Sign In
Upload
Manuals
Brands
Extreme Networks Manuals
Network Accessory
Sentriant AG200
Extreme Networks Sentriant AG200 Manuals
Manuals and User Guides for Extreme Networks Sentriant AG200. We have
5
Extreme Networks Sentriant AG200 manuals available for free PDF download: User Manual, Installation Manual, Hardware Installation Manual, Hardware Quick Start Manual
Extreme Networks Sentriant AG200 User Manual (422 pages)
Version 5.0
Brand:
Extreme Networks
| Category:
Software
| Size: 9 MB
Table of Contents
Table of Contents
3
List of Figures
15
List of Tables
19
Chapter 1: Introduction
21
Sentriant AG Home Window
21
System Monitor
22
Figure 1: Sentriant AG Home Window
22
Figure 2: System Monitor Window
23
Sentriant AG V5.0 for V4.X Users
24
Figure 3: System Monitor Window Legend
24
Table 1: Sentriant AG V5.0 for V4.X Users
24
Overview
27
Table 2: Test Methods
27
About Sentriant AG
29
Endpoint Testing
29
NAC Policy Definition
29
Automated and Manual Repair
30
Compliance Enforcement
30
Targeted Reporting
31
The Sentriant AG Process
29
Technical Support
31
Additional Documentation
31
Table 3: Sentriant AG Technical Support
31
Installing and Upgrading
32
Conventions Used in this Document
32
Navigation Paragraph
32
Note Paragraph
32
Caution Paragraph
33
Warning Paragraph
33
Bold Font
33
Task Paragraph
33
Italic Text
33
Courier Font
34
Angled Brackets
34
Square Brackets
34
Terms
35
Copying Files
35
Scp
35
Pscp
36
Chapter 2: Clusters and Servers
37
Single-Server Installation
38
Figure 4: Single-Server Installation
38
Multiple-Server Installations
39
Figure 5: Multiple-Server Installation
39
Figure 6: Multiple-Server, Multiple-Cluster Installation
40
Chapter 3: System Configuration
43
Introduction
43
Table 4: Default Menu Options
43
Enforcement Clusters and Servers
44
Enforcement Clusters
45
Adding an Enforcement Cluster
45
Figure 7: System Configuration Window, Enforcement Clusters & Servers Area
45
Figure 8: Add Enforcement Cluster Window
46
Editing Enforcement Clusters
47
Viewing Enforcement Cluster Status
48
Figure 9: Enforcement Cluster Window, General Option
48
Deleting Enforcement Clusters
49
Enforcement Servers
50
Adding an es
50
Figure 10: System Configuration Window, Enforcement Clusters & Servers Area
50
Cluster and Server Icons
51
Figure 11: Add Enforcement Server Window
51
Editing Ess
52
Figure 12: Enforcement Cluster Legend
52
Figure 13: Enforcement Server Configuration Window
53
Changing the es Network Settings
54
Changing the es Date and Time
54
Modifying the es Root Account Password
55
Viewing es Status
55
Deleting Ess
56
Figure 14: Enforcement Server Window, Status Option
56
ES Recovery
57
Management Server
57
Viewing Network Settings
57
Figure 15: System Configuration, Management Server Window
57
Modifying MS Network Settings
58
Selecting a Proxy Server
58
Setting the Date and Time
59
Automatically Setting the Time
60
Manually Setting the Time
60
Figure 16: Date & Time Window
60
Selecting the Time Zone
61
Modifying the MS Root Account Password
61
Checking for Sentriant AG Upgrades
62
Changing the Sentriant AG Console Timeout
62
User Accounts
63
Adding a User Account
63
Figure 17: System Configuration, User Accounts
63
Figure 18: Add User Account
64
Searching for a User Account
65
Table 5: Default User Roles
65
Sorting the User Account Area
66
Copying a User Account
66
Figure 19: Copy User Account
66
Editing a User Account
67
Figure 20: User Account
67
Deleting a User Account
68
User Roles
68
Adding a User Role
69
Figure 21: System Configuration Window, User Roles
69
Figure 22: Add User Role Window
70
Table 6: User Role Permissions
70
Editing User Roles
71
Figure 23: User Role Window
71
Deleting User Roles
72
Sorting the User Roles Area
72
License
72
Updating Your License Key
73
Figure 24: System Configuration Window, License
73
Test Updates
74
Manually Checking for Test Updates
74
Figure 25: System Configuration Window, Test Updates
74
Selecting Test Update Times
75
Viewing Test Update Logs
75
Figure 26: Test Update Log Window
75
Figure 27: Test Update Log Window Legend
75
Quarantining
76
Selecting the Quarantine Method
76
Figure 28: System Configuration Window, Quarantining
76
Entering Basic 802.1X Settings
77
Selecting the RADIUS Authentication Method
78
Configuring Windows Domain Settings
79
Figure 29: System Configuration, Windows Domain Window
79
Configuring Openldap Settings
81
Figure 30: System Configuration Window, Openldap
81
Adding 802.1X Devices
83
Figure 31: Add 802.1X Device Window
83
Testing the Connection to a Device
84
Figure 32: Add 802.1X Device, Test Connection Area
84
Cisco IOS
85
Figure 33: Add Cisco IOS Device Window
85
Cisco Catos
87
Figure 34: Add Cisco Catos Device Window
87
Enterasys
89
Figure 35: Add Enterasys Device Window
89
Extreme Extremeware
90
Figure 36: Add Extremeware Device Window
90
Extreme XOS
92
Figure 37: Add Extreme XOS Device Window
92
Foundry
93
Figure 38: Add Foundry Device Window
93
HP Procurve Switch
95
Figure 39: Add HP Procurve Device Window
95
HP Procurve WESM
98
Figure 40: Add HP Procurve WESM Device Window
98
HP Procurve 420 AP or HP Procurve 530 AP
100
Figure 41: Add HP Procurve 420/530 AP Device Window
100
Nortel
102
Figure 42: Add Nortel Device Window
102
Other
104
Figure 43: Add Other Device Window
104
Setting DHCP Enforcement
106
Figure 44: DHCP Enforcement Window
106
Adding a DHCP Quarantine Area
107
Figure 45: Add a Quarantine Area Window
107
Sorting the DHCP Quarantine Area
109
Editing a DHCP Quarantine Area
109
Figure 46: Quarantine Area
109
Deleting a DHCP Quarantine Area
110
Maintenance
110
Initiating a New Backup
111
Figure 47: System Configuration Window, Maintenance
111
Restoring from a Backup
112
Downloading Support Packages
112
Cluster Setting Defaults
112
Figure 48: Backup Successful Message
112
Testing Methods
113
Figure 49: System Configuration Window, Testing Methods
113
Selecting Test Methods
113
Ordering Test Methods
114
Recommended Test Methods
114
Accessible Services
115
Figure 50: System Configuration Window, Accessible Services
115
Selecting End-User Options
115
Table 7: Accessible Services and Endpoints Tips
116
Exceptions
118
Always Granting Access to Endpoints and Domains
118
Figure 51: System Configuration, Exceptions
118
Always Quarantine Endpoints and Domains
119
Notifications
119
Enabling Notifications
120
Figure 52: System Configuration, Notifications
120
End-User Screens
121
Figure 53: System Configuration Window, End-User Screens
122
Specifying an End-User Screen Logo
122
Specifying the End-User Screen Text
123
Specifying the End-User Test Failed Pop-Up Window
123
Agentless Credentials
124
Adding Windows Credentials
125
Figure 54: System Configuration Window, Agentless Credentials
125
Figure 55: Agentless Credentials, Add Windows Administrator Credentials Window
126
Testing Windows Credentials
126
Deleting Windows Credentials
127
Editing Windows Credentials
127
Sorting the Windows Credentials Area
127
Logging
128
Setting es Logging Levels
128
Figure 56: System Configuration Window, Logging Option
128
Setting 802.1X Devices Logging Levels
129
Advanced Settings
130
Setting the Agent Read Timeout
130
Figure 57: System Configuration Window, Advanced Option
130
Setting the RPC Connection Timeout
131
Setting the RPC Command Timeout
131
Chapter 4: Endpoint Activity
133
Figure 58: Endpoint Activity, All Endpoints Area
133
Filtering the Endpoint Activity Window
134
Figure 59: Endpoint Activity, Menu Options
135
Filtering by Access Control or Test Status
135
Figure 60: View Activity for the Last Drop-Down List
136
Figure 61: Display Endpoints Drop-Down
136
