System Administration
Working with Ranges
15-24
Working with Ranges
In NAC 800 implementations, particularly in trial installations where you are
connecting and disconnecting cables to a number of different types of end-
points, you can filter the activity by specifying the following:
■
Ranges to monitor – This property filters results in the display
window, it does
not
keep NAC 800 from testing other systems.
■
Ranges to ignore – Does not test the ranges listed.
■
Ranges to enforce – This property is only valid for DHCP mode. It
modifies the iptables NFQUEUE rule such that only the networks set
to be enforced will ever get quarantine addresses.
To specify ranges to monitor:
Home window>>System configuration>>Select an Enforcement
Cluster>>Advanced menu option
In the
Endpoint detection
area, enter the range of addresses to monitor in the
IP addresses to monitor
text field. Separate ranges with a hyphen or use CIDR
notation.
To specify ranges to ignore:
Home window>>System configuration>>Enforcement clusters &
servers>>Select an Enforcement Cluster>>Advanced menu option
In the
Endpoint detection
area, enter the range of addresses to ignore in the IP
addresses to ignore
text field. Separate ranges with a hyphen or use CIDR
notation.
To specify ranges to enforce:
Home window>>System configuration>>Quarantining menu option
1.
Select the
DHCP
radio button in the
Quarantine method
area.
2.
Select the
Restrict enforcement of DHCP requests to quarantined or non-
quarantined subnets
radio button.
3.
Enter IP addresses in the
DHCP relay IP addresses to enforce
text box. Enter
individual DHCP relay agent IP addresses, separated by carriage returns.
These addresses are monitored in addition to the quarantined or non-
quarantined subnets.
Summary of Contents for 800 Series
Page 1: ...Users Guide www procurve com ProCurve Network Access Controller 800 ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 70: ...System Configuration Management Server 3 22 Figure 3 9 System Configuration Management Server ...
Page 79: ...System Configuration User Accounts 3 31 Figure 3 12 System Configuration User Accounts ...
Page 87: ...System Configuration User Roles 3 39 Figure 3 16 System Configuration User Roles ...
Page 206: ... This page intentionally left blank ...
Page 229: ...End user Access Mac OS X Endpoint Settings 5 23 Figure 5 8 Mac System Preferences ...
Page 262: ... This page intentionally left blank ...
Page 284: ... This page intentionally left blank ...
Page 298: ... This page intentionally left blank ...
Page 302: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 303: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 305: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 308: ... This page intentionally left blank ...
Page 311: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 314: ... This page intentionally left blank ...
Page 319: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 320: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 376: ... This page intentionally left blank ...
Page 414: ... This page intentionally left blank ...
Page 421: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 474: ... This page intentionally left blank ...
Page 520: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 526: ... This page intentionally left blank ...
Page 556: ... This page intentionally left blank ...
Page 584: ... This page intentionally left blank ...
Page 585: ......