Easy NAC CGX Access Guide-V3.0 210519
Easy NAC CGX Access Guide-V3.0 210519
Easy NAC, CGX Access, and vLinks are trademarks of InfoExpress, Inc. Other product and service
names are trademarks and service marks of their respective owners.
www.infoexpress.com
www.easynac.com
V3.0.210519
1
Easy NAC: CGX Access Guide
Contents
Overview....................................................................................................................................................................... 7
Appliance Licensing Options ............................................................................................................................... 9
Appliance Specifications...................................................................................................................................... 9
VM installation ........................................................................................................................................................... 10
Installing on ESX or ESXi server ........................................................................................................................... 10
Installing on Hyper-V server .................................................................................................................................. 11
Configuring CGX Access ........................................................................................................................................... 14
Appliance Placement .............................................................................................................................................. 14
Initial configuration ................................................................................................................................................ 14
Basic IP configuration ........................................................................................................................................ 14
Captive Portal IP Address .................................................................................................................................. 16
Remediation Portal IP Address .......................................................................................................................... 16
Connecting to Active Directory ......................................................................................................................... 16
AD Integration ................................................................................................................................................... 18
Configuring Email and SMS Servers ................................................................................................................. 19
Protecting Additional Subnets ................................................................................................................................ 21
Adding Network Adapters ................................................................................................................................. 21
Using 802.1q trunk ports .................................................................................................................................... 22
Additional 802.1q configuration in VMware ESX / ESXi................................................................................. 23
Additional 802.1q configuration in Hyper-V server .......................................................................................... 25
Enforcement Overview........................................................................................................................................... 30
Configuring Access Policies................................................................................................................................... 31
Automated Device Classification Policies ......................................................................................................... 31
Access Group (ACLs) ........................................................................................................................................ 34
ACL Examples ................................................................................................................................................... 35
ACL Syntax........................................................................................................................................................ 36
Flagging Devices and Whitelisting ........................................................................................................................ 38
Flags ................................................................................................................................................................... 38
Whitelisting \ Blacklisting ................................................................................................................................. 40
The Excludelist .................................................................................................................................................. 42
Anti-spoofing Protection ........................................................................................................................................ 43
Setting Fingerprints ............................................................................................................................................ 43
MAC Spoofing Detection .................................................................................................................................. 44
Rogue DHCP Server Detection.......................................................................................................................... 45
Time \ Location \ List Policies ............................................................................................................................... 47
Location Policy .................................................................................................................................................. 47
Time Policy ........................................................................................................................................................ 48
2
Easy NAC: CGX Access Guide
Device-Lists Policy ............................................................................................................................................ 49
Configuring Guest Access .......................................................................................................................................... 51
Customize Captive Portal ....................................................................................................................................... 51
Customize Guest Portal .......................................................................................................................................... 51
Guest Registration Templates................................................................................................................................. 55
Customizing Device Registration Templates for Guests ........................................................................................ 55
Setting up Sponsors ................................................................................................................................................ 59
Sponsoring Users .................................................................................................................................................... 60
Configuring Device Registration ................................................................................................................................ 61
Customizing the Device Registration portal........................................................................................................... 61
Confirm Active Directory settings ......................................................................................................................... 61
Customizing Device Registration Methods ............................................................................................................ 63
User Experience ..................................................................................................................................................... 65
Integration: Anti-Virus \ Endpoint Management ........................................................................................................ 66
Bitdefender Integration........................................................................................................................................... 67
Carbon Black Cb Response Integration ................................................................................................................. 70
CrowdStrike Integration ......................................................................................................................................... 73
ESET Antivirus Integration .................................................................................................................................... 75
IBM BigFix Integration .......................................................................................................................................... 77
Ivanti Security Controls.......................................................................................................................................... 79
Kaseya VSA Integration ......................................................................................................................................... 81
Kaspersky Antivirus Integration............................................................................................................................. 83
ManageEngine Desktop Central Integration .......................................................................................................... 85
ManageEngine Patch Manager Integration ............................................................................................................ 87
McAfee ePolicy Orchestrator Integration............................................................................................................... 89
Microsoft Intune Integration................................................................................................................................... 91
Microsoft SCCM \ WSUS Integration ................................................................................................................... 97
Microsoft Windows Management Instrumentation (WMI) .................................................................................... 99
Moscii StarCat Integration ................................................................................................................................... 102
Sophos Integration ................................................................................................................................................ 104
Symantec Endpoint Protection Manager - 14.x .................................................................................................... 107
Trend Micro OfficeScan Integration .................................................................................................................... 110
Orchestration with Syslog......................................................................................................................................... 113
Syslog Event Creation .......................................................................................................................................... 114
Orchestration - Email Alerts ..................................................................................................................................... 116
Email Event Creation ........................................................................................................................................... 117
Automated Threat Response - Zero-Day Behavioral Detection ............................................................................... 119
Policy-Based Response ........................................................................................................................................ 120
3
Easy NAC: CGX Access Guide
Clearing Zero-day Events ..................................................................................................................................... 120
Handling Exceptions ............................................................................................................................................ 121
Agent Support ........................................................................................................................................................... 122
Working with Agents ........................................................................................................................................... 123
Hosting Agents ..................................................................................................................................................... 124
Installing Agents................................................................................................................................................... 125
On-demand Agents (Recommended for Consultants) .......................................................................................... 126
Agent Compliance Policies .................................................................................................................................. 127
Policy Manager..................................................................................................................................................... 127
Policies ................................................................................................................................................................. 128
Policies Best Practices ..................................................................................................................................... 129
Requirements to Pass a Policy .............................................................................................................................. 129
Requirements Priority ...................................................................................................................................... 130
Requirement Best Practices.............................................................................................................................. 131
Remediation.......................................................................................................................................................... 131
Pop-up Messages.............................................................................................................................................. 132
Remediation Actions ........................................................................................................................................ 132
Auto-remediation ............................................................................................................................................. 133
Remediation Best Practices .............................................................................................................................. 133
Troubleshooting Agents ....................................................................................................................................... 134
Installation Issues ............................................................................................................................................. 134
Connection Issues ............................................................................................................................................ 135
Advanced Configuration Options ............................................................................................................................. 138
Administration Permissions.................................................................................................................................. 138
Configuring Radius for CGX Admin Login or BYOD Authentication ............................................................... 140
Radius Server Configuration ............................................................................................................................ 140
CGX-Access Configuration ............................................................................................................................. 140
Customizing Landing Pages ................................................................................................................................. 142
High Availability ...................................................................................................................................................... 144
Requirements ........................................................................................................................................................ 144
Configuration – Standalone Appliances ............................................................................................................... 145
Configure the Primary unit............................................................................................................................... 145
Configure the Backup unit ............................................................................................................................... 146
Configuration – Centrally Managed Appliances .................................................................................................. 148
Configure the CVM to be an Arbiter (optional)............................................................................................... 148
Configure the Primary unit............................................................................................................................... 149
Configure the Backup unit ............................................................................................................................... 151
Making HA Configuration Changes ..................................................................................................................... 153
4
Easy NAC: CGX Access Guide
Replace a Primary ............................................................................................................................................ 153
Replace a Backup ............................................................................................................................................. 153
Restore from a Backup Image .......................................................................................................................... 153
Upgrade to a New Version ............................................................................................................................... 153
Other Reconfiguration Changes ....................................................................................................................... 153
Central Visibility Manager ....................................................................................................................................... 154
CVM Overview .................................................................................................................................................... 154
Required Ports ...................................................................................................................................................... 154
Configuring a Central Visibility Manager ............................................................................................................ 155
Configuring an Appliance to be Centrally Managed ............................................................................................ 158
Deployment Manager ........................................................................................................................................... 159
Software Updates ............................................................................................................................................. 160
Central Visibility Manager – Device Roaming .................................................................................................... 161
Central Visibility Manager – Integration Proxy ................................................................................................... 163
Maintenance and Support ......................................................................................................................................... 165
Upgrading firmware ............................................................................................................................................. 165
Collecting Logs (Dump2) ..................................................................................................................................... 166
Appendix A – Facebook Login App Setup ............................................................................................................... 169
Appendix B – Certificate Management .................................................................................................................... 177
Option 1 - Generate Certificate Signing Request (CSR) to obtain a certificate from your CA............................ 177
Option 2 - Upload certificate and private key to CGX Access. (When CSR is not generated) ............................ 181
Appendix C – vLinks Deployment ........................................................................................................................... 184
vLinks Overview .................................................................................................................................................. 184
vLinks Central Setup ............................................................................................................................................ 185
vLinks Remote Setup ........................................................................................................................................... 190
Appendix D – Inline Enforcement ............................................................................................................................ 196
Inline Enforcement Overview .............................................................................................................................. 196
Features ................................................................................................................................................................ 196
Requirements ........................................................................................................................................................ 196
Sample Test Network ........................................................................................................................................... 197
Configuration........................................................................................................................................................ 197
Location ................................................................................................................................................................ 198
Network Interfaces ............................................................................................................................................... 198
Bridge IP............................................................................................................................................................... 199
Access Control List .............................................................................................................................................. 199
Enforcement Ranges............................................................................................................................................. 201
Agent Requirement............................................................................................................................................... 202
5
Easy NAC: CGX Access Guide
Disclaimer
The information in this document is subject to change without notice. The statements, configurations,
technical data and recommendations in this document are believed to be accurate and reliable but are
represented without express or implied warranty. Users must take full responsibility for their applications
of any products specified in this document.
This document is provided for your use to help understand the behavior of the product.
Although the information is believed to be substantially accurate at the time that it was written, this
document doesn’t imply that specific features or functionality are present in your version of the product.
InfoExpress Inc. makes no express or implied warranties regarding the product’s features or behavior as
described herein. For product specifications, please refer to the product documentation included with
product installation.
The software described in this document is furnished under a license agreement and may be used only in
accordance with the terms of that license.
Products that are referred to in this document may be either trademarks and/or registered trademarks of
the respective owners.
6
Easy NAC: CGX Access Guide
Easy NAC Solution
Overview
The Easy NAC solution with CGX Access appliances provides the following features:
Agentless Visibility
CGX Access lets you see devices that join your network, without the use of agents. Visibility is
immediate, with any untrusted device being immediately restricted, as desired. Devices will be both
passively and actively profiled to determine operating system, manufacturer, and type of device.
Anti-Spoofing Protection
CGX Access provides a fingerprint feature to protect against MAC address spoofing. All devices on the
network are profiled for their MAC address, IP, Operating System, and Hostname. This information can
then be used to set a unique fingerprint for each device. Once a fingerprint has been set, the device(s) will
be protected from spoofing.
7
Easy NAC: CGX Access Guide
Orchestration
Security appliances that are designed to monitor devices and network traffic can send event-based alerts
for administrative action. CGX Access can receive e-mail alerts or event-based syslog messages from
Firewalls, APT, IPS, SIEM, and many other types of security devices and then take immediate action
when necessary. If CGX Access receives an alert that a device has malware, we can restrict it
immediately.
BYOD Registration
CGX Access provides a self-registration portal to automate the BYOD registration process. Policies can
be set, by groups, to limit the number and type of BYOD devices. It improves security by tracking device
ownership, restricting the locations, and limiting network access to approved resources.
Guest Access
CGX Access lets sponsors register guest accounts or authorize guests to create their own accounts via the
landing page. Sponsors can authorize individual registrations or register groups for classes or meetings
with configurable expiration times.
8
Easy NAC: CGX Access Guide
Role-based Access Control
CGX Access enhances security by limiting devices to only the resources required. Guests are limited to
internet only access. BYOD and consultant devices can be limited to specific resources.
CGX Access is available as a physical appliance or as a virtual appliance. Licensing is based on the
number of devices that CGX Access solution has visibility of. When using the Central Visibility
Manager, a distributed license option will enable a license to be shared between multiple appliances.
Please contact your authorized partner or InfoExpress for up-to-date information on licensing.
sales@infoexpress.com
Appliance Specifications
Appliance Access Mini Access 100 Access 500 Access VM Access VM Access VM
Specifications CGXA-S10 CGXA-S100 CGXA-S500 CGXA-VM10 CGXA-VM100 CGXA-VM500
Scalability
Maximum 300* 2500* 10,000* 300* 2,500* 10,000*
Devices
Maximum 10 100 200* 10 100 200*
Subnets
Number of Ports 4 6 8 8-10 virtual 8-10 virtual 8-10 virtual
adapters adapters adapters
* Capacity is approximate and depends on VLANs protected, endpoints, and features enabled.
9
Easy NAC: CGX Access Guide
VM installation
Installing on ESX or ESXi server
The virtual CGX Access appliance can be deployed as an .ovf template native to VMWare. You will need
the CGX Access .ovf image, which is usually provided as a zip file. Please contact InfoExpress or your
business partner to obtain this file.
• Unzip the provided file to a location accessible to the vSphere client application.
• In the VMWare vSphere Client, choose File - Deploy OVF Template
• On the first screen, select the .ovf file
• Click next on the OVF Template Details screen. (There may be a warning screen here, but you can
proceed).
• Provide a name and optionally a location for the template and click 'Next'
• Select the datastore where the virtual machine files should be kept and click 'Next'
• Select the desired format for your installation and click 'Next'
• Select the desired network mapping for the interfaces and click 'Next'
• Verify the options and click 'Finish' when ready to proceed
• The vSphere client will then proceed to deploy the image.
10
Easy NAC: CGX Access Guide
Installing on Hyper-V server
The virtual CGX Access appliance can be deployed using Hyper-V Manager, Windows Server 2012 R2
and above only. The CGX Access Hyper-V image is usually provided as a zip file. Please contact
InfoExpress or your business partner to obtain this file.
11
Easy NAC: CGX Access Guide
• Select the Virtual Hard Disk destination folder in the next screen.
• Verify the options on Summary page and click 'Finish' when ready to proceed.
• The Wizard will then proceed to deploy the image.
• The Virtual Machine will be listed in Hyper-V Manager.
• Select the virtual machine ‘CGX-Access-3.0’ and click ‘Settings’ from ‘Action’ menu.
12
Easy NAC: CGX Access Guide
• Select the Network Adapter and assign a Virtual switch from the right-side drop-down box as
highlighted below and Apply the setting.
13
Easy NAC: CGX Access Guide
Configuring CGX Access
This section will walk the administrator through the steps needed to configure a CGX Access appliance.
Appliance Placement
CGX Access provides protection \ access control on the subnets it is attached to with layer-2 visibility.
The CGX Access appliance can protects up to 200 VLANs concurrently with the use of 802.1q trunk
ports. The Managed IP interface is the primary interface and is used for appliance management. The
CGX Access appliance should be able to communicate with the AD server via the Managed IP.
For simple one subnet deployments or testing, the Managed IP should therefore be on a subnet you wish
to enforce access control on. To support multiple VLANs, additional network interfaces or trunk ports
can be used.
Initial configuration
CGX Access typically requires three static IP addresses in a deployment. One IP is used for management
of CGX Access appliance. The second IP is used for the captive portal (landing page), and a third IP is
used for a remediation portal. When protecting additional VLANs, each additional subnet protected will
also require one IP on its respective subnet. For example, when protecting ten subnets, a total of twelve
IPs will be used. These additional IP’s can be dynamically assigned by DHCP.
Note: The CGX Access appliance provides built-in ARP-based enforcement. Enforcement can be enabled
on up-to 200 VLANs, including the subnet with the Managed IP.
