Pulse Policy Secure. Enterprise Guest User Access Manager Feature Guide. Product Release 5.1. Document Revision 1.0 Published:

Size: px
Start display at page:

Download "Pulse Policy Secure. Enterprise Guest User Access Manager Feature Guide. Product Release 5.1. Document Revision 1.0 Published:"

Transcription

1 Pulse Policy Secure Enterprise Guest User Access Manager Feature Guide Product Release 5.1 Document Revision 1.0 Published: by Pulse Secure, LLC. All rights reserved

2 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose, CA by Pulse Secure, LLC. All rights reserved Pulse Secure and the Pulse Secure logo are trademarks of Pulse Secure, LLC in the United States. All other trademarks, service marks, registered trademarks, or registered service marks are the property of their respective owners. Pulse Secure, LLC assumes no responsibility for any inaccuracies in this document. Pulse Secure, LLC reserves the right to change, modify, transfer, or otherwise revise this publication without notice. Pulse Policy Secure Enterprise Guest User Access Manager Feature Guide The information in this document is current as of the date on the title page. END USER LICENSE AGREEMENT The Pulse Secure product that is the subject of this technical documentation consists of (or is intended for use with) Pulse Secure software. Use of such software is subject to the terms and conditions of the End User License Agreement ( EULA ) posted at By downloading, installing or using such software, you agree to the terms and conditions of that EULA. Revision History Changes for rebranding 2014 by Pulse Secure, LLC. All rights reserved

3 Table of Contents About the Documentation... ix Documentation and Release Notes... ix Supported Platforms... ix Documentation Conventions... ix Requesting Technical Support... xii Self-Help Online Tools and Resources... xii Opening a Case with PSGSC... xii Part 1 Overview Chapter 1 Enterprise Guest Access... 3 Enterprise Guest Access Overview... 3 Chapter 2 Guest Access Mode...5 Guest Access Mode Overview... 5 Chapter 3 Deployments... 7 Guest Access Mode Deployment Overview... 7 Layer 2 Bridge Enforcer Deployment Overview... 7 Layer 2 Bridge Interface Configuration... 9 Layer 2 Bridge Administration... 9 Understanding Guest Access Mode Cluster Deployments Part 2 Configuration Chapter 4 Guest User Access Management Framework Using Task Guidance Configuring the Guest User Access Management Framework Before You Begin Configuring the Local Authentication Server Configuring a Role for Guest User Account Managers Configuring a Role for Guest Users Configuring a Guest Realm Configuring Role Mapping Rules Configuring a Sign-In Policy for Guests Configuring Resource Access Policies for Guests by Pulse Secure, LLC. All rights reserved i

4 Configuring a Guest User Account Manager Account Customizing the Guest User Account Manager Pages Guest User Account Manager Pages Overview Customizing the Guest User Account Manager Home Page Downloading the Sample Template Files Modifying the Sample Template Files Uploading Your Customized Files Using the Customized Pages Verifying the Customization SMS Gateway Settings for Guest User Accounts Part 3 Administration Chapter 5 Guest User Account Managers Creating Temporary Guest User Accounts iv 2014 by Pulse Secure, LLC. All rights reserved

5 List of Figures Part 1 Overview Chapter 3 Deployments... 7 Figure 1: Layer 2 Bridge Deployment... 8 Part 2 Configuration Chapter 4 Guest User Access Management Framework Figure 2: Task Guidance Figure 3: Guest User Auth Server Figure 4: GUAM User Role Configuration Figure 5: Guest User Role Configuration Figure 6: Guest Access User Realm Figure 7: Example Role Mapping Rules...27 Figure 8: Sign-in Policy Figure 9: Resource Access Policy Allow All Figure 10: Resource Access Policy Deny Figure 11: GUAM User Account Figure 12: GUAM Home Page Figure 13: New Local User Page Figure 14: Create Many Page Figure 15: Update Local User Page Figure 16: Print Details Page Figure 17: GUAM Role Figure 18: GUAM page Figure 19: Custom Sign-in Page Figure 20: Admin Console Sign-in Page Figure 21: UserAdmin-add-user.thtml Figure 22: Custom New Local User Page: One-Time Use Option Removed Figure 23: Custom New Local User Page: Controls Added to Calculate Account Expiration Figure 24: Custom New Local User Page: Data Entry Validation Figure 25: Sign-in Page Figure 26: Custom Template Upload Successful Figure 27: Sign-in Policy Page Figure 28: Sign-in Policy Page Showing Customized Pages...48 Figure 29: Customized New Local User Page...48 Figure 30: SMS Gateway Settings Figure 31: Guest Access SMS Gateway Settings by Pulse Secure, LLC. All rights reserved v

6 Part 3 Administration Chapter 5 Guest User Account Managers Figure 32: GUAM Page After Log In Figure 33: Guest User Create New Local User Page Figure 34: Guest User Create Many Configuration Page Figure 35: Guest User Update Local User Page Figure 36: Guest User Print Details Page vi 2014 by Pulse Secure, LLC. All rights reserved

7 List of Tables About the Documentation... ix Table 1: Notice Icons... x Table 2: Text and Syntax Conventions... x Part 1 Overview Chapter 3 Deployments... 7 Table 3: Layer 2 Bridge Administration Tasks Summary... 9 Part 2 Configuration Chapter 4 Guest User Access Management Framework Table 4: Local Authentication Server Guest Access Configurations Table 5: Role Settings the GUAM User Table 6: Role Settings for Guest Users Table 7: Guidelines for Configuring the GUAM Role Table 8: Variables Table 9: Guidelines for Configuring a Customized Collection Table 10: Guest Access SMS Gateway Settings Part 3 Administration Chapter 5 Guest User Account Managers Table 11: Guest User New Local User Configuration Page Settings Table 12: Guest User Create Many Configuration Page Settings by Pulse Secure, LLC. All rights reserved vii

8 About the Documentation Documentation and Release Notes on page ix Supported Platforms on page ix Documentation Conventions on page ix Requesting Technical Support on page xii Documentation and Release Notes To obtain the latest version of all Pulse Secure technical documentation, see the product documentation page at Supported Platforms For the features described in this document, the following platforms are supported: MAG Series Documentation Conventions Table 1 on page x defines notice icons used in this guide by Pulse Secure, LLC. All rights reserved ix

9 Table 1: Notice Icons Icon Meaning Description Informational note Indicates important features or instructions. Caution Indicates a situation that might result in loss of data or hardware damage. Warning Alerts you to the risk of personal injury or death. Laser warning Alerts you to the risk of personal injury from a laser. Tip Indicates helpful information. Best practice Alerts you to a recommended use or implementation. Table 2: Text and Syntax Conventions Table 2 on page x defines the text and syntax conventions used in this guide. Convention Description Examples Bold text like this Represents text that you type. To enter configuration mode, type the configure command: user@host> configure Fixed-width text like this Represents output that appears on the terminal screen. user@host> show chassis alarms No alarms currently active Italic text like this Introduces or emphasizes important new terms. Identifies guide names. Identifies RFC and Internet draft titles. A policy term is a named structure that defines match conditions and actions. Junos OS CLI User Guide RFC 1997, BGP Communities Attribute Italic text like this Represents variables (options for which you substitute a value) in commands or configuration statements. Configure the machine s domain name: [edit] root@# set system domain-name domain-name x 2014 by Pulse Secure, LLC. All rights reserved

10 About the Documentation Table 2: Text and Syntax Conventions (continued) Convention Description Examples Text like this Represents names of configuration statements, commands, files, and directories; configuration hierarchy levels; or labels on routing platform components. To configure a stub area, include the stub statement at the [edit protocols ospf area area-id] hierarchy level. The console port is labeled CONSOLE. < > (angle brackets) Encloses optional keywords or variables. stub <default-metric metric>; (pipe symbol) Indicates a choice between the mutually exclusive keywords or variables on either side of the symbol. The set of choices is often enclosed in parentheses for clarity. broadcast multicast (string1 string2 string3) # (pound sign) Indicates a comment specified on the same line as the configuration statement to which it applies. rsvp { # Required for dynamic MPLS only [ ] (square brackets) Encloses a variable for which you can substitute one or more values. community name members [ community-ids ] Indention and braces ( { } ) ; (semicolon) Identifies a level in the configuration hierarchy. Identifies a leaf statement at a configuration hierarchy level. [edit] routing-options { static { route default { nexthop address; retain; } } } GUI Conventions Bold text like this Represents graphical user interface (GUI) items you click or select. In the Logical Interfaces box, select All Interfaces. To cancel the configuration, click Cancel. > (bold right angle bracket) Separates levels in a hierarchy of menu selections. In the configuration editor hierarchy, select Protocols>Ospf. Requesting Technical Support Technical product support is available through the Pulse Secure Global Support Center (PSGSC). If you have a support contract, then file a ticket with PSGSC. Product warranties For product warranty information, visit by Pulse Secure, LLC. All rights reserved xi

11 Self-Help Online Tools and Resources For quick and easy problem resolution, Pulse Secure, LLC has designed an online self-service portal called the Customer Support Center (CSC) that provides you with the following features: Find CSC offerings: Search for known bugs: Find product documentation: Find solutions and answer questions using our Knowledge Base: Download the latest versions of software and review release notes: Search technical bulletins for relevant hardware and software notifications: Open a case online in the CSC Case Management tool: To verify service entitlement by product serial number, use our Serial Number Entitlement (SNE) Tool: Opening a Case with PSGSC You can open a case with PSGSC on the Web or by telephone. Use the Case Management tool in the CSC at Call toll-free in the USA, Canada, and Mexico). For international or direct-dial options in countries without toll-free numbers, see xii 2014 by Pulse Secure, LLC. All rights reserved

12 PART 1 Overview Enterprise Guest Access on page 3 Guest Access Mode on page 5 Deployments on page by Pulse Secure, LLC. All rights reserved 1

13 CHAPTER 1 Enterprise Guest Access Enterprise Guest Access Overview Enterprise Guest Access Overview on page 3 More and more enterprises require the capability of giving guest users temporary access to the Internet. Guests to an enterprise can include customers, vendors, partners, conference participants, and job applicants. The guest user access manager (GUAM) feature enables you to deploy a MAG Series device as a Layer 2 bridge that provisions and enforces secure guest access to the Internet. In Guest Access mode, the MAG Series device is deployed between guest users and the Internet gateway. It functions as an all-in-one guest access user access control appliance that performs not only the guest user provisioning and authentication function, but also the guest user access enforcement function. You can also use GUAM features in a traditional unified access control (UAC) deployment, where the Access Control Service performs the user access provisioning function and a UAC Infranet Enforcer performs the resource access enforcement function. The benefits of Guest Access mode include: Secure guest access to the Internet for up to 200 guest users per MAG Series gateway or service module. Turns a MAG Series gateway into an all-in-one, in-line guest user access control appliance. Support for both wired and wireless environments. Agentless service, with no client software required on endpoint devices. An easy interface for administrative or support staff, or any corporate employee, to sponsor guest users. Comprehensive endpoint device posture and integrity assessment. Supports endpoints on Microsoft Windows, Apple Mac OS, and Linux-based devices, as well as Apple ios and Google Android mobile devices. Related Documentation Guest Access Mode Overview on page 5 Guest Access Mode Deployment Overview on page by Pulse Secure, LLC. All rights reserved 3

14 CHAPTER 2 Guest Access Mode Guest Access Mode Overview Guest Access Mode Overview on page 5 Guest Access mode is supported on the following MAG Series platforms: MAG2600, MAG4610, MAG4611, MAG6610, and MAG6611. Guest Mode is not supported on IC Series platforms. Guest Mode allows you to create up to 200 total users. The limit includes guest administrator and guest user accounts. Guest Access mode enables a subset of Access Control Service features related to guest user access management. It does not support the following Access Control Service features: Authentication protocol sets Client delivery mechanism (Pulse Secure client and Odyssey Access Client) Ability to upload custom sign-in pages MAC address authentication Infranet Enforcer compatibility (ScreenOS firewall or SRX Series Services gateway) IDP compatibility IF-MAP server/client functionality (in Guest Access Mode, the device can only export sessions to an IF-MAP server) Virtual appliance Active/active clustering (active/passive is supported) To enable Guest Access mode, go to System > Configuration > Licensing > Device Modes and select Guest Access. Related Documentation Enterprise Guest Access Overview on page 3 Guest Access Mode Deployment Overview on page 7 Enterprise Guest Access Licensing and Upgrade Overview 2014 by Pulse Secure, LLC. All rights reserved 5

15 CHAPTER 3 Deployments Guest Access Mode Deployment Overview on page 7 Understanding Guest Access Mode Cluster Deployments on page 10 Guest Access Mode Deployment Overview This topic describes a deployment where a MAG Series Gateway is provisioned in Guest Access mode. It includes the following information: Layer 2 Bridge Enforcer Deployment Overview on page 7 Layer 2 Bridge Interface Configuration on page 9 Layer 2 Bridge Administration on page 9 Layer 2 Bridge Enforcer Deployment Overview In Guest Access mode, the MAG Series Gateway functions as a secure Layer 2 bridge. Figure 1 on page 8 shows an example deployment. Figure 1: Layer 2 Bridge Deployment Internet Internet gateway firewall Corporate intranet MAG Series Internal Interface External Interface Guest network WAP Enterprise Guest User Access Manager Feature Guide Wired guest Wireless guest by Pulse Secure, LLC. All rights reserved

16 In a Layer 2 bridge deployment, the external port of the MAG Series Gateway and all user ports are on the same guest network VLAN, so broadcast traffic from the user is visible to the external port. The MAG Series Gateway blocks unauthenticated traffic except DHCP traffic and DNS traffic so that the guest client can obtain an IP address on the corporate network. When the user opens a Web browser and attempts to access the Internet, the MAG Series Access Control Service responds with a captive portal page that prompts the user to log in. The guest users log into the Access Control Service and begin a session. The guest users can access resources permitted by the Access Control Service resource access policy. Typically, you deploy the Layer 2 bridge as a gateway to the Internet, not to your corporate network. If you deploy it this way, you can use a permit all policy to allow users access to all resources reachable through the gateway. Layer 2 Bridge Interface Configuration In a Layer 2 Bridge deployment, you must configure the external interface with an IP address in the same subnet as the internal interface and in the same subnet as the IP addresses provisioned to guest endpoints by the DHCP server. To configure the interfaces: 1. Select System > Network > External Port > Settings and complete the configuration for the external port. 2. Select System > Network > Internal Port > Settings and complete the configuration for the internal port. 3. (Optional, Recommended) Use SSL certificate security so that the guest users do not have to examine certificate warnings when they are redirected to the captive portal to sign in. a. Select System > Configuration > Certificates > Device Certificates. b. Import an SSL certificate that has been signed by a well-known certificate authority, such as Verisign, Entrust, and the like. c. Associate the SSL certificate with the external port by Pulse Secure, LLC. All rights reserved

17 Chapter 3: Deployments Layer 2 Bridge Administration Table 3 on page 9 provides a summary of Layer 2 bridge administration tasks. Table 3: Layer 2 Bridge Administration Tasks Summary Tasks Procedures Monitoring To verify whether the bridge is up, select System > Status > Overview and check the Bridge diode under Enforcer Status. The Bridge diode is green when Layer 2 bridging is available. Logging To view logs, select System > Log/Monitoring > Events. Activate logging for Layer 2 bridge using Bridge Events and Bridge Rule Trace to aid you in troubleshooting issues. Troubleshooting To troubleshoot the Bridge Enforcer, select Maintenance > Troubleshooting > Bridge Enforcer. If necessary, select Recreate Rules to re-create bridge rules based on the current endpoint sessions and resource access policies. Use this procedure when you suspect that the bridge is not creating appropriate rules. It verifies whether an endpoint should have access to a protected resource. Related Documentation Enterprise Guest Access Overview on page 3 Using Task Guidance on page 13 Configuring the Guest User Access Management Framework on page 14 Understanding Guest Access Mode Cluster Deployments on page 10 Understanding Guest Access Mode Cluster Deployments Active-passive clustering is supported with Guest Access mode. In an active/passive cluster, you configure only the active node. In the event of failover, the new active node (previously the passive node) creates the Layer 2 bridge and the passive node (previously the active node) deletes its bridge. The external interface of each node detects user traffic, but only the active node actually bridges the traffic. There must be a physical connection from the switch to the external interface on each node so that Layer 2 bridge functionality is not interrupted during node transition. It is not recommended for the backup device to be deployed in Guest Access mode. Guest Access mode is only required on the primary device. If both devices do not have Guest Access mode enabled, and the cluster is deleted or one node is removed from the cluster, there will be two bridges on the network, potentially causing a bridge loop. Related Documentation Enterprise Guest Access Overview on page 3 Guest Access Mode Overview on page by Pulse Secure, LLC. All rights reserved 9

18 Understanding Guest Access Mode Cluster Deployments Active-passive clustering is supported with Guest Access mode. In an active/passive cluster, you configure only the active node. In the event of failover, the new active node (previously the passive node) creates the Layer 2 bridge and the passive node (previously the active node) deletes its bridge. The external interface of each node detects user traffic, but only the active node actually bridges the traffic. There must be a physical connection from the switch to the external interface on each node so that Layer 2 bridge functionality is not interrupted during node transition. It is not recommended for the backup device to be deployed in Guest Access mode. Guest Access mode is only required on the primary device. If both devices do not have Guest Access mode enabled, and the cluster is deleted or one node is removed from the cluster, there will be two bridges on the network, potentially causing a bridge loop. Related Documentation Enterprise Guest Access Overview on page 3 Guest Access Mode Overview on page by Pulse Secure, LLC. All rights reserved

19 PART 2 Configuration Guest User Access Management Framework on page by Pulse Secure, LLC. All rights reserved 11

20 CHAPTER 4 Guest User Access Management Framework Using Task Guidance Using Task Guidance on page 13 Configuring the Guest User Access Management Framework on page 14 Customizing the Guest User Account Manager Pages on page 32 SMS Gateway Settings for Guest User Accounts on page 49 Figure 2 on page 14 shows the Task Guidance menu for enterprise guest access (EGA). You can use Task Guidance to navigate through the tasks required to configure EGA. To display Task Guidance: 1. Select the Guidance link at the top of the Web console. 2. Click System Setup to display guidance for setting the date and time, upgrading software, and installing licenses. 3. Click Guest Users to display guidance for configuring the local authentication server, user roles, user realms, sign-in policies, and resource access policies for guest users by Pulse Secure, LLC. All rights reserved 13

21 Figure 2: Task Guidance Related Documentation Configuring the Guest User Access Management Framework on page 14 Configuring the Guest User Access Management Framework This topic describes the elements of the Pulse Secure access management framework that you configure to support an enterprise guest access (EGA) deployment. It includes the following information: Before You Begin on page 15 Configuring the Local Authentication Server on page 15 Configuring a Role for Guest User Account Managers on page 17 Configuring a Role for Guest Users on page 21 Configuring a Guest Realm on page 25 Configuring Role Mapping Rules on page 26 Configuring a Sign-In Policy for Guests on page 27 Configuring Resource Access Policies for Guests on page 28 Configuring a Guest User Account Manager Account on page by Pulse Secure, LLC. All rights reserved

22 Before You Begin Chapter 4: Guest User Access Management Framework This configuration example assumes the following tasks have been completed: Installed the MAG Series hardware. Upgraded the Access Control Service software to the latest version. Enabled Guest Access mode. Configured basic host and network settings. Keep in mind the following best practices: Configure NTP. Synchronization to standard network clock is not only a requirement for meaningful logging but is also necessary for security features that examine time-based validity, such as SSL certificate security. Select System > Status to display the system status page; then click the Edit link next to System Date and Time to display the configuration page for NTP. Configure a hostname. Hostname is used to construct the HTTP redirect URL for the captive portal page presented to guest users. If hostname is not specified, the URL is based on the SSL certificate distinguished name (DN) in the SSL certificate associated with the external port. If none, the URL uses the IP address of the external port. We recommend specifying a hostname to create a more user friendly captive portal URL. Select System > Network > Overview to display the configuration page for hostname. Configure DNS. Guest users depend on the DNS servers you specify when they initially attempt to connect to the network. In addition, the captive portal HTTP redirect presents a hostname in the URL only if DNS can resolve the hostname. Select System > Network > Overview to display the configuration page for DNS. Configure SSL certificate security. Use SSL certificate security so that the guest users do not have to examine certificate warnings when they are redirected to the captive portal to sign in. Select System > Configuration > Certificates > Device Certificates to display the device certificate configuration page. You can use this page to import an SSL certificate that has been signed by a well known certificate authority, such as VeriSign, Entrust, and the like. Use this page to associate the certificate with the external port. Configuring the Local Authentication Server Select System > Authentication > Auth. Server and create a new local authentication server for guest users. Figure 3 on page 16 shows a local authentication server configuration. Table 4 on page 17 describes the guest access configuration by Pulse Secure, LLC. All rights reserved 15

23 Figure 3: Guest User Auth Server by Pulse Secure, LLC. All rights reserved

24 Table 4: Local Authentication Server Guest Access Configurations Chapter 4: Guest User Access Management Framework Settings Guidelines Enable Guest User Account Managers Select this option to allow guest user account managers (GUAM) to create guest user accounts on the local authentication server. Guest User Name Prefix Specify the prefix to be used in autogenerated guest usernames. We recommend you retain the default guest_ so that you can rely on the naming convention in your role mapping rules. Guest User Info Fields (Optional) Add line items to represent fields that you want to appear on the configuration page for creating guest user accounts. For example, you can create fields for Company Name, Host Person, Meal Preference, and so on. Instructions for Guest User Account Manager (Optional) Add instructions to the GUAM that appear on the GUAM sign-in page. You can use the following HTML tags to format the text: <b>, <br>, <font>, <noscript>, and <a href>. See Figure 33 on page 56 and Figure 34 on page 58 to see examples of how this text is displayed on the GUAM sign-in page. Maximum Account Validity Period Specify the number of hours the account is valid. The default is 12 hours. Configuring a Role for Guest User Account Managers Select Users > User Roles and create a user roles for the GUAM user. Figure 4 on page 18 shows the user role for the GUAM user. Table 5 on page 18 describes the key settings for the GUAM user role by Pulse Secure, LLC. All rights reserved 17

25 Figure 4: GUAM User Role Configuration Table 5: Role Settings the GUAM User Settings Guidelines Enable Guest User Management Rights Select this option, which is the key option to distinguish GUAM users from other users. When a user matching the GUAM role logs in, the user sees the Guest User Access Manager page by Pulse Secure, LLC. All rights reserved

26 Chapter 4: Guest User Access Management Framework Table 5: Role Settings the GUAM User (continued) Settings Session Options Guidelines Enable Session Options. In addition, click the Edit link to display the Session Options configuration page. Select the Allow VPN through Firewall option to allow guest users to use VPN technology to connect to their own corporate networks. If you do not enable this option, creating a VPN connection would result in disconnection because the VPN tunnel would prevent heartbeat traffic used by the Access Control Service in monitoring user sessions. NOTE: If a heartbeat is not detected between a guest user and the MAG Series Gateway, the user receives notification of the failure. After a heartbeat failure has occurred, a retry occurs after 30 seconds. Subsequent failures result in a retry at 1.5 times the prior interval up to a maximum value of the initial heartbeat interval by Pulse Secure, LLC. All rights reserved 19

27 Table 5: Role Settings the GUAM User (continued) Settings Guidelines Agent Click the Agent tab to display the agent configuration page. Ensure that the Install Agent for this role options is not selected by Pulse Secure, LLC. All rights reserved

28 Table 5: Role Settings the GUAM User (continued) Chapter 4: Guest User Access Management Framework Settings Guidelines Agentless Click the Agentless tab to display the agentless access configuration page. Ensure that the Install agent for this role options is not selected. Configuring a Role for Guest Users Select Users > User Roles and create a user roles for the guest user. Figure 5 on page 22 shows the user role for the guest users. Table 5 on page 18 describes the key settings for the guest user role. The user role configuration for guest users is similar to the role configuration for the GUAM user with one key difference: do not give the guest user role guest user account management rights by Pulse Secure, LLC. All rights reserved 21

29 Figure 5: Guest User Role Configuration Table 6: Role Settings for Guest Users Settings Guidelines Enable Guest User Management Rights This option is specifically for the GUAM user. Do not enable this option for the guest user role. When a guest user without guest user management rights logs in, the guest user page does not include controls for adding guest users, which is what you want for guest users. The following page is displayed after a guest logs into the guest realm by Pulse Secure, LLC. All rights reserved

30 Table 6: Role Settings for Guest Users (continued) Chapter 4: Guest User Access Management Framework Settings Guidelines Session Options Enable Session Options. In addition, click the Edit link to display the Session Options configuration page. Select the Allow VPN through Firewall option to allow guest users to use VPN technology to connect to their own corporate networks. If you do not enable this option, creating a VPN connection would result in disconnection because the VPN tunnel would prevent heartbeat traffic used by the Access Control Service in monitoring user sessions. NOTE: If a heartbeat is not detected between a guest user and the MAG Series Gateway, the user receives notification of the failure. After a heartbeat failure has occurred, a retry occurs after 30 seconds. Subsequent failures result in a retry at 1.5 times the prior interval up to a maximum value of the initial heartbeat interval by Pulse Secure, LLC. All rights reserved 23

31 Table 6: Role Settings for Guest Users (continued) Settings Guidelines Agent Click the Agent tab to display the agent configuration page. Ensure that the Install Agent for this role options is not selected by Pulse Secure, LLC. All rights reserved

32 Table 6: Role Settings for Guest Users (continued) Chapter 4: Guest User Access Management Framework Settings Guidelines Agentless Click the Agentless tab to display the agentless access configuration page. Ensure that the Install agent for this role options is not selected. NOTE: Some role and realm restrictions are not available in Guest Access mode. For example, certificate restrictions. Use Task Guidance to help you determine which options are available. Configuring a Guest Realm Select Users > User Realms and create an authentication realm for guest access. Figure 6 on page 26 shows the configuration for the user realm in this example by Pulse Secure, LLC. All rights reserved 25

33 Figure 6: Guest Access User Realm Configuring Role Mapping Rules From the user realm configuration page, click the Role Mapping tab and create role mapping rules. Figure 7 on page 27 shows the role mapping rules configuration for this example. Users matching the string and wildcard guest* (the default guest user prefix convention for the local authentication server) map to the Guest role. The user named guam (not yet created in this example) maps to the GUAM role by Pulse Secure, LLC. All rights reserved

34 Chapter 4: Guest User Access Management Framework Figure 7: Example Role Mapping Rules Configuring a Sign-In Policy for Guests Select Authentication > Signing-In > Sign-In Policies to display the sign-in policies configuration page. Create a sign-in policy specifically for the guest user administrator and guest users. Figure 8 on page 28 shows the policy used in this example. Note that it uses a user-defined URL named */guam/. The */ represents the Access Control Service host and the directory guam/ specifies a new, user-defined directory for managing guest access. The realm selected is the guest realm created previously. This example uses the default sign-in page by Pulse Secure, LLC. All rights reserved 27

35 Figure 8: Sign-in Policy Configuring Resource Access Policies for Guests Select UAC > Infranet Enforcer > Resource Access to display the resource access policies configuration page. In a Layer 2 bridge deployment, the resource access policy is like a firewall rule that determines what traffic is allowed through the MAG Series gateway once the guest user has authenticated. Figure 9 on page 29 shows a policy that allows all traffic by users with the guest role. You would use a rule like this when your network topology is similar to the Layer 2 bridge topology shown in Figure 1 on page by Pulse Secure, LLC. All rights reserved

36 Chapter 4: Guest User Access Management Framework Figure 9: Resource Access Policy Allow All 2014 by Pulse Secure, LLC. All rights reserved 29

37 Figure 10: Resource Access Policy Deny Figure 10 on page 30 shows a more complex policy that you would configure to implement EGA features in a standard UAC solution that has deployed Infranet Enforcers in front of corporate resources by Pulse Secure, LLC. All rights reserved

38 Chapter 4: Guest User Access Management Framework Configuring a Guest User Account Manager Account As noted previously, the limited administrator capabilities for the guest user account manager (GUAM) are derived from the role configuration. The user account can belong to an external authentication server as long as the rest of the access management framework is configured to map that user to the GUAM role. You might find it simpler to use the local authentication server to create GUAM user accounts. Select System > Authentication > Auth. Server to locate the local authentication server you have configured for guest access; then click the Users tab to display the user management pages. You can use these pages to create user accounts. Figure 11 on page 31 shows the configuration for a GUAM user account in this example. The username guam matches the role mapping rule for the GUAM role. Figure 11: GUAM User Account Related Documentation Creating Temporary Guest User Accounts on page by Pulse Secure, LLC. All rights reserved 31

39 Enterprise Guest Access Overview on page 3 Using Task Guidance on page 13 Customizing the Guest User Account Manager Pages This topic describes how to customize the Guest User Account Manager (GUAM) page. It includes the following information: Guest User Account Manager Pages Overview on page 32 Customizing the Guest User Account Manager Home Page on page 35 Downloading the Sample Template Files on page 38 Modifying the Sample Template Files on page 39 Uploading Your Customized Files on page 44 Using the Customized Pages on page 46 Verifying the Customization on page 48 Guest User Account Manager Pages Overview The GUAM user interface includes the following pages: GUAM Home Page New Local User Page Create Many Users Page Update User Account Page Print Details Page Figure 12: GUAM Home Page Figure 12 on page 32 shows the GUAM home page. You can use the administrator console to change the look and feel, as well as some functionality, presented on this page. Figure 13 on page 33 shows the New Local User page. You can edit a sample file to customize this page by Pulse Secure, LLC. All rights reserved

40 Chapter 4: Guest User Access Management Framework Figure 13: New Local User Page Figure 14 on page 33 shows the Create Many page. You can edit a sample file to customize this page. Figure 14: Create Many Page Figure 15 on page 34 shows the Update Local User page. You can edit a sample file to customize this page by Pulse Secure, LLC. All rights reserved 33

41 Figure 15: Update Local User Page Figure 16 on page 35 shows the Print Details page. You can edit a sample file to customize this page by Pulse Secure, LLC. All rights reserved

42 Chapter 4: Guest User Access Management Framework Figure 16: Print Details Page Customizing the Guest User Account Manager Home Page You can use the admin console to change the look and feel, as well as some functionality, presented on the GUAM home page. For example, you can customize page headers and footers to include your corporate branding content, disable the Create Many users control, and add an HTML link to your corporate Internet use policy. To customize the GUAM home page: 1. Select Users > User Roles > RoleName > General > UI Options. Figure 17 on page 36 shows the configuration for the GUAM home page by Pulse Secure, LLC. All rights reserved 35

43 Figure 17: GUAM Role Table 7 on page 37 describes the configuration guidelines for GUAM role by Pulse Secure, LLC. All rights reserved

44 Chapter 4: Guest User Access Management Framework Table 7: Guidelines for Configuring the GUAM Role Settings Guidelines Header Current appearance Display the image that is currently used. Logo image (Optional) Click Browse and locate your custom image file. The new logo appears in the Current appearance box only after you save your changes. Background color (Optional) Specify an alternate background color for the header area of the Access Control Service welcome page. Type the hexadecimal number for the background color or click the Color Palette icon and pick the desired color. The Current appearance box updates immediately. User Toolbar Session Counter Select the check box to display both a session countdown timer and an Extend button that allows agentless users to extend their session time to the maximum session length if the Enable Session Extension option is selected. Post-Auth Sign-In Notification (Optional) Select a post authentication message that you configured earlier. If you select this option, the user receives an information page (for example, an end-user license agreement or EULA) that you have created. If you defined a post sign-in notification and you select a message for a role, the user is presented with the notification message after authentication. The user is prompted to click Proceed or Decline. If the user clicks Proceed, the protected resource is available to the user. If the user clicks Decline, they are immediately logged off and returned to the authentication page. Personalized greeting Show notification message on user's welcome page Select the check box, and enter a message in the associated text box. The message is displayed as a header on the device welcome page after the user is authenticated. You can format text and add links using the following HTML tags: <i>, <b>,<br>,<font>,and <ahref>. This information does not appear on the initial sign-in page that is displayed prior to authentication. You can also use device system variables and attributes in this field. NOTE: The length of the personalized greeting cannot exceed 12K, (12,288 characters). If you use unsupported HTML tags in your custom message, the device might display the user s device home page incorrectly. Informative Show instruction message (Optional) Add instructions to the users welcome page. User Admin 2014 by Pulse Secure, LLC. All rights reserved 37

45 Table 7: Guidelines for Configuring the GUAM Role (continued) Settings Guidelines Instructions for Guest User Account Manager (Optional) Add instructions to the GUAM that will appear on the GUAM sign-in page. You can use the following HTML tags to format the text: <b>, <br>, <font>, <noscript>, and <a href>. See Figure 18 on page 38 to see an example of how this text is displayed on the GUAM sign-in page. If you include a link to an external website, a warning message appears informing the user of loss of access privileges if they leave the current page. To avoid this, add a tag for opening links in a new browser window. For example: <a href= target= _blank >Corporate Internet Usage Policy</a> displays the linked text Corporate Internet Usage Policy, and the link opens in a new browser window. The instruction message supports non-english languages. NOTE: The length of the custom instruction cannot exceed 12K (12,288 characters). Enable bulk user creation Select this option to enable bulk user creation. This option is selected by default. Uncheck this option to disable bulk user creation. Other Show copyright notice and "Secured by Pulse Secure" label in footers Specify whether or not to display the copyright notice and label in the footer. This setting applies only to users whose license permits disabling the copyright notice. For more information about this feature, call Pulse Secure Global Support Centre (PSGSC). Figure 18: GUAM page Figure 18 on page 38 shows the resulting GUAM page. Downloading the Sample Template Files The sample template zip file includes the following GUAM files: UserAdmin-add-user.thtml UserAdmin-add-bulk-users.thtml UserAdmin-update-user.thtml guest-user-print-page.thtml guest-user-print-page-batch.thtml by Pulse Secure, LLC. All rights reserved

46 Chapter 4: Guest User Access Management Framework To download the sample template files: Figure 19: Custom Sign-in Page 1. Select Signing In > Sign in pages. Figure 19 on page 39 shows the Signing In page. 2. Click Upload Custom Pages. Figure 20: Admin Console Sign-in Page Figure 20 on page 39 shows the admin console sign-in page that hosts the sample.zip download. 3. Click the Sample link in the Sample Template Files pane. 4. Download the latest sample.zip file. Modifying the Sample Template Files You can edit the HTML to modify the look and feel of your page. You can add, modify, or delete JavaScript functions and variables to customize the functionality presented on your page. This section provides examples of common customizations for GUAM pages. For a reference on the files, functions, and variables found in the templates included in the sample.zip file, see the Custom Sign-In Pages Developer Reference by Pulse Secure, LLC. All rights reserved 39

47 Table 8: Variables Figure 21 on page 40 shows the contents of the UserAdmin-add-user.thtml file. The JavaScript functions and variables used for the standard user interface controls that appear in the predefined pages are highlighted in bold. Table 8 on page 40 describes some of the common variables used in the templates and their meaning. Variable Definition I18N_AUTH_SERVER_COLON Field displays the name of the local authentication server. Do not modify. I18N_USERNAME_COLON Field for entering the username. I18N_FULL_NAME_COLON Field for entering the full name. I18N_PASSWORD_COLON Field for entering the password. I18N_USER_ADMIN_ _COLON Field for entering the ID. I18N_USER_EXPIRATION_START_COLON Field for entering the account start time. I18N_USER_EXPIRATION_END_COLON Field for entering the account end time. I18N_USER_ADMIN_TIME_ZONE_COLON Field for entering the time zone. Figure 21: UserAdmin-add-user.thtml <TR> <TD nowrap><% I18N_USERNAME_COLON %></TD> <TD><INPUT id="login_3" type="text" name="login" size="20" value="<% login %>"></TD> <TD> </TD> </TR> <TR> <TD nowrap><% I18N_FULL_NAME_COLON %></TD> <TD><INPUT id="name_40" type="text" name="name" size="20" value="<% name %>"></TD> <TD> </TD> </TR> <TR> <TD nowrap><% I18N_PASSWORD_COLON %></TD> <TD><INPUT id="passwd_5" type="text" size="20" name="passwd" value="<% passwd %>"></TD> <TD> </TD> </TR> <TR> by Pulse Secure, LLC. All rights reserved

48 Chapter 4: Guest User Access Management Framework <TD nowrap><% I18N_USER_ADMIN_ _COLON %></TD> <TD><INPUT id=" _4" type="text" name=" " size="20" value="<% %>"></TD> <TD> </TD> </TR> <TR> <TD nowrap><% I18N_USER_EXPIRATION_START_COLON %></TD> <td><input id="start_timestamp_4" type="text" name="start_timestamp" value="<% starttimedisplay %>"> <script language="javascript"> new tcal ({ 'formname': 'frmnewuser', / form name 'controlname':'start_timestamp' / input name }, 8); </script></td> <TD> </TD> </TR> <td><input id="expiration_timestamp_4" type="text" name="expiration_timestamp" value="<% expirationdisplay %>"> <script language="javascript"> new tcal ({ 'formname': 'frmnewuser', / form name 'controlname': 'expiration_timestamp' // / input name }, 17); </script></td> <TR> <TD nowrap><% I18N_USER_ADMIN_TIME_ZONE_COLON %></TD> <TD colspan=3> <select id="cmbtimezoneaddlocal" name="cmbtimezoneaddlocal"> <% SET count = 0 %> <% FOREACH tz = tzlist %> <option id="option_addlocal_time_<%count%>" <%tz.selected%> value="<%tz.value%>"><%tz.display%></option> <% SET count = count + 1 %> <% END %> </select> </TD> </TR> You can remove fields from the user interface form by deleting the HTML and JavaScript that define them from the sample file. For example, to delete the one-time use option box, delete the following HTML and variables: Example <table id="table_useradmaddlocal_4" border="0" cellpadding="2" cellspacing="0"> <tr> <td><input type="checkbox" name="onetimeuser" id="onetimeuser" <%disabled%> value="on" <%IF onetimeuser == 1%>checked<%END%>></td> <td><%i18n_one_time_use_no_colon%> (<%I18N_ONE_TIME_USE_DISABLE_ACCOUNT%>)I18N_ONE_TIME_USE_NO_COLON%> 2014 by Pulse Secure, LLC. All rights reserved 41

49 (<%I18N_ONE_TIME_USE_DISABLE_ACCOUNT%>)</td> </tr> </table> NOTE: Never delete or modify the following variables: authserver Specifies the Internal ID of the authentication server. errormsg Specifies the error message. The device generates the error message in case of an error otherwise it will be empty. Never delete or modify the <%isuac%> variable tag. Figure 22 on page 42 shows the result of the customization. In this example, Password label is modified as Pwd and * indicates the required fields. Figure 13 on page 33 shows the New Local User page before customization. Figure 22: Custom New Local User Page: One-Time Use Option Removed You can add fields to the user interface by adding HTML and JavaScript to define them in the sample file. For example, to add a function that calculates the account expiration End Time value, you can add HTML and JavaScript similar to the following snippet: Example How to customize the template <! Account valid for (in days) field is newly added > <TR> <TD nowrap>account valid for (in days):</td> <TD>input id="days_1" type="text" name="days" onblur="calculateendtime()">input id="days_1" type="text" name="days" onblur="calculateendtime()"></td> </TR> <! Calculates endtime based on the value entered in Account valid for (in days) field > by Pulse Secure, LLC. All rights reserved

50 Chapter 4: Guest User Access Management Framework function CalculateEndTime() { var somedate = new Date(document.forms["frmNewUser"]["start_timestamp"].value); var numberofdaystoadd = document.forms["frmnewuser"]["days"].value; var millisecondoffset = numberofdaystoadd * 24 * 60 * 60 * 1000; somedate.settime(somedate.gettime() + millisecondoffset); //-Formatting to mm/dd/yyyy : var dd = somedate.getdate(); var mm = somedate.getmonth() + 1; var y = somedate.getfullyear(); var hh = somedate.gethours(); var min = somedate.getminutes(); var expirationdisplay= mm + '/'+ dd + '/'+ y + ' ' + '5:00 pm'; document.forms["frmnewuser"].display_expiration.value = expirationdisplay; } NOTE: Figure 23 on page 43 shows the result of the customization. Figure 23: Custom New Local User Page: Controls Added to Calculate Account Expiration You can also add HTML and JavaScript commonly used to validate data entry. For example, the following snippet shows a validation function and the HTML that would indicate to the administrator how to correct the data entry that has failed the validation check. Example How to customize the template <! Validates and alerts the users if the Login name is more than 10 characters> function validate() { var y= document.forms["frmnewuser"]["login"].value; 2014 by Pulse Secure, LLC. All rights reserved 43

51 if (y.length > 10) { alert("login name should be less than 10 characters"); return false; } document.forms["frmnewuser"]["expiration_timestamp"].value = document.forms["frmnewuser"]["display_expiration"].value } Figure 24 on page 44 shows the result of the customization shown in this example. Figure 24: Custom New Local User Page: Data Entry Validation Uploading Your Customized Files After you have edited the sample template files, save the files with the same name and add them to the sample.zip file (replacing the previous files). To upload the files to the system: 1. Select Signing In > Sign-in pages. 2. Click Browse to select the sample.zip file containing the custom templates and assets. 3. Click Upload Custom Pages. Figure 25 on page 45 shows the admin console sign-in page that hosts the sample.zip download by Pulse Secure, LLC. All rights reserved

52 Chapter 4: Guest User Access Management Framework Figure 25: Sign-in Page Table 9 on page 45 describes the guidelines for completing the configuration. Table 9: Guidelines for Configuring a Customized Collection Settings Guidelines Sign-In Pages Name Specify the name for the sign-in page. Page Type Specify the page type. Access is selected by default. Template File Select the template file in zipped format that contains the custom templates and assets. Upload Skip validation checks during upload Select this option to skip the validation checks for the template file. Upload Custom Pages Select this option to upload the custom pages. Figure 26 on page 46 shows that the template file is uploaded successfully by Pulse Secure, LLC. All rights reserved 45

53 Figure 26: Custom Template Upload Successful Using the Customized Pages After you have uploaded the customized files, you can associate them with your GUAM sign-in page. To use the customized pages: 1. Select Authentication > Signing-In > Sign-In Policies to display the sign-in policies configuration page. 2. Select the custom sign-in page from the drop-down list by Pulse Secure, LLC. All rights reserved

54 Chapter 4: Guest User Access Management Framework Figure 27: Sign-in Policy Page 3. Click Save Changes. Figure 28 on page 48 shows the Sign-In Policies page showing the customized pages by Pulse Secure, LLC. All rights reserved 47

55 Figure 28: Sign-in Policy Page Showing Customized Pages Verifying the Customization Sign in to the GUAM sign-in page as a guest user account manager and verify that the customizations you have made were applied. Figure 29 on page 48 shows the customized New Local User page. Figure 29: Customized New Local User Page Related Documentation Creating Temporary Guest User Accounts on page 55 Configuring the Guest User Access Management Framework on page 14 Enterprise Guest Access Overview on page 3 Custom Sign-In Pages Developer Reference, Release 8.0/ by Pulse Secure, LLC. All rights reserved

56 Chapter 4: Guest User Access Management Framework SMS Gateway Settings for Guest User Accounts Short Message Service (SMS) is delivered through an SMS gateway service that supports HTTP, HTTPS, and SMTP (Simple Mail Transport Protocol) delivery. You need to subscribe to an external service to be able to deliver guest details using SMS. The SMS gateway sends SMS in formatted text message using HTTP/HTTPS interface (SMS message) and can also allow message to be sent as an SMS. An example of an SMS gateway is clickatell.com. You should have a valid account with this third party. To create an account with Clickatell: 1. Go to and choose the appropriate API sub-product (connection method) you wish to use. 2. Click on the registration hyperlink. 3. Select the Account type you would like to use (Local or International) 4. Enter your personal information to complete the registration form. 5. Accept the Terms & Conditions. 6. Click Continue - An containing your login details such as account login name, password, and clientid will be sent to the address you have provided. 7. Activate your account When user has logged in, and user will be on the Clickatell Central landing page and HTTP API will be added to the account and client API ID will be issued to the account. A single account may have multiple API IDs associated with it. To enable the SMS gateway settings using Policy Secure: 1. In the admin console, select Configuration > Guest Access. 2. Select the Enable SMS Gateway Settings. Figure 30 on page 50 and Figure 31 on page 51 shows the configuration page for SMS gateway settings. 3. Complete the configuration settings as described in Table 10 on page Click Save Changes. 5. Click Send Test SMS by Pulse Secure, LLC. All rights reserved 49

57 Figure 30: Guest Access SMS Gateway Settings, Clickatell 2SMS as SMS Gateway Type by Pulse Secure, LLC. All rights reserved

58 Chapter 4: Guest User Access Management Framework Figure 31: Guest Access SMS Gateway Settings Table 10: Guest Access SMS Gateway Settings Settings Guidelines SMS Gateway Settings SMS Gateway Type Select the gateway type: Clickatell Select this option to send SMS as a text message. Clickatell 2SMS Select this option to use format as an SMS using SMTP. API product ID Specify the API product ID that you received from Clickatell during account creation. SMS Gateway Login Name Specify the SMS gateway login name. SMS Gateway Login Password Specify the SMS gateway login password. Text Message (SMS) Format (Optional) Select the following fields: Guest Account Start Time Guest Account End Time Guest Account Sign-in URL Wireless SSID 2014 by Pulse Secure, LLC. All rights reserved 51

Pulse Policy Secure. Guest Access Solution Configuration Guide. Product Release 5.2. Document Revision 1.0 Published:

Pulse Policy Secure. Guest Access Solution Configuration Guide. Product Release 5.2. Document Revision 1.0 Published: Pulse Policy Secure Guest Access Solution Configuration Guide Product Release 5.2 Document Revision 1.0 Published: 2015-03-31 2015 by Pulse Secure, LLC. All rights reserved Guest Access Solution Configuration

More information

Pulse Policy Secure. Getting Started Guide. Product Release 5.1. Document Revision 1.0 Published:

Pulse Policy Secure. Getting Started Guide. Product Release 5.1. Document Revision 1.0 Published: Pulse Policy Secure Getting Started Guide Product Release 5.1 Document Revision 1.0 Published: 2014-12-15 2014 by Pulse Secure, LLC. All rights reserved Pulse Secure, LLC 2700 Zanker Road, Suite 200 San

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Managing Juniper SRX PCAP Data Release 2014.1 Modified: 2016-03-16 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights

More information

Juniper Secure Analytics Virtual Appliance Installation Guide

Juniper Secure Analytics Virtual Appliance Installation Guide Juniper Secure Analytics Virtual Appliance Installation Guide Release 7.3.0 Modified: 2017-09- Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 9089 USA 08-75-2000 www.juniper.net Copyright

More information

Junos Pulse Secure Access Service

Junos Pulse Secure Access Service Junos Pulse Secure Access Service IF-MAP Feature Guide Release 8.0 Published: 2013-11-15 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

Junos Space. Reports. Release Published: Copyright 2014, Juniper Networks, Inc.

Junos Space. Reports. Release Published: Copyright 2014, Juniper Networks, Inc. Junos Space Reports Release 14.1 Published: 2014-11-18 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks,

More information

Junos Pulse Secure Access Service

Junos Pulse Secure Access Service Junos Pulse Secure Access Service Intrusion Detection and Prevention Sensors Release 8.0 Published: 2013-11-15 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

Pulse Policy Secure. Access Control in the Federated Enterprise Using IF-MAP Network Configuration Example. Product Release 5.2

Pulse Policy Secure. Access Control in the Federated Enterprise Using IF-MAP Network Configuration Example. Product Release 5.2 Pulse Policy Secure Access Control in the Federated Enterprise Using IF-MAP Network Configuration Example Product Release 5.2 Document Revision 1.0 Published: 2015-03-31 2015 by Pulse Secure, LLC. All

More information

Virtual Route Reflector

Virtual Route Reflector Virtual Route Reflector Getting Started Guide for VMware Modified: 2017-12-18 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, the

More information

Junos Space Virtual Appliance Installation and Configuration Guide

Junos Space Virtual Appliance Installation and Configuration Guide Junos Space Virtual Appliance Installation and Configuration Guide Release 15.1 Modified: 2017-12-15 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Junos Space Virtual Appliance Installation and Configuration Guide

Junos Space Virtual Appliance Installation and Configuration Guide Junos Space Virtual Appliance Installation and Configuration Guide Release 17.1 Modified: 2018-01-04 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

STRM Series to JSA Series

STRM Series to JSA Series STRM Series to JSA Series Migration Guide Published: 2014-06-04 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper

More information

CBA850 3G/4G/LTE Wireless WAN Bridge Application Guide

CBA850 3G/4G/LTE Wireless WAN Bridge Application Guide CBA850 3G/4G/LTE Wireless WAN Bridge Application Guide Modified: 2016-06-06 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved.

More information

Junos Space Virtual Appliance Installation and Configuration Guide

Junos Space Virtual Appliance Installation and Configuration Guide Junos Space Virtual Appliance Installation and Configuration Guide Release 16.1 Modified: 2018-03-09 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Junos Space Service Now Getting Started Guide

Junos Space Service Now Getting Started Guide Junos Space Service Now Getting Started Guide Release 17.2R1 Modified: 2018-02-08 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks,

More information

Security Director. Security Director Installation and Upgrade Guide. Modified: Copyright 2018, Juniper Networks, Inc.

Security Director. Security Director Installation and Upgrade Guide. Modified: Copyright 2018, Juniper Networks, Inc. Security Director Security Director Installation and Upgrade Guide Modified: 20180726 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 4087452000 www.juniper.net Juniper Networks,

More information

Service Now Getting Started Guide

Service Now Getting Started Guide Service Now Getting Started Guide Release 17.1R1 Modified: 2017-06-07 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics WinCollect User Guide Release 2014.2 Published: 2014-07-15 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights

More information

Subscriber Traffic Redirection

Subscriber Traffic Redirection Subscriber Traffic Redirection Published: 2014-06-06 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks,

More information

Enterprise Guest Access

Enterprise Guest Access Data Sheet Published Date July 2015 Service Overview Whether large or small, companies have guests. Guests can be virtually anyone who conducts business with the company but is not an employee. Many of

More information

Junos Pulse Access Control Service

Junos Pulse Access Control Service Junos Pulse Access Control Service Odyssey Access Client Feature Guide Release 5.0 Published: 2013-11-18 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Mac OS X Quick Start Guide

Mac OS X Quick Start Guide Mac OS X Quick Start Guide Modified: 2018-04-03 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, the Juniper Networks logo, Juniper,

More information

Security Director. Security Director Installation and Upgrade Guide. Modified: Copyright 2017, Juniper Networks, Inc.

Security Director. Security Director Installation and Upgrade Guide. Modified: Copyright 2017, Juniper Networks, Inc. Security Director Security Director Installation and Upgrade Guide Modified: 20170831 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 4087452000 www.juniper.net Copyright 2017

More information

Junos OS. J-Web User Guide for Security Devices. Modified: Copyright 2017, Juniper Networks, Inc.

Junos OS. J-Web User Guide for Security Devices. Modified: Copyright 2017, Juniper Networks, Inc. Junos OS J-Web User Guide for Security Devices Modified: 2017-10-25 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, the Juniper

More information

Pulse Policy Secure. Guest Access Solution Guide. Product Release 5.4R1

Pulse Policy Secure. Guest Access Solution Guide. Product Release 5.4R1 Pulse Policy Secure Guest Access Solution Guide Product Release 5.4R1 Document 1.0 Published May 2017 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose, CA 95134 www.pulsesecure.net Pulse Secure and

More information

Junos OS. J-Web User Guide. Modified: Copyright 2018, Juniper Networks, Inc.

Junos OS. J-Web User Guide. Modified: Copyright 2018, Juniper Networks, Inc. Junos OS J-Web User Guide Modified: 2017-04-10 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, the Juniper Networks logo, Juniper,

More information

Junos Space Network Management Platform

Junos Space Network Management Platform Junos Space Network Management Platform Getting Started Guide Release 17.1 Modified: 2017-07-18 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

Juniper Secure Analytics Log Event Extended Format Guide

Juniper Secure Analytics Log Event Extended Format Guide Juniper Secure Analytics Log Event Extended Format Guide Release 7.3.0 Modified: 2017-09-13 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Copyright

More information

Flow Monitoring Feature Guide for EX9200 Switches

Flow Monitoring Feature Guide for EX9200 Switches Flow Monitoring Feature Guide for EX9200 Switches Modified: 2017-01-24 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, Junos, Steel-Belted

More information

Security Director. Security Director Installation and Upgrade Guide. Modified: Copyright 2018, Juniper Networks, Inc.

Security Director. Security Director Installation and Upgrade Guide. Modified: Copyright 2018, Juniper Networks, Inc. Security Director Security Director Installation and Upgrade Guide Modified: 20180327 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 4087452000 www.juniper.net Juniper Networks,

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics WinCollect User Guide Release 2014.4 Published: 2015-02-23 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved.

More information

Pulse Policy Secure. UAC Interoperability with the ScreenOS Enforcer. Product Release 5.1. Document Revision 1.0 Published:

Pulse Policy Secure. UAC Interoperability with the ScreenOS Enforcer. Product Release 5.1. Document Revision 1.0 Published: Pulse Policy Secure UAC Interoperability with the ScreenOS Enforcer Product Release 5.1 Document Revision 1.0 Published: 2015-02-10 2015 by Pulse Secure, LLC. All rights reserved Pulse Secure, LLC 2700

More information

vmx Getting Started Guide for Microsoft Azure Release 17.4 Modified: Copyright 2018, Juniper Networks, Inc.

vmx Getting Started Guide for Microsoft Azure Release 17.4 Modified: Copyright 2018, Juniper Networks, Inc. vmx Getting Started Guide for Microsoft Azure Release 17.4 Modified: 2018-01-31 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks,

More information

Web Device Manager Guide

Web Device Manager Guide Juniper Networks EX2500 Ethernet Switch Web Device Manager Guide Release 3.0 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408-745-2000 www.juniper.net Part Number: 530-029704-01,

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Risk Manager Getting Started Guide Release 2014.5 Modified: 2015-10-27 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All

More information

Junos OS. NETCONF Java Toolkit Developer Guide. Modified: Copyright 2017, Juniper Networks, Inc.

Junos OS. NETCONF Java Toolkit Developer Guide. Modified: Copyright 2017, Juniper Networks, Inc. Junos OS NETCONF Java Toolkit Developer Guide Modified: 2017-08-11 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, the Juniper

More information

Juniper Extension Toolkit Applications Guide

Juniper Extension Toolkit Applications Guide Juniper Extension Toolkit Applications Guide Modified: 2018-10-23 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, the Juniper Networks

More information

Device Security Feature Guide for EX9200 Switches

Device Security Feature Guide for EX9200 Switches Device Security Feature Guide for EX9200 Switches Release 16.2 Modified: 2016-11-02 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks,

More information

Juniper Extension Toolkit Applications Guide

Juniper Extension Toolkit Applications Guide Juniper Extension Toolkit Applications Guide Modified: 2017-05-06 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, Junos, Steel-Belted

More information

Junos Space. Network Director API. Release 3.0. Modified: Copyright 2017, Juniper Networks, Inc.

Junos Space. Network Director API. Release 3.0. Modified: Copyright 2017, Juniper Networks, Inc. Junos Space Network Director API Release 3.0 Modified: 2017-05-17 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved. Juniper Networks,

More information

Infoblox Authenticated DHCP

Infoblox Authenticated DHCP Infoblox Authenticated DHCP Unified Visitor Management amigopod Technical Note Revision 1.1 5 July 2010 United States of America +1 (888) 590-0882 Europe, Middle East & Asia +34 91 766 57 22 Australia

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page

More information

Juniper Secure Analytics

Juniper Secure Analytics Juniper Secure Analytics Installation Guide Release 2014.4 Modified: 2016-04-12 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved.

More information

Vendor: Juniper. Exam Code: JN Exam Name: Junos Pulse Access Control, Specialist (JNCIS-AC) Version: Demo

Vendor: Juniper. Exam Code: JN Exam Name: Junos Pulse Access Control, Specialist (JNCIS-AC) Version: Demo Vendor: Juniper Exam Code: JN0-314 Exam Name: Junos Pulse Access Control, Specialist (JNCIS-AC) Version: Demo QUESTION: 1 A user signs into the Junos Pulse Access Control Service on a wired network. The

More information

Junos OS. Unified Access Control Solution Guide for SRX Series Services Gateways. Release Junos Pulse Access Control Service 4.2/Junos OS 12.

Junos OS. Unified Access Control Solution Guide for SRX Series Services Gateways. Release Junos Pulse Access Control Service 4.2/Junos OS 12. Junos OS Unified Access Control Solution Guide for SRX Series Services Gateways Release Junos Pulse Access Control Service 4.2/Junos OS 12.1 Published: 2012-04-03 Juniper Networks, Inc. 1194 North Mathilda

More information

Pulse Policy Secure. Identity-Based Admission Control with Check Point Next-Generation Firewall Deployment Guide. Product Release 9.0R1 Document 1.

Pulse Policy Secure. Identity-Based Admission Control with Check Point Next-Generation Firewall Deployment Guide. Product Release 9.0R1 Document 1. Pulse Policy Secure Identity-Based Admission Control with Check Point Next-Generation Firewall Deployment Guide Product Release 9.0R1 Document 1.0 Published 10 May 2018 Pulse Secure, LLC 2700 Zanker Road,

More information

ForeScout Extended Module for MobileIron

ForeScout Extended Module for MobileIron Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Pulse Policy Secure. IC Series to MAG Series Hardware Migration Guide. Product Release 5.2. Document Revision 1.0. Published:

Pulse Policy Secure. IC Series to MAG Series Hardware Migration Guide. Product Release 5.2. Document Revision 1.0. Published: Pulse Policy Secure IC Series to MAG Series Hardware Migration Guide Product Release 5.2 Document Revision 1.0 Published: 2015-03-31 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose, CA 95134 http://www.pulsesecure.net

More information

Junos OS. IDP Series Appliance to SRX Series Services Gateway Migration Guide. Modified: Copyright 2017, Juniper Networks, Inc.

Junos OS. IDP Series Appliance to SRX Series Services Gateway Migration Guide. Modified: Copyright 2017, Juniper Networks, Inc. Junos OS IDP Series Appliance to SRX Series Services Gateway Migration Guide Modified: 2017-11-15 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Guest Access User Interface Reference

Guest Access User Interface Reference Guest Portal Settings, page 1 Sponsor Portal Application Settings, page 17 Global Settings, page 24 Guest Portal Settings Portal Identification Settings The navigation path for these settings is Work Centers

More information

TECHNICAL NOTE MSM & CLEARPASS HOW TO CONFIGURE HPE MSM CONTROLLERS WITH ARUBA CLEARPASS VERSION 3, JUNE 2016

TECHNICAL NOTE MSM & CLEARPASS HOW TO CONFIGURE HPE MSM CONTROLLERS WITH ARUBA CLEARPASS VERSION 3, JUNE 2016 HOW TO CONFIGURE HPE MSM CONTROLLERS WITH ARUBA CLEARPASS VERSION 3, JUNE 2016 CONTENTS Introduction... 5 MSM and AP Deployment Options... 5 MSM User Interfaces... 6 Assumptions... 7 Network Diagram...

More information

Cloud Secure Integration with ADFS. Deployment Guide

Cloud Secure Integration with ADFS. Deployment Guide Cloud Secure Integration with ADFS Deployment Guide Product Release 8.3R3 Document Revisions 1.0 Published Date October 2017 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose CA 95134 http://www.pulsesecure.net

More information

Junos Pulse Access Control Service

Junos Pulse Access Control Service Junos Pulse Access Control Service RADIUS Server Management Guide Release 4.4 Published: 2013-02-15 Part Number: Juniper Networks, Inc. 1194 rth Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

vmx Getting Started Guide for AWS Release 15.1F6 Modified: Copyright 2018, Juniper Networks, Inc.

vmx Getting Started Guide for AWS Release 15.1F6 Modified: Copyright 2018, Juniper Networks, Inc. vmx Getting Started Guide for AWS Release 15.1F6 Modified: 2018-03-16 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, the Juniper

More information

Third-Party Network Devices with Scripting Service in the SRC Network

Third-Party Network Devices with Scripting Service in the SRC Network Third-Party Network Devices with Scripting Service in the SRC Network Modified: 2015-06-23 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights

More information

ForeScout Extended Module for Tenable Vulnerability Management

ForeScout Extended Module for Tenable Vulnerability Management ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support

More information

Configure Guest Access

Configure Guest Access Cisco ISE Guest Services, on page 1 Guest and Sponsor Accounts, on page 2 Guest Portals, on page 13 Sponsor Portals, on page 25 Monitor Guest and Sponsor Activity, on page 35 Guest Access Web Authentication

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Service Automation Monitoring and Troubleshooting

Service Automation Monitoring and Troubleshooting Service Automation Monitoring and Troubleshooting Release 16.2R1 Modified: 2017-02-22 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights

More information

Junos Snapshot Administrator in Python

Junos Snapshot Administrator in Python Junos Snapshot Administrator in Python Junos Snapshot Administrator in Python Guide Release 1.0 Modified: 2017-04-05 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000

More information

Videoscape Distribution Suite Software Installation Guide

Videoscape Distribution Suite Software Installation Guide First Published: August 06, 2012 Last Modified: September 03, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800

More information

Junos Space. Junos Space Frequently Asked Questions. Release Modified: Copyright 2016, Juniper Networks, Inc.

Junos Space. Junos Space Frequently Asked Questions. Release Modified: Copyright 2016, Juniper Networks, Inc. Junos Space Junos Space Frequently Asked Questions Release 14.1 Modified: 2016-06-30 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All rights reserved.

More information

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2 Forescout Version 1.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Junos Pulse Secure Access Service

Junos Pulse Secure Access Service Junos Pulse Secure Access Service License Management Guide Release 7.4 Published: 2014-03-03 Part Number:, Revision 1 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

H3C SecBlade SSL VPN Card

H3C SecBlade SSL VPN Card H3C SecBlade SSL VPN Card Super Administrator Web Configuration Guide Hangzhou H3C Technologies Co., Ltd. http://www.h3c.com Document version: 5PW105-20130801 Copyright 2003-2013, Hangzhou H3C Technologies

More information

Optimal Gateway Selection for Pulse Connect Secure with Pulse Secure Virtual Traffic Manager

Optimal Gateway Selection for Pulse Connect Secure with Pulse Secure Virtual Traffic Manager Optimal Gateway Selection for Pulse Connect Secure with Pulse Secure Virtual Traffic Manager Deployment Guide Published 14 December, 2017 Document Version 1.0 Optimal Gateway Selection for Pulse Connect

More information

Pulse Secure Mobile Android Release 6.3.0

Pulse Secure Mobile Android Release 6.3.0 Pulse Secure Mobile Android Release 6.3.0 Pulse Secure Mobile 6.3R1 for Android (build # 6.3.0. r235864.19) Pulse Secure Client Release 6.3R1 Document Revision 1.0 Published: 2017-07-10 2017 by Pulse Secure,

More information

Getting Started with NFX250 Network Services Platform

Getting Started with NFX250 Network Services Platform Getting Started with NFX250 Network Services Platform Modified: 2017-08-11 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, the

More information

User Identity Sources

User Identity Sources The following topics describe Firepower System user identity sources, which are sources for user awareness. These users can be controlled with identity and access control policies: About, on page 1 The

More information

Juniper Exam JN0-314 Junos Pulse Access Control, Specialist (JNCIS-AC) Version: 7.0 [ Total Questions: 222 ]

Juniper Exam JN0-314 Junos Pulse Access Control, Specialist (JNCIS-AC) Version: 7.0 [ Total Questions: 222 ] s@lm@n Juniper Exam JN0-314 Junos Pulse Access Control, Specialist (JNCIS-AC) Version: 7.0 [ Total Questions: 222 ] Topic 1, Volume A Question No : 1 - (Topic 1) A customer wants to create a custom Junos

More information

User Role Firewall Policy

User Role Firewall Policy User Role Firewall Policy An SRX Series device can act as an Infranet Enforcer in a UAC network where it acts as a Layer 3 enforcement point, controlling access by using IP-based policies pushed down from

More information

Configure Guest Access

Configure Guest Access Cisco ISE Guest Services, page 1 Guest and Sponsor Accounts, page 2 Guest Portals, page 15 Sponsor Portals, page 30 Monitor Guest and Sponsor Activity, page 42 Guest Access Web Authentication Options,

More information

Junos OS. ICMP Router Discovery Protocol Feature Guide. Modified: Copyright 2017, Juniper Networks, Inc.

Junos OS. ICMP Router Discovery Protocol Feature Guide. Modified: Copyright 2017, Juniper Networks, Inc. Junos OS ICMP Router Discovery Protocol Feature Guide Modified: 2017-12-12 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, the

More information

Enforced Client Policy & Reporting Server (EPRS) 2.3. Administration Guide

Enforced Client Policy & Reporting Server (EPRS) 2.3. Administration Guide Enforced Client Policy & Reporting Server (EPRS) 2.3 Copyright 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell, the

More information

Pulse Secure Desktop Client

Pulse Secure Desktop Client Pulse Secure Desktop Client Always-on VPN and VPN Only Access Deployment Guide Published Document Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose, CA 95134 www.pulsesecure.net Pulse Secure and the

More information

Silver Peak EC-V and Microsoft Azure Deployment Guide

Silver Peak EC-V and Microsoft Azure Deployment Guide Silver Peak EC-V and Microsoft Azure Deployment Guide How to deploy an EC-V in Microsoft Azure 201422-001 Rev. A September 2018 2 Table of Contents Table of Contents 3 Copyright and Trademarks 5 Support

More information

Dell Storage Compellent Integration Tools for VMware

Dell Storage Compellent Integration Tools for VMware Dell Storage Compellent Integration Tools for VMware Version 4.0 Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your

More information

Cloud Analytics Engine Feature Guide for the QFX Series

Cloud Analytics Engine Feature Guide for the QFX Series Cloud Analytics Engine Feature Guide for the QFX Series Modified: 2017-02-16 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net Juniper Networks, Junos,

More information

Junosphere. Connector Guide. Release 2.4. Published: Revision 4. Copyright 2012, Juniper Networks, Inc.

Junosphere. Connector Guide. Release 2.4. Published: Revision 4. Copyright 2012, Juniper Networks, Inc. Junosphere Connector Guide Release 2.4 Published: 2012-07-24 Revision 4 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net This product includes

More information

IDP Detector Engine Release Notes

IDP Detector Engine Release Notes IDP Detector Engine Release Notes June 29, 2017 Contents Recent Release History................................................ 2 IDP Detector Engine Overview..........................................

More information

Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller

Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller Cisco TrustSec How-To Guide: Universal Configuration for the Cisco Wireless LAN Controller For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table

More information

ForeScout Extended Module for ArcSight

ForeScout Extended Module for ArcSight Version 2.8 Table of Contents About the ArcSight Integration... 4 Use Cases... 4 Send Endpoint Status, Compliance, or Property Changes from CounterACT to ArcSight... 5 SmartConnector Health and Compliance

More information

Virtual Appliance User s Guide

Virtual Appliance User s Guide Cast Iron Integration Appliance Virtual Appliance User s Guide Version 4.5 July 2009 Cast Iron Virtual Appliance User s Guide Version 4.5 July 2009 Copyright 2009 Cast Iron Systems. All rights reserved.

More information

EMC SourceOne for Microsoft SharePoint Version 7.1

EMC SourceOne for Microsoft SharePoint Version 7.1 EMC SourceOne for Microsoft SharePoint Version 7.1 Installation Guide 302-000-151 REV 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2009-2013

More information

PULSE CONNECT SECURE APPCONNECT

PULSE CONNECT SECURE APPCONNECT PULSE CONNECT SECURE APPCONNECT A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway Product Release 8.1 Document Revision 1.0 Published:

More information

Cisco TEO Adapter Guide for Microsoft Windows

Cisco TEO Adapter Guide for Microsoft Windows Cisco TEO Adapter Guide for Microsoft Windows Release 2.3 April 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800

More information

Pulse Secure Mobile Android

Pulse Secure Mobile Android Pulse Secure Mobile Android Release Notes Release, Build 7.1.0, r404441.b14 Published Date December 2018 Document Version 1.1 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose, CA 95134 https://www.pulsesecure.net

More information

Pulse Connect Secure Pulse Policy Secure

Pulse Connect Secure Pulse Policy Secure Pulse Connect Secure Pulse Policy Secure License Management Guide Product Release 8.2/5.3 Document Revision 1.0 Published: 2015-12-21 2015 by Pulse Secure, LLC. All rights reserved Pulse Secure, LLC 2700

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 15 Create an Identity Rule, page 15 Manage a Realm, page 20 Manage an Identity

More information

Dell License Manager Version 1.2 User s Guide

Dell License Manager Version 1.2 User s Guide Dell License Manager Version 1.2 User s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates either

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

Stonesoft Management Center. Release Notes Revision B

Stonesoft Management Center. Release Notes Revision B Stonesoft Management Center Release Notes 6.1.1 Revision B Table of contents 1 About this release...3 System requirements... 3 Build version...4 Compatibility... 5 2 New features...6 3 Enhancements...

More information

Pulse Secure Client for Chrome OS

Pulse Secure Client for Chrome OS Pulse Secure Client for Chrome OS Quick Start Guide Published March, 2018 Release 5.2r1 Version 1.6 2018 by Pulse Secure, LLC. All rights reserved 1 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose,

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Authentication and Enforcement Using SRX Series Services Gateways and Aruba ClearPass Policy Manager Modified: 2016-08-01 Juniper Networks, Inc. 1133 Innovation

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 14 Create an Identity Rule, page 15 Manage a Realm, page 17 Manage an Identity

More information

Dell Storage Compellent Integration Tools for VMware

Dell Storage Compellent Integration Tools for VMware Dell Storage Compellent Integration Tools for VMware Administrator s Guide Version 3.1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your

More information

VI. Corente Services Client

VI. Corente Services Client VI. Corente Services Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 II. Corente Client Configuration...

More information

Pulse Secure Desktop Client

Pulse Secure Desktop Client Pulse Secure Desktop Client Administration Guide Product Release 5.2R5 Document Revision 4.0 Published: 2016-09-06 2016 by Pulse Secure, LLC. All rights reserved 2700 Zanker Road, Suite 200 San Jose, CA

More information