Access Guardian
Access Guardian
Access Guardian
1
OmniVista 3.5.4 Access Guardian Help
2
OmniVista 3.5.4 Access Guardian Help
3
OmniVista 3.5.4 Access Guardian Help
2. In the "Available Switches" Area, select the switch(es) that you want to assign to the
Authentication Server(s) selected in Step 1, and click on the Add button to move the switch(es)
to the "Selected Switches" Area. The Assign Auth Servers button will be activated.
4
OmniVista 3.5.4 Access Guardian Help
3. In the "Unselected Maps" Area, select the Logical Group(s) that you want to assign to the
Authentication Server(s) selected in Step 1, and click on the Add button to move the group(s) to
the "Selected Maps" Area. The switches contained in the selected Logical Group(s) are displayed
at the bottom of the screen if the Show Selected Devices in Preview checkbox is selected.
4. Click the OK button. The Select Device Groups Screen will close and the switche(es)
contained in the Logical Group(s) will be highlighted in the "Available Switches" Area.
Note: If you selected the Use Group Selection radio button, only the switches contained
in the selected group(s) will be highlighted. If you select the Add to the Current
5
OmniVista 3.5.4 Access Guardian Help
Selection radio button, the switches contained in the selected group(s) will be highlighted,
in addition to any switches you preciously selected individually, if applicable
5. Use the Add button to move the switch(es) to the "Selected Switches" Area. The Assign
Auth Servers button will be activated.
6. Click on the Assign Auth Servers button.
6
OmniVista 3.5.4 Access Guardian Help
1. Click the New button to bring up the "Create HIC Server Configuration" pane.
2. Complete the fields as described below.
7
OmniVista 3.5.4 Access Guardian Help
• HIC Server Name - Enter a name for the HIC Server (e.g. HIC 1).
• IP Address - Enter the IP Address of the InfoExpress CyberGatekeeper Server.
• HIC Server Port - Enter the UDP port number to be used for HIC requests.
• Secret Key - Enter a shared secret required to access the HIC Server.
• HIC Server Role - Select the role of this HIC Server (Primary or Backup). This feature
is only available on OS6x.x.x, Release 6.4.3.668.R01 and later; and 6.4.4.369.R01 and
later.
• HIC Status - Enable HIC by selecting Enabled from the drop-down menu. By default,
the HIC feature is disabled for the switch. This means that all HIC functionality is
disabled. For example, if the HIC attribute of a UNP is enabled, the HIC process is not
invoked when the profile is applied if the HIC feature is not enabled for the switch.
• Remediation URL. - Enter the URL of the Remediation Server. A host can use the
InfoExpress desktop compliance agent or a Web-based agent. If the desktop agent is not
installed on the host, the switch redirects the host to a Web agent download server.
• HTTP Redirect Port - Enter the proxy port number for the Remediation Server (Default
= 8080).
• Background Poll Interval - Enter the background-poll-interval, in seconds. This is the
frequency for background polling packets.
• Server Failure Mode - Select the action to be taken for traffic when both HIC Servers
are not reachable (Hold or Passthrough). This feature is only available on OS6x.x.x,
Release 6.4.3.668.R01 and later; and 6.4.4.369.R01 and later.
3. Click on the Subnets... button to add any exception servers needed for initial HIC processing.
When the HIC process is initiated for a host device, the host has limited access to the network for
communicating with the HIC server and any servers included in the exception list. There are
specific servers that a host device may need access to during the HIC process. For example, if
the host is going to use the Web-based compliance agent, access to the Web agent download
server is required.
4. Click the New button and enter the Name, IP Address and Subnet Mask of the exception
server. Click OK, then click Apply. Repeat the process for any additional exception servers.
When you are done adding servers, click the OK button to close the window and return to the
HIC Server window.
8
OmniVista 3.5.4 Access Guardian Help
5. Select a HIC server from the "HIC Server Configuration List, and click the Assign button to
assign the HIC Server to a switch or switches on the network.
After selecting the switches that you want to assign to the server, you must apply the server to
those switches. As shown below, the switches to that you are assigning to the HIC Server appear
in the "Selected Switches" area.
9
OmniVista 3.5.4 Access Guardian Help
2. Click the Apply button to apply the profile(s). The Message Area shows the progress of the
operation.
Note: "Remove Selected" option will remove selected HIC server(s) only and "Remove
All" option will remove all the HIC servers (primary & backup) configured on selected
switch(es).
