Management and Configuration Guide (Includes ACM xl) 2005-12

IX-2
navigation buttons 2-8
summary of functions 2-9
System Components List 2-10
tabs and sub-tabs 2-9
working with tables 2-12
administrator
changing on Access Control Server
6-5
changing username/password on Access
Control Server
6-9
changing username/password on Integrated
Access Manager
6-11
default name and password 2-4
logging in as 2-4
logging out 2-6
troubleshooting incorrect password D-1
Advanced Setup tab 6-25
DHCP Network for NAT Clients 6-29
Allowed Traffic filters 4-5
Access Controller HTTPS Logon page 4-48
Access Controller Logon-forward no URI4-48
Access Controller Logon-fwd append URI4-48
Access Controller SSL Stop page 4-48
Access Controller Stop page 4-48
All IP Traffic 4-48
and bridging 6-28
AppleTalk 4-48
CDP and WNMP 4-48
DHCP 4-48
DNS TCP 4-48
DNS UDP 4-48
example-the Outside World filter 4-85
External CS UI 4-48
filter list 4-66
Grid view 4-37
HTTP 4-48
Internal Admin UI 4-48
Internal HTTP 4-48
Internal Integrated Access Manager UI 4-48
Internal rights UI 4-49
IP Fragments 4-49
Kerberos filter 4-49
Outside World 4-49
Ping 4-49
predefined filters 4-48
SMB UDP 4-49
SMBTCP 4-49
tcpdump expression in 4-69
Allowed Traffic tab 4-46
allows, See Allowed Traffic filters
alternate version software
restarting with
8-10
AppleTalk protocol 6-27
ARP request
client polling
6-28
Audience 3-ix
authenticate call response 5-34
authenticate methodCall (XML-RPC) 5-31, 5-33
authentication 1-3
802.1x logon 1-3, 5-3
browser-based 1-3, 5-2
external group identity retrieval 5-37
monitored logon 5-3
NT Domain logon 1-3, 5-3
tracing authentication transactions 5-54
using 802.1x passive 5-15
using 802.1x/WPA 5-16
using a Kerberos service 5-26
using a RADIUS service 5-27
using an LDAP service 5-8
using an XML-RPC service 5-31
using iPlanet directory service 5-14
Wireless Data Privacy logon 5-3
authentication logging
enabling
9-5
Authentication Policies
creating or editing
5-6
defined 5-2
deleting 5-5
predefined System Authentication Policy 5-4
preferred for Connection Profiles check box5-6
replacing the default policy 5-6
Authentication Realm See Authentication Policies
Authentication Service
configuring
5-7 to 5-38
configuring 802.1x passive 5-15
configuring 802.1x/WPA 5-16
configuring a RADIUS service 5-27
configuring Active Directory 5-12
configuring an LDAP service 5-8
configuring Kerberos 5-26
configuring XML-RPC 5-31
defined 5-2
editing from Authentication Policies page 5-5
automatic HTTP proxy 6-31
B
backing up the Control Server 8-11
backup and restore commands A-24
bandwidth management
overview
2-19
rate limiting per user 4-57
Bandwidth tab 4-57
basic configuration tasks 2-15
bridging 6-27
and Allowed Traffic filters 6-28
AppleTalk traffic 6-27
CDP traffic 6-27
enabling/disabling 6-27
IPX/802.2 6-27
IPX/802.3 6-27
IPX/Ethernet II encapsulation 6-27