Configuring the Post-connect Server
Setting up a Post-connect Host
A-6
c.
Change the product to be the product you are running. For example:
product=IDS Product Name
d.
Save and exit the file.
6.
Edit the
JMSConnection.properties
file:
a.
Open the
\postconnect\lib\JMSConnection.properties
file with a text editor.
b.
Enter the MS IP address. For example:
URL=ssl://172.16.128.100:61616
c.
Enter the MS username. For example:
USER_NAME=root
d.
Enter the MS password. For example:
PASSWORD=7884!25H
7.
Install the service:
a.
Navigate to the
\postconnect\bin
directory.
b.
Double-click on the
InstallConnectorService.bat
file.
8.
Start the service:
a.
On your Windows server, select
Start>>Settings>>Control
Panel>>Administrative Tools>>Services
.
b.
Right-click on
NAC Post-Connect Service
and select
Start
.
Linux
Your post-connect host can be a Linux or Windows server. This section
provides instructions on setting up a Linux host.
To set up a Linux post-connect host:
1.
Install Java on a Linux machine if it is not already installed:
a.
Log into your Linux machine.
b.
Install Java:
i.
Navigate to http://java.sun.com/javase/downloads/index.jsp.
ii.
Download and install the Java 1.5 update 10 or later.
2.
Install Python 2.5 or later if it is not already installed:
a.
Log into your Linux machine.
b.
Install Python:
i.
Navigate to http://www.python.org/download/.
ii.
Download and install the Python for UNIX version.
3.
Copy the
cacerts
file to the Linux server:
Summary of Contents for ProCurve NAC 800
Page 1: ...HP ProCurve Network Access Controller 800 Users Guide ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 71: ...System Configuration Management Server 3 23 Figure 3 9 System Configuration Management Server ...
Page 80: ...System Configuration User Accounts 3 32 Figure 3 12 System Configuration User Accounts ...
Page 88: ...System Configuration User Roles 3 40 Figure 3 16 System Configuration User Roles ...
Page 180: ... This page intentionally left blank ...
Page 208: ... This page intentionally left blank ...
Page 234: ...End user Access Mac OS X Endpoint Settings 5 26 Figure 5 14 Mac System Preferences ...
Page 288: ... This page intentionally left blank ...
Page 302: ... This page intentionally left blank ...
Page 306: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 307: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 309: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 312: ... This page intentionally left blank ...
Page 315: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 318: ... This page intentionally left blank ...
Page 323: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 324: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 380: ... This page intentionally left blank ...
Page 418: ... This page intentionally left blank ...
Page 425: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 459: ...System Administration Creating and Replacing SSL Certificates 15 31 10 Save and exit the file ...
Page 468: ... This page intentionally left blank ...
Page 480: ... This page intentionally left blank ...
Page 526: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 532: ... This page intentionally left blank ...
Page 562: ... This page intentionally left blank ...