802.1X Quarantine Method
Setting up the 802.1X Components
11-43
a.
Select
Wireless Zero Configuration
. If the
Status
column does not
already show
Started
, start the service:
i.
Right click on
Wireless Zero Configuration
.
ii.
Select
Start
.
b.
Close the
Services
window.
2.
Configure the network connections:
Windows desktop>>Start>>Settings>>Control Panel>>Network Connections
3.
Right-click on
Local Area Connection
. Select
Properties.
The
Local Area
Connection
windows appears (Figure 11-32 on page 11-41).
4.
Select the
General
tab.
5.
Select the
Show icon in notification area when connected
check box. This
enables the
Windows XP balloon help
utility, which can assist you when
entering information and troubleshooting errors.
6.
Select the
Authentication
tab (Figure 11-33 on page 11-42).
a.
Select the
Enable IEE 802.1X authentication for this network
check box.
b.
Select an EAP type from the drop-down list. For this example, select
MD5-Challenge
.
Important: This EAP type must match the EAP type selected in
“Setting up the RADIUS Server”, step 7, step q on page 11-17.
c.
Clear or select the
Authenticate as computer when computer information
is
available check box. The choice is yours.
7.
Click
OK
.
8.
Select to reboot if prompted.
Windows 2000 Professional Setup
To enable a Windows 2000 Professional endpoint for 802.1X:
1.
Start the wireless service:
Windows desktop>>Start>>Settings>>Control Panel>>Administrative
Tools>>Services
a.
Select
Wireless Configuration
. If the
Status
column does not already
show
Started
, start the service:
i.
Right click on
Wireless Configuration
.
ii.
Select
Start
.
Summary of Contents for 800 Series
Page 1: ...Users Guide www procurve com ProCurve Network Access Controller 800 ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 70: ...System Configuration Management Server 3 22 Figure 3 9 System Configuration Management Server ...
Page 79: ...System Configuration User Accounts 3 31 Figure 3 12 System Configuration User Accounts ...
Page 87: ...System Configuration User Roles 3 39 Figure 3 16 System Configuration User Roles ...
Page 206: ... This page intentionally left blank ...
Page 229: ...End user Access Mac OS X Endpoint Settings 5 23 Figure 5 8 Mac System Preferences ...
Page 262: ... This page intentionally left blank ...
Page 284: ... This page intentionally left blank ...
Page 298: ... This page intentionally left blank ...
Page 302: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 303: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 305: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 308: ... This page intentionally left blank ...
Page 311: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 314: ... This page intentionally left blank ...
Page 319: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 320: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 376: ... This page intentionally left blank ...
Page 414: ... This page intentionally left blank ...
Page 421: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 474: ... This page intentionally left blank ...
Page 520: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 526: ... This page intentionally left blank ...
Page 556: ... This page intentionally left blank ...
Page 584: ... This page intentionally left blank ...
Page 585: ......