Guide how to use Genian NAC 2017-05-18T09:46:41+00:00

Genian NAC – Administrator’s Guide

  1. Administrator's Guide
  2. Installing Genian NAC
    1. Installing Policy Server
      1. Installing Policy Server on Physical Machine
      2. Installing Policy Server on Virtual Machine
      3. Subscribe on Genian Cloud
      4. Connecting Administrator Management Interface
      5. Connecting Command Line Console
    2. Installing Network Sensor
      1. Installing Network Sensor on Physical Machine
      2. Install the Network Sensor on a Virtual Machine
      3. Connecting Command Line Interface
    3. Installing Agent
      1. Installing Windows Agent
      2. Installing macOS Agent
      3. Distributing Agent using GPO
      4. Distributing Agent using Captive Web Portal
      5. Distributing Agent manually
  3. Monitoring Network Assets
    1. Monitoring Network Nodes
      1. Browsing Nodes
      2. Filtering Nodes
      3. Tagging Nodes
      4. Deleting Nodes
      5. Browsing Nodes based on Sensor or Group
      6. Creating Node Groups
      7. Detecting Node Platform
    2. Monitoring IP Address
      1. Browsing Sensor IP Status
      2. Browsing IP status using Matrix View
    3. Monitoring Switch
      1. Browsing Switches
      2. Browsing Switch Ports
      3. Searching Switch Port
      4. Changing Switch Port description
      5. Shutdown Switch Port
    4. Monitoring Wireless LAN
      1. Browsing SSIDs
      2. Searching SSIDs
      3. Creating Wireless Groups
      4. Viewing connected stations
      5. Finding SSID physical location
      6. Status and Filter
      7. Detecting Internal SSID
      8. Browsing Wireless Stations
      9. Searching Wireless Stations
  4. Controlling Network Access
    1. Configuring Network Sensor
      1. Activating Enforcement on Network Sensor
    2. Controlling network access based on IP/MAC Policy
      1. Preparing network access based on IP/MAC Policy
      2. Changing IP/MAC Policy
      3. Configuring IP Change Prevention
      4. Configuring IP Conflict Prevention
      5. Allowing IP/MAC based on Time
    3. Controlling network access based on Node Group
      1. Creating Enforcement Policy for Node Group
      2. Managing Enforcement Status
      3. Configuring Agent Action for Enforcement Policy
    4. Configuring Switch Port Block for Enforcement Policy
      1. Configuring SNMP write community string
    5. Configuring DHCP Server
      1. Creating DHCP IP Pool
      2. Configuring DHCP Options
      3. Understanding IP/MAC Policy with DHCP
  5. Configuring On-boarding Process
    1. Configuring Captive Web Portal
      1. Enabling Captive Web Portal
      2. Customizing Messages
      3. Managing Custom Buttons
      4. Customizing CWP Design
      5. Managing Notice
    2. Configuring Guest Management
      1. Configuring Guest Account
      2. Managing Guest Requests
  6. Configuring User Authentication
    1. Enabling User Authentication
      1. Configuring User Authentication by Captive Web Portal
      2. Configuring User Authentication by Agent
      3. Configuring User Authentication by 802.1x
      4. Configuring User Authentication by AD Domain Login Integration
      5. Configuring User Authentication by RADIUS Account Integration
    2. Managing User Directories
      1. Managing Users
      2. Managing User Groups
      3. Configuring Password Policy
    3. Synchronizing User Directory
      1. Synchronizing User Directories with RDBMS
      2. Synchronizing User Directories with LDAP
      3. Synchronizing User Directories with CSV
    4. Integrating External Server
      1. Configuring Active Directory
      2. Configuring RADIUS Server
      3. Configuring IMAP/POP3/SMTP Server
      4. Testing User Authentication
    5. Configuring User Authentication Options
      1. Configuring Authentication Scope
      2. Configuring Authentication Lifetime
      3. Configuring Device Ownership
      4. Configuring Find Username & Password
    6. Enabling RADIUS Authentication
      1. Enabling MAC Authentication
      2. Configuring Active Directory Integration
      3. Configuring VLAN Assignment
  7. Controlling Endpoints
    1. Understanding Agent Action
    2. Controlling Windows
      1. Collecting Information
      2. Controlling Operating System Configuration
      3. Controlling Software
      4. Controlling Internet Options
      5. Controlling DNS
      6. Controlling Antivirus
      7. Controlling File Folder Sharing
      8. Controlling External Device
      9. Controlling WLAN Interface
      10. Controlling Windows Update
      11. Controlling Power Options
      12. Controlling ARP Spoofing
      13. Kill Process
      14. Managing Files
      15. Sending Notifications
      16. Running Scripts
      17. Configuring Wireless Connection Manager
      18. Configuring 802.1x Wired Authentication
      19. Collecting Windows System Information using WMI
      20. Changing Computer Name
    3. Controlling MacOS
      1. Collecting Information
  8. Detecting Threats
    1. Understanding Threat Detection
    2. Creating Threat Definition
    3. Blocking Risk Nodes
  9. Managing Logs and Events
    1. Managing Logs
      1. Searching Logs
      2. Creating Log Filter
      3. Tagging Assets using Event
    2. Sending Notification
      1. Sending notification using SNMP
      2. Sending notification using Syslog
      3. Sending notification using Webhook
    3. Receiving Events
      1. Configuring receive Syslog
      2. Configuring receive SNMP Traps
  10. Managing Systems
    1. Managing Dashboard
      1. Adding Dashboards
      2. Adding Widgets
      3. Monitoring Sensors using Google Maps
    2. Managing Administrator
      1. Creating Administrator
      2. Creating Administrator Roles
      3. Changing Command Line Interface Password
    3. Configuring Network
      1. Changing Interface IP Address
    4. Configuring Default Settings
      1. Configuring Appliance Settings
      2. Configuring Sensor Settings
    5. Managing Backup and Restore
      1. Configuring Backup
      2. Restoring from existing Backup
    6. Managing System Software
      1. Updating Policy Server and Network Sensor
      2. Updating Agent

Administrator's Guide

INTRODUCTION

Welcome to the Genian NAC Administrator’s Guide!
The purpose of this document is to guide Administrators through the installation, deployment, and managing of Genian NAC.  This guide will help you understand:

  • Identifying Devices on Network
  • Detect Device Platform Information
  • User Authentication
  • Threat Detection and Policy Enforcement

AUDIENCE

This guide is intended for System and Network Administrators, and IT Professionals of the Genian NAC product. It provides information and detailed system configurations to help Administrators design and manage their network environment.

Suggest Edit