Basic IP configuration
• For physical appliances, use a direct connect ethernet cable for SSH access to the default IP
Address 10.0.0.250/24. Alternatively, plug-in a keyboard and HDMI monitor.
14
Easy NAC: CGX Access Guide
• For virtual appliances, open a console window and power on the VM.
Once the boot cycle is complete you will be prompted for a login.
• Login as admin/admin.
• From the main menu choose 1 (Run setup wizard) and follow the prompts to set the Managed IP
address and netmask, the default gateway, DNS servers, system name, time zone and date/time.
Note: Keep the admin password in a safe place. If it is lost without having access to an alternate admin
level account, there will be no way to recover the password.
• admin - used for initial setup and configuration as well as SSH access for maintenance tasks
• cguser - used for uploading files through ftp
Note: The default passwords are the same as the username. These default passwords should be changed.
When the setup wizard completes, the system should be accessible on the network.
• Confirm that you can ping the management IP from another system on the same subnet and also
from a system on another subnet. If the pings fail double check the physical or virtual connections
and the basic IP configuration
• Connect to the CGX Access web GUI by opening https://<Managed ip> (that was configured
previously). Compatible browsers include:
o Microsoft Edge
o Firefox v65 or higher
o Chrome Version 89 or higher
o Safari v12 or higher
15
Easy NAC: CGX Access Guide
• Login as user admin (default password admin). A modern browser such as Chrome is strongly
recommended. Older versions of IE or Firefox may not display the pages correctly.
A separate IP address will be used for the Captive Portal \ Landing pages. When configured, new devices
joining the network can be redirected to this page, using the default "DNSREDIRECT(CaptivePortal)"
rule in the default “Restricted” Access Group (ACL). To configure this Captive Portal IP address…
An additional static IP can be assigned to an optional Remediation Portal. When Configured, the non-
compliant endpoints can be redirected to this page, so they are aware their device is restricted and know
the reason why.
Authentication credentials are often stored in an Active Directory server. Active Directory can be used to
validate credentials with the following CGX Access features:
• Employee Device Registration (see Configuring Device Registration)
• Sponsoring Guest accounts (see Configuring Guest Access)
16
Easy NAC: CGX Access Guide
• Permissions for administrators to access the management GUI (see Advance
Configuration)
• Under "Active Directory Server", enter the host or IP address of the AD domain controller and the
Account suffix in the "Account Suffix" field. A Username and Password is often required.
17
Easy NAC: CGX Access Guide
AD Integration
Tip: For faster deployments, AD integration can be enabled. When enabled, devices joined to the domain
will be flagged as AD-managed, and automatically granted full access to the network.
Note: In some cases, AD computer objects may be stored in a non-default OU. In these cases, it may be
necessary to adjust the OUs that need to be queried. Custom OUs can be specified in the Active Directory
Server section under Configuration → General Settings
For Example, an Active Directory of domain CGX.ACCESS has an OU called “USA” and computer
accounts for the OU is stored under “Computers”. The custom OU query should look like
CN=Computers, CN=USA
18
Easy NAC: CGX Access Guide
Tip: It may be easier to set the Query to cover the Entire Directory.
CGX Access can send notification emails and SMS messages when certain events occur. These event
triggers are configured with Automated Device Classifications, Monitoring rules, or with guest
registration.
19
Easy NAC: CGX Access Guide
• Enter the needed information and click 'Save'.
• The Inbound Mail Server is for use with Orchestration integrations with E-mail
• Enter an email address used as sender address and optionally one or more addresses that will be
Bcc’d on guest registration emails
• Go to Configuration → General Settings and click on the “Contact Information for Notifications”
section.
• Fill in the info for at least one administrative contact that should get notified when triggering
conditions occur
Notifications can be configured and triggered using Automated Device Classification policies, Monitoring
policies, or Device Profiling policies. Different actions are available when a condition is detected:
20
Easy NAC: CGX Access Guide
Protecting Additional Subnets
With the use of ARP enforcement, CGX Access requires layer-2 visibility of ARP broadcast traffic to
detect and restrict devices. There are two methods that can be used to extend visibility to multiple subnets.
• Method 1 – Physical connection: Add additional network adapter and plug-in to a normal switch
access port to extend protection to additional subnet. The physical appliances support up-to 6
adapters and the virtual appliance can support up to 10 adapters. Hyper-V supports 8 adapters.
• Method 2 – 802.1q trunk: Use 802.1q trunk ports so multiple VLANs can be protected with just
one or more adapters. With the use of trunk ports up to 200 VLANs can be protected. Multiple
adapters are recommended if there is extensive traffic from devices being restricted with ACLs.
o Virtual CGX Access appliances also supports 802.1q. Please note that additional
configuration in the ESX/ESXi or Hyper-V server would be required.
If using VMware, the virtual appliance is pre-configured with 10 virtual adapters. To configure adapters
inside the virtual appliance, go to:
• Complete IP address information if a static IP address will be used. DHCP can also be used.
• Metric field can be left blank (typically not required)
• Location is optional, and can be used in policies
21
Easy NAC: CGX Access Guide
Note: When adding adapters to the CGX Access virtual appliance, the adapter must first be provisioned
within the VMware host and then connected to the virtual appliance.
If the network is configured to support VLAN tagging, then adding additional VLANs is simple.
Note: One or more adapters connected to the CGX Access appliance must be attached to a switch port(s)
configured as a trunk port.
• Complete VLAN ID and static IP address information, if necessary. DHCP can be used.
22
Easy NAC: CGX Access Guide
• To confirm the network changes, click the Submit button…
Note: One or more adapters connected to the CGX Access appliance must be attached to a switch
port(s) configured as a trunk port.
In order for CGX Access virtual appliances to support the 802.1q, a port group that supports
802.1q VLAN tagging is needed. To configure it in your VMware virtual switch in ESX/ESXi,
please follows the steps below:
7. Assign the CGX-Access virtual appliance to use the Trunk Port created as in follows:
23
Easy NAC: CGX Access Guide
The physical network adapter would be required to connect to the trunk port on the physical
networking switch.
If your environment is using “Vmware Distributed switch”, you can add a “Distributed Port
group” specifying a VLAN range (or complete VLAN range 0-4094). Assign this port group to
the CGX-Access trunk port.
24
Easy NAC: CGX Access Guide
Additional 802.1q configuration in Hyper-V server
For CGX Access virtual appliances to support the 802.1q, Hyper-V’s network adapters should be
configured to tag frames. To enable trunking, some commands need to be entered from Windows
PowerShell. The following screenshots show pre-requisite configuration.
• Select VM CGX-Access-3.0 (or vmname) and from right hand pane, click on settings. Assign
virtual switch to the network adapter on CGX Access.
25
Easy NAC: CGX Access Guide
• Start Windows PowerShell and enter following command to configure “Network Adapter 1” as
trunk port with allowed vlans 0,2,3,5,100 and Native Vlan as 0 (1 on cisco)
26
Easy NAC: CGX Access Guide
Configuration required on Switch port. (cisco switch configuration used in example)
In this example, we will allow vlans 2,3,5,100 with native vlan 1 (Cisco vlan1 = HyperV-vlan0)
Switch#configure terminal
Switch(config)#interface fastEthernet 0/3
Switch(config-if)#switchport trunk encapsulation dot1q
Switch(config-if)#switchport mode trunk
Switch(config-if)#switchport trunk allowed vlan 2,3,5,100
Switch(config-if)#switchport trunk native vlan 2 [in case you want a native vlan other than 1]
Switch(config-if)#exit
27
Easy NAC: CGX Access Guide
• Complete VLAN ID and IP address information. Static IP addresses or DHCP can be used.
• Repeat above step for adding more VLANs then click on submit
28
Easy NAC: CGX Access Guide
• If DHCP is configured, you should see IP address assignments to VLAN NICs
29
Easy NAC: CGX Access Guide
Enforcement Overview
CGX Access uses ARP enforcement to restrict access with landing page redirection. The use of ARP
enforcement greatly simplifies the deployment of CGX Access, as no network changes are required. ARP
enforcement is also used to provide role-based control. To provide role-based control, CGX Access
supports Access Groups, such as: restricted, limited, full-access, guest-access, consultant, and byod-
access, etc. Each access group will have a configurable ACL to allow for the role-base control to be
customized.
By default, subnets are placed in monitoring mode. It is recommended that the basic setup be completed,
ACLs fine-tuned, integrations enabled, and white listing of devices be performed before enabling
enforcement. When one or more subnets are in monitoring mode a status message is clearly visible across
the top of the management console.
When ready, enforcement can be enabled in the Network Map. Enforcement can be delayed a few minutes
when first enabled.
For CGX Access to function properly, it needs to know the MAC/IP of routers/gateways on the
subnet. In case VRRP or HSRP is used, it is required that router's virtual and actual MAC addresses
be configured in the "routerlist" under subnet configuration in "Network Map".
30
Easy NAC: CGX Access Guide
Configuring Access Policies
CGX Access includes default Access Groups. Customized Access Groups can also be configured. The
defaults are:
Each access group has a customizable ACL associated with it. Every device joining a protected subnet
will be assigned an access group. Restricted access is the default for new and untrusted devices.
Access Groups are assigned in a two-step process where conditions are first evaluated in the Automated
Device Classification policy so a role can be assigned. Second, roles are then assigned one of access
groups, depending on time and location.
CGX Access has a set of preconfigured device classification rules which will address typical
requirements but can be modified to suit unique needs.
31
Easy NAC: CGX Access Guide
The classification rules are evaluated top-down. The device role is assigned by the first rule with all
matching conditions.
Rules can be arranged in the desired order by dragging rules up or down in the list as required. If a device
does not match all the conditions in any rule, then the device will be assigned the Untrusted Role which is
restricted by default.
Individual rules can be enabled or disabled with a click of a button. Disabled rules will not be evaluated.
If changes are made, click the “Activate” button for the changes to take effect.
CGX Access has a set of preconfigured Roles & Access policies which will address typical customer
requirements but can be modified as necessary.
32
Easy NAC: CGX Access Guide
In the default Roles & Access policies above, notice how both restricted role and untrusted role would be
assigned the restricted access group. For management and reporting purposes, it can sometimes be
helpful to setup multiple roles even if these different roles get the same access group.
It is also possible to set time and locations when access groups would be assigned. One example of how
this would be helpful is with guest access. It is possible to configure the guest role to only be assigned
during office hours and from approved locations. Time and locations must be first be defined to use this
feature. To define time and locations go to Policies → Time/Location/List
If changes are made, click the “Activate” button for the changes to take effect.
33
Easy NAC: CGX Access Guide
Access Group (ACLs)
Each of the access groups has a customizable ACL that is associated with it.
To make changes to any of the ACLs, click on the access group you would like to change, and edit the
ACL in the dialog box.
The above restricted ACL allows DHCP traffic and NAC agent traffic on TCP port 11698. It will
automatically redirect DNS traffic to the CGX Access landing page. All other traffic is denied.
34
Easy NAC: CGX Access Guide
ACL Examples
8) HTTPREDIRECT(CaptivePortal)
The above is a special truncated syntax for HTTPREDIRECT rule which supports CGX landing pages
automatically. This redirection URL will automatically use the CGX Access Captive Portal IP.
8) DNSREDIRECT(CaptivePortal)
The above is a special truncated syntax for DNSREDIRECT rule which supports CGX landing pages
automatically. DNS-reply packets be modified to automatically use the CGX Access Captive Portal IP.
9) ALLOWSITE("facebook.com")
This command allows both DNS replies and traffic to the Facebook site. It should be placed above the
DNSREDIRECT rule
10) ALLOWSUBSITE("facebook.com")
This command allows both DNS replies and traffic to the Facebook site and its subdomains. It should be
placed above the DNSREDIRECT rule
11) DNSREPLACE(CaptivePortal)
This command is useful for environments without DNS servers. Will reply to DNS requests with the CGX
Access Captive Portal IP.
35
Easy NAC: CGX Access Guide
13) ALLOW WHEN PROTO=='TCP' AND LOCALPORT==3389 AND
LOCALADDR=='192.168.10.20'
Allows Remote desktop to only one restricted endpoint 192.168.10.20 from all other protected end points
ACL Syntax
• ALLOW
Means the packet will be allowed to pass if <CONDITION> matches
• DENY
Means the packet will be blocked if <CONDITION> matches
• HTTPREDIRECT <url>
Means the packet will be modified with HTTP <url> redirection content inserted when
<CONDITION> matches
• DNSREDIRECT <IP-address>
Means the DNS-reply packet be modified with <IP-address> if <CONDITION> matches
• DNSALLOW
Means the DNS-reply packet will be allowed to pass if <CONDITION> matches
<CONDITION> is a <SIMPLE-CONDITION>
or any combination of <SIMPLE-CONDITION> using parenthesis and AND|OR OPERATORs.
36
Easy NAC: CGX Access Guide
• PROTO <OPERATOR> <proto>
Check for IP protocol type. <proto> can be one of these strings: ICMP, TCP, UDP, IGMP
• TRUE
This condition is always true
• FALSE
This condition is always false
<OPERATOR> can be ==, != for strings and ==, !=, >, <, <=, >= for numbers.
Also, ! prefix-OPERATOR can be used to negate the [SIMPLE-CONDITION], like this:
!(PROTO=='TCP')
37
Easy NAC: CGX Access Guide
Flagging Devices and Whitelisting
In NAC deployments, it is a common requirement to grant access (whitelist) specific devices that are not
normally registered by end-users. Typical examples include printers, network infrastructure, VoIP phones
and other types of devices.
An easy way to grant access is by using the concept of Flagging. The CGX Access solution supports the
ability for administrators to create and set flags on specific devices. Then using Automated Device
Classification policies, devices with specific flags can be granted full-access, blacklisted or assigned some
other access.
By default, devices with any of these flags: network-infrastructure, router, switch, AD-Managed, AV-
Managed, managed-device, full-access, and printer, will automatically be granted full-access. This list
can be modified to address unique requirements.
CGX Access automates the process of flagging. The CGX Access solution will automatically flag a
device based on the results of device profiling. If CGX Access detects that a device is a printer, it will flag
the device as a printer. If using the default Automated Device Classification policy, the printer would then
be granted full-access. The same is true for network infrastructure like switches and routers.
Flags
CGX Access supports two types of flags, User Defined Flags and Reserved Flags. User Defined Flags can
be created and changed as required. The Reserved Flags are set automatically by the CGX Access device
profiling system and cannot be deleted.
38
Easy NAC: CGX Access Guide
• Go to Configuration → General Settings - Click on “Names Used by Policies”:
These two types of flags can be leveraged to address many unique requirements. For example, if printers
need to be physically checked before access is granted. Then a policy can be set to send an alert to the
administrator when a device was automatically flagged as a printer shows up on the network. Once the
printer has been inspected, the administrator can then assign a User Defined Flag, i.e., approved-printer,
which would allow it access to the network.
Setting Flags
If the list of devices is long, show the Report Filters at the top of the screen to narrow down the
results.
Setting the flags manually can be done for one or more devices in a few steps.
39
Easy NAC: CGX Access Guide
Whitelisting \ Blacklisting
CGX Access also supports adding a device(s) to a manual whitelist or blacklist. The examples below will
assume whitelisting, but blacklisting works the same way.
In the Network Map, devices can be added by MAC Address or IP Address to the global whitelist or to a
whitelist specific to a subnet. If entered into the Default Configuration, the whitelisting would be
configured for all subnets. When adding devices to the Default Configuration, it’s best to use MAC
addresses, so it can be relevant to all subnets.
