upgrade Timeout
67
User Accounts
67
Adding a User Account
67
Figure 21: System Configuration, User Accounts
68
Figure 22: Add User Account
69
Searching for a User Account
70
Table 5: Default User Roles
70
Sorting the User Account Area
71
Copying a User Account
71
Editing a User Account
72
Figure 23: Copy User Account
72
Deleting a User Account
73
Figure 24: User Account
73
User Roles
74
Adding a User Role
74
Figure 25: System Configuration, User Roles
75
Figure 26: Add User Role
76
Table 6: User Role Permissions
76
Editing User Roles
77
Figure 27: User Role
77
Deleting User Roles
78
Sorting the User Roles Area
78
License
78
Updating Your License Key
78
Test Updates
79
Figure 28: System Configuration, License
79
Figure 29: System Configuration, Test Updates
80
Manually Checking for Test Updates
80
Selecting Test Update Times
81
Viewing Test Update Logs
81
Quarantining, General
82
Figure 30: Test Update Log
82
Figure 31: Test Update Log Window Legend
82
Figure 32: System Configuration, Quarantining
83
Selecting the Quarantine Method
83
Selecting the Access Mode
84
Quarantining, 802.1X
84
Entering Basic 802.1X Settings
85
Authentication Settings
85
Selecting the RADIUS Authentication Method
85
Configuring Windows Domain Settings
86
Figure 33: System Configuration, Windows Domain
87
Configuring Openldap Settings
88
Figure 34: System Configuration, Openldap
89
Adding 802.1X Devices
91
Figure 35: Add 802.1X Device
91
Testing the Connection to a Device
92
Figure 36: Add 802.1X Device, Test Connection Area Option 1
92
Figure 37: Add 802.1X Device, Test Connection Area Option 2
92
Cisco IOS
93
Figure 38: Add Cisco IOS Device
94
Cisco Catos
95
Figure 39: Add Cisco Catos Device
96
Catos User Name in Enable Mode
97
Enterasys
98
Figure 40: Add Enterasys Device
98
Extreme Extremeware
99
Figure 41: Add Extremeware Device
100
Extreme XOS
101
Figure 42: Add Extreme XOS Device
101
Foundry
102
Figure 43: Add Foundry Device
103
HP Procurve Switch
104
Figure 44: Add HP Procurve Device
105
HP Procurve WESM Xl or HP Procurve WESM Zl
107
Figure 45: Add HP Procurve WESM Xl/Zl Device
108
HP Procurve 420 AP or HP Procurve 530 AP
110
Figure 46: Add HP Procurve 420/530 AP Device
110
Nortel
112
Figure 47: Add Nortel Device
112
Other
113
Figure 48: Add Other Device
114
Quarantining, DHCP
115
DHCP Server Configuration
115
Setting DHCP Enforcement
115
Figure 49: System Configuration, Quarantining, DHCP Enforcement
116
Adding a DHCP Quarantine Area
117
Figure 50: Add a Quarantine Area
117
Sorting the DHCP Quarantine Area
119
Editing a DHCP Quarantine Area
119
Figure 51: Quarantine Area
119
Deleting a DHCP Quarantine Area
120
Quarantining, Inline
120
Post-Connect
120
Allowing the Post-Connect Service through the Firewall
120
First Time Selection
121
Setting Sentriant AG Properties
121
Configuring a Post-Connect System
121
Figure 52: Post-Connect Configuration Message
121
Figure 53: System Configuration, Post-Connect
122
Launching Post-Connect Systems
123
Post-Connect in the Endpoint Activity Window
123
Figure 54: Post-Connect Launch Window
123
Adding Post-Connect System Logos and Icons
124
Figure 55: Post-Connect Quarantine Details
124
Maintenance
125
Initiating a New Backup
126
Figure 56: System Configuration, Maintenance
126
Restoring from a Backup
127
Downloading Support Packages
127
Cluster Setting Defaults
127
Figure 57: Backup Successful Message
127
Testing Methods
128
Figure 58: System Configuration, Testing Methods
128
Selecting Test Methods
128
Ordering Test Methods
129
Recommended Test Methods
129
Accessible Services
130
Selecting End-User Options
130
Figure 59: System Configuration, Accessible Services
131
Exceptions
132
Always Granting Access to Endpoints and Domains
132
Table 7: Accessible Services and Endpoints Tips
132
Figure 60: System Configuration, Exceptions
133
Always Quarantine Endpoints and Domains
134
Notifications
134
Enabling Notifications
134
Figure 61: System Configuration, Notifications
135
End-User Screens
136
Specifying an End-User Screen Logo
136
Figure 62: System Configuration, End-User Screens
137
Specifying the End-User Screen Text
137
Specifying the End-User Test Failed Pop-Up Window
138
Agentless Credentials
139
Adding Windows Credentials
139
Figure 63: System Configuration, Agentless Credentials
139
Figure 64: Agentless Credentials, Add Windows Administrator Credentials
140
Testing Windows Credentials
140
Deleting Windows Credentials
141
Editing Windows Credentials
141
Sorting the Windows Credentials Area
142
Logging
142
Setting es Logging Levels
142
Figure 65: System Configuration, Logging Option
143
Setting 802.1X Devices Logging Levels
144
Advanced Settings
144
Setting the Agent Read Timeout
144
Setting the RPC Command Timeout
145
Figure 66: System Configuration, Advanced Option
145
Chapter 4: Endpoint Activity
147
Figure 67: Endpoint Activity, All Endpoints Area
147
Filtering the Endpoint Activity Window
148
Filtering by Access Control or Test Status
148
Figure 68: Endpoint Activity, Menu Options
149
Filtering by Time
149
Figure 69: Timeframe Drop-Down List
150
Figure 70: Display Endpoints Drop-Down
150
Limiting Number of Endpoints Displayed
150
Searching
150
Access Control States
151
Figure 71: Search Criteria
151
Figure 72: Highlighted Fields
151
Endpoint Test Status
152
Figure 73: Endpoint Mouseover Pop-Up Window
153
Enforcement Cluster Access Mode
155
Figure 74: Failed Endpoint
155
Viewing Endpoint Access Status
156
Figure 75: Failed Endpoint Allow All Mode
156
Figure 76: Failed Endpoint Allow All Mode Mouse over
156
Selecting Endpoints to Act on
157
Figure 77: Access Control and Endpoint Test Status
157
Acting on Selected Endpoints
158
Immediately Grant Access to an Endpoint
158
Manually Retest an Endpoint
158
Clearing Temporary Endpoint States
159
Immediately Quarantine an Endpoint
159
Viewing Endpoint Information
160
Figure 78: Endpoint, General Option
160
Figure 79: Endpoint Activity, Endpoint Test Results Option
161
Troubleshooting Quarantined Endpoints
162
Table 8: Troubleshooting Quarantined Endpoints
162
Chapter 5: End-User Access
167
Test Methods Used
167
Agent Callback
167
Endpoints Supported
168
Browser Version
169
Firewall Settings
170
Managed Endpoints
170
Unmanaged Endpoints
170
Making Changes to the Firewall
170
Windows Endpoint Settings
170
IE Internet Security Setting
170
Agent-Based Test Method
171
Ports Used for Testing
171
Windows Vista Settings
171
Agentless Test Method
171
Configuring Windows 2000 Professional for Agentless Testing
171
Configuring Windows XP Professional for Agentless Testing
172
Figure 80: Local Area Connection Properties
172
Configuring Windows Vista for Agentless Testing
173
Figure 81: Local Area Connection Properties
173
Defining the Agentless Group Policy Object
174
Figure 82: Group Policy Management Window
174
Figure 83: New GPO Window
175
Figure 84: Group Policy Object Editor
175
Figure 85: Network Access Window
176
Figure 86: Network Security Window
177
