802.1X Quarantine Method
Setting up the 802.1X Components
11-7
Setting up the 802.1X Components
In order to use NAC 800 in an 802.1X environment, ProCurve recommends
configuring your environment first, then installing and configuring NAC 800.
This section provides instructions for the following:
■
“Setting up the RADIUS Server” on page 11-7
■
“Enabling NAC 800 for 802.1X” on page 11-39
■
“Setting up the Supplicant” on page 11-40
■
“Setting up the Authenticator” on page 11-48
Setting up the RADIUS Server
Switches support 802.1X authentication by authenticating against a RADIUS
server. The NAC 800 802.1X solution must be integrated with the RADIUS
authentication to “intervene” in the authentication process, test endpoints,
and assign them to the appropriate VLAN. NAC 800 can be deployed and
integrated with RADIUS in the following three ways:
■
Install the NAC 800 Plug-in to the Microsoft® IAS RADIUS server (see
“This section provides instructions for how to install the Microsoft
IAS to the NAC 800 IAS plug-in.” on page 11-7).
■
Proxy requests from the built-in NAC 800 RADIUS server to any other
RADIUS server (see “Proxying RADIUS Requests to an Existing
RADIUS Server Using the Built-in NAC 800 RADIUS Server” on
page 11-33).
■
Use the built-in NAC 800 RADIUS server for authentication (see
“Enabling NAC 800 for 802.1X” on page 11-39).
Any of these solutions can be customized to work with your existing LDAP or
Active Directory user databases. This section provides instructions of config-
uring these three options.
Using the NAC 800 IAS Plug-in to the Microsoft IAS RADIUS
Server
This section provides instructions for how to install the Microsoft IAS to the
NAC 800 IAS plug-in.
TIP:
For an explanation of how the components communicate, see “NAC 800 and
802.1X” on page 11-4.
Summary of Contents for 800 Series
Page 1: ...Users Guide www procurve com ProCurve Network Access Controller 800 ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 70: ...System Configuration Management Server 3 22 Figure 3 9 System Configuration Management Server ...
Page 79: ...System Configuration User Accounts 3 31 Figure 3 12 System Configuration User Accounts ...
Page 87: ...System Configuration User Roles 3 39 Figure 3 16 System Configuration User Roles ...
Page 206: ... This page intentionally left blank ...
Page 229: ...End user Access Mac OS X Endpoint Settings 5 23 Figure 5 8 Mac System Preferences ...
Page 262: ... This page intentionally left blank ...
Page 284: ... This page intentionally left blank ...
Page 298: ... This page intentionally left blank ...
Page 302: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 303: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 305: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 308: ... This page intentionally left blank ...
Page 311: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 314: ... This page intentionally left blank ...
Page 319: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 320: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 376: ... This page intentionally left blank ...
Page 414: ... This page intentionally left blank ...
Page 421: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 474: ... This page intentionally left blank ...
Page 520: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 526: ... This page intentionally left blank ...
Page 556: ... This page intentionally left blank ...
Page 584: ... This page intentionally left blank ...
Page 585: ......