NAC Policies
NAC Policy Tasks
6-15
NOTE:
Adding an endpoint or domain to multiple policies results in the endpoint
being assigned to the first enabled NAC policy in the list.
NAC Policy Hierarchy
If an endpoint is listed in more than one NAC policy, the order of use is as
alphabetical by name of NAC policy (not including the default NAC policy).
Setting Retest Time
Retest endpoints connected to your network frequently to guard against
potential changes in the remote endpoint configurations.
To set the time to wait before retesting a connected endpoint:
Home window>>NAC policies>>Select a NAC Policy>>Basic settings menu
option
1.
In the
Retest frequency area
, enter how frequently in minutes, hours, or
days NAC 800 should retest a connected endpoint.
TIP:
A lower number ensures higher security, but puts more load on the NAC 800
server.
2.
Click
ok
.
Setting Connection Time
When an endpoint is inactive for a period of time, you can elect to automati-
cally move the endpoint to a quarantined state. Quarantining inactive end-
points guards against unauthorized access to the network. When the endpoint
becomes active again, the usual process occurs for moving the endpoint out
of quarantine. For example, if the endpoint was in good standing prior to the
inactivity quarantine, the end-user may just need to log in again; however,
other changes (such as a policy change or new required hotfix) may require
the end-user to perform some action before being allowed on the network
again.
To set the time an end-user can be inactive:
Home window>>NAC policies>>Select a NAC Policy>>Basic settings menu
option
Summary of Contents for 800 Series
Page 1: ...Users Guide www procurve com ProCurve Network Access Controller 800 ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 70: ...System Configuration Management Server 3 22 Figure 3 9 System Configuration Management Server ...
Page 79: ...System Configuration User Accounts 3 31 Figure 3 12 System Configuration User Accounts ...
Page 87: ...System Configuration User Roles 3 39 Figure 3 16 System Configuration User Roles ...
Page 206: ... This page intentionally left blank ...
Page 229: ...End user Access Mac OS X Endpoint Settings 5 23 Figure 5 8 Mac System Preferences ...
Page 262: ... This page intentionally left blank ...
Page 284: ... This page intentionally left blank ...
Page 298: ... This page intentionally left blank ...
Page 302: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 303: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 305: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 308: ... This page intentionally left blank ...
Page 311: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 314: ... This page intentionally left blank ...
Page 319: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 320: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 376: ... This page intentionally left blank ...
Page 414: ... This page intentionally left blank ...
Page 421: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 474: ... This page intentionally left blank ...
Page 520: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 526: ... This page intentionally left blank ...
Page 556: ... This page intentionally left blank ...
Page 584: ... This page intentionally left blank ...
Page 585: ......