Configuring the Post-connect Server
Setting up a Post-connect Host
A-7
a.
Log in the NAC 800 MS as
root
using SSH or directly with a keyboard.
b.
Copy the
/usr/local/nac/keystore/cacerts
file from the MS
into the
/usr/local/postconnect/lib
folder on the post-
connect server where you extracted the ZIP file. See “Copying Files”
on page 1-20 for information on how to copy files securely.
4.
Log in to the Linux post-connect server.
a.
Modify the startup script:
i.
Open the following file with a text editor such as
vi
:
/usr/local/postconnect/bin/postconnect
ii.
Set the
JAVA_HOME
variable to wherever you have installed Java.
For example:
export JAVA_HOME='/opt/jdk1.5.0_10'
iii. Save and exit the file.
iv. Copy the postconnect file to your
/etc/init.d
folder by
entering the following command at the command line:
cp /usr/local/postconnect/bin/postconnect /etc/
init.d/
b.
Edit the
connector.properties
file:
i.
Open the
/usr/local
/
postconnect/lib/
connector.properties
file with a text editor such as
vi
.
ii.
Change the instance name to something recognizable by you. For
example:
instance=My Warehouse Sensor
iii. Change the product to be the product you are running. For
example:
product=IDS Product Name
iv. Save and exit the file.
c.
Edit the
JMSConnection.properties
file:
i.
Open the
/usr/local/postconnect/lib/
JMSConnection.properties
file with a text editor such as
vi
.
ii.
Enter the MS IP address. For example:
URL=ssl://172.16.128.100:61616
iii. Enter the MS username. For example:
USER_NAME=root
iv. Enter the MS password. For example:
PASSWORD=7884!25H
Summary of Contents for 800 Series
Page 1: ...Users Guide www procurve com ProCurve Network Access Controller 800 ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 70: ...System Configuration Management Server 3 22 Figure 3 9 System Configuration Management Server ...
Page 79: ...System Configuration User Accounts 3 31 Figure 3 12 System Configuration User Accounts ...
Page 87: ...System Configuration User Roles 3 39 Figure 3 16 System Configuration User Roles ...
Page 206: ... This page intentionally left blank ...
Page 229: ...End user Access Mac OS X Endpoint Settings 5 23 Figure 5 8 Mac System Preferences ...
Page 262: ... This page intentionally left blank ...
Page 284: ... This page intentionally left blank ...
Page 298: ... This page intentionally left blank ...
Page 302: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 303: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 305: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 308: ... This page intentionally left blank ...
Page 311: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 314: ... This page intentionally left blank ...
Page 319: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 320: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 376: ... This page intentionally left blank ...
Page 414: ... This page intentionally left blank ...
Page 421: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 474: ... This page intentionally left blank ...
Page 520: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 526: ... This page intentionally left blank ...
Page 556: ... This page intentionally left blank ...
Page 584: ... This page intentionally left blank ...
Page 585: ......