1-29
Overview of the ProCurve NAC 800
Endpoint Integrity
can download service packs, patches, and so forth. You can add hostnames
and IP addresses to the list in order to provide additional services for the
quarantined endpoints.
N o t e
On an MS, you can customize accessible services per cluster.
The means by which the NAC 800 restricts quarantined endpoints to the
accessible services differs based on the deployment method. In addition, you
might need to set up your network infrastructure to support the NAC 800’s
restrictions. “Deployment Methods” on page 1-33 explains in more depth.
Performance Implications of Endpoint Integrity Checks
The time and bandwidth required to complete an endpoint integrity check
depends on the NAC policy. The more tests, clearly, the longer the check
will take.
The High Security NAC policy, a pre-defined policy that includes approxi-
mately 20 tests, can be taken as a general high mark. The NAC 800 passes
approximately 9 to 16 kilobytes of total data between itself and an endpoint
to complete a single testing session with this policy. On a typical LAN, the
testing process would typically take between 5 and 10 seconds.
Post-Connect Testing
Integrity checking ensures that endpoints adhere to your company’s security
policy before they are allowed onto the network. To protect your network,
however, security cannot stop there. For example, some of the users who are
granted access to your network may not be completely trustworthy. Partners,
guests, and even disgruntled employees may launch attacks on your network.
In addition, some users may share their login credentials with others, thereby
compromising your network and opening it to attack.
For these reasons, many companies implement additional protections such as
an IDS/IPS, which can use signatures, behavior-based monitoring, and anom-
aly detection to identify attacks. The NAC 800 integrates with such security
devices. After the NAC 800 has tested a device to ensure that it meets your
standards for endpoint integrity, it is allowed onto the network, and the post-
connect testing can occur. If a security device, such as an IDS/IPS, detects a
problem with a particular endpoint, it can send a message to the NAC 800,
requesting that the NAC 800 quarantine the endpoint.
Summary of Contents for 800
Page 1: ...Configuration Guide www procurve com ProCurve Network Access Controller 800 ...
Page 2: ......
Page 3: ...ProCurve Network Access Controller 800 Configuration Guide April 2008 1 0 30398 ...
Page 74: ...1 62 Overview of the ProCurve NAC 800 Deployment Methods ...
Page 155: ...3 27 Initial Setup of the ProCurve NAC 800 System Settings ...
Page 194: ...3 66 Initial Setup of the ProCurve NAC 800 Digital Certificates ...
Page 336: ...6 8 Disabling Endpoint Integrity Testing Overview ...
Page 354: ...7 18 Redundancy and Backup for RADIUS Services Back Up Your NAC 800 Configuration ...
Page 380: ...A 26 Appendix A Glossary ...
Page 394: ...B 14 Appendix B Linux Commands Service Commands ...
Page 405: ......