Arista Networks SS300ATC60 SpectraGuard Access Point / Sensor User Manual SS 300AT C 60 UserMan Part5
AirTight Networks, Inc. SpectraGuard Access Point / Sensor SS 300AT C 60 UserMan Part5
Contents
- 1. Users Manual
- 2. Users Manual-1
- 3. Users Manual-2
- 4. Users Manual-3
- 5. Users Manual-4
- 6. Users Manual-5
- 7. Users Manual-6
- 8. (SS-300AT-C-60) UserMan-Part1_2013.12.11 revised
- 9. (SS-300AT-C-60) UserMan-Part2
- 10. (SS-300AT-C-60) UserMan-Part3
- 11. (SS-300AT-C-60) UserMan-Part4
- 12. (SS-300AT-C-60) UserMan-Part5
- 13. (SS-300AT-C-60) UserMan-Part6
(SS-300AT-C-60) UserMan-Part5
Administration Tab
SpectraGuard® Enterprise User Guide
221
View Logs
Recommendation: In order to properly view the multilingual characters, download the log file in .TSV format and
view it in Excel.
In the log file, different log records are listed in different rows. For each row, following columns are provided:
Date (UTC): Specifies the date and the time of the record in UTC format
Module: Specifies if the user action was performed from the Console (GUI), API, or the Config Shell (CLI)
Host Address: Specifies the IP Address/Client Name/API Client Identifier/Hostname from where the system
was accessed by the user
Role: Specifies the role of the user
Login Name: Specifies the login name of the user whose action has triggered the specific log record
Type: This column indicates the type of record. Type is one of: Access, Devices, Events, Reports, Location Tree,
Local Settings, Global Settings, Start/Stop Functions, System, Others.
Status: This column indicates if the record pertains to success or failure of the action.
Message: Describes the record in detail.
Upgrade
Upgrade the Server
The system enables you to upgrade the existing version of the server to a newer version, if available. This section
describes the steps to upgrade the server working in Standalone mode. For steps to upgrade the server working in
High availability (HA) mode, refer to the High Availability Configuration Guide.
Administration Tab
SpectraGuard® Enterprise User Guide
222
Select the check box, Check for availability of Server upgrade at each login, to enable the system automatically
check if an upgrade is available when you log into the console.
Upgrade
If you have modified the Upgrade Link, to save it click <Apply> on the Upgrade screen.
To check if an upgrade is available for the server, click <Check for Upgrade Now>.
If an upgrade is available, an Upgrade Available dialog appears.
Upgrade Available Dialog
Click the hyperlink, support center, to go to the AirTight® Networks Support Portal, from where you can download
the server upgrade bundle.
Administration Tab
SpectraGuard® Enterprise User Guide
223
Click OK or close the dialog to close the Upgrade Available dialog. Alternatively, click Ignore Upgrade Notification
to ignore the upgrade notification until you log out of the Console.
If an upgrade is not available, an Upgrade Not Available dialog appears. Click <OK> to close the dialog.
Upgrade Not Available Dialog
Upgrade SpectraGuard Enterprise Now
Prerequisites:
1 Sun Java Runtime Environment (JRE) version 1.6 update 22 or above must be installed on the computer from
where you access the Console.
2 Popup blockers on the computer from which the Console is accessed must allow popup windows from the
server.
3 If there is a firewall between the computer from which the Console is accessed and the server, TCP port 8080 of
the server must be accessible from that computer.
4 Users with the ‘Superuser’ user role only can initiate server upgrade using this method.
Recommended: To upgrade the server to a higher version, ensure that you access the Console using a computer
whose IP address is not behind Network Address Translation (NAT). If you access the Console, using a NATed IP,
upgrade will continue in the background but you cannot view the upgrade progress messages.
Steps for Server Upgrade
1 Click Browse to select the Upgrade Bundle.
2 Click Upgrade Now to transfer the Upgrade Bundle to the server.
3 On the Confirm Upgrade dialog, click Yes to proceed with the upgrade.
Confirm Upgrade Dialog
4 The Uploading Upgrade Bundle message with the progress bar appears.
Administration Tab
SpectraGuard® Enterprise User Guide
224
Uploading Upgrade Bundle Progress Bar
5 You can cancel the upgrade by clicking Cancel anytime while the Upgrade Bundle upload is in progress.
6 After the Server Upgrade Bundle upload is complete, Server Upgrade starts automatically.
7 Close the current browser window. A new window, Server Upgrade Progress, is launched which displays the
status of the Server Upgrade process. Follow the instructions displayed on the Server Upgrade Progress window.
Administration Tab
SpectraGuard® Enterprise User Guide
225
Server Upgrade Progress Window
Note: You cannot abort or cancel the Server Upgrade process once the Server Upgrade Progress window is
launched. Additionally, the Server Upgrade process continues even if the Server Upgrade Progress window is
closed.
8 After the server upgrade is successful, the server reboots automatically.
9 After you have read all instructions on the Server Upgrade Progress window, close all the Web browser
windows including the Server Upgrade Progress window.
10 Wait for five minutes for the server to reboot. After this, you can access the server again.
High Availability
High Availability (HA) mode allows two servers to be connected in a redundant configuration to form an HA cluster.
One server acts as the Active server, while the other as a Standby server. If the Active server fails, the Standby server
takes over. This screen shows the status of the servers in HA cluster.
Administration Tab
SpectraGuard® Enterprise User Guide
226
HA Status
HA Status: This is a read-only section and displays the following information:
HA Status: Displays the status of the HA Cluster.
Standalone: This state indicates that the server is in Standalone mode.
Up: This state indicates that the HA Cluster is up and running.
Other Server Not Reachable: This state indicates that the Standby server is not reachable over the HA
interface link. Check whether the HA interfaces of both the servers are securely connected using a crossover
Ethernet cable.
Temporarily In Transition: This is an intermediate state. You need to wait for up to 30 minutes and then
check the HA Status again. If this state persists, contact Technical Support.
HA Setup In Progress: This state indicates that an HA setup is in progress using Config Shell or an
earlier HA setup session was abnormally terminated. If you are sure HA setup is not in progress, reboot both
the servers. After reboot, both the servers come up in the 'Standalone' mode. You need to wait for five
minutes after the reboot and then login to these servers.
Server Upgrade In Progress: This state indicates that server Upgrade is in progress or an earlier server
Upgrade session was abnormally terminated. If you are sure server Upgrade is not in progress, reboot the
server. After reboot, the server will come up in the 'Standalone' mode. You need to wait for five minutes after
the reboot and then login to the server.
Database Operation In Progress: This state indicates that some database operation is in progress. If you
are sure no database operation is in progress, please contact Technical Support.
Internal System Recovery In Progress: This state indicates that internal system recovery is in progress.
If the same state persists for more than 30 minutes, please ensure that both the HA servers are up and the HA
interfaces of these servers are securely connected using a crossover Ethernet cable. If the same state persists
even after the above checks, please contact Technical Support.
Administration Tab
SpectraGuard® Enterprise User Guide
227
Error: This state indicates an error in HA state. Contact Technical Support.
Cluster IP Address: This IP Address can be used by the Console and Sensors to connect to the HA cluster. This
is a virtual IP Address used to connect to the HA cluster. Cluster IP address is optional. It can not be used in Layer3
HA configuration.
Data Sync State: Displays the state of data synchronization from Active Server to Standby Server after enabling
HA Service or after database operation such as database restore.
Data Sync Link: Data sync link is the link which carries data from the Active Server to Standby. HA interface or
Network Interface can be used as ‘Data Sync Link’ between the servers. During HA setup, user can skip use of HA
interface.
This field indicates whether two servers are reachable over ‘Data Sync Link’ interface.
HA Failover Mode: Indicates HA failover mode – Automatic/Manual.
Active Server: This section displays IP addresses of the Active server.
Network IP Address: This is the IP Address of the network interface of the Active server.
HA IP Address: This is the IP Address of the HA interface of the Active server.
Standby Server: This section displays IP Addresses of the Standby Server.
Network IP Address: This is the IP Address of the network interface of the Standby server.
HA IP Address: This is the IP Address of the HA interface of the Standby server.
Login Configuration
The system enables you to configure a login message through the Login Configuration screen. Superuser of the
system has the right to enter the login message that will be flashed in the Login screen.
Administration Tab
SpectraGuard® Enterprise User Guide
228
Login Configuration
Under Configure Login Message:
Select the checkbox, View Login Message to show the login message on the Console login page.
Console Login Message: Specifies the login message to display on the Console and on the banner message of
SGE CLI screen.
The Login screen with the specified Console Login Message appears as follows.
Administration Tab
SpectraGuard® Enterprise User Guide
229
Login Screen with the Console Login Message
Under Concurrent Console Login Settings:
Concurrent Sessions per User: Configures the maximum number of concurrent console login sessions per user.
(Minimum: 1, Maximum: 5, Default: 5)
Wizard
The system’s Setup Wizard systematically takes you through a recommended sequence of configuration screens that
enable you to set up your system completely. This wizard does not remember or apply any configuration changes. It
is simply a tour guide. You must explicitly apply changes on the individual configuration screens for them to take
effect. You can exit the wizard or skip a step at any time.
Administration Tab
SpectraGuard® Enterprise User Guide
230
Wizards
Click Start Setup Wizard to open a Confirm message dialog that confirms your navigation through the wizard.
SpectraGuard Manager Configuration
SpectraGuard Manager establishes a communication channel with SpectraGuard Enterprise through a digital
certificate. Version 6.6 onwards, digital certificate-based authentication replaces the username-password
authentication required to log in to the SpectraGuard Enterprise Console through the SpectraGuard Manager
Console. To use certificate-based authentication, you need to have version 6.6 or above, of both SpectraGuard
Manager and SpectraGuard Enterprise.
The certificate needs to be downloaded first from the SpectraGuard Manager and then added to the SpectraGuard
Enterprise server. Both SpectraGuard Manager and SpectraGuard Enterprise need to have the same certificate to
communicate with each other.
The SpectraGuard Manager Configuration option allows you to add, view or delete the certificate that serves as the
link between SpectraGuard Enterprise server and SpectraGuard Manager.
This is a license-based feature. You will be able to see this option under Administration->Global->System Settings
only if you have the appropriate license.
The following figure displays the SpectraGuard Manager Configuration screen.
Administration Tab
SpectraGuard® Enterprise User Guide
231
SpectraGuard Manager Configuration
Adding the digital certificate to SpectraGuard Enterprise Server
Before adding the certificate to the SpectraGuard Enterprise server, it must be downloaded from the SpectraGuard
Manager console, and saved to the desired location. To add the certificate to the SpectraGuard Enterprise server,
click Add on the SpectraGuard Manager Configuration screen. Select the certificate from the folder where you have
saved it and add it to the SpectraGuard Enterprise server.
Viewing the digital certificate
Before adding the certificate to the SpectraGuard Enterprise server, it must be downloaded from the SpectraGuard
Manager Console, and saved to the desired location. To view the certificate on the SpectraGuard Enterprise Console,
click the View on the SpectraGuard Manager Configuration screen.
Disassociating the SpectraGuard Enterprise Server from SpectraGuard Manager
To end the association with SpectraGuard Manager, click Disassociate. On clicking Disassociate, the digital
certificate used to communicate with SpectraGuard Manager is deleted from the SpectraGuard Enterprise server.
After the disassociation, the SpectraGuard Enterprise server is no longer able to communicate with the SpectraGuard
Manager.
WLAN Integration
The WLAN Integration dialog enables the system to be integrated with various WLAN Management tools.
Aruba Mobility Controllers
Administration Tab
SpectraGuard® Enterprise User Guide
232
The system integrates with Aruba Mobility Controllers. It fetches wireless device details and RSSI information from
the Aruba Mobility Controllers and thus helps to manage the WLAN infrastructure.
The Aruba WLAN architecture consists of Aruba Mobility Controllers and APs. At any time, the Aruba Mobility
Controller has all the information about the APs and devices seen/associated with these APs.
Integration with Aruba allows the system to fetch this information from Aruba Mobility Controller. Using this
information the system can automatically classify devices managed by Aruba Mobility Controllers, and do location
tracking of devices seen by Aruba APs in sensor-less or sensor and AP mixed environment.
Aruba Integration
Aruba Integration Status: If Aruba integration is enabled, the system obtains data from the configured
mobility controllers, which are individually enabled.
Aruba Integration Enabled: When you select the Aruba Integration Enabled check box, you can
configure Automatic Synchronization Settings. The system disables a mobility controller, by default.
However, automatically enables Aruba integration when you add a new Aruba Mobility Controller.
Current Status: Displays the Current Status of the Aruba mo: Running, In Process or Stopped. An Error
status is shown in one of the following cases:
One of the configured and enabled Aruba Mobility Controllers has a hostname, which cannot be
resolved
One of the configured and enabled Aruba Mobility Controllers is not reachable
System server is stopped
Internal error, in which case you need to contact Technical Support
Imported APs: This percentage indicates total number of APs imported from enabled Aruba mobility
controllers as a fraction of maximum allowed. The maximum allowed depends on type of appliance. The
status displayed is as of the last synchronization event. It is recommended that the utilization remains below
Administration Tab
SpectraGuard® Enterprise User Guide
233
80%. If the utilization exceeds 80%,the system performance may degrade and result in side effects such as
sluggish UI and sensor disconnections.
Under Automatic Synchronization Settings, select the System-Aruba Mobility Controller synchronization
interval.
Synchronization Interval (Minutes): Specifies the interval for which the server synchronizes with the
enabled Aruba mobility controllers
(Minimum: 15 minutes; Maximum: 60 minutes; Default: 30 minutes)
Click Apply to save the changes made to the Aruba Integration dialog.
Click Cancel to cancel the changes made to the Aruba Integration dialog.
Click Restore Defaults to restore the default values for the fields on the Aruba Integration dialog.
Adding an Aruba Mobility Controller
Under Aruba Mobility Controllers, click Add to open Aruba Mobility Controller dialog where you can add Aruba
Mobility Controller details.
Aruba Mobility Controller Dialog
Aruba Mobility Controller contains the following fields:
Controller (IP Address/Hostname): Specifies the IP address or the hostname of the Aruba Mobility Controller
with which the system should communicate.
Administration Tab
SpectraGuard® Enterprise User Guide
234
Note: Configured Aruba Mobility Controllers will use the DNS names and DNS suffixes configured by the user in
the Server Initialization and Setup Wizard on the Config Shell.
Community String: Specifies the user defined community string using which the system communicates with
the Aruba Mobility Controller.