Figure 62: Endpoint Activity Page Navigation Links
136
Filtering by Time
136
Limiting Number of Endpoints Displayed
136
Figure 63: Search Criteria Window
137
Searching
137
Access Control States
138
Test Status States
139
Viewing Endpoint Access Status
141
Figure 64: Access Control and Endpoint Test Status
141
Selecting Endpoints to Act on
142
Acting on Selected Endpoints
142
Manually Retest an Endpoint
142
Immediately Grant Access to an Endpoint
143
Immediately Quarantine an Endpoint
143
Clearing Temporary Endpoint States
144
Viewing Endpoint Information
144
Figure 65: Endpoint, General Option
144
Figure 66: Endpoint Activity, Endpoint Test Results Option
145
Chapter 5: End-User Access
147
Endpoints Supported
147
Browser Version
147
Browser Settings
148
Agentless Settings
148
Ports Used for Testing
149
Firewall Settings
149
Figure 67: Local Area Connection Properties Window
149
Allowing the Windows RPC Service through the Firewall
150
Managed Endpoints
150
Unmanaged Endpoints
150
Allowing Sentriant AG through the os X Firewall
153
Figure 68: Mac System Preferences Window
153
Figure 69: Mac Sharing Window
154
End-User Access Windows
155
Figure 70: Mac Ports Window
155
Figure 71: End-User Opening Window
156
Opening Window
156
Windows NAC Agent Test Windows
157
Automatically Installing the Windows Agent
157
Figure 72: End-User Installing Window
157
Figure 73: End-User Agent Installation Failed
158
Figure 74: End-User Agent Installation Window (Start)
159
Figure 75: End-User Agent Installation Window (Finish)
159
Figure 76: Add/Remove Programs
160
Manually Installing the Windows Agent
160
Removing the Agent
160
Figure 77: Security Certificate Window
161
Figure 78: Run or Save to Disk Window
161
How to View the Windows Agent Version Installed
161
Mac os Agent Test Windows
162
Figure 79: Start Mac os Installer Window
162
Installing the MAC os Agent
162
Figure 80: Mac os Installer Window 1 of 5
163
Figure 81: Mac os Installer Window 2 of 5
163
Figure 82: Mac os Installer Window 3 of 5
164
Figure 83: Mac os Installer Window 4 of 5
164
Figure 84: Mac os Installer Window 5 of 5
165
Figure 85: Applications Window, Utilities Folder
166
Verifying the Mac os Agent
166
Figure 86: Activity Monitor Window
167
Figure 87: Mac Terminal Window
168
Removing the Mac os Agent
169
Activex Test Windows
170
Agentless Test Windows
170
Figure 88: End-User Activex Plug-In Failed Window
170
Figure 89: End-User Login Credentials Window
171
Figure 90: End-User Login Failed
172
Figure 91: End-User Testing Window
173
Figure 92: End-User Testing Successful Window
173
Test Successful Window
173
Testing Window
173
Figure 93: Temporary Quarantine Window
174
Temporary Quarantine Window
174
Figure 94: End-User Testing Cancelled Window
175
Figure 95: End-User Testing Failed Window Example 1
175
Figure 96: End-User Testing Failed, Printable Results Window
176
Setting the Temporary Access Period
176
Testing Cancelled Window
175
Testing Failed Window
175
Error Windows
177
Customizing Error Messages
177
Figure 97: End-User Error Window
177
Table 8: Default Test Names and Descriptions
179
Chapter 6: NAC Policies
185
Figure 98: NAC Policies Window
185
Standard NAC Policies
186
NAC Policy Group Tasks
186
Add a NAC Policy Group
186
Figure 99: NAC Policies Window Legend
186
Editing a NAC Policy Group
187
Figure 100:Add NAC Policy Group Window
187
Figure 101:Edit NAC Policy Group Window
187
Deleting a NAC Policy Group
188
NAC Policy Tasks
188
Enabling or Disabling an NAC Policy
188
Selecting the Default NAC Policy
188
Creating a New NAC Policy
189
Figure 102:Default NAC Policy
189
Figure 103:Add an NAC Policy, Basic Settings Area
189
Figure 104:Add an NAC Policy, Domains and Endpoints Window
191
Figure 105:Add NAC Policy, Tests Area
192
Copying a NAC Policy
193
Editing a NAC Policy
193
Assigning Endpoints and Domains to a Policy
194
Deleting a NAC Policy
194
Moving a NAC Policy between NAC Policy Groups
194
NAC Policy Hierarchy
195
Setting Connection Time
195
Setting Retest Time
195
Defining Non-Supported os Access Settings
196
Setting Test Properties
196
Selecting Action Taken
197
About Sentriant AG Tests
197
Entering Software Required/Not Allowed
198
Selecting Test Properties
198
Viewing Information about Tests
198
Entering Service Names Required/Not Allowed
199
Entering the Browser Version Number
199
Figure 106:NAC Policy Test Icons
200
Test Icons
200
Chapter 7: Quarantined Networks
201
Endpoint Quarantine Precedence
201
Using Ports in Accessible Services and Endpoints
203
Figure 107:Accessible Services Window
203
Determining Accessible Services Example
204
Figure 108:Clear Temporary Tiles Window
205
Figure 109:Final List of Accessible Services Example
206
Always Granting Access to an Endpoint
210
Figure 110:Exceptions Window
210
Always Quarantining an Endpoint
211
New Users
212
Shared Resources
212
Untestable Endpoints and DHCP Mode
212
Dns/Windows Domain Authentication and Quarantined Endpoints
213
Chapter 8: High Availability and Load Balancing
215
High Availability
215
Figure 111:Inline Installations
216
Figure 112:DHCP Installation
217
Figure 113:802.1X Installation
218
Load Balancing
219
Chapter 9: Inline Quarantine Method
221
Figure 114:Inline Installations
222
Chapter 10: DHCP Quarantine Method
223
Figure 115:DHCP Installation
223
Configuring Sentriant AG for DHCP
224
Configuring the Router Acls
224
Router Configuration
224
Setting up a Quarantine Area
224
Configuring Windows Update Service for XP SP2
225
Chapter 11: 802.1X Quarantine Method
227
About 802.1X
227
Sentriant AG and 802.1X
228
Figure 116:802.1X Components
228
Figure 117:Sentriant AG 802.1X Enforcement
230
Figure 118:802.1X Communications
231
Setting up the 802.1X Components
232
Setting up the RADIUS Server
232
Using the Sentriant AG IAS Plug-In to the Microsoft IAS RADIUS Server
232
Figure 119:Windows Components Wizard Window
233
Configuring the Microsoft IAS RADIUS Server
234
Figure 120:Networking Services Window
234
Figure 121:IAS, Register Server in Active Directory Window
235
Figure 122:IAS, Properties Option
235
Figure 123:IAS, Properties Window
236
Figure 124:IAS, New Client, Name and Address Window
237
Figure 125:IAS, New Client, Additional Information Window
237
Figure 126:IAS, New Remote Access Policy
238
Figure 127:IAS, Remote Access Policy, Access Method
239
Figure 128:IAS, Remote Access Policy, Group Access
239
Figure 129:IAS, Remote Access Policy, Find Group
240
Figure 130:Remote Access Policy, Select Group
240
Figure 131:IAS, Remote Access Policy, Authentication Method
241
Figure 132:Error Message
242
Figure 133:Protected EAP Properties
243
Figure 134:IAP, Remote Access Policy, Properties
243
Figure 135:IAS, Remote Access Policy, Configure
244
Figure 136:IAS, Remote Access Policy, Add Attribute
245
Figure 137:IAS, Remote Access Logging Properties
246
Figure 138:Sentriant AG-To-IAS Connector
247
Figure 139:IAS, Add/Remove Snap-In
248
Figure 140:IAS, Add/Remove Snap-In, Certificates
248
Figure 141:IAS, Import Certificate
249
Figure 142:Active Directory, Properties
255
Figure 143:Active Directory, Store Passwords
255
Figure 144:Active Directory Users and Computers Window
257
Figure 145:Active Directory, User Account Properties
257
Proxying RADIUS Requests to an Existing RADIUS Server Using the Built-In Sentriant AG RADIUS Server
258
Using the Built-In Sentriant AG RADIUS Server for Authentication
261
Enabling Sentriant AG for 802.1X
261
Sentriant AG Console Configuration
261
Setting up the Supplicant
262
Figure 146:Enabling 802.1X in the Console
262
Figure 147:IAS, Windows Client Authentication
263
Setting up the Authenticator
265
Cisco® 2950 IOS
266
Cisco® 4006 Catos
267
Enterasys® Matrix 1H582-25
267
Extreme® Summit 48Si
267
Extremeware
268
Extremexos
269
Foundry® Fastiron® Edge 2402
269
HP Procurve® 420AP
270
HP Procurve® 530AP
271
HP Procurve® 3400/3500/5400
272
Nortel® 5510
272
Chapter 12: API
275
Setting Sentriant AG Properties
276
Figure 148:Sentriant AG API Communication
276
Setting Firewall Rules
277
Sentriant AG Events Generated
277
Examples of Events Generated
278
Java Program and Command for Events
280
Sentriant AG Requests Supported
281
Examples of Requests
281
Java Program and Command for Requests
283
Chapter 13: Reports
285
Table 9: Report Types and Fields
285
Generating Reports
287
Figure 149:Reports Window
287
Viewing Report Details
288
Figure 150:NAC Policy Results Report
288
Figure 151:Report, Test Details Window
289
Printing Reports
290
Saving Reports to a File
290
Converting an HTML Report to a Word Document
290
Chapter 14: System Administration
293
Launching Sentriant AG
293
Launching and Logging into Sentriant AG
293
Logging out of Sentriant AG
293
Important Browser Settings
293
Managing Your Sentriant AG License
293
Entering a New License Key
294
Downloading New Tests
294
System Settings
295
Matching Windows Domain Policies to NAC Policies
295
Setting the Access Mode
296
Naming Your Enforcement Cluster
296
Changing the MS Host Name
296
Changing the es Host Name
296
Resetting Your System
297
Changing Properties
298
Specifying an Email Server for Sending Notifications
298
Windows 2003 Server Settings
299
Entering Networks Using CIDR Format
299
Table 10: CIDR Naming Conventions
299
Database
300
Creating a Backup File
300
Restoring from Backup
300
Figure 152:Restore System Window
300
Restoring the Original Database
301
Generating a Support Package
301
Figure 153:Login Window
301
System Requirements
302
Table 11: Sentriant AG System Requirements
302
Supported Vpns
303
Adding Custom Tests
303
Introduction
303
References
304
Changing the Error Messages in a Test Script
304
Figure 154:Test Script Code
305
Figure 155:Example Installcustomtests Output
307
Creating a Custom Test Class Script from Scratch
309
Figure 156:Testtemplate.py
310
Figure 157:Checkopenports.py Script
314
Basictests API
319
Table 12: Basictests API
319
End-User Access Windows
323
How Sentriant AG Handles Static IP Addresses
325
Managing Passwords
325
Table 13: Sentriant AG Passwords
325
Resetting the Sentriant AG Server Password
326
Changing the Sentriant AG Administrator Password
327
Resetting the Sentriant AG Database Password
327
NTLM 2 Authentication
328
Working with Ranges
328
Creating and Replacing SSL Certificates
330
Creating a New Self-Signed Certificate
330
Using an SSL Certificate from a Known Certificate Authority (CA)
331
Moving an es from One MS to Another
332
Recovering Quickly from a Network Failure
333
Appendix A: Requirements
335
Appendix B: Tests Help
337
Browser Security Policy-Windows
337
Table 14: Browser Vulnerabilities
337
Browser Version
339
Description
339
How Does this Affect Me
339
Test Properties
339
What Do I Need to Do
339
Internet Explorer (IE) Internet Security Zone
339
How Does this Affect Me
340
Internet Explorer (IE) Local Intranet Security Zone
340
Description
340
Test Properties
340
Internet Explorer (IE) Restricted Site Security Zone
341
How Does this Affect Me
341
Description
341
Test Properties
341
Internet Explorer (IE) Trusted Sites Security Zone
342
How Does this Affect Me
342
Description
342
Test Properties
342
IIS Hotfixes
343
Description
343
Test Properties
343
How Does this Affect Me
343
Internet Explorer Hotfixes
343
Operating System—Windows
343
Test Properties
344
How Does this Affect Me
344
MVM Hotfixes
344
Description
344
Service Packs
344
Windows 2000 Hotfixes
345
Test Properties
345
How Does this Affect Me
345
Description
345
Windows Media Player Hotfixes
