NAC Policies
About NAC 800 Tests
6-19
About NAC 800 Tests
NAC 800 tests are assigned to NAC policies. NAC policies are used to test
endpoints attempting to connect to your network. NAC 800 tests might be
updated as often as hourly; however, at the time of this release, the tests shown
in “Tests Help” on page B-1 were included (see “Viewing Information About
Tests” on page 6-19 for instructions on viewing the latest list of tests).
Viewing Information About Tests
To view the most current list of tests and descriptions:
Home window>>NAC policies>>Select a NAC Policy>>Tests menu option
Click on a test name. The test description and selectable properties are shown
for the selected test.
If the icons (Figure 6-9 on page 6-21) are red, the test is enabled and the actions
selected will take effect immediately. If the icons are gray, the test is not
enabled, and the actions will not take effect. To enable the test, select the
check box next to the test name.
Selecting Test Properties
Tests either have standard properties (non-selectable), selectable properties,
or text entry fields.
Select the check box or radio button that applies for each test. A check box
indicates that you can make multiple selections. A radio button indicates that
you can make one choice from the list.
Entering Software Required/Not Allowed
NAC 800 checks the Windows registry on the endpoint for the existence of
software. Most software vendors record their product information in the
HKEY_LOCAL_MACHINE\Software
registry key using the following format:
<vendor>\<software package>\<version>
For example,
Mozilla\Mozilla Firefox 1.5.0.6
Summary of Contents for ProCurve NAC 800
Page 1: ...HP ProCurve Network Access Controller 800 Users Guide ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 71: ...System Configuration Management Server 3 23 Figure 3 9 System Configuration Management Server ...
Page 80: ...System Configuration User Accounts 3 32 Figure 3 12 System Configuration User Accounts ...
Page 88: ...System Configuration User Roles 3 40 Figure 3 16 System Configuration User Roles ...
Page 180: ... This page intentionally left blank ...
Page 208: ... This page intentionally left blank ...
Page 234: ...End user Access Mac OS X Endpoint Settings 5 26 Figure 5 14 Mac System Preferences ...
Page 288: ... This page intentionally left blank ...
Page 302: ... This page intentionally left blank ...
Page 306: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 307: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 309: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 312: ... This page intentionally left blank ...
Page 315: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 318: ... This page intentionally left blank ...
Page 323: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 324: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 380: ... This page intentionally left blank ...
Page 418: ... This page intentionally left blank ...
Page 425: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 459: ...System Administration Creating and Replacing SSL Certificates 15 31 10 Save and exit the file ...
Page 468: ... This page intentionally left blank ...
Page 480: ... This page intentionally left blank ...
Page 526: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 532: ... This page intentionally left blank ...
Page 562: ... This page intentionally left blank ...