(Default: public)
Port Number: Specifies the port number of the Aruba Mobility Controller from which data is imported.
(Default: 161)
Data Import Enabled?: Indicates if the Aruba Mobility Controller is enabled to communicate with the system,
for data import by the system.
(Default: Selected)
Import Managed APs?: Indicates if the AP’s managed by the Aruba Mobility Controller, are to be imported into
the system.
(Default: Selected)
Import Managed Clients?: Indicates if clients associated with APs managed by the Aruba Mobility Controller
are to be imported into the system.
(Default: Selected)
Import Managed Clients Associations?: Indicates if information related to AP-client association, for AP’s
managed by the Aruba Mobility Controller, is to be imported into the system. This check box is disabled, if Import
Managed Clients check box is deselected.
Import Unmanaged APs?: Indicates if APs not managed by the Aruba Mobility Controller are to be imported
into the system.
(Default: Selected)
Import Unmanaged Clients?: Indicates if Clients associated with APs not managed by the Aruba Mobility
Controller, are to be imported into the system.
(Default: Deselected)
Import Unmanaged Clients Associations?: Indicates if information related to AP-client association, for AP’s
managed by the Aruba Mobility Controller, is to be imported into the system. This check box is enabled, only if
Import Unmanaged Clients check box is selected.
Import Signal Strength Information?: Indicates if the signal strength of the managed devices is to be imported
into the system.
(Default: Enabled)
Note: Location Tracking results may vary depending on the Aruba AP models used in the network.
Click Add to add the details for the new Aruba Mobility Controller. Click Test to confirm the validity of IP
Address/Hostname.
Editing Aruba Mobility Controller settings
Double-click a row to open the Aruba Mobility Controller Dialog similar to the one shown above, to update the
Aruba Mobility Controller details. Alternatively, select a row and click Edit to open the Aruba Mobility Controller
Dialog. Edit the required fields. Click Save to save the changes.
Deleting an Aruba Mobility Controller
Select a row and click Delete to discard the details of an existing Aruba Mobility Controller. You can delete multiple
Aruba Mobility Controller details using click-and-drag or using the <Shift> + <Down Arrow> keys and then clicking
Delete.
Cisco WLC
The Wireless LAN Controller (WLC) governs a collection of thin AP. LWAPP defines the network protocol between
the APs and WLC. The advantages of this solution are:
Administration Tab
SpectraGuard® Enterprise User Guide
235
Increased scalability
Simplified, centralized management
Zero-touch AP deployment and configuration
Network-wide monitoring
Cisco WLC
The Cisco Unified WLAN architecture consists of Wireless LAN Controllers (WLC) and APs. The APs are managed
using Light Weight Access Point Protocol (LWAPP). At any time, the WLC has all the information about the APs and
devices seen/associated with these APs.
Integration with Cisco WLC allows the system to fetch this information from WLC. Using this information the system
can automatically classify devices managed by WLC and do location tracking of devices seen by LWAPP APs in
sensor-less or sensor and AP mixed environment.
Important: Currently, the system supports the following managed APs: Cisco Aironet 1000 Series, Cisco Aironet
1100 Series, Cisco Aironet 1130 Series, Cisco Aironet 1140 Series, Cisco Aironet 1200 Series, Cisco Aironet 1230
AG Series, Cisco Aironet 1240 AG Series, Cisco Aironet 1250 Series, and Cisco Aironet 1300 Series. The system
supports WLC version 4.2 to 6.0.182.0.
WLC Integration Status: If WLC integration is enabled, the system obtains data from the configured WLCs,
which are individually enabled.
If you select WLC Integration Enabled, you can configure Automatic Synchronization Settings. The system
disables WLC by default. However, automatically enables WLC Integration when you add a new WLC.
Current Status: Displays the Current Status of the WLC: Running or Stopped. An Error status is shown in one of
the following cases:
One of the configured and enabled WLCs has a hostname, which cannot be resolved
One of the configured and enabled WLCs is not reachable
Administration Tab
SpectraGuard® Enterprise User Guide
236
System server is stopped
Internal error, in which case you need to contact Technical Support
Imported APs: This percentage indicates total number of APs imported from WLC(s) as a fraction of maximum
allowed. The maximum allowed depends on type of appliance. The status displayed is as of the last synchronization
event. It is recommended that the utilization remains below 80%. If the utilization exceeds 80%,the system
performance may degrade and result in side effects such as sluggish UI and sensor disconnections.
Under Automatic Synchronization Settings, select the System-WLC synchronization interval.
Synchronization Interval (Minutes): Specifies the interval for which the server synchronizes with the WLC
(Minimum: 15 minutes; Maximum: 60 minutes; Default: 30 minutes)
If the customer has some Lightweight Access Points (LAPs) whose type (like ap1030, ap1130) is not supported
by SGE, then these LAPs can be supported by importing the WLC configuration bundle received from the AirTight
Support on request. After the bundle is received, click <Advanced Configuration> The Import Custom WLC
Configuration File dialog appears. The custom WLC configuration file from this bundle is used for all future WLC
synchronization. The bundle is imported as .tgz.
Import Custom WLC Configuration File Dialog
Click Browse to specify the appropriate location of the WLC Configuration bundle and click <Import>, a progress bar
appears. After the file is imported, the date and time when file was imported is displayed as in the screen.
Import Custom WLC Configuration File Dialog showing date and time of the file imported
If the file is not imported for some reason or if the file is corrupted, an error message is displayed.
Note: Only the Super User is allowed to import WLC configuration file. All other users, including the
administrator has only the viewing rights.
Adding a WLAN Controller
Under Wireless LAN Controllers, click <Add> to open WLAN Controller dialog where you can add WLC details.
Administration Tab
SpectraGuard® Enterprise User Guide
237
WLAN Controller Dialog
WLAN Controller contains the following fields:
Controller (IP Address/Hostname): Specifies the IP address or the hostname of the WLC with which the system
communicates.
Note: Configured WLCs will use the DNS names and DNS suffixes configured by the user in the Server
Initialization and Setup Wizard on the Config Shell.
Community String: Specifies the user defined community string using which the system communicates with
the WLC.
(Default: public)
Port Number: Specifies the port number of the WLC from which data is imported.
(Default: 161)
Enabled?: Indicates if the WLC is enabled to communicate with the system.
(Default: Enabled)
Import Managed APs?: Indicates if WLC managed APs managed are to be imported into the system.
(Default: Enabled)
Import Clients Associated to Managed APs?: Indicates if Clients associated to APs managed by a WLC are to
be imported into the system.
(Default: Enabled)
Import Unmanaged APs?: Indicates if APs not managed by a WLC are to be imported into the system.
(Default: Enabled)
Import Unmanaged Clients?: Indicates if Clients associated with APs not managed by a WLC are to be
imported into the system.
Administration Tab
SpectraGuard® Enterprise User Guide
238
(Default: Disabled)
Import Signal Strength Information?: Indicates if the signal strength of the managed devices is to be imported
into the system.
(Default: Enabled)
Note: Location Tracking results may vary depending on the Channel scan settings set on the WLC.
Click <Add> to add the details for a new WLC. Click <Test> to confirm the validity of IP Address/Hostname, SNMP
settings, and version compatibility of the newly added Lwapp Controller.
Editing a WLAN Controller
Double-click a row or click Edit to open an LWAPP Configuration dialog similar to the one shown above, to update
the WLC details. Click <Save> to save all settings.