10
OmniVista 3.5.4 Access Guardian Help
• HTTP Redirect Port - Enter the proxy port number for the Remediation Server (Default
= 8080).
3. When you have completed all of the fields, as described above, click the OK button. The
edited profile will appear in the HIC Server Configuration List.
4. Click the Apply button to write the changes to the server.
5. Click the Assign button to bring up the "Assign HIC Server" Wizard and assign the server to
specific switches.
11
OmniVista 3.5.4 Access Guardian Help
Profiles Tab
A UNP consists of the following attributes:
• UNP Profile Name - The UNP Profile Name is obtained from the RADIUS server and
mapped to the same profile name configured on the switch. If authentication is not used
or fails, other classification methods can provide the UNP name. The switch profile
identifies three attribute values: VLAN ID, classification rules, and a QoS policy list
name.
• VLAN ID - All members of the profile group are assigned to the VLAN ID specified by
the profile (also referred to as the UNP VLAN).
• Classification Rules - A UNP can be configured with Classification Rules to assign
devices to a profile based on the source MAC address, a range of source MAC addresses,
a source IP address, or VLAN tag of device packets. The UNP Classification Rules are
then applied based on the outcome of authentication. Classification Rules are configured
using the UNP Classification Rules Tab.
• QoS Policy List - A UNP can also be configured with an existing QoS Policy List. The
QoS Rules within the Policy List are then applied to all members of the UNP to enforce
access to network resources. Only one policy list is allowed per profile, but multiple
profiles may use the same policy list.
12
OmniVista 3.5.4 Access Guardian Help
13
OmniVista 3.5.4 Access Guardian Help
5. Click the Assign button to bring up the "Assign UNP" Wizard and assign the profile(s) to
specific switches.
After selecting the switches to which you want to apply the profile, you must apply the profiles
to those switches. As shown below, the Universal Network Profile(s) you are applying appear in
the "Selected UNP" area.
14
OmniVista 3.5.4 Access Guardian Help
Resolving VLANs
If you create a UNP Profile that contains more than one VLAN and attempt to assign that Profile
to a switch(s) with more than one VLAN, you will be prompted to select a single VLAN for the
UNP for the switch(es). In this case, when you click the Apply button, the following prompt will
appear:
1. Click OK at the prompt. The Resolve VLAN IDs window will appear.
15
OmniVista 3.5.4 Access Guardian Help
2. Select the switch(es) to which you want to assign the UNP. Select a VLAN from the VLAN
ID drop-down menu and click Assign button, then click OK.
Note: If you are assigning the UNP to multiple switches, the switches will appear in the
Resolve VLAN IDs window. Use the CTRL or SHIFT keys to select the switches, then
click the Assign button, then click OK.
16
OmniVista 3.5.4 Access Guardian Help
Note: Removing a Policy List from a UNP and then assigning the UNP to a switch will
not automatically remove the policy list and its associated policies from the switch. To
remove the Policy List from the switch, first delete the Policy List from the Policy List tab
and then do a re-cache (NOTIFY) from the Expert tab.
Note: If a UNP is removed from a switch, all of its policy lists and associated policies of
the policy lists will be automatically removed from the switch if not shared by other UNPs
on the switch.
17
OmniVista 3.5.4 Access Guardian Help
The UNP classification rules allow the administrator to assign devices to a profile based on the
source MAC address, a range of source MAC addresses, a source IP address, or VLAN tag of
device connected to a UNP port. Classification rules are associated with a profile and are applied
to traffic received on UNP-enabled ports. When any of the traffic matches one of the UNP rules,
the traffic is then dynamically assigned to the VLAN associated with the matching UNP.
Enabling classification and defining classification rules is optional with UNP. When enabled,
however, classification rules are only applied to UNP-ports when one of the following occurs:
• MAC authentication is disabled on the port.
• MAC authentication is enabled but the RADIUS server is not configured.
• MAC authentication is enabled but RADIUS authentication failed.
If classification is disabled on a UNP port, classification rules are not applied to traffic received
on that port. If both authentication and classification are disabled on a UNP port, traffic received
on that port is blocked, unless a default UNP or trust VLAN tag is configured for that port.
18
OmniVista 3.5.4 Access Guardian Help
19
OmniVista 3.5.4 Access Guardian Help
20
OmniVista 3.5.4 Access Guardian Help
Classification Rules" Wizard appears, which guides you through the steps to apply the rule(s) to
specific switches.
