NAC Policies
NAC Policy Tasks
6-9
6.
Select the
Operating systems
that will not be tested but are allowed network
access.
•
Windows ME, Windows 98, Windows 95, Windows NT
•
UNIX
•
All other unsupported OSs
NOTE:
In DHCP mode, if an endpoint with an unsupported OS already has a DHCP-
assigned IP address, NAC 800 cannot affect this endpoint in any way until the
lease on the existing IP address for that endpoint expires. If an endpoint with
an unsupported OS has a static IP address, NAC 800 cannot affect this
endpoint in any way. In both of these cases, the System Monitor window may
show the quarantined icon next to these endpoints; however, if you hover
your mouse over the red circle, the actual status shows that the endpoint
should be quarantined, but the quarantine action was unsuccessful.
CAUTION:
Allowing untested endpoints on your network contains risks. See “Untestable
Endpoints and DHCP Mode” on page 7-11 for more information.
NOTE:
A security best practice is to not allow unsupported operating systems
(untested endpoints) on your network. It is more secure to allow untested
endpoints access to your network on a case-by-case basis by adding them to
the System configuration>>Exceptions>>Whitelist window.
7.
In the
Retest frequency area
, enter how frequently NAC 800 should retest
a connected machine.
TIP:
A lower number ensures higher security, but puts more load on the NAC 800
server.
8.
In the
Inactive endpoints area
, enter how long an end-user can be inactive
before they are quarantined. To allow end-users to remain connected
indefinitely select
never quarantine inactive endpoints
.
Summary of Contents for 800 Series
Page 1: ...Users Guide www procurve com ProCurve Network Access Controller 800 ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 70: ...System Configuration Management Server 3 22 Figure 3 9 System Configuration Management Server ...
Page 79: ...System Configuration User Accounts 3 31 Figure 3 12 System Configuration User Accounts ...
Page 87: ...System Configuration User Roles 3 39 Figure 3 16 System Configuration User Roles ...
Page 206: ... This page intentionally left blank ...
Page 229: ...End user Access Mac OS X Endpoint Settings 5 23 Figure 5 8 Mac System Preferences ...
Page 262: ... This page intentionally left blank ...
Page 284: ... This page intentionally left blank ...
Page 298: ... This page intentionally left blank ...
Page 302: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 303: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 305: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 308: ... This page intentionally left blank ...
Page 311: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 314: ... This page intentionally left blank ...
Page 319: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 320: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 376: ... This page intentionally left blank ...
Page 414: ... This page intentionally left blank ...
Page 421: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 474: ... This page intentionally left blank ...
Page 520: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 526: ... This page intentionally left blank ...
Page 556: ... This page intentionally left blank ...
Page 584: ... This page intentionally left blank ...
Page 585: ......