End-user Access
Windows Endpoint Settings
5-9
Windows Endpoint Settings
IE Internet Security Setting
If the end-user has their IE Internet security zone set to
High
, the endpoint is
not testable. Using one of the following options will allow the endpoint to be
tested:
■
The end-user could change the
Internet security
to
Medium
(
Tools>>Internet options>>Security>>Custom level>>Reset to Medium
).
■
The end-user could add the IP address of the NAC 800 server to the
Trusted sites zone
, and then set the
Trusted sites zone
to
Medium.
■
The end-user could customize the
High
setting to allow the options
necessary for NAC 800 to test successfully. These options are as
follows:
•
The NAC Agent test uses ActiveX
•
The ActiveX test uses ActiveX
•
All of the tests use JavaScript
Agent-based Test Method
Ports Used for Testing
You might need to configure some firewalls and routers to allow NAC 800 to
access port 1500 for agent-based testing.
TIP:
See “Ports used in NAC 800” on page E-1 for a complete description of the
ports used in NAC 800.
Windows Vista Settings
All Windows Vista endpoints must have administrator permissions in order
for the agent to install successfully. If the end-user is not logged in to the
endpoint with administrator permissions, the following occurs:
■
If User Account Control (UAC) is enabled, Windows Vista prompts
you for credentials. After the credentials are entered, the agent
installs.
■
If UAC is disabled, the agent installation fails without notifying the
end-user.
Summary of Contents for 800 Series
Page 1: ...Users Guide www procurve com ProCurve Network Access Controller 800 ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 70: ...System Configuration Management Server 3 22 Figure 3 9 System Configuration Management Server ...
Page 79: ...System Configuration User Accounts 3 31 Figure 3 12 System Configuration User Accounts ...
Page 87: ...System Configuration User Roles 3 39 Figure 3 16 System Configuration User Roles ...
Page 206: ... This page intentionally left blank ...
Page 229: ...End user Access Mac OS X Endpoint Settings 5 23 Figure 5 8 Mac System Preferences ...
Page 262: ... This page intentionally left blank ...
Page 284: ... This page intentionally left blank ...
Page 298: ... This page intentionally left blank ...
Page 302: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 303: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 305: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 308: ... This page intentionally left blank ...
Page 311: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 314: ... This page intentionally left blank ...
Page 319: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 320: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 376: ... This page intentionally left blank ...
Page 414: ... This page intentionally left blank ...
Page 421: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 474: ... This page intentionally left blank ...
Page 520: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 526: ... This page intentionally left blank ...
Page 556: ... This page intentionally left blank ...
Page 584: ... This page intentionally left blank ...
Page 585: ......