77范文网 - 专业文章范例文档资料分享平台

LANDesk 802.1x 简明使用手册 V88(5)

来源:网络收集 时间:2020-04-16 下载这篇文档 手机版
说明:文章内容仅供预览,部分内容可能不全,需要完整文档或者需要复制内容,请下载word后使用。下载word有问题请添加微信号:或QQ: 处理(尽可能给您提供完整文档),感谢您的支持与谅解。点击这里给我发消息

LtaEap.dll: Requires Windows 2000 SP4 or later platforms. LtaEap.dll plugs into RAS manager. It will load at system startup. Therefore installation or upgrade of LtaEap.dll requires a system reboot. When authentication fails or supplicant does not meet agent/healthy checks, LtaEap.dll will prepare quarantine IP network configuration and disable following login prompts caused by EAP-Request/Identity from authenticator.

Vulscan.exe: A component from LANDesk Patch Management. It performs healthy scan using rules and definitions configured with LANDesk Patch Manager and stored at the core or remediation server. For the purpose of healthy scan, when in corporate network, it must run with /compliance2 command switch. When in quarantine network, it must run with /agentbehaviorfile=, /compliance and /coreserver= command switches. The scan result is store locally for LtaEap.dll to check.

NicRestart.exe: Restarts NIC or Windows wireless configuration service. If restart NIC, switch port will detect link down and up and, in response, sending out EAP-Request/Identity packet. If restart wireless service, the supplicant will send out EAPOL/Start to authenticator and authenticator will reply with sending out EAP-Request/Identity. In both case, a new process of authentication will be trigged to start. The difference between restart NIC and the service is that when restart NIC, the new IP configuration will be loaded into system.

Client end workflow

When authentication fails or supplicant can not pass agent/healthy checks, LtaEap.dll saves current IP configuration, setup quarantine IP configuration, blocks further EAPOL/Start and EAP-Request/Identity and then let system reload new IP configuration by running NicRestart.exe /q /noui.

When Vulscan.exe finishes healthy compliance scan in either corporate network or quarantine network and stores the scan result locally, it will run NicRestart.exe /r /vc=. NicRestart.exe will react to this call differently depending on the number of vulnerability passed in and supplicant’s current state.

If the number of vulnerability is zero and supplicant is not in quarantine state or number of vulnerability is not zero and supplicant is in quarantine state, NicReStart.exe will not trigger an authentication process and the supplicant will remain in the same state.

If vulnerability is zero and supplicant is in quarantine network, NicRestart.exe will restore saved IP configuration, enable EAPOL/Start and EAP-Request/Identity and restart NIC to let system load restored IP configuration and trigger a new authentication process to make supplicant goes out of quarantine network and comes back to corporate network after supply proper credential.

If vulnerability is greater than zero and supplicant is in corporate network, NicRestart.exe will restart wireless configuration service to trigger a new authentication process that will result in put supplicant into quarantine network.

36

附录二 交换机配置参考

(一)

Cisco 3560样例

Building configuration...

Current configuration : 2089 bytes !

version 12.2 no service pad

service timestamps debug uptime service timestamps log uptime no service password-encryption !

hostname Switch !

username landesk aaa new-model 全局启用802.1x认证 aaa authentication dot1x default local group radius

aaa authorization network default local group radius 启用动态分配VLan !

aaa session-id common system mtu routing 1500 ip subnet-zero ip routing 三层交换需要配IP 路由 ip dhcp excluded-address 1.1.1.1 为修补服务器预留IP地址 ip dhcp excluded-address 1.1.1.254 为网关预留IP地址

ip dhcp pool remediation 设置隔离区名称及IP地址池信息 network 1.1.1.0 255.255.255.0 dns-server 1.1.1.1

default-router 1.1.1.254 !

dot1x system-auth-control 全局启用802.1x no file verify auto

spanning-tree mode pvst

spanning-tree extend system-id !

vlan internal allocation policy ascending !

interface FastEthernet0/1 !

interface FastEthernet0/2

37

!

interface FastEthernet0/3 !

interface FastEthernet0/4 !

interface FastEthernet0/5 !

interface FastEthernet0/6 !

interface FastEthernet0/7 !

interface FastEthernet0/8 !

interface FastEthernet0/9 !

interface FastEthernet0/10 !

interface FastEthernet0/11 switchport access vlan 10 switchport mode access dot1x pae authenticator dot1x port-control auto dot1x timeout tx-period 10 dot1x guest-vlan 20

interface FastEthernet0/12 !

interface FastEthernet0/13 !

interface FastEthernet0/14 !

interface FastEthernet0/15 !

interface FastEthernet0/16 !

interface FastEthernet0/17 !

interface FastEthernet0/18 !

interface FastEthernet0/19 switchport access vlan 20 !

interface FastEthernet0/20 !

进入端口设置 健康VLAN 10 连接PC模式

在端口启用802.1x

认证时间,建议配置成10,比较快 指定Guest VLAN

38

interface FastEthernet0/21 switchport access vlan 10 !

interface FastEthernet0/22 !

interface FastEthernet0/23 switchport access vlan 10 !

interface FastEthernet0/24 !

interface GigabitEthernet0/1 !

interface GigabitEthernet0/2 !

interface Vlan1

ip address 10.10.10.254 255.255.255.0 shutdown 关闭默认VLAN !

interface Vlan10 设置Vlan10 作为健康VLAN ip address 192.168.1.254 255.255.255.0 !

interface Vlan20 设置 Vlan20 作为隔离VLAN ip address 1.1.1.254 255.255.255.0 !

ip classless ip http server

ip http secure-server ! !

radius-server host 192.168.1.2 auth-port 4001 acct-port 1813 key scab radius-server source-ports 1645-1646 !

control-plane ! !

line con 0 line vty 5 15 ! end

Switch#

39

参考前文第9页的截图

百度搜索“77cn”或“免费范文网”即可找到本站免费阅读全部范文。收藏本站方便下次阅读,免费范文网,提供经典小说综合文库LANDesk 802.1x 简明使用手册 V88(5)在线全文阅读。

LANDesk 802.1x 简明使用手册 V88(5).doc 将本文的Word文档下载到电脑,方便复制、编辑、收藏和打印 下载失败或者文档不完整,请联系客服人员解决!
本文链接:https://www.77cn.com.cn/wenku/zonghe/977877.html(转载请注明文章来源)
Copyright © 2008-2022 免费范文网 版权所有
声明 :本网站尊重并保护知识产权,根据《信息网络传播权保护条例》,如果我们转载的作品侵犯了您的权利,请在一个月内通知我们,我们会及时删除。
客服QQ: 邮箱:tiandhx2@hotmail.com
苏ICP备16052595号-18
× 注册会员免费下载(下载后可以自由复制和排版)
注册会员下载
全站内容免费自由复制
注册会员下载
全站内容免费自由复制
注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信: QQ: