Owner's manual
Table Of Contents
- Chapter 1: Introduction
- Chapter 2: Accessing CC-SG
- Chapter 3: Configuring CC-SG with Guided Setup
- Chapter 4: Creating Associations
- Chapter 5: Adding Devices and Device Groups
- Chapter 6: Configuring Nodes and Interfaces
- Chapter 7: Adding and Managing Users and User Groups
- Chapter 8: Policies
- Chapter 9: Configuring Remote Authentication
- Chapter 10: Generating Reports
- Audit Trail Report
- Error Log Report
- Access Report
- Availability Report
- Active Users Report
- Locked Out Users Report
- User Data Report
- Users in Groups Report
- Group Data Report
- AD User Group Report
- Asset Management Report
- Node Asset Report
- Active Nodes Report
- Node Creation Report
- Query Port Report
- Active Ports Report
- Scheduled Reports
- CC-NOC Synchronization Report
- Chapter 11: System Maintenance
- Chapter 12: Advanced Administration
- Appendix A: Specifications (G1, V1, and E1)
- Appendix B: CC-SG and Network Configuration
- Appendix C: User Group Privileges
- Appendix D: SNMP Traps
- Appendix E: Troubleshooting
- Appendix F: Two-Factor Authentication
- Appendix G: FAQs
- Appendix H: Keyboard Shortcuts

112 COMMANDCENTER SECURE GATEWAY ADMINISTRATOR GUIDE
10. Click Test Connection to test the LDAP server using the given parameters. You should
receive a confirmation of a successful connection. If not, review the settings carefully for
errors and try again.
11. Click Next to proceed to the Advanced tab to set advanced configuration options for the
LDAP server.
LDAP Advanced Settings
1. Click the Advanced tab.
Figure 106 LDAP Advanced Settings
2. Click the radio button for Base 64 if you want the password to be sent to the LDAP server
with encryption. Click the radio button for Plain Text if you want the password to be sent to
the LDAP server as plain text.
3. Click the Default Digest drop-down menu and select the default encryption of user
passwords.
4. Type the user attribute and group membership attribute parameters in the User Attribute and
Group Membership Attribute fields. These values should be obtained from your LDAP
directory schema.
5. Type the bind pattern in the Bind Username Pattern field.
6. Check Use bind if you want CC-SG to send the username and password entered at login to
the LDAP server for authentication. If Use Bind is not checked, CC-SG will search the
LDAP server for the user name, and if found, will retrieve the LDAP object and locally
compare the associated password with the one entered.
7. On some LDAP servers, the password cannot be retrieved as part of the LDAP object. Check
Use bind after search to instruct CC-SG to bind the password to the LDAP object again and
send it back to the server for authentication.
8. Click OK to save your changes.