Addendum to the ProCurve Access Control Security Design Guide

Updating the Access Control Design Process

Updating the Access Control Design

Process

With the new features provided by the ProCurve Access Control Solution 2.1, the process of designing access control security must be updated. First, a new step must be added. After you choose an access control method and make decisions about remote access (virtual private network, or VPN), you must select the endpoint integrity solution. The updated design process is outlined below.

1.Choose the access control methods.

2.Make decisions about remote access (VPN).

3.Choose the endpoint integrity solution.

4.Choose the endpoint integrity deployment method.

5.Choose the endpoint integrity testing method.

6.Choose Remote Authentication Dial-In User Service (RADIUS) servers.

7.Add ProCurve Identity Driven Manager (IDM).

8.Select an Extensible Authentication Protocol (EAP) method for 802.1X.

9.Finalize security policies.

10.Lay out the network.

This section helps you select the endpoint integrity solution that is the better option for your organization—ProCurve NAC 800 or Microsoft NAP. (For detailed information about the other steps in the process, see the ProCurve

Access Control Security Design Guide.)

In addition to the new step, one of the steps in the design process must be slightly modified. Specifically, choosing an endpoint integrity deployment method must be updated to include the new options for deploying the NAC 800.

A-24

Page 328
Image 328
HP Access Control Client Software manual Updating the Access Control Design Process