
Select an EAP Method for 802.1X . . . . . . . . . . . . . . . . . . . . . . . . . . . . 
Finalize Security Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 
User Groups and Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 
Access Group Policies with IDM . . . . . . . . . . . . . . . . . . . . . . . . . 
Access Policies without IDM . . . . . . . . . . . . . . . . . . . . . . . . . . . . 
Create the NAC Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 
Design NAC Policy Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 
Design NAC Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 
| Lay Out the Network | |
| Core Resources | |
| Access Zones for Endpoints | |
| Public Wired Zone | |
| Public Wireless Zone | |
| Private Wired Zone | |
| Private Wireless Zone | |
| Remote Zone | |
| Combining Access Control Zone Designs | |
| Adjacent Zones | |
| Overlapping Zones | |
| Designing Adjacent and Overlapping Zones | 
 | 
Integrating all Parts of the Network Design . . . . . . . . . . . . . . . . . . 
4 Other Resources
Services and Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 
ProCurve Network Access Controller 800 Implementation 
Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 
AAppendix A: Glossary
Index
vii