Deleting a WLAN Controller
Select a row and click Delete to discard the details of an existing WLC. You can delete multiple WLC details using
click-and-drag or using the <Shift> + <Down Arrow> keys and then clicking Delete.
Note: From 6.2 release onwards, WLC will support the H-REAP mode along with the Local mode.
Integration with Cisco WLSE
Wireless LAN Solution Engine (WLSE) is a centralized, systems-level application that manages and controls an entire
Cisco AirTight WLAN infrastructure. WLSE eases Cisco’s WLAN deployments, enhances network security,
maximizes network availability, and reduces operating expenses.
Integration with Cisco WLSE allows the system to automatically classify WLSE managed APs and enables manual
switch port blocking to contain Rogue APs.
Administration Tab
SpectraGuard® Enterprise User Guide
239
Cisco WLSE
WLSE Integration Status: If WLSE integration is enabled, the system interacts with the configured WLSE server.
Else, WLSE integration services are shut off.
If you select WLSE Integration Enabled, you can configure the following WLSE Server Settings. The
system disables WLSE by default.
Current Status: Displays the Current Status of the WLSE server: Running or Stopped.
WLSE Server Settings: If a valid WLSE server is not specified, the system does not interface with the WLSE
Server.
WLSE Server IP Address/Hostname: Port: Specifies the IP address or the name and the port number of
the WLSE server
Username: Specifies the username for the WLSE server
Password: Specifies the password for the WLSE server
To test the WLSE server settings, click <Test WLSE Server Settings>. The settings used for this test are those that you
have specified. A dialog appears on completion of the test.
Note: The user created for the system should have XML API privileges on the WLSE server. You should
add the IP address of the server to the Access Control List of the WLSE server.
WLSE Operating Policies: Specifies policies to integrate the system with the WLSE server.
If you select Enable AP Classification integrated with WLSE, you can integrate the system’s AP Classification
and Intrusion Prevention policies with the WLSE sever such that:
WLSE-managed APs that are Potentially Authorized automatically move to the Authorized AP folder
All WLSE-managed APs automatically move to the Authorized AP folder
Administration Tab
SpectraGuard® Enterprise User Guide
240
Note: When you select the option All WLSE-managed APs automatically move to the Authorized AP folder
and connect a Rogue AP to the network, the port to which the AP is connected is not blocked. This is a limitation of
the WLSE API. In other words, the WLSE API provides only tracing functionality and not shutdown functionality.
Automatic Synchronization Settings: Specifies the interval at which the server should automatically
synchronize with the WLSE server.
Synchronization Interval (Days): Specifies the number of days: that is, the interval for which the server
synchronizes with the WLSE server.
(Minimum: 1 day; Maximum: 30 days; Default: 7 Days)
Synchronization Start Date and Time: Specifies the start date and time for the synchronization interval.
(Default: Current Date and Time)
Manual Synchronization: Click <Synchronize> to manually synchronize the server with the WLSE server.
HiveManager
HiveManagers can synchronize devices and associations with the system. It reports both managed Hive APs with
their associations and devices visible in background scans.
HiveManager
WLAN Integrations displays the status of the HiveManager:
Client ID: Displays the Unique Integration Identifier of the HiveManager
Total APs: Displays the total number of import AP calls made by the HiveManager
Total Clients: Displays the total number of import Client calls made by the HiveManager
Total Associations: Displays the total number of AP-Client Association import calls made by the HiveManager
Last Sync Time: Displays the date and time of the last call made by the HiveManager
Note: Total gives the total number of HiveManagers.
Administration Tab
SpectraGuard® Enterprise User Guide
241
HP MSM Controller
The HP MSM Controller manages a collection of thin APs. The HP MSM architecture consists of MSM Controllers
and the APs that are managed by these controllers. Integration with HP MSM Controller allows the system to fetch
information about Synchronized APs. Using this information, the system automatically classifies these devices.
HP MSM Controller Integration
Important: The system supports HP MSM Controller version 5.4.2 or higher.
Integration Status: Enabling the MSM Controller integration allows the system to obtain data from the configured
controllers. Enabling / Disabling individual controllers is also possible.
Selecting Integration Enabled enables integration for all configured controllers.
Current Status: Displays Running if Integration is enabled. Displays Stopped if controller integration is switched
off. The Status field for each individual controller displays Error if
One of the configured and enabled MSM Controllers has a hostname which cannot be resolved
One of the configured and enabled MSM Controllers is not reachable
System server is stopped
Internal error (Contact Technical Support)
Under Automatic Synchronization Settings, select the System synchronization interval.
Synchronization Interval (Minutes): Specifies the interval after which the server synchronizes with the MSM
Controller.
(Minimum: 15 minutes; Maximum: 60 minutes; Default: 15 minutes)
Client Certificate Management: When the MSM Controller is configured to communicate with Client programs
using Secure HTTP and Client Authentication, a Client Certificate is uploaded into the MSM Controller’s Trusted CA
Administration Tab
SpectraGuard® Enterprise User Guide
242
Certificate Store. Click Download to download a pre-generated Client Certificate for the system. Following figure
displays the dialog box that appears on clicking the Download button.
Client Certificate Download Dialog
Click Save to download and save the Client Certificate to the appropriate directory.
Upload this Client Certificate into the MSM Controller’s Trusted CA Certificate Store using its management tool. The
system is now setup and ready to communicate with the MSM Controller.
Note: To customize the Client Certificate refer to the CLI commands: get msmcontroller cert, get msmcontroller
certreq, and set msmcontroller cert as described in Config Shell Commands in the Installation guide.
Adding an HP MSM Controller
Under MSM Controllers, click Add to configure an MSM Controller for integration. The following figure displays the
Add HP MSM Controller dialog.
Administration Tab
SpectraGuard® Enterprise User Guide
243
Add HP MSM Controller Dialog
HP MSM Controller contains the following fields:
Controller Name or IP Address: Specifies the Controller Name or IP address of the HP MSM Controller with
which the system communicates.
Port Number: Specifies the port number of the HP MSM Controller from which data is imported.
(Default: 448)
Authentication:
Secure Http (SSL/TLS): Select this option if the MSM Controller is configured to use HTTPS for authentication.
In addition, if the MSM Controller is setup to use Client Authentication, ensure that the System’s Client Certificate is
uploaded into the MSM Controller’s Trusted CA Certificate Store.
Http Authentication: If enabled, specifies whether the HP MSM Controller requires Http authentication
Username: Specifies the user name for HP MSM Controller authentication
Password: Specifies the password for HP MSM Controller authentication
Click the Add button to save the details for a new HP MSM Controller.
Editing an HP MSM Controller
Double-click a row or click Edit to open an HP MSM Controller dialog similar to the one shown above, to update the
HP MSM Controller details. Click Save to save all settings.
Deleting an HP MSM Controller
Select a row and click Delete to discard the details of an existing HP MSM Controller. You can delete multiple HP
MSM Controller details using click-and-drag or using the <Shift> + <Down Arrow> keys and then clicking Delete.
Enabling an HP MSM Controller
Select a row and click Enable to enable the selected HP MSM Controller. You can enable multiple HP MSM
Controller details using click-and-drag or using the <Shift> + <Down Arrow> keys and then clicking Enable.
Disabling an HP MSM Controller
Administration Tab
SpectraGuard® Enterprise User Guide
244
Select a row and click Disable to disable the selected HP MSM Controller. You can disable multiple HP MSM
Controller details using click-and-drag or using the <Shift> + <Down Arrow> keys and then clicking Disable.
