Hp Identity Driven Manager Software Series Bedienungsanleitung Seite 22

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 88
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 21
Getting Started
Before You Begin
5. Create an Access Policy Group, with rules containing the Location, Time,
System, and Access Profile that is applied to users when they login. (See
page 3-16)
6. Assign Users to the appropriate Access Policy Group. (See page 3-20)
7. Deploy the configuration policies to the IDM Agent on the RADIUS server.
(See page 3-22)
IDM Usage Strategies
You can use IDM to simply monitor user activity on the network, or to apply
user authentication rules to improve network security and performance. The
following table identifies the IDM configuration for various deployment and
usage strategies for IDM.
Authentication Authorization Strategy Description
VLAN QoS Rate-
Limit
Monitor and report user activity.
x
Enhance normal RADIUS authentication with
Location, Time, and System rules
x x
Provide rudimentary VLAN segregation
(Unknown Users, Guests, Visitors, Contractors)
x x
Provide complete VLAN placement for all
Users
x x x
Provide QoS and Rate-limits per User
x x x x
VLAN, QoS, and Rate-limits for all users, based
on Location, Time, and System
Table 1. IDM Deployment and Usage strategies
2-4
Seitenansicht 21
1 2 ... 17 18 19 20 21 22 23 24 25 26 27 ... 87 88

Kommentare zu diesen Handbüchern

Keine Kommentare