The Enterprise Resources settings in the Management Console configure Wi-Fi and VPN access for devices enrolled in your domain. There are three types of enterprise resources that you can configure: Wi-Fi, VPN and Certificates. These resources are made available to devices through the Network Policy and Certificate Distribution policy respectively.
From the Settings section, click Enterprise Resources List from the left panel. The Enterprise Resources page appears with a list of the enterprise resources details.
The Enterprise Resources List Page includes five tabs:
By default, Wi-Fi tab is set to active.
The list view displays a list of all the Wi-Fi networks along with other details. You can search Wi-Fi networks based on each column and also sort on each column.
The Wi-Fi List page displays the following columns:
Columns | Description |
---|---|
Wi-Fi Name | The name of this Wi-Fi network entry. This field is for your reference and should not match the SSID of the network |
Service Set Identifier | The Wi-Fi network's SSID. This is the name that a network broadcasts to identify itself, and that computers use to join it. SSIDs are case-sensitive. |
Security Type | Displays the types of security. |
Created By | Displays the names of the Administrators. |
Last Modified on | Displays when the Wi-Fi connection was last modified. |
You can scroll the list view through the Previous and the Next buttons.
You can perform the following activities from the Wi-Fi page:
To create a new Wi-Fi connection, follow these steps:
The New Wi-Fi window appears.
The newly created Wi-Fi appears in the list view.
The Wi-Fi details page appears.
Click the Cancel button to close the window.
Important: When an Android device is applied with a Wi-Fi policy that is a hidden network type, then the same hidden network is not configured on the device of a user.
Not all WiFi types are supported on all platforms. Based on the WiFi you select, features available for each platform may vary. See the table below for more information.
WiFi Type | Platform | Features/Fields |
---|---|---|
Open | iOS |
Auto Join, Proxy Type, Proxy Server Username, Proxy Server Address, Proxy Server Port, Proxy Server Password, Is this WiFi a hotspot. |
Android | No configuration required | |
Windows |
Security, Encryption type, Network Security Key, Key Index, Connect automatically, Connect even if non-broadcasting. |
|
WEP | iOS |
Password, Auto Join, Proxy Type, Proxy Server Username, Proxy Server Address, Proxy Server Port, Proxy Server Password, Is this WiFi a hotspot. |
Android | Password | |
Windows | This security type is not supported on the Windows platform. | |
WPA/WPA2 | iOS |
Password, Auto Join, Proxy Type, Proxy Server Username, Proxy Server Address, Proxy Server Port, Proxy Server Password, Is this WiFi a hotspot. |
Android | Password | |
Windows |
Security, Encryption type, Network Security, Key, Key Index, Connect automatically, Connect even if non broadcasting, Enable FIPS (Federal Information Processing Standard). |
|
Any (Personal) | iOS |
Password, Auto Join, Proxy Type, Proxy Server Username, Proxy Server Address, Proxy Server Port, Proxy Server Password, Is this WiFi a hotspot. |
Android | This security type is not supported on the Android platform. | |
Windows | This security type is not supported on the Windows platform. | |
WEP (Enterprise) | iOS |
Auto Join, Proxy Type, Proxy Server Username, Proxy Server Address, Proxy Server Port, Proxy Server Password, Accepted EAP types, Identity Certificate, Username, Use per connection password, Password, Inner Authentication, Outer identity, Trusted certificates, Trusted certificate names, Is this WiFi a hotspot. |
Android | This security type is not supported on the Android platform. | |
Windows | This security type is not supported on the Windows platform. | |
WPA/WPA2 (Enterprise) | iOS |
Auto Join, Proxy Type, Proxy Server Username, Proxy Server Address, Proxy Server Port, Proxy Server Password, Accepted EAP types, Identity Certificate, Username, Use per connection password, Password, Inner Authentication, Outer identity, Trusted certificates, Trusted certificate names, Is this WiFi a hotspot. |
Android | This security type is not supported on the Android platform. | |
Windows |
Security Type, Encryption Type, Connect Automatically Connect even if non-broadcasting, Network Authentication Method, Validate Server’s identity certificate, Connect to these servers, Servers, Trusted Root CAs, Notifications before Connecting, Use Windows Log On Name, Enable Fast Reconnect, Enforce Network Access Protection, Crypto-Binding, Enable Identity, Privacy Anonymous Identity, Use EAP, Client Authentication Type, Enable Single Sign On, Single Sign On Type, Maximum Delay, Allow additional dialogs, Use Separate virtual LANs for Machine and User Authentication, PMK Caching, PMK Time to Live (minutes), Number of entries in PMK Cache, Use Pre-Authentication, Number of pre-auth attempts, Enable FIPS. |
|
Any (Enterprise) | iOS |
Auto Join, Proxy Type, Proxy Server Username, Proxy Server Address, Proxy Server Port, Proxy Server Password, Accepted EAP types, Identity Certificate, Username, Use per connection password, Password, Inner Authentication, Outer identity, Trusted certificates, Trusted certificate names, Is this WiFi a hotspot. |
Android | This security type is not supported on the Android platform. | |
Windows | This security type is not supported on the Windows platform. | |
802.1X EAP | iOS | This security type is not supported on the iOS platform. |
Android |
Use Two Factor Authentication, EAP Method, Phase 2 Authentication, CA Certificate, Identity Certificate, Identity, Anonymous Identity, Password. |
|
Windows |
Security Type, Encryption Type, Connect Automatically Connect even if non-broadcasting, Network Authentication Method, Use Strong Cipher Kets, Don't reveal permanent ID if pseudonym present, Enable usage of Realms, Realms, Use Simple Certificate Selection, Use a different Username for Connection, Cache User settings, Validate Server’s identity certificate, Connect to these servers, Servers, Trusted Root CAs, Don't prompt user if unable to authorize server. Notifications before Connecting, Use Windows Log On Name, Enable Fast Reconnect, Enforce Network Access Protection, Crypto-Binding, Enable Identity, Privacy Anonymous Identity, Use EAP, Client Authentication Type, Enable Fast Re authentication, Enable Single Sign On. |
To update a Wi-Fi, follow these steps:
You can update details under four tabs, Description, iOS, Android, and Windows Phone 8.x. By default the Description tab is set to active.
Wi-Fi settings enhanced support for enabling the device to become a Wi-Fi hot spot using the device’s data connection.
Wi-Fi Hot spot 2.0
You can enable a Wi-Fi hot spot on your device by configuring the fields shown below.
Click the Remove button if you wish to remove added entries.
Click the Cancel button to close the window.
Click the Cancel button to close the window.
Set Wi-Fi configuration for Windows Phone 8.x platform for the following fields.
Click the Cancel button to close the window.
You can access the newly added Wi-Fi for both the operating systems through following links:
You can search for a desired Wi-Fi through the available search filters. You can apply a single filter or a combination of search filters to define the search criteria.
To search for a Wi-Fi, follow these steps:
To delete a Wi-Fi connection, follow these steps:
The list view displays a list of all VPN configurations along with other details. You can search VPN configurations based on each column and also sort the configurations based on each column.
The Enterprise Resources List page displays the following columns:
Columns | Description |
---|---|
VPN Connection Name | Displays name for the VPN network entry |
Host Name of VPN Server: | Displays full server host name of the server that provides access to the VPN |
Created By | Displays the names of the administrators |
Last Modified On | Displays when the VPN connection was last modified |
You can scroll the list view through Previous and the Next button.
You can perform the following activities from the VPN page:
To create a new VPN, follow these steps:
To open the Add VPN window, click the + New VPN button next to the + New Wi-Fi button at the top of the page.
The Add VPN window appears.
The newly created VPN network appears in the list view.
Click the Cancel button to close the window.
You can update details under four tabs: Description, iOS, Android, and Windows Phone 8.x. By default the Description tab is set to active.
Enter the appropriate description for the VPN, or if required, update the existing content.
The administrator can allow for On-Demand VPN to configure rules for VPN connections based on domains. Based on the domain accessed on a device, a VPN connection is established automatically.
The Following are rules for VPN connections:
Administrators must enable On-Demand VPN. The administrator must specify which action should be performed by default among four actions:
To configure OnDemand VPN, follow these steps:
In User Authentication, select the Certificate option.
Click the Add button to add more domains. Click the Remove button to remove added domain details.
When you select the IKEv2 (Internet Key Exchange protocol) type from the VPN list, in addition to the fields that are available for every other VPN type, a new section IKEv2 appears. The fields in the IKEv2 section follow:
Field | Description |
---|---|
Always-on VPN | Configure this to Yes if you want the VPN always on. |
Disable Automatic Connection | Configure this to Yes if you want to disable a device from automatically connecting to the VPN. |
Same Tunnel for Cellular & Wi-FI | Configure this to Yes to allow both the cellular and the Wi-Fi networks to use one tunnel. |
Remote Address | Enter the remote IP address of the hostname of the VPN server. |
Local Identifier | Enter details of the local identifier. |
Remote Identifier | Enter details of the remote identifier. |
Authentication Method | Select an authentication method for the VPN. Options are Shared Secret, and Certificate. |
Shared Secret | Enter Shared Secret details. This option is available when you select Shared Secret from the Authentication Method type. |
Certificate | Select the certificate from the available VPN certificates list. If you did not create any certificates, none will appear. This option is available when you select Certificate from the Authentication Method type. |
Server Certificate Issuer Name | Enter the server certificate issuer name. This option is available when you select Certificate from the Authentication Method type. |
Server Certificate Common Name | Enter the server certificate common name. This option is available when you select Certificate from the Authentication Method type. |
Enable EAP (Extensible Authentication Protocol) | Select Yes to enable EAP. |
EAP Authentication |
Select the EAP authentication type from the list. The options are: UserName/Password and Certificate. |
Auth Name | Enter the authentication user name. This option is available when you select UserName/Password from the EAP Authentication list. |
Auth Password | Enter the authentication password. This option is available when you select UserName/Password from the EAP Authentication list. |
Certificate | Select the certificate from the available EAP certificates list. If you did not create any certificates, none will appear. This option is available when you select Certificate from the EAP Authentication list. |
Select the interval time for Dead Peer Detection interval. Options are: None, Low (1 hour), Medium (30 minutes), and High (10 minutes). | |
Encryption Algorithm (IKE Security Association Parameters) |
Select the encryption algorithm from the list. Options are: DES, 3DES, AES-128, and AES-256. |
Integrity Algorithm (IKE Security Association Parameters) |
Select the integrity algorithm from the list. Options are: SAH 1-96, SHA 1-160, SHA 2-256, SHA 2-384, and SHA 2-512. |
Diffie Hellman GroupThe Diffie–Hellman key exchange method allows two parties that have no prior knowledge of each other to jointly establish a shared secret key over an insecure channel. This key can then be used to encrypt subsequent communications using a symmetric key cipher.
(IKE Security Association Parameters) |
Select the Diffie-Hellman group from the list. |
Lifetime in minutes (IKE Security Association Parameters) |
Enter the lifetime of the IKE security in minutes. |
Encryption Algorithm (Child Security Association Parameters) |
Select the encryption algorithm from the list. Options are: DES, 3DES, AES-128, and AES-256. |
Integrity Algorithm (Child Security Association Parameters) |
Select the integrity algorithm from the list. Options are: SAH 1-96, SHA 1-160, SHA 2-256, SHA 2-384, and SHA 2-512. |
Diffie Hellman Group (Child Security Association Parameters) |
Select the Diffie-Hellman group from the list. |
Lifetime in minutes (Child Security Association Parameters) |
Enter the lifetime of the IKE security in minutes. |
If a VPN is assigned by default, all communications to the Internet go through the VPN. VPNs are applied at the device level.
Per App VPN is an iOS 7 feature that allows administrators to assign VPNs at app level for enterprise apps, and public apps. If Per App VPN is assigned, all communications to the Internet go through the assigned Per App VPN.
Important: Per App VPN is available only for the VPN type Cisco AnyConnect.
To assign a Per App VPN to an app, the "Use Configuration for Per App VPN' must be Yes. Only then can Per App VPN can be assigned to an app.
To define Per App VPN to an app, follow these steps:
Per App VPN must be defined while creating a new VPN or updating a VPN. Ensure that a VPN is configured before defining Per App VPN. For more details, refer to Creating VPN.
Important: Ensure that the Configure for Type field is Cisco AnyConnect.
Only if the Use Configuration for Per App VPN is set to Yes will system display the Automatically Use VPN options. By default the Use Configuration for Per App VPN is set to No. Admin can also choose whether the assigned VPN to be started automatically.
If the Automatically Use VPN option is set to No, the device user is asked to manually choose for the assigned Per App VPN while accessing Internet from the device.
Note: When you select No, a warning appears. All network traffic will be forced through this VPN. It is recommended to whitelist the EMM Server else if an invalid VPN configuration is pushed, all communication to and from the device will fail, leaving the device permanently offline.
You can search a desired VPN connection through search filters available. You can apply a single search filter or a combination of search filters to define the search criteria and refine the outcome.
To search for a VPN connection, follow these steps:
To delete a VPN, follow these steps:
The deleted VPN is removed from the list view.
The list view displays a list of all the Certificates along with other details. You can search Certificates based on each column and also sort on each column.
The Certificates page displays the following columns:
Columns | Description |
---|---|
Certificate Type | Displays the Certificate Name. |
Certificate Name | Displays the type of Certificate, such as VPN. |
Created By | Displays the name of the Administrator who created the Certificates. |
Created on | Displays the date on which the Certificate was created. |
You can scroll the list view through the Previous and the Next buttons.
You can perform the following activities from the Certificates page:
To create a new Certificate, follow these steps:
The Add Certificate window appears.
Note: Ensure that the length of the certificate name is maximum 15 characters.
The newly created Certificate appears in the list view.
The Certificate details page appears.
You can update details of certificates.
To update a Certificate, follow these steps:
Click Save & Continue to save the changes and stay on the same page.
You can search a desired Certificate through search filters available. You can apply a single or a combination of search filters to define the search criteria and get the refined outcome.
To search for a Certificate, follow these steps:
To delete a Certificate, follow these steps:
The deleted Certificate is removed from the list view.
Through Airplay, you connect screen sharing between your iOS 7+ device and Apple TV or Mac. Configure the settings for destination device ID and password.
Using AirPrint, you can print from your iOS7+ device. Configure the settings for IP addresses and resource path.
Copyright © 2018 Kony, Inc. All rights reserved. |