This will affect following two products in our environment.
a. IC4500
- Juniper UAC Appliance IC4500 Step by Step Configuration (Part 1)
- Juniper UAC Appliance IC4500 Step by Step Configuration (Part 2)Â - Certificates based Authentication
- Pulse Secure (formerly Juniper Pulse) - UAC Configuration Summary
b. MAG6611
As a many years UAC/MAG solutions customer, there are some significant support change we have to be aware of from their transition website:
Pulse Secure is currently operating under a Transition Services Agreement (TSA) with Juniper Networks that will end on July 31, 2015. All support requests should go through Pulse Secure as of August 1, 2015. If you contact Juniper Networks after that date, you will be redirected to Pulse Secure support.
This includes support for already deployed products, products purchased during the transition period, and products purchased from Pulse Secure after the TSA ends. If a customer has purchased any support contract prior to July 31 through Juniper Networks and its partner network—or through Pulse Secure and its partner network—Pulse Secure will honor these terms throughout the life of the contract.
In order to keep records for some of my daily work, this post summarizes a few basic configuration steps relating to UAC4500. More posts posted before in this blog:
- Juniper UAC Appliance IC4500 Step by Step Configuration (Part 1)
- Juniper UAC Appliance IC4500 Step by Step Configuration (Part 2)Â - Certificates based Authentication
- Pulse Secure (formerly Juniper Pulse) - UAC Configuration Summary
1. Upgrade
Find out the latest recommend version from Juniper website. Right now it is 5.2R1.0.
There are two options. One is from local file, another is from staged package. Either one should work as soon as you have downloaded correctly.Â
2. Create a new role Test1 for new testing users
Most configuration are done through wizard and you should be able to use default settings.Â
 Pulse Secure logo has been planted into the system if you come into UI options. It was Juniper Networks logo before on 5.0 version.3. Create a new realms Test1
After created roles, you will need to create Realms to hold those roles/resources. Usually roles will associate with resources. The configuration for resources will be done at step 4.
3.1 AutheticationChoose proper authentication method from Administrators, Cert_Auth, Guest Authentication and System_Local. This will decide how you want to authenticate your users in your realm. The popular option will be local, ldap, radius, AD and certificate.
3.2 Rool Mapping
In this screenshot, it shows we are using certs as our authentication and it will verify if the certs has altName.UPNuid attribute. If UAC found this attribute match, it will assign a role Test1 created in step 2.
4. Create Resources for Test1 Role
This page will associate your network resources with your role defined at step1. In this example, one RDP and icmp resources have been configured for role Test1. One resource can belongs multiple roles.5. Choose proper Authentication Realm on Signing In page
Signing In page is for the user. You can have multiple signing in pages for different user groups based on your company needs.In this rdp page, there are two realms assigned on. rdp and Test1. It will allow the role mapping users in Realm Test1 to log in on this page and use the resources defined on step 4.
After above 5 steps, your users created in Realm 'Test1' will be able to log into Signing In page 'rdp'. After logged in, they will be assigned int role 'Test1' and have RDP access and ICMP access to the server 10.9.2.9.
References:
a. Juniper UAC Appliance IC4500 Step by Step Configuration (Part 1)b. Juniper UAC Appliance IC4500 Step by Step Configuration (Part 2)
No comments:
Post a Comment