Select an EAP Method for 802.1X . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-101

Finalize Security Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-106

User Groups and Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-106

Access Group Policies with IDM . . . . . . . . . . . . . . . . . . . . . . . . . 3-107

Access Policies without IDM . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-117

Create the NAC Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-120

Design NAC Policy Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-120

Design NAC Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-121

Lay Out the Network

3-129

Core Resources

3-129

Access Zones for Endpoints

3-131

Public Wired Zone

3-131

Public Wireless Zone

3-134

Private Wired Zone

3-140

Private Wireless Zone

3-142

Remote Zone

3-143

Combining Access Control Zone Designs

3-146

Adjacent Zones

3-146

Overlapping Zones

3-146

Designing Adjacent and Overlapping Zones

3-147

Integrating all Parts of the Network Design . . . . . . . . . . . . . . . . . . 3-148 Adding Access Control to an Existing Network . . . . . . . . . . . . . . . . 3-148 Migrating from One Solution to Another . . . . . . . . . . . . . . . . . . . . . . 3-149

4 Other Resources

Services and Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1 ProCurve Elite Partners . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1

ProCurve Network Access Controller 800 Implementation Start-up Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-1

Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-2

AAppendix A: Glossary

Index

vii

Page 11
Image 11
HP Access Control Client Software manual Appendix a Glossary Index