Remote Device Activity Capture
Creating a DAC Host
12-15
b.
When the command completes, copy the DAC_keystore file (from
/
tmp
or wherever you specified) to
C:\Program Files\Hewlett-
Packard\DAC\lib\
.
c.
After copying the
DAC_keystore
file from the MS, delete the file
from its temporary location on the MS.
NOTE:
Note that for each remote DAC host, this step must be repeated as each host
should have its own unique key.
2.
Add a firewall rule to the ES or ESs to which the DAC host will be sending
packets. On each ES:
a.
Enter the following command to dump the Lokkit iptables chain:
iptables -nvL RH-Lokkit-0-50-INPUT --line-numbers
b.
Add a rule AFTER the RELATED, ESTABLISHED rule. The rule
numbers are listed in the first column of the output from the previous
statement. For example, if the RELATED, ESTABLISHED rule is rule
5, the INSERT command would look like the following:
iptables -I RH-Lokkit-0-50-INPUT 6 -p tcp --dport
8999 -s <DAC host IP> -m state --state NEW -j ACCEPT
If you want this addition to survive a reboot, you must use the
iptables-save
command and dump the iptables ruleset to
/etc/
sysconfig/iptables
with the following command:
/sbin/iptables-save > /etc/sysconfig/iptables
Adding Additional ESs
For this release, if you want to add additional ESs, you must install them
manually. A future release will expand the options in the installer to include
multiple ESs. To add additional interfaces to the DAC host:
Windows server
1.
Open the
DAC/conf/wrapper.conf
file with a text editor.
a.
Locate the Application Parameters section in the wrapper.conf file.
You will see a list of entries like the following:
Summary of Contents for 800 Series
Page 1: ...Users Guide www procurve com ProCurve Network Access Controller 800 ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 70: ...System Configuration Management Server 3 22 Figure 3 9 System Configuration Management Server ...
Page 79: ...System Configuration User Accounts 3 31 Figure 3 12 System Configuration User Accounts ...
Page 87: ...System Configuration User Roles 3 39 Figure 3 16 System Configuration User Roles ...
Page 206: ... This page intentionally left blank ...
Page 229: ...End user Access Mac OS X Endpoint Settings 5 23 Figure 5 8 Mac System Preferences ...
Page 262: ... This page intentionally left blank ...
Page 284: ... This page intentionally left blank ...
Page 298: ... This page intentionally left blank ...
Page 302: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 303: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 305: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 308: ... This page intentionally left blank ...
Page 311: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 314: ... This page intentionally left blank ...
Page 319: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 320: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 376: ... This page intentionally left blank ...
Page 414: ... This page intentionally left blank ...
Page 421: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 474: ... This page intentionally left blank ...
Page 520: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 526: ... This page intentionally left blank ...
Page 556: ... This page intentionally left blank ...
Page 584: ... This page intentionally left blank ...
Page 585: ......