Security Solutions

Index – 5
O
operating systems … 2-28, 2-37
WMI support … 1-41
OS-X
security settings … 2-37
P
password authentication protocol (PAP) … 1-24
Payment Card Industry Data Security Standard (PCI
DSS) … 2-17
PCM+ … 1-59
required for IDM … 3-99
PDP
802.1X process … 1-21
access control architecture … 3-84
defined … 1-12
MAC-Auth process … 1-17
NAC 800 as … 1-53
network access control process … 1-15
selecting … 3-79
Web-Auth process … 1-19
PEAP … 1-27, 1-53
PEP … 1-46
802.1X process … 1-21
802.1X quarantining … 1-54
access control architecture … 3-84
defined … 1-11
DHCP deployment method … 1-43
DHCP quarantining … 1-48
MAC-Auth process … 1-17
network access control process … 1-15
selecting … 3-79
Web-Auth process … 1-19
PKI
EAP method … 3-102
PoE
for ProCurve APs and RPs … 3-138
policies
implementing … 3-129
NAC 800 … 3-120
policy decision point
See PDP
policy enforcement point
See PEP
policy repository … 1-14, 1-16
access control architecture … 3-84
ports
destination … 1-35
Ethernet … 1-31
TCP and UDP … 1-9
post-connect testing … 3-71
See also testing
posture
See endpoint integrity
PPTP … 3-38
pre-connect testing
See testing
printers … 1-23, 2-30
ProCurve Network Immunity Manager … 2-24
ProCurve Secure Router … 3-39
VPN capabilities of … 3-145
ProCurve switches
network access control capabilities of … 3-32,
3-142
ProCurve VPN client
capabilities of … 3-146
ProCurve wireless products
authentication supported … 3-137
capabilities of … 3-136
encryption supported … 3-137
network access control capabilities of … 3-30
PoE for RPs and APs … 3-138
Protected EAP
See PEAP
protocols
authentication … 1-23
Q
QoS settings … 3-114
quarantine … 1-43
enforcement … 1-51
subnet … 1-49
VLAN … 1-43, 1-47, 1-54
quarantine methods … 1-42
802.1X … 1-42, 1-54
DHCP … 1-43, 1-48
inline … 1-43, 1-52
See also quarantining