Remote Device Activity Capture
Creating a DAC Host
12-15
b.
When the command completes, copy the DAC_keystore file (from
/
tmp
or wherever you specified) to
C:\Program Files\Hewlett-
Packard\DAC\lib\
.
c.
After copying the
DAC_keystore
file from the MS, delete the file
from its temporary location on the MS.
NOTE:
Note that for each remote DAC host, this step must be repeated as each host
should have its own unique key.
2.
Add a firewall rule to the ES or ESs to which the DAC host will be sending
packets. On each ES:
a.
Enter the following command to dump the Lokkit iptables chain:
iptables -nvL RH-Lokkit-0-50-INPUT --line-numbers
b.
Add a rule AFTER the RELATED, ESTABLISHED rule. The rule
numbers are listed in the first column of the output from the previous
statement. For example, if the RELATED, ESTABLISHED rule is rule
5, the INSERT command would look like the following:
iptables -I RH-Lokkit-0-50-INPUT 6 -p tcp --dport
8999 -s <DAC host IP> -m state --state NEW -j ACCEPT
If you want this addition to survive a reboot, you must use the
iptables-save
command and dump the iptables ruleset to
/etc/
sysconfig/iptables
with the following command:
/sbin/iptables-save > /etc/sysconfig/iptables
Adding Additional ESs
For this release, if you want to add additional ESs, you must install them
manually. A future release will expand the options in the installer to include
multiple ESs. To add additional interfaces to the DAC host:
Windows server
1.
Open the
DAC/conf/wrapper.conf
file with a text editor.
a.
Locate the Application Parameters section in the wrapper.conf file.
You will see a list of entries like the following:
Summary of Contents for ProCurve NAC 800
Page 1: ...HP ProCurve Network Access Controller 800 Users Guide ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Release 1 1 Users Guide ...
Page 43: ...2 1 2 Clusters and Servers Chapter Contents Overview 2 2 Installation Examples 2 3 ...
Page 71: ...System Configuration Management Server 3 23 Figure 3 9 System Configuration Management Server ...
Page 80: ...System Configuration User Accounts 3 32 Figure 3 12 System Configuration User Accounts ...
Page 88: ...System Configuration User Roles 3 40 Figure 3 16 System Configuration User Roles ...
Page 180: ... This page intentionally left blank ...
Page 208: ... This page intentionally left blank ...
Page 234: ...End user Access Mac OS X Endpoint Settings 5 26 Figure 5 14 Mac System Preferences ...
Page 288: ... This page intentionally left blank ...
Page 302: ... This page intentionally left blank ...
Page 306: ...High Availability and Load Balancing High Availability 8 4 Figure 8 2 DHCP Installation ...
Page 307: ...High Availability and Load Balancing High Availability 8 5 Figure 8 3 802 1X Installation ...
Page 309: ...9 1 9 Inline Quarantine Method Chapter Contents Inline 9 2 ...
Page 312: ... This page intentionally left blank ...
Page 315: ...DHCP Quarantine Method Overview 10 3 Figure 10 1 DHCP Installation ...
Page 318: ... This page intentionally left blank ...
Page 323: ...802 1X Quarantine Method NAC 800 and 802 1X 11 5 Figure 11 2 NAC 800 802 1X Enforcement ...
Page 324: ...802 1X Quarantine Method NAC 800 and 802 1X 11 6 Figure 11 3 802 1X Communications ...
Page 380: ... This page intentionally left blank ...
Page 418: ... This page intentionally left blank ...
Page 425: ...Reports Viewing Report Details 14 7 Figure 14 3 Test Details Report ...
Page 459: ...System Administration Creating and Replacing SSL Certificates 15 31 10 Save and exit the file ...
Page 468: ... This page intentionally left blank ...
Page 480: ... This page intentionally left blank ...
Page 526: ...Tests Help Security Settings Windows B 34 http www pcworld com article id 112138 article html ...
Page 532: ... This page intentionally left blank ...
Page 562: ... This page intentionally left blank ...