The Network Map can also be used to configure IP addresses or MAC addresses that should only be
whitelisted on specific subnets.
40
Easy NAC: CGX Access Guide
Once the “Show Configuration” link has been clicked, the view will expand to show the Whitelist
box specific to this subnet. Both IP Addresses and MAC Addresses can be added.
For quick additions to the Whitelist or Blacklist you can click the ON | OFF controls in the Device
Manager. ON is the technical equivalent of being on the Whitelist, while OFF is the equivalent of being
on the Blacklist. Auto means access is set automatically following the policies defined under Automated
Device Classification.
When adding multiple devices to the whitelist it can be convenient to add devices via the Device
Manager.
41
Easy NAC: CGX Access Guide
Note: Devices that are in the whitelist will be shown as ON. Devices in the blacklist will be shown as
OFF. Their respective list will also be shown in the Flags / Lists column.
The Excludelist
Devices added to the Exclude list will be completely unprotected by the Easy NAC solution.
Its typical use would be for handling a compatibility issue. Issues are rare, but one known example is with
the Cisco wireless AP. If the AP is not excluded, it would cause DHCP to fail.
The Exclude list feature can also be used for short-term license management. Devices added to the
Excludelist do not consume a license, so if an organization is exceeding the license, this could be a short-
term way to manage the issue. This feature should be used with care, as excluded devices will also not be
protected from rogue, non-compliant or infected devices.
Note: If the device license is exceeded by more than 10%, new devices joining the network would be
automatically added to this Excludelist and would therefore not be enforced.
42
Easy NAC: CGX Access Guide
Anti-spoofing Protection
When using MAC-based authentication on the network, MAC address spoofing can be a concern, as it is
easy to change a MAC address. CGX Access provides a fingerprint feature to protect against MAC
address spoofing. All devices on the network are profiled for their MAC address, IP, Operating System,
and Hostname). This information can then be used to set a unique fingerprint for the device. Once a
fingerprint has been set, the device(s) will be protected from spoofing. For example, a printer can include
the host name and printer as its OS type. If a Windows, Apple or Linux device tries to spoof its MAC
address, the spoof would be detected, and the device can be restricted.
Setting Fingerprints
43
Easy NAC: CGX Access Guide
Devices with set fingerprints will have a blue fingerprint icon displayed in the Device manager. Clicking
on the fingerprint will show the information include in its unique fingerprint.
Tip: The gray fingerprint icon can be clicked to quickly set a fingerprint.
Once a fingerprint has been set, any changes in the fingerprint details will causes a mismatch and actions
can be taken. In the example below, a Windows XP device had spoofed the MAC address of the printer.
Since the Operating System and the host name didn’t match the fingerprint. The fingerprint icon was
changed to red and device was assigned a FP- mismatched flag so actions can be taken.
Using Policies → Automated Device Classification rules, actions can be taken when a FP-mismatched is
detected. The policy below shows the device will be assigned a restricted role and alerts will be sent to the
network administrators.
44
Easy NAC: CGX Access Guide
Tip: The Fingerprint feature can be used in static IP environments to lock the IP \ MAC combinations to
quickly detect and alleviate IP conflicts.
With personal Wi-Fi routers and misconfigured virtual machines, it is not uncommon for rogue DHCP
servers to show up on the network. CGX Access can be configured to detect rogue DHCP servers, so
they can be quickly identified and removed from the network.
• Under DHCP Servers, input the IP addresses of all the authorized DHCP servers on the network.
45
Easy NAC: CGX Access Guide
• Select “Detect rogue DHCP servers”
Note: Any DHCP server not on the authorized IP list will be flagged as DHCP-rogue.
Using Policies → Automated Device Classification, actions can be taken when DHCP-rogue is
detected. The policy below shows the device will be assigned a restricted role and alerts will be sent to
the network administrators.
46
Easy NAC: CGX Access Guide
Time \ Location \ List Policies
It can be useful to use time, location or lists of IP addresses to help determine what access should be
granted. For example, the default settings will allow guests to access the internet at any time, and from
any part of the network. If we wanted to limit where and when they can access the internet, we can use
the Location and Time Policies.
Location Policy
Option 1: Location names can be set by adapter or VLAN under Configuration → Appliance settings
Location definitions can be based on IP addresses. Once the Location name has been saved, it can
now be added as a condition for Guest Access in the Roles & Access policy.
47
Easy NAC: CGX Access Guide
The above Roles & Access policy now has two possible Access Groups for for guests. If on the Guest
WIFI access is granted, if at any other location, access is restricted. If we wanted to limited access to
office hours, we could set a third condition based on time.
Time Policy
Time definitions can be adjusted, or new ones created. Below is an example of how work hours
might be defined:
48
Easy NAC: CGX Access Guide
Once the Time Period name has been saved, it can now be added as a condition in the Role &
Access policy.
The above Role & Access policy now has both time and location conditions for guest access to be
granted.
Device-Lists Policy
Device-Lists Policies provides an easy method to define a list of IP addresses or MAC addresses to help
determine what access should be granted. It is commonly used to define a group of IP address that needs
to be whitelisted.
Device Lists can be adjusted, or new ones created. Below is an example of how to create a device list for
a server farm using IP addresses:
49
Easy NAC: CGX Access Guide
Once the Device-List has been saved, it can now be added as a condition in an Automated Device
Classification Policy.
The above Automated Device Classification policy will assign the Server Farm to have full-access.
50
Easy NAC: CGX Access Guide
Configuring Guest Access
CGX Access supports multiple login methods for guest registration. Typical options include self-service
registration, sponsor registration, or self-service registration with sponsor approval. Registration with
Facebook credentials is also supported. CGX Access can support all these methods simultaneous, so
different registration processes can be used for different use cases. Guest Access is a standard feature that
is enabled by default, but a few steps are recommended to customize or enhance the guest experience.
Adjust the Company Title, Welcome Page Title, and any other details desired.
51
Easy NAC: CGX Access Guide
• Enable or disable terms and conditions
• Set the number of days to keep guest history details
52
Easy NAC: CGX Access Guide
Allow guest login by access code – Enabled by default, this option allows for a guest to use a
sponsor-provided access code to self-register a guest account. Based on Guest Templates, different
access codes can require different registration information or grant different access to the guest \
consultant. Approval can also be required after the guest registers.
Allow guest login by credential – Enabled by default, this option allows for a guest to use their
guest credentials to login. Guest Credentials can be created and provided by a sponsor or created by
the guest as part of an earlier self-registration process.
Allow self-service guest registration – Enabled by default, this option allows a guest to provide
their contact information required and get immediate guest access without requiring an access code.
Based on the guest template used, approval can be required, and the information they must provide
can be customized.
It also possible to provide the guest with an option to provide their sponsor’s e-mail address for the
approval process and on how long their registration should be active.
53
Easy NAC: CGX Access Guide
Allow guest login with Facebook – Disabled by default. If enabled, a Facebook login button will be
disabled on the captive portal. The guest can then use their Facebook credentials to authenticate as a
guest.
Note: to use this feature, the organization must enable an APP on its Facebook account. Please see
Appendix A for Facebook setup instructions.
54
Easy NAC: CGX Access Guide
Automated Guest Registration – CGX Access supports an optional automated guest account
creation feature. Using syslog, third-party systems can send guest information to the appliance. For
example, when a guest registers at reception, the front desk system can send guest details to CGX
Access, which will create a guest account for the user. Contact InfoExpress or your authorized
partner for more information on this enhanced feature.
A few registration templates are pre-configured on CGX Access. These templates can be modified, and
new templates can be created. The default templates include:
55
Easy NAC: CGX Access Guide
The above image shows various fields for the guest registration options. Here administrators can
adjust the user experience, required fields, and account validity, etc.
The first step is to decide if the template is for guest Self-Registration or Sponsor Registration. With
Sponsor registration, an approved employee(s) will create the account and pass the details to the visitor.
When a sponsor registers a guest, there is no need for the Access Code concept, so this template has less
options.
56
Easy NAC: CGX Access Guide
Guest Template options (for Self-Registration)
Method Name – Use a name that would be meaningful for the Sponsors who may use it
Description – Optional (can be used to provide more details about the template)
Username Created – Decide if the account name is auto generated by the system or the guest
Password Created - Decide if the account name is auto generated by the system, or the guest
Show guest Credentials on registration – After a guest completes the registration process their browser
will show a successful web page. If selected, this checkbox with remind or inform the user of their
credentials on this success page.
Select the information that the guest must enter – Select the boxes that the guests are shown during the
registration process. Additional custom fields can be added under Configuration → General Settings →
Registration Fields.
Confirm Guest – This dropdown box allows you to configure an additional verification check.
Approval Required by Sponsor – With this option a sponsor e-mail is configured in the template. This
sponsor will receive an e-mail when a guest registers using this template. The Sponsor can 1-click a link
in the e-mail to approve the guest. If outside the office, the sponsor can also reply to the e-mail with a
keyword, like (approve, accept, OK, etc.) to also approve the guest. (e-mail approval requires the e-mail
orchestration feature to be enabled.
When using the Self-Service Registration feature, it can convenient to allow the guest to specify their
sponsor. A group of employees or the entire company can be given permission to sponsor a guest.
57
Easy NAC: CGX Access Guide
Send Access code by Email – When using this method, the e-mail provided by the guest during
registration will be sent a code, that must be typed into the guest portal to complete the registration
process. Note: the guest will need access to his e-mail account.
Send Access code by SMS – When using this method, the phone number provided by the guest during
registration will be sent a code, that must be typed into the guest portal to complete the registration
process. Note: an SMS gateway must be configured to use this feature.
Flag Guest – When checked, a Flag can be selected and assigned to the guest’s device. This flag is useful
for assigning a specific type of access to this guest. For example, if assigned a consultant flag, they will
be assigned consultant access. For more details on flags, see the section titled Flagging Devices and
Whitelisting.
Access Code Type – Access codes are useful when using different templates for different types of guests.
This optional setting allows you to configure if the access codes created can be used more than once
(Group use) or one-time only. Group use can be more convenient, while one-time use offers more
security for when access is being provided to sensitive resources.
Code Expires after – This setting allows you to configure how long an Access code, once created, will
still be valid. For Group use codes, you may want to change them on a regular basis. You can provide a
default value, but also choose to let sponsors change this value, when the Access code is first generated.
Access Code Prefix – By default, access codes are randomly generated, with a prefix that can be used to
help you remember what the code is for. For example, if you create a template designed for events, you
may want to use a prefix EV. Then all access codes generated using this template will start with EV. A
simpler approach is to check the box to allow the sponsors to create any code they prefer manually. With
this approach, they can create access code called Dec20-event. This would be easier for both sponsors and
guests to remember.
Account Expires After – Sets the duration of the account once it has been created using this template.
Once the account expires, the guest will need to complete the registration process again, if necessary.
Using the checkboxes provided, the administrator can choose to allow sponsors or guests to adjust the
length of time their account should last.
Max Devices per Guest – Sets the max number of devices that a guest can use with their account.
58
Easy NAC: CGX Access Guide
Setting up Sponsors
CGX Access can query the Active Directory server to validate permissions for sponsors to access the
management UI. Approved sponsors would only be given access to guest management functionality.
Once the GRM-Sponsor AD group has been created, staff can be given sponsor rights (by adding their
user-id to the GRM-Sponsor group).
By default, sponsors can sponsor all types of guest accounts. To limit sponsors to only certain guest types
(for example, if the reception staff is only permitted to create daily visitors), please follow these steps:
59
Easy NAC: CGX Access Guide
Sponsoring Users
Creating a “Consultant Registers Themselves” Access Code
• A user who has either GRM-Sponsor or CGX-Admin permissions can go to Visibility → Guest
Registration Manager. If a user only has sponsor access, they can log in to the main CGX Access
web GUI and will have limited access to the Sponsor Guest pages.
• Choose “Consultant Registers Themselves” from the pick list and click on “Create a
Sponsorship”:
To create other types of access codes, follow the process outlined above. When additional
information is needed, the web UI will request them.
60
Easy NAC: CGX Access Guide
Configuring Device Registration
CGX Access supports device registration and is commonly used to support Bring Your Own Device
(BYOD) initiatives. Employee’s or student devices are checked by validating their credentials against
Active Directory or a Radius database. When a new device joins the network, it will be redirected to the
captive portal. Staff would then be able to register the device, and this registration would be valid for
days, weeks, or months. Several configuration options allow administrators to have access control of the
BYOD devices. Administrative options include:
61
Easy NAC: CGX Access Guide
• Under Active Directory Server, confirm the host or IP address of the AD domain controller and
the Account suffix in the "Account Suffix" field. The @ symbol should proceed the Account
Suffix.
By default, all domain users with valid credentials will be able to register their BYOD devices. It is
possible to limit which groups can register their devices, and to set different policies for different
groups. The enable granular AD registration, the AD groups must be specified in the CGX Access
server.
62
Easy NAC: CGX Access Guide
Add the Active Directory groups that would need to register their devices. Groups that are added will
be shown as a configurable option when customizing Device Registration methods.
There are two default templates for employee device registration, one for customers use cloud based MS
Azure AD, and another traditional AD servers. To make changes to a typical registration…
63
Easy NAC: CGX Access Guide
The above defines various parameters that can be customized for the device registration method. The
default method is configured to apply to all users with valid credentials.
Additional device registration methods can be created for different AD groups to have different
parameters. This can be useful in situations where different length of access, device quantity allowed, or
different information needs to be gathered on the user.
To modify:
• Change the top pulldown box to 'Any of the groups checked'
• Select the AD groups that the template will be applied to:
64
Easy NAC: CGX Access Guide
User Experience
When a user is connected to the network, the browser will be redirected to a page like this:
Users can click on the Employee Device Registration link to be presented with a login screen similar to
this:
At this point, the employee will enter their AD credentials. Depending on the configuration they may be
prompted to complete an information form such as Full Name, Organization, Location, etc. After
completion the appropriate access will be assigned.
This device will be remembered by the system based on the timeout specified in the device registration
template. The user will not be asked for credentials until the device ages out of the database or the timer
for login requests has expired.
Note: If a user exceeds the number of devices they are allowed to registered, they will be shown their list
of devices, and can choose to deregister one of more devices.
65
Easy NAC: CGX Access Guide
Integration: Anti-Virus \ Endpoint Management
CGX Access supports integration with enterprise AV and endpoint management vendors. By leveraging
the integration with the management server, CGX Access can enforce compliance with security policies,
without the use of agents. Devices out-of-compliance can be restricted, and an administrator(s) alerted.
