4-3
Configuring the RADIUS Server—Integrated with ProCurve Identity Driven Manager
Overview
Overview
As explained in Chapter 1: “Overview of the ProCurve NAC 800,” a ProCurve
NAC 800 can fulfill a variety of functions, among them checking endpoint
integrity and authenticating endpoints as a RADIUS server. In this chapter,
you learn how to configure a NAC 800 that acts
only
as a RADIUS server.
ProCurve Identity Driven Manager (IDM), a plug-in to ProCurve Manager
(PCM) Plus, helps you to quickly and easily configure the NAC 800’s RADIUS
capabilities from a centralized location. This chapter focuses on setting up the
NAC 800 in a network that includes IDM. See Chapter 5: “Configuring the
RADIUS Server—Without Identity Driven Manager” to learn how to configure
the NAC 800 to provide RADIUS services without IDM.
This chapter focuses on configuring a stand-alone NAC 800 that is functioning
as a combination server (CS)—the typical setting for a RADIUS-only NAC 800.
In one circumstance only might you use a cluster deployment instead: you are
adding a RADIUS-only NAC 800 to a system that already enforces endpoint
integrity with a cluster configuration. In this case, the RADIUS-only NAC 800
would be an ES in a new cluster that enforces 802.1X quarantining and no
endpoint integrity. You would configure most of the settings described in this
chapter in the MS’s Web browser interface. However, you would create digital
certificates through the RADIUS-only NAC 800’s root command line.
RADIUS Overview
The RADIUS protocol regulates communications between Network Access
Servers (NASs) and authentication servers. The NASs are the points of access
for endpoints—for example, switch ports or wireless access points (APs).
They are also called the server’s clients. In your network, the NAC 800 is the
authentication server.
When an end-user attempts to connect to a NAS, the NAS sends an authenti-
cation request to the NAC 800, its RADIUS server. The NAC 800 decides
whether the end-user can connect. The NAC 800 bases this decision on
whether the end-user submits valid credentials as well as—using IDM poli-
cies—the time and location of the access attempt.
Summary of Contents for 800
Page 1: ...Configuration Guide www procurve com ProCurve Network Access Controller 800 ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Configuration Guide April 2008 1 0 30398 ...
Page 74: ...1 62 Overview of the ProCurve NAC 800 Deployment Methods ...
Page 155: ...3 27 Initial Setup of the ProCurve NAC 800 System Settings ...
Page 194: ...3 66 Initial Setup of the ProCurve NAC 800 Digital Certificates ...
Page 336: ...6 8 Disabling Endpoint Integrity Testing Overview ...
Page 354: ...7 18 Redundancy and Backup for RADIUS Services Back Up Your NAC 800 Configuration ...
Page 380: ...A 26 Appendix A Glossary ...
Page 394: ...B 14 Appendix B Linux Commands Service Commands ...
Page 405: ......