DHCP Quarantine Method
Configuring NAC 800 for DHCP
10-5
Configuring the Router ACLs
In order to sufficiently restrict access to and from the quarantine area, you
must configure your router Access Control Lists (ACLs) as follows:
■
Allow traffic to and from the NAC 800 server and the quarantined
network.
■
If you want to allow access to other endpoints outside of the quaran-
tine area (for example a Software Update Service (SUS) server), allow
access to the server and port to and from the quarantined network.
■
All other traffic should be denied both
to
and
from
the quarantined
network.
TIP:
Restrict access to and from the quarantined network at the switch level as
well.
Configuring Windows Update Service for XP SP2
If you plan to use Endpoint Routing Enforcement, note that most endpoints
running Windows XP Service Pack 2 cannot run Windows Update successfully
from within quarantine, because of a WinHTTP bug that as of this writing has
not been fixed (see http://support.microsoft.com/kb/919477/ for more details.)
Endpoints not in quarantine are not affected.
The problem occurs because the Windows Update (WU) client software uses
WinHTTP to connect to Microsoft's download sites; Internet Explorer con-
nects to windowsupdate.microsoft.com; however, an error is displayed once
the user clicks on the
Express
or
Custom
download buttons that invoke the WU
client software.
Short of a Microsoft fix, the only way to update XP SP2 endpoints in quarantine
is to deploy a local update server (such as Microsoft's free Windows Server
Update Services, WSUS -- see
http://www.microsoft.com/technet/windowsserver/wsus/default.mspx) and
make sure that this server is listed in
Accessible Services and Devices
(“Acces-
sible Services” on page 3-112).
Summary of Contents for 800 Series
Page 1: ...Users Guide www procurve com ProCurve Network Access Controller 800 ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 70: ...System Configuration Management Server 3 22 Figure 3 9 System Configuration Management Server ...
Page 79: ...System Configuration User Accounts 3 31 Figure 3 12 System Configuration User Accounts ...
Page 87: ...System Configuration User Roles 3 39 Figure 3 16 System Configuration User Roles ...
Page 206: ... This page intentionally left blank ...
Page 229: ...End user Access Mac OS X Endpoint Settings 5 23 Figure 5 8 Mac System Preferences ...
Page 262: ... This page intentionally left blank ...
Page 284: ... This page intentionally left blank ...
Page 298: ... This page intentionally left blank ...
Page 302: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 303: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 305: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 308: ... This page intentionally left blank ...
Page 311: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 314: ... This page intentionally left blank ...
Page 319: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 320: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 376: ... This page intentionally left blank ...
Page 414: ... This page intentionally left blank ...
Page 421: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 474: ... This page intentionally left blank ...
Page 520: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 526: ... This page intentionally left blank ...
Page 556: ... This page intentionally left blank ...
Page 584: ... This page intentionally left blank ...
Page 585: ......