Checking configuration status of an HP MSM Controller
Select a MSM Controller row under MSM Controllers and click the Test button.
The System will return Pass status if the HP MSM Controller has been correctly configured.
The System will return Fail status if the HP MSM Controller has been not been correctly configured.
The following figure displays the message box displayed on evaluation of the HP MSM Controller setup.
MSM Controller Integration Test Result
Meru
Meru Integration enables the system to use Virtual Cell and Virtual Port Architecture for reporting accurate AP
inventory. System also detects the physical APs to which the Clients are associated. This helps the user for accurate
location tracking and to protect against advanced threats.
Administration Tab
SpectraGuard® Enterprise User Guide
245
Meru
Select Enable Virtual Cell and Virtual Port Support check box to activate support for Meru Virtual Cell and Virtual
Port architecture. Click <Apply> a dialog appears to restart the server to activate the changes.
Server restart dialog
Click Yes. A confirmation dialog appears that the configuration settings have been saved successfully.
Confirmation dialog
ESM Integration
ArcSight ESM Server
Administration Tab
SpectraGuard® Enterprise User Guide
246
The Enterprise Security Management (ESM) Integration screen allows configuration of various ESM integrations that
collect, analyze, and display events.
The system integrates with ArcSight’s Enterprise Security Management (ESM) infrastructure by sending events to the
designated ArcSight server. The ArcSight server is configured to accept syslog messages having detailed event
information in ArcSight’s Common Event Format (CEF). The system needs the IP Address or the hostname and the
port on which the ArcSight server receives events.
ArcSight ESM Server
ArcSight Integration Status: If ArcSight integration is enabled, the system sends messages to the configured
ArcSight servers. Otherwise, ArcSight integration services are shut off.
If you select ArcSight Integration Enabled, you can manage ArcSight servers. The system enables
ArcSight Integration by default.
Current Status: Displays the Current Status of the ArcSight Integration: Running or Stopped. An Error
status is shown in one of the following cases:
One of the configured and enabled ArcSight servers has a hostname, which cannot be resolved
System server is stopped
Internal error, in which case you need to contact Technical Support
Adding an ArcSight Server
Under ArcSight Servers, click <Add>to open to ArcSight Configuration dialog where you can add ArcSight
server details.
Administration Tab
SpectraGuard® Enterprise User Guide
247
ArcSight Configuration Dialog
ArcSight Configuration dialog contains the following fields:
ArcSight Server (IP Address/Hostname): Specifies the IP Address or the hostname of the destination ArcSight
server to which the CEF formatted messages are sent.
Note: Configured ArcSight servers will use the DNS names and DNS suffixes configured by the user in the Server
Initialization and Setup Wizard on the Config Shell.
Port Number: Specifies the port number of the ArcSight server to which the system should send CEF messages.
Enabled?: If the checkbox is selected, the system sends CEF messages to the configured and enabled ArcSight
servers. The delivery of the CEF messages cannot be guaranteed due to use of UDP/unreliable transport.
(Default: Enabled)
Click Add to add the details for a new ArcSight server.
Editing an ArcSight Server
Double-click a row or click Edit to open ArcSight Configuration dialog similar to the one shown above. Click Save to
save all settings.
Deleting an ArcSight Server
Select a row and click Delete to discard the configuration of the selected ArcSight server. You can delete multiple
ArcSight server details using click-and-drag or using the <Shift> + <Down Arrow> keys and then clicking Delete.
Note: Total gives the total number of ArcSight servers configured to receive events from the system.
SNMP
The SNMP dialog enables the system to send events as SNMP traps to designated SNMP trap receivers. It also allows
SNMP managers to query server operating parameters using IF-MIB, MIB-II, and Host Resources MIB.
Administration Tab
SpectraGuard® Enterprise User Guide
248
SNMP
SNMP Integration Status: If SNMP integration is enabled, the system sends SNMP traps to the configured
SNMP servers. Other systems can do an SNMP Get to this server. Otherwise, SNMP integration services are shut off.
If you select SNMP Integration Enabled, you can edit and manage SNMP server details. The system enables
SNMP by default.
Current Status: Displays the Current Status of the SNMP server: Running or Stopped. An Error status is shown
in one of the following cases:
System server is stopped
Internal error, in which case you need to contact Technical Support
Under SNMP Settings, configure SNMP Gets or Traps.
SNMP Gets Enabled: Allows SNMP managers to query server-operating parameters enlisted in IF-MIB, MIB-II,
and Host Resources MIB. You can block queries related to all of the above listed MIBs by de-selecting the checkbox.
SNMP Traps Enabled: Allows SNMP traps to be sent to configured SNMP servers.
Additionally, select the SNMP versions to be enabled and configure the relevant settings. The SNMP agent residing
on the server uses the SNMP version parameters to deliver traps to the SNMP Trap receivers.
SNMP v1, v2: If selected, traps are sent to all Trap receivers accepting traps using SNMP v1, v2 protocol. You
can change the Community String for the SNMP agent. All SNMP v1, v2 Trap receivers configured, should use this
community string to receive traps.
(Default: public)
SNMP v3: If selected, traps are sent to all Trap receivers accepting traps using SNMP v3 protocol. You can
change the Username and Password for the SNMP agent. All SNMP v3 Trap receivers configured, should use these
parameters to receive traps. The Engine ID field is un-editable.
(Default Username: admin; Default Password: password)
Under SNMP MIBs, you can choose to query by enabling or disabling the following SNMP MIBs individually.
Administration Tab
SpectraGuard® Enterprise User Guide
249
IF MIB
Host Resources MIB
AirTight-MIB: If selected, the system enables the external SNMP Trap receivers to receive traps
MIB-II: If selected, configure the System Contact, System Name, and System Location.
(Default System Name: Wi-Fi Security Sever)
Note: IF MIB, Host Resources MIB, an MIB II are standard MIBs that you can download from the Internet. For
AirTight-MIB, contact AirTight Technical Support.
Adding a SNMP Trap Destination Server
Under SNMP Trap Destination Servers, click Add to open SNMP Configuration dialog where you can add
SNMP server details.
Add SNMP Configuration Dialog
Trap Destination Details contains the following fields:
Destination Server (IP Address/Hostname): Specifies the IP address or the hostname of the SNMP server to
which events should be sent.
Note: Configured SNMP servers will use the DNS names and DNS suffixes configured by the user in the Server
Initialization and Setup Wizard on the Config Shell.
SNMP Protocol Version: Specifies the SNMP protocol version for the SNMP agent.
(Default: SNMP v1, v2)
Port Number: Specifies the port number on the receiving system to which the SNMP trap is sent.
(Default: 162)
Enabled?: Specifies if the SNMP server is enabled to receive SNMP traps.
(Default: Enabled)
Note: You must specify a different port number if another application uses the default port.
Click Add to add the details for a new SNMP server.
Administration Tab
SpectraGuard® Enterprise User Guide
250
Editing a SNMP Trap Destination Server
Double-click a row or click Edit to open SNMP Configuration dialog similar to the one shown above to update the
SNMP server details. Click Save to save all settings.
Deleting an SNMP Trap Destination Server
Select a row and click Delete to discard the details of an existing SNMP server.
Syslog
Integrating with Syslog servers
The Syslog screen allows the server to send events to designated Syslog receivers.
Syslog
Syslog Integration Status: If Syslog integration is enabled, the system sends messages to the configured Syslog
servers. Otherwise, Syslog integration services are shut off.
If you select Syslog Integration Enabled, you can manage Syslog servers. The system enables Syslog by default.
Current Status: Displays the Current Status of the Syslog server: Running or Stopped. An Error status is shown
in one of the following cases:
One of the configured and enabled Syslog servers has a hostname, which cannot be resolved
System server is stopped
Internal error, in which case you need to contact Technical Support
Adding a Syslog Server
Administration Tab
SpectraGuard® Enterprise User Guide
251
Under Manage Syslog Severs, click <Add> to open Syslog Configuration dialog where you can add Syslog
server details.
Syslog Configuration Dialog
Syslog Configuration contains the following fields:
Syslog Server (IP Address/Hostname): Specifies the IP address or the hostname of the Syslog server to which
events should be sent.
Note: Configured Syslog servers will use the DNS names and DNS suffixes configured by the user in the Server
Initialization and Setup Wizard on the Config Shell.
Port Number: Specifies the port number of the Syslog server to which the system sends events.
(Default: 514)
Message Format: Specifies the format in which the event is sent, which is Intrusion Detection Message Exchange
Format (IDMEF) or Plain text.
(Default: Plain text)
Note: If you upgrade a server pre-6.2 to 6.6, all previously configured Syslog servers would send events in Plain
text Message Format by default. You can select the IDMEF format by editing the Syslog server settings.
Enabled?: Specifies if the events are to be sent to this Syslog server.
(Default: Enabled)
Click Add to add the details for a new Syslog server.
Editing a Syslog Server
Double-click a row or select a row and click Edit to open Syslog Configuration dialog similar to the one shown above.
Click Save to save all settings.
Deleting a Syslog Server
Select a row and click Delete to discard the details of an existing Syslog server.
Administration Tab
SpectraGuard® Enterprise User Guide
252
OPSEC
Operations Security (OPSEC) is an analytic process used to deny an adversary information – generally unclassified –
concerning our intentions and capabilities by identifying, controlling, and protecting indicators associated with our
planning processes or operations. OPSEC does not replace other security disciplines – it supplements them.
OPSEC
Integration with OPSEC enables the system to send events to the specified OPSEC server.
OPSEC Integration Status: If OPSEC integration is enabled, the system sends events to the configured OPSEC
servers. Otherwise, OPSEC integration services are shut off.
If you select OPSEC Integration Enabled, you can configure OPSEC server settings. The system disables
OPSEC by default.
Current Status: Displays the Current Status of the OPSEC server: Running or Stopped. An Error status is
shown in one of the following cases:
System server is stopped
OPSEC configuration is either incomplete or incorrect or if the OPSEC server is stopped
Internal error, in which case you need to contact Technical Support
Under OPSEC Server Settings specify the OPSEC server details.
Server Name: Specifies the name of the OPSEC server
Server IP: Specifies the IP Address of the OPSEC server
Authentication Port: Specifies the OPSEC server authentication port used for communication with the
system
Specify the authentication type you can select one of the following types of authentication:
Clear
Administration Tab
SpectraGuard® Enterprise User Guide
253
SSL
SSL OPSEC
SSL Clear
SSL Clear OPSEC
FWN
Auth OPSEC
SSL CA
SSL CA Comp
SSL CA RC4
SSL CA RC4 Comp
Asymmetric SSL CA
Asymmetric SSL CA Comp
Asymmetric SSL CA RC4
Asymmetric SSL CA RC4 Comp
SSLA Clear
Under SIC Settings, you need to specify the following settings for the Simple Instructional Computer (SIC) for
all the authentication types except ‘Clear’:
Server SIC Name: Specifies the server name of the SIC
Client SIC Name: Specifies the Client name of the SIC
Under CA Settings, if you have selected an authentication type that has a CA in it, select Create new digital
certificate, then, you need to configure the following parameters for the Certifying Authority (CA).
IP/Hostname: Specifies the IP address or the hostname of the CA
Object Name: Specifies the object name of the CA
Password: Specifies the one time password needed to acquire the certificate
Under Symmetric Key Based Settings, if you have selected an authentication type that does not have a CA in it,
select Create New Secret Key, then, you need to create a new secret key.
SpectraGuard SAFE
The SpectraGuard SAFE screen enables you to setup and manage groups for wireless Clients running SAFE.
Group Management
Group Management allows the user to manage SAFE policy groups. SAFE groups can be created manually. The
system can also be configured to create SAFE groups automatically from the users’ domain and logged in group as
reported by SAFE.
Each group can have a SAFE policy attached to it. The SAFE policies are created using a SAFE Client. The policy
configuration is then imported in the system.
The system gives the administrators the option to categorize the SpectraGuard SAFE Clients into groups
automatically. Automatic movement of SpectraGuard SAFE Client is based on the SAFE user’s domain and group
name information. Manual assignment of SAFE Clients to a group overrides any automatic assignment.
You cannot edit the default group.
Administration Tab
SpectraGuard® Enterprise User Guide
254
SAFE Group Management
Note: For Automatically created groups, “SAFE Reported Group” column displays information about the domain name and
group name (OU Hierarchy) reported by SAFE Client as “<Domain Name>/<Group Name (OU Hierarchy)>”. For Manually
created groups, it displays “ - -“.
Adding a SAFE Group Manually
Click Add Group to open Add SpectraGuard SAFE Group dialog where you can add the details for various SAFE
groups.
Administration Tab
SpectraGuard® Enterprise User Guide
255
Add SAFE Group Dialog
Under Group Details, specify the following:
Name: Specify a group name for the newly created group.
Description: Specify a brief description for the group.
Is Policy Attached?: Indicates if a policy is attached to the newly defined group.
Click Attach Policy to navigate to the path where the SAFE Configuration file is saved. Attach the policy.
Configuration File: Displays the entire path or location of the SAFE Configuration file.
Click Save to save the details for the new group.
Note: Duplicate group names are allowed for manually defined groups. The group name of a SAFE reported group
and manually created group can be the same.
Attaching SAFE Policy to existing SAFE Group
Use the following steps to attach a policy to an existing SAFE group:
1 On the SpectraGuard SAFE Group Management screen, select the SAFE group to which you want to attach a
policy.
2 On the Edit SpectraGuard SAFE Group dialog that appears, click Attach Policy.
3 On the Confirm dialog that appears, click Yes.
4 On the Select SAFE Configuration File dialog, specify the path of the SAFE configuration file (.XML format)
and click Open.
5 Click Save to attach the policy to the SAFE group.
Note: It is not mandatory to export the IP Address and Shared Key information from the SAFE Client as it already
has this information when it connects to the server.
Editing a SAFE Group
Administration Tab
SpectraGuard® Enterprise User Guide
256
Select a group from the List of Groups and click Edit Group to open Edit SpectraGuard SAFE Group dialog where
you can edit the details of an existing SAFE Group. Additionally, in this dialog you can do the following:
Click the hyperlink View Policy to view the attached policy.
Click Overwrite Policy to overwrite the existing policy attached to the SAFE group with the policy
contained in a SAFE Configuration file.
Click Detach Policy to detach the existing policy attached to the SAFE group. If no policy is attached to a
group, the server does not push any policy to the Clients in that group. The Clients retain their previous
policy. When you do not attach a policy or you detach a policy from a SAFE group, the system does not
send the Activity Parameter information such as Keep-alive Interval, Keep-alive Timeout, and
Synchronization Interval to the Clients belonging to that SAFE group.
Edit a SAFE Group
Viewing a SAFE Group Policy
On the SpectraGuard SAFE Group Management screen, for the selected SAFE group, click the hyperlink View
Policy. Alternatively, on the Edit SpectraGuard SAFE Group dialog, click the hyperlink View Policy. A report
showing the details of the policy group attached to the selected SAFE group appears.
Administration Tab
SpectraGuard® Enterprise User Guide
257
View a SAFE Group Policy
Administration Tab
SpectraGuard® Enterprise User Guide
258
Deleting a SAFE Group
Select a group from the List of Groups and click Delete Group. The Delete Group message appears. Click Yes to
confirm deletion. After deleting the group all the Clients in that group are assigned to 'Default' group.
Delete a SAFE Group
Settings
A shared key is used for authentication of Clients running SAFE. SAFE cannot connect to the server for
synchronization without a shared key. This shared key should be distributed to all the users of wireless Clients
running SAFE.
SAFE Settings
Under Shared Key Authentication, do one of the following:
Select Change Shared Key to change the existing shared key.
Note: You need to be very careful about changing the Shared Key if it has already been circulated to existing SAFE
Clients. This is because, if you change the Shared Key, existing SAFE users will not be able to connect to the
server unless they re-activate their SAFE Clients using the new Shared Key.
Administration Tab
SpectraGuard® Enterprise User Guide
259
Click Generate Key Automatically to enable the system to automatically generate a shared key of up to 10
alphanumeric characters using which SAFE Clients can connect with the system.
Under Activity Parameters, specify the following:
Keep-alive Interval: Defines the duration at which SAFE sends a heartbeat to the server indicating that it is
active.
(Minimum: 1 minute; Maximum: 30 minutes; Default: 2 minutes)
Keep-alive Timeout: Indicates the number of consecutive heartbeat packets missed by the server before it
declares that SAFE instance as inactive.
(Minimum: 2 heartbeats; Maximum: 10 heartbeats; Default: 5 heartbeats)
Synchronization Interval: Defines the minimum period at which SAFE synchronizes with the server.
(Minimum: 30 minutes; Maximum: 300 minutes; Default: 60 minutes)
Manage Clients
This screen displays details of the SAFE Clients registered with the server.
Manage SAFE Clients
This screen shows the following information about SAFE Clients:
SAFE Status Icon: Identifies the SAFE status – Active or Not Active.
SAFE Risk Level Icon: Identifies the SAFE risk level – High, Medium, or Low.
Report Availability for SAFE Client: Indicates one of the following Report available, Report not available, or
Report Scheduled.
Name: Specifies the First name and Last name or hostname of the Client.
Wireless MAC: Specifies the first detected wireless MAC address of the Client in case of multiple wireless
interfaces.
Wired MAC: Specifies the first detected wired MAC address of the Client in case of multiple wired interfaces.
Administration Tab
SpectraGuard® Enterprise User Guide
260
Version: Specifies the build and version number of the software loaded in the Client.
Group: Specifies the group name as defined through Group Management. The asterisk before a group name
indicates that the group has been manually changed for the client, from a SAFE reported group to manually created
group.
SAFE Reported Group: Specifies the SAFE reported group to which the Client belongs. , “SAFE Reported
Group” column displays information about the domain name and group name (OU Hierarchy) reported by SAFE
Client as “<Domain Name>/<Group Name (OU Hierarchy)>”.
Last Synch: Specifies the time when the SAFE Client last synchronized with the system.
Activation: Specifies the date and time when the SAFE Client was activated.
Last Available Report: Specifies the time when a report was last generated for the selected SAFE Client.
Configure Display Columns: Clicking on the Column Visibility icon opens a window showing the columns
available for display and their current selection and display order. You can check/uncheck the checkbox before the
column name to select/deselect it from SAFE Client List display. You can change the display order of a column by
selecting the column name and moving it up/down with Up/Down buttons. Save the display settings by clicking
<Save> button.
Max Allowed: Specifies the maximum number of SAFE Clients that can be connected to the system. This
number depends on the number of users permitted by your SGE license.
SAFE Client List – Display Columns Screen
Note: The Console displays either a SAFE Client that has only a wired interface or a SAFE Client not yet
categorized on a white row on the Manage SAFE Clients screen.
Double-clicking a SAFE Client row displays the SAFE Details dialog.
Administration Tab
SpectraGuard® Enterprise User Guide
261
SAFE Client Details Dialog
Note: The servers with version 5.7, 5.9, 6.0, 6.1, and 6.2 are compatible with SAFE versions 2.5 and 2.7.
Right-clicking a SAFE Client row displays the context sensitive menu.
SAFE Client Context Sensitive Menu
Items in the SAFE Client Context Sensitive Menu
The SAFE Client context-sensitive menu includes the following items.
SAFE Details: Enables you to view details of the SAFE Client as shown in the Client Details dialog.
Delete: Allows you to delete a SAFE Client. It displays a Confirm dialog that enables you to delete a selected
SAFE Client. Click <Yes> to delete the SAFE Client.
Fetch Report: Available for a SAFE Client which is Active, this option if selected, displays a progress bar and
then fetches a fresh report from the SAFE Client.
Schedule Report: Available for a SAFE Client which is Inactive, this option enables you to schedule a report for
the selected SAFE Client. A fresh report is generated for the Client when it becomes Active.
View available report: Available for a SAFE Client for which a report is fetched earlier, this option displays a
progress bar and then a report that enables you to view various reports generated earlier for the selected SAFE Client.
Each time the system generates a SAFE report, it updates the Last Available Report column on the Manage SAFE
Clients screen.
Administration Tab
SpectraGuard® Enterprise User Guide
262
SAFE Client Report
Change SAFE Group: Enables you to change the group of the selected Client to any group except the group currently
associated with the selected Client. After the Clients group changes, the new policy is applied to the SAFE Client.
Filtering in SAFE
To focus your attention to a subset of SAFE Client List based on a filtering criteria (such as SAFE Status, SAFE Risk
Status, and so on) system provides you with the capability to filter SAFE Client List. Use the following steps to filter
SAFE Client List:
1 Click the Filter icon to open the SAFE Listing Filter dialog.
Administration Tab
SpectraGuard® Enterprise User Guide
263
SAFE Listing Filter
2 Under Text Filter, select one or more of the following check boxes and enter the appropriate values manually for
searching data related to it:
Name
Wired/Wireless MAC
Group
SAFE Reported Group
3 Select the SAFE Status check box, select one or more of the following check boxes:
Active
Inactive
4 Select the SAFE Risk Status check box, select one or more of the following check boxes:
High
Medium
Low
5 Select the Activation check box, click the icon to specify the date and time of the activation of the SAFE
Client and then click OK. The search displays the SAFE Client list, which were first detected by the system after the
date as specified above
6 Select the Group check box, select the Group Name from the drop down box for searching data related to it.
7 To save and apply the SAFE Client List filtering criteria, click OK. When the filter is applied it is denoted by
Filter On on the Console, if no filter is applied it is denoted by Filter Off on the Console.
