HPE ProCurve Identity Driven Manager (v. 3.0) - licens - 1000 brugere

Producent: Hewlett-Packard
Produkt nr: J9440A
EAN: 0884420457626
Varenummer: F2903409
billigst-pricerunner
Producent: Hewlett-Packard
Produkt nr: J9440A
EAN: 0884420457626
Varenummer: F2903409

Varen kan pt. ikke skaffes eller er udgået. Kontakt evt. kundeservice for et alternativ


Billigste fragt 0,00 kr.

Gratis fragt

(Gælder op til 20 kg)

Læs mere her
Varen kan pt. ikke skaffes eller er udgået.
Kontakt evt. kundeservice for et alternativ.}
Producent: Hewlett-Packard
Produkt nr: J9440A
EAN: 0884420457626
Varenummer: F2903409

Varen kan pt. ikke skaffes eller er udgået. Kontakt evt. kundeservice for et alternativ


Billigste fragt 0,00 kr.

Gratis fragt

(Gælder op til 20 kg)

Læs mere her
Produktbeskrivelse HPE ProCurve Identity Driven Manager (v. 3.0) - licens - 1000 brugere
Produkttype Licens
Kategori Netværksprogrammer - system- og fjernadministration
Version 3.0
Antal licenser 1000 brugere
Platform Windows
Designet for HPE Aruba 2920-24G, 2920-24G-PoE+, 2920-48G, 2920-48G-PoE+

Produktdatablad

Kategori Netværksprogrammer - system- og fjernadministration
Produkttype Licens
Version 3.0
Platform Windows
Antal licenser 1000 brugere
Yderligere krav ProCurve Manager 1.6
Designet for HPE Aruba 2920-24G, 2920-24G-PoE+, 2920-48G, 2920-48G-PoE+

  • Graphical user interface (GUI)
    Identity Driven Manager provides a powerful GUI for defining network access policies and monitoring users on the network. Administrators can quickly see which users are currently on the network and easily drill down to know where and when they connected.
  • Auto-discovery of identity elements
    RADIUS servers with IDM agents, RADIUS realms, and users are automatically discovered and assigned to a default policy group for the administrator's attention.
  • Detailed reporting
    Identity Driven Manager provides reports of network access that can be automated to run at specified times or created on demand. Reports are useful for documenting network access by users and groups, as well as for investigating failed network access attempts in order to identify potential network attacks.
  • Integrates with Microsoft Network Access Protection
    Identity Driven Manager cooperates with Microsoft Network Access Protection (NAP) in order to integrate the HP Adaptive Network capabilities with endpoint validation from Microsoft NAP.
  • Integration with Active Directory
    Identity Driven Manager integrates with Active Directory to automatically map Active Directory group membership to Identity Driven Manager Access Policy Groups. Changes within Active Directory are automatically propagated to Identity Driven Manager and the network access rights are enforced.
  • Import users from LDAP or XML file
    If current user data is not kept in Active Directory, Identity Driven Manager can read users and group membership from an LDAP directory or XML-formatted file.
  • Works with industry-standard RADIUS protocol
    Access policies are enforced based on RADIUS authentication, and Identity Driven Manager integrates with leading RADIUS authentication servers.
  • Dynamic access rules based on time, location, and user system are formed by administrators and dynamically applied
    Access-policy groups have rules that are applied to each user in the group based on the time, location, and user system. These dynamic inputs are evaluated and the policies applied according to the user's profile, so the appropriate network access policies are applied at the right time and place.
  • Automatic VLAN assignment
    Users can be automatically assigned to the appropriate VLAN based on their identity, device, device status, location, and time of day.
  • Endpoint integrity verification
    When used with an endpoint integrity solution such as the HP Network Access Controller 800 or Microsoft Network Access Protection (NAP), access policies can be set based on the posture of the endpoint connecting to the network, allowing non-compliant endpoints to be isolated until they comply with organization policies.
  • User-based access control lists (ACLs)
    Users can be allowed or denied access to network resources (e.g., servers, printers) based on the destination IP address or a range of IP addresses, and/or to network services (e.g., Web pages, instant messaging, or FTP) based on well-known or user-defined TCP/UDP ports.
  • Traffic prioritization
    Traffic prioritization (QoS) can be automatically set for each connection based on user, device, location, and time of day, allowing appropriate prioritization of network traffic.
  • Rate limits
    Rate limits can be automatically applied to a session in order to limit the impact of lower-priority connections and reserve bandwidth for important business use.
  • Identity Driven Manager updates the server with transactional resilience
    The Identity Driven Manager agent uses a transaction process to update Identity Driven Manager server data. If the connection from the agent on the RADIUS server to the Identity Driven Manager server is broken, the agent will queue the data until the connection is restored and then transmit the data, as appropriate, back to the Identity Driven Manager database.