Cisco NAC Profiler UI User Administration

Size: px
Start display at page:

Download "Cisco NAC Profiler UI User Administration"

Transcription

1 CHAPTER 14 Topics in this chapter include: Overview, page 14-1 Managing Cisco NAC Profiler Web User Accounts, page 14-2 Enabling RADIUS Authentication for Cisco NAC Profiler User Accounts, page 14-7 Changing the Cisco NAC Profiler UI Admin Password via the CLI, page 14-8 Overview The Cisco NAC Profiler Server has user accounts both at the individual appliance level (operating system command line), and for the web user interface which is the primary management interface for Cisco NAC Profiler systems. At the appliance level, every Cisco NAC Profiler Server appliance has two system user accounts which can be utilized for managing the appliance at the command line. Those two accounts are the 'root' and 'beacon' user accounts. These accounts are created and passwords assigned as each Cisco NAC Profiler Server appliance is initially started up as described in Chapter 4, Installing and Performing an Initial Configuration immediately after the appliance is powered-on for the first time. The root and beacon system user accounts on each appliance are managed via the appliance command line only which is accessed via a console connection or via SSH. The principal management interface for NAC Profiler systems is the web management interface. Once a NAC Profiler Server appliance has been initially configured as outlined in Chapter 4, Installing and Performing an Initial Configuration, virtually all NAC Profiler system administration and management tasks for the Profiler Server and Collectors can be completed via the web UI. However, it may be necessary from time to time to access the command line of a Profiler Server appliance. The CLI of a Profiler appliance may be accessed either via terminal emulation using the console port, via a keyboard and monitor connected to the appliance (or through a KVM switch), or over the network using SSH. A Cisco NAC Profiler appliance can only be accessed via SSH by the 'beacon' system user. Once an SSH session is established as beacon, the su - command can be used to elevate to the root system user access-level. Both the root and beacon system user accounts can be accessed directly when connecting to the appliance via the console port, or using a keyboard and monitor connected to an appliance by using the passwords assigned at system startup. 14-1

2 Managing Cisco NAC Profiler Web User Accounts Chapter 14 As a NAC Profiler Server or HA-pair is configured as a new system is installed a default web interface user of type Administrator, username ''admin'' is created at system initialization. The password for the web admin user is set during the execution of the startup scripts, and is used to access the web interface of a new NAC Profiler system for the first time. By default the UI password for the admin user is set to profiler but this can be changed during system startup, or changed later as described at the end of this chapter. The Admin user is the most privileged (for example, ''super user'') of the NAC Profiler UI, and as such is the only user that is enabled to manage the NAC Profiler UI user accounts including the optional RADIUS user authentication capability. As outlined inchapter 5, Configuring the Cisco NAC Profiler for the Target Environment, as a new NAC Profiler system is initially configured, it is highly recommended that one or more Operator accounts be created and enabled, and those accounts used for system configuration and operation tasks, reserving use of the Admin user account only for user account administration. Note The admin user account has a non-configurable idle session timeout of 30 minutes. After 30 minutes of inactivity the admin user is automatically logged out of the NAC Profiler UI and must re-enter credentials to continue the session. Also, only one session as admin is permitted from any single IP address. Starting a UI session on a machine that has one established will result in logout from the existing session automatically. By default, authentication of NAC Profiler UI users is performed locally on the Profiler Server appliance serving the UI for the system. As an option, the NAC Profiler system can be configured to use external RADIUS authentication of UI users. Instructions for configuration of this option are provided later in this chapter. Managing Cisco NAC Profiler Web User Accounts The User Accounts portion of the web interface enables the creation and management of the user accounts that allow access to the NAC Profiler system configuration via the web interface as described throughout this guide. The Cisco NAC Profiler web-based GUI has three user account types: Administrator, Analyst and Operator. Administrator is the most privileged user account type, and each NAC Profiler system has one user account of this type, username ''admin'' that is created and assigned an initial password when the NAC Profiler Server appliance or HA-pair is started up. The admin user account provides initial access to the UI, and should be used only for administration of user accounts once the NAC Profiler system is made operational. Operator users have full access to the NAC Profiler system with the exception of adding, deleting, and enabling/disabling UI user accounts. They are able to make NAC Profiler system configuration changes, view the Endpoint Console, and use the NAC Profiler system in Port Provisioning mode when NAC Profiler has been configured with SNMP read-write access to network devices. Note An Operator account should be established as soon as practical after a new system is started up, and used for the majority of NAC Profiler administration and operation via the Cisco NAC Profiler UI. 14-2

3 Chapter 14 Managing Cisco NAC Profiler Web User Accounts Analyst users have read-only access to the NAC Profiler system. They cannot make configuration changes to the NAC Profiler system itself, or use the NAC Profiler system in Port Provisioning mode (for example, cannot change port settings via the Manage view of the Endpoint Console). Analyst users can view all NAC Profiler data, and use the Cisco NAC Profiler Utilities such as advanced search and view endpoint data. To manage NAC Profiler web UI user accounts, you start from the Cisco NAC Profiler main page (Figure 14-1). To manage user accounts, you must be logged into the UI as the admin user, navigate to the Configuration tab, and select the Accounts link from the secondary menu of the Configuration tab. Figure 14-1 Cisco NAC Profiler Main Page Create UI User Accounts of Type Analyst To create a new NAC Profiler web user account of type Analyst, complete the following steps: Step 1 Select the Create Users link in the NAC Profiler Users table. The Add User form is displayed in the resulting page as shown in Figure 14-2, with the analyst user type selected as the default: 14-3

4 Managing Cisco NAC Profiler Web User Accounts Chapter 14 Figure 14-2 Add NAC Profiler Analyst User Form Step 2 Step 3 Enter the desired User Name for the new Analyst user. NAC Profiler UI Usernames must be unique. Enter the desired Password for this username. The following characters cannot be used for UI usernames/passwords throughout the NAC Profiler System: ;`' "()[]{} also newline (\n), carriage return (\r), and null. Step 4 Step 5 Retype selected Password to verify. Choose to enable/disable user upon creation (default is enabled). Create UI User Accounts of Type Operator When the Operator radio button on the Add User form is selected, the Add User form changes slightly as illustrated in Figure 14-3: 14-4

5 Chapter 14 Managing Cisco NAC Profiler Web User Accounts Figure 14-3 Add NAC Profiler Operator User Form Note As a security measure, Operator accounts must be configured with an automatic idle timeout setting of 5, 15 or 30 minutes (default). If the session to the NAC Profiler UI using an Operator account is allowed to go idle for greater than the time specified for the user account the session was established for, the user will be forced to re-authenticate if they try to resume using the session. To add a new Operator user account, complete the form fields as described below. Step 1 Step 2 Enter a unique name for the new Operator user account. Enter a password for this Operator user account. Step 3 Step 4 Step 5 The following characters cannot be used for UI usernames/passwords throughout the NAC Profiler System: ;`' "()[]{} also newline (\n), carriage return (\r), and null. Re-enter the password for this user account to confirm Select the desired idle session timeout value from the drop down menu: 5, 15, or 30 minutes for this Operator user account. Select the desired status (enabled/disabled) for the new Operator user as it is added to the config. View UI User Accounts To view all NAC Profiler UI user accounts and their status (for example, enabled or disabled and the current timeout value for Operator user accounts) currently defined in the system configuration, select the View/Edit Users List link in the table on the NAC Profiler UI Users page. The Table of Users is presented as illustrated by Figure

6 Managing Cisco NAC Profiler Web User Accounts Chapter 14 Figure 14-4 Table of NAC Profiler UI Users Edit UI Interface User Accounts Existing user interface user accounts on the NAC Profiler system can be edited using the UI. Note that all usernames in the Table of Users are hyperlinks. Selecting the red hyperlink username will redirect the interface to the Save User form shown in Figure 14-5 on page The current configuration for the selected username is pre-populated in the form. The only configurable parameter for the admin account is the password, which can be changed from the Save User form. Figure 14-5 Save User Form To change any of the parameters for the selected user account, make the desired changes on the form and select Save User to commit the changes. If no changes to the password are desired, simply leave the password fields blank, make the other changes and save the user. The password for the user account will be left unchanged. If changes to the password for the user account are desired, enter and retype the same password string to change the password for the user. To save changes to a user account, select Save User. To delete a user from the system configuration, select Delete User. 14-6

7 Chapter 14 Enabling RADIUS Authentication for Cisco NAC Profiler User Accounts Enabling RADIUS Authentication for Cisco NAC Profiler User Accounts By default, Cisco NAC Profiler UI user authentication of users for all user account types is provided locally by the NAC Profiler Server. As an option, in some environments it may be desirable to authenticate Operator and Analyst user access leveraging existing enterprise AAA systems. As of version 3.1, the NAC Profiler system can be configured to authenticate users as they establish sessions to the UI utilizing existing RADIUS infrastructures. This provides several advantages in the enterprise environment in terms of centralizing user administration. Configuration of the NAC Profiler system to utilize RADIUS authentication instead of the local capability is straightforward, but assumes proper configuration of the RADIUS server and supporting infrastructure to properly authenticate users requesting access to the NAC Profiler UI. In order for NAC Profiler to utilize RADIUS authentication of UI users, the RADIUS server must be set up to accept RADIUS requests from the NAC Profiler Server (NAC Profiler Server added as a client to the RADIUS sever) using the Password Authentication Protocol (PAP). Users to be authenticated successfully via RADIUS must return one of the following Filter-ID response to a user authentication request from the NAC Profiler Server when authenticating logins to the UI: ''Beacon-Analyst'' or ''Beacon-Operator'' which correspond to the two levels of UI access outlined earlier in the chapter. Note that the attribute values are case-sensitive. For NAC Profiler HA-pairs, the RADIUS server must be configured with RADIUS clients for both nodes of the NAC Profiler HA-pair. This enables either appliance to make UI user authentication requests to the RADIUS system successfully while it is the Primary node and accessible via the UI. The steps to configure the RADIUS UI user authentication capability on the NAC Profiler system are as follows: Step 1 Establish a UI session using the admin user account, then navigate to the Configuration tab, select the Accounts link from the secondary menu, then select Setup RADIUS to display the Setup RADIUS page illustrated in Figure The RADIUS configuration form enables the entry of the required parameters to configure the system to enable RADIUS authentication of UI users as they attempt to initiate sessions. Figure 14-6 Setup RADIUS 14-7