Figure 87: Network Connection Properties Window
178
Figure 88: Remote Procedure Call Properties Window
178
Figure 89: Remote Registry Properties Window
179
Figure 90: Windows Firewall Window
180
Figure 91: Microsoft Peer-To-Peer Window
181
Allowing the Windows RPC Service through the Firewall
182
Figure 92: Double Arrow Icon
182
Ports Used for Testing
182
Activex Test Method
184
Ports Used for Testing
184
Windows Vista Settings
184
Mac os X Endpoint Settings
184
Allowing Sentriant AG through the os X Firewall
184
Figure 93: Mac System Preferences
185
Figure 94: Mac Sharing
186
End-User Access Windows
187
Figure 95: Mac Ports
187
Figure 96: End-User Opening Window
188
Opening Window
188
Windows NAC Agent Test Windows
189
Automatically Installing the Windows Agent
189
Figure 97: End-User Installing Window
189
Figure 98: End-User Agent Installation Failed
190
Figure 100: End-User Agent Installation Window (Finish)
191
Figure 99: End-User Agent Installation Window (Start)
191
Removing the Agent
191
Figure 101: Add/Remove Programs
192
Manually Installing the Windows Agent
192
Figure 102: Security Certificate
193
Figure 103: Run or Save to Disk
193
How to View the Windows Agent Version Installed
193
Mac os Agent Test Windows
194
Figure 104: Start Mac os Installer
194
Installing the MAC os Agent
194
Figure 105: Mac os Installer 1 of 5
195
Figure 106: Mac os Installer 2 of 5
195
Figure 107: Mac os Installer 3 of 5
196
Figure 108: Mac os Installer 4 of 5
196
Figure 109: Mac os Installer 5 of 5
197
Verifying the Mac os Agent
197
Figure 110: Applications, Utilities Folder
198
Figure 111: Activity Monitor
199
Figure 112: Mac Terminal
200
Removing the Mac os Agent
200
Activex Test Windows
201
Figure 113: End-User Activex Plug-In Failed
201
Agentless Test Windows
202
Figure 114: End-User Login Credentials
202
Figure 115: End-User Login Failed
203
Figure 116: End-User Testing
204
Figure 117: End-User Testing Successful
204
Test Successful Window
204
Testing Window
204
Figure 118: End-User Testing Cancelled
205
Testing Cancelled Window
205
Testing Failed Window
205
Figure 119: End-User Testing Failed Example 1
206
Error Windows
207
Customizing Error Messages
207
Figure 120: End-User Testing Failed, Printable Results
207
Figure 121: End-User Error
207
Table 9: Default Test Names and Descriptions
209
Chapter 6: NAC Policies
215
Figure 122: NAC Policies
215
Standard NAC Policies
216
NAC Policy Group Tasks
216
Add a NAC Policy Group
216
Figure 123: NAC Policies Window Legend
216
Editing a NAC Policy Group
217
Figure 124: Add NAC Policy Group
217
Deleting a NAC Policy Group
218
Figure 125: Edit NAC Policy Group
218
NAC Policy Tasks
219
Creating a New NAC Policy
219
Enabling or Disabling an NAC Policy
219
Figure 126: Default NAC Policy
219
Selecting the Default NAC Policy
219
Figure 127: Add a NAC Policy, Basic Settings Area
220
Figure 128: Add a NAC Policy, Domains and Endpoints
222
Figure 129: Add NAC Policy, Tests Area
224
Copying a NAC Policy
225
Editing a NAC Policy
225
Assigning Endpoints and Domains to a Policy
226
Deleting a NAC Policy
226
Moving a NAC Policy between NAC Policy Groups
226
NAC Policy Hierarchy
227
Setting Connection Time
227
Setting Retest Time
227
Defining Non-Supported os Access Settings
228
Selecting Action Taken
228
Setting Test Properties
228
About Sentriant AG Tests
230
Entering Software Required/Not Allowed
230
Selecting Test Properties
230
Viewing Information about Tests
230
Entering Service Names Required/Not Allowed
231
Entering the Browser Version Number
231
Figure 130: NAC Policy Test Icons
232
Test Icons
232
Chapter 7: Quarantined Networks
233
Endpoint Quarantine Precedence
233
Using Ports in Accessible Services and Endpoints
234
Figure 131: System Configuration, Accessible Services
235
Always Granting Access to an Endpoint
236
Figure 132: System Configuration, Exceptions
236
Always Quarantining an Endpoint
237
New Users
237
Shared Resources
238
Untestable Endpoints and DHCP Mode
238
Windows Domain Authentication and Quarantined Endpoints
239
Chapter 8: High Availability and Load Balancing
241
High Availability
241
Figure 133: Inline Installations
242
Figure 134: DHCP Installation
243
Figure 135: 802.1X Installation
244
Load Balancing
245
Chapter 9: Inline Quarantine Method
247
Figure 136: Inline Installations
248
Chapter 10: DHCP Quarantine Method
249
Configuring Sentriant AG for DHCP
250
Figure 137: DHCP Installation
250
Configuring Windows Update Service for XP SP2
251
Router Configuration
251
Configuring the Router Acls
251
Setting up a Quarantine Area
251
Chapter 11: 802.1X Quarantine Method
253
About 802.1X
253
Sentriant AG and 802.1X
254
Figure 138: 802.1X Components
254
Figure 139: Sentriant AG 802.1X Enforcement
256
Figure 140: 802.1X Communications
257
Setting up the 802.1X Components
258
Setting up the RADIUS Server
258
Using the Sentriant AG IAS Plug-In to the Microsoft IAS RADIUS Server
258
Figure 141: Windows Components Wizard
259
Figure 142: Networking Services
259
Configuring the Microsoft IAS RADIUS Server
260
Figure 143: IAS, Register Server in Active Directory
260
Figure 144: IAS, Properties Option
261
Figure 145: IAS, Properties
261
Figure 146: IAS, New Client, Name and Address
262
Figure 147: IAS, New Client, Additional Information
263
Figure 148: IAS, New Remote Access Policy
264
Figure 149: IAS, Remote Access Policy, Access Method
264
Figure 150: IAS, Remote Access Policy, Group Access
265
Figure 151: IAS, Remote Access Policy, Find Group
265
Figure 152: Remote Access Policy, Select Group
266
Figure 153: IAS, Remote Access Policy, Authentication Method
266
Figure 154: Error Message
268
Figure 155: Protected EAP Properties
269
Figure 156: IAP, Remote Access Policy, Properties
270
Figure 157: IAS, Remote Access Policy, Configure
270
Figure 158: IAS, Remote Access Policy, Add Attribute
271
Figure 159: IAS, Remote Access Logging Properties
273
Figure 160: Sentriant AG-To-IAS Connector
274
Figure 161: IAS, Add/Remove Snap-In
275
Figure 162: IAS, Add/Remove Snap-In, Certificates
275
Figure 163: IAS, Import Certificate
276
Figure 164: Active Directory, Properties
278
Figure 165: Active Directory, Store Passwords
278
Figure 166: Active Directory Users and Computers
280
Figure 167: Active Directory, User Account Properties
280
Proxying RADIUS Requests to an Existing RADIUS Server Using the Built-In Sentriant AG RADIUS Server
281
Using the Built-In Sentriant AG RADIUS Server for Authentication
284
Enabling Sentriant AG for 802.1X
284
Sentriant AG User Interface Configuration
284
Setting up the Supplicant
285
Figure 168: Enabling 802.1X in the User Interface
285
Figure 169: Windows XP Pro Local Area Connection, General Tab
286
Windows XP Professional Setup
286
Figure 170: Windows XP Pro Local Area Connection Properties, Authentication Tab
287
Windows XP Home Setup
287
Windows 2000 Professional Setup
288
Figure 171: Windows 2000 Local Area Connection Properties, General Tab
289
