End-user Access
Test Methods Used
5-3
Test Methods Used
NAC 800 tests endpoints using one of the following methods:
■
Agent-based
■
Agentless
■
ActiveX
See “Testing Methods” on page 3-109 for a description of each of these
methods.
Agent Callback
The Agent Callback to NAC 800 feature allows the NAC 800 agent to inform
the ES that an endpoint is now active on the network and available to be tested.
This feature allows faster detection of endpoints in a network utilizing
static
IP addresses.
Upon notification of a new network connection, the agent queries DNS for all
available ESs and attempts to execute an HTTP request against each ES until
a successful request has occurred. This request causes the ES to schedule the
endpoint for testing.
The following terms are used in association with this feature:
■
Agent – The software residing on the endpoint that performs the tests.
■
Enforcement Server (ES) – The server that communicates with the
agent to initiate tests, and quarantines or allows network access
based on the test results.
■
Endpoint – The computer being tested by NAC 800.
■
SRV record – A DNS record that contains information regarding a
specific service on a network. For example, HTTP or mail.
■
A record – A DNS record that contains information regarding a
specific host name.
To enable this feature, add either SRV records or A records to your DNS
system.
The agent performs a DNS query against the server for the following SRV
names:
■
_nac
Summary of Contents for 800 Series
Page 1: ...Users Guide www procurve com ProCurve Network Access Controller 800 ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 70: ...System Configuration Management Server 3 22 Figure 3 9 System Configuration Management Server ...
Page 79: ...System Configuration User Accounts 3 31 Figure 3 12 System Configuration User Accounts ...
Page 87: ...System Configuration User Roles 3 39 Figure 3 16 System Configuration User Roles ...
Page 206: ... This page intentionally left blank ...
Page 229: ...End user Access Mac OS X Endpoint Settings 5 23 Figure 5 8 Mac System Preferences ...
Page 262: ... This page intentionally left blank ...
Page 284: ... This page intentionally left blank ...
Page 298: ... This page intentionally left blank ...
Page 302: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 303: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 305: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 308: ... This page intentionally left blank ...
Page 311: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 314: ... This page intentionally left blank ...
Page 319: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 320: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 376: ... This page intentionally left blank ...
Page 414: ... This page intentionally left blank ...
Page 421: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 474: ... This page intentionally left blank ...
Page 520: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 526: ... This page intentionally left blank ...
Page 556: ... This page intentionally left blank ...
Page 584: ... This page intentionally left blank ...
Page 585: ......