394
Building a Network Access Control Solution with IBM Tivoli and Cisco Systems
Open the file using a text editor, and find the value of the
WEB_SERVER_DOC_ROOT key in the file. In our lab this is:
C:\Program Files\IBMHttpServer\htdocs\en_US
3. Open the SoftwarePackageServerConfig.properties file located in the
following directory using a text editor:
C:\Program Files\WebSphere\AppServer\installedApps\<your_server_name>\Softw
arePackageServer.ear\SoftwarePackageServerWeb.war\WEB-INF\classes
Find the SPBBaseDirectory key in that file and replace its value with the value
extracted in step 2. Save the modified file.
4. Finally restart the WebSphere Application server with the following
commands:
cd C:\Program Files\WebSphere\AppServer\bin
stopServer.bat server1
startServer.bat server1
This ends the installation and configuration of the remediation server itself. In the
next section we describe the installation and configuration of the remediation
workflows, used to automatically remediate noncompliant workstations.
8.2.4 Installation of the Software Package Utilities
The
IISSCN extension pack2 for Tivoli Configuration Manager
contains some
sample remediation workflow definitions and utilities that can be helpful with
creating the remediation workflows for the compliance policies defined on the
Tivoli Security Compliance Manager Server. These utilities are located in the
tcmremed.tar file. To set them up:
1. Open a command prompt and set up the environment variables for the Tivoli
Management framework. Use the following command:
cmd.exe /k %SystemRoot%\system32\drivers\etc\Tivoli\setup_env.cmd
2. Change the working directory to the %BINDIR% and issue the following
command:
tar xvf <path_to_the_tcmremed.tar>
3. Configure the WorkflowPostureCollectorMapping.properties file. You can copy
and use the sample properties file provided by entering the following
commands:
cd %BINDIR%
cd tcmremed\cfg
copy WorkflowPostureCollectorMapping.properties.sample \
WorkflowPostureCollectorMapping.properties
Summary of Contents for Tivoli and Cisco
Page 2: ......
Page 16: ...xiv Building a Network Access Control Solution with IBM Tivoli and Cisco Systems...
Page 18: ...xvi Building a Network Access Control Solution with IBM Tivoli and Cisco Systems...
Page 20: ...2 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems...
Page 30: ...12 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems...
Page 56: ...38 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems...
Page 94: ...76 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems...
Page 110: ...92 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems...
Page 142: ...124 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems...
Page 225: ...Chapter 6 Compliance subsystem implementation 207 Figure 6 77 Client connection window...
Page 456: ...438 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems...
Page 458: ...440 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems...
Page 504: ...486 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems...
Page 513: ...Building a Network Access Control Solution with IBM Tivoli and Cisco Systems...
Page 514: ......
Page 515: ......