Contents
xii
Restarting NAC 800 System Processes
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-4
Downloading New Tests
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-5
System Settings
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-6
DNS/Windows Domain Authentication and Quarantined Endpoints . . . . 15-6
Matching Windows Domain Policies to NAC Policies . . . . . . . . . . . . . . . 15-7
Setting the Access Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-8
Naming Your Enforcement Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-8
Changing the MS Host Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-9
Changing the ES Host Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-9
Changing the MS or ES IP Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-9
Resetting your System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-9
Resetting your Test Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-11
Changing Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-12
Specifying an Email Server for Sending Notifications . . . . . . . . . . . . . . 15-13
Entering Networks Using CIDR Format
. . . . . . . . . . . . . . . . . . . . . . . . . . 15-14
Database
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-15
Creating a Backup File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-15
Restoring from Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-15
Restoring the Original Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-16
Generating a Support Package . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-16
Supported VPNs
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-17
End-user Access Windows
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-18
How NAC 800 Handles Static IP Addresses
. . . . . . . . . . . . . . . . . . . . . . . . 15-19
Managing Passwords
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-20
Resetting the NAC 800 Server Password . . . . . . . . . . . . . . . . . . . . . . . . 15-21
Resetting the NAC 800 Database Password . . . . . . . . . . . . . . . . . . . . . . 15-22
Changing the NAC 800 Administrator Password . . . . . . . . . . . . . . . . . . 15-22
When the Password is Known . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-22
When the Password is Unknown . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-22
Working with Ranges
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-24
Creating and Replacing SSL Certificates
. . . . . . . . . . . . . . . . . . . . . . . . . . 15-26
Creating a New Self-signed Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . 15-26
Using an SSL Certificate from a known Certificate Authority (CA) . . . 15-28
Moving an ES from One MS to Another
. . . . . . . . . . . . . . . . . . . . . . . . . . 15-30
Recovering Quickly from a Network Failure
. . . . . . . . . . . . . . . . . . . . . . . 15-31
VLAN Tagging
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-32
iptables Wrapper Script
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-35
Supporting Network Management System
. . . . . . . . . . . . . . . . . . . . . . . . . 15-36
Summary of Contents for 800 Series
Page 1: ...Users Guide www procurve com ProCurve Network Access Controller 800 ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 70: ...System Configuration Management Server 3 22 Figure 3 9 System Configuration Management Server ...
Page 79: ...System Configuration User Accounts 3 31 Figure 3 12 System Configuration User Accounts ...
Page 87: ...System Configuration User Roles 3 39 Figure 3 16 System Configuration User Roles ...
Page 206: ... This page intentionally left blank ...
Page 229: ...End user Access Mac OS X Endpoint Settings 5 23 Figure 5 8 Mac System Preferences ...
Page 262: ... This page intentionally left blank ...
Page 284: ... This page intentionally left blank ...
Page 298: ... This page intentionally left blank ...
Page 302: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 303: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 305: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 308: ... This page intentionally left blank ...
Page 311: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 314: ... This page intentionally left blank ...
Page 319: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 320: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 376: ... This page intentionally left blank ...
Page 414: ... This page intentionally left blank ...
Page 421: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 474: ... This page intentionally left blank ...
Page 520: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 526: ... This page intentionally left blank ...
Page 556: ... This page intentionally left blank ...
Page 584: ... This page intentionally left blank ...
Page 585: ......