The Nac 800 Process; About Nac 800; Nac Policy Definition - HP ProCurve NAC 800 User Manual

Hide thumbs Also See for ProCurve NAC 800:
Table of Contents

Advertisement

Introduction
Overview
1-10
Extensible – NAC 800's easy-to-use open API allows administrators
to create custom tests for meeting unique organizational require-
ments. The API is fully exposed and thoroughly documented. Custom
tests are created using scripts and can be seamlessly added to existing
policies.
Compatible with existing heterogeneous network infrastructure – No
upgrades to your existing network infrastructure are required.
Variety of enforcement options – Permit, deny, or quarantine based
on test results.
Self-remediation – Reduces IT administration by empowering users
to bring their machines into compliance.
Subscription-based licensing – Includes all test updates and software
upgrades.

The NAC 800 Process

NAC 800 administrators create "NAC policies" that define which applications
and services are permitted, and specify the actions to be taken when endpoints
do not comply. NAC 800 automatically applies the NAC policies to endpoints
as they log into the network, and periodically as the endpoints remain logged
into the network. Based on results, endpoints are either permitted or quaran-
tined to a specific part of the network, thus enforcing the organizational
security standards. NAC 800 tracks all testing and connection activity and
produces a range of reports for auditors, managers, and IT staff.
NAC 800 performs pre-connect testing; when an endpoint passes the NAC
policy tests (or is otherwise granted access), the endpoint is allowed access
to the network. If you have external Intrusion Detection System/Intrusion
Prevention System (IDS/IPS) systems that monitor your network for attacks,
you can configure these external systems in NAC 800 so they can request that
NAC 800 quarantine an endpoint after it has been connected (post-connect).

About NAC 800

NAC Policy Definition

NAC policies consist of individual tests that evaluate the security status of
endpoints attempting to access the network. Specific tests assess operating
systems, verify that key hotfixes and patches have been installed, ensure
antivirus and other security applications are present and up-to-date, detect

Advertisement

Table of Contents
loading

Table of Contents