New/Edit Engine Settings Window
Engine settings provide advanced configuration options for Extreme Access Control engines. NAC Manager comes with a default engine settings configuration. If desired, you can edit these default settings or you can define your own settings to use for your Access Control engines.
You can launch the New/Edit Engine Settings window from the Engine Settings panel in the Advanced Configuration window. To create new engine settings, click the Add button at the top of the panel. To edit existing engine settings, select the engine setting in the table and click the Edit button. The New or Edit Engine Settings window opens with the following tabs available for configuration:
- IP Resolution Tab
- MAC Resolution Tab
- Hostname/Username Resolution Tab
- Reauthentication Tab
- Credentials Tab
- Miscellaneous Tab
- Device Type Detection Tab
- Network Tab
NOTE: | To access status and diagnostic information for an Access Control engine, launch the Access Control Engine
administration web page by right-clicking on the Access Control engine in the left-panel tree and selecting
WebView. You can also access the administration web page using the following URL:
https://<Access ControlEngineIP>:8444/Admin. The default user name and password for access to this web
page is "admin/Extreme@pp." The username and password can be changed in the Web Service
Credentials field on the Credentials Tab in the Engine Setting window. |
---|
IP Resolution Tab
The IP resolution tab is used to define how and when NAC Manager resolves an end-system's MAC address to an IP address for the end-system. These parameters are applicable for Extreme Access Control (Access Control) Gateways and L2 Access Control Controllers, but not L3 Access Control Controllers.
Click the graphic for more information.
- Resolve IP Address
- Specify when an Access Control engine resolves the IP address for
end-systems:
- Always - (Default) Resolve the IP address for every end-system that NAC Manager sees.
- Only for Assessment - Resolve the IP address for end-systems that need to be assessed (scanned).
- IP Address Resolution Timeout
- Enter the maximum time an Access Control engine should spend trying to resolve an IP address from an end-system's MAC address before giving up and returning the Error state (MAC to IP Resolution Timed Out) for that end-system.
- Allowed Retries on Failure
- The number of attempts made to resolve the IP address after the first attempt fails. The default setting is 2 retries, which means that NAC Manager retries a timed-out request two times, making a total of three attempts to resolve the IP address. Enter the amount of delay time in seconds that NAC Manager waits before retrying to resolve the IP address.
- DHCP Resolution Delay Time
- The number of seconds an Access Control engine should wait after learning
about an end-system before attempting to resolve the
end-system's IP address. This delay is used to allow the end-system to
negotiate its DHCP IP address. If Port Link Control
is enabled, this delay is used after the Access Control engine links down/up the
port to force the end-system to request a new
IP address on the new VLAN.
NOTE: If the delay time specified here is less than the amount of time the end-system needs to renew its IP address, then the Access Control engine may resolve the end-system's IP address incorrectly. This is a problem when assessment is enabled and may cause the engine to scan the incorrect IP address. Be sure to take into account the amount of time required for an end-system to get a new IP address when setting the delay time value.
- Use DHCP Request IPs
- Specify when, if ever, an IP address learned from a DHCP request packet could be used when resolving an
end-system's IP address. This option is applicable only for Access Control Gateways, since an inline Access Control
Controller should always hear
the DHCP response as well.
- Always - Always consider the IP address learned from a DHCP request for an end-system's IP, after all more reliable methods have been exhausted.
- Never - Never consider an IP address learned from a DHCP request when resolving an end-system's IP address. In a situation where the Access Control Gateway receives DHCP packets from both the client and server, the gateway uses this IP when these packets are received during the IP resolution process. With subsequent authentications for which there is no additional DHCP exchange, Access Control uses the enabled resolution options to resolve the IP address but does not use any previously learned DHCP information to resolve the IP.
- For Non-VLAN Switches Only - (Default) Only consider IP addresses learned from DHCP request packets when the NAS switch the end-system was authenticated for does not use VLANs for access control. The IP addresses from request packets in a VLAN environment is always incorrect, because as an end-system transitions through VLANs, it always requests the IP from the previous VLAN.
- Rediscover IP on DHCP Request
- When this option is selected, NAC Manager re-runs IP resolution on an authenticated end-system if a DHCP request causes its IP address to change. In this instance, the Access Control policy applies to the new IP address and removed from the old IP address, and assessment scans and port resolution are not performed.
- Always Use Fully Trusted DCHP IPs
- When this options is selected, the Access Control engine runs a DHCP table lookup to see if DHCP IP address is fully trusted for the end-system. If the address is fully trusted in the table, NAC Manager resolves the IP address for the end-system without attempting additional resolution processes. If the address is not fully trusted or not found, the Access Control engine attempts to resolve the IP address as normal. When this option is not selected, there is no fast IP resolution using DHCP IP packets.
- Use Agent-based Assessment IPs
- Specify when, if ever, an IP address reported by a connected agent
could be used when resolving an end-system's IP address. This process
looks for the end-system’s MAC address in the list of MAC addresses
from known connected agents. If an agent is connected and heartbeats
during the IP Resolution process, then NAC Manager uses the IP address of
that agent.
- Always - Always consider the IP address reported by a connected agent for an end-system's IP, after all more reliable methods have been exhausted.
- Never - (Default) Never consider an IP address reported by a connected agent when resolving an end-system's IP address.
- For Non-VLAN Switches Only - Only consider IP addresses reported by a connected agent when the NAS switch the end-system was authenticated for does not use VLANs for access control.
- Use RADIUS Accounting Packets
- When this option is selected, if the Access Control engine receives a RADIUS accounting packet with a Framed-IP-Address in it, the engine skips IP resolution and use the IP address in the RADIUS accounting packet.
- Clear Duplicate IPs on Switches
- Select this option to have an Access Control engine clear out duplicate entries in the node alias and ARP tables of the NAS switch the end-system was authenticated for, if duplicates are found while trying to resolve the IP address of an end-system. The Access Control engine then tries to re-read the IP address from the table to find the most recent entry.
- Clear Duplicate IP Re-Read Delay
- Specify the amount of time in seconds that an Access Control engine waits after clearing duplicate IPs on a switch or a router before re-reading the node alias or ARP tables.
- NetBIOS IP Filtering
- This option causes the Access Control engine to make NetBIOS requests to a list of IP addresses, if multiple IP addresses are found when trying to resolve the IP address of an end-system. See NetBIOS Timeout and NetBIOS Timeout Retry Count on the Miscellaneous tab.
- Router IP Discovery
- Selecting this option causes NAC Manager to make requests to an end-system's gateway router ARP table to try to resolve the IP address for an end-system, if the Access Control engine was unable to resolve the IP address by querying the NAS switch. The gateway router for an end-system can be discovered by the relay router field of a DHCP packet or by using the gateway router defined for an IP subnet for the VLAN an end-system is put into by NAC Manager. See IP Subnets.
- Clear Duplicate IPs on Routers
- This option causes an Access Control engine to clear out duplicate entries in the ARP tables of an end-system's gateway router, if duplicates are found while trying to resolve the IP address of an end-system. The Access Control engine then tries to re-read the IP address from the table to find the most recent entry. See Clear Duplicate IP Re-Read Delay.
- Default Router Profile
- The profile used to make SNMP requests to the gateway router for an end-system, if one is not defined for a specific router's interface IP address as part of an IP subnet. Use the Edit button to open the Profiles/Credentials tab in the Authorization/Device Access window where you can define authentication credentials and create the profiles that use those credentials.
- Default Router SNMP Context
- The SNMP context used when making requests to the router, if the credentials used for the router are SNMP v3 and the specific router's interface IP address has not been defined as part of an IP subnet.
- IP Subnets
- IP subnets are used to assist in IP resolution in the following
three scenarios:
- If a switch is using RFC3580 (VLAN enforcement of access control), the process for determining an IP address is much more difficult. In this scenario, IP subnets can be defined for each VLAN to provide an IP range filter, which can be used to filter the list of IPs discovered on the switch. IP subnets also provide a way to specify a gateway router for the VLAN's subnet, which can be used for doing SNMP reads on a router if DHCP snooping did not capture the relay router.
- When VRRP or HSRP is used, and you want NAC Manager to query the router if needed, NAC Manager needs to know the primary/secondary router relationship. This order of precedence can be defined in the IP subnet and ensures that NAC Manager queries the primary router first to get the most accurate data. This is needed in a VRRP or HSRP environment, because both routers send out a DHCP inform message, and it is most likely that the Access Control Gateway gets the secondary router's message last causing it to query the incorrect router.
- When DHCP snooping is used, the router SNMP credentials are not the
same for all routers. In this scenario, if you want NAC Manager to query the router for IP resolution, the IP subnets can be used to define the
mapping between the relay router IPs and the correct SNMP credentials to use for them.
The Global IP subnets option is used to create a global list of IP ranges used for the purpose of IP Resolution. The IP Resolution process ignores any IP address outside the configured ranges. The checkbox is disabled unless there is at least one subnet configured.
MAC Resolution Tab
The MAC resolution tab is used to define how and when NAC Manager resolves an end-system's IP address to a MAC address for that end-system. These parameters are applicable for L3 Extreme Access Control (Access Control) Controllers only and this tab only displays if an L3 Controller is present on your network.
Click the graphic for more information.
- Static MAC Resolution
- This option enables the reverse lookup for the Advanced Configuration > Global and Appliance Settings > MAC to IP Mappings.
- NetBIOS MAC Resolution
- This option allows NAC Manager to perform NetBIOS requests to an end-system's IP address (heard by the L3 Access Control Controller), to resolve the end-system's MAC address. See NetBIOS Timeout and NetBIOS Timeout Retry Count on the Miscellaneous tab.
- Allow Use of NetBIOS Hostname for Pseudo MAC Generation
- This option allows NAC Manager to generate a pseudo MAC address for an end-system based on the end-system's hostname. This process is used if the MAC address discovered from the NetBIOS response is listed in the Unusable MAC Addresses table. The advantage to generating a pseudo MAC address is that it allows the end-system's events to be correlated to the end-system. The disadvantage is that users may name their end-systems with the same hostname, and then the algorithm used to generate the MAC address from a hostname is not guaranteed to generate unique hostnames for two different end-systems. See Unusable MAC Addresses.
- DHCP MAC Resolution
- This option enables the reverse lookup into the DHCP table learned by DHCP snooping.
- Username MAC Resolution
- This option allows NAC Manager to generate a pseudo MAC address for an end-system based on the username used to log onto the network. This is mainly used with VPN requests where the username is known but the MAC address is not. Generating a pseudo MAC address from the username causes all the VPN logins from one user to show up as a single entry no matter what IP address they get. See Unusable MAC Addresses.
- Unusable MAC Addresses
- This table is used to define well-known MAC addresses that are not real, and could be used by multiple end-systems. An example would be Microsoft's standard WAN PPP client MAC address, which is the MAC address of a Windows end-system's VPN interface, using the standard Microsoft VPN client. This MAC address is 00:53:45:00:00:00. You can add, edit, or delete entries using the toolbar buttons at the top of the table.
Hostname/Username Resolution
The tab is used to define how and when NAC Manager resolves an end-system's hostname and an end-system's username. These parameters are engine for Extreme Access Control (Access Control) Gateways, L2 Access Control Controllers, and L3 Access Control Controllers.
Click the graphic for more information.
- Hostname Resolution
- Use this checkbox to enable or disable hostname resolution for Access Control engines. Hostname resolution is only performed for end-systems for which NAC Manager has an IP address.
- DNS Hostname Resolution
- This option allows the use of reverse DNS lookup on the Access Control engine to resolve an end-system's hostname. In order for this option to work, a valid DNS server IP address must have been specified when the Access Control engine was installed. Use the DNS Timeout field to specify the amount of time in seconds that the Access Control engine waits after making a reverse DNS lookup prior to giving up and moving on to the next hostname resolution mechanism.
- NetBIOS Hostname Resolution
- This option allows the Access Control engine to make a NetBIOS request to the end-system to query the end-system for its hostname. See NetBIOS Timeout and NetBIOS Timeout Retry Count on the Miscellaneous tab.
- Kerberos Hostname Resolution
- This options allows the Access Control engine to do a lookup in the table of data learned from Kerberos snooping, to resolve the end-system's host name.
- DHCP Hostname Resolution
- This options allows the Access Control engine to do a lookup in the table of data learned from DHCP snooping, to resolve the end-system's host name.
- Username Resolution
- Use this checkbox to enable or disable username resolution, which allows the Access Control engine to try resolve the name of a user currently on an end-system when the username was not part of the authentication request. MAC authentication and L3 Access Control Controller authentication are the two cases where username resolution can currently be used.
- Registration Username Resolution
- This options cause NAC Manager to use the username used for authenticated registration or the user's full name for unauthenticated registration in the format: Last Name, First Name.
- Kerberos Username Resolution
- This options allows the Access Control engine to do a lookup in the table of data learned from Kerberos snooping, to resolve the name of the user currently logged into the end-system.
- Ignored Kerberos Usernames
- The table is used to define usernames for which Kerberos data is ignored. This is useful when applications running on an end-system use a global user over the Kerberos protocol to pass information for a program. Two known cases of this would be Sophos Anti-Virus software and the IBM Rational ClearCase source control system. You can add, edit, or delete entries using the toolbar buttons at the top of the table.
Reauthentication Tab
This tab is used to define global session-timeout behavior for L2 Access Control Controllers and Access Control Gateways, and how Access Control Gateways reauthenticates end-systems on various NAS switches. This tab is not applicable for L3 Access Control Controllers.
Click the graphic for more information.
- Set Reauthentication Time for Accepted End-Systems to Assessment Interval
- This option allows the Access Control engine to set session-timeouts for accepted end-systems, causing the end-system to be reauthenticated the next time a scan needs to be performed. This option is required for networks using 802.1X authentication on wireless switches that do not support the IEEE 802.1X Port Reauthenticate MIB. It is also required for networks using MAC or Web-Based authentication on third-party switches. These switches do not have a mechanism to force re-authentication on end-systems when assessment is complete. This checkbox does not apply for Layer 3 Access Control Controller engines.
- Accept Session Timeout
- If enabled, this timeout applies to all end-systems that are accepted, but not considered by NAC Manager to be unregistered
end-systems. If both this option and the "Set Reauthentication Time For Accepted End-Systems to Assessment Interval" option
are enabled, Access Control uses the lower value. The timeout can be either:
- Enabled For Session-Timeout Switches - (Default) The timeout only applies to accepted end-systems authenticated for a NAS switch where NAC Manager cannot reauthenticate sessions on demand via SNMP or RFC3576.
- Enabled for All Switches - The timeout is applied to any accepted end-system (not considered by NAC Manager to be unregistered) on any switch.
- Quarantine Session Timeout
- If enabled, this timeout applies to all end-systems quarantined by NAC Manager.
The timeout can be either:
- Enabled For Session-Timeout Switches - (Default) The timeout is only applied to quarantined end-systems that were authenticated for a NAS switch where NAC Manager cannot reauthenticate sessions on demand via SNMP or RFC3576.
- Enabled for All Switches - The timeout is applied to any quarantined end-system on any switch.
- Unregistered Session Timeout
- If enabled, this timeout applies to all end-systems
determined to be unregistered by NAC Manager. The timeout can be either:
- Enabled For Session-Timeout Switches - (Default) The timeout only applies to unregistered end-systems authenticated for a NAS switch where NAC Manager cannot reauthenticate sessions on demand via SNMP or RFC3576.
- Enabled for All Switches - The timeout is applied to any unregistered end-system on any switch.
- Assessing Session Timeout
- If enabled, this timeout applies to all end-systems
being scanned by NAC Manager. The timeout can be either:
- Enabled For Session-Timeout Switches - (Default) The timeout applies to end-systems being assessed authenticated for a NAS switch where NAC Manager cannot reauthenticate sessions on demand via SNMP or RFC3576.
- Enabled for All Switches - This option tells NAC Manager to apply the session timeout for end-systems being assessed on any switch.
- Session Deactivate Timeout
- This option can be used to provide more up-to-date information about
which end-systems are still active on the network. When it is enabled,
NAC Manager checks periodically to determine if an authentication
request is received from an end-system within the specified time.
If a user is still on the network, then the user is reauthenticated
and a new event is generated stating the user is still active on the
network. If the user is no longer on the network,
the session is removed on the switch and the end-system is displayed in NAC Manager with the Disconnected state. (Note that when a user leaves the network within the
period of time specified, NAC Manager does not display them as "Disconnected until the specified time has passed.) While this option
does provide a more up-to-date list of active end-systems, RADIUS
accounting should be used to provide real-time connection status. This
option is useful when RADIUS accounting is not desired or is not
supported on certain network devices.
NOTE: The timeout process could be off by approximately 60 seconds from the specified time, depending on when NAC Manager runs the check for authentication requests.
- Switch Reauthentication Configuration
- This table is used to configure the reauthentication method an Access Control engine uses on a switch.
For example, you may want to add support for another wireless switch. In this case,
you would add an entry for
the new switch by clicking the Add button, entering the sysObjectId of the switch, and
setting the Reauthentication Type to either RFC3576 (if the switch supports it) or
Session Timeout. This table is also where you can disable port link
control for switches by selecting the switch, clicking the Edit button,
and setting the Port Link Control option to disabled.
If you've deleted or edited any of the default configurations, the Restore Defaults button restores them to their original state and add back any that are missing. Any custom entries you added are retained unless they have the same sysObjectId as a default configuration. Following a restore, you need to save the configurations.
Credentials Tab
Use this tab to configure various parameters for your network engines including switch configuration, web service credentials, and EAP-TLS configuration.
Click the graphic for more information.
Switch Configuration
Enter the shared secret that switches uses when communicating with Extreme Access Control (Access Control) engines.
- Shared Secret
- A string of alpha-numeric characters used to encrypt and decrypt communications between the switch and the Access Control engine. The shared secret is shown as a string of asterisks.
- Show Shared Secrets
- When checked, the shared secret is shown in text. When unchecked, the shared secret is shown as a string of asterisks.
- RADIUS Timeout
- The amount of time (in seconds) that a switch waits before
re-sending a RADIUS request to the Access Control engine.
The default is 15 seconds and the maximum is 60 seconds. Note that the
time specified should be long enough to allow the Access Control engine to receive
a response from the RADIUS server.
NOTE: Although this option allows a maximum of 60 seconds, the actual maximum time allowed varies depending on the switch model. If a switch does not support the timeout value specified here, then the value is not set on the switch and an error message displays in the Access Control engine log. Check your switch documentation to verify supported values.
- RADIUS Timeout Retry Count
- The number of times the switch attempts to contact an Access Control engine with a RADIUS request, when an attempted contact fails. The default setting is 3 retries, which means that the switch retries a timed-out request three times, making a total of four attempts to contact the engine.
- Use Primary RADIUS Server for Redundancy in Single Access Control Engine Configuration
- If your Access Control deployment has only one Access Control Gateway engine, this option allows you to configure redundancy by using the primary RADIUS server as a backup when configuring the switches. This option would not apply to Access Control deployments using advanced AAA configurations with more than one set of RADIUS servers, or if you have configured primary and secondary Access Control Gateways.
Web Service Credentials
- Access Control Engine Web Service Credentials
- The credentials specified here provide access to the Access Control engine administration web page and the web services interface between the Extreme Management Center server and the Access Controlengine. NAC Manager provides default credentials that can be changed, if desired. Changes to the credentials are propagated to the Access Control engines on Enforce.
Access Control Admin Web Page
By default, the Access Control engine administration web page (https://<Access ControlEngineIP>:8444/Admin/) uses the above Web Service Credentials for authentication. However, you can configure the web page to use the AAA Configuration assigned to that engine for authentication as well. This allows you to use LDAP or RADIUS authentication for the web page.
There are three steps for setting up the web page to use LDAP or RADIUS authentication:
- Verify that the Access Control Configuration assigned to the engine has LDAP or RADIUS authentication configured in its AAA Configuration.
- Create a local user account on the Access Control engine that matches the
user name of the user logging in. Use the
useradd
command on the Access Control engine CLI to create the local user account. - Select the Use Access Control AAA Configuration for Admin Web Page authentication option here on the Credentials tab. Click OK. Enforce the change to the engine.
The Access Control engine begins using the AAA configuration for the administration web page authentication. Note that it may take the Linux operating system on the Access Control engine up to two minutes to recognize that the new user is valid.
EAP-TLS Configuration
- Server Private Key Passphrase
- The Server Private Key Passphrase is used to encrypt the private key created during certificate request generation of server certificates for use by Access Control engines during Local EAP-TLS Authentication. The passphrase must be identical for all Access Control engines, and must be configured properly, or Local EAP-TLS Authentication does not operate successfully.
Miscellaneous Tab
Use this tab to configure various parameters for your network engines including port link control, NetBIOS, Kerberos, and Microsoft NAP.
Click the graphic for more information.
Port Link Control
- Enable Port Link Control
- Use this checkbox to enable or disable port link control. Port link
control is required if you are using VLAN only (RFC 3580) switches or if
you are using policy with VLANs on EOS policy-enabled switches.
When a VLAN is assigned to a switch port, the end-system needs to get a new
IP address for the assigned VLAN. To do this, the Extreme Access Control (Access Control) engine links down the port, waits
the configured amount of time, and then links up the port,
causing the end-system to make a new DHCP request and get a new IP
address.
This setting is ignored for Access Control Controllers and EOS equipment with multi-authentication enabled. The option must be manually disabled for third-party environments with multi-authentication.
In the Port Down Time field, enter the amount of time in seconds that the engine waits before linking up the port. The time must be sufficient to cause the end-system to make the DHCP request.
In the Enable for Authentication Types field, you can enable port link control for only specific authentication types, depending on the checkboxes you select. For example, you can disable port link control for 802.1x, but have it enabled for MAC authentication so that a port is only linked down when a MAC authentication session changes VLANs.
NetBIOS
This section controls the timeout and retries that an Access Control engine uses when making NetBIOS requests for IP resolution, MAC resolution, or hostname resolution.
- NetBIOS Timeout
- The amount of time in seconds that an Access Control engine waits for a response to a NetBIOS request to an end-system, before giving up on that request and retrying.
- NetBIOS Timeout Retry Count
- The number of times an Access Control engine retries making a NetBIOS request to an end-system, if the end-system does not respond.
Kerberos
Controls how an Access Control engine deals with data it receives from Kerberos snooping.
- Allow Use of MAC Resolution for Kerberos Data Processing
- When end-systems are behind a router, the Access Control engine uses MAC resolution to resolve an end-system's MAC address from its IP address. This is because when end-systems are behind a router (not in the local network), the Kerberos packets carry the MAC address of the router instead of the end-system. This option allows you to turn off the use of MAC resolution for Kerberos processing, if desired.
- Allow Use of Data from Kerberos Request Packets
- This option allows the use of data such as username and hostname, from Kerberos request packets. The data in the request packet is provided by the user, and is not guaranteed to be accurate, since it is not authenticated.
- Reauthenticate Users on Kerberos Username Change Detected
- This option causes the Access Control engine to reauthenticate a user if the username in the Kerberos packet changes.
- Reset Authentication Type on Kerberos Login for MAC and IP Authentication
- This option is supported for Access Control deployments with inline Access Control Controllers that can capture the end user login. When a user logs in via Kerberos, (for example, a user logs into a Windows domain,) the Access Control Controller resets the authentication type from MAC (for an L2 Access Control Controller) or IP (for an L3 Access Control Controller) to Kerberos. The Kerberos authentication type can then be used by rules to give elevated access to users that have successfully logged into a Windows domain.
- Kerberos Age Out
- This option provides a way to disable the aging out of Kerberos authentication data. This authentication data is used by NAC Manager to provide elevated access to end-systems. By default, the authentication data is automatically aged out every 12 hours. During that 12-hour period, any time the end-system reauthenticates with NAC Manager, the user would receive their elevated access privileges. After the 12 hours is exceeded and the authentication data is aged out, the end-system must log in again to get their elevated access. You can use this option to change the age out time or disable the aging altogether. For example, you might want to change the 12 hours to 8 hours, based on a shorter 8-hour workday.
WARNING: | Keep in mind that disabling the age out would create a potential security
hole. Elevated access is tied to the end-system, so if it isn't aged out, the
elevated access is always available. For example, if a user leaves their laptop
and someone logs them out and then logs in as a local user, that person
continues to have the elevated access privileges of the original user. Also,
a person could spoof someone else's MAC address and receive their elevated access,
if the access isn't aged out. |
---|
Microsoft NAP
This section provides options related to Microsoft NAP for Windows.
- Reset Authentication Type for NAP Enabled End-Systems
- When this option is enabled, the Access Control engine resets the authentication type from 802.1x to MS NAP (Microsoft NAP), if the end-system authenticating is NAP-enabled (Windows XP SP2 or higher) and the 802.1x authentication request was proxied to a NAP-enabled server. The MS NAP (Microsoft NAP) authentication type can then be used by rules to assign a different Access Control profile. To configure NAC Manager to perform as it did in NAC Manager version 3.1.x, you can create a rule that maps the MS NAP (Microsoft NAP) authentication type to the Pass Through Access Control Profile. With this profile, NAC Manager does not assess the end-system, and uses the NAP determination of whether or not to quarantine a user.
- Override Quarantine Policy for NAP Enabled End-Systems
- This option allows NAC Manager to replace the quarantine policy for NAP-enabled end-systems, using the quarantine policy defined in the profile's Use Quarantine Policy field. Be aware that when this NAP option is enabled, the Use Quarantine Policy checkbox becomes active for all Access Control profiles, even if assessment is disabled. However, you can deselect the checkbox for an individual profile, in which case the policy from the RADIUS attributes is applied.
- Proxy NAP Attributes to Switch
- This option is disabled by default. When disabled, the following
attributes are not proxied
to the switch if they are present in the response from the backend
RADIUS server:
- MS-Machine-Name
- MS-Extended-Quarantine-State
- MS-RNAP-Not-Quarantine-Capable
- MS-Quarantine-State
Device Type Detection Tab
The device type detection settings are advanced settings with complex requirements. Before editing these mappings, contact your Extreme Networks representative or Extreme Networks Support for information and assistance.
Click the graphic for more information.
- Device Type Detection
- When the device type detection option is selected, NAC Manager determines the end-system's device type using the selected detection methods below. Device type can be an operating system family, an operating system, or a hardware type, such as a printer or a smartphone. NAC Manager uses the selected methods in the order configured in the detection source precedence. When this option is deselected, all device type detection functionality on the Access Control engine is disabled.
- Enable Device Type Detection Using Agent-Based Assessment
- This option causes the Access Control engine to query connected agents for the end-system device type. This is the most accurate method of device type detection.
- Enable Device Type Detection Using Agent-less Assessment
- This option allows the Access Control engine to use the results of an agent-less scan to determine the end-system's device type.
- Enable Device Type Detection Using DHCP Fingerprinting
- This option enables passive device type detection by fingerprinting DHCP packets snooped from an end-system. Click the Edit button to change the mapping of the DHCP packet properties to map to a different operating system or physical hardware type.
- Utilize Hostname for Device Type Detection Using DHCP Fingerprinting
- This option allows the end-system hostname to be used to fine-tune device type detection results using DHCP fingerprinting. With certain device types, if DHCP fingerprinting does not result in a unique device type match, the hostname can be used as one possible tie-breaker. For example, with Apple iOS devices, the hostname can be a good indicator of the device type.
- Enable Device Type Detection Using Captive Portal Data
- This option allows the Access Control engine to detect the end-system's device type by using the agent string returned from the end-system's browser. This is the least secure method for device type detection, since it can be faked by the end-system. However, this option should be enabled if you have configured agent-based assessment with the "Allow Agent Unreachable for Unsupported Operating Systems" option enabled, so that the operating system can be detected when the end-system gets the Remediation web page when it is quarantined.
- Allow Device Type to be Overwritten When Device Type Family Changes
- This option allows the device type to be changed by a lower precedence detection method, if the device type family has changed. This option is required if you are supporting dual boot systems and have configured agent-based assessment with the "Allow Agent Unreachable for Unsupported Operating Systems" option enabled. For example, let's say Microsoft Windows XP SP3 was detected by an agent running on a dual boot end-system. If the system is rebooted and switched to Red Hat Linux 4.4, and the end-system is quarantined for not running the agent, the device type detection using captive portal data (a lower precedence method) would yield the device type family of Linux instead of Windows. The device type would be updated and would now pass the unsupported operating system test, and be allowed onto the network.
- Device Type Detection Source Precedence Order
- This list specifies the precedence for the source of information used to determine end-system device type, with the highest precedence listed first. Select an item in the list and use the Move Up and Move Down arrows to change its position in the list. Manual Set refers to device type information that has been hard-coded via Extreme Management Center Web Services. Typically, Manual Set (Accurate) has the highest precedence because the exact device type is known and the remaining sources of detection aren't needed, while Manual Set (Best-Guess) has the lowest precedence because it is a best-guess of the device type and should be used only when the other detection methods cannot provide a device type.
Network Tab
Use this tab to configure the following network services for the Extreme Access Control (Access Control) engine: DNS, NTP, SSH, and SNMP.
Manage DNS Configuration
Select the Manage DNS Configuration checkbox and enter a list of search domains and DNS servers.
Search Domains
A list of search domains used by the Access Control engine when doing lookups by hostname. When an attempt to resolve a hostname is made, these domain suffixes are appended to the hostname of the device. For example, if someone does a ping to server1, NAC Manager appends the search domains in an attempt to resolve the name: server1.domain1 server1.domain2, and so on.
DNS Servers
A list of DNS servers the Access Control engine sends DNS lookups to for name resolution. The list is used by both hostname resolution and by the DNS proxy. You can enter multiple servers for redundancy. Use the Up and Down arrows to list the servers in the order they should be used.
Manage NTP Configuration
NTP (Network Time Protocol) configuration is important for protocols such as SNMPv3 and RFC3576 which incorporate playback protection. In addition, having accurate time configured on the Access Control engine is essential for event logging and troubleshooting. Select the Manage NTP Configuration checkbox, specify the appropriate time zone, and create a list of NTP servers.
Time Zone
Select the appropriate time zone. This allows NAC Manager to manage all date/time settings.
NTP Servers
A list of NTP servers. You can enter multiple servers for redundancy. Use the Up and Down arrows to list the servers in the order they should be used.
Manage SSH Configuration
SSH configuration provides additional security features for the Access Control engine. Select the Manage SSH Configuration checkbox and provide the following SSH information.
Port
The port field allows you to configure a custom port to be used when launching SSH to the engine. The standard default port number is 22.
Disable Remote root Access
Select this option to disable remote root access via SSH to the engine and force a user to first log in with a real user account and then su to root (or use sudo) to perform an action. When remote root access is allowed, there is no way to determine who is accessing the engine. With remote root access disabled, the /var/log/message file displays users who log in and su to root. The log messages looks like these two examples:
sshd[19735]: Accepted password for <username> from 10.20.30.40 port 36777 ssh2
su[19762]: + pts/2 <username>-root
Enabling this option does not disable root access via the console. Do not disable root access unless you have configured RADIUS authentication or this disables remote access to the Access Control engine.
RADIUS Authentication
This option lets you specify a centralized RADIUS server to manage user login credentials for users that are authorized to log into the engine using SSH. Select a primary and backup RADIUS server to use, and use the table below to create a list of authorized RADIUS users.
Authorized Users Table
Use the toolbar buttons to create a list of users allowed to log in to the Access Control engine using SSH. You can add Local and RADIUS users and grant the user Administrative privileges, if appropriate. A user that is granted administrative rights can run sudo commands and commands that only a root user would be able to run. For example, some commands that require administrative rights to run would be:
sudo nacctl restart
sudo reboot
sudo nacdb
If a user is not granted administrative rights, they can log in, view files, and run some commands such a ping and ls.
SNMP Configuration
The SNMP configuration section allows you to deploy SNMP credentials for the Access Control engine. The credentials can include different read/write credentials, for example, the read credential can be "public" and the write credential can be "private". In addition, basic host traps can be enabled from the Access Control engine. Select the Manage SNMP Configuration checkbox and provide the following SSH information.
Profile
Use the drop-down menu to select a device access profile to use for the Access Control engine. Click the Edit button to open the Profiles/Credentials tab in the Authorization/Device Access tool where you can create or edit a profile.
Trap Mode
Set the trap mode.
Trap Community Name
Supply the trap community name.
For information on related windows: