Table of Contents
- About this Guide
- Getting Started
- Integrating Infranet Controllers
- Adding Infranet Controllers
- Adding Infranet Controller Clusters
- Using Templates
- Configuring an Infranet Controller
- Configuring User Roles and Administrator Roles
- Configuring Infranet Controller User Roles (NSM Procedure)
- Configuring Access Options on an Infranet Controller User Role (NSM Procedure)
- Configuring OAC Settings for a User Role (NSM Procedure)
- Creating and Configuring Infranet Controller Administrator Roles (NSM Procedure)
- Delegating Management Tasks to Infranet Controller Administrator Roles (NSM Procedure)
- Configuring Security Requirements for Administrators and Users
- Configuring Infranet Controller Source IP Access Restrictions (NSM Procedure)
- Configuring Infranet Controller Browser Access Restrictions (NSM Procedure)
- Configuring Infranet Controller Certificate Access Restrictions (NSM Procedure)
- Configuring Infranet Controller Password Access Restrictions (NSM Procedure)
- Configuring Infranet Controller Host Checker Access Restrictions (NSM Procedure)
- Configuring Infranet Controller RADIUS Request Attribute Restrictions for User Realms (NSM Procedure)
- Configuring the Number of Concurrent Sessions and Concurrent Users for Infranet Controller Users (NSM Procedure)
- Configuring the Infranet Controller RADIUS Server and Layer 2 Access
- Configuring the Infranet Controller as a RADIUS Server (NSM Procedure)
- Using the Infranet Controller for 802.1X Network Access (NSM Procedure)
- Configuring Location Groups (NSM Procedure)
- Configuring RADIUS Clients (NSM Procedure)
- Configuring RADIUS Return Attributes Policies (NSM Procedure)
- Configuring RADIUS Request Attributes Policies (NSM Procedure)
- Configuring an Infranet Enforcer as a RADIUS Client of the Infranet Controller (NSM Procedure)
- Non-Juniper 802.1X Supplicant Configuration Overview
- Configuring Authentication Realms
- Configuring Infranet Enforcer Policies
- Configuring Infranet Enforcer Resource Access Policies (NSM Procedure)
- Configuring Infranet Controller IPsec Routing Policies (NSM Procedure)
- Configuring Infranet Controller IP Address Pool Policies (NSM Procedure)
- Configuring Infranet Controller Source Interface Policies (NSM Procedure)
- Configuring an Infranet Controller to Connect to a ScreenOS Enforcer (NSM Procedure)
- Configuring an Infranet Controller to Connect to a JUNOS Enforcer (NSM Procedure)
- Configuring Host Enforcer Policies
- Configuring IF-MAP Federation Settings
- Configuring IF-MAP Server Settings on the Infranet Controller (NSM Procedure)
- Configuring IF-MAP Client Settings on the Infranet Controller (NSM Procedure)
- Configuring IF-MAP Session Export Policy on the Infranet Controller (NSM Procedure)
- Configuring IF-MAP Session Import Policy on the Infranet Controller (NSM Procedure)
- Configuring IF-MAP Server Replicas (NSM Procedure)
- Configuring Authentication Servers
- Configuring an Infranet Controller Anonymous Server Instance (NSM Procedure)
- Creating a Custom Expression for an Authentication Server (NSM Procedure)
- Configuring an Infranet Controller RSA ACE/Server Instance (NSM Procedure)
- Configuring an Infranet Controller Active Directory or NT Domain Server Instance (NSM Procedure)
- Configuring an Infranet Controller Certificate Server Instance (NSM Procedure)
- Configuring an Infranet Controller LDAP Server Instance (NSM Procedure)
- Configuring an Infranet Controller Local Authentication Server Instance (NSM Procedure)
- Configuring an Infranet Controller NIS Server Instance (NSM Procedure)
- Configuring an Infranet Controller RADIUS Server Instance (NSM Procedure)
- Configuring an Infranet Controller eTrust SiteMinder Server Instance (NSM Procedure)
- Configuring an Infranet Controller MAC Address Authentication Server for Unmanageable Devices (NSM Procedure)
- Configuring Sign-In Policies
- Configuring Host Checker Policies
- Creating Infranet Controller Global Host Checker Policies Overview
- Configuring Advanced Endpoint Defense Policy (NSM Procedure)
- Configuring New Client-Side Policies (NSM Procedure)
- Configuring Virus Signature Version Monitoring and Patch Assessment (NSM Procedure)
- Specifying Customized Requirements Using Custom Rules (NSM Procedure)
- Configuring a Patch Assessment Custom Rule (NSM Procedure)
- Configuring the Remote IMV Server (NSM Procedure)
- Enabling Customized Server-Side Policies (NSM Procedure)
- Executing Host Checker Policies
- Implementing Infranet Controller Host Checker Policies (NSM Procedure)
- Remediating Infranet Controller Host Checker Policies
- Configuring Infranet Controller General Host Checker Options (NSM Procedure)
- Configuring Host Checker Automatic Installation (NSM Procedure)
- Configuring Infranet Controller Host Checker Logs (NSM Procedure)
- Managing an Infranet Controller
- Unified Access Control Manager
- UAC Manager in NSM Overview
- Associating Enforcement Points with an Infranet Controller Using the UAC Manager
- Disassociating the Configuration Between an Enforcement Point and an Infranet Controller
- Enabling Dot1x Ports on the Enforcement Points Using the UAC Manager
- Disabling the Dot1x Ports on an Enforcement Point Using the UAC Manager
- Using System Management Features in an Infranet Controller
- Configuring the Infranet Controller to Interoperate with IDP
- Troubleshooting an Infranet Controller
- Monitoring and Configuring Logs in an Infranet Controller
- Monitoring an Infranet Controller
- Configuring Logs in an Infranet Controller
- Configuring RADIUS Attribute Logs (NSM Procedure)
- Configuring Event Logs (NSM Procedure)
- Configuring User Access Logs (NSM Procedure)
- Configuring Administrator Access Logs (NSM Procedure)
- Configuring Client-Side Logs (NSM Procedure)
- Configuring the Infranet Controller as an SNMP Agent (NSM Procedure)
- Configuring Custom Log Filters (NSM Procedure)
- Index