21
OmniVista 3.5.4 Access Guardian Help
Deleting a Rule
To delete an existing rule from the server, select the rule in the UNP Rules List at the top of the
page, click on the Delete button, then click on the Apply button. This will remove the policy
from the server. However, this will not remove a policy(ies) from a switch(es) to which it has
already been assigned.
22
OmniVista 3.5.4 Access Guardian Help
switch. This information is displayed in the message area and logged in Access Guardian
Audit Log File. UNP is not supported on OS6900 or OS10K Switches.
23
OmniVista 3.5.4 Access Guardian Help
24
OmniVista 3.5.4 Access Guardian Help
25
OmniVista 3.5.4 Access Guardian Help
2. Enter a name for the policy in the Policy Name field. You must enter a name for the policy.
3. Select the type of policy(ies) you want to configure by selecting the checkbox next to the
policy(ies):
• Use 802.1x Authentication (Supplicant Policy) - Supplicant policies are used to classify
802.1x devices connected to 802.1x-enabled switch ports when 802.1x authentication
does not return a VLAN ID or authentication fails.
• Use MAC Authentication (Non-Supplicant Policy) - Non-Supplicant policies are used to
classify non-802.1x devices connected to 802.1x-enabled switch ports. There are two
types of non-supplicant policies. One type uses MAC authentication to verify the non-
802.1x device. The second type does not perform any authentication and limits device
assignment to VLANs that are not authenticated VLANs.
Note: By default, both 802.1x and MAC Authentication are selected. However, you can
create only Supplicant or Non-Supplicant policies. You can also create Non-Supplicant
policies for Supplicant devices, by selecting only the "Use MAC Authentication"
26
OmniVista 3.5.4 Access Guardian Help
checkbox. The Captive Portal fields are activated when you select Captive Portal from a
drop-down menu when configuring a Supplicant or Non-Supplicant policy.
4. Select options from the drop-down menus to configure the policy(ies) to apply when the client
passes authentication (first column in each policy type) or fails authentication (second column in
each policy type). If the device passes authentication it is assigned to the VLAN specified in the
RADIUS Server, which is shown in the first field. The remaining fields are used, in order, to
assign the device to a VLAN.
• Group Mobility - Use Group Mobility rules to determine the VLAN assignment for a
device.
• VLAN - Assign the device to the VLAN specified in the VLAN field. (If you select this
option, you must enter a VLAN in the VLAN field at the bottom of the table.)
• UNP - Apply the User Network Profile configured for the device. (If you select this
option, you must select a UNP from the drop-down menu in the UNP field at the bottom
of the table.)
• Default VLAN - Assign the Device to the default VLAN for the 802.1x port.
• Blocked - Block the device from accessing the 802.1x port.
• Captive Portal - Use Captive Portal policy authentication. When the Captive Portal
option is selected when configuring a Supplicant or Non-Supplicant Policy, the Captive
Portal drop-down menus are activated, enabling the user to configure Captive Portal
Policies.
Note: Policies are enforced in the order in which they are configured. For example, if you
create a Supplicant policy with the following "Pass" criteria: Group Mobility, VLAN,
Default VLAN, Device Classification will first use Group Mobility Rules for VLAN
assignment. If no Group Mobility Rules apply to the device, VLAN Rules will be used. If
no VLAN rules apply, the user will assigned to the Default VLAN.
5. Click OK, then click Apply to write the policy(ies) to the OmniVista Server. Follow the steps
above to configure additional policies. When you are finished configuring policies, click Assign
to assign the policy(ies) to specific switches/ports on the network, as described below.
27
OmniVista 3.5.4 Access Guardian Help
Note: Before clicking the Next button, you can use the optional Port Filter and Manual
Link Ports features to filter the types of ports to which you want to assign the policy. If
you filter for a type of port, those port types will automatically appear on the "Selected
Ports) area on page 2 of the Assign Policy Wizard.
The following pre-configured filters are available in the drop-down menu:
accessGuardianPorts (Device Classification ports in each device will be selected,
allPorts (all ports in each device will be selected), edgePorts (only mobile or
authenticated ports will be selected), networkPorts (only the ports that are AMAP, LLDP,
LAG or 802.1ab, or ports with a speed >= 2.4Gb/sec will be selected). The user can also
edit these filters or configure custom port filters by clicking on the Filter icon to the right
of the Port Filter drop-down menu.
The Manual Links Ports feature is used to Include, Exclude, or Pre-Select manual links.
By default, "Exclude" is selected for all cases where the user filters for Edge or Non-
Network ports. If the user selects Network Ports (DHCP Snooping Trust Mode) "Pre-
Select" is selected.
Assign Device Classification Policy Wizard - Page 2
Each switch you selected on Page 1 of the Wizard appears in the "Selected Devices" area on
Page 2, and the active ports for the highlighted switch appear in the "Selected Ports" area. Select
a switch in the "Selected Devices" area. By default, all active ports on the switch will appear in
the Ports" area on the left. If you have used the Port Filter feature, ports that match your selected
28
OmniVista 3.5.4 Access Guardian Help
type will appear in the "Selected Ports" area. Use the Add/Remove buttons to select the ports to
which you want to apply the policy(ies). Repeat this step for each switch in the "Selected
Devices" area. When you have selected the ports for each switch, click Next.
Note: If you plan on assigning the policy to the same ports on all of the selected switches,
select the ports on the first switch, then click on the Same for All Switches button. The
same ports will be selected for each of the switches in the "Selected Devices" area. If a
port does not exist on one of the other switches, it will be ignored.
29
OmniVista 3.5.4 Access Guardian Help
Editing a Policy
To edit an existing policy, select the policy in the Access Guardian List at the top of the page and
click on the Edit button. Edit the fields in the Edit Device Classification Policy Area and click
the Apply button. You must then assign the edited policy to specific switches/ports as detailed in
"Assigning Device Classification Policies", above.
Note: Device Classification Policy field descriptions are available the Creating Device
Classification Policies section above.
Deleting a Policy
To delete an existing policy from the server, select the policy in the Access Guardian List at the
top of the page, click on the Delete button, then click on the Apply button. This will remove the
policy from the server. However, this will not remove a policy(ies) from a switch(es) to which it
has already been assigned.
30
OmniVista 3.5.4 Access Guardian Help
31
OmniVista 3.5.4 Access Guardian Help
2. Enter a name for the policy in the Policy Name field. You must enter a name for the policy.
3. Select options from the drop-down menus to configure the policy(ies).
• Classification - Enables/Disables Device Classification. When enabled and MAC
authentication is disabled or fails, UNP classification rules (MAC address, MAC address
range, IP network address, or VLAN tag) are applied to the traffic received on the UNP
port.
32
OmniVista 3.5.4 Access Guardian Help
• MAC Auth - Enables MAC-based authentication for devices connected to the UNP port..
MAC authentication takes precedence over all other classification parameters configured
for the port. If MAC authentication is disables, or if a device fails MAC authentication,
other classification methods configured for the port are applied.
• Trust VLAN Tag - Enables/Disables the Trust VLAN Tag option. If enabled, and the
VLAN ID tag in the packet matches an existing VLAN in the system, the device is
classified into the VLAN.
• Default UNP - Select a Default UNP from the drop-down menu. If untagged device
traffic does not match any of the classification rules, the device is assigned to the default
UNP configured for the port.
• Alternate UNP - Select an Alternate UNP from the drop-down menu. If a device passes
MAC authentication, but does not return a UNP name, the device is assigned to the
Alternate UNP.
4. Click OK, then click Apply to write the policy(ies) to the OmniVista Server. Follow the steps
above to configure additional policies. When you are finished configuring policies, click Assign
to assign the policy(ies) to specific switches/ports on the network, as described below.
33
OmniVista 3.5.4 Access Guardian Help
Note: Before clicking the Next button, you can use the optional Port Filter and Manual
Link Ports features to filter the types of ports to which you want to assign the policy. If
you filter for a type of port, those port types will automatically appear on the "Selected
Ports) area on page 2 of the Assign Policy Wizard.
The following pre-configured filters are available in the drop-down menu:
accessGuardianPorts (UNP Port ports in each device will be selected, allPorts (all ports
in each device will be selected), edgePorts (only mobile or authenticated ports will be
selected), networkPorts (only the ports that are AMAP, LLDP, LAG or 802.1ab, or ports
with a speed >= 2.4Gb/sec will be selected). The user can also edit these filters or
configure custom port filters by clicking on the Filter icon to the right of the Port Filter
drop-down menu.
The Manual Links Ports feature is used to Include, Exclude, or Pre-Select manual links.
By default, "Exclude" is selected for all cases where the user filters for Edge or Non-
Network ports. If the user selects Network Ports (DHCP Snooping Trust Mode) "Pre-
Select" is selected.
Assign UNP Port Policy Wizard - Page 2
Each switch you selected on Page 1 of the Wizard appears in the "Selected Devices" area on
Page 2, and the active ports for the highlighted switch appear in the "Selected Ports" area. Select
a switch in the "Selected Devices" area. By default, all active ports on the switch will appear in
the Ports" area on the left. If you have used the Port Filter feature, ports that match your selected
34
OmniVista 3.5.4 Access Guardian Help
type will appear in the "Selected Ports" area. Use the Add/Remove buttons to select the ports to
which you want to apply the policy(ies). Repeat this step for each switch in the "Selected
Devices" area. When you have selected the ports for each switch, click Next.
Note: If you plan on assigning the policy to the same ports on all of the selected switches,
select the ports on the first switch, then click on the Same for All Switches button. The
same ports will be selected for each of the switches in the "Selected Devices" area. If a
port does not exist on one of the other switches, it will be ignored.
Note: OS6900 (7.2.1.R01 and later) and OS10K (7.2.1.R02 and later) allow you to assign
UNP Port Policies to Link Aggregation ports. The Link Agg will appear in the in the
"Ports" Area as a Link Agg (e.g., Port 40000001). You cannot assign policies to
individual physical ports belonging to a Link Agg (ports belonging to a Link Agg will not
be displayed).
Assign UNP Port Policy Wizard - Page 3
After selecting the switches and ports to which you want to apply the policy, click Apply on
Page 3 of the Wizard to apply the policy. The Message Area shows the progress of the operation.
Note: You can also remove a UNP Port Policy from selected switches/ports by editing the
policy, selecting the switches/ports and selecting the "Remove Selected" or "Remove All"
checkbox on page 3 of the "Assign Policy" Wizard.
35
OmniVista 3.5.4 Access Guardian Help
36
OmniVista 3.5.4 Access Guardian Help
The following tabs within the DHCP Tab allow the user to configure and view DHCP Snooping
parameters:
• Switch Level - Is used to configure global DHCP Snooping parameters on specific
switches/ports on the network.
• VLAN-Level - Is used to configure global DHCP Snooping parameters on specific
VLANs and their associated ports in the network.
• View - Is used to view and configure DHCP Snooping at the Switch Level, VLAN Level,
and Port Level as well as view and configure entries in the DHCP Snooping MAC
Address Binding Table.
37
OmniVista 3.5.4 Access Guardian Help
for applications that do not require the establishment of a session and end-to-end error checking,
such as E-mail and file transfer.
DHCP Snooping improves network security by filtering DHCP messages received from devices
outside the network and building and maintaining a binding table (database) to track access
information for such devices. In order to identify DHCP traffic that originates from outside the
network, DHCP Snooping categorizes ports as either trusted or untrusted. A port is trusted if it is
connected to a device inside the network, such as a DHCP server. A port is untrusted if it is
connected to a device outside the network, such as a customer switch or workstation.
There are two DHCP security features available: DHCP relay agent information option (Option
82) and DHCP Snooping. The Option 82 feature enables the relay agent to insert identifying
information into client-originated DHCP packets before the packets are forwarded to the DHCP
server. The DHCP Snooping feature filters DHCP packets between untrusted sources and a
trusted DHCP server and builds a binding database to log DHCP client information. Although
Option 82 is a subcomponent of DHCP Snooping, these two features are mutually exclusive. If
the Option 82 feature is enabled for the switch, DHCP Snooping is not available. The reverse is
also true; if DHCP Snooping is enabled, Option-82 is not available. In addition, the following
differences exist between these two features:
• DHCP Snooping does require and use the Option-82 data insertion capability, but does
not implement any other behaviors defined in RFC 3046.
• DHCP Snooping is configurable at the switch level and on a per-VLAN basis, but
Option-82 is only configurable at the switch level.
Note: The Option 82 feature is enabled/disabled using the ip helper dhcp-snooping
option-82 data-insertion {enable | disable} command in the CLI.
38
OmniVista 3.5.4 Access Guardian Help
information in the binding table does not match the interface on which the message was
received.
• The packet includes a relay agent IP address that is a non-zero value.
• The packet already contains Option 82 data in the options field and the Option 82 check
function is enabled.
If none of the above are true, DHCP Snooping accepts and forwards the packet. When a DHCP
packet is received from a server, the following information is extracted from the packet to create
an entry in the DHCP Snooping binding table:
• MAC address of the DHCP client.
• IP address for the client that was assigned by the DHCP server.
• The port from where the DHCP packet originated.
• The VLAN associated with the port from where the DHCP packet originated.
• The lease time for the assigned IP address.
• The binding entry type; dynamic or static (user-configured).
After extracting the above information and populating the binding table, the packet is then
forwarded to the port from where the packet originated. Basically, the DHCP Snooping features
prevent the normal flooding of DHCP traffic. Instead, packets are delivered only to the
appropriate client and server ports.
39
OmniVista 3.5.4 Access Guardian Help
For more information on DHCP Snooping, see the OmniSwitch AOS Release 6 Network
Configuration Guide.
DHCP Snooping
To enable DHCP Snooping, select the Switch Level radio button. Click the Apply button, then
click the Assign button to bring up the Assign DHCP Snooping Switch-Level Configuration"
Wizard to enable DHCP Snooping on specific switches.
40
OmniVista 3.5.4 Access Guardian Help
Option 82 Check
The Option 82 field in a packet contains identifying information that is inserted into client-
originated DHCP packets before the packets are forwarded to the DHCP server. The Option 82
Check fields in OmniVista allow you to configure the Option 82 checking on a switch. If the
Option 82 Check Field is enabled, the switch checks the incoming packets for the Option 82
field.
Opt 82 Check
• Enable - Switch checks for Option 82 field. If the packet contains the Option 82 field and
is received on an untrusted port, the packet is dropped
• Disable - Switch does not check for the Option 82 field. The packet is processed
normally, whether or not an Option 82 Field is present.
Option 82 Format
These fields are used to specify the type of data that is inserted into the Option 82 field before a
packet is forwarded.
• MAC Address - The MAC address of the router interface from which the DHCP packet
originated.
• System Name - The System Name
• User Defined - A user-defined text string up to 64 characters. Enter the text string in the
Opt 82 String Field.
When you have completed the DHCP Snooping and Option 82 Fields, click the Apply button,
the click the Assign... button to bring up the Assign DHCP Snooping Switch-Level
Configuration" Wizard.
41
OmniVista 3.5.4 Access Guardian Help
42
OmniVista 3.5.4 Access Guardian Help
for all cases where the user filters for Edge or Non-Network ports. If the user selects
Network Ports (DHCP Snooping Trust Mode) "Pre-Select" is selected.
3. Click the Next button. Page 2 of the wizard appears.
4. Select the switch(es) to which you want to assign DHCP Snooping/Option 82 configuration
and use the Add button to move the devices to the "Devices to be added" area. (Use the Add or
Remove buttons to add or delete switches.) When you are done selecting devices, click the Next
button. Page 3 of the Wizard appears.
43
OmniVista 3.5.4 Access Guardian Help
5. Select a switch in the "Selected Devices" area. By default, all active ports on the switch will
appear in the Ports" area on the left. If you have used the Port Filter feature, ports that match
your selected type will appear in the "Selected Ports" area. Use the Add/Remove buttons to
select the ports to which you want to apply the policy(ies). Repeat this step for each switch in the
"Selected Devices" area. When you have selected the ports for each switch, click Next. Page 4 of
the Wizard appears.
44
OmniVista 3.5.4 Access Guardian Help
6. Click the Apply button to apply the configuration to the selected switches/ports. The Message
Area shows the progress of the operation.
45
OmniVista 3.5.4 Access Guardian Help
46
OmniVista 3.5.4 Access Guardian Help
47
OmniVista 3.5.4 Access Guardian Help
Option 82 Check Field is enabled, the switch checks the incoming packets for the Option 82
field.
Opt 82 Check
• Enable - Switch checks for Option 82 field. If the packet contains the Option 82 field and
is received on an untrusted port, the packet is dropped.
• Disable - Switch does not check for the Option 82 field. The packet is processed
normally, whether or not an Option 82 Field is present.
Option 82 Format
These fields are used to specify the type of data that is inserted into the Option 82 field before a
packet is forwarded.
• MAC Address - The MAC address of the router interface from which the DHCP packet
originated.
• System Name - The System Name
• User Defined - A user-defined text string up to 64 characters. Enter the text string in the
Opt 82 String Field.
When you have completed the DHCP Snooping and Option 82 Fields, click the Apply button,
the click the Assign... button to bring up the “Assign DHCP Snooping VLAN-Level
Configuration" Wizard.
2. Select the VLAN(s) you want to configure, then Enable/Disable the Option 82 feature for the
VLAN(s).
3. Click OK. The DHCP Snooping VLAN(s) appear in the table as shown below.
48
OmniVista 3.5.4 Access Guardian Help
49
OmniVista 3.5.4 Access Guardian Help
50
OmniVista 3.5.4 Access Guardian Help
for all cases where the user filters for Edge or Non-Network ports. If the user selects
Network Ports (DHCP Snooping Trust Mode) "Pre-Select" is selected.
3. Click the Next button. Page 2 of the wizard appears.
4. Select the switch(es) to which you want to add DHCP the VLAN-Level Snooping/Option 82
configuration and use the Add button to move the devices to the "Devices to be added" area.
(Use the Add or Remove buttons to add or delete switches.) When you are done selecting
devices, click the Next button. Page 3 of the Wizard appears.
51
OmniVista 3.5.4 Access Guardian Help
5. Select a switch in the "Selected Devices" area. By default, all active ports on the switch will
appear in the Ports" area on the left. If you have used the Port Filter feature, ports that match
your selected type will appear in the "Selected Ports" area. Use the Add/Remove buttons to
select the ports to which you want to apply the policy(ies). Repeat this step for each switch in the
"Selected Devices" area. When you have selected the ports for each switch, click Next. Page 4 of
the Wizard appears.
52
OmniVista 3.5.4 Access Guardian Help
6. Click the Apply button to apply the configuration to the selected switches/ports. The Message
Area shows the progress of the operation.
Edit the VLAN, then click OK. Click the Apply button to write the edit the server, then click the
Assign button to assign the edit to the VLAN(s).
53
OmniVista 3.5.4 Access Guardian Help
Snooping and to create/delete DHCP Snooping VLANs from a profile to be assigned. Use
the View Tab to delete a DHCP Snooping VLAN from a switch or the “Assign DHCP
Snooping VLAN-Level Configuration" Wizard to delete a DHCP Snooping VLAN from
multiple switches.
54
OmniVista 3.5.4 Access Guardian Help
Global Configurations
The Global Configuration tab is used to view and change DHCP Snooping parameters on a
single switch. To check/update parameters, select the switch in the switch table, select the
configuration(s) from the drop-down menus, then click the Apply button. To update DHCP
configurations for more than one switch, click on the Switch Level tab or the VLAN Level tab.
55
OmniVista 3.5.4 Access Guardian Help
56
OmniVista 3.5.4 Access Guardian Help
57
OmniVista 3.5.4 Access Guardian Help
58
OmniVista 3.5.4 Access Guardian Help
59
OmniVista 3.5.4 Access Guardian Help
View Tab
The View Tab is used to view overall Access Guardian policy and configuration information.
The tab displays information for all discovered devices that support Access Guardian. Those
devices are listed at the top of the window, with specific Access Guardian information listed
below: Authentication Servers, HIC Servers, UNP, Access Guardian Policy, and Device
Authentication (DA) MAC Users. To view information for a specific device, select the device in
the table in the top pane. Click on the tabs in the bottom pane for specific information.
60
OmniVista 3.5.4 Access Guardian Help
Note: Only the features supported by the selected switch are activated. If a selected switch
does not support a feature (e.g. DA MAC Users in the figure below), that tab will be
grayed out.
Authentication Servers
The Authentication Servers tab displays information for Authentication Servers assigned to the
selected switch.
61
OmniVista 3.5.4 Access Guardian Help
HIC
The HIC tab displays Host Integrity Check (HIC) Server and HIC Endpoint Status information
for the selected switch, if configured.
62
OmniVista 3.5.4 Access Guardian Help
HIC Server
HIC Server Name
The user-configured name for the HIC Server.
IP Address
The HIC Server IP address.
HIC Server Port
The HIC Server Port.
HIC Server Status
The operational status of the HIC Server (Up/Down).
HIC Status
The administrative state of HIC on the switch (Enabled/Disabled).
Remediation URL
The URL of the Remediation Server.
HTTP Redirect Port
The proxy port number used when the web-based host is redirected to the HIC server.
Remediation Subnets
Subnets allowed access to the switch and host device as part of the HIC process.
63
OmniVista 3.5.4 Access Guardian Help
MAC Address
The HIC Endpoint device MAC address.
Status
The HIC Endpoint device status.
UNP
The UNP tab displays information for Universal Network Profiles, Classification Rules, and HIC
Down Policies configured for the selected switch.
64
OmniVista 3.5.4 Access Guardian Help
Profiles
Profile Name
Profile name for the UNP.
VLAN ID
VLAN to which all members of the UNP are assigned.
HIC
HIC Server administrative status, if configured for the UNP (Enabled/Disabled).
Policy List Name
Policy List associated with the UNP.
65
OmniVista 3.5.4 Access Guardian Help
Classification Rules
Rule Type
The Rule Type (MAC, MAC Range, IP, VLAN Tag).
Rule Value
The value associated with the rule (e.g., MAC address, IP Address).
VLAN Tag ID
The VLAN Tag associated with the rule, if applicable.
Profile
The UNP Profile associated with the rule.
66
OmniVista 3.5.4 Access Guardian Help
UNP Name
Profile name for the UNP.
Target UNP Name
Profile name for the Target UNP.
67
OmniVista 3.5.4 Access Guardian Help
Policies
68
OmniVista 3.5.4 Access Guardian Help
Policy Name
The Access Guardian policy assigned to the slot/port.
Slot/Port
The 802.1X slot/port that provides access to the device.
802.1x Policy
The 801.1x policy configured for the slot/port.
User 802.1X Auth
Indicates whether or not MAC Authentication is included in the policy.
Non-Supplicant Policy
The 801.1x non-supplicant policy configured for the slot/port.
Captive Portal Policy
The Captive Portal policy configured for the slot/port, if applicable.
Supplicants
Slot/Port
The 802.1X slot/port that provides access to the device.
MAC Address
The source MAC address of the device connected to the slot/port.
Port State
The administrative status of the 802.1X port.
69
OmniVista 3.5.4 Access Guardian Help
Policy
The 802.1x device classification policy applied to the device.
User Name
The user name that is used for authentication.
VLAN Learned
The VLAN in which the source MAC address of the non-802.1x device was learned.
Non-Supplicants
Slot/Port
The 802.1X slot/port that provides access to the device.
MAC Address
The source MAC address of the device connected to the slot/port.
Authentication State
The administrative status of the 802.1X port.
Classification Policy
The 802.1x device classification policy applied to the device.
VLAN Learned
The VLAN in which the source MAC address of the non-802.1x device was learned.
70
OmniVista 3.5.4 Access Guardian Help
DA MAC Users
The Device Authentication (DA) MAC Users tab displays information about UNP MAC users
connected on the selected switch. This information can be used by the Administrator to
troubleshoot problems. For example, an Administrator to determine why UNP User traffic not
flowing properly by checking the Classification Source column. If the Classification Source is in
a blocking state, it would indicate that the associated UNP Rule has blocked traffic. You can also
verify which UNP is associated with a specific MAC address.
Note: This tab is only supported on OS6900 Series Switches (Release 7.2.1.R01 and later)
and OS10K Series Switches (Release 7.2.1.R012 and later). Also note that once a MAC
Addresses is classified on a port, it is not automatically reclassified when the UNP is
changed. You may have to flush the port by doing interface admin enable/disable on the
port.
71
OmniVista 3.5.4 Access Guardian Help
MAC Address
The MAC address of the port.
Interface Index
The slot/port number of the port.
VLAN
The VLAN associated with the MAC user.
Authentication Status
The authentication status of the MAC user:
• Idle
• In Progress
• Authenticated
• Failed
• Failed Timeout
• Failed No Server
• Failed No Resources.
IP Address
The source IP address of the MAC user.
UNP
The UNP used to classify the MAC user.
72
OmniVista 3.5.4 Access Guardian Help
Authentication Type
The authentication type used (MAC, Other)
Classification Source
The Classification Policy under which the device was learned.
Diagnostics Tab
The Diagnostics Tab can be used by a Network Administrator to diagnose end user problems by
locating the user's end station and displaying any Access Guardian Policies for the End Station.
If, for example, a user cannot access certain resources, the Network Administrator can enter the
user's IP or MAC address to determine the switch and port of the End Station to which the user is
attached. The Diagnostic Tab also displays the 802.1x Authentication server, MAC
Authentication Server and 802.1x Accounting Server for the switch.
As shown below, once the user's station is located, the Authentication Servers as well as any
Supplicant and Non-Supplicant Policies for the user's end station port are displayed.
You can mouse over a policy in the Access Guardian Policies table for specific policy
information. In addition, the following Supplicant and Non-Supplicant information is displayed
Non-Supplicant Policy:
• Authentication State
• Classification
• VLAN learned
73
OmniVista 3.5.4 Access Guardian Help
Supplicant Policy:
• Port State
• Policy
• User's Name
• VLAN learned.
74