McAfee MAP-3300-SWG Product Guide - Page 247

System, Appliance Management, Time and Date, Synchronize time with client, Set Now, Start, command

Page 247 highlights

Overview of System features Users, Groups and Services Task 1 Create an Active Directory user account for the appliance to use in Kerberos authentication. Create an Active Directory user account for the appliance in the network that will use Kerberos authentication. The account must be a member of the domain users group. The account does not need administrative rights. If the network has multiple appliances, create a separate user account for each appliance. For example, if the network has two appliances, named a1 and a2, create two user accounts named k1 and k2. 2 Synchronize the time on the appliance with the time on the domain controller or KDC. This is necessary for Kerberos to work. a Open the appliance from a web browser at the Domain Controller or backup Domain controller. b On the navigation bar, select System | Appliance Management | Time and Date. c Select Synchronize time with client, and click Set Now. 3 Generate the keytab file. a On the Domain Controller, download and extract the ktpass.exe (91.136 bytes) file from the support.cab file to a temporary folder. For further details, see the article: http:// www.microsoft.com/downloads/details.aspx?familyid=96A35011-FD83-419D939B-9A772EA2DF90&displaylang=en . b On the Windows desktop, open a command prompt - click Start, Run, type command, and click OK. c Create a keytab file (scm.keytab) to be imported into the appliance - type: ktpass -princ HTTP/[email protected] -mapuser Kerberos-user1 -pass -ptype KRB5_NT_PRINCIPAL -out scm.keytab Note the capital letters for the value of the parameter, -princ. After you run this command, the keytab file is associated with the specified user account. d On the domain controller, verify that the command was performed successfully. Open Active Directory Users and Computers, and double-click the account used. Select the Account tab. Verify that the fully qualified domain name (FQDN) for the Appliance is listed correctly. For example: HTTP/ scmgateway.mcafee.local. McAfee Email and Web Security Appliances 5.6.0 Product Guide 247

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336

Task
1
Create an Active Directory user account for the appliance to use in Kerberos authentication. Create
an Active Directory user account for the appliance in the network that will use Kerberos
authentication. The account must be a member of the domain users group. The account does not
need administrative rights.
If the network has multiple appliances, create a separate user account for each appliance. For
example, if the network has two appliances, named a1 and a2, create two user accounts named k1
and k2.
2
Synchronize the time on the appliance with the time on the domain controller or KDC. This is
necessary for Kerberos to work.
a
Open the appliance from a web browser at the Domain Controller or backup Domain controller.
b
On the navigation bar, select
System
|
Appliance Management
|
Time and Date
.
c
Select
Synchronize time with client
, and click
Set Now
.
3
Generate the keytab file.
a
On the Domain Controller, download and extract the ktpass.exe (91.136 bytes) file from the
support.cab file to a temporary folder. For further details, see the article:
http://
www.microsoft.com/downloads/details.aspx?familyid=96A35011-FD83-419D-
939B-9A772EA2DF90&displaylang=en
.
b
On the Windows desktop, open a command prompt — click
Start
,
Run
, type
command
, and click
OK
.
c
Create a keytab file (scm.keytab) to be imported into the appliance — type:
ktpass -princ HTTP/[email protected] -mapuser Kerberos-user1 -pass
<password> -ptype KRB5_NT_PRINCIPAL -out scm.keytab
Note the capital letters for the value of the parameter, -princ. After you run this command, the
keytab file is associated with the specified user account.
d
On the domain controller, verify that the command was performed successfully. Open
Active
Directory Users and Computers
, and double-click the account used. Select the
Account
tab. Verify that
the fully qualified domain name (FQDN) for the Appliance is listed correctly. For example: HTTP/
scmgateway.mcafee.local.
Overview of System features
Users, Groups and Services
McAfee Email and Web Security Appliances 5.6.0 Product Guide
247