Figure 172: Windows 2000 Local Area Connection Properties, Authentication Tab
289
Figure 173: Wired Autoconfig Properties
290
Windows Vista Setup
290
Figure 174: Windows Vista Local Area Connection, Networking Tab
291
Setting up the Authenticator
292
Figure 175: Windows Vista Local Area Connection Properties, Authentication Tab
292
Cisco® 2950 IOS
293
Cisco® 4006 Catos
293
Enterasys® Matrix 1H582-25
294
Extreme® Summit 48Si
294
Extremeware
295
Extremexos
296
Foundry® Fastiron® Edge 2402
296
HP Procurve 420AP
297
HP Procurve 530AP
297
HP Procurve 3400/3500/5400
299
Nortel® 5510
299
Creating Custom Expect Scripts
300
Figure 176: Nortel Initialization Script
300
Figure 177: Nortel Re-Authentication Script
301
Figure 178: Nortel Exit Script
301
Table 10: Expect Script Commands and Parameters
301
Chapter 12: API
305
Overview
305
Setting Sentriant AG Properties
306
Figure 179: Sentriant AG API Communication
306
Setting Firewall Rules
307
Sentriant AG Events Generated
307
Examples of Events Generated
308
Java Program and Command for Events
310
Sentriant AG Requests Supported
310
Examples of Requests
311
Post-Connect Request Example
313
Java Program and Command for Requests
314
Chapter 13: Remote Device Activity Capture
315
Creating a DAC Host
315
Downloading the EXE File
316
Running the Windows Installer
316
Figure 180: the DAC Installshield Wizard Welcome Window
317
Figure 181: RDAC Installer, Setup Type
317
Figure 182: RDAC Installer, Choose Destination Location
318
Figure 183: RDAC Installer, Confirm New Folder
318
Figure 184: RDAC Installer, Select Features
319
Figure 185: RDAC Installer, NIC Selection
319
Figure 186: RDAC Installer, TCP Port Filter Specification
320
Figure 187: RDAC Installer, Enforcement Server Specification
320
Figure 188: RDAC Installer, Ready to Install the Program
321
Figure 189: RDAC Installer, Installshield Wizard Complete
322
Adding Additional Interfaces
323
Figure 190: Example Wrapper.conf File
323
Configuring the MS and es for DAC
324
Adding Additional Ess
324
Starting the Windows Service
325
Viewing Version Information
326
Removing the Software
326
Figure 191: NAC Endpoint Activity Capture Service
326
Figure 192: RDAC Uninstall Complete
327
Sentriant AG to Infoblox Connector
328
Configuring the Infoblox Server
328
Configuring Sentriant AG
328
Chapter 14: Reports
331
Table 11: Report Types and Fields
331
Generating Reports
332
Figure 193: Reports
333
Figure 194: NAC Policy Results Report
334
Viewing Report Details
334
Figure 195: Test Details Report
335
Converting an HTML Report to a Word Document
336
Printing Reports
336
Saving Reports to a File
336
Chapter 15: DHCP Plug-In
339
Figure 196: DHCP Plug-In
339
Installation Overview
340
Table 12: DHCP Plug-In Configuration File Values
341
DHCP Plug-In and the Sentriant AG User Interface
342
Installing the Plug-In
342
Figure 197: System Configuration, Quarantining, DHCP
343
Figure 198: DHCP Plug-In Installshield Wizard Window
344
Figure 199: DHCP Plug-In Customer Information Window
344
Enabling the Plug-In and Adding Servers
345
Figure 200: DHCP Plug-In Ready to Install the Program Window
345
Figure 201: DHCP Plug-In Installshield Wizard Complete Window
345
Figure 202: Add DHCP Plug-In Configuration
346
Figure 203: DHCP Plug-In Server Added Example
347
Figure 204: DHCP Plug-In Legend
347
Viewing DHCP Server Plug-In Status
347
Deleting a DHCP Server Plug-In Configuration
348
Editing DHCP Server Plug-In Configurations
348
Figure 205: DHCP Plug-In Configuration
