HP 700wl Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Logiciel HP 700wl. HP 700wl User's Manual Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 388
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs

Résumé du contenu

Page 1

www.hp.com/go/hpprocurve HP ProCurve Secure Access 700wl Series Management and Configuration Guide

Page 2

Appendix D Appendix E Index of Commands Index Optional Elements C-5 Logon Page Template — A More Advanced Example C-7 Example 2 C-7 Changing the L

Page 3 - CONFIGURATION GUIDE

Configuring Rights » To delete a Location, click the trash can icon at the end of the row. » To create a new Location, click the New Location... but

Page 4

Configuring Rights Time Windows A Time Window is a specification of a period of time, defined by specific dates or date ranges, days of the week, and

Page 5 - CONTENTS

Configuring Rights Creating or Editing a Time Window To create a new Time Window, click New Time Window... at the bottom of the Time Window list. The

Page 6 - Chapter 3 System Status

Configuring Rights Table 4-14. New Time Window Settings Setting Description Valid Days Specify a Time Window by days of the week: • The default is

Page 7

Configuring Rights Figure 4-21. The Access Policies Page The 700wl Series system provides five predefined Access Policies, and a Rights Administrator

Page 8

Configuring Rights Table 4-15. Access Policies Table Contents Column Description Allowed Traffic | Grid A list of the Allowed Traffic Filters selec

Page 9

Configuring Rights Figure 4-22. Access Policies and Allowed Traffic Filters in a Grid Format Each row represents an Access Policy. The Allowed Traffi

Page 10

Configuring Rights Figure 4-23. Access Policies and Redirected Traffic Filters in a Grid Format Each row represents an Access Policy. The Redirected

Page 11 - PREFACE

Configuring Rights Figure 4-24. Creating a New Access Policy, the Settings Tab To create or edit an Access Policy, Step 1. Type a name for the polic

Page 12 - Document Organization

Configuring Rights To add the modified Access Policy as a new Access Policy, leaving the original Access Policy unchanged, click Save As Copy. The Sav

Page 13 - Appendices

PREFACE This preface describes the audience, use, and organization of the Management and Configuration Guide. It also outlines the document convention

Page 14 - Related Publications

Configuring Rights Table 4-16. New Access Policy Settings Tab Contents Column Description VLAN Identifier How a VLAN Identifier (tag) should be han

Page 15 - INTRODUCTION

Configuring Rights Table 4-16. New Access Policy Settings Tab Contents Column Description Key Length (PPTP only) For PPTP, the minimum MPPE (RC4) s

Page 16 - Introduction

Configuring Rights address is valid if it falls within that address range. If the address does not fall within the port’s address range, NAT is used,

Page 17 - 700wl Series Functions

Configuring Rights The Allowed Traffic Tab Allowed Traffic filters are traffic filters that identify packets that are permitted to be forwarded by an

Page 18 - Roaming Support

Configuring Rights Figure 4-25. Creating an Access Policy, the Allowed Filters Tab Note that if the filter you select is one of a DNS or WINS filter

Page 19 - Network Address Translation

Configuring Rights The Allowed Traffic list shows all existing Allowed Traffic filters. These are displayed in alphabetical order if you are creating

Page 20 - VLAN Tag Support

Configuring Rights Table 4-18. Predefined Allowed Traffic Filters Allowed Traffic Filter Description Internal rights UI Allows access to the Rights

Page 21 - SING THE 700WL SERIES SYSTEM

Configuring Rights Figure 4-26. Creating an Access Policy, the Redirected Traffic Tab The Redirected Traffic list shows the following information abo

Page 22

Configuring Rights Note: Redirected Traffic filters are evaluated in the order that they appear in the Redirected traffic list of each Access Policy.

Page 23 - Centralized Administration

Configuring Rights Table 4-20. Predefined Redirected Traffic Filters Redirected Traffic Filter Description No internal IAM UI Redirects Integrated

Page 24

The following notices and icons are used to alert you to important information. Table 2. Notices Icon Notice Type Alerts you to... None Note Help

Page 25 - Using Online Help

Configuring Rights To configure automatic HTTP Proxy filtering for this Access Policy, select the HTTP Proxy tab, as shown in Figure 4-27, and select

Page 26 - Logging Out

Configuring Rights Table 4-21. HTTP Proxy Tab Field Definitions Field/Column Description • Allow FQDN Accept HTTP traffic destined for the specifi

Page 27

Configuring Rights The Bandwidth Tab 700wl Series system version 4.0 provides the ability to limit the bandwidth available to each client to prevent n

Page 28

Configuring Rights Bandwidth Rate Limiting in the 700wl Series system 700wl Series system version 4.0 provides bandwidth rate limiting (or “policing”)

Page 29

Configuring Rights The Linger Timeout The Linger timeout enables the 700wl Series system to force a logoff for clients that have disconnected from the

Page 30

Configuring Rights Figure 4-29. Creating an Access Policy, the Timeout Tab The fields under the Timeout tab are as follows: Table 4-23. Timeout Tab

Page 31 - Left Panel

Configuring Rights Table 4-23. Timeout Tab Field Definitions Field Description Never force users to Allows client sessions to remain connected inde

Page 32 - Main Panel

Configuring Rights Figure 4-30. The Allowed Traffic Filters List The Allowed Traffic list shows the Allowed Traffic filters in alphabetical order, an

Page 33

Configuring Rights » To delete a filter, click the trash can icon at the end of the row. » To create a new filter, click the New Filter... button at

Page 34

Configuring Rights To create or edit an Allowed Traffic filter, do the following: Step 1. Type a name for this filter. You can change the name of an

Page 35 - Common Buttons

Chapter 6–Configuring the Network This chapter describes how to configure the 700wl Series system components so that they work with your enterprise n

Page 36

Configuring Rights Redirected Traffic Filters Redirected Traffic filters are traffic filters that identify packets sent from a client that should be r

Page 37 - System Features and Concepts

Configuring Rights The Redirected Traffic list shows the Redirected Traffic filters in alphabetical order, and includes the following information abou

Page 38 - Enterprise Class Redundancy

Configuring Rights Figure 4-33. Creating a New Redirected Traffic Filter You can create the filter specification in one of two ways: • Specify the t

Page 39

Configuring Rights b. If the protocol requires a destination port, type it into the Port field. If the protocol does not support port specifications,

Page 40 - Bandwidth Management

Configuring Rights Click Cancel to return to the previous page without making any further changes. Built-in and User-defined Address Variables For use

Page 41

Configuring Rights Table 4-26. Predefined Address Variables Address Variable Value/Description @INTERNAL@. The address of the Access Control Server

Page 42

Configuring Rights Table 4-27. Edit Address fields Field Definition Name The name of the variable. May be up to 32 uppercase alphabetic characters

Page 43 - Layer 3 Roaming Support

Configuring Rights Figure 4-36. WINS Filters List The Filter list shows the DNS or WINS filter pairs in alphabetical order, and includes the followin

Page 44

Configuring Rights The Edit Filter pages are almost identical to the New Filter pages, except that the name, description, and server definitions are d

Page 45

Configuring Rights the list, using the multi-select mechanism supported by your browser (typically Ctrl-click and Shift-click). The 700wl Series syste

Page 46 - VLANs and IP Addressing

Index of Commands The Index of Commands is an alphabetized list of the CLI commands with references to the pages where they are documented. Related Pu

Page 47

Configuring Rights Figure 4-38. HTTP Proxy Filters List The HTTP Proxy list shows the HTTP Proxy filters in alphabetical order, and includes the foll

Page 48

Configuring Rights The Edit Filter: HTTP Proxy Traffic page is almost identical to the New Filter page, except that the name, description, and the fil

Page 49 - SYSTEM STATUS

Configuring Rights Table 4-30. HTTP Proxy Filter Types Filter Rule Type Description • Allow Reg Accepts HTTP traffic to a destination specified as

Page 50

Configuring Rights Example–Modifying the —Guest Access“ Access Policy The following sections provide examples of how to modify access rights by editin

Page 51 - Viewing Equipment Status

Configuring Rights Step 2. In the Access Policy column of the table, click Guest Access to display the Edit Access Policy page for the Guest Access A

Page 52 - Row Description

Configuring Rights Figure 4-41. The Allowed Traffic filters for the Guest Access Access Policy Step 4. Find the row for the Outside World filter, as

Page 53 - Figure 3-4

Configuring Rights Modifying the Outside World Filter to Restrict Access If the Outside World Allowed Traffic filter is not sufficiently restrictive f

Page 54 - Controller, grouped by slot

Configuring Rights See Appendix B, “Filter Expression Syntax” for details of the tcpdump syntax. Note: Tcpdump syntax is case sensitive. All keywords

Page 55 - Viewing Client Status

Configuring Rights Figure 4-43. Configuring Proxy Filters to limit access for the Guest Access Access Policy Step 3. To create the filters you need,

Page 56

5 CONFIGURING AUTHENTICATION This chapter describes how clients are authenticated through the 700wl Series system, and explains how to configure authe

Page 57 - Viewing Client Details

1 INTRODUCTION This chapter provides a brief introduction to the 700wl Series system™ and its primary features. The topics covered in this chapter inc

Page 58 - Information Description

Configuring Authentication specification, determine a Connection Profile for the client. The client’s identity (who the client is) is determined throu

Page 59

Configuring Authentication client, the username and password is sent to the next service, and so on. If all services in the list fail to authenticate

Page 60 - Viewing Session Status

Configuring Authentication The Rights Manager The configuration of network Authentication Policies is done through the Rights module, accessed by clic

Page 61

Configuring Authentication Figure 5-1. The Authentication Policies Page The Authentication Policies table shows the currently defined Authentication

Page 62

Configuring Authentication Creating or Editing an Authentication Policy To create a new Authentication Policy, click the New Authentication Policy...

Page 63 - Viewing License Information

Configuring Authentication • To edit an Authentication Service, click the name of the service you want to edit, or click the pencil icon at the end o

Page 64 - System Status

Configuring Authentication Figure 5-3. The Authentication Services Page The Authentication Services table shows the currently defined Authentication

Page 65 - CONFIGURING RIGHTS

Configuring Authentication appears (see Figure 5-4). The page initially displays the configuration options for an LDAP Authentication Service. The Edi

Page 66

Configuring Authentication Figure 5-4 shows the configuration page for configuring an LDAP service with non-user binding. For many of the options on t

Page 67

Configuring Authentication The information required to configure an LDAP service for authentication is defined in the following tables. Table 5-3 defi

Page 68

Introduction Figure 1-1 illustrates a 700wl Series system topology that is configured with redundant Access Control Servers for failover. Figure 1-1.

Page 69

Configuring Authentication If you select Non-user bind, the remaining fields on the page are as follows: Table 5-4. LDAP Authentication Configuration

Page 70 - The Rights Assignment Table

Configuring Authentication » For detailed instructions for setting up an Active Directory server, see “Using the Active Directory LDAP Service” on pa

Page 71

Configuring Authentication To use User binding for authentication where the user logon ID is used as the DN, do the following: a. Select User bind fr

Page 72

Configuring Authentication Step 3. Specify some additional options for this LDAP server: a. The timeout value specifies the length of time the 700wl

Page 73

Configuring Authentication Then, do the following: Step 1. Because you are sending a password in the clear, make sure that you are using SSL. Step 2.

Page 74

Configuring Authentication Along with the authentication results, you can obtain the user’s group affiliation from the authentication process. The ret

Page 75 - Identity Profiles

Configuring Authentication Figure 5-6. Creating a New Authentication Service - Kerberos Step 5. Enter the information required to configure a Kerbero

Page 76

Configuring Authentication Configuring a RADIUS Authentication Service Note: The 700wl Series system Access Control Server must be configured as a RA

Page 77

Configuring Authentication The information required to configure the RADIUS service for authentication is defined in Table 5-8 as follows: Table 5-8.

Page 78

Configuring Authentication » To use a RADIUS service for accounting, you must configure a RADIUS server as an Authentication Service, and check the S

Page 79

Introduction Clients that are successfully authenticated, Employees in Figure 1-1, are typically associated with Access Policies that provide access t

Page 80

Configuring Authentication Field Data Acct-Session-ID The unique ID for this client session Acct-Session-Time The seconds this client was logged on

Page 81 - Creating or Editing a User

Configuring Authentication • The Rights Manager uses the group information and the start and stop times from the user profile to temporarily map the

Page 82

Configuring Authentication The information required to configure an XML-RPC authentication service is defined in Table 5-9 as follows: Table 5-9. XML

Page 83

Configuring Authentication These parameters are shown in Table 5-10: Table 5-10. Parameters for Authenticate Call Parameter Type Description userid

Page 84

Configuring Authentication Table 5-11. Name/value Pairs Returned by Authenticate Response Name Type Value and Description validTimes string An ar

Page 85

Configuring Authentication <value><string>Monday:Wednesday:Friday </string></value> </member> <member><name>

Page 86

Configuring Authentication enabled in any other Access Policies that may be in force when a client is required to reauthenticate. The Allowed Traffic

Page 87

Configuring Authentication • First, you must configure an LDAP Authentication Service to be used to retrieve the group identity information. You must

Page 88

Configuring Authentication Logon Page Customization The 700wl Series system Rights Manager provides default Logon, Logoff, Stop, and Guest Registratio

Page 89

Configuring Authentication Through the Rights Manager, you can customize the appearance of the Logon, Logoff and Stop pages in the following ways: •

Page 90 - Get MAC Addresses

Introduction • RADIUS servers • Kerberos services • XML-RPC-based services • The Rights Manager’s built-in database. This is the default authenti

Page 91

Configuring Authentication Customizing a Logon Page To create a new logon customization page, do the following: Step 1. From anywhere within the Righ

Page 92

Configuring Authentication Figure 5-12. New Logon Customization Page Customizing the Logo In the Logos section of the New/Edit Logon Customization pa

Page 93 - Connection Profiles

Configuring Authentication of a small screen. You can change this logo to be a small version of your own logo for use with small browsers. To change e

Page 94

Configuring Authentication Step 2. Place a check mark in the Allow users to specify authentication policies checkbox if you want users to choose a spe

Page 95

Configuring Authentication If you select the Guest Registration option, the Guest Registration page appears as shown in Figure 5-14. Figure 5-14. Gue

Page 96

Configuring Authentication network. However, if the user goes to the logon page again while he/she is still logged on, the logon page indicates that t

Page 97

Configuring Authentication Step 2. In the textbox labeled Stop Page Text enter the text you want to display on the Stop page. This can include HTML f

Page 98

Configuring Authentication Customized Page Templates If you want to create pages that are customized beyond the options provided on the Customize Web

Page 99 - Locations

Configuring Authentication Figure 5-17. Logon Customization: Custom Templates Step 4. In the appropriate field (Logon Page, Logoff Window, Stop Page,

Page 100

Configuring Authentication The page will redisplay showing the loaded image, see Figure 5-18. Note: The template images area shows ALL images availabl

Page 101 - Time Windows

Introduction Because the 700wl Series system identifies clients by MAC address, it is simple to detect when a device roams. A Linger Timeout determine

Page 102 - • The default is Any date

Configuring Authentication Step 7. To indicate that an image is to be used with the customized logon page you are creating, check the box to the left

Page 103 - Access Policies

Configuring Authentication Note: The User Rights Simulator does NOT show you the actual rights of a user who is currently logged on, but shows you th

Page 104 - Configuring Rights

Configuring Authentication Table 5-12. User Rights Simulator Fields Field Description Access Controller and Port The Access Controller, slot and po

Page 105

Configuring Authentication Figure 5-20. Rights for User —ann“ if Logged on at the Specified Time and Location The top portion of the Rights results s

Page 106

Configuring Authentication • If the Identity Profile is not what you expected: — For users in the built-in database, the user may have been assigned

Page 107

Configuring Authentication Figure 5-21. The XML Representation of User Rights Tracing Authentication Service Transactions The Transaction Tracer lets

Page 108

Configuring Authentication service is working correctly, the service should return a successful result, including the information associated with that

Page 109 - The Settings Tab

Configuring Authentication Figure 5-23. Results of a traced transaction The Result Parameters contain any parameters returned with the authentication

Page 110 - Column Description

Configuring Authentication » To Import or Export Rights, click the Tools and Options tab visible at the top of any Rights module page, then click the

Page 111

Configuring Authentication Figure 5-25. Rights Export in Progress page While the export is in progress, this page is refreshed every 15 seconds. • T

Page 113 - The Allowed Traffic Tab

Introduction Addressing in the 700wl Series System in Chapter 2, and Chapter 4, Configuring Rights include more extensive discussions of addressing co

Page 114 - DNS or WINS server

Configuring Authentication Figure 5-26. The Import/Export Rights page after a successful rights export Step 3. Under the Last Rights Export heading,

Page 115

Configuring Authentication • To stop the page refresh, click Stop Auto Refresh. • To cancel the import click Cancel. Step 3. When the import has co

Page 116 - The Redirected Traffic Tab

Configuring Authentication 5-54 HP ProCurve Secure Access 700wl Series Management and Configuration Guide

Page 117

6 CONFIGURING THE NETWORK This chapter describes how to configure the 700wl Series system components so that they work with your enterprise network. T

Page 118

Configuring the Network 700wl Series System Components When you first click on the Network icon the System Components page appears, as shown in Figure

Page 119 - The HTTP Proxy Tab

Configuring the Network From this list you can click a component name or click the pencil icon at the right of the row to edit the component’s name an

Page 120 - Field/Column Description

Configuring the Network DHCP (the default) will boot up and run properly without a shared secret configured, but Access Controllers will not be able t

Page 121

Configuring the Network Note: The IP address can be changed under the Network Setup tab, along with other network configuration settings. The fields

Page 122 - The Bandwidth Tab

Configuring the Network Table 6-2. Edit Access Control Server page field definitions Field/Option Description Redundancy Preferred Primary Access Co

Page 123 - The Timeout Tab

Configuring the Network Deleting a Peer Access Control Server You must disable redundancy by editing the Primary Access Control Server configuration b

Page 124 - The Reauthentication Timeout

2 USING THE 700WL SERIES SYSTEM This chapter provides a brief introduction to using the 700wl Series system and its Administrative Console. It also pr

Page 125 - Field Description

Configuring the Network Editing the Integrated Access Manager Configuration The Integrated Access Manager is typically configured with its network con

Page 126 - Allowed Traffic Filters

Configuring the Network The Edit Integrated Access Manager page appears as shown in Figure 6-4. Figure 6-4. Edit Integrated Access Manager page The f

Page 127

Configuring the Network Table 6-3. Edit Integrated Access Manager page field definitions Field/Option Description NAS-ID/Description A description

Page 128

Configuring the Network With the exception of the Access Control Server IP address and shared secret, Access Controllers are configured centrally from

Page 129

Configuring the Network Table 6-4. Edit Access Controller page fields Field/Checkbox Description Name An alphanumeric name for the Access Controlle

Page 130 - Redirected Traffic Filters

Configuring the Network You can modify an Access Controller’s name, administrator username and password, folder, SSH access permissions, and the Acces

Page 131

Configuring the Network Figure 6-6. New Folder Page » iconTo change the name of a folder, click the folder name in the System Components List, or cli

Page 132

Configuring the Network Configuring Failover with Redundant Access Control Servers Please read the section “Enterprise Class Redundancy” on page 2-18

Page 133

Configuring the Network Step 4. When you are ready to initiate the peer relationship and start the data synchronization process, check the Enable Red

Page 134

Configuring the Network • Under Network, only the System Components, Network Setup, Interfaces, and Date &Time tabs are available. • Under Maint

Page 135

Using the 700wl Series System • Primary and secondary DNS server addresses • Shared secret, used to enable Access Controllers or a peer Access Contr

Page 136 - DNS/WINS Filter Pairs

Configuring the Network » To access the Network Setup pages, click the Network icon in the Navigation Toolbar, then select the Network Setup tab. Net

Page 137

Configuring the Network Network Communication–the Basic Setup Tab To configure the basic network communication settings for a 700wl Series system comp

Page 138

Configuring the Network Edit the contents of the fields on this page as appropriate. The fields and their settings are defined in Table 6-5. Table 6-5

Page 139 - HTTP Proxy Filters

Configuring the Network Table 6-5. Basic Setup tab fields Field Description Secondary DNS The IP address of the secondary DNS server Primary WINS

Page 140

Configuring the Network Figure 6-9. Network Setup: Advanced Setup page for an Integrated Access Manager 6-22 HP ProCurve Secure Access 700wl Series

Page 141

Configuring the Network Access Control Server Configuration Advanced Options The following settings appear on this page if you are configuring an Acce

Page 142

Configuring the Network Access Controller Advanced Configuration Options The following settings appear on this page if you are configuring an Access C

Page 143

Configuring the Network The following are the specifications in tcpdump syntax for the predefined bridging options: Table 6-7. Tcpdump syntax for pre

Page 144

Configuring the Network the client’s rights. Depending on the Wireless Data Privacy mechanism and the type of addressing in force, the client’s existi

Page 145 - Step 4

Configuring the Network You can specify an external proxy server, or the 700wl Series system can act as the proxy server and handle the traffic accord

Page 146

Using the 700wl Series System The 700wl Series system provides three levels of administrator access: • A Network Administrator can configure the netw

Page 147

Configuring the Network available, the HTTP Proxy Server on the Access Controller will cycle to the next available IP address. Step 4. In the Proxy S

Page 148

Configuring the Network Figure 6-11. Network Settings: SSL Tab (Integrated Access Manager or Access Control Server only) The information at the top o

Page 149 - CONFIGURING AUTHENTICATION

Configuring the Network Requesting an SSL Certificate To generate an SSL Certificate Signing Request (CSR): Step 1. From the SSL tab, click Generate

Page 150 - Configuring Authentication

Configuring the Network Figure 6-13. The Certificate Signing Request You can use this certificate signing request either to request a certificate fro

Page 151

Configuring the Network Loading the SSL Certificate When you receive your certificate from the CA, you can either copy the certificate information and

Page 152 - Authentication Policies

Configuring the Network Save and Restore Private Key The CSR you generate is based on a private key. If the private key is lost or regenerated, any CS

Page 153

Configuring the Network Caution: Restoring a saved private key will invalidate an SSL certificate based on the current (different) private key. Restor

Page 154

Configuring the Network Figure 6-16. Example of a Port Connection Type selection list To configure a port for a specific connection type, do the foll

Page 155

Configuring the Network Note: If you want to set a port to half-duplex, but half-duplex is not offered as an option in the drop-down list, you will ne

Page 156

Configuring the Network uplink port so that the default uplink (slot 0 port 2 on a 700wl Series system) is now a downlink port, then that port will ap

Page 157

Using the 700wl Series System • Enable or disable Wireless Data Privacy protocols, configuring the address method and range for VPN tunneling, and co

Page 158

Configuring the Network configured to support routing the addresses you have configured for your ports through the Access Controller uplink port. For

Page 159 - Field/Option Description

Configuring the Network Figure 6-19. SNMP Page Step 2. Select the system component for which you want to enable SNMP from the System Components List.

Page 160 - If you select

Configuring the Network Note: Include a trap IP address only if you have an SNMP trap receiver listening for this information. HP proprietary SNMP tr

Page 161

Configuring the Network Figure 6-20. Date & Time Page Step 2. Using the System Components List on the left select the component for which you wis

Page 162

Configuring the Network The format for the date is MM/DD/YYYY. For example, June 4, 2003 would be entered as 06/04/2003. The format for the time is HH

Page 163

Configuring the Network Figure 6-21. Admin Setup page Step 2. Click New Admin... The New Admin page appears (see Figure 6-20). Figure 6-22. Admin S

Page 164

Configuring the Network Table 6-8. New/Edit Admin Fields Field Description Name A descriptive name that identifies the Administrator. It can be the

Page 165

Configuring the Network • To edit an administrator account, click the administrator’s Name or Username, which are links to the Edit Admin page, or cl

Page 166

Configuring the Network 6-46 HP ProCurve Secure Access 700wl Series Management and Configuration Guide

Page 167

7 SETTING UP WIRELESS DATA PRIVACY This chapter explains how to configure the global settings for the security protocols. The topics covered in this c

Page 168 - Using RADIUS for Accounting

Using the 700wl Series System Note: It is strongly recommended that you change the built-in administrator logon name and password as soon as possible

Page 169 - Accounting Packet Data

Setting up Wireless Data Privacy The encryption policy that defines how encryption applies to a specific client is determined through the Access Polic

Page 170

Setting up Wireless Data Privacy Figure 7-1. The Wireless Data Privacy tab Global Wireless Data Privacy Configuration Select the Wireless Data Privac

Page 171

Setting up Wireless Data Privacy The fields and settings under the Configuration for IPSEc heading of the Wireless Data Privacy tab are as follows: Ta

Page 172 - The Remote Profiles API

Setting up Wireless Data Privacy Table 7-1. IPSec configuration settings Field Description ESP Encryption Select the appropriate algorithms for ESP

Page 173

Setting up Wireless Data Privacy Figure 7-2. The IPSec Certificate Configuration tab By default the Current Certificate area of the page shows “No ce

Page 174

Setting up Wireless Data Privacy Step 3. Fill in the information in this form: a. Type the name in which the certificate should be granted. This can

Page 175 - NT Domain Logon

Setting up Wireless Data Privacy Step 6. Copy and paste the generated PKCS#10 certificate request, including the lines ----BEGIN CERTIFICATE REQUEST-

Page 176 - External Identity Retrieval

Setting up Wireless Data Privacy You may need to enter the request ID or confirmation information you received when you submitted your certificate req

Page 177

Setting up Wireless Data Privacy Figure 7-7. The Load Certificates page Step 12. Copy and paste the two certificates from your CA’s web site into the

Page 178 - Logon Page Customization

Setting up Wireless Data Privacy Figure 7-8. The Certificates tab showing an installed certificate Step 13. Immediately create and save a backup of y

Page 179

Using the 700wl Series System — Links within the page contents — Related Topics menu displayed using the Related Topics button Related Topics links:

Page 180 - Customizing a Logon Page

Setting up Wireless Data Privacy The default is to have addresses assigned by a DHCP server. » To configure the IP Address assignment method for the

Page 181 - Customizing the Logo

Setting up Wireless Data Privacy • The first DHCP request is taken to be a request for an outer tunnel address, and NAT is ALWAYS used, even if the A

Page 182

Setting up Wireless Data Privacy 7-14 HP ProCurve Secure Access 700wl Series Management and Configuration Guide

Page 183 - Guest Registration

8 SYSTEM MAINTENANCE This chapter explains how to perform common administrative tasks including creating, storing, and restoring a back up file, updat

Page 184 - Logoff Page Option

System Maintenance Figure 8-1. Software Setup page Step 2. From the System Components list in the left panel, select the component (Access Control Se

Page 185 - Customizing the Stop Page

System Maintenance Access Controller and using the Wireless Data Privacy protocols will temporarily lose their connections, and any remote CLI session

Page 186

System Maintenance Figure 8-2. The Update Software page From the Remote Update page you can initiate a software update from a remote FTP, TFTP, or HT

Page 187 - Customized Page Templates

System Maintenance Remote Update The information that is required to update the software image from a remote site is described in Table 8-2. Table 8-2

Page 188

System Maintenance If you want to check for upgrades on an alternate download site, you must enter the appropriate URL. Step 2. Click Check for Upgra

Page 189

System Maintenance Select Continue to proceed with the upgrade, or Cancel to return to the previous page without proceeding. Note: If your currently i

Page 190 - Tools and Options

Using the 700wl Series System Using the Administrative Console When you first logon to the Administrative Console, your browser displays the Equipment

Page 191

System Maintenance If you enable Auto Refresh, the status page refreshes approximately every 15 seconds, displaying updated status information. After

Page 192

System Maintenance Variable Value update_file Filename (including the path) of the software image Please contact HP ProCurve Technical Support for i

Page 193

System Maintenance Step 2. In the 700wl Series system Administrative Console, under Maintenance/Software Update, select the Local Update tab to displ

Page 194

System Maintenance Figure 8-5. The Local Update Tab of the Update Software Function Step 3. In the Uploaded Software Versions table, select the row

Page 195

System Maintenance Step 6. In the .vdist File field, type the full path and name of the distribution file you downloaded, or click Browse to locate t

Page 196

System Maintenance Caution: Restarting an Access Control Server or Integrated Access Manager will log off all clients on all Access Controllers. If po

Page 197

System Maintenance Note: You cannot restore from the internal backup image. You can only restore from an external file. Therefore, you must save the b

Page 198 - Exporting Rights

System Maintenance Figure 8-8. Backup Confirmation Click Continue to proceed, or Cancel to return to the Backup & Restore page without creating t

Page 199

System Maintenance Figure 8-10. Backup & Restore page after a successful backup » To save the backup to a file, click Save Backup As... This in

Page 200 - Importing Rights

System Maintenance Figure 8-11. Restore In Progress Confirmation Step 3. To proceed with the restore, click Continue. As part of the restore operatio

Page 201

Using the 700wl Series System Figure 2-4. Header and Navigation Bars for an Access Control Server Information at the right side of the Header bar sho

Page 202

System Maintenance Warning: DO NOT restore a backup to a duplicate Access Control Server that is connected to the same network as the original Access

Page 203 - CONFIGURING THE NETWORK

System Maintenance Figure 8-12. The Shutdown/Restart tab Restarting a System Component Restarting a component will briefly shutdown the unit, then re

Page 204 - The System Components List

System Maintenance Figure 8-13. Restart Confirmation Step 3. To proceed with the restart, click Continue. To cancel the restart, click Cancel. Shutti

Page 205 - Configuring the Network

System Maintenance Step 3. To proceed with the shutdown, click Continue. To cancel the shutdown, click Cancel. Resetting to Factory Default Settings R

Page 206

System Maintenance restore your configuration, you must restore from a backup image that was created and saved to an external file before the reset. A

Page 207

9 LOGS This chapter presents tasks you can perform with these types of logging. Viewing 700wl Series System Logs . . . . . . . . . . . . . . . . . .

Page 208

Logs Figure 9-1. Log file display The Log File display table shows the log entries that exist at the moment you request the display. By default, the

Page 209

Logs The log file display itself shows the following information: Table 9-2. Log file display Column Description (empty) This column is used to cal

Page 210 - » To ed

Logs — Categories: All Categories (default), Error, Info, Debug, Function Trace, Object Trace, Session Log. This is a multiple selection box—by using

Page 211

Logs Figure 9-2. Setting Up Session Logging Step 2. Type the information and select options as defined in Table 9-3. Table 9-3. Logging Setup Fields

Page 212

Using the 700wl Series System For details, refer to Chapter 4, Configuring Rights and Chapter 5, Configuring Authentication. Network The Network pages

Page 213

Logs Note: Accurate time and date reporting is necessary for accurate and useful logs. To set the time and date, use the Date & Time tab in the N

Page 214 - Field/Checkbox Description

Logs Table 9-4. Session Log information Data Item Definition Actual Destination The actual destination IP address and port, if redirected or tunnel

Page 215

Logs 9-8 HP ProCurve Secure Access 700wl Series Management and Configuration Guide

Page 216 - Folders vs. Locations

A COMMAND LINE INTERFACE This appendix documents the commands that are available on the serial console as part of the Command Line Interface (CLI). Th

Page 217

Command Line Interface Accessing the Command Line Interface There are two ways to access the Command Line Interface—either by directly connecting a se

Page 218

Command Line Interface Command Syntax You may see a variety of symbols shown as part of the command syntax. These symbols explain how to enter the com

Page 219 - Disabling Redundancy

Command Line Interface This produces the following output: "add" commands: add bridging ... Add bridging options add snmpmanager ... Add a

Page 220

Command Line Interface set superadmin pass | enable | disable <login> Set the password for a superadmin. Enable or disable a superadmin login. p

Page 221

Command Line Interface show policyadmin [<login>] Show a specific policyadmin by specifying a login, or list all policy admins by not specifying

Page 222 - Table 6-5

Command Line Interface 00:e0:18:7d:b5:3d 10.205.2.25 4 hrs, 50 mins show id Displays this system’s ID, which is the MAC address of Slot 0 port 1. On

Page 223

HP PROCURVE SECURE ACCESS 700WL SERIES MANAGEMENT AND CONFIGURATION GUIDE

Page 224

Using the 700wl Series System . Status Rights Network VPN Maintenance Logs • Equipment • Rights Setup • System • Wireless Data • Softwar

Page 225 - DHCP Network for NAT Clients

-------------------- --------------------Command Line Interface show deviceport <device> Shows the port or slot and port for a device. <dev

Page 226 - Bridging

Command Line Interface Network Configuration Commands set hostname <hostname> Note: This command is supported on the Access Control Server or In

Page 227 - Client Polling

Command Line Interface show ip Shows the current IP configuration. Output from this command looks similar to the following: Hostname: Domain Name: xy

Page 228 - Forward IP Broadcasts

Command Line Interface set dns <primary-ip-address> [<secondary-ip-address>] Note: This command is supported on the Access Control Server

Page 229

Command Line Interface Sets the IP addresses of the WINS servers. <primary-ip-address> The IP address of the primary WINS server for the system

Page 230 - SSL Certificate

Command Line Interface set portmedia {<port> | <slot>/<port>} "<media> [<media-option>]" Sets the port media

Page 231

Command Line Interface show portip Displays the current IP address and netmask settings, if set, for all ports in the system. Output from this command

Page 232

Command Line Interface Note: This command is not available on an Integrated Access Manager. Advanced Network Configuration Status show bridging Shows

Page 233

Command Line Interface show ac [mac <mac-address>] Shows Access Controller settings for one or all Access Controllers connected to the Access Co

Page 234 - Loading the SSL Certificate

---- ---- ---- Command Line Interface show redundancy Shows the current redundancy (failover) settings. For example: show redundancy Redundancy config

Page 235 - Save and Restore Private Key

Using the 700wl Series System Left Panel The left panel contains explanatory or descriptive text about the page and its functions. It also contains co

Page 236

Command Line Interface Advanced Network Configuration set natdhcp <ip-address> <subnetmask> [<lease-time> [<time-units>] ] Set

Page 237 - Click the Speed/Duplex tab

Command Line Interface remote datetime <ip-address> <date> <time> Sets the date and time on the system at <ip-address>. <da

Page 238

Command Line Interface remote reboot <ip-address> Reboot the system at <ip-address> remote rebootalt <ip> Reboot the system at <i

Page 239

Command Line Interface remote upgradereboot <ip-address> <url> <key> Upgrades the system at the specified IP address and reboots the

Page 240 - Configuring SNMP

Command Line Interface set pptp on | off Enables or disables PPTP. set l2tp on | off Enables or disables L2TP. set ipsecsecret [ <secret> <se

Page 241

Command Line Interface show vpn Note: Even though you can only configure Wireless Data Privacy settings from the Access Control Server or Integrated A

Page 242 - Setting the Date and Time

Command Line Interface show clients [mac <mac-address>] [sort {mac | ip | user | machine | port | sessions | idle} ] [reverse] Lists all active

Page 243 - » To set the time manually:

----- ---------------- ------- ------ Command Line Interface <stance>Deny</stance> </ipsec> <pptp> <stance>Deny</st

Page 244 - Setting Up Administrators

Command Line Interface If you respond Y to continue with the backup, the following reminder appears: NOTE: After creating the backup image, you must

Page 245

Command Line Interface show backup Displays information about the list of local backups and the status of a running store backup or get backup task. O

Page 246

Using the 700wl Series System Display Filters and Auto Refresh Settings Some data, such as the contents of the log, can be very lengthy. To control th

Page 247

Command Line Interface reboot Automatically reboot after installing the upgrade. The upgraded software is activated when the system is rebooted. vers

Page 248

Command Line Interface cancel upgrade Cancels the current get upgrade task. set upgradeproxy [on | off] [host <ip-address> [<port> ] ] [u

Page 249

Command Line Interface shutdown Shuts down the system. You are prompted to confirm that you want to shut down the system: This operation will shutdown

Page 250 - Wireless Data Privacy Setup

Command Line Interface • info: show all information, notice, warning, error, and critical log entries <lines> The maximum number of lines to be

Page 251 - Configuration for IPSec

Command Line Interface Translates to: nslookup –timeout=10 <hostname> ping {<ip-address> | <hostname>} Pings an IP address or a hos

Page 252

Command Line Interface traceroute {<ip-address > | <hostname>} [<hops> [<probes> [<probewait> ] ] ] Displays the trace

Page 253

Command Line Interface clear ntpserver Clears the NTP servers IP address or hostnames. This command also disables the NTP service if it was enabled. s

Page 254 - Figure 7-4

Command Line Interface Controller. To modify these settings on an Access Controller, you must use the Administrative Console on the managing Access Co

Page 255

Command Line Interface set snmpcontact <contact> Sets the SNMP sysContact object, defined in RFC 1213 as “the textual identification of the cont

Page 256

Command Line Interface Trap IP Address: None Authorized Managers: None HP ProCurve Secure Access 700wl Series Management and Configuration Guide A

Page 257 - Step 11

Using the 700wl Series System Tables In configure tables, each row in a table typically displays the key items that define the element represented by

Page 258

Command Line Interface A-38 HP ProCurve Secure Access 700wl Series Management and Configuration Guide

Page 259 - Step 13

B FILTER EXPRESSION SYNTAX This appendix describes the syntax used to define user access rights (allowed traffic filters and redirected traffic filter

Page 260

Examples are: “fddi src myHost”, “ip net 122.43”, and “udp port 44”. fddi is an alias for ether; they are treated identically as meaning “the data

Page 261

Table B-1. Allowable Primitives (Continued) Primitive Explanation host host True if either the source or destination of the packet is host. ether d

Page 262

Table B-1. Allowable Primitives (Continued) Primitive Explanation ip6 proto protocol True if the packet is an IPv6 packet of protocol type protocol

Page 263 - SYSTEM MAINTENANCE

Table B-1. Allowable Primitives (Continued) Primitive Explanation ether proto protocol True if the packet is of ether type protocol. Protocol can b

Page 264 - Updating the System Software

Table B-1. Allowable Primitives (Continued) Primitive Explanation expr relop expr True if the relation holds, where • relop is one of >, <,

Page 265 - System Maintenance

C CREATING CUSTOMIZED TEMPLATES This Appendix explains how to develop custom templates for the Logon page, the optional Logoff pop- up page, and the o

Page 266

A Simple Logon Page Template Example The 700wl Series system logon page, in its simplest form, consists of two fields where the user enters his/her us

Page 267 - Remote Update

<!-- required functions --> @satmac() @interface() @java_works() @secret() @query() </FORM> </body> </html> The template file

Page 268 - Downloading an Upgrade

Using the 700wl Series System Figure 2-10. Data Tables Sortable column • Sortable Column Headings In some tables you can sort the items in the table

Page 269

Required Elements Form Tag <FORM action=/logon method=post name=logonForm> For the logon page only, there must be a form with the name attribute

Page 270

• @satmac(). This function returns an INPUT element of type hidden, with a value that is the client’s MAC address. • @interface(). This function ret

Page 271 - Local Update

In addition to including the realm field on the custom login page, the User specified authentication realm check box must be checked (on the Rights Ma

Page 272

@set(“variable”, “value”) Sets the value of a run-time variable. For example, to set the variable “month” to the month a client’s rights expire, you

Page 273

</head> <body bgcolor="FFFFFF"> <!-- specifies an image and a solid black line at the top of the form. The image must be stor

Page 274

@secret() @query() <!-- Displays user and password fields, and three buttons, in a table --> <table width="600" cellspacing="

Page 275

Figure C-2. Three-button logon page Changing the Logon Button Names If you want to change the names that appear on the buttons on the Logon page, you

Page 276 - Creating the Backup Image

Example 3 <FORM action="/cgi-bin/logon" method=post name=logonForm> (This is the FORM statement required at the beginning of the Logo

Page 277 - Saving the Backup as a File

Customizing the Logon Page Messages There are a number of informational messages that may appear on the Logon page in certain circumstances. These mes

Page 278 - Restoring From a Backup File

Guest Registration Template To configure a location to allow custom guest registration, there are three elements that must be in place: • Your main c

Page 279 - Continue

Using the 700wl Series System Common Buttons The following table lists the common buttons used in the Administrative Console and gives their meaning.

Page 280

The page generated by this template is shown in Figure C-3. Example 4 <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">

Page 281 - Step 2. Click Restart Now

<tr> <td align="right"><font size="2"> Last Name:</font></td> <td align="left"><

Page 282

Figure C-3. Guest Registration page produced by the template in Example 4 Using a Logoff Pop-Up with a Customized Logon Page One of options for user

Page 283

The required elements in a Logoff Pop-up template are: Form Tag: <FORM action=/logon method=post name=logoffForm> A form with the name logoffFor

Page 284

This generates the pop-up window shown in Figure C-4. Figure C-4. Logoff pop-up window When the user clicks the Logoff button, the Login window is im

Page 285 - LOGS in the Navigation bar

Figure C-5. Logoff confirmation window When you click the link, in this window, a fresh Logon page opens in a new window. To customize this logoff co

Page 286

C-20 HP ProCurve Secure Access 700wl Series Management and Configuration Guide

Page 287

TROUBLESHOOTING D This appendix presents troubleshooting procedures for the 700wl Series system. Table D-1 shows the symptoms, probable cause and reco

Page 288 - Configuring Session Logging

Table D-1. System Configuration Troubleshooting Guide (Continued) RADIUS Authentication not 1. RADIUS configuration incorrect Test client authentic

Page 289 - • Log successful logons

Table D-1. System Configuration Troubleshooting Guide (Continued) Symptom(s) Probable Cause Recommended Action Client has incorrect access Rights

Page 290 - Viewing the Session Logs

Using the 700wl Series System Basic System Configuration Tasks When you have completed the installation of your 700wl Series system following the inst

Page 291

D-4 HP ProCurve Secure Access 700wl Series Management and Configuration Guide

Page 292

GLOSSARY E The glossary defines terms that are used throughout the 700wl Series system. Some of the following terms are in common usage but may have 7

Page 293 - COMMAND LINE INTERFACE

Term Definition AH Authentication Header protocol. AH digitally signs the entire contents of each packet, protecting your network against three kind

Page 294 - Connecting Using SSH

Term Definition CLI Command Line Interface: 700wl Series system Access Controllers, Integrated Access Managers, and Access Control Servers all have

Page 295 - Getting CLI Command Help

Term Definition DNS Domain Name Server - A DNS translates Internet domain names such as xyzcorp.com, into IP addresses. Downlink port A port on an

Page 296

Term Definition HTTP Proxy An Web server that sits between a client application, such as a Web browser, and a real server. It intercepts all request

Page 297

Term Definition IKE A part of IPSec: IKE=Internet Key Exchange (Negotiates session parameters for the authentication header and ESP. Sets up Securit

Page 298

Term Definition L2F Layer 2 Forwarding; a tunneling protocol from Cisco L2TP Layer Two Tunneling Protocol (L2TP) is an extension of the Point-to-Po

Page 299

Term Definition Outer Tunnel Address The IP address associated with a PPTP or L2TP connection within which the client traffic is encapsulated. This

Page 300

Term Definition Session redirectors Client TCP and UDP sessions can be redirected from their original destination IP address or port. SNMP Simple N

Page 301

Using the 700wl Series System System Features and Concepts The following sections provide an introduction to some of the key concepts and functions th

Page 302

Term Definition tcpdump A program that prints out the headers of packets on a network interface that match a specified filtering criteria. The synta

Page 303

Term Definition Web server Network host that acts as an HTTP server; a computer that provides World Wide Web services on the Internet; it includes t

Page 304 - Port Configuration Commands

Term Definition XML-RPC XML-RPC is designed to be a simple procedural way for a client program to make function requests of another program. It prov

Page 305

INDEX OF COMMANDS A add snmpmanager <hostname> | <ip-address> [/<mask>] . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 306

delete policyadmin <login> . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 307

remote upgradecheck <ip-address> <url>. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 308

set syslogserver <ip-address> [<facility>] . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 309

T traceroute {<ip-address > | <hostname>} [<hops> [<probes> [<probewait> ] ] ] . . . . . . . . . . . . . . . . . . . .

Page 310 - Remote Commands

IOC-6 HP ProCurve Secure Access 700wl Series Management and Configuration Guide

Page 311

INDEX Numerics 802.1Q VLAN tag specifying in Access Policy 4-46 specifying in Connection Profile 4-33 802.1x configuring as authentication service 5-

Page 312

Using the 700wl Series System Figure 2-12. Access Controller Redirect Page Enterprise Class Redundancy The 700wl Series system supports Access Contro

Page 313

changing username/password on Integrated Access Manager 6-10 changing username/password on Integrated System 6-12 default name and password 2-4 log

Page 314

browser-based logon 1-3, 5-2 Built-in authentication service 5-2 built-in database 4-16 adding Access Points 4-22 adding users 4-17 network equip

Page 315

Ethernet bridging, enabling 6-24 Expire timer, See reauthentication timeout export rights 5-50 External 4-51 external identity retrieval 5-28 F Fai

Page 316 - The following command:

LDAP service authentication troubleshooting D-2 configuring for authentication 5-9 configuring MAC address retrieval 4-26 non-user binding 5-10 ret

Page 317 - Backup and Restore

P password changing for administrator 2-5 troubleshooting D-1 PDAs logon page options 5-33 peer Access Control Server configuring peer name 6-6 delet

Page 318

syslog server, configuring 9-5 Session Logs log entry format 9-6 viewing 9-6 session status filtering display 3-13 Settings tab in a Connection Prof

Page 319

V Verify via DNS HTTP proxy filter option 4-78 Virtual LANs (VLANs) 1-6, 2-24 and IP addressing 2-26 and the 700wl system, overview 2-24 specifying

Page 321

© Copyright 2003 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. June 2004 Manual Part

Page 322 - Diagnostic and Log Commands

Using the 700wl Series System The communication between the two peer Access Control Servers is done via a proprietary message based protocol over TCP/

Page 323

© Copyright 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. This document contain

Page 324 - TRL-C. Upon

Using the 700wl Series System or has some other configuration information you would prefer not to lose. The act of making it a secondary Access Contro

Page 325 - Time Configuration

Using the 700wl Series System If a client is logged onto the 700wl Series system using PPTP or IPSec encryption, overhead related to packet encryption

Page 326

Using the 700wl Series System You specify the addressing mode for a client through the Access Policy. The 700wl Series system default is NAT mode. Not

Page 327

Using the 700wl Series System Controller. If the client is using a real IP address, all sessions must be tunneled back through the original Access Con

Page 328

Using the 700wl Series System How the 700wl Series system handles roamed sessions depends on the protocol used by the client to connect to the 700wl S

Page 329 - Authorized Managers: None

Using the 700wl Series System Figure 2-13. Connection Profile for Traffic Tagged with VLAN 10 You can then define an Access Policy that should apply

Page 330

Using the 700wl Series System In this case, Authenticated clients with VLAN 20 tag will match the first row in the table, and will receive access righ

Page 331 - FILTER EXPRESSION SYNTAX

Using the 700wl Series System • Create a variation of the default “Unauthenticated” Access Policy that includes the same access rights (which basical

Page 332 - Tcpdump Primitives

Using the 700wl Series System One way to work with this limitation is to place a switch between the Access Points and the Access Controller, with a se

Page 333 - Primitive Explanation

3 SYSTEM STATUS This chapter explains how to view the system status tables of the 700wl Series system. You can view the status of any and all system e

Page 334

CONTENTS Preface Chapter 1 Introduction 700wl Series Overview 700wl Series Functions Client Authentication Client Access Rights Wireless Data Privac

Page 335

System Status Figure 3-1. Getting to Status Information There are four tabs in the status module: • Equipment Status presents an overview of the stat

Page 336

System Status If a display has more entries than will fit on one page (based on the Rows per Page filter setting), page navigation controls are enable

Page 337 - REATING CUSTOMIZED TEMPLATES

System Status Viewing Access Control Server Status The Access Control Server status table, as shown in Figure 3-3, shows the following information: Ta

Page 338 - Example 1

System Status Figure 3-3. Access Control Server Tab for the Primary Access Control Server in a redundant configuration Viewing Access Controller Stat

Page 339 - Logon Template Elements

System Status Figure 3-4. Access Controller Detail Page The Access Controller Detail page shows general status information for the Access Controller

Page 340 - Required Elements

System Status Table 3-3. Access Controller Detail Page: System Inventory Display Column Description Status This columns shows: • The MAC address o

Page 341 - Optional Elements

System Status » To display the client status, select the Access Controller and client type filtering parameters from the left panel and click Apply F

Page 342 - Miscellaneous Functions

System Status Filtering Client Status Information To make it easier to find the information you need from a client status page, you can filter the dis

Page 343 - Example 2

System Status Figure 3-6. Client Detail Page The following information is displayed on this page: Table 3-6. Active Client detail information Inform

Page 344

System Status Table 3-6. Active Client detail information Information Description Current Access Information about the Access Controller through wh

Page 345

Chapter 3 System Status Viewing Status Information Viewing Equipment Status Viewing Access Control Server Status Viewing Access Controller Status Vi

Page 346

System Status Figure 3-7. Client Detail page showing current rights in XML The Client Detail User Rights display shows the row in the Rights Table th

Page 347 - Example 3

System Status The View Active Sessions page appears, as shown in Figure 3-8. Figure 3-8. Session Status Page » To filter the session data, select th

Page 348

System Status Table 3-7. View Active Sessions Information Column Description Client Source Client Source: The IP address and port of the client sys

Page 349 - Guest Registration Template

System Status Table 3-8. Session Status Filtering Parameters Filter by: Details Access Controllers Lets you display only sessions for a selected Ac

Page 350 - Example 4

System Status Figure 3-9. License Information Page 3-16 HP ProCurve Secure Access 700wl Series Management and Configuration Guide

Page 351

4 CONFIGURING RIGHTS This chapter describes how network access rights are assigned to clients through the 700wl Series system, and explains how to con

Page 352

Configuring Rights Time Window in which the connection exists, and optionally, a VLAN tag, to match the client to a Connection Profile. The combinatio

Page 353 - Example 5

Configuring Rights The network administrator configures network access control policies by defining Identity Profiles, Connection Profiles and Access

Page 354

Configuring Rights • An Access Policy defines aspects of how a client interacts with the network. The Access Policy defines what traffic is allowed t

Page 355

Configuring Rights the Client Status tab under the Status button, and click Refresh User Rights Now. You can also refresh rights for individual client

Page 356

Modifying the Outside World Filter to Restrict Access Setting Up HTTP Proxy Filters Chapter 5 Configuring Authentication Authentication in the 700wl

Page 357 - TROUBLESHOOTING

Configuring Rights Connection Profiles once the Access Controllers have been installed and the appropriate Locations have been created. b. Create Tim

Page 358

Configuring Rights Series system is matched to a row in the table based on its Identity Profile and Connection Profile, and receives access rights as

Page 359

Configuring Rights the new identification information. The user will now match one of the Identity Profiles near the top of the table. For example: •

Page 360

Configuring Rights Note: It is important that rows with the —Access Points“ Identity Profile appear in the table before rows that contain the —Any“ Id

Page 361 - GLOSSARY

Configuring Rights Figure 4-3. The New Rights Assignment Page Each field on this page contains a drop-down list from which you can select the compone

Page 362 - Term Definition

Configuring Rights Step 2. Specify where in the table the new row should be placed. Order is important in matching a client to a row. The default posi

Page 363

Configuring Rights Figure 4-4. The Identity Profiles Page The 700wl Series system provides three predefined Identity Profiles, and a Rights Administr

Page 364

Configuring Rights Creating or Editing an Identity Profile To create a new Identity Profile, click the New Identity Profile... button at the bottom of

Page 365

Configuring Rights Figure 4-6. Creating a New Identity Profile, with User list displayed From this page, with the Users or Network Equipment list dis

Page 366

Configuring Rights Limiting the number of logons per user does not prevent a user from logging on with that username and password—rather it prevents t

Page 367

SSL Certificate Configuring Network Interfaces Configuring the Port Speed and Duplex Settings Port Subnet IP Address and Subnet Netmask Configuring SN

Page 368

Configuring Rights Users in the Built-In Database Many organizations choose to authenticate their wireless users against a corporate database or authe

Page 369

Configuring Rights Table 4-2. Users Page Field Definitions Field Description Identity Profile Assignment The Identity Profile to which the user has

Page 370

Configuring Rights Figure 4-8. Adding a New User The fields on this page are as follows: Table 4-3. New User Fields Field Description Name A descr

Page 371

Configuring Rights Table 4-3. New User Fields Field Description Username/MAC Address The user‘s username (logon ID) or MAC address. A user may be i

Page 372

Configuring Rights Step 2. Select the Identity Profile to which this user should be assigned by clicking the appropriate checkbox in the Identity Pro

Page 373 - INDEX OF COMMANDS

Configuring Rights correctly in the system, however, if you want to manage these devices from within the 700wl Series system, you may want to assign t

Page 374

Configuring Rights From the Network Equipment page you can also go directly to the Identity Profiles page or to the Users page by clicking the link ne

Page 375

Configuring Rights The fields on this page are as follows: Table 4-5. New Network Equipment Fields Field Description Name A descriptive name for th

Page 376

Configuring Rights To edit a Network Equipment entry in the built-in database, do the following: » Edit the fields to change the descriptive name or

Page 377

Configuring Rights an individual record for the MAC address. For example, suppose the record identified by cn=MACS contained the following values for

Page 378

Appendix A Command Line Interface Accessing the Command Line Interface Connecting with a Serial Console Connecting Using SSH Using the CLI on an Int

Page 379 - Numerics

Configuring Rights Note: If you have an LDAP service configured for user binding, that service does not appear in this list. » To configure or chang

Page 380

Configuring Rights Figure 4-12. Configuring MAC Addresses Retrieval Parameters for an LDAP Service The fields on this page are as follows: Table 4-6.

Page 381

Configuring Rights Identity Profile membership information can be associated with a MAC address in one of two ways: • If each MAC address has its own

Page 382

Configuring Rights This means that the Rights Manager will use the search string found in the initial search (for example, the value returned from the

Page 383

Configuring Rights The Connection Profile is used in the Rights Assignment Table, in concert with the Identity Profile, to determine a client’s access

Page 384

Configuring Rights » To edit a Connection Profile, click the Connection Profile name in the first column of the table, or click the pencil icon at th

Page 385

Configuring Rights Figure 4-14. Creating a New Connection Profile, the Settings Tab To create or edit a Connection Profile, do the following: Step 1.

Page 386

Configuring Rights Table 4-9. New Connection Profile Settings Tab Contents (Continued) Column Description VLAN Identifier How an 802.1Q VLAN Identi

Page 387

Configuring Rights The Locations tab shows a list of the currently defined Locations. The columns in this list are as follows: Table 4-10. Locations

Page 388 - *5990-8809*

Configuring Rights • To select all Time Windows in the list, select the checkbox next to the Locations column heading. Clicking this checkbox a secon

Commentaires sur ces manuels

Pas de commentaire