802.1X Quarantine Method
Setting up the 802.1X Components
11-40
detection can be run remotely by installing and configuring the end-
point activity capture software on each DHCP server involved in the
802.1X deployment. In this case, choose the remote option.
•
local
– In simple configurations, it is possible to span, or mirror, the
switch port into which the DHCP server is connected. The eth1
interface of the ES is then plugged into the spanned port and endpoint
traffic is monitored on the eth1 interface. In this case, choose the local
option.
3.
Click
ok
.
Setting up the Supplicant
Now you must enable the endpoint for 802.1X. If you do not, the endpoint can
never pass the initial challenge from the switch, as the switch searches for an
802.1X-enabled endpoint. This sections describes how to set up the following
endpoints for 802.1X:
■
Windows XP Professional endpoint
■
Windows XP Home endpoint
■
Windows 2000 Professional endpoint
■
Windows Vista endpoint
TIP:
The exact instructions for Windows XP and Windows Vista tasks will vary
slightly depending on whether you are using Classic or Category view.
To determine which view you are using in the Control Panel, select
Start>>Control Panel. At the top left you will see either Switch to Classic View
or Switch to Category View.
To determine which view you are using in the Start Menu, Right-click
Start>>Select Properties. If the Start menu radio button is selected, you are
using Category View. If the Classic Start menu radio button is selected you
are using Classic View.
The instructions in this section assume you are using Classic View in both
cases.
Windows XP Professional Setup
To enable a Windows XP Professional endpoint for 802.1X:
Windows desktop>>Start>>Settings>>Network Connections
Summary of Contents for 800 Series
Page 1: ...Users Guide www procurve com ProCurve Network Access Controller 800 ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 70: ...System Configuration Management Server 3 22 Figure 3 9 System Configuration Management Server ...
Page 79: ...System Configuration User Accounts 3 31 Figure 3 12 System Configuration User Accounts ...
Page 87: ...System Configuration User Roles 3 39 Figure 3 16 System Configuration User Roles ...
Page 206: ... This page intentionally left blank ...
Page 229: ...End user Access Mac OS X Endpoint Settings 5 23 Figure 5 8 Mac System Preferences ...
Page 262: ... This page intentionally left blank ...
Page 284: ... This page intentionally left blank ...
Page 298: ... This page intentionally left blank ...
Page 302: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 303: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 305: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 308: ... This page intentionally left blank ...
Page 311: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 314: ... This page intentionally left blank ...
Page 319: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 320: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 376: ... This page intentionally left blank ...
Page 414: ... This page intentionally left blank ...
Page 421: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 474: ... This page intentionally left blank ...
Page 520: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 526: ... This page intentionally left blank ...
Page 556: ... This page intentionally left blank ...
Page 584: ... This page intentionally left blank ...
Page 585: ......