Local Policies
Local Policies
About Local Policies
Local Policies are those that you can customize for a particular location. When you create a new location, by default,
all the policies for this new location are always the same as its parent location. In other words, this newly created
location inherits policies from its parent. You can change these inherited policies. Specifically a user with
administrative rights can configure these policies for a location.
Click the Local tab in the Administration screen to view the policies groups under this tab.
The Local tab consists of two trees:
Location tree on the top
Administration tree at the bottom
Administration Tab
SpectraGuard® Enterprise User Guide
264
Recommended: Do not use distinct policies for two locations that represent geographically close-by areas. This is
because if two locations are very close, it is possible that sensors from both these locations see a device, thereby
affecting the accuracy of location tagging for the device.
Policy and Policy Groups
The system clubs policies in Local Policies with related functionality into groups called Policy Groups. Examples of
policy groups and policies within them are as shown below.
Example 1
Operating Policies (Policy Group)
AP Auto-classification(Policy1)
Client Auto-classification (Policy 2)
Intrusion Prevention (Policy 3)
Example 2
Event Settings (Policy Group)
Configuration (Policy 1)
Email Notification (Policy 2)
Customizing v/s Inheriting Policies
By default, a location inherits policies from its parent location. You can break the inheritance and customize the
policies at a location.
You can customize or inherit policies only at the policy group level. Customize or inherit of individual policies is not
allowed at the individual policy level within the policy group. By customizing or inheriting a policy in a policy group,
the policy group gets customized or inherited.
Policy Inheritance v/s Customization
Customizing Policies
Use the following steps to customize policies in a policy group for a location that inherits policies from its parent:
Administration Tab
SpectraGuard® Enterprise User Guide
265
1. Select the Local tab.
2. Select a location in the Location tree for which you want to customize the policies.
3. Select a policy group from the Administration tree.
4. Right-click either the selected location or the selected policy group. A context sensitive menu appears. Click
Customize Policy Group – ‘<Policy Group Name>’.
Customizing a Policy Group
5. Alternatively, click on the right side of the policy group pane.
6. Alternatively click the hyperlink Customize in the sentence ‘Click Customize to re-define this policy at this
location.’ on the individual policy page. By customizing the individual policy, the entire policy group is
customized.
You can now custom define the individual policies within the policy node.
Inheriting Policies: (Re)establishing Inheritance
Use the following steps to inherit policies in a policy group for a location which has customized policies:
1. Select the Local tab.
2. Select a location in the Location tree for which you want to inherit policies from its parent.
3. Select a policy group from the Administration tree.
4. Right-click either the selected location or the selected policy group. A context sensitive menu appears. Click
Inherit Policy Group – ‘<Policy Group Name>’.
Administration Tab
SpectraGuard® Enterprise User Guide
266
Inheriting Policies for a Policy Group
5. Alternatively, click on the right side of the policy group pane.
6. Alternatively click the hyperlink Inherit in the sentence ‘Click Inherit to inherit this policy from its parent
location.’ on the individual policy page. By inheriting the individual policy, the entire policy group is
inherited from its parent location.
This re-establishes the inheritance link for the selected policy group. The policy group loses any existing
customization for the selected location and starts using the parent policies instead. Once policies are inherited, action
items like checkboxes, buttons, and so on are de-activated in the policy pane. You will see the policies in a Read-only
mode.
Template Based Policies
In the system, some policies are made up of one or more templates. In a large setup with several locations, the
administrator would like to create templates on a single location and reuse these templates, if other locations in the
sub-tree need to have similar templates to define their policies.
Applying a Template
A user can create templates at locations to which access has been granted. You can then select one or more such
templates to be applied at a particular location. Thus, when you apply one or more templates to a location, you
define the policy for that location.
Template Availability at Sub-locations
Administration Tab
SpectraGuard® Enterprise User Guide
267
When you create a new template at a location, it is available for viewing and applying to all the locations in its sub-
tree. Templates can only be modified and deleted at the location at which they are created.
Copying and Pasting of Local Policies
In a large setup with several locations, the administrator would like to custom define policies for just one location. If
other locations need to have policies similar to the ones already defined, you can Copy the policies from the first
location and Paste them to the other locations.
Copy allows you to copy one or all policy groups customized for a particular location to another location. If all the
policy groups for a location are inherited from its parent, you cannot copy policies from that location.
Paste allows you to paste the policies to a policy group on any location. By pasting a policy group on a location
inheriting that policy group, the inheritance is broken.
Copying and Pasting all Local Policies
Use the following steps to copy and paste all Local policies:
1. Right-click a location from the Location tree which you choose to copy (source location).
2. From the resultant context-sensitive menu, select Copy Local Policies for ‘<Location Name>’.
3. Select All Local Policy Groups or Policy Group-‘<Policy Group Name>’. The Policy Group-‘<Policy Group
Name>’ option is available only if a policy group node is selected in the Administration tree.
Copying all Local Policies
4. Right-click a location to which you want to paste the copied policies.
Administration Tab
SpectraGuard® Enterprise User Guide
268
5. From the resultant context-sensitive menu, select Paste All Policies from ‘<Location Name>’ or Paste
‘<Policy Group Name>’ from ‘<Location Name>’. The Paste All Policies from ‘<Location Name>’ is
displayed if all the policies were copied during the copy operation. The Paste ‘<Policy Group Name>’ from
‘<Location Name>’ option is displayed if only a policy group is copied during the copy operation.
Pasting all Local Policies
Copying and Pasting a Local Policy Group
Use the following steps to copy and paste a Local policy group:
1. Right-click a location from the Location tree.
2. Right-click a policy group from the Administration tree which you choose to copy.
3. From the resultant context-sensitive menu, select Copy Policy Group-‘<Policy Group Name>’.
Administration Tab
SpectraGuard® Enterprise User Guide
269
Copying a Local Policy Group
4. Right-click a location to which you want to paste the copied policies.
5. From the resultant context-sensitive menu, select Paste ‘<Policy Group>’ from ‘<Location Name>’.
Note: The copy operation is not allowed if no local policy group is custom defined or customized on that location.
Wireless Policies-Authorized WLAN Setup
Select the Wireless Policies screen to specify the Authorized Wi-Fi policies for a particular location.
Authorized WLAN Setup
The system uses the details of the Authorized Wi-Fi setup at a particular location to detect the presence of Mis-
configured or Rogue APs in your network. You can specify the details of authorized SSIDs and a list of networks to
which Authorized APs can connect.
Administration Tab
SpectraGuard® Enterprise User Guide
270
Authorized WLAN Setup
Select one of the following to characterize a particular location:
This is a No Wi-Fi location: If no Authorized Wi-Fi APs are installed at this location. If you configure a location as
a no Wi-Fi location, the Specify Authorized SSID section is grayed out.
Wi-Fi is allowed at this location: To specify the details of the Authorized Wi-Fi APs in this location.
Specify Authorized SSIDs
Under this tab, specify the Authorized SSIDs at this location. For each SSID, you can specify the detailed
configuration. This per SSID configuration is called an SSID template.
Creating a Configuration Template for an Authorized 802.11 SSID
Add Authorized SSIDs allows you to create an SSID template in one of the following ways:
Add Visible SSID: To create an SSID template from a list of visible SSIDs. The visible SSID list is built using the
data received from sensors.
Add Custom SSID: To create a template using a user-defined SSID.
Click Add SSID template to create a new SSID template. The Template for an Authorized 802.11 SSID dialog
appears where you can select multiple items in some fields.