345
Windows Server 2003 SP1 Hotfixes
346
Test Properties
346
How Does this Affect Me
346
Description
346
Windows Server 2003 SP2 Hotfixes
347
Description
347
Test Properties
347
How Does this Affect Me
347
Windows Server 2003 Hotfixes
347
Windows XP SP2 Hotfixes
348
Description
348
Test Properties
348
How Does this Affect Me
348
Windows XP Hotfixes
348
Windows Automatic Updates
349
How Does this Affect Me
349
Description
349
Test Properties
349
Mac Airport Preference
350
Description
350
Test Properties
350
How Does this Affect Me
350
Mac Airport User Prompt
350
Security Settings—Os X
350
Mac Airport WEP Enabled
351
Description
351
Test Properties
351
How Does this Affect Me
351
Mac Bluetooth
351
Mac Firewall
352
Description
352
Test Properties
352
How Does this Affect Me
352
Mac Internet Sharing
352
How Does this Affect Me
353
What Do I Need to Do
353
Mac Services
353
Description
353
Test Properties
353
Security Settings-Windows
354
Allowed Networks
354
Description
354
How Does this Affect Me
354
MS Excel Macros
354
Test Properties
354
What Do I Need to Do
354
Description
355
How Does this Affect Me
355
MS Outlook Macros
355
Test Properties
355
What Do I Need to Do
355
Description
356
How Does this Affect Me
356
MS Word Macros
356
Test Properties
356
What Do I Need to Do
356
Description
357
How Does this Affect Me
357
Services Not Allowed
357
Test Properties
357
What Do I Need to Do
357
Description
358
How Does this Affect Me
358
Services Required
358
Test Properties
358
What Do I Need to Do
358
Description
359
How Does this Affect Me
359
Test Properties
359
What Do I Need to Do
359
Windows Bridge Network Connection
359
Windows Security Policy
359
Description
360
How Does this Affect Me
360
What Do I Need to Do
360
Windows Startup Registry Entries Allowed
360
How Does this Affect Me
361
Test Properties
361
What Do I Need to Do
361
Software-Windows
362
Anti-Spyware
362
Description
362
How Does this Affect Me
362
Test Properties
362
Anti-Virus
363
Description
363
High-Risk Software
363
How Does this Affect Me
363
Test Properties
363
What Do I Need to Do
363
Description
364
How Does this Affect Me
364
MS Office Version Check
364
P2P
364
Test Properties
364
What Do I Need to Do
364
Description
365
How Does this Affect Me
365
Personal Firewalls
365
Test Properties
365
What Do I Need to Do
365
Description
366
How Does this Affect Me
366
Software Not Allowed
366
Software Required
366
Test Properties
366
What Do I Need to Do
366
Description
367
How Does this Affect Me
367
Test Properties
367
What Do I Need to Do
367
Worms, Viruses, and Trojans
367
Test_Result Table
370
Device Table
371
Sa_Cluster
373
Sa_Node
373
Sa_User
374
Cluster_To_User
374
User_Group
374
User_To_Groups
375
Group_To_Permission
375
Appendix C: Database Design (Data Dictionary)
370
Appendix D: Licenses
377
Extreme Networks, Inc. End-User License Agreement
377
Limitation of Liability
378
Other Licenses
379
Apache License Version 2.0, January 2004
380
Asm 2.2.3
381
Open SSH 3.8P1
382
Postgresql 8.1.8
384
Postgresql Jdbc 8.1-408
385
Xstream 1.2.1
385
Libeay (Open SSL)
385
Junit 4.1 Common Public License - V 1.0
386
Open SSL 0.9.7D
388
The GNU General Public License (GPL) Version 2, June 1991
389
Pullparser 2.1.10
392
Xpp3 1.1.3.4D
392
Jcifs 1.1.6, MM.mysql 2.0.14 and P0F 2.05
393
Jpcap 0.5.1
396
Ojdbc 14.10G
400
Javamail 1.3.1 Sun Microsystems, Inc
402
Jcharts
403
Pyxml 0.8.3 and Xmlproc 0.70 Python License (CNRI Python License)
404
IO-Stty .02 and IO-Tty1.02
404
Concurrent 1.3.4
405
Crypto ++ 5.2.1
406
Appendix E: Glossary
407
Index
413
Advertisement
Extreme Networks Sentriant AG200 Installation Manual (80 pages)
Version 5.0
Brand:
Extreme Networks
| Category:
Network Accessory
| Size: 2 MB
Table of Contents
Table of Contents
3
List of Figures
5
List of Tables
7
Chapter 1: What You Need to Get Started
9
Chapter 2: Deployment Flexibility
11
Figure 1: Single-Server Installation, Quarantine Method, Inline
11
Figure 2: Multiple-Server Installation, Quarantine Method, Inline
12
Figure 3: Single-Server Installation, Quarantine Method, DHCP, Flat Network
12
Deploying Sentriant AG Inline
13
Figure 4: Multiple-Server Installation, Quarantine Method, DHCP
13
Deploying Sentriant AG Using DHCP
14
Figure 5: Single-Server Installation, DHCP Mode, Simple Example
15
Figure 6: Single-Server Installation, DHCP Mode, Complex Example
16
Deploying Sentriant AG Using 802.1X
17
Figure 7: Single-Server Installation, Endpoint Static Route Enforcement
17
Installing the Network Interface Cards
18
Inline
18
Figure 8: 802.1X Enforcement
18
Dhcp
19
802.1X
19
Figure 9: Single-Server Installation, Ethernet Card Installation, Inline
19
Figure 10: Single-Server Installation, Ethernet Card Installation, DHCP
19
Determining Eth0 and Eth1
20
Figure 11: Single-Server Installation, Ethernet Card Installation, 802.1X
20
Deploying Sentriant AG in VPN Mode on a Different Network
21
Chapter 3: System Requirements
25
General System Requirements
25
Specific System Requirements
27
Operating Systems Supported
28
Enforcement Methods Requirements
29
Chapter 4: Important Browser Settings
31
Pop-Up Windows
31
Active Content
32
Figure 12: Internet Explorer Security Warning Message
32
Figure 13: IE Security Message Options
32
Figure 14: IE Security Warning Pop-Up Window
32
Minimum Font Size
33
Figure 15: IE Internet Options, Advanced Tab
33
Page Caching
34
Temporary Files
35
Chapter 5: Installing Sentriant AG
37
Installing Sentriant AG for the First Time
37
Downloading the New Install ISO Image
37
Creating the Installation CD from the Sentriant AG Download
38
Installing Sentriant AG
39
Locating and Verifying Server Hardware
40
Information Required During Installation
41
Creating a Single-Server Installation
42
Figure 16: Install Screen, Boot Prompt
43
Figure 17: Install Screen, Installation Confirmation
44
Figure 18: Install Screen, Network Configuration for Eth0
45
Figure 19: Install Screen, Miscellaneous Network Settings
45
Figure 20: Install Screen, Hostname Configuration
46
Figure 21: Install Screen, Time Zone Selection
47
Figure 22: Install Screen, Root Password
47
Figure 23: Install Screen, Database Password
48
Figure 24: Install Screen, Installation Type
49
Figure 25: Install Screen, NTP Server Settings
49
Creating a Multiple-Server Installation
50
Figure 26: Install Screen, Installation Progress
50
Figure 27: Install Screen, Installation Type Screen
51
Figure 28: Install Screen, Installation Type
52
Initial Configuration
53
Figure 29: Install Screen, Node Installation Settings
53
Figure 30: Security Alert Window
54
Figure 31: Accept License Agreement Window
54
Figure 32: Enter Management Server Settings Window
55
Figure 33: Enter License Key Window
57
Figure 34: Create Administrator Account Window
57
Figure 35: Sentriant AG Home Window
58
Figure 36: Enforcement Clusters & Servers
59
Figure 37: Add Enforcement Cluster Window
60
Figure 38: Add Enforcement Server Window
61
Upgrading Sentriant AG to a Newer Version
62
Figure 39: System Configuration, Enforcement Clusters & Servers Window
62
Figure 40: System Configuration Window, Management Server Option
63
Upgrading from the Sentriant AG Console
63
Creating an Upgrade CD from the Download
64
Downloading the Upgrade ISO Image
64
Upgrading from a CD
64
Chapter 6: Configuring Sentriant AG
67
Appendix A: Installation and Configuration Check List
69
Minimum System Requirements
69
Installation Location
69
Installation Media
70
IP Addresses, Hostname, Logins, and Passwords
70
Single-Server Installation
70
Multiple-Server Installations
70
Management Server
71
Enforcement Server 1
71
Enforcement Server 2
72
Enforcement Server 3
72
Proxy Server
73
Agentless Credentials
73
Quarantine
73
802.1X
74
802.1X Devices
74
Dhcp
75
Accessible Services
76
Notifications
76
Test Exemptions
77
Index
79
Extreme Networks Sentriant AG200 Hardware Installation Manual (40 pages)
Extreme Networks Sentriant Installation Guide
Brand:
Extreme Networks
| Category:
Network Hardware
| Size: 1 MB
Table of Contents
Table of Contents
3
Preface
5
About this Guide
5
Organization of this Guide
5
Conventions
5
Related Publications
6
Chapter 1: About the Sentriant AG200 Appliance
7
Chassis Overview
7
Front Panel Features
7
Back Panel Features
8
LED Operation
8
LCD Panel
9
Chapter 2: Site Preparation and Unpacking
11
Site Requirements for the Sentriant AG Appliance
11
Rack Ventilation Requirements
11
Unpacking the Sentriant AG Appliance
12
Chapter 3: Installing the Sentriant AG200 Appliance
13
Overview
13
Required Tools and Equipment
13
Attaching the Rack-Mount Brackets
13
Installing the Sentriant AG Appliance in a Rack
14
Connecting Power
15
Connecting Cables
15
Chapter 4: Startup and Configuration
17
Connecting to the Console Port
17
Using Console Menus
17
Performing the Initial Setup
18
Configuring Network Settings
18
Setting the Time, Date, and Time Zone
19
Setting the Operation Mode of the Server
22
Initial Configuration
23
Enabling LAN Bypass
26
Appendix A: Safety Information
29
Considerations before Installing
29
Power Safety
29
Maintenance Safety
30
General Safety Precautions
30
Battery Replacement and Disposal
31
Hinweise zur Installation
32
Allgemeine Sicherheitsmaßnahmen
33
Technical Specifications
35
Index
39
Advertisement
Extreme Networks Sentriant AG200 Installation Manual (40 pages)
Extreme Sentriant AG200 Network-Accessory: Installation Guide
Brand:
Extreme Networks
| Category:
Network Accessory
| Size: 0 MB
Table of Contents
Table of Contents
3
Chapter 1: Introduction
5
Target Audience
5
Organization of this Guide
5
Notational Conventions
5
Typographical Conventions
6
Regulatory Compliance Information
6
Safety
6
Emissions
7
Environmental Operating Conditions
9
Power Input Ratings & Power Cord Set
10
Package Dimensions
10
Unit Dimensions
10
Safety Information
10
Sicherheitshinweise
12
Chapter 2: Preparation and Unpacking
15
Site Requirements for the Sentriant
15
Unpacking the Sentriant
15
Verify Contents of the Shipping Container
15
Chapter 3: Installation
17
Sentriant Chassis Architecture
17
Physical Description
17
Front Panel Features
17
LED Status Indicators
18
Back Panel Features
19
Rack Installation
19
Rack Ventilation Requirements
20
Installing Chassis Bracket Hardware
21
Front-Mount Installation in Four-Post Racks
23
MID-Mount Installation in Two-Post Racks
24
Cabling Instructions
25
Power Connections
25
Chapter 4: Start-Up and Initial Configuration
27
Initial Configuration Via the Serial Port
27
Power on and System Boot
27
Installing Sentriant Manager
34
Running Sentriant Manager
34
Log in to Sentriant Manager
34
Using the On-Line Help System
36
Glossary
37
Extreme Networks Sentriant AG200 Hardware Quick Start Manual (2 pages)
Brand:
Extreme Networks
| Category:
Network Hardware
| Size: 0 MB
Table of Contents
Getting Documentation
1
Installing the Appliance
1
Connecting Cables
2
Setting up the Appliance
2
Advertisement
Related Products
Extreme Networks Auto Configuration
Extreme Networks Sentriant Series
Extreme Networks Sentriant AG 5.3
Extreme Networks Sentriant AG 5.2
Extreme Networks AP4621-ROW
Extreme Networks ExtremeWireless AP360e
Extreme Networks AH-ACC-BKT-ASM
Extreme Networks ExtremeWireless AP410i
Extreme Networks ExtremeWireless AP5010
Extreme Networks AP3000
Extreme Networks Categories
Switch
Wireless Access Point
Software
Network Hardware
Network Accessory
More Extreme Networks Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL