advertisement
Using Novell Security Manager
Service: The Syslog protocol is set by default. You can also use this dropdown menu to configure the service (port) that should be used on the remote server.
Logs: This selection field allows you to select log files that should be delivered to the remote host.
Novell Security Manager supports User Authentication using the SOCKS v5, SMTP, and HTTP proxy services and can control which users are allowed to use which services. User accounts can be defined on the Security
Manager, through the Definitions/Users menu. Or on an external user database. Supported external databases include RADIUS, SAM (Windows
NT/Windows 2000/XP-Server), Microsoft Active Directory, the domain joining method of NTLM and OpenLDAP. If an external user database is already present on the network, you can use it instead of having to reenter user accounts on Novell Security Manager itself.
Important Note:
Please note, that several authentication methods cannot be supported at the same time.
In MS Windows based networks the Domain Controller (DC) manages access to a set of network resources (e.g., applications, printers, etc.) for a group of clients. The user needs only to log in to the domain to gain access to the resources. A Domain Controller is a server that is running a version of the MS Windows 2000 Server or 2003 Server operating system and has Active Directory (AD) installed, which is Microsoft’s trademarked directory service.
A directory service provides a centralized location to store information in a distributed environment about network devices, services, and the people who use them. For MS Windows users it provides account information, privileges, profiles, and policy. When an authentication method is used together with Active Directory and with the corresponding settings, the authentication, e. g. before accessing an own Service is no longer made by
Novell Security Manager but by the Active-Directory-Server.
User Authentication requires users to identify themselves before using network services. In comparison with an IP-based access control the userbased access control allows for user-based Accounting in the HTTP proxy access protocol.
52
advertisement
Related manuals
advertisement
Table of contents
- 9 Introduction to the Technology
- 15 Installation
- 16 System Requirements
- 18 Installation Instructions
- 18 Software Installation
- 22 Configuring Security Manager
- 27 WebAdmin
- 27 Info Box
- 27 Tab List
- 28 Menus
- 28 The Status Light
- 28 Selection Field
- 29 The Selection Table
- 30 Drop-down Menus
- 30 Lists
- 31 Online Help
- 31 Refresh
- 32 Using Novell Security Manager
- 34 Basic Settings (System)
- 34 Settings
- 38 Licensing
- 40 Up2Date Service
- 45 Backup
- 51 Remote Syslog Server
- 52 User Authentication
- 53 Novell eDirectory
- 55 RADIUS
- 58 SAM – NT/2000/XP
- 60 Active Directory/NT Domain Membership
- 62 LDAP Server
- 71 WebAdmin Settings
- 72 WebAdmin Site Certificate
- 74 High Availability
- 79 Shut down/Restart
- 80 Networks and Services (Definitions)
- 80 Networks
- 85 Services
- 88 Users
- 90 Time Events
- 92 Network Settings (Network)
- 92 Hostname/DynDNS
- 93 Interfaces
- 97 Standard Ethernet Interface
- 101 Additional Address on Ethernet Interface
- 103 Virtual LAN
- 107 PPPoE-DSL Connection
- 111 PPTPoE/PPPoA-DSL Connections
- 115 PPP over Serial Modem Line
- 119 Bridging
- 120 Routing
- 123 NAT/Masquerading
- 126 Masquerading
- 127 Load Balancing
- 128 DHCP Service
- 133 PPTP VPN Access
- 138 Accounting
- 139 Ping Check
- 140 Intrusion Protection
- 140 Settings
- 141 Rules
- 144 Portscan Detection
- 146 DoS/Flood Protection
- 150 Advanced
- 152 Packet Filter
- 152 Rules
- 163 Advanced
- 167 Application Gateways (Proxies)
- 174 Content Filter (Surf Protection)
- 196 Content Filter
- 199 Spam Protection
- 206 Content Filter
- 212 SOCKS
- 214 Ident
- 215 Proxy Content Manager
- 220 Virtual Private Networks (IPSec VPN)
- 226 Connections
- 232 Policies
- 235 Local Keys
- 237 Remote Keys
- 240 L2TP over IPSec
- 241 CA Management
- 244 Advanced
- 247 System Management (Reporting)
- 247 Administration
- 248 Virus
- 248 Hardware
- 249 Network
- 249 Packet Filter
- 249 Content Filter
- 250 PPTP/IPSec VPN
- 250 Intrusion Protection
- 250 HTTP Proxy Usage
- 250 Executive Report
- 251 Accounting
- 252 System Information
- 254 Remote Management (Remote Management)
- 254 Report Manager (RM)
- 257 Local Logs (Log Files)
- 257 Settings
- 260 Local Log File Query
- 261 Browse
- 264 Log Files
- 267 Error Codes
- 276 HTTP Proxy Messages
- 278 Online Help
- 279 Exiting Novell Security Manager
- 280 Glossary
- 285 Index