Hitachi

JP1 Version 12 JP1/IT Desktop Management 2 Configuration Guide


2.6.1 Overview of building a network monitoring configuration system

To build a network monitoring configuration system, you first need to build a minimal configuration system. You can then enable network access control in each network segment.

  1. Build the minimal configuration system.

  2. In the operation window, run IP discovery to discover all devices in the organization.

  3. In the network filter list, make sure the setting for whether to permit network access is correct.

    Tip

    If a device for which you want to reject access is found, set network access for the device to deny.

  4. In the operation window, enable network access control for each network segment.

    In the dialog box that opens, select the network access control setting for permitting connection to the network.

Building of the network monitoring configuration system is complete.

Note that a system built by using this procedure can detect new devices that have connected to a network, but the devices cannot be disconnected automatically. If you want to disconnect newly connected devices, use the following setting after you have completed building the system.

Automatically blocking connection of devices that are newly connected to a network

Apply the network access control setting you specified to the desired network segment so that discovered devices will not be able to connect to the network. For details, see the description of general procedure for denying network access for unregistered devices in the manual JP1/IT Desktop Management 2 Administration Guide.

Tip

You can automatically block network connection of a device that has a security problem. To do so, use the network connection control setting that is listed as an action item in the security policy to control the network connection based on a security status judgment.

Important

On agents for UNIX or Mac, a network monitor is not enabled. In addition, with agents for UNIX, automatic control of network connections based on the security policy is not used. However, you can manually permit or block network connections. With agents for Mac, network connections can be automatically enabled or disabled based on a security status judgment.

Related Topics: