802.1X Quarantine Method
Setting up the 802.1X Components
11-57
uthentication-period 3600 re-authenticate quiet-interval 60
transmit-interval 3
0 supplicant-timeout 30 server-timeout 30 max-request 2
Vlan Info:
vlan create 10 name "production" type port
vlan create 11 name "guest" type port
vlan create 12 name "quarantine" type port
! *** EAP ***
!
eapol enable
interface FastEthernet ALL
eapol port 1-2 status auto traffic-control in-out re-
authentication enable re-authentication-period 3600 re-
authenticate quiet-interval 60 transmit-interval 3 0 supplicant-
timeout 30 server-timeout 30 max-request 2
! *** Port Mirroring ***
!
port-mirroring mode XrxOrXtx monitor-port 9 mirror-port-X 12
!
Creating Custom Expect Scripts
Expect is a tool that uses simple scripts to automate interactive applications.
NAC 800 utilizes expect scripts when communicating with 802.1X devices. You can
add 802.1X devices in the NAC 800 user interface (
Home>>System configura-
tion>>Quarantining menu option>>Add 802.1X device
). There are 11 pre-defined devices,
and one generic device. You can use the default expect script values, modify them,
or enter new values. The expect scripts used are as follows:
■
Initialization script – This script is used to log in to the device, enter enable
mode and set up the state necessary to execute the re-authentication
command. It is executed the first time a connection to the device is opened
or if the connection to the device is reset.
■
Re-authentication script – This script is used to perform endpoint re-
authentication. It is executed once for each endpoint re-authentication
while the connection to the device remains active (until the connection goes
bad or the idle time inactivity timeout is reached).
■
Exit script – This script is used to exit the console. It is executed when the
idle time timeout is reached.
Summary of Contents for 800 Series
Page 1: ...Users Guide www procurve com ProCurve Network Access Controller 800 ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 70: ...System Configuration Management Server 3 22 Figure 3 9 System Configuration Management Server ...
Page 79: ...System Configuration User Accounts 3 31 Figure 3 12 System Configuration User Accounts ...
Page 87: ...System Configuration User Roles 3 39 Figure 3 16 System Configuration User Roles ...
Page 206: ... This page intentionally left blank ...
Page 229: ...End user Access Mac OS X Endpoint Settings 5 23 Figure 5 8 Mac System Preferences ...
Page 262: ... This page intentionally left blank ...
Page 284: ... This page intentionally left blank ...
Page 298: ... This page intentionally left blank ...
Page 302: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 303: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 305: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 308: ... This page intentionally left blank ...
Page 311: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 314: ... This page intentionally left blank ...
Page 319: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 320: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 376: ... This page intentionally left blank ...
Page 414: ... This page intentionally left blank ...
Page 421: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 474: ... This page intentionally left blank ...
Page 520: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 526: ... This page intentionally left blank ...
Page 556: ... This page intentionally left blank ...
Page 584: ... This page intentionally left blank ...
Page 585: ......