8 Changing the Cisco NAC Profiler UI Admin Password via the CLI Chapter 14 Step 2 Enter the following parameters in the form to enable RADIUS user authenticated access to the NAC Profiler UI: IP Address Enter the IP address of the RADIUS server/service that is to be used for authenticating user access to NAC Profiler UI. Display Shared Secret Check this box to show the RADIUS secret in clear text. Step 3 Shared Secret Enter the shared secret that is used by clients of the RADIUS service NAC Profiler will be utilizing for UI user authentication. Select the Save Settings button to commit the RADIUS authentication parameters to the NAC Profiler configuration. Clear Settings is used to clear these settings, and revert back to local authentication. Select Save Settings to save the RADIUS authentication settings. Note Any local accounts including the admin user, and Operator and Analyst user accounts created through the UI are still active (and authenticated locally), but upon the successful establishment of RADIUS authentication, users in groups configured to return the aforementioned Filter-IDs via RADIUS authentication will be authenticated using this mechanism such that future access to the NAC Profiler UI is administered via RADIUS, and not locally. To revert back to local user authentication for the NAC Profiler UI, navigate to the Setup RADIUS form and select the Clear Settings button. Changing the Cisco NAC Profiler UI Admin Password via the CLI The password for the 'admin' UI user can be changed on a NAC Profiler system from the appliance command line. Follow these steps to change the password: Step 1 Step 2 Log into the NAC Profiler Server command line as the 'beacon' system user. For HA-pairs, use the VIP for the pair to ensure the session is with the Primary node. Issue the following command to change the password for the 'admin' UI user: /usr/beacon/www/bin/useradmin.php -u 1 password new_pass Where new_pass is the desired password for the admin user Step 3 Initiate a session to the NAC Profiler UI and attempt login as the admin user with new password. This procedure can also be used for recovery of the password for the admin UI user, as long as the root system user password for the NAC Profiler Server is known. 14-8

Manage Administrators and Admin Access Policies

Manage Administrators and Admin Access Policies Manage Administrators and Admin Access Policies Role-Based Access Control, on page 1 Cisco ISE Administrators, on page 1 Cisco ISE Administrator Groups, on page 3 Administrative Access to Cisco ISE, on

More information

Configuring RADIUS Clients

Configuring RADIUS Clients CHAPTER 8 This chapter describes the following: Overview Adding RADIUS Clients Editing RADIUS Clients Deleting RADIUS Clients Overview Remote Authentication Dial In User Service (RADIUS) is an AAA (authentication,

More information

Understanding Admin Access and RBAC Policies on ISE

Understanding Admin Access and RBAC Policies on ISE Understanding Admin Access and RBAC Policies on ISE Contents Introduction Prerequisites Requirements Components Used Configure Authentication Settings Configure Admin Groups Configure Admin Users Configure

More information

Using ANM With Virtual Data Centers

Using ANM With Virtual Data Centers APPENDIXB Date: 3/8/10 This appendix describes how to integrate ANM with VMware vcenter Server, which is a third-party product for creating and managing virtual data centers. Using VMware vsphere Client,

More information

Manage Administrators and Admin Access Policies

Manage Administrators and Admin Access Policies Manage Administrators and Admin Access Policies Role-Based Access Control, page 1 Cisco ISE Administrators, page 1 Cisco ISE Administrator Groups, page 3 Administrative Access to Cisco ISE, page 11 Role-Based

More information

Configuring Role-Based Access Control

Configuring Role-Based Access Control Configuring Role-Based Access Control This chapter includes the following sections: Role-Based Access Control, page 1 User Accounts for Cisco UCS Manager, page 1 User Roles, page 3 Privileges, page 4 User

More information

Manage Users. About User Profiles. About User Roles

Manage Users. About User Profiles. About User Roles About User Profiles, page 1 About User Roles, page 1 Create Local Users, page 2 Edit Local Users, page 2 Delete Local Users, page 3 Change Your Own User Password, page 3 Display Role-Based Access Control

More information

AAA and the Local Database

AAA and the Local Database This chapter describes authentication, authorization, and accounting (AAA, pronounced triple A ). AAA is a a set of services for controlling access to computer resources, enforcing policies, assessing

More information

Configure Site Network Settings

Configure Site Network Settings About Global Network Settings, page 1 About Device Credentials, page 2 Configure Global Device Credentials, page 4 Configure IP Address Pools, page 9 Configure Global Network Servers, page 9 Configure

More information

Examples of Cisco APE Scenarios

Examples of Cisco APE Scenarios CHAPTER 5 This chapter describes three example scenarios with which to use Cisco APE: Access to Asynchronous Lines, page 5-1 Cisco IOS Shell, page 5-3 Command Authorization, page 5-5 Note For intructions

More information

Manage Administrators and Admin Access Policies

Manage Administrators and Admin Access Policies Manage Administrators and Admin Access Policies Role-Based Access Control, on page 1 Cisco ISE Administrators, on page 1 Cisco ISE Administrator Groups, on page 3 Administrative Access to Cisco ISE, on

More information

Using the Cisco NCS Command-Line Interface

Using the Cisco NCS Command-Line Interface CHAPTER 2 This chapter provides helpful tips for understanding and configuring the Cisco Prime Network Control System (NCS) from the command-line interface (CLI). The Cisco NCS can be deployed for small,

More information

Configuring TACACS+ About TACACS+

Configuring TACACS+ About TACACS+ This chapter describes how to configure the Terminal Access Controller Access Control System Plus (TACACS+) protocol on Cisco NX-OS devices. This chapter includes the following sections: About TACACS+,

More information

Licensing the Application CHAPTER

Licensing the Application CHAPTER CHAPTER 5 Licensing Application, Configuring E-mail, Cisco.com, Proxy Settings, RCP, SCP Settings, Security, Backup, Authentication Settings and Idle Timeout Settings, Browser and Server Security Mode

More information

NAC: LDAP Integration with ACS Configuration Example

NAC: LDAP Integration with ACS Configuration Example NAC: LDAP Integration with ACS Configuration Example Document ID: 107285 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Configuration Flow Chart Diagram

More information

Administration of Cisco WLC

Administration of Cisco WLC HTTP/HTTPS, SSH/Telnet to Cisco WLC, page 1 HTTP/HTTPS, SSH/Telnet to Cisco WLC Using the Controller GUI A browser-based GUI is built into each controller. It allows up to five users to simultaneously

More information

Managing WCS User Accounts

Managing WCS User Accounts 7 CHAPTER This chapter describes how to configure global email parameters and manage WCS user accounts. It contains these sections: Adding WCS User Accounts, page 7-2 Viewing or Editing User Information,

More information

Read the following information carefully, before you begin an upgrade.

Read the following information carefully, before you begin an upgrade. Read the following information carefully, before you begin an upgrade. Review Supported Upgrade Paths, page 1 Review Time Taken for Upgrade, page 1 Review Available Cisco APIC-EM Ports, page 2 Securing

More information

Managing GSS Devices from the GUI

Managing GSS Devices from the GUI CHAPTER 1 This chapter describes how to configure and manage your Global Site Selector Manager (GSSM) and Global Site Selector (GSS) devices from the primary GSSM graphical user interface. It includes

More information

Role-Based Access Configuration

Role-Based Access Configuration Role-Based Access Control Overview, page 1 User Accounts for Cisco UCS, page 1 User Roles, page 3 Locales, page 9 Locally Authenticated User Accounts, page 11 Monitoring User Sessions, page 19 Role-Based

More information

Configuring Local Authentication and Authorization

Configuring Local Authentication and Authorization Configuring Local Authentication and Authorization Finding Feature Information, page 1 How to Configure Local Authentication and Authorization, page 1 Monitoring Local Authentication and Authorization,

More information

Administration of Cisco WLC

Administration of Cisco WLC Using the Controller Interface, on page 1 Enabling Web and Secure Web Modes, on page 6 Telnet and Secure Shell Sessions, on page 8 Management over Wireless, on page 13 Configuring Management using Dynamic

More information

Managing NCS User Accounts

Managing NCS User Accounts 7 CHAPTER The Administration enables you to schedule tasks, administer accounts, and configure local and external authentication and authorization. Also, set logging options, configure mail servers, and

More information

Firepower extensible Operating System (FXOS) 2.2: Chassis Authentication and Authorization for remote management with ACS using RADIUS

Firepower extensible Operating System (FXOS) 2.2: Chassis Authentication and Authorization for remote management with ACS using RADIUS Firepower extensible Operating System (FXOS) 2.2: Chassis Authentication and Authorization for remote management with ACS using RADIUS Contents Introduction Prerequisites Requirements Components Used Configure

More information

Managing WCS User Accounts

Managing WCS User Accounts CHAPTER 7 This chapter describes how to configure global e-mail parameters and manage WCS user accounts. It contains these sections: Adding WCS User Accounts, page 7-1 Viewing or Editing User Information,

More information

Configure Cisco NAC Profiler Events

Configure Cisco NAC Profiler Events CHAPTER 12 Topics in this chapter include: Overview, page 12-1 Cisco NAC Profiler Endpoint Event Types, page 12-3 Create Cisco NAC Profiler Events, page 12-6 Configuring Cisco NAC Profiler Event Delivery

More information

IVE Quick Startup Guide - OS 4.0

IVE Quick Startup Guide - OS 4.0 IVE Quick Startup Guide - OS 4.0 Initial Setup Once you receive the IVE device, unpack the IVE and connect it to a PC or Laptop using the console (null modem) cable provided with the IVE. You have to connect

More information

Configure 802.1x Authentication with PEAP, ISE 2.1 and WLC 8.3

Configure 802.1x Authentication with PEAP, ISE 2.1 and WLC 8.3 Configure 802.1x Authentication with PEAP, ISE 2.1 and WLC 8.3 Contents Introduction Prerequisites Requirements Components Used Configure Network Diagram Configuration Declare RADIUS Server on WLC Create

More information

ForeScout CounterACT. Configuration Guide. Version 4.1

ForeScout CounterACT. Configuration Guide. Version 4.1 ForeScout CounterACT Network Module: VPN Concentrator Plugin Version 4.1 Table of Contents About the VPN Concentrator Plugin... 3 What to Do... 3 Requirements... 3 CounterACT Requirements... 3 Supported

More information

Overview. ACE Appliance Device Manager Overview CHAPTER

Overview. ACE Appliance Device Manager Overview CHAPTER 1 CHAPTER This section contains the following: ACE Appliance Device Manager, page 1-1 Logging Into ACE Appliance Device Manager, page 1-3 Changing Your Account Password, page 1-4 ACE Appliance Device Manager

More information

Wireless LAN Controller Web Authentication Configuration Example

Wireless LAN Controller Web Authentication Configuration Example Wireless LAN Controller Web Authentication Configuration Example Document ID: 69340 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Web Authentication Process

More information

Managing GSS User Accounts Through a TACACS+ Server

Managing GSS User Accounts Through a TACACS+ Server 4 CHAPTER Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System

More information

ISE 2.3+ TACACS+ IPv6 Configuration Guide for Cisco IOS Based Network Devices with new Policy UI. Secure Access How-to User Series

ISE 2.3+ TACACS+ IPv6 Configuration Guide for Cisco IOS Based Network Devices with new Policy UI. Secure Access How-to User Series ISE 2.3+ TACACS+ IPv6 Configuration Guide for Cisco IOS Based Network Devices with new Policy UI Secure Access How-to User Series Author: Krishnan Thiruvengadam Technical Marketing, Policy and Access,,

More information

Logging into the Firepower System

Logging into the Firepower System The following topics describe how to log into the Firepower System: Firepower System User Accounts, on page 1 User Interfaces in Firepower Management Center Deployments, on page 3 Logging Into the Firepower

More information

Managing GSS User Accounts Through a TACACS+ Server

Managing GSS User Accounts Through a TACACS+ Server CHAPTER 4 Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System

More information

Forescout. Configuration Guide. Version 4.2

Forescout. Configuration Guide. Version 4.2 Forescout Version 4.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Managing WCS User Accounts

Managing WCS User Accounts CHAPTER 7 This chapter describes how to manage WCS user accounts. It contains these sections: Adding WCS User Accounts, page 7-2 Changing Passwords, page 7-3 Deleting WCS User Accounts, page 7-3 Creating

More information

Managing GSS User Accounts Through a TACACS+ Server

Managing GSS User Accounts Through a TACACS+ Server CHAPTER 4 Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System

More information

Two factor authentication for Check Point appliances

Two factor authentication for Check Point appliances Two factor authentication for Check Point appliances logintc.com/docs/connectors/check-point.html The LoginTC RADIUS Connector is a complete two-factor authentication virtual machine packaged to run within

More information

Configuring Role-Based Access Control

Configuring Role-Based Access Control 5 CHAPTER This chapter describes how to configure role-based access control (RBAC) on the Cisco 4700 Series Application Control Engine (ACE) appliance. It describes how to create a domain and a user, and

More information

NETCONF Client GUI. Client Application Files APPENDIX

NETCONF Client GUI. Client Application Files APPENDIX APPENDIX B The NETCONF client is a simple GUI client application that can be used to understand the implementation of the NETCONF protocol in Cisco E-DI. This appendix includes the following information:

More information

Configuring Local Authentication

Configuring Local Authentication This chapter describes local authentication. This chapter also describes procedures to configure local authentication and privilege levels. This chapter includes the following topics: Understanding Authentication,

More information

Using Cisco IOS XE Software

Using Cisco IOS XE Software This chapter describes the basics of using the Cisco IOS XE software and includes the following section: Accessing the CLI Using a Router Console, on page 1 Accessing the CLI Using a Router Console Before

More information

Deployment Guide for Cisco Guest Access Using the Cisco Wireless LAN Controller, Release 4.1

Deployment Guide for Cisco Guest Access Using the Cisco Wireless LAN Controller, Release 4.1 Deployment Guide for Cisco Guest Access Using the Cisco Wireless LAN Controller, Release 4.1 Last revised: February 1, 2008 Contents Overview section on page 1 Configuring Guest Access on the Cisco Wireless

More information

Barracuda SSL VPN Integration

Barracuda SSL VPN Integration Barracuda SSL VPN Integration Contents 1 Introduction 2 Prerequisites 3 Baseline 4 Architecture 5 Swivel Configuration 5.1 Configuring the RADIUS server 5.2 Enabling Session creation with username 6 Barracuda

More information

PT Activity: Configure AAA Authentication on Cisco Routers

PT Activity: Configure AAA Authentication on Cisco Routers PT Activity: Configure AAA Authentication on Cisco Routers Instructor Version Topology Diagram Addressing Table Device Interface IP Address Subnet Mask R1 Fa0/0 192.168.1.1 255.255.255.0 S0/0/0 10.1.1.2

More information

Integration Guide. LoginTC

Integration Guide. LoginTC Integration Guide LoginTC Revised: 21 November 2016 About This Guide Guide Type Documented Integration WatchGuard or a Technology Partner has provided documentation demonstrating integration. Guide Details

More information

Configuring Role-Based Access Control

Configuring Role-Based Access Control Configuring Role-Based Access Control This chapter includes the following sections: Role-Based Access Control, page 1 User Accounts for Cisco UCS Manager, page 1 User Roles, page 4 User Locales, page 7

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Adding a New Routing Device to Your Network Modified: 2017-01-17 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

Using the Cisco NAC Profiler Endpoint Console

Using the Cisco NAC Profiler Endpoint Console CHAPTER 15 Topics in this chapter include: Overview, page 15-1 Display Endpoints by Profile, page 15-4 Display Endpoints by Device Port, page 15-9 Unauthorized Endpoints, page 15-12 Endpoint Directory

More information

Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller

Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table

More information

Platform Settings for Classic Devices

Platform Settings for Classic Devices The following topics explain Firepower platform settings and how to configure them on Classic devices: Introduction to Firepower Platform Settings, page 1 Configuring Firepower Platform Settings, page

More information

Configuring the CSS for Device Management

Configuring the CSS for Device Management CHAPTER 2 Configuring the CSS for Device Management Before you can use the WebNS Device Management user interface software, you need to perform the tasks described in the following sections: WebNS Device

More information

Please review the Infoblox CCS Scripting Guide for more information on the above optional statements

Please review the Infoblox CCS Scripting Guide for more information on the above optional statements Overview Network engineers are always looking for ways to automate the tasks of maintaining network devices. Logging into network devices to make changes or to upgrade software is tedious, time consuming,

More information

ISE Express Installation Guide. Secure Access How -To Guides Series

ISE Express Installation Guide. Secure Access How -To Guides Series ISE Express Installation Guide Secure Access How -To Guides Series Author: Jason Kunst Date: September 10, 2015 Table of Contents About this Guide... 4 How do I get support?... 4 Using this guide... 4

More information

Two factor authentication for SonicWALL SRA Secure Remote Access

Two factor authentication for SonicWALL SRA Secure Remote Access Two factor authentication for SonicWALL SRA Secure Remote Access logintc.com/docs/connectors/sonicwall-sra.html The LoginTC RADIUS Connector is a complete two-factor authentication virtual machine packaged

More information

Installing or Upgrading ANM Virtual Appliance

Installing or Upgrading ANM Virtual Appliance CHAPTER 2 This chapter describes how to deploy Cisco ANM Virtual Appliance 4.3 (new installation) and how to upgrade from ANM software version 4.1 or 4.2 to software version 4.3. This chapter includes

More information

Bring-up the Router. Boot the Router

Bring-up the Router. Boot the Router After installing the hardware, boot the router. Connect to the XR LXC console port and power on the router. The router completes the boot process using the pre-installed operating system (OS) image. If

More information

Stealthwatch System Version 6.10.x to Update Guide

Stealthwatch System Version 6.10.x to Update Guide Stealthwatch System Version 6.10.x to 6.10.5 Update Guide Use this guide to update the following Stealthwatch appliances from v6.10.x to v6.10.5: UDP Director (also known as FlowReplicator) Endpoint Concentrator

More information

Overview of the Cisco NCS Command-Line Interface

Overview of the Cisco NCS Command-Line Interface CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,

More information

Two factor authentication for F5 BIG-IP APM

Two factor authentication for F5 BIG-IP APM Two factor authentication for F5 BIG-IP APM logintc.com/docs/connectors/f5.html The LoginTC RADIUS Connector is a complete two-factor authentication virtual machine packaged to run within your corporate

More information

Installing the Clean Access Manager and Clean Access Server

Installing the Clean Access Manager and Clean Access Server 3 CHAPTER Installing the Clean Access Manager and Clean Access Server This chapter covers the following topics: Overview, page 3-1 Installing the Clean Access Manager, page 3-2 Installing the Clean Access

More information

Managing Users and Configuring Role-Based Access Control

Managing Users and Configuring Role-Based Access Control Managing s and Configuring Role-Based Access Control This section describes how to manage users in Prime Central, including defining users and passwords and configuring role-based access control (RBAC).

More information

Two factor authentication for Cisco ASA IPSec VPN Alternative

Two factor authentication for Cisco ASA IPSec VPN Alternative Two factor authentication for Cisco ASA IPSec VPN Alternative logintc.com/docs/connectors/cisco-asa-ipsec-alt.html The LoginTC RADIUS Connector is a complete two-factor authentication virtual machine packaged

More information

Best Practices: Server Security Hardening

Best Practices: Server Security Hardening The following sections explain how to enhance server security by eliminating or controlling individual points of security exposure. Disable Insecure Services, on page 1 Disable Root Access, on page 1 Use

More information

Stonesoft Integration

Stonesoft Integration Stonesoft Integration Contents 1 Introduction 2 Prerequisites 3 Baseline 4 Architecture 5 Swivel Configuration 5.1 Configuring the RADIUS server 5.2 Setting up the RADIUS NAS 5.3 Enabling Session creation

More information

Message Networking 5.2 Administration print guide

Message Networking 5.2 Administration print guide Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do

More information

Control Device Administration Using TACACS+

Control Device Administration Using TACACS+ Device Administration, page 1 Device Administration Work Center, page 3 Data Migration from Cisco Secure ACS to Cisco ISE, page 3 Device Administration Deployment Settings, page 3 Device Admin Policy Sets,

More information

PxM Proof of Concept Configuration. June 2018 Version 3.1

PxM Proof of Concept Configuration. June 2018 Version 3.1 PxM Proof of Concept Configuration June 2018 Version 3.1 Table of Contents PxM Architecture, Installation & Configuration... 3 PxM Proof of Concept (POC) Guide... 4 Introduction... 4 Prerequisites... 4

More information

Configure Cisco DNA Center System Settings

Configure Cisco DNA Center System Settings About DNA Center and Cisco ISE Integration, page 1 Configure Authentication and Policy Servers, page 2 Device Controllability, page 3 Configure Device Controllability, page 4 Configure an IP Address Manager,

More information

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet Interfaces. 2016 Cisco and/or its affiliates. All

More information

UCS Manager Communication Services

UCS Manager Communication Services Communication Protocols, page 1 Communication Services, page 1 Non-Secure Communication Services, page 3 Secure Communication Services, page 5 Network-Related Communication Services, page 12 Communication

More information

Control Device Administration Using TACACS+

Control Device Administration Using TACACS+ Device Administration, page 1 Device Administration Work Center, page 3 Data Migration from Cisco Secure ACS to Cisco ISE, page 3 Device Administration Deployment Settings, page 3 Device Admin Policy Sets,

More information

Configuring Administrative Operations

Configuring Administrative Operations Configuring Administrative Operations This section includes the following topics: Administrative Operation Conventions, page 1 Configuring Backup Operations, page 1 Restoring a Backup Configuration, page

More information

Enterprise Manager/Appliance Communication

Enterprise Manager/Appliance Communication Version 1.1 Table of Contents About this Document... 3 Enterprise Manager/Appliance Communication Overview... 3 Authentication... 3 Sessions Life Cycle... 4 Information and Requests Sent from the Enterprise

More information

Identity Services Engine Guest Portal Local Web Authentication Configuration Example

Identity Services Engine Guest Portal Local Web Authentication Configuration Example Identity Services Engine Guest Portal Local Web Authentication Configuration Example Document ID: 116217 Contributed by Marcin Latosiewicz, Cisco TAC Engineer. Jun 21, 2013 Contents Introduction Prerequisites

More information

VMware View (Horizon)

VMware View (Horizon) VMware View (Horizon) Contents 1 Introduction 2 Credits 3 Prerequisites 4 Baseline 5 Architecture 6 Swivel Configuration 6.1 Configuring the RADIUS server 6.2 Setting up the RADIUS NAS 6.3 Enabling Session

More information

Configuring Authentication, Authorization, and Accounting

Configuring Authentication, Authorization, and Accounting Configuring Authentication, Authorization, and Accounting This chapter contains the following sections: Information About AAA, page 1 Prerequisites for Remote AAA, page 5 Guidelines and Limitations for

More information

ExtraHop Command-line Reference

ExtraHop Command-line Reference ExtraHop Command-line Reference Published: 2018-12-15 You can manage many administrative tasks on your ExtraHop system through a command-line interface (CLI). You will typically manage your ExtraHop appliance

More information

External Authentication with Checkpoint R77.20 Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Checkpoint R77.20 Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Checkpoint R77.20 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale

More information

Configuring TACACS+ Information About TACACS+ Send document comments to CHAPTER

Configuring TACACS+ Information About TACACS+ Send document comments to CHAPTER 4 CHAPTER This chapter describes how to configure the Terminal Access Controller Access Control System Plus (TACACS+) protocol on NX-OS devices. This chapter includes the following sections: Information

More information

Configuring Authentication for Access Points

Configuring Authentication for Access Points Finding Feature Information, page 1 Prerequisites for, page 1 Restrictions for, page 2 Information about, page 2 How to Configure Authentication for Access Points, page 3 Configuration Examples for, page

More information

Lab AAA Authorization and Accounting

Lab AAA Authorization and Accounting Lab 11.3.2 AAA Authorization and Accounting Objective Scenario Step 1 In this lab, the student will use the exec-timeout command to control the amount of time before an idle telnet or console session is

More information

Cisco Exam Questions & Answers

Cisco Exam Questions & Answers Cisco 300-208 Exam Questions & Answers Number: 300-208 Passing Score: 800 Time Limit: 120 min File Version: 38.4 http://www.gratisexam.com/ Exam Code: 300-208 Exam Name: Implementing Cisco Secure Access

More information

Installing CMX 10.5 on Cisco MSE 3375

Installing CMX 10.5 on Cisco MSE 3375 Installing CMX 10.5 on Cisco MSE 3375 Contents Introduction Prerequisites Requirements Components Used Installation CIMC configuration and KVM launch CMX image installation CMX initial setup CMX node installation

More information

TACACS Device Access Control with Cisco Active Network Abstraction

TACACS Device Access Control with Cisco Active Network Abstraction TACACS Device Access Control with Cisco Active Network Abstraction Executive Summary Cisco Active Network Abstraction (ANA) is an extensible and scalable product suite that resides between the network

More information

FortiNAC Motorola Wireless Controllers Integration

FortiNAC Motorola Wireless Controllers Integration FortiNAC Motorola Wireless Controllers Integration Version: 8.x Date: 8/29/2018 Rev: B FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET KNOWLEDGE

More information

Bomgar PA Integration with ServiceNow

Bomgar PA Integration with ServiceNow Bomgar PA Integration with ServiceNow 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of

More information

User and System Administration

User and System Administration CHAPTER 2 This chapter provides information about performing user and system administration tasks and generating diagnostic information for obtaining technical assistance. The top-level Admin window displays

More information

Setting Up Physical Inventory

Setting Up Physical Inventory CHAPTER 4 Devices Every network element that Cisco Prime Fulfillment manages must be defined as a device in the system. An element is any device from which Prime Fulfillment can collect information. In

More information

ForeScout CounterACT. Configuration Guide. Version 1.8

ForeScout CounterACT. Configuration Guide. Version 1.8 ForeScout CounterACT Network Module: Wireless Plugin Version 1.8 Table of Contents About the Wireless Plugin... 4 Wireless Network Access Device Terminology... 6 How It Works... 6 About WLAN Controller/Lightweight

More information

Cisco Stealthwatch. Update Guide 7.0

Cisco Stealthwatch. Update Guide 7.0 Cisco Stealthwatch Update Guide 7.0 Table of Contents Introduction 5 Overview 5 Audience 5 Terminology 5 New Update Process 6 Before You Begin 7 Software Version 7 Java 7 TLS 7 Default Credentials 8 Third

More information

Setting Up the Server

Setting Up the Server Managing Licenses, page 1 Cross-launch from Prime Collaboration Provisioning, page 5 Integrating Prime Collaboration Servers, page 6 Single Sign-On for Prime Collaboration, page 7 Changing the SSL Port,

More information

Configuring SME Cluster Management

Configuring SME Cluster Management CHAPTER 4 DCNM-SAN provides a web browser interface that displays real-time views of your network fabrics and lets you configure the SME with easy-to-use wizards. This chapter contains information about

More information

Configuring Security Features on an External AAA Server

Configuring Security Features on an External AAA Server CHAPTER 3 Configuring Security Features on an External AAA Server The authentication, authorization, and accounting (AAA) feature verifies the identity of, grants access to, and tracks the actions of users

More information

Configuring Client Profiling

Configuring Client Profiling Prerequisites for, page 1 Restrictions for, page 2 Information About Client Profiling, page 2, page 3 Configuring Custom HTTP Port for Profiling, page 4 Prerequisites for By default, client profiling will

More information

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM

Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM Chapter 10 Configure Clientless Remote Access SSL VPNs Using ASDM This lab has been updated for use on NETLAB+ Topology Note: ISR G1 devices use FastEthernet interfaces instead of GigabitEthernet Interfaces.

More information

Xcalenets Console Setup Guide. Xcalenets Console Setup Guide (Standalone version)

Xcalenets Console Setup Guide. Xcalenets Console Setup Guide (Standalone version) Xcalenets Console Setup Guide Xcalenets Console Setup Guide (Standalone version) 1 Content CONTENT... 2 Getting Started to Xcalenets Console Setup... 3 Account Level Introduction... 3 Login Console Setup...

More information

AuditConfigurationArchiveandSoftwareManagementChanges (Network Audit)

AuditConfigurationArchiveandSoftwareManagementChanges (Network Audit) This section contains the following topics: Audit Configuration Archive and Software Management Changes (Network Audit), on page 1 Audit Changes Made By Users (Change Audit), on page 1 Audit Actions Executed

More information

Get Started with Cisco DNA Center

Get Started with Cisco DNA Center About Cisco DNA Center, on page 1 Log In, on page 1 Log In for the First Time as a Network Administrator, on page 2 Default Home Page, on page 3 Use Global Search, on page 5 Where to Start, on page 6 About

More information