Security Solutions
A-24
Addendum to the ProCurve Access Control Security Design Guide
Updating the Access Control Design Process
Updating the Access Control Design
Process
With the new features provided by the ProCurve Access Control Solution 2.1,
the process of designing access control security must be updated. First, a new
step must be added. After you choose an access control method and make
decisions about remote access (virtual private network, or VPN), you must
select the endpoint integrity solution. The updated design process is outlined
below.
1. Choose the access control methods.
2. Make decisions about remote access (VPN).
3. Choose the endpoint integrity solution.
4. Choose the endpoint integrity deployment method.
5. Choose the endpoint integrity testing method.
6. Choose Remote Authentication Dial-In User Service (RADIUS) servers.
7. Add ProCurve Identity Driven Manager (IDM).
8. Select an Extensible Authentication Protocol (EAP) method for 802.1X.
9. Finalize security policies.
10. Lay out the network.
This section helps you select the endpoint integrity solution that is the better
option for your organization—ProCurve NAC 800 or Microsoft NAP. (For
detailed information about the other steps in the process, see the ProCurve
Access Control Security Design Guide.)
In addition to the new step, one of the steps in the design process must be
slightly modified. Specifically, choosing an endpoint integrity deployment
method must be updated to include the new options for deploying the
NAC 800.