05.08.2013 Views

OfficeScan 10 Administrator's Guide - Online Help Home - Trend Micro

OfficeScan 10 Administrator's Guide - Online Help Home - Trend Micro

OfficeScan 10 Administrator's Guide - Online Help Home - Trend Micro

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ACS Server Configuration<br />

Policy Server for Cisco NAC<br />

To allow Cisco Secure ACS to pass authentication requests to the Policy Server for Cisco<br />

NAC, add the Policy Server for Cisco NAC in External Policies for the external user<br />

database to use for authentication. See the ACS server documentation for instructions<br />

on how to add the policy server in a new external policy.<br />

Note: Configure the ACS server to perform tasks such as blocking client access to the<br />

network. These ACS functions are beyond the scope of the <strong>Trend</strong> <strong>Micro</strong> Policy Server<br />

for Cisco NAC implementation and are not in this document. See the ACS<br />

documentation for details on configuring other ACS functions.<br />

Policy Server for Cisco NAC Configuration<br />

After installing <strong>OfficeScan</strong> and the Policy Server, and deploying both the <strong>OfficeScan</strong><br />

client and the Cisco Trust Agent, configure the Policy Server for Cisco NAC. To<br />

configure a Policy Server, access the Policy Server Web console from the <strong>OfficeScan</strong><br />

Web console by going to Cisco NAC > Policy Servers and clicking the Policy Server<br />

link.<br />

This section describes the following aspects of Policy Server configuration:<br />

• Policy Server Configuration from <strong>OfficeScan</strong> on page <strong>10</strong>-36 describes how to manage<br />

Policy Servers on the <strong>OfficeScan</strong> Web console.<br />

• Summary Information for a Policy Server on page <strong>10</strong>-36 shows you how to get an<br />

overview of Policy Servers on the network.<br />

• Policy Server Registration on page <strong>10</strong>-38 is the first step in configuring Policy Servers.<br />

• Rules on page <strong>10</strong>-38 shows you how to create and edit rules that comprise policies.<br />

• Policies on page <strong>10</strong>-38 shows you how to create and edit policies that ultimately<br />

determine how Policy Server measures client security posture.<br />

• Client Validation Logs on page <strong>10</strong>-39 gives an overview of how to use logs to<br />

understand the security posture status of clients on the network.<br />

• Administrative Tasks on page <strong>10</strong>-39 describes how to change the Policy Server<br />

password and set a schedule for synchronization.<br />

<strong>10</strong>-35

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!