DHCP Quarantine Method
Configuring NAC 800 for DHCP
10-4
Configuring NAC 800 for DHCP
The primary configuration required for using NAC 800 and DHCP is setting up
the quarantine area (see “Setting up a Quarantine Area” on page 10-4). You
should also review the following topics related to quarantining endpoints:
■
Endpoint quarantine precedence (see “Endpoint Quarantine Prece-
dence” on page 7-2).
■
Untested endpoints (see “Untestable Endpoints and DHCP Mode” on
page 7-11).
■
Unsupported operating systems (see “Defining Non-supported OS
Access Settings” on page 6-16).
■
Endpoint testing exceptions (see “Always Granting Access to an
Endpoint” on page 7-6 and “Always Quarantining an Endpoint” on
page 7-8).
■
Action to take for failed tests (see “Selecting Action Taken” on page
6-17)
■
DHCP quarantine options:
•
Router Access Control List (ACL) settings (see “Configuring the
Router ACLs” on page 10-5).
•
Static routes assigned to the endpoint (see “Adding a DHCP Quaran-
tine Area” on page 3-93)
Setting up a Quarantine Area
Set up a restricted area of your network that users can access when you do
not want to allow full access to the network. See “Quarantining, General” on
page 3-50 for instructions.
Router Configuration
If you do not elect to enforce using static routes on the endpoint (“Quarantin-
ing, General” on page 3-50), you will need to configure router ACLs.
This option restricts the network access of non-compliant endpoints by
assigning DHCP settings on a quarantined network. The network, gateway,
and ACLs restricting traffic must be configured on your router, which is
accomplished by multinetting or adding a virtual interface to the router that
acts as the quarantine gateway IP address. The quarantine area DHCP settings
must reflect this configuration on your router.
Summary of Contents for 800 Series
Page 1: ...Users Guide www procurve com ProCurve Network Access Controller 800 ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 70: ...System Configuration Management Server 3 22 Figure 3 9 System Configuration Management Server ...
Page 79: ...System Configuration User Accounts 3 31 Figure 3 12 System Configuration User Accounts ...
Page 87: ...System Configuration User Roles 3 39 Figure 3 16 System Configuration User Roles ...
Page 206: ... This page intentionally left blank ...
Page 229: ...End user Access Mac OS X Endpoint Settings 5 23 Figure 5 8 Mac System Preferences ...
Page 262: ... This page intentionally left blank ...
Page 284: ... This page intentionally left blank ...
Page 298: ... This page intentionally left blank ...
Page 302: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 303: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 305: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 308: ... This page intentionally left blank ...
Page 311: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 314: ... This page intentionally left blank ...
Page 319: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 320: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 376: ... This page intentionally left blank ...
Page 414: ... This page intentionally left blank ...
Page 421: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 474: ... This page intentionally left blank ...
Page 520: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 526: ... This page intentionally left blank ...
Page 556: ... This page intentionally left blank ...
Page 584: ... This page intentionally left blank ...
Page 585: ......