Pulse Policy Secure - Pulse Secure ¢â‚¬› download ¢â‚¬› techpubs ¢â‚¬› ...¢  The IDP sits within the network

  • View
    3

  • Download
    0

Embed Size (px)

Text of Pulse Policy Secure - Pulse Secure ¢â‚¬› download...

  • © 2015 by Pulse Secure, LLC. All rights reserved

    Pulse Policy Secure

    IDP and Unified Access Control

    Product Release 5.3

    Document Revision 1.0 Published: 2015-12-21

  • © 2015 by Pulse Secure, LLC. All rights reserved 2

    Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose, CA 95134 http://www.pulsesecure.net

    © 2015 by Pulse Secure, LLC. All rights reserved

    Pulse Secure and the Pulse Secure logo are trademarks of Pulse Secure, LLC in the United States. All other trademarks, service marks, registered

    trademarks, or registered service marks are the property of their respective owners.

    Pulse Secure, LLC assumes no responsibility for any inaccuracies in this document. Pulse Secure, LLC reserves the right to change, modify, transfer, or

    otherwise revise this publication without notice.

    Pulse Policy Secure- IDP and Unified Access Control

    The information in this document is current as of the date on the title page.

    END USER LICENSE AGREEMENT

    The Pulse Secure product that is the subject of this technical documentation consists of (or is intended for use with) Pulse Secure software. Use of such

    software is subject to the terms and conditions of the End User License Agreement (“EULA”) posted at http://www.pulsesecure.net/support/eula. By

    downloading, installing or using such software, you agree to the terms and conditions of that EULA.”

    http://www.pulsesecure.net/ http://www.pulsesecure.net/support/eula

  • © 2015 by Pulse Secure, LLC. All rights reserved 3

    Table of Contents List of Figures --------------------------------------------------------------------------------------------------------------------------------------- 4

    List of Tables ---------------------------------------------------------------------------------------------------------------------------------------- 5

    About This Guide ------------------------------------------------------------------------------------------------------------------------------------ 6

    Objectives ------------------------------------------------------------------------------------------------------------------------------------------ 6

    Audience -------------------------------------------------------------------------------------------------------------------------------------------- 6

    Documentation Conventions -------------------------------------------------------------------------------------------------------------- 6

    Documentation ---------------------------------------------------------------------------------------------------------------------------------- 8

    Obtaining Documentation ----------------------------------------------------------------------------------------------------------------- 8

    Documentation Feedback ------------------------------------------------------------------------------------------------------------------- 8

    Requesting Technical Support ------------------------------------------------------------------------------------------------------------- 8 Self-Help Online Tools and Resources ----------------------------------------------------------------------------------------------- 8 Opening a Case with PSGSC --------------------------------------------------------------------------------------------------------------- 9

    PART 1 Intrusion Detection and Prevention with Unified Access Control ---------------------------------------------- 11

    CHAPTER 1 UAC and IDP Interoperability ------------------------------------------------------------------------------------------- 13

    About IDP Technology ---------------------------------------------------------------------------------------------------------------------- 13

    IDP Deployment Scenarios Overview ------------------------------------------------------------------------------------------------ 14

    CHAPTER 2 Configuration --------------------------------------------------------------------------------------------------------------- 17

    Understanding Pulse Policy Secure Deployments with IDP Devices ---------------------------------------------------- 17 About IDP Devices ------------------------------------------------------------------------------------------------------------------------- 17 Coordinated Threat Control Overview ------------------------------------------------------------------------------------------- 18 Deployments with IDP Series Devices --------------------------------------------------------------------------------------------- 18 Deployments with IDP-Enabled Infranet Enforcers ------------------------------------------------------------------------ 19 Monitoring IDP-Reported Events --------------------------------------------------------------------------------------------------- 20

    Activating IDP for the ScreenOS or Junos Enforcer ------------------------------------------------------------------------------ 20

    Managing Interoperation with IDP Devices ---------------------------------------------------------------------------------------- 21 Configuring Communication with an IDP Device ----------------------------------------------------------------------------- 21 Enabling or Disabling IDP Sensors --------------------------------------------------------------------------------------------------- 22 Reconnecting to an IDP Sensor ------------------------------------------------------------------------------------------------------- 22 Refreshing and Displaying the Connection Status --------------------------------------------------------------------------- 23 Deleting an IDP Sensor Entry ---------------------------------------------------------------------------------------------------------- 23

    Defining Automatic Response Sensor Event Policies ------------------------------------------------------------------------- 23

    Identifying and Managing Quarantined Users Manually ------------------------------------------------------------------ 25

    Using Role-Based Policies to Monitor User Activity--------------------------------------------------------------------------- 26

    Understanding Coordinated Threat Control in an Federated Deployment ------------------------------------------ 27

    Using IDP Devices in a Federated Deployment --------------------------------------------------------------------------------- 28

    Index ---------------------------------------------------------------------------------------------------------------------------------------------------- 30

  • © 2015 by Pulse Secure, LLC. All rights reserved 4

    List of Figures

    Figure 1: Pulse Policy Secure Series and Standalone IDP Topology ................................................................ 15 Figure 2: Pulse Policy Secure Series and ISG-IDP Topology ............................................................................ 15 Figure 3: IDP in a Layer 2 Deployment ............................................................................................................ 16 Figure 4: IF-MAP Federation in a Heterogeneous Network with IDP ............................................................. 27

  • © 2015 by Pulse Secure, LLC. All rights reserved 5

    List of Tables

    Table 1: Notice Icons ......................................................................................................................................... 6 Table 2: Text Conventions ................................................................................................................................. 7

  • © 2015 by Pulse Secure, LLC. All rights reserved 6

    About This Guide

     Objectives

     Audience

     Documentation Conventions

     Documentation

     Obtaining Documentation

     Documentation Feedback

     Requesting Technical Support

    Objectives

    This guide describes basic configuration procedures for Pulse Policy Secure.

    Audience

    This guide is designed for network administrators who are configuring and maintaining a Pulse Policy

    Secure Series device. To use this guide, you need a broad understanding of networks in general and the

    Internet in particular, networking principles, and network configuration. Any detailed discussion of these

    concepts is beyond the scope of this guide.

    Documentation Conventions

    Table 1 defines the notice icons used in this guide. Table 2 defines text conventions used throughout this

    documentation.

    Table 1: Notice Icons

    Icon Meaning Description

    Informational note Indicates important features or instructions.

    Caution

    Indicates a situation that may result in loss of data or hardware damage.

  • © 2015 by Pulse Secure, LLC. All rights reserved 7

    Warning Alert regarding risk of personal injury or death.

    Laser warning Alert regarding risk of personal injury from a laser.

    Table 2: Text Conventions

    Convention Description Examples

    Bold text Represents keywords, scripts, and tools in text.

    Represents a GUI element that the user selects, clicks, checks, or clears.

    Specify the keyword exp-msg.

    Run the install.sh script.

    Use the pkgadd tool.

    To cancel the configuration, click Cancel.

    Bold text like this

    Represents text that the user must enter.