348
Disabling a DHCP Server Plug-In Configuration
349
Enabling a DHCP Server Plug-In Configuration
349
Chapter 16: System Administration
351
Launching Sentriant AG
351
Launching and Logging into Sentriant AG
351
Logging out of Sentriant AG
351
Important Browser Settings
351
Restarting Sentriant AG System Processes
351
Managing Your Sentriant AG License
352
Entering a New License Key
352
Table 13: Service Stop and Restart Commands
352
Downloading New Tests
353
System Settings
354
Dns/Windows Domain Authentication and Quarantined Endpoints
354
Matching Windows Domain Policies to NAC Policies
355
Setting the Access Mode
355
Naming Your Enforcement Cluster
356
Changing the MS Host Name
356
Changing the es Host Name
356
Changing the MS or es IP Address
356
Resetting Your System
357
Resetting Your Test Data
358
Changing Properties
359
Specifying an Email Server for Sending Notifications
360
Entering Networks Using CIDR Format
360
Table 14: CIDR Naming Conventions
360
Database
361
Creating a Backup File
361
Changing the Backup Timeouts
361
Restoring from Backup
362
Restoring to a New Server
362
Restoring to the same Server
362
Restoring the Original Database
363
Figure 206: Restore System
363
Figure 207: Login
363
Generating a Support Package
364
System Requirements
364
Table 15: Sentriant AG System Requirements
364
Supported Vpns
365
Adding Custom Tests
366
Introduction
366
References
366
Changing the Error Messages in a Test Script
366
Figure 208: Test Script Code
367
Figure 209: Example Installcustomtests Output
369
Creating a Custom Test Class Script from Scratch
370
Figure 210: Testtemplate.py
371
Figure 211: Checkopenports.py Script
374
Basictests API
378
Table 16: Basictests API
379
End-User Access Windows
386
How Sentriant AG Handles Static IP Addresses
387
Managing Passwords
388
Table 17: Sentriant AG Passwords
388
Resetting the Sentriant AG Server Password
389
Changing the Sentriant AG Administrator Password
390
When the Password Is Known
390
When the Password Is Unknown
390
Resetting the Sentriant AG Database Password
390
NTLM 2 Authentication
391
Working with Ranges
391
Creating and Replacing SSL Certificates
393
Creating a New Self-Signed Certificate
393
Using an SSL Certificate from a Known Certificate Authority (CA)
395
Moving an es from One MS to Another
396
Recovering Quickly from a Network Failure
397
VLAN Tagging
398
Iptables Wrapper Script
399
Updating Rules Without an Internet Connection
400
Downloading the Files
400
Updating Rules
401
Supporting Network Management System
401
Enabling ICMP Echo Requests
401
Enable Temporary Ping
401
Enable Persistent Ping
402
Restricting the ICMP Request
402
Changing the Community Name for SNMPD
403
Figure 212: Snmpd.conf Example File
403
SNMP Mibs
404
Chapter 17: Patch Management
407
Flagging a Test to Launch a Patch Manager
407
Figure 213: Initiate a Patch Manager Check Box
407
Selecting the Patch Manager
408
Specifying the Number of Retests
408
Specifying the Retest Frequency
408
SMS Patch Management
409
SMS Concepts
409
Sentriant Ag/Sms/Sentriant AG Process
409
Sentriant AG Setup
410
Learning more about SMS
410
Appendix A: Requirements
411
Appendix B: Configuring the Post-Connect Server
413
Overview
413
Extracting the ZIP File
413
Windows
413
Linux
414
ZIP File Contents
414
Setting up a Post-Connect Host
415
Windows
415
Linux
416
Viewing Logs
418
Testing the Service
418
Windows
418
Linux
418
Configuring Your Sensor
419
Allowing Sentriant AG through the Firewall
419
Appendix C: Tests Help
421
Browser Security Policy-Windows
421
Table 18: Browser Vulnerabilities
421
Browser Version
423
Internet Explorer (IE) Internet Security Zone
423
Internet Explorer (IE) Local Intranet Security Zone
424
Internet Explorer (IE) Restricted Site Security Zone
424
Internet Explorer (IE) Trusted Sites Security Zone
425
Operating System-Windows
426
IIS Hotfixes
426
Internet Explorer Hotfixes
427
Microsoft Office Hotfixes
427
Figure 214: Microsoft Office Hotfixes Critical Updates
427
Microsoft Applications Hotfixes
428
Microsoft Servers Hotfixes
428
Microsoft Tools Hotfixes
428
Service Packs
429
Windows 2000 SP4 Hotfixes
429
Windows 2003 SP1 Hotfixes
429
Windows 2003 SP2 Hotfixes
430
Windows Automatic Updates
430
Windows Media Player Hotfixes
431
Windows Vista™ SP0 Hotfixes
431
Windows XP SP1 Hotfixes
432
Windows XP SP2 Hotfixes
432
Security Settings-OS X
433
Mac Airport WEP Enabled
433
Mac Airport Preference
433
Mac Airport User Prompt
433
Mac Anti-Virus
434
Mac Bluetooth
434
Mac Firewall
434
Mac Internet Sharing
435
Mac Quicktime® Updates
435
Mac Security Updates
436
Mac Services
436
Security Settings-Windows
436
Allowed Networks
437
Microsoft Excel Macros
437
Microsoft Outlook Macros
438
Microsoft Word Macros
438
Services Not Allowed
439
Services Required
440
Windows Bridge Network Connection
441
Windows Wireless Network SSID Connections
441
Windows Security Policy
441
Windows Startup Registry Entries Allowed
442
Wireless Network Connections
443
Software-Windows
444
Anti-Spyware
444
Anti-Virus
444
High-Risk Software
445
Microsoft Office Version Check
445
P2P
445
Personal Firewalls
446
Software Not Allowed
446
Software Required
447
Worms, Viruses, and Trojans
447
Appendix D: Database Design (Data Dictionary)
449
Test_Result Table
450
Device Table
451
Sa_Cluster
453
Sa_Node
453
Sa_User
454
Cluster_To_User
454
User_Group
454
User_To_Groups
455
Group_To_Permission
455
Appendix E: Ports Used in Sentriant AG
457
Table 19: Ports in Sentriant AG
457
Appendix F: MS Disaster Recovery
463
Overview
463
Installation Requirements
463
Installing the Standby MS
463
Ongoing Maintenance
464
Failover Process
464
Appendix G: Licenses
467
Extreme Networks End-User License Agreement
467
Limitation of Liability
468
Other Licenses
469
Apache License Version 2.0, January 2004
470
Asm
471
Open SSH
472
Postgresql
474
Postgresql Jdbc
475
Xstream
475
Libeay (Open SSL)
475
Junit Common Public License - V 1.0
476
Open SSL
478
The GNU General Public License (GPL) Version 2, June 1991
479
Pullparser
482
Xpp3
482
The GNU Lesser General Public License (LGPL) Version 2.1
483
Ojdbc
487
Javamail Sun Microsystems, Inc
489
Jcharts
491
Pyxml Python License (CNRI Python License)
491
IO-Stty and IO-Tty
492
Concurrent
493
Crypto
493
Winpcap
494
Activation
496
Java Optional Package
497
Jsp-Api Package
498
Appendix H: Glossary
503
Index
513
Advertisement
Advertisement
Related Products
Extreme Networks Sentriant AG 5.3
Extreme Networks Sentriant AG
Extreme Networks Sentriant NG Operation Console
Extreme Networks Sentriant AG200
Extreme Networks AP410C
Extreme Networks ExtremeWireless AP410e
Extreme Networks ACC-BKT-AX-BEAM
Extreme Networks ExtremeWireless AP360e-WR
Extreme Networks ExtremeWireless AP360e-CAN
Extreme Networks ExtremeWireless AP360i-FCC
Extreme Networks Categories
Switch
Wireless Access Point
Software
Network Hardware
Network Router
More Extreme Networks Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL