Specifications

Contents
BlueSecureâ„¢ Controller Setup and Administration Guide xi
Figure 4-23:
Admin Interface in Network Routing Table ..................................... 4-30
Figure 4-24: Enabling Multicast Routing........................................................... 4-31
Figure 4-25: Enabling AppleTalk Routing ......................................................... 4-33
Figure 5-1: New Local User Page.................................................................... 5-3
Figure 5-2: New MAC Device Page ................................................................ 5-5
Figure 6-1: New RADIUS Server Page ............................................................. 6-3
Figure 6-2: New LDAP/Active Directory Server Page......................................... 6-7
Figure 6-3: New SIP2 Server Page ................................................................ 6-11
Figure 6-4: New NTLM Server Page .............................................................. 6-12
Figure 6-5: New Transparent NTLM Windows Server Page.............................. 6-15
Figure 6-6: User Authentication in an 802.1x Environment ............................... 6-17
Figure 6-7: New Transparent 802.1x Server Page .......................................... 6-18
Figure 6-8: Edit the Local 802.1x Server Page ................................................ 6-20
Figure 6-9: New Kerberos Server Page.......................................................... 6-23
Figure 6-10: New Cosign Server Page ............................................................ 6-25
Figure 6-11: New Pubcookie Server Page ........................................................ 6-28
Figure 6-12: New CAS Server Page ................................................................ 6-30
Figure 6-13: Enabling Transparent Certificate Authentication.............................. 6-33
Figure 6-14: External Authentication Server Test Page........................................ 6-35
Figure 7-1: New RADIUS Accounting Page ...................................................... 7-2
Figure 8-1: Role-based Authorization for a Registered User ................................ 8-3
Figure 8-2: Role-based Authorization for an Unregistered User ........................... 8-3
Figure 8-3: Create a Role Page....................................................................... 8-5
Figure 8-4: Enabling Machine Authentication on Windows Zero-Config Supplicant8-7
Figure 8-6: Mapping Role Placement Based on Username.................................. 8-8
Figure 8-7: Successful Machine Authentication.................................................. 8-8
Figure 8-8: Successful User Login .................................................................... 8-8
Figure 8-9: Failed User Login because Machine Authentication Failed ................. 8-8
Figure 8-10: Log Message upon Failure ............................................................. 8-8
Figure 8-5: Enabling Prerequisite Machine Authentication Role ........................... 8-8
Figure 8-11: Create a (Destination) Host Page .................................................. 8-11
Figure 8-12: Create a (Destination) Network Page ............................................ 8-12
Figure 8-13: Create a (Destination) Group Page ............................................... 8-13
Figure 8-14: Create a Service Page................................................................. 8-15
Figure 8-15: Create a (Service) Group Page..................................................... 8-17
Figure 8-16: Create a Schedule Page .............................................................. 8-18
Figure 8-17: Create a (Schedule) Group Page .................................................. 8-19
Figure 8-18: Create a User Location Page........................................................ 8-20
Figure 8-19: Create a (Location) Group Page ................................................... 8-21
Figure 9-1: VoWLAN General Settings Page .................................................... 9-2
Figure 9-2: IP Phones Settings Page ................................................................. 9-2
Figure 10-1: HTTP Settings Page ..................................................................... 10-2
Figure 10-2: BSC IDS Host State Model ........................................................... 10-6
Figure 10-3: Intrusion Detection System Settings Page........................................ 10-8
Figure 10-4: SNMP Settings Page ................................................................... 10-9
Figure 10-5: Auto Backups Page................................................................... 10-10
Figure 10-6: BSC Time Settings Page............................................................. 10-11
Figure 10-7: BSC Email Settings Page............................................................ 10-12
Figure 10-8: Public Access Settings Page ....................................................... 10-12
Figure 10-9: Logging Settings Page ............................................................... 10-15
Figure 10-10: Thresholds Page ....................................................................... 10-17
Figure 10-11: DNS Proxy Page....................................................................... 10-19
Figure 10-12: Certificate Management Page .................................................... 10-21
Figure 10-13: IPSec Certificate Signing Request Generation Page ....................... 10-23