![](/images/new-backgrounds/1308328/308328655x1.webp)
Addendum to the ProCurve Access Control Security Design Guide
Updating the Access Control Design Process
Updating the Access Control Design
Process
With the new features provided by the ProCurve Access Control Solution 2.1, the process of designing access control security must be updated. First, a new step must be added. After you choose an access control method and make decisions about remote access (virtual private network, or VPN), you must select the endpoint integrity solution. The updated design process is outlined below.
1.Choose the access control methods.
2.Make decisions about remote access (VPN).
3.Choose the endpoint integrity solution.
4.Choose the endpoint integrity deployment method.
5.Choose the endpoint integrity testing method.
6.Choose Remote Authentication
7.Add ProCurve Identity Driven Manager (IDM).
8.Select an Extensible Authentication Protocol (EAP) method for 802.1X.
9.Finalize security policies.
10.Lay out the network.
This section helps you select the endpoint integrity solution that is the better option for your
Access Control Security Design Guide.)
In addition to the new step, one of the steps in the design process must be slightly modified. Specifically, choosing an endpoint integrity deployment method must be updated to include the new options for deploying the NAC 800.