Job Management Partner 1/Client Security Control Description, User's Guide and Operator's Guide

[Contents][Glossary][Index][Back][Next]


14.1.6 Registering permitted PCs

To add new clients to the network after starting operations with your quarantine system, you must register the MAC addresses in JP1/NM using the function for registering permitted PCs.

To register MAC addresses in JP1/NM, first create a permitted-PC list file containing the client MAC addresses. Then, register the file in the Register Permitted PCs window of the Client Security Control window in AIM.

Note
To add a device such as a router, printer, or Solaris machine to the network, from the Integrated Management window of JP1/NM - Manager, add the IP address or MAC address as a Fixed device. If an administrator mistakenly denies a network connection from the PC List window for a device registered from the Integrated Management window of JP1/NM - Manager, the status of the device appears as Refuse in the PC List window, but the actual network connection is still permitted.
Organization of this subsection
(1) Transitions of windows used to register permitted PCs
(2) Creating a permitted-PC list file
(3) Registering permitted PCs

(1) Transitions of windows used to register permitted PCs

The following figure shows the transitions of windows used to register permitted PCs.

Figure 14-9 Transitions of windows used to register permitted PCs

[Figure]

To open the initial window of AIM, log in to AIM as a user with the CSC administrator role. For details about opening the initial window of AIM, see 8.1 Transitions of windows used for client monitoring.

(2) Creating a permitted-PC list file

A permitted-PC list file contains the MAC addresses of new clients and the added LAN boards for which network connections are to be permitted.

The following table shows the format of the permitted-PC list file.

Table 14-2 Format of permitted-PC list file

No. Item Description
1 MAC address# Write the MAC address of the new client or added LAN board.
Write one MAC address per line, represented by a 12-digit hexadecimal number. One of the following delimiters can be used every second digit:
  • Hyphen (-)
  • Colon (:)
  • Space
2 Comment Lines beginning with a hash symbol (#) are treated as comments. The hash symbol cannot be used except at the start of a line.

#
In the permitted-PC list file, do not specify the MAC addresses of clients and LAN boards already subjected to security management. If the MAC addresses of such clients and LAN boards are registered in JP1/NM, keep in mind that their network connections are permitted even when their status is displayed as Refuse in the PC List window.

Note
  • Make sure that there are no spaces or tabs before or after MAC addresses in the permitted-PC list file.
  • Include a line feed in the last line of the permitted-PC list file.

The following figure shows an example of the permitted-PC list file.

Figure 14-10 Example of permitted-PC list file

[Figure]

(3) Registering permitted PCs

Clients whose network connections are to be permitted are registered in JP1/NM from the Register Permitted PCs window.

To register a client whose network connections are to be permitted in JP1/NM:

  1. From the job menu in the initial window of AIM, choose Client Security Management and then Register Permitted PCs.
    The Register Permitted PCs window appears.

    Figure 14-11 Register Permitted PCs window

    [Figure]

  2. Enter the name of the permitted-PC list file.
    In Permitted-PC list file, enter the full path of the permitted-PC list file. Alternatively, click the Browse button to display a window where you can select the file.
    The following figure shows the window where you can select the permitted-PC list file.

    [Figure]

  3. In the Register Permitted PCs window, click the OK button.
    A message box appears asking you to confirm whether to allow the clients in the permitted-PC list file to connect to the network.
  4. Click the OK button.
    The clients in the permitted-PC list file are connected to the network, and the Action Message dialog box appears. If an error message is displayed, see 17.4.3 Messages in the Register Permitted PCs window and act accordingly.
  5. Click the Close button.
    The Action Message dialog box closes.

[Contents][Back][Next]


[Trademarks]

All Rights Reserved. Copyright (C) 2009, 2011, Hitachi, Ltd.
Copyright, patent, trademark, and other intellectual property rights related to the "TMEng.dll" file are owned exclusively by Trend Micro Incorporated