O

operating systems … 2-28,2-37 WMI support … 1-41

OS-X

security settings … 2-37

P

password authentication protocol (PAP) … 1-24 Payment Card Industry Data Security Standard (PCI

DSS) … 2-17 PCM+ … 1-59

required for IDM … 3-99

PDP

802.1X process … 1-21

access control architecture … 3-84 defined … 1-12

MAC-Auth process … 1-17 NAC 800 as … 1-53

network access control process … 1-15 selecting … 3-79

Web-Auth process … 1-19 PEAP … 1-27,1-53

PEP … 1-46

802.1X process … 1-21

802.1X quarantining … 1-54 access control architecture … 3-84 defined … 1-11

DHCP deployment method … 1-43 DHCP quarantining … 1-48MAC-Auth process … 1-17

network access control process … 1-15 selecting … 3-79

Web-Auth process … 1-19

PKI

EAP method … 3-102

PoE

for ProCurve APs and RPs … 3-138policies

implementing … 3-129 NAC 800 … 3-120

policy decision point See PDP

policy enforcement point See PEP

policy repository … 1-14,1-16 access control architecture … 3-84

ports

destination … 1-35 Ethernet … 1-31 TCP and UDP … 1-9

post-connect testing … 3-71See also testing

posture

See endpoint integrity PPTP … 3-38pre-connect testing

See testing printers … 1-23,2-30

ProCurve Network Immunity Manager … 2-24 ProCurve Secure Router … 3-39

VPN capabilities of … 3-145ProCurve switches

network access control capabilities of … 3-32,3-142

ProCurve VPN client capabilities of … 3-146

ProCurve wireless products authentication supported … 3-137 capabilities of … 3-136 encryption supported … 3-137

network access control capabilities of … 3-30 PoE for RPs and APs … 3-138

Protected EAP See PEAP

protocols authentication … 1-23

Q

QoS settings … 3-114 quarantine … 1-43

enforcement … 1-51 subnet … 1-49

VLAN … 1-43,1-47,1-54 quarantine methods … 1-42

802.1X … 1-42,1-54 DHCP … 1-43,1-48 inline … 1-43,1-52See also quarantining

Index – 5