
Sentriant AG Software Users Guide, Version 5.2 5
Selecting the RADIUS Authentication method..................................................................85
Configuring Windows Domain Settings.............................................................................86
Configuring OpenLDAP Settings......................................................................................88
Adding 802.1X Devices .......................................................................................................91
Testing the Connection to a Device .......................................................................................92
Cisco IOS ...........................................................................................................................93
Cisco CatOS .......................................................................................................................95
CatOS User Name in Enable Mode ..................................................................................97
Enterasys ...........................................................................................................................98
Extreme ExtremeWare..........................................................................................................99
Extreme XOS ....................................................................................................................101
Foundry............................................................................................................................102
HP ProCurve Switch ..........................................................................................................104
HP ProCurve WESM xl or HP ProCurve WESM zl ..................................................................107
HP ProCurve 420 AP or HP ProCurve 530 AP ......................................................................110
Nortel ..............................................................................................................................112
Other ...............................................................................................................................113
Quarantining, DHCP ................................................................................................................115
DHCP Server Configuration ................................................................................................115
Setting DHCP Enforcement ................................................................................................115
Adding a DHCP Quarantine Area.........................................................................................117
Sorting the DHCP Quarantine Area......................................................................................119
Editing a DHCP Quarantine Area.........................................................................................119
Deleting a DHCP Quarantine Area .......................................................................................120
Quarantining, Inline ................................................................................................................120
Post-connect ..........................................................................................................................120
Allowing the Post-connect Service Through the Firewall ........................................................120
First Time Selection ..........................................................................................................121
Setting Sentriant AG Properties ..........................................................................................121
Configuring a Post-connect System .....................................................................................121
Launching Post-connect Systems........................................................................................123
Post-connect in the Endpoint Activity Window......................................................................123
Adding Post-connect System Logos and Icons ......................................................................124
Maintenance...........................................................................................................................125
Initiating a New Backup.....................................................................................................126
Restoring From a Backup ...................................................................................................127
Downloading Support Packages ................................................................................................127
Cluster Setting Defaults ...........................................................................................................127
Testing Methods ...............................................................................................................128
Selecting Test Methods................................................................................................128
Ordering Test Methods.................................................................................................129
Recommended Test Methods........................................................................................129
Selecting End-user Options ................................................................................................130
Accessible Services ...........................................................................................................130
Exceptions........................................................................................................................132
Always Granting Access to Endpoints and Domains.........................................................132
Always Quarantine Endpoints and Domains....................................................................134
Notifications.....................................................................................................................134
Enabling Notifications .................................................................................................134
End-user Screens ..............................................................................................................136
Specifying an End-user Screen Logo .............................................................................136
Specifying the End-user Screen Text .............................................................................137