Supported Solutions:
▪ Bitdefender GalaxyZone
▪ Carbon Black Cb Response – 6.x +
▪ CrowdStrike Falcon
▪ ESET Antivirus - 6.5+
▪ IBM BigFix - 9.x +
▪ InfoExpress CyberGatekeeper 9.x +
▪ Ivanti Security Controls – 2019.3 +
▪ Kasaya VSA
▪ Kaspersky Antivirus - 10.x+
▪ Managed Engine Desktop Central
▪ Managed Engine Patch Manager
▪ McAfee ePO - 5.x +
▪ Microsoft Intune
▪ Microsoft SCCM \ WSUS – 4.x +
▪ Microsoft Windows Management Instrumentation (WMI)
▪ Moscii StarCat 2013 and StarCat 10
▪ Sophos Enterprise Console - 5.x +
▪ Sophos Central (cloud)
▪ Symantec Endpoint Protection Manager - 14.x
▪ Symantec Endpoint Protection Cloud
▪ Trend Micro OfficeScan - XG+
▪ Trend Micro Apex Central (cloud)
66
Easy NAC: CGX Access Guide
Bitdefender Integration
• In CGX Access GUI go to Configuration → Integration
• Click on "Bitdefender"
• Check “Enable Integration”
• Enter Access URL and API Key
The URL and API key can be obtained by logging into GravityZone → MyAccount → API
67
Easy NAC: CGX Access Guide
• Use "Test connection" button to validate settings
• You may leave Query interval and flagging conditions as default or modify as required
• Save this configuration
Once the communications between the CGX Access appliance and Bitdefender cloud have been
successfully tested, policies can be set to enforce compliance with AV policies.
Select the flags that should be assigned to devices that meet or fail the specific conditions.
There are several conditions you can select to monitor. When selected CGX Access will set flags on
specific devices that meet or fail the conditions. Using Automated Device Classification policies, devices
with specific flags can be assigned different roles.
68
Easy NAC: CGX Access Guide
The example above shows a device will be assigned a non-compliant role if it has been flagged as AV-
out-of-date. The placements of the rules are important and are evaluated top-down. The first rule that
applies takes precedence.
Tip: The AV-managed flag is helpful in expediting deployments. Any device that is being managed by
the corporate AV server can automatically be granted access to the network.
69
Easy NAC: CGX Access Guide
Carbon Black Cb Response Integration
• In CGX Access GUI go to Configuration → Integration
• Click on "Carcon Black Cb Response"
70
Easy NAC: CGX Access Guide
• Copy API Token and Paste into Token field
71
Easy NAC: CGX Access Guide
Setting and Enforcing Compliance Policies
Once the communications between the CGX Access appliance and Cb Response server have been
successfully tested, policies can be set to enforce endpoint devices have been installed with the Cb
Response agent and connecting to the server regularly.
Select the flags that should be assigned to devices that meet or fail the specific conditions.
When selected CGX Access will set flags and automatically grant access to devices being protected by Cb
Response. While devices that have not connected in the past x days can be flagged as a stale-device.
Using Automated Device Classification policies, devices with specific flags can be assigned different
roles.
The policy above shows a device will be assigned full-access if flagged as managed-device. However, it
would be given a non-compliant role if it has been flagged as a stale-device. The order of the rules is
important, as they are evaluated in descending order.
Tip: The managed-device flag is helpful in expediting deployments. Any device that is being protected by
the Carbon Black will automatically be granted access to the network.
72
Easy NAC: CGX Access Guide
CrowdStrike Integration
• In CGX Access GUI go to Configuration → Integration
• Click on "CrowdStrike"
• Check “Enable Integration”
• Enter Access URL, Client ID and Client Secret
Once the communications between the CGX Access appliance and CrowdStrike cloud have been
successfully tested, policies can be set to enforce compliance with NGAV policies.
Select the flags that should be assigned to devices that meet or fail the specific conditions.
73
Easy NAC: CGX Access Guide
There are multiple conditions you can select to monitor. When selected CGX Access will set flags on
specific devices that meet or fail the conditions. Using Automated Device Classification policies, devices
with specific flags can be assigned different roles.
The example above shows a device will be assigned a non-compliant role if it has been flagged as stale-
device or Sensor-out-of-date. The placements of the rules are important and are evaluated top-down. The
first rule that applies takes precedence.
Tip: The managed-device flag is helpful in expediting deployments. Any device that is being managed by
the organization’s CrowdStrike deployment can automatically be granted access to the network.
74
Easy NAC: CGX Access Guide
ESET Antivirus Integration
• In CGX Access GUI go to Configuration → Integration
• Select the “ESET Antivirus”
CGX Access communicates with the ESET Security Management Center by querying the SQL database.
• Setup the SQL Server used by ESET to support SQL queries over TCP 1433. See prerequisites
below.
• Check “Enable Integration”
• Enter Hostname or IP, database port, database name, and database Username & Password
• Use "Test connection" button to validate settings → Save changes
Tip: It may be helpful to search, “how to enable remote connections on SQL version…” referencing
the specific version used by your ESET Security Management Center.
75
Easy NAC: CGX Access Guide
Setting and Enforcing Anti-Virus Compliance Policies
Once the communications between the CGX Access appliance and ESET Security Management Console
have been successfully tested, policies can be set to enforce compliance with AV policies.
Select the flags that should be assigned to devices that meet or fail the specific conditions.
There are a few conditions you can select to monitor. When selected, CGX Access will set flags on
specific devices that meet or fail the conditions.
Using Automated Device Classification policies, devices with specific flags can be assigned different
roles.
The example above shows a device will be assigned a non-compliant role if it has been flagged as AV-
out-of-date. The placements of the rules are important and are evaluated top-down. The first rule that
applies takes precedence.
Tip: The AV-managed flag is helpful in expediting deployments. Any device that is being managed by
the corporate AV server can automatically be granted access to the network.
76
Easy NAC: CGX Access Guide
IBM BigFix Integration
In CGX Access GUI go to Configuration → Integration
• Verify the MS SQL Server on the BigFix server was enabled for TCP/IP and specify a port such
as 1433.
• Use MS SQL Server management studio to create an account with permission to read the
BFEnterprise database. BFEnterprise is the default database name used by BigFix.
• Configure the firewall on the BigFix server to allow CGX Access to communicate with the MS
SQL Server port: 1433
Tip: It may be helpful to search, “how to enable remote connections on SQL version…” referencing
the specific version used by your BigFix Server.
77
Easy NAC: CGX Access Guide
Setting and Enforcing Patch Compliance Policies
Once the communications between the CGX Access appliance and BigFix server have been successfully
tested, policies can be set to enforce compliance with patch policies.
Select the flags that should be assigned to devices that meet or fail the specific conditions.
There are four conditions you can select to monitor. When selected CGX Access will set flags on specific
devices that meet or fail the conditions.
Using Automated Device Classification policies, devices with specific flags can be assigned different
roles.
The policy above shows a device will be assigned a non-compliant role if it has been flagged as patch-
pending or patch-failed. The order of the rules is important, as they are evaluated in descending order.
Tip: The patch-managed flag is helpful in expediting deployments. Any device that is being managed by
the BigFix server can automatically be granted access to the network.
78
Easy NAC: CGX Access Guide
Ivanti Security Controls
In CGX Access GUI go to Configuration → Integration
• Verify the MS SQL Server on the Ivanti server was enabled for remote connections and specify a
port such as 1433.
• Use MS SQL Server management studio to create an account with permission to read the Protect
database. Protect or SecurityControls are the default database names used by Ivanti.
• Configure the firewall on the Ivanti server to allow CGX Access to communicate with the MS
SQL Server port: 1433
Tip: It may be helpful to search, “how to enable remote connections on SQL version…” referencing
the specific version used by your Ivanti Server.
79
Easy NAC: CGX Access Guide
Setting and Enforcing Patch Compliance Policies
Once the communications between the CGX Access appliance and Ivanti server have been successfully
tested, policies can be set to enforce compliance with patch policies.
Select the flags that should be assigned to devices that meet or fail the specific conditions.
There are four conditions you can select to monitor. When selected CGX Access will set flags on specific
devices that meet or fail the conditions.
Using Automated Device Classification policies, devices with specific flags can be assigned different
roles.
The policy above shows a device will be assigned a non-compliant role if it has been flagged as patch-
pending. The order of the rules is important, as they are evaluated in descending order.
Tip: The patch-managed flag is helpful in expediting deployments. Any device that is being managed by
Ivanti can automatically be granted access to the network.
80
Easy NAC: CGX Access Guide
Kaseya VSA Integration
• In CGX Access GUI go to Configuration → Integration
• Click on "Kaseya VSA"
• Check “Enable Integration”
• Enter Hostname or IP / port
• Enter Username / Password to login to Kaseya management console
81
Easy NAC: CGX Access Guide
Setting and Enforcing Patch Compliance Policies
Once the communications between the CGX Access appliance and Kaseya VSA server have been
successfully tested, policies can be set to enforce compliance with patch policies.
Select the flags that should be assigned to devices that meet or fail the specific conditions.
There are two conditions you can select to monitor. When selected CGX Access will set flags on specific
devices that meet or fail the conditions.
Using Automated Device Classification policies, devices with specific flags can be assigned different
roles.
The policy above shows a device will be assigned a non-compliant role if it has been flagged as patch-
stale. The order of the rules is important, as they are evaluated in descending order.
Tip: The patch-managed flag is helpful in expediting deployments. Any device that is being managed by
Kaseya VSA can automatically be granted access to the network.
82
Easy NAC: CGX Access Guide
Kaspersky Antivirus Integration
• In CGX Access GUI go to Configuration → Integration
• Select the “Kaspersky Antivirus”
CGX Access communicates with the Kaspersky Administration Server by querying the SQL database.
• Setup the SQL Server used by Kaspersky to support SQL queries over TCP 1433. See
prerequisites below.
• Check “Enable Integration”
• Enter Hostname or IP, database port, database name, and database Username & Password
• Use "Test connection" button to validate settings → Save changes
Tip: It may be helpful to search, “how to enable remote connections on SQL version…” referencing
the specific version used by your Kaspersky AV Server.
83
Easy NAC: CGX Access Guide
Setting and Enforcing Anti-Virus Compliance Policies
Once the communications between the CGX Access appliance and Kaspersky Administration Server have
been successfully tested, policies can be set to enforce compliance with AV policies.
Select the flags that should be assigned to devices that meet or fail the specific conditions.
There are several conditions you can select to monitor. When selected CGX Access will set flags on
specific devices that meet or fail the conditions.
Using Automated Device Classification policies, devices with specific flags can be assigned different
roles.
The example above shows a device will be assigned a non-compliant role if it has been flagged as AV-off
or AV-out-of-date. The placements of the rules are important and are evaluated top-down. The first rule
that applies takes precedence.
Tip: The AV-managed flag is helpful in expediting deployments. Any device that is being managed by
the corporate AV server can automatically be granted access to the network.
84
Easy NAC: CGX Access Guide
ManageEngine Desktop Central Integration
• In CGX Access GUI go to Configuration → Integration
• Click on "ManageEngine Desktop Central"
• Check “Enable Integration”
• Enter Hostname or IP / port
• Enter Username / Password to login to ManageEngine
85
Easy NAC: CGX Access Guide
Setting and Enforcing Patch Compliance Policies
Once the communications between the CGX Access appliance and ManageEngine server have been
successfully tested, policies can be set to enforce compliance with patch policies.
Select the flags that should be assigned to devices that meet or fail the specific conditions.
There are three conditions you can select to monitor. When selected CGX Access will set flags on specific
devices that meet or fail the conditions.
Using Automated Device Classification policies, devices with specific flags can be assigned different
roles.
The policy above shows a device will be assigned a non-compliant role if it has been flagged as stale-
device or non-compliant. The order of the rules is important, as they are evaluated in descending order.
Tip: The managed-device flag is helpful in expediting deployments. Any device that is being managed by
the ManageEngine server can automatically be granted access to the network.
86
Easy NAC: CGX Access Guide
ManageEngine Patch Manager Integration
• In CGX Access GUI go to Configuration → Integration
• Click on "ManageEngine Patch Manager"
• Check “Enable Integration”
• Enter Hostname or IP / port
• Enter Username / Password to login to ManageEngine
87
Easy NAC: CGX Access Guide
Setting and Enforcing Patch Compliance Policies
Once the communications between the CGX Access appliance and ManageEngine server have been
successfully tested, policies can be set to enforce compliance with patch policies.
Select the flags that should be assigned to devices that meet or fail the specific conditions.
There are two conditions you can select to monitor. When selected CGX Access will set flags on specific
devices that meet or fail the conditions.
Using Automated Device Classification policies, devices with specific flags can be assigned different
roles.
The policy above shows a device will be assigned a non-compliant role if it has been flagged as patch-
stale. The order of the rules is important, as they are evaluated in descending order.
Tip: The patch-managed flag is helpful in expediting deployments. Any device that is being managed by
the ManageEngine server can automatically be granted access to the network.
88
Easy NAC: CGX Access Guide
McAfee ePolicy Orchestrator Integration
• In CGX Access GUI go to Configuration → Integration
• Select the “McAfee ePolicy Orchestrator”
CGX Access communicates with the ePolicy Orchestrator by querying its SQL database.
• Setup the SQL Server used by ePO to support SQL queries over TCP 1433; See below.
• Check “Enable Integration”
• Enter Hostname or IP / database port / database name
• Enter Username / Password to connect to database
• Use "Test connection" button to validate settings → Save changes
Tip: It may be helpful to search, “how to enable remote connections on SQL version…” referencing
the specific version used by your ePO Server.
Once the communications between the CGX Access appliance and ePO SQL server have been
successfully tested, policies can be set to enforce compliance with AV policies.
89
Easy NAC: CGX Access Guide
Select the flags that should be assigned to devices that meet or fail the specific conditions.
There are seven conditions you can select to monitor. When selected CGX Access will set flags on
specific devices that meet or fail the conditions.
Using Automated Device Classification policies, devices with specific flags can be assigned different
roles.
The example above shows a device will be assigned a non-compliant role if it has been flagged as AV-off
or AV-out-of-date. The placements of the rules are important and are evaluated top-down. The first rule
that applies takes precedence.
Tip: The AV-managed flag is helpful in expediting deployments. Any device that is being managed by
the corporate AV server can automatically be granted access to the network.
90
Easy NAC: CGX Access Guide
Microsoft Intune Integration
Integration with MS Intune requires an application be registered in MS Azure.
Screen-1
Screen-2
91
Easy NAC: CGX Access Guide
Screen-3
Step 2: Set Client secret and copy ‘client ID’, ‘tenant ID’ and ‘client secret’ (Screen 4, 5 & 6)
Screen-4
92
Easy NAC: CGX Access Guide
Screen-5
Screen-6
Screen-7
93
Easy NAC: CGX Access Guide
• Ensure permission name, type and Admin consent is granted for each permission
Screen-8
Screen-9
• Input Azure credentials – Account must have a role of "Intune Administrator (Screen 10)
94
Easy NAC: CGX Access Guide
Screen-10
Screen-11
Once the communications between the CGX Access appliance and MS Intune have been successfully
tested, policies can be set to enforce endpoint devices have been enrolled and compliant with Intune
device compliance policy.
Select the flags that should be assigned to devices that meet or fail the specific conditions.
95
Easy NAC: CGX Access Guide
When selected CGX Access will set flags and automatically grant access to devices being managed by
MS-Intune. While devices out of compliance can be flagged as a non-compliant.
Using Automated Device Classification policies, devices with specific flags can be assigned different
roles.
The policy above shows a device will be assigned full-access if flagged as AD-Managed or managed-
device. However, it would be given a non-compliant role if it has been flagged as a non-compliant. The
order of the rules is important, as they are evaluated in descending order.
Note: The AD-Managed flag is applied to both Azure AD-joined devices and AD registered devices.
While the managed-device flag is only applied to Azure AD-joined devices.
96
Easy NAC: CGX Access Guide
Microsoft SCCM \ WSUS Integration
CGX Access communicates with the WSUS server by querying the SQL database. By default, WSUS
uses the Windows Internal Database, so it may be necessary to first update the WSUS server to use SQL.
See WSUS SQL prerequisites below.
Tip: It may be helpful to search, “how to enable remote connections on SQL version…” referencing
the specific version used by your WSUS Server.
Once the communications between the CGX Access appliance and WSUS server have been successfully
tested, policies can be set to enforce compliance with patch policies.
Select the flags that should be assigned to devices that meet or fail the specific conditions.
97
Easy NAC: CGX Access Guide
There are several conditions you can select to monitor. When selected CGX Access will set flags on
specific devices that meet or fail the conditions.
Using Automated Device Classification policies, devices with specific flags can be assigned different
roles.
The policy above shows a device will be assigned a non-compliant role if it has been flagged as patch-
pending or patch-failed. The order of the rules is important, as they are evaluated in descending order.
Tip: The patch-managed flag is helpful in expediting deployments. Any device that is being managed by
the WSUS server can automatically be granted access to the network.
98
Easy NAC: CGX Access Guide
Microsoft Windows Management Instrumentation (WMI)
CGX Access can query endpoints directly using Windows Management Instrumentation (WMI). WMI
allows for Windows endpoints and Windows Servers to be queried over the network for compliance
requirements.
The account requires permissions to perform WMI queries on client computers. A Domain Admin
Account is often necessary. Use domain\username syntax for the Domain Admin account.
• Save changes
99
Easy NAC: CGX Access Guide
WMI Troubleshooting:
Windows contains a number of security features that may prevent the use of WMI on a remote system.
Therefore, it may be necessary to modify your system's Active Directory and Windows Firewall settings
for WMI to work.
As WMI is a pre-installed component on Microsoft Operating systems, it’s recommended you use
Microsoft resources from troubleshooting WMI on your network.
https://docs.microsoft.com/en-us/windows/win32/wmisdk/connecting-to-wmi-remotely-starting-with-
vista
Once the communications between the CGX Access appliance and endpoint devices have been
successfully tested, policies can be set to detect compliance with policies.
Select the flags that should be assigned to devices that meet or fail the specific conditions.
There are several conditions you can select to monitor. When selected CGX Access will set flags on
specific devices that meet or fail the conditions.
100
Easy NAC: CGX Access Guide
Using Automated Device Classification policies, devices with specific flags can be assigned different
roles.
The policy above shows a device will be assigned a non-compliant role if it has been flagged as AV-Off
or non-compliant. The order of the rules is important, as they are evaluated in descending order.
When a device has full access or enforcement is disabled, WMI remote queries should always work.
However, when a device is quarantined, it would be necessary for the endpoint device to be able to
communicate with the AD server to validate the WMI query.
Below is a sample ACL that should be assigned when a device is out of compliance to allow the WMI
query to work. In this example, the AD server has IP address 192.169.253.100.
The ACL example below should be used if DNS Redirection is also required. In this example the AD
server has FQDN host name: WIN-EH9KPK2TKSH.iex.demo with IP address 192.168.253.100
• Verify the MS SQL Server on the StarCat server was enabled for TCP/IP and specify a port such
as 1433.
• Use MS SQL Server management studio to create an account with permission to read the StarCat
database. StarCat 2013 doesn’t use a default database name, so check the SQL server for the
correct name.
• Configure the firewall on the StarCat server to allow CGX Access to communicate with the MS
SQL Server port: 1433
Tip: It may be helpful to search, “how to enable remote connections on SQL version…” referencing
the specific version used by your StarCat server.
102
Easy NAC: CGX Access Guide
Setting and Enforcing Compliance Policies
Once the communications between the CGX Access appliance and StarCat server have been successfully
tested, policies can be set to enforce all Windows devices have been installed with the StarCat agent and
connecting to the server regularly.
Select the flags that should be assigned to devices that meet or fail the specific conditions.
When selected CGX Access will set flags and automatically grant access to devices being managed by
StarCat. While devices that have not connected in the past x days can be flagged as a stale-device.
Using Automated Device Classification policies, devices with specific flags can be assigned different
roles.
The policy above shows a device will be assigned full-access if flagged as managed-device. However, it
would be given a non-compliant role if it has been flagged as a stale-device. The order of the rules is
important, as they are evaluated in descending order.
Tip: The managed-device flag is helpful in expediting deployments. Any device that is being managed by
the StarCat server can automatically be granted access to the network.
103
Easy NAC: CGX Access Guide
Sophos Integration
Easy NAC supports integration with the on-premise Enterprise Console or the Sophos Central cloud
version. Either option can be enabled individually or together to support a migration to the cloud.
CGX Access communicates with the Sophos Enterprise Console by querying the SQL database.
• Setup the SQL Server used by Sophos to support SQL queries over TCP 1433. See below.
• Enter Hostname or IP / database port / database name
• Enter Username / Password to connect to database
• Use "Test connection" button to validate settings → Save changes
Tip: It may be helpful to search, “how to enable remote connections on SQL version…” referencing
the specific version used by your Sophos Server.
104
Easy NAC: CGX Access Guide
Configuring Sophos Central:
105
Easy NAC: CGX Access Guide
Setting and Enforcing Anti-Virus Compliance Policies
Once the communications between the CGX Access appliance and Sophos server have been successfully
tested, policies can be set to enforce compliance with AV policies.
Select the flags that should be assigned to devices that meet or fail the specific conditions.
There are several conditions you can select to monitor. When selected CGX Access will set flags on
specific devices that meet or fail the conditions. Using Automated Device Classification policies, devices
with specific flags can be assigned different roles.
The example above shows a device will be assigned a non-compliant role if it has been flagged as AV-off
or AV-out-of-date. The placements of the rules are important and are evaluated top-down. The first rule
that applies takes precedence.
Tip: The AV-managed flag is helpful in expediting deployments. Any device that is being managed by
the corporate AV server can automatically be granted access to the network.
106
Easy NAC: CGX Access Guide
Symantec Endpoint Protection Manager - 14.x
• In CGX Access GUI go to Configuration → Integration
• Click on "Symantec Endpoint Protection Manager"
• Check “Enable Integration” and select 14.x
• Enter Hostname or IP / port
• Enter Username / Password to login to SEPM
107
Easy NAC: CGX Access Guide
• Use "Test connection" button to validate settings
• You may leave Query interval and flagging conditions as default or modify as required
• Save this configuration
Once the communications between the CGX Access appliance and Symantec server have been
successfully tested, policies can be set to enforce compliance with AV policies.
Select the flags that should be assigned to devices that meet or fail the specific conditions.
108
Easy NAC: CGX Access Guide
There are several conditions you can select to monitor. When selected CGX Access will set flags on
specific devices that meet or fail the conditions. Using Automated Device Classification policies, devices
with specific flags can be assigned different roles.
The example above shows a device will be assigned a non-compliant role if it has been flagged as AV-off
or AV-out-of-date. The placements of the rules are important and are evaluated top-down. The first rule
that applies takes precedence.
Tip: The AV-managed flag is helpful in expediting deployments. Any device that is being managed by
the corporate AV server can automatically be granted access to the network.
109
Easy NAC: CGX Access Guide
Trend Micro OfficeScan Integration
Easy NAC support integration with the on-premise enterprise console or the Apex Central cloud version.
Either option can be enabled individually.
CGX Access communicates with the Trend Micro Office Scan by querying the SQL database used by
OSCE.
• Setup the SQL Server used by OCSE to support SQL queries over TCP 1433. See prerequisites
below.
• Enter Hostname or IP / database port / database name
• Enter Username / Password to connect to database
• Use "Test connection" button to validate settings
• Save changes
110
Easy NAC: CGX Access Guide
https://success.trendmicro.com/solution/1059973-migrating-officescan-osce-server-database-to-
an-sql-server
• Verify the MS SQL Server on the OCSE server was enabled for TCP/IP and specify a port such as
1433.
• Configure the firewall on the OCSE server to allow CGX Access to communicate with the MS
SQL Server port: 1433
Tip: It may be helpful to search, “how to enable remote connections on SQL version…” referencing
the specific version used by your OCSE Server.
• In Apex Central, use Automation API Access Settings to generate an Application ID and API Key
• In CGX Access GUI go to Configuration → Integration
• Select Trend Micro
• Check “Enable integration” and select the “APEX Central”
• Add Host or IP address
• Copy the Application ID and API Key to CGX Access
111
Easy NAC: CGX Access Guide
Setting and Enforcing Anti-Virus Compliance Policies
Once the communications between the CGX Access appliance and OSCE SQL server have been
successfully tested, policies can be set to enforce compliance with AV policies.
Select the flags that should be assigned to devices that meet or fail the specific conditions.
There are multiple conditions you can select to monitor. When selected CGX Access will set flags on
specific devices that meet or fail the conditions.
Note: when using APEX central, they may be less options, due to Trend Micro’s API limitations.
Using Automated Device Classification policies, devices with specific flags can be assigned different
roles.
The example above shows a device will be assigned a non-compliant role if it has been flagged as AV-off
or AV-out-of-date. The placements of the rules are important and are evaluated top-down. The first rule
that applies takes precedence.
Tip: The AV-managed flag is helpful in expediting deployments. Any device that is being managed by
the corporate AV server can automatically be granted access to the network.
112
Easy NAC: CGX Access Guide
Orchestration with Syslog
Firewalls, APT solutions, and other security solutions that are designed to monitor devices and network
traffic can send event-based alerts for administrative action. CGX Access can receive event-based syslog
messages from all types for security devices and take immediate action when necessary. If CGX Access
receives an alert that a device has malware or misbehaving, we can restrict it immediately.
Any solution that can send event-based syslog messages can be configured to work with CGX Access.
From this screen, an Event can be enabled. The event source IP is the IP address of the security appliance
that is sending the syslog message to CGX Access. Multiple IP addresses or IP ranges can be entered.
113
Easy NAC: CGX Access Guide
Syslog Event Creation
CGX Access can work with any solution (Firewall, APT, IPS, SIEM, etc.) that can send event-driven
syslog messages. To create new Events
This dialog box defines how a device event can be triggered from a syslog. If the search pattern is found,
this event is triggered for the IP found in the syslog message. To set up an event four sections must be
configured
Event Name
Give this event a name that explains which device is sending the syslog and what is looking for.
114
Easy NAC: CGX Access Guide
Search syslogs for
The system will search for Syslog messages that match the keywords specified here. For example:
"ID=attack detected". Regular expressions can be used but don't include "/" at the beginning and the end.
If using IP: The system will extract the IP address of the offending endpoint using the predefined macro:
(%IP) for the IP address's position. For example, we will specify: "SRC=(%IP)" if the IP value can be
found after SRC:=..."
If using Hostname: The system will extract the hostname of the offending endpoint using after a keyword.
For example, hostname:
Custom flags names can be created under Configuration → General Settings → Names Used by Policies
115
Easy NAC: CGX Access Guide
Orchestration - Email Alerts
CGX Access can receive e-mail messages from all types for security devices and take immediate action
when necessary. If CGX Access receives an email alert that a device has malware or is misbehaving, we
can restrict it immediately.
Any solution that can send email messages can be configured to work with CGX Access.
• To limited which e-mail addresses are allowed to send an e-mail alert to the CGX Access
appliance, specify the approved e-mails in the Sender’s Address section. When blank all addresses
are allowed.
• The Query interval specifies how often CGX Access checks the mail server for new e-mail alerts.
116
Easy NAC: CGX Access Guide
Email Event Creation
CGX Access can work with any solution (Firewall, APT, IPS, SIEM, etc.) that can send e-mail messages.
To create new Events
This dialog box defines how a device event can be triggered from an e-mail. If the search pattern is found,
this event is triggered for the IP or hostname found in the e-mail message. To set up an event four sections
must be configured
Event Name
Give this event a name that explains which device is sending the e-mail and why.
117
Easy NAC: CGX Access Guide
Search email alerts for
The system will search the email messages for keywords specified here. For example: "Virus/Spyware".
Regular expressions can be used but don't include "/" at the beginning and the end.
If using Hostname: The system will extract the hostname after reading a keyword. For example, if
Machine: is specified as the keyword, any name following it will be assumed as the hostname.
If using IP: The system will extract the IP address of the offending endpoint using the predefined macro:
(%IP) for the IP address's position. For example, we will specify: "SRC=(%IP)" if the IP value follows
after SRC:=.
Custom flags names can be created under Configuration → General Settings → Names Used by Policies
118
Easy NAC: CGX Access Guide
Automated Threat Response - Zero-Day
Behavioral Detection
With its layer-2 visibility, CGX Access can detect devices making connection attempts to other devices
within the same segment. If an end-user device suddenly attempts to connect to an excessive number of
devices on the same subnet or tries to connect to Dark IPs that at not active on the network, this is
suspicious behavior. This behavior is indicative of a network scan being performed or malware trying to
probe the network in an attempt to spread. Easy NAC can detect this behavior and immediately quarantine
this device so it can’t spread malware laterally on the network.
When enabled. devices attempting connection attempts to an excessive number of hosts will be flagged as
“Scan-detected”. While devices attempting connection attempts to unused IP addresses will be flagged as
“Dark-IP-Scan”
119
Easy NAC: CGX Access Guide
Policy-Based Response
When the “Scan-detected” flag and \ or “Dark-IP-Scan” flag is assigned to a device, the CGX Access can
take quarantine actions based on Automated Device Classification policies.
• The new rule should be dragged near the top of the list, so it has higher priority over other sets of
conditions
Tip: By specifying the flags on two separate lines it creates an “And” requirement, where both the
“Scan-detected” flag and “Dark-IP-scan” flag both need to be present. Requiring both flags to be
present can reduce false positives.
120
Easy NAC: CGX Access Guide
Handling Exceptions
For network monitoring, it may be necessary to configure exceptions on some devices. To ignore Zero-
day behavioral detection, you can flag the allowed devices as “arp-scan-ignoring” and “darkip-scan-
ignoring”. These flags can be set using the Device Manager or Device with Events report.
Note: by default, devices flagged as Network Infrastructure are exempt from zero-day checks.
121
Easy NAC: CGX Access Guide
Agent Support
Easy NAC was designed to be an agentless solution. However, agent licenses are optional and can be used
for more in-depth compliance checks, automatic remediation, and other capabilities. When using agents,
you can also consider a hybrid deployment model, where laptops needing stronger security checks use the
agents, while desktops use the agentless approach. The table below summarizes the differences in these
approaches.
• Running Process
Agentless solution – Integrations with
Compliance checks • Registry values
AD, 3rd-party AV, Patch, and WMI
• Files and locations
• Ini files and contents
• Machine names and OS check
• Authentication
End-user compliance
Pop-up Message HTTP Redirection
communication
122
Easy NAC: CGX Access Guide
Working with Agents
Easy NAC virtual appliances come with default agents and default polices that can be used for testing or
as a baseline to start building your custom compliance policies.
By default, Automated Device Classification policies will assign a device passing an agent audit with full
access. While a device failing audit would be assigned a failed-agent-audit role. The order of the policies
is important, so in some environments, it may be necessary to drag these policies up for higher priority.
When assigned a “failed-agent-audit” role the device will be assigned “restrict-agent” ACL. By default,
restrict-agent ACL blocks all traffic except DNS, DHCP, and the agent traffic over port TCP 11698.
It is recommended the default “restrict-agent” ACL be edited to allow access to approved remediation
resources such as the AV server, patch server, etc.
123
Easy NAC: CGX Access Guide
Hosting Agents
Easy NAC virtual appliances come with default agents that will meet most customer requirements. To
make these agents available for use:
To host agents on the appliance, it will be necessary to use the Remediation IP address. Once the above
settings are configured; you can decide when to show the agent installers to your end-users.
124
Easy NAC: CGX Access Guide
Based on requirements, you can choose when to display the agent installers. This would be helpful for
special situations where you require guest, consultant or BYOD devices to install agents for network
access.
The appliance will only show the agent type appropriate for the Operating System, so a guest with a MAC
computer will only be shown the OSX agent. If you want to display all the available agent options, you
can check “Show all configured agent links”.
Installing Agents
The CyberGatekeeper Agents are designed to install silently. Once the installer is run the agent will
install silently with no configuration options or reboots required. The Windows installers are
approximately 8-10 MB in size. The MAC OSX agent installer is approximately 4 MB. These sizes make
is quick to download and install. When installed and running the agents will use 4-6 MB or RAM and
utilize ~1% CPU every 30 seconds.
Most organizations choose to use a software deployment tool or AD Group policy with a computer startup
script to install the agent automatically for their managed devices. Contact InfoExpress support for a
sample script.
125
Easy NAC: CGX Access Guide
• There will be no prompts or confirmations. Allow 30-60 seconds for the install to be completed in
the background
• When finished an icon in the system tray will be visible. When double clicked the agent viewer
will show the current status
A key difference with the on-demand agent, is that it doesn’t require admin rights to install, because it
doesn’t get installed. The on-demand agent is 2-3 MB executable that runs in memory until the agent
viewer is closed. Once the agent viewer is closed, the agent checks are stopped, and the consultant will
need to run the executable again if she needs to reconnect to the network. By default, a device passing
audit will continued to be passing audit for 5 minutes, after this agent has been closed.
Requirements \ Limitations:
• Supported on Windows 64-bit Operating Systems only (Windows 7 and Windows 10)
• Supports Windows Security Center and Windows Update plug-ins
• Nic Manager Plug-in or any plug-in requiring admin rights is not supported
• Automatic Remediation is not supported
126
Easy NAC: CGX Access Guide
Agent Compliance Policies
Easy NAC virtual appliances come with default agent compliance policies that have been pushed to the
appliance. These default policies will provide checks for common AV solutions:
• Anti-Virus Installed
• Anti-Virus Running
• AV Up-to-date
• Real-time scanning enabled
• Windows Updated Enabled
• Recent Microsoft updates
These policies are a good starting point, but it would be recommended every customer adjust these
policies to meet their specific requirements. For example, if your organization’s endpoint security is
TrendMicro, then it may only be necessary to check for this brand.
To adjust the policies, it will be necessary to install a CyberGatekeeper Policy Manager. Contact
InfoExpress support or your partner for a copy of the CGPM installer and a copy of the of the Easy NAC
Default Settings installer.
Note: If you plan to use the default agents, it will be necessary to run the Easy NAC Default settings
installer to ensure the agents and Policy Manager have the correct shared settings.
Policy Manager
Policy Manager, also called CGPM (CyberGatekeeper Policy Manager) is a Windows-based application
that can be installed on any 64bit Microsoft Windows Operating System.
The sections below will serve as a QuickStart guide and Best Practices Guide on how to make use of
policy manager to create the desire agent checks.
Tip: For complete details of the CyberGatekeeper Policy Manager, please refer to the Policy Manager
Reference Manual.
127
Easy NAC: CGX Access Guide
Policies
The Policies creates and edits audit policies. Audit policies let administrators specify what applications,
configurations, and systems should be allowed or denied into the corporate network.
A policy consists of a When Section and a Requirements section. Each requirement section can have their
own remediation section. The When Section indicates which remote systems should be governed by this
policy.
If this policy's When Section does not match the audit information from the remote system, the next
policy will be checked. If the When Section matches the audit information from the remote system, the
Requirements Section is checked to see whether the remote system should be given access to the
corporate network.
128
Easy NAC: CGX Access Guide
Ordered policies are policies starts with a number in their names. They are arranged in alphanumerical
order. The order in which policies will be evaluated can be seen in the list of policies on CGPM. An agent
can take only 1 ordered policy at a time. Once a match is found in the When Section, the policy would be
taken by this agent and no other policies would be checked.
• It is a best practice to name the polices with a numbered prefix. This way, you would be able to
change the priority of when a policy gets evaluated by changing its prefix number easily.
For example, an ordered policy named 80-Windows.def would be evaluated before another policy
named 90-Windows.def because the system would evaluate the policies in alphanumeric order.
• The more conditions that you have defined in the When Section, the policy should be evaluated
first. You can do so by changing the name of the policy as suggested above.
For example, if your 90-Windows.def has two When conditions defined (When Any Windows
and When in IP range 192.168.0.0/24) and your 80-Windows.def has 1 When condition defined
(When Any Windows).
In this case, all your agents would be getting the 80-Windows.def because it has a more generic
When condition (only 1).
The correct way to do it, is to rename the 90-Windows.def to, for example, 70-Windows.def.
This would make the policy list higher alphanumerically and hence be evaluated first.
• If you have a mixed 32bit and 64bit of Windows OSes that still need to be supported. It would be
best to separate them into two sets of policies. Ie. One for 32bit and another one for 64bit.
• Policies created are stored in the Policy Manager installation folder, it is recommended to have a
backup of the whole policy manager folder which is in C:\Program
Files\InfoExpress\CyberGatekeeper Policy Manager.
The REQUIRE command is used to ensure certain conditions are present and passes if the test
condition(s) are true. If any REQUIRE command is not met, the agent would FAIL to pass this policy
and hence the audit.
129
Easy NAC: CGX Access Guide
The PROHIBIT command is used to prevent certain conditions and passes if the test condition is not
true. If any PROHIBIT command is not met, the agent would FAIL to pass this policy and hence the
audit.
The DESIRE command is used to check if certain conditions are present. If the test condition(s) are true,
it would pass the policy. However, even in the case the DESIRE command is not met, it would still pass.
This is helpful if compliance information is desired, but no quarantine action should be performed.
The NOTDESIRE command is used to check if certain conditions are not present and passes if the test condition is
not true. However, eve in the case the NOTDESIRE command fails, it would still pass. This is helpful if
compliance information is desired, but no quarantine action should be performed.
Requirements Priority
All the tests, when added to the policy, would be the requirements. These requirements would all be
evaluated from top down.
For example, as per the screenshot above, DESIRE “Windows Automatic Updates Enabled” would be
checked first, then followed by REQUIRE Anti-Virus Installed, then REQUIRE Anti-Virus Running, etc.
When a REQUIRE or PROHIBIT test fails, the audit would be marked as FAIL and any tests that sit
below would not be checked.
However, because of the nature of the DESIRE or NOTDESIRE command, it would still be pass audit,
even if it fails this test, so the next requirement would still be checked.
For example, if REQUIRE Antivirus Running failed, it would be marked as failing this test. The agent
would not check for any test below, in this case the REQUIRE Virus Definitions Current and the
REQUIRE Real-Time Scanning Enabled would not be checked.
130
Easy NAC: CGX Access Guide
Requirement Best Practices
• It is recommended to put the DESIRE and NOTDESIRE commands in the requirements to the top
by using the arrow button. This way, we ensured all these tests are checked properly before
REQUIRE and PROHIBIT commands.
• You can change the command type by right-clicking on a command. For example, change from
DESIRE to REQUIRE.
• Please check if there are perquisites for tests and arrange the order of these tests accordingly.
For example, a test check for Antivirus running should be checked first before the Antivirus
signature is not older than 7 days. It is because the antivirus program might not be able to update
the signature if it is not even running.
Remediation
If an agent fails a policy requirement, the administrator has the option of running a remediation action,
displaying a remediation message to the user or both.
• The remediation action can be configured to bring the device back into compliance so that it can
successfully audit against the policy.
• The remediation message pops up a dialog box with informational or instructional information to
users.
• A unique remediation action and/or pop-up message can be configured for each of the
requirements set in a policy.
To configure the remediation, please highlighted the corresponding test in the requirement section and
then click the Edit button. This would bring the Edit Remediation Option dialog box.
131
Easy NAC: CGX Access Guide
Pop-up Messages
The Remediation Message box can be edited to include any remediation message that the administrator
deems appropriate. For example, "No authorized antivirus software is found".
Messages do not pop up by default. In order to have the message displayed on the agent upon a failed
requirement, the “Pop up Message on User's System” check box should be selected.
An URL can be embedded in the remediation message to direct the user to further resources to help
provide further information or this URL can be put in the Remediation Link box.
Remediation Actions
The remediation action must be entered under the Remediation Link input box. It can contain either a
URL tag or UNC tag (Universal Naming Convention). The tag points to a file that will be run on the end
user system if that endpoint fails the requirement.
132
Easy NAC: CGX Access Guide
The file that the tag points to can be any file type that can be run on the hosts system: common file types
include executables (.exe), Windows scripts (.vbs, .bat, .cmd). If the remediation scripts or executables
require parameters (arguments) they can be entered under "Command Arguments". Multiple parameters
should be separated by spaces.
For example:
URL Tag: http://192.168.253.128/fix/ResShieldOn.bat
UNC Tag: \\server\path\ResShieldOn.vbs
Even if you defined a remediation script URL in the Remediation Link, it may still require the user to
click on the link to download and run the script manually.
Auto-remediation
To provide a better end user experience, the remediation action can be configured to run automatically
without any user intervention.
Also, the user privilege that the remediation script runs would also be configurable.
To allow the remediation script to run automatically with the current logged on user privilege, select the
Run remediation for Desktop Agent.
To allow the remediation script to run automatically but with local administrative rights, select both the
Run remediation for Desktop Agent and Run Remediation with Admin Rights.
Note: Only standard Windows Agent and Mac OS Agent support remediation actions.
• It is recommended to configure the remediation action via an URL instead of a UNC path.
Because the agent runs with the local system account on the endpoint. If a network resource is
accessed, it might not have the sufficient privilege. You can host the remediation scripts on the
CGX Access appliance or Central Visibility Manager
• The remediation action is best to configure to run without any user intervention.
For example, running a batch file (.bat) as a remediation script is supported but it might trigger a
command prompt to be shown on the user’s endpoint. It would look malicious to users. However,
when running it with a VB Script, it can do the same remediation action but can be configured in
the script to hide any user feedback (more transparent user experience).
• Depending on the nature of the remediation script, the necessary privilege would need to be
configured properly for the script to run properly. For example, if the script requires administrative
privilege (restarting a service), running the script automatically with the user privilege alone might
not work for everyone.
133
Easy NAC: CGX Access Guide
Troubleshooting Agents
Installation Issues
Sometimes users can face problems with installing the agent on a windows PC for various reasons which
may be specific to user environment. You can use the following command line options to troubleshoot
installation issue.
-debug Generates installation log at %tmp%\cgainstall.log. You can send this log to support
when requiring assistance for installation issues
-log Enables agent debug logging in agent install dir [filenames=IEXCGAxxxxx.log]
-manual Interactive install. Shows install window and progress.
For Example:
This is will start a manual installation with install progress & enable installation debug logging file
at %tmp%\cgainstall.log
134
Easy NAC: CGX Access Guide
Once agent is installed, you can check if agent service is running.
Note: For problems installing Linux agents, please contact support for the Linux agent install guide.
Connection Issues
Once agent is installed correctly, there may be problems with agent connecting to the CGX Access
appliance. The easiest way to check error messages is to open the agent window and note the
message/warning. By default, the CyberGatekeeper agents are configured to talk with hostnames cgx-
access and cgx-access.local. These values can be changed when building agents. Take note of the CGX-
Access IP-address and/or Hostname configured in the agent. (Henceforth referred to as CGXA]
135
Easy NAC: CGX Access Guide
Cannot establish See “different
session with a server administrative
from a different domain error”
administrative domain below.
or server is disabled.
Failed. CyberGatekeeper Agent has failed
indicated failure in compliance. Check
audit session. rules that agent
should pass.
Checking Device
Manager - Reports
would help
identify why this
agent failed
compliance.
Different Administrative Domain error: This error occurs when the agent and the policy on the CGX
Access were built from a different Policy Manager. It can also occur if no policy has been pushed to the
CGX Access appliance. The agent and the appliance share a secret key, and this key is generated and
provided by the Policy Manager. It is included when the agent is built, and when the policy is uploaded to
the appliance. If the keys do not match, the client cannot connect to the appliance.
• Uploading the policy to the appliance, from the same Policy Manager that built the agent.
• Import the correct Shared Settings into the Policy Manager and re-upload the policies to CGX
Access. (If using default agents, contact support for the default Easy NAC shared settings).
• Re-building and re-distributing the agent from the same system that uploaded the current
policy.
Once agent connects to CGX Access appliance successfully, you should see “successful” message in
agent window.
136
Easy NAC: CGX Access Guide
• When failing audit (non-compliant)
137
Easy NAC: CGX Access Guide
Advanced Configuration Options
Administration Permissions
CGX Access can query the Active Directory server to validate permissions for administrators to access
the management GUI. CGX Access uses management accounts stored in Active Directory. Different
levels of access are given to admin users based on their AD group membership.
Administrator roles
Initially there are three roles for administrators configured on a CGX Access: CGX-Admin, CGX-
AdminRO and GRM-Sponsor. “CGX-Admin” is a default role that cannot be modified. It has full
privileges. "CGX-AdminRO" is the one shown below and can be used for limited administrative
privileges. GRM-Sponsor is a group allowed to sponsor guest access. Each permission role can be
configured with different access rights. Permission roles may be deleted or added.
Roles correspond to groups defined in Active Directory, i.e. the administrative user uses their Active
Directory credentials to authenticate and is given access based on the group they are a member of in
Active Directory. In order for an Active Directory user to be placed into the CGX-Admin role on the
CGX Access, the user must be member of an AD group of the same name.
138
Easy NAC: CGX Access Guide
Create CGX Access admin groups in Active directory
• Add the groups CGX-Admin, CGX-AdminRO and GRM-Sponsor. Please note that upper/lower
case is significant when creating these groups.
If you create a new account make sure it's not set with "User must change password at next logon" as that
will prevent the account from being used on the CGX Access until the user changes the password.
Test AD connection
If you can authenticate using your AD credentials, then the CGX Access is successfully communicating
with the AD domain. If your AD credentials do not work double check that the address of the LDAP
server and the account suffix was entered correctly. Also, double check that the changes/additions you
made to AD groups have been synchronized to the DC that the CGX Access is connecting to (i.e. the host
or IP entered).
139
Easy NAC: CGX Access Guide
Configuring Radius for CGX Admin Login or BYOD
Authentication
Radius Server Configuration
• Add user, and assign a group. See more on groups in CGX settings later in this guide.
CGX-Access Configuration
140
Easy NAC: CGX Access Guide
For assigning group level permissions, you can either use predefined groups or create your own group
with custom permissions.
Note: The same group should be assigned and returned with radius VSA 2939 discussed above
In the above example, user “zeeshan” is a read-only user and cannot make any changes to the above
settings.
141
Easy NAC: CGX Access Guide
Customizing Landing Pages
CGX Access provides customization in two ways. Text fields can be edited through the main
configuration interface (see Configuration → General Settings). The styles of the landing pages by
modifying the CSS (cascading style sheet). Steps to create such a CSS can be found below.
CSS files govern the look and feel of the landing pages only. The GRM theme (landing page theme) is
generated from LESS source files (see: http://lesscss.org for additional info on LESS).
LESS files are text-based files and any text editor can be used. "Crunch" (www.cruchapp.net) is
recommended, as it includes a CSS compiler for LESS files. Other options, such as "Sublime"
(www.sublimetext.com) + less2css plugin and an accompanying compiler can be used as well.
A basic set of LESS files can be obtained from Infoexpress support. It will contain a base set of LESS
files which can be compiled into a main.css and accompanying image files (see below)
After downloading and decompressing the less files, open them in the editor and make changes as desired.
Below are some locations of parameters that can be changed
File Description
main.less Main file that links to sub-files with additional settings
variables.less This file contains many of the default colors and images used
header.less Contains settings for the top part of the pages
footer.less Settings for the bottom of pages
button.less Settings for buttons
mobile.less Settings for pages in a small browser
When satisfied with the changes made, the main.less file should be compiled (it will invoke all the other
files specified). The output file should be called main.css
Note: The compiler may place the main.css file in the same directory as the .less files.
142
Easy NAC: CGX Access Guide
When done, the main.css file, as well as the images directory should be uploaded to the CGX Access
through FTP using the cguser account. Below is the directory structure that should be present on the CGX
Access
Path Contents
/updates /grm-theme /css contains the main.css file
/images contains the images referenced by the css file
Only the main.css file and images are needed on the CGX Access, The .less files do not need to be
uploaded
After uploading the files, the CGX Access will automatically pull these files and update the landing
pages. No further commands are needed to update the pages. Please allow a few seconds for this
action to complete.
143
Easy NAC: CGX Access Guide
High Availability
Overview
The High Availability option provides redundancy in the event an appliance or virtual appliance was to
fail or be offline. HA is provided using a two-box design, where the Primary appliance syncs its database
and configuration with a passive Backup appliance. If the Backup appliance determines the Primary
appliance is offline, it will become active.
When the Primary appliance comes back online, the Backup will sync the configuration and database
back to the Primary, and the Primary will become active again.
In environments that have Centrally Managed Appliances, the Central Visibility Manager can be
configured to be an arbiter to participate in the decision of which appliance should be active.
Requirements
• An HA license is required
• The Backup appliance must use the same physical appliance type or same hypervisor. Mixing and
matching of physical \ virtual appliances is not supported.
• The appliances trunk port configurations should be similar, but with unique IP addresses
• The Primary and Backup appliances should be deployed on the same VLAN
• Appliances must be able to ping its default gateway
• Appliances should not be configured for Inline Enforcement (a different HA design is
recommended for Inline appliances)
144
Easy NAC: CGX Access Guide
• If configured with the CVM as the arbiter, each appliance pair will use a unique arbiter port
Tip: Before configuring HA, have a recent backup of the Primary Appliance.
The Primary unit is the main appliance where configurations are made.
Note: If the Primary unit is already in production, then Enforcement should be placed in Monitor mode
until the HA setup is complete.
• Set the account for Inter-CGX Access communication. The same username and password
credentials will also need to be set on the Backup appliance.
• Check box to make Primary CGX Access Server
• Configure the IP address of the Backup appliance (Peer CGX Access Address)
145
Easy NAC: CGX Access Guide
• Click Submit. You will be warned that the Backup should not already be configured. It’s OK for
the backup unit to be on the network, but it should not yet be configured for HA.
• You will be logged out of CGX-Access and the changes will take effect. Please wait 2-5 minutes
before logging back in.
• Within 2-5 minutes the Primary appliance will be in HA mode.
Note: The Backup will not be reachable until it has also been configured for HA
The Backup unit will pull its configuration from the Primary unit, so only IP Addresses and network
configurations need to be pre-configured. Except for the appliance’s IP addresses, other network settings
should be identical.
Note: Before configuring the Backup unit, the Primary unit must first be configured for HA, as instructed
above.
146
Easy NAC: CGX Access Guide
• Set the account for Inter-CGX Access communication. The username and password credentials
must match what was previously configured on the Primary unit.
• In the “Peer CGX Access Address” configure the IP address of the Primary appliance
• Click Submit. You will be warned that the Primary unit should be in HA mode and in working
state.
• You will be logged out of CGX-Access and the changes will take effect. The configuration and
database will be sync’d from the Primary. This will take some time, so please wait 5-10 minutes
before logging back in.
• Within 5-10 minutes the appliance will be in HA mode and show the Primary as Active.
147
Easy NAC: CGX Access Guide
Note: When in Backup mode, only the Configuration menu will be available.
Tip: Before configuring HA, have a recent backup of the Primary Appliance.
In environments that have Centrally Managed Appliances, the Central Visibility Manager can be
configured to be an arbiter to participate in the decision of which appliance should be active.
Note: In environments with reliable network connectivity to the CVM, having the CVM provide this
independent arbiter functionality is recommended. However, if connectivity is inconsistent this
could prevent the fail-over to the backup unit from occurring. Therefore, in environments with
inconsistent connectivity, it’s best not to use the CVM as an arbiter.
148
Easy NAC: CGX Access Guide
• Configure a unique port for each appliance pair. If there will be 5 HA sets of appliances, then
configure 5 unique ports, starting from port 27018.
The Primary unit is the main appliance where configurations are made.
Note: If the Primary unit is already in production, then enforcement should be placed in Monitor mode
until HA setup is complete.
• Set the account details for Inter-CGX Access communication. This doesn’t need to change if the
appliance was already being centrally managed. These setting should match the CVM.
149
Easy NAC: CGX Access Guide
• Check box to make Primary CGX Access Server
• Configure the IP address of the Backup appliance (Peer CGX Access Address)
• If using CVM as an Arbiter than specify a unique port that has been configured on the CVM.
(optional)
• Click Submit. You will be warned that the Backup should not be configured. It’s OK for the
backup unit to be on the network, but it should not yet be configured for HA.
• You will be logged out of CGX-Access and the changes will take effect. Please wait 2-3 minutes
before logging back in.
• Within 2-3 minutes the Primary appliance will be in HA mode.
Note: The Backup will not be reachable until it has also been configured for HA.
150
Easy NAC: CGX Access Guide
Configure the Backup unit
The Backup unit will pull its configuration from the Primary unit, so only IP Addresses and network
configurations need to be pre-configured. Except for the appliance’s IP addresses, other network settings
should be identical.
Note: Before configuring the Backup unit, the Primary unit must first be configured for HA, as instructed
above.
• Set the account details for Inter-CGX Access communication. This doesn’t need to change if the
appliance was already being centrally managed. These setting should match the CVM.
• In the “Peer CGX Access Address” configure the IP address of the Primary appliance
• Click Submit. You will be warned that the Primary unit should be in HA mode and in working
state.
151
Easy NAC: CGX Access Guide
• You will be logged out of CGX-Access and the changes will take effect. The configuration and
database will be sync’d from the Primary, so please wait 5-10 minutes before logging back in.
• Within 5-10 minutes the appliance will be in HA mode and show the Primary as Active.
Note: When in Backup mode, only the Configuration menu will be available.
• Login into the Central Visibility Manager, on Dashboard scroll down to verify HA status is shown
correctly.
152
Easy NAC: CGX Access Guide
Making HA Configuration Changes
If it’s necessary to make changes to a working HA setup, please be sure to follow the steps outlined
below:
Replace a Primary
Replace a Backup
1. Disable Enforcement
2. Change Backup to Standalone mode
3. Restore Primary
4. Rejoin Backup to HA
5. Re-enabled Enforcement
1. Disable Enforcement
2. Change Backup to Standalone mode
3. Update Primary, Backup
4. Rejoin Backup to HA
5. Re-enabled Enforcement
153
Easy NAC: CGX Access Guide
Central Visibility Manager
CVM Overview
It’s common to deploy multiple CGX Access appliances in multiple offices. In these scenarios where
more than one CGX Access appliance is deployed it is beneficial to use the Central Visibility Manager
(CVM) for an organization-wide visibility and management of these appliances.
The Central Visibility Manager doesn’t perform monitoring and enforcement actions itself. It’s used for
consolidated reporting and management of multiple appliances.
Required Ports
For normal operation the following ports should be allowed between CVM and the centrally managed
appliances:
TCP 443 – Administrative GUI and Synchronization
TCP 10101 – for Synchronization
It may also be necessary to allow TCP 21 from a management subnet to the centrally managed appliances,
so agent policies and software updates can be uploaded to the distributed appliances.
154
Easy NAC: CGX Access Guide
Configuring a Central Visibility Manager
The Central Visibility Manager uses the same appliance image as the normal CGX Access appliance, so
the initial setup will be like setting up a CGX Access appliance.
Note: The CVM is licensed separately and has a unique CVM license required to operate.
Basic IP configuration
• For physical appliances, use a direct connect ethernet cable for SSH access to the default IP
Address 10.0.0.250/24. Alternatively, plug-in a keyboard and HDMI monitor.
• For virtual appliances open a console window and power on the VM.
Once the boot cycle is complete you will be prompted for a login.
• Login as admin/admin.
• From the main menu choose 1 (Run setup wizard) and follow the prompts to set the Managed IP
address and netmask, the default gateway, DNS servers, system name, time zone and date/time.
Note: Keep the admin password in a safe place. If it is lost, without having access to an alternate admin
level account, there will be no way to recover the password.
• admin - used for initial setup and configuration as well as SSH access for maintenance tasks
• cguser - used for uploading files through ftp
When the setup wizard completes, the system should be accessible on the network.
• Confirm that you can ping the management IP from another system on the same subnet and also
from a system on another subnet. If the pings fail double check the physical or virtual connections
and the basic IP configuration
• Connect to the CGX Access web GUI by opening https://<Managed ip> (that was configured
previously)
155
Easy NAC: CGX Access Guide
Login as user admin (default password admin). A modern browser such as Chrome is strongly
recommended. Older versions of IE or Firefox may not display the pages correctly.
The License Manager will show the maximum number of GX Access appliances that CVM can manage.
If using a Distributed license, you will also see the number of devices that can be managed, and the
current allocation of the license. With the distributed license, customers can allocate the license across
156
Easy NAC: CGX Access Guide
different appliances, as shown below.
Once the initial configuration is done the new server can be switched to a Central Visibility Server.
• Set both the Site name and an account for Inter-CGX Access communication.
◦ If left blank the site name will be the default of Central Visibility Manager
◦ Site Name should only consist of the characters A-Z, a-z, 0-9, and _
◦ The username and password credentials are only used to secure Inter-CGX traffic. They do
not need to correspond to any actual account.
• Click Submit. You will be logged out of CGX-Access and the changes will take effect.
157
Easy NAC: CGX Access Guide
Configuring an Appliance to be Centrally Managed
Once a Central Visibility Manager has been configured, new or existing standalone CGX Access
appliances can be configured to be manageable from CVM.
If the CGX-Access appliance will be a new deployment and not a conversion of an existing Standalone
appliance, first perform an Initial Configuration as covered on Page 14. At a minimum, the appliance
should have:
Once the server has a basic configuration it can be switched to a Centrally Managed Appliance:
• Set the Site name, Central Visibility Manager IP Address, and the account for Inter-CGX Access
communication.
◦ Site Name should only consist of the characters A-Z, a-z, 0-9, and _
◦ The username and password credentials must be the same as those set on the Central Visibility
Management Server.
• Click Submit. You will be logged out of CGX-Access and the changes will take effect.
• Within two minutes device data should be replicated to the Central Visibility Manager.
158
Easy NAC: CGX Access Guide
Deployment Manager
The Central Visibility Manager includes a Deployment Manager that is used to accelerate deployments or
configuration changes among different CGX Access appliances.
1. Specify a name
2. Select the Source appliance to copy the settings from
3. Choose which settings to include in the Deployment set
4. Click Save
159
Easy NAC: CGX Access Guide
4. Confirm the Push
Software Updates
Deployment Manager can also be used to update software across multiple appliances at the same time.
160
Easy NAC: CGX Access Guide
• Once uploaded, go to Configuration → Deployment Manager → Software Update tab
• Choose the correct image, complete checksum: and file size:
• Select the appliances to be upgraded and click Upgrade
The images will be downloaded to the appliances and if the Checksum and file size are accurate, each
appliance will be upgraded. Allow 15-30 minutes for upgrades to occur. The appliances will be
rebooted after the upgrade is complete.
Note: The CVM should use the same software version as the remotes. As a best practice, it’s
recommended to first upgrade the centrally managed appliances, before upgrading the CVM
itself.
161
Easy NAC: CGX Access Guide
In the above example, only “BYOD” registered devices and devices flagged as “AD-Managed” will
be allowed to roam from either of the sites. These roaming devices will be flagged “Roaming”, so
using this “Roaming” flag, the devices can be assigned limited access to the network, as desired.
162
Easy NAC: CGX Access Guide
Central Visibility Manager – Integration Proxy
When integrating with 3rd party security solutions, it can be useful to use the CVM to act as an integration
Proxy. Using this proxy feature, the Central Visibility Manager will integrate directly to the 3rd-party
servers. The CVM would then share this integration data with the Centrally Managed Appliances. This
architecture would aid deployments and minimize the load on the 3rd party servers.
163
Easy NAC: CGX Access Guide
Centrally Managed Appliance Configuration
Note: Each Centrally Managed Appliance would still be able to set their own policies.
164
Easy NAC: CGX Access Guide
Maintenance and Support
Upgrading firmware
Firmware updates may be provided by InfoExpress to upgrade the CGX Access with new functionalities
or fix existing issues. A binary update file (BIN file) will be provided with a checksum and file size. An
example of the BIN file may be CGX-Access-3.0.201208.BIN, with a checksum of 2977226413 and file
size of 365779928.
Upgrading the firmware of the CGX Access can be done via the web interface
The CGX Access will warn of loss of connectivity, and then may ask for a reboot. Connectivity will be
lost, and you will have to reconnect if an SSH session was used. Allow 5-15 minutes for upgrade to occur.
165
Easy NAC: CGX Access Guide
Collecting Logs (Dump2)
For troubleshooting purposes, InfoExpress support may ask administrators to collect Dump2 Logs.
Note: Before collecting dump2 logs, please check with Support if you need to enable debug logging and
the duration of logging required.
• Wait for few minutes, as advised by Support, before collecting the logs.
166
Easy NAC: CGX Access Guide
Collecting Logs (Web GUI method)
• Wait for Dump process to complete – It may take 5 to 15 minutes depending on number of
endpoints. Longer if the system has had core dumps.
• Once complete, download the file and send to support.
Note: If the web interface is not available, the SSH CLI method can be used to collect the logs.
167
Easy NAC: CGX Access Guide
Collecting Logs (SSH CLI method)
• FTP to CGX Access appliance with Admin account to download the logs and send to support.
168
Easy NAC: CGX Access Guide
Appendix A – Facebook Login App Setup
CGX Access can authenticate a guest user via their Facebook account. Technically, Facebook allows
authentication to a Facebook App only. For the authentication to work, we would need to create a
Facebook app for your installation.
To do so, first login your browser with a Facebook account. This is the account that would be able to see
all the login user sessions. It is recommended to have a new account setup and don’t use a personal
account for this function.
Then visit http://developer.facebook.com You will then see a screen similar to below.
169
Easy NAC: CGX Access Guide
You should then be able to see your name of the App showing on the upper left-hand corner and would
see a similar screen below
170
Easy NAC: CGX Access Guide
• Site URL: Should be replaced with the URL of your CGX Access Captive Portal
171
Easy NAC: CGX Access Guide
Under Facebook Login on the left
• Select “Settings”
172
Easy NAC: CGX Access Guide
• Replace the CAPTIVE_PORTAL_IP with your captive portal IP. The URL above is also case
sensitive.
• Save changes
• Navigate to the Basic under the Settings
• Copy the AppID and App Secret. We will need it for the configuration of the CGX Access later.
• Configure the Privacy Policy URL and the Terms of service URL as necessary.
173
Easy NAC: CGX Access Guide
• Save Changes
• Click the ON/OFF switch next to the APP ID: above. This would prompt you the screen below
• Select a category that might fit and click Confirm and then Save Changes
174
Easy NAC: CGX Access Guide
• The app is now in product. We would need to setup CGX Access now
• Login to CGX Access and under Configuration → General Settings → Guest Registration
• Check the box “Allow guest login with Facebook”
• Copy your AppID and App Secret here from your Facebook app created above.
175
Easy NAC: CGX Access Guide
• Click Save and you should now see the Login with Facebook button in the Captive Portal.
NOTE: The ACL use to restrict pending guests, must allow both DNS and internet access to Facebook.
InfoExpress has provide a default ACL named “Restrict-FaceB”.
176
Easy NAC: CGX Access Guide
Appendix B – Certificate Management
By default, CGX Access uses self-signed certificates which will not be trusted. To eliminate warnings on
untrusted certificates, third-party certificates can be uploaded to the appliance.
• Configure DNS server, Hostname, Domain Name, Hostname for Captive portal & Remediation Portal,
and IP Address for Captive portal & Remediation portal
Note: Hostnames should match as to be entered in the certificate. Some settings may not be
configurable until DNS server and Domain name is configured.
177
Easy NAC: CGX Access Guide
• Click on Generate Private Key and CSR
178
Easy NAC: CGX Access Guide
• Once you obtain the certificate from CA, Click on Upload signed certificate
179
Easy NAC: CGX Access Guide
• To Check certificate, browse CGX Access using hostname
Note: You can also browse the Captive Portal page (This example used Subject alternative name and
hence the same certificate was valid for both hostnames.)
180
Easy NAC: CGX Access Guide
Option 2 - Upload certificate and private key to CGX Access. (When
CSR is not generated)
Please note: CGX Access could be using 3 hostnames, one for management-IP, Captive portal, and
Remediation portal. Therefore, it is advised that you create a wildcard certificate. (*.domain.com)
• Configure DNS server, Hostname, Domain Name, Hostname for Captive portal & Remediation Portal
and IP Address for Captive portal & Remediation portal
Note: Hostnames should match as to be entered in the certificate. Some settings may not be
configurable until DNS server and Domain name is configured.
181
Easy NAC: CGX Access Guide
• Click on Upload Certificate and Private Key
182
Easy NAC: CGX Access Guide
Note: You can also browse the Captive Portal page (This example used Subject alternative name and
hence the same certificate was valid for both hostnames.)
183
Easy NAC: CGX Access Guide
Appendix C – vLinks Deployment
vLinks Overview
The Easy NAC solution uses CGX Access appliances for visibility and protection of the network. To
provide visibility and protection, the CGX Access appliance requires layer-2 visibility of the subnets it’s
protecting. Having layer-2 visibility at the main site can be easily achieved with trunk ports or standard
access ports. However, getting layer-2 visibility for remote sites can be more challenging. The vLinks
solution is designed to extend the reach of the CGX Access appliances so it can also protect your smaller
remote sites with cost effective hardware.
The vLinks architecture is shown below. At remote sites, a vLinks appliance is placed on the network for
layer-2 visibility. This layer-2 traffic is then tunneled back to a vLinks Central appliance. This tunneled
traffic is sent over the existing corporate WAN, so an existing WAN network is required. MPLS and
NAT’d network types are supported.
At the main site, a vLinks Central will consolidate the layer-2 traffic from multiple vLinks and share it
with the CGX Access appliance using a port directly connected to the CGX Access appliance. With this
connectivity in place, CGX Access will detect rogue devices at the branches and quarantine these devices
real-time. All Easy NAC features including compliance checks, captive portals, Automated Threat
Response, etc., are supported.
Adding vLinks to extended CGX Access protection to remote sites is a two-stage process. Stage one is to
configure the vLinks Central appliance. Once the vLinks Central appliance is configured the vLinks
Remote appliances can be configured to contact the CGX Access and download their configurations.
184
Easy NAC: CGX Access Guide
vLinks Central Setup
The vLinks Central hardware is manufactured by MicroTec. To configure this box, download the
WinBox application at https://mikrotik.com/download. Connect the appliance (adapter 1) to your PC
using an RJ45 cable and connect to it via it’s MAC address or DHCP assigned IP address.
Perform the following steps to assign a static IP, default gateway, and admin password:
185
Easy NAC: CGX Access Guide
2) Configure a default route - Go to: IP > Routes > Click +
186
Easy NAC: CGX Access Guide
3) Configure a password - Go to: System > Password
Note: Configurations changes made on vLinks Central take effect immediately, there are no added steps
required to save the configurations.
5) Physical Placement - Place the vLinks Central box on the production network using Adapter 1.
Model: VLC-5SM
6) Test connectivity – Using WinBox login into the IP address of the box. Go to: Tools > Ping to test
connectivity to default gateway and any off-subnet resource.
187
Easy NAC: CGX Access Guide
7) Connect a second cable using Adapter 2 directly into any open port on the CGX Access
Appliance. Take note of the port used on the CGX Access appliance for later configuration. This is
a direct connection between the vLinks Central and CGX Access appliance.
8) Once connected to the CGX Access Appliance, Login into CGX Access web interface.
188
Easy NAC: CGX Access Guide
9) Select Add New Server and complete the registration process
Name – Use any name to help you distinguish this vLinks Central from other vLinks Central you
may deploy.
IP Address – Use the Static IP address that was set in Step 1 above
Port – Port 1194 is the recommended default port
VLAN ID Range – A 5 port vLinks Central can support 50 remote subnets, so you can configure a
range of 50 VLAN IDs. You can use any VLAN range desired. To avoid confusion, it is
recommended these VLAN ranges be outside the range of other VLAN IDs used on your corporate
network. The 12-port vLinks Central can support 200 remote subnets, and can be configured with a
range of 200 VLAN IDs.
Username – The default username is admin
Password – The default password in blank. It recommended you create a secure admin password.
189
Easy NAC: CGX Access Guide
Once saved, the above settings will be pushed to the vLinks Central server and the vLinks Central
will be ready to accept connections from vLinks Remote network extenders.
1) To allow Auto Configuration a Config Key must be set within the vLinks Manager.
2) vLinks Remotes are configure to support DHCP by default. You can attach the vLinks Remote to
any DHCP enabled network, and then use the web interface to configure the Auto Configuration.
190
Easy NAC: CGX Access Guide
3) Configure the basic information required to sync with the CGX Access Appliance – Go to:
System > Auto Configuration
vLink Name – Any name to help you distinguish this vLinks Remote from other sites
CGX-Access – Provide the Management IP address of the CGX Access that the vLinks Central is
attached to. It will use this IP to download the auto configuration.
Config Key – This key must match the key configured in CGX Access to allow the automated
configuration downloads
IP Proto – Use this field to change to a Static IP if required. For simplified deployment, DHCP
is recommended as each vLinks Remote will have the same configuration and can then be used
on any network.
NTP Server – A NTP server is critical to maintain time-sensitive tunnels with the vLinks
Central. Warning: If time is out of sync, the connection to the vLinks Central will fail.
191
Easy NAC: CGX Access Guide
Auto DNS – It’s recommended to use DNS server where available
Static IP - When assigning a Static IP address, it will take a few extra steps to set the
configuration.
A. Configure all auto configuration settings including the CGX-Access address and
configuration key with the Static IP and prefix (the netmask).
B. Save and Apply Changes. A message will be shown that it Failed to confirm. This is
expected if the IP address has changed.
C. Move the vLinks Remote to a network you can access the new IP address and login again.
Verify all the Auto Configuration settings are correct. If not, set all the Auto-configuration
settings, and Save and Apply again. This time a confirmation should be shown that the
Configuration has been applied.
Tip: To perform the verification in step C, it may be useful to set a static IP on your laptop
and connect directly to the vLinks remote.
4) Physical Placement - Place the vLinks Remote box on the remote network using Adapter 1 (eth0).
Adapter 1 is used for tunneling Layer-2 traffic from the remaining 4 ports (eth1-eth4) back to the
CGX Access appliance.
192
Easy NAC: CGX Access Guide
Adapter 1 is not protected, so if this subnet needs protection, a second cable should be attached to
Adapter 2 (eth1). Each vLinks Remote can protect 4 subnets.
5) Accept vLinks Remotes - Once placed on the remote networks the vLinks Remotes will connect to
CGX Access to request configurations.
Configuration > vLinks Manager Click the Accept button as shown below.
Once Accepted the vLinks Remote will be shown in your vLinks list.
6) The last step is to configure the CGX Access Adapter settings to protect the remote segments. On
the CGX Access appliance take note of which adapter the vLinks Central was plugged into, during
Step 7 of the vLinks Central setup.
On the web GUI - Go to: Configuration > Appliance. Click the + button next to the appropriate
adapter to add a VLAN
193
Easy NAC: CGX Access Guide
VLAN ID – Specify any unique VLAN ID that was defined during the vLinks Central. Normally
1-50 by default. On vLinks Remote each Adapter(eth1-eth4) that is active will use a VLAN ID.
DHCP \ Static – Each adapter(eth1-eth4) will use an IP address if the port is active. If using
DHCP this address will be auto assigned. If using a Static environment, the Static IP is
configured in this step.
vLinks – Use the dropdown box to select the appropriate vLinks for this remote network. If the
vLinks box is not shown, confirm it has been accepted during the Auto Configuration stage.
Note: This process would be repeated for each remote subnet that is be to protected. Up to 4
subnets per vLinks.
Once network additions have been made, click the Submit button to activate changes. There will
be a delay as each subnet using DHCP will requests an IP assignment.
If successful you will see an IP address has been obtain, and device monitoring will be active.
Go to: NAC > Network Map
194
Easy NAC: CGX Access Guide
Deployment is complete and devices from the remote sites will now be shown in the System
Overview and the Device Manager, just as other devices are.
Warning: A NTP server is critical to maintain time-sensitive tunnels with the vLinks Central. If
time is out of sync, the connection to the vLinks Central will fail.
195
Easy NAC: CGX Access Guide
Appendix D – Inline Enforcement
Inline Enforcement Overview
The Inline Enforcement Module (Inline EM) controls access to the network through an Access Control
List associated with the outside NIC. This module can be used to control access for remote access servers,
remote access VPNs, and site to site VPNs.
The Inline EM is available in the EasyNAC product family with CGX Access appliances. When using the
Inline EM, the CGX Access appliance is placed in between the network and the network access device,
such as a remote access VPN server.
Features
The Inline EM supports the following features:
• Bridges traffic to avoid network topology changes
• Optimized to handle continuous high traffic loads
• Option for automatic failover through STP or KSTP if a redundant server is present
Requirements
• CGX Access must be physically placed between the inside (trusted) network and the remote
access gateways such as VPN concentrators.
• Physical Appliance or virtual appliance with a least two network interfaces
• Endpoint Systems must use agents to pass a compliance check.
• VPN must pass TCP 11698 into the network (Agent uses TCP 11698)
• VPN Server must use an IP Pool, so every connected device has a unique IP address.
196
Easy NAC: CGX Access Guide
Sample Test Network
This is a minimal configuration to test and evaluate the Inline EM. Although company networks are not
this simple, it can be used to test the features in a controlled test environment. All systems in this
configuration are connected to the same subnet.
CGX Access is placed between a single PC which simulates the remote system, and the rest of the LAN
which represents the inside network. The inside NIC is connected to the switch closest to the internal
network, and the outside NIC is connected to the remote system.
The agent communicates with the Managed IP or the bridge virtual IP address.
Note: If the remote PC is connected directly to CGX Access, a crossover cable may be required.
Configuration
This Configuration steps for the Inline EM consist of:
197
Easy NAC: CGX Access Guide
Location
The Inline EM restricts traffic from remote systems, so the outside NIC must face the remote access
servers and the inside NIC must face the internal network. When using the Inline EM, CGX Access is
usually placed between the VPN and the default router on the network. The Inline EM bridges traffic so
network routing tables do not need to be changed.
With this configuration, remote agents communicate to CGX Access Management IP or bridge IP
address. The bridge IP is virtual and is recommended for deployments where multiple inline appliances
have been deployed to ensure scalability and compatibility with other addresses.
Network Interfaces
To Setup the Inline Enforcement
198
Easy NAC: CGX Access Guide
• Submit Changes (reboot will be performed)
Note: by default, inline enforcement will be disabled so unintended enforcement will not occur.
Bridge IP
When endpoint access is controlled by the Inline EM, agents should audit with either the CGX Access
Management IP or the Bridge IP address.
The Bridge IP allows for optimal scalability. Traffic to the bridge IP address is transparently intercepted
when received on CGX Access appliances through the outside NIC. Using the same bridge IP address is
important when there are multiple CGX Access servers deployed in Inline mode. Larger organizations
may have dozens or even hundreds of remote access points. Keeping track of all the corresponding CGX
Access addresses for each entry point would be a management burden. By using the same bridge IP
address for all audits, CGX Access avoids this problem.
The bridge IP address can be any IP address that the VPN will route to the inside (trusted) network
through the bridge interface on the CGX Access server. This ensures connections from agents can audit
with the CGX Access appliances. The default bridge IP address is 198.151.234.241/255.255.255.255
The Inline EM has its own ACL that is optimized for high through-put. To edit the ACL click the
Configure button.
199
Easy NAC: CGX Access Guide
The default Global ACL settings will allow agents to audit with the appliance over TCP 11698. DNS and
DHCP traffic is also allowed to pass through the appliance, even when restricted. TCP 11698 is the port
the CyberGatekeeper agent uses to audit with the appliance.
When a device is passing an agent audit, all traffic will be allowed to pass through.
You can customize the Global ACL to allow remediation resources. In the example below, a restricted
devices can still access the server on 192.168.253.100. This may be an AV update server, or other server
you wanted restricted devices to have access to.
It is often useful to setup a Remediation web page, so you can direct user to a help portal. The ACL
example below, will redirect Http traffic to the Remediation server on 192.168.253.222
For additional help with the ACL, you can click the Help button.
200
Easy NAC: CGX Access Guide
Enforcement Ranges
When working with Inline enforcement it’s common to need to limit the range of IP addresses that are
subject to enforcement. For example, if deployed behind a Firewall \ VPN, you would want to set the
enforcement range to only include on the IP ranges of the VPN IP pool. When this is setup, only remote
VPN users would be required to pass an agent audit. Note: For Testing purpose, you may want to limit the
range to just one IP.
• Click on Configure
• Complete the Start IP and End IP of the range and Click Submit
• When all ranges have been specified – Click “Upload to Server” button
201
Easy NAC: CGX Access Guide
Agent Requirement
The Inline Enforcement Module requires the use of agents on the remote endpoints.
Easy NAC virtual appliances come with default agents and default polices that can be used for testing or
as a baseline to start building your custom compliance policies. An agent license is required to use the
agents.
To customize the policies or agent, you will need to install the CyberGatekeeper Policy Manager
(CGPM). Contact InfoExpress or your partner for the CGPM installer.
End of Document
202
Easy NAC: CGX Access Guide