This document contains information which is protected by
copyright. Reproduction, adaptation, or translation without
prior permission is prohibited, except as allowed under the
copyright laws.
Publication Number
5991-8571
August 2007
(rev-
h)
Disclaimer
The information contained in this document is subject to
change without notice.
HEWLETT-PACKARD COMPANY MAKES NO WARRANTY
OF ANY KIND WITH REGARD TO THIS MATERIAL,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. Hewlett-Packard shall not
be liable for errors contained herein or for incidental or
consequential damages in connection with the furnishing,
performance, or use of this material.
Hewlett-Packard assumes no responsibility for the use or
reliability of its software on equipment that is not furnished
by Hewlett-Packard.
Trademark Credits
Microsoft, Windows, Windows 95, and Microsoft Windows
NT are registered trademarks of Microsoft Corporation.
Internet Explorer is a trademark of Microsoft Corporation.
Ethernet is a registered trademark of Xerox Corporation.
Netscape is a registered trademark of Netscape Corporation.
Warranty
See the Customer Support/Warranty booklet included with
the product.
A copy of the specific warranty terms applicable to your
Hewlett-Packard products and replacement parts can be
obtained from your HP Sales and Service Office or
authorized dealer.
Hewlett-Packard Company
8000 Foothills Boulevard, m/s 5551
Roseville, California 95747-5551
http://www.hp.com/go/hpprocurve
Contents
1 Introduction
What you Need to get Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-2
The following hardware and software is required to operate NAC 800:
■One or more ProCurve NAC 800 appliances
■Configuration information – See “Installation and Configuration
■An Internet connection or a web proxy server that allows outbound
■Workstation – A workstation running one of the following browsers
■A ProCurve NAC Implementation Start-up Service, from an autho-
■A ProCurve NAC Endpoint Integrity Agent License
What you Need to get Started
Check List” on page C-1
HTTPS communications from the MS
with 128-bit encryption:
•Windows –
Mozilla version 1.7
Mozilla Firefox version 1.5 or later
Internet Explorer 6.0
•Linux –
Mozilla version 1.7
Mozilla Firefox version 1.5 or later
rized ProCurve partner or ProCurve.
1-2
ProCurve NAC 800 is delivered as a hardware appliance that you install in your
network. After NAC 800 is installed in your network, you configure it using a
workstation with browser software installed.
The browser software must be configured as described in “Important Browser
Settings” on page B-1.
The following documents provide information on installation and configuration, and are available at www.procurve.com/nactools:
1.ProCurve Network Access Controller 800 Hardware Installation Guide
– Refer to this document first to see how to prepare for and perform the
physical installation of the appliance and how to establish initial
management access. This document contains appliance specifications,
safety information, and appliance certifications.
2.ProCurve Network Access Controller 800 Configuration Guide – Refer
to this document second, to understand the product's features,
capabilities, and use. This document explains how to configure the
appliance based on the usage model you choose to deploy in your
network.
What you Need to get Started
Introduction
3.ProCurve Network Access Controller 800Users’ Guide – Refer to this
document last for information on configuring, monitoring activities,
creating NAC policies, and running reports.
1-3
Introduction
NAC 800 Home Window
NAC 800 Home Window
The NAC 800 Home window (figure 1-1) is a centralized management console
that allows you to quickly assess the status of your network. The following
list and figure describe and show the key features:
1.Important status announcements – If there is anything that needs your
immediate attention, a status announcement is displayed at the top of the
window. Click clear to remove the announcement.
2.Username’s account – Click this icon to open the user account editing
window. See “User Accounts” on page 3-29 for details on creating and
editing user accounts. You must have administrator privileges to create
user accounts; however, any user can edit their own account.
3.Top 5 failed tests area – The Top 5 failed tests area indicates the tests that
fail the most. Click on an endpoint number or the Test results report option
to view details.
4.Window actions – Use these links to refresh the window, log out of the
console, and access online help.
5.Navigation pane – The menu items shown in this pane vary depending on
your permission level. See “User Roles” on page 3-37 for more information
on permissions. You must have administrator privileges to create and edit
user roles. Once you select a menu item from the navigation pane, use the
bread crumbs at the top of the windows to navigate throughout the
console (see figure 1-2. System Monitor Window on page 1-7).
1-4
6.Endpoint test status area – The Endpoint tests area displays the total
number of endpoints that NAC 800 has attempted to test, and what the
test status is for each endpoint. Click the number of endpoints to view
details.
7.Access control status area – The Access control area displays the total
number of endpoints that have attempted to connect to your network, and
what the access state is as a percentage and as a number. Click on the
number of endpoints to view details.
8.Enforcement server status area – The Enforcement server status area
provides status on your Enforcement servers. Click the System monitor
option to view details.
NAC 800 Home Window
3. Top 5 failed
tests area
Introduction
1. Important status
announcements
5. Navigation
pane
6. Test
status area
4. Window actions
7. Access control
status area
2. User name
8. Enforcement server
status area
Figure 1-1. NAC 800 Home Window
1-5
Introduction
System Monitor
System Monitor
The System monitor window provides the following information:
■Enforcement cluster name – The Enforcement clusters are listed by
name in the order they were created. Click on a cluster name to view
cluster details. You must have cluster-editing permissions to view and
edit cluster details.
■Server name by cluster – The servers for each cluster are listed by
name in the order they were created. Click on a server name to view
server details. You must have cluster-editing permissions to view and
edit server details.
■Cluster access mode – The cluster access mode is either normal, allow
all, or quarantine all. See “Enforcement Clusters and Servers” on page
3-6 for instructions on making the access mode selection.
■Health status – Health status shows ok for servers with no problems,
and either warning or error for servers with problems. Click the server
name to view details.
■Upgrade status – Upgrade status shows the status of any upgrades in
process.
■% memory used – The amount of memory currently used by each
server is shown as a percentage of total memory available.
■Endpoints tested/minute – The number of endpoints tested over the
last 15 minutes or less.
■Endpoints queued – The number of tests running or scheduled to run
on that ES.
■System load average – The number of processes waiting to run (top
command). In Linux, entering top at the command line returns a realtime look at processor activity.
1-6
Breadcrumbs for navigation
Introduction
System Monitor
Figure 1-2. System Monitor Window
The following figure shows the legend for the System monitor window icons:
Figure 1-3. System Monitor Window Legend
1-7
Introduction
Overview
Overview
NAC 800 protects the network by ensuring that endpoints are free from threats
and in compliance with the organization's IT security standards. NAC 800
systematically tests endpoints—with or without the use of a client or agent—
for compliance with organizational security policies, quarantining non-compliant machines before they damage the network.
NAC 800 ensures that the applications and services running on endpoints
(such as LAN, RAS, VPN, and WiFi endpoints) are up-to-date and free of
worms, viruses, trojans, P2P and other potentially damaging software. It
dramatically reduces the cost and effort of securing your network's weakest
links—the endpoints your IT group might not adequately control.
There are advantages and disadvantages inherent with each of the test method
technologies. Having a choice of testing solutions enables you to maximize
the advantages and minimize the disadvantages.
TIP:Agentless testing uses an existing Windows service (RPC). ActiveX testing
uses an ActiveX control. ProCurve agent testing installs an agent (ProCurve
NAC EI Agent) and runs as a new Windows service.
The trade-offs in the test methods are described in the following table:
Test methodTrade-offs
ProsCons
Agentless• Truly agentless, no install or download.
• No extra memory load on the client machine.
• Can begin testing, view test results, and give
network access without any end-user
interaction for
domains.
• Easiest of the three test methods to deploy.
• Saves administration time and is therefore
less expensive than agent-based solutions.
endpoints on your Windows
Table 1-1.Test Methods
1-8
• Requires RPC Service to be available to the
NAC 800 server (ports 139 or 445).
• Requires file and print sharing to be enabled.
• Not supported by legacy Windows™
operating systems and non-Windows
operating systems.
• If the endpoint is not on a domain, the user
must specify local credentials. A user often
does not know what credentials to enter.
Test methodTrade-offs
ProsCons
Introduction
Overview
ActiveX plug-in• No installation or upgrade to maintain.
• Supports all Windows operating systems.
• Only Internet Explorer application access
required through personal firewall. Must
open port 1500.
ProCurve NAC EI
Agent
• Always available for retesting.
• The agent is automatically updated with
product updates.
options for quarantining endpoints that do not comply with your
security policy (Inline, DHCP, and 802.1X). This enables NAC 800 to
enforce compliance across complex, heterogeneous networks.
■High availability and load balancing – A multi-server NAC 800 deploy-
ment is mutually supporting. Should one server fail, other nodes
within a cluster will automatically provide coverage for the affected
network segment.
• No retesting of endpoint once browser is
closed.
• Not supported by non-Windows operating
systems.
• Browser security settings must allow
ActiveX control operation of signed and safe
controls. This is the default for the Internet
zone. Raise the Internet zone setting and
make
NAC 800 part of the trusted zone.
• Requires interaction from end-users—they
must download the control before they can
access network.
• Install and upgrade to maintain.
• Requires one-time interaction from endusers—they must download and install
before they can access network.
Load balancing is achieved by an algorithm that spreads the endpoint
testing load across all Enforcement servers in a cluster.
■Multiple-user, role-based access – In enterprise deployments
numerous individuals, each with varying responsibilities, typically
require access to information within NAC 800. Role-based access
enables system administrators to control who has access to the data,
the functions they are allowed to perform, and the information they
can view and act on. Role-based access ensures the integrity of the
enterprise-wide NAC 800 deployment and creates the separation of
duties that conforms to security best-practices.
1-9
Introduction
Overview
■Extensible – NAC 800’s easy-to-use open API allows administrators
to create custom tests for meeting unique organizational requirements. The API is fully exposed and thoroughly documented. Custom
tests are created using scripts and can be seamlessly added to existing
policies.
■Compatible with existing heterogeneous network infrastructure – No
upgrades to your existing network infrastructure are required.
■Variety of enforcement options – Permit, deny, or quarantine based
on test results.
■Self-remediation – Reduces IT administration by empowering users
to bring their machines into compliance.
■Subscription-based licensing – Includes all test updates and software
upgrades.
The NAC 800 Process
NAC 800 administrators create "NAC policies" that define which applications
and services are permitted, and specify the actions to be taken when endpoints
do not comply. NAC 800 automatically applies the NAC policies to endpoints
as they log into the network, and periodically as the endpoints remain logged
into the network. Based on results, endpoints are either permitted or quarantined to a specific part of the network, thus enforcing the organizational
security standards. NAC 800 tracks all testing and connection activity and
produces a range of reports for auditors, managers, and IT staff.
1-10
About NAC 800
NAC Policy Definition
NAC policies consist of individual tests that evaluate the security status of
endpoints attempting to access the network. Specific tests assess operating
systems, verify that key hotfixes and patches have been installed, ensure
antivirus and other security applications are present and up-to-date, detect
the presence of worms, trojans, and viruses, and check for potentially dangerous applications such as file sharing, peer-to-peer (P2P), or spyware. See
“Tests Help” on page A-1 for more information.
Key features include:
■Out-of-the-box NAC policies – High, medium, and low security are
ready to use with no additional configuration required.
■Standard tests – NAC 800 comes with a broad range of tests.
Introduction
Overview
■Automatic test updates – NAC 800 is automatically updated with tests
that cover newly released patches, hotfixes, software updates,
worms, and trojans, and recommended security settings for common
applications. New tests are automatically added to the test database
as frequently as hourly, ensuring immediate protection against newly
discovered threats.
■Organization-specific policies – Any number of NAC policies can be
created and tailored to your organizational needs. Create policies for
like endpoints (for example, all Windows 2000 workstations), for an
IP range or specific IPs, or by geographic location.
Endpoint Testing
NAC 800 automatically tests all endpoints attempting to access your network
through a LAN, RAS, VPN, or WiFi connection. Tests are fast and you are kept
informed of test progress and results. After the initial compliance tests, NAC
800 periodically tests endpoints that have been granted access to ensure that
real-time system changes do not violate the NAC policy.
TIP:NAC 800 passes approximately 9 to 16 kilobytes of total data between a single
endpoint and a single NAC 800 server for a single testing session with the High
Security NAC policy (approximately 20 tests). It typically takes between 5 and
10 seconds to all tests in a policy on a 100Mb LAN. If your endpoints are taking
longer to test, there might be a configuration problem with DNS on the NAC
800 server.
NOTE:If the end-user selects ActiveX test and then closes the browser, their endpoint
is not retested until the end-user opens another browser session, reloading
the ActiveX agent.
Key features include:
■Multiple test method options – Agentless, ActiveX, or ProCurve NAC
EI Agent. Select the most appropriate method for your environment
or endpoint.
■Rapid testing and robust endpoint management – Thousands of
endpoints can be tested and managed simultaneously.
■Continual testing – Endpoints are retested on an administrator-
defined interval as long as they remain connected to the network.
1-11
Introduction
Overview
Compliance Enforcement
Based on endpoint test results, NAC 800 takes the appropriate action. Endpoints that test compliant with the applied policy are permitted access. Noncompliant endpoints are either quarantined, or are given access for a temporary period. Implement the necessary fixes during this period.
Key features include:
■Flexible enforcement options – Grant or quarantine access criteria is
designated by the administrator and driven by the criticality of
selected tests and corporate security standards.
■Manual overrides – Administrators can retest, quarantine, or grant
access to endpoints on demand.
■User notifications – Users of non-compliant endpoints receive imme-
diate notification about the location of the endpoint deficiencies, as
well as step-by-step information about implementing the corrections
to achieve compliance.
■Administrator notifications – Administrators receive a variety of noti-
fications and alerts based on testing and access activity.
■Graduated enforcement – Allows controlled system rollout.
1-12
Automated and Manual Repair
■Self-remediation – End-users are notified of where their endpoints are
deficient and provided with remediation instructions.
■Access "grace period" – Non-compliant endpoints are granted access
for a temporary, administrator-defined period to facilitate remediation.
Targeted Reporting
NAC 800 reports provide concise security status information on endpoint
compliance and access activity. Specific reports are available for auditors,
managers, and IT staff members.
For more information, see “Reports” on page 12-1.
Technical Support
Technical support is available through www.procurve.com.
Introduction
Technical Support
1-13
Introduction
Additional Documentation
Additional Documentation
NAC 800 documentation is available in a number of media formats and is
accessible in a variety of ways:
■Quick-start card – The Quick-start card provides a high-level overview
of the physical deployment options, software installation, post-installation configuration, the Users’ Guide, and how to get support.
■Online help – Online help is an essential component that assists in the
installation, configuration, and ongoing management of NAC 800. You
can access the online help by clicking the question mark displayed in
the upper-right corner of the primary interface elements.
1-14
Introduction
Upgrading
Upgrading
Upgrading is described in“Checking for NAC 800 Upgrades” on page 3-27.
CAUTION:Installing third-party software on the NAC 800 server is not supported. If you
install additional software on the NAC 800 server, you need to remove it in
order to troubleshoot any NAC 800 issues, and it will likely be partially or fully
overwritten during NAC 800 release upgrades or patch installs, compromising
the third-party software functionality. Additionally, installing third-party software and/or modifying the NAC 800 software can violate your license agreement.
1-15
Introduction
Conventions Used in This Document
Conventions Used in This Document
The conventions used in this document are described in this section:
Navigation Paragraph
Navigation paragraphs provide a quick visual on how to get to the screen or
area discussed.
Example:
NAC 800 main window>>Configure system
Tip Paragraph
Tips provide helpful, but not required information.
Example:
TIP:Hover the cursor over the “x dhcp servers with errors” text to get additional
information in a pop-up window.
Note Paragraph
Notes notify you of important information.
Example:
NOTE:If there is no activity for 30 minutes, the configuration window times out and
you must log in again.
Caution Paragraph
Cautions notify you of conditions that can cause errors or unexpected results.
Example:
CAUTION:Do not rename the files or they will not be seen by NAC 800.
1-16
Conventions Used in This Document
Introduction
Warning Paragraph
Warnings notify you of conditions that can lock your system or cause damage
to your data.
Example:
WARNING:Do not log in using SSH—this kills your session and causes your session to
hang.
Bold Font
Bold font indicates the text that appears on a window or screen.
Example:
9.If the Domains connection method is enabled (Credentials tab, enabled
check box), you must specify your Windows domain controller here.
Task Paragraph
Task paragraphs summarize the instructions that follow.
Example:
To enter LDAP information:
Italic Text
Italic text is used in the following cases:
■Showing emphasis –
Low – You are not protected from potentially unsafe macros. (Not
recommended).
■Indicating document titles –
NAC 800 Installation Guide
■Indicating a variable entry in a command –
https://<IP_address>/index.html
In this case, you must replace <IP_address> with the actual IP
address, such as 10.0.16.99. Do not type the angled brackets.
1-17
Introduction
Conventions Used in This Document
Courier Font
Courier font is used in the following cases:
■Indicating path names –
Change the working directory to the following:
C:\Program Files\<MyCompany>\
■Indicating text; enter exactly as shown –
ProCurve NAC EI Agent
Enter the following URL in the browser address field:
https://<IP_address>/index.html
In this case, you must replace <IP_address> with the actual IP
address, such as 10.0.16.99. Do not type the angled brackets.
■Indicating file names –
SAIASConnector.ini
Angled Brackets
Angled brackets enclose variable text that needs to be replaced with your
specific values.
Example:
https://<IP_address>/index.html
In this case, you must replace <IP_address> with the actual IP address, such
as 10.0.16.99. Do not type the angled brackets.
MAC Media Access Control – The unique number that identifies a
physical endpoint. Generally referred to as the MAC address.
Introduction
1-19
Introduction
Copying Files
Copying Files
Whenever you copy a file from one machine to another, copy it using a secure
copy utility that uses the Secure Shell (SSH) protocol. The exact syntax of the
copy command will vary based on the utility you use.
Example:
10. Copy the /usr/local/nac/properties/NACAVPs.txt file from the
NAC 800 server to the ACS server using PSCP (or other secure copy
utility).
SCP
scp is a Linux/UNIX command used to copy files between Linux/UNIX
machines. It has the following syntax:
NAC 800 uses clusters and servers. A "cluster" is a logical grouping of one or
more Enforcement servers (ESs) that are managed by one Management server
(MS).
A single-server installation is one where the MS and ES are on one server. The
ES is assigned to a Default cluster. This configuration is illustrated in figure 2-
1.
A multiple-server installation is one where the MS is on one server and there
are one or more ESs on separate servers. Each ES must be assigned to a
cluster. This configuration is illustrated in figure 2-2.
The responsibilities of the MS and ES are as follows:
■Management server
•Configuration
•NAC policies
•Quarantining
•Endpoint activity
•License
•Test updates
■Enforcement server
•Testing
•Access control
2-2
The quarantine method is defined per cluster; all of the Enforcement servers
in a given cluster use the same quarantine method (Inline, DHCP, or 802.1X).
When using multiple clusters, each cluster can have a different quarantine
method. Clusters cooperate to test and control access to the network,
although the ESs in each cluster are not able to communicate with any ES in
any other cluster.
Clusters and Servers
Installation Examples
Installation Examples
Single-server Installation
The simplest installation is where the MS and ES are installed on the same
physical server as shown in the following figure:
Figure 2-1. Single-server Installation
Multiple-server Installations
By using at least three servers, one for the MS and two for Enforcement
servers, you gain the advantage of high availability and load balancing.
2-3
Clusters and Servers
Installation Examples
High availability is where Enforcement servers take over for any other
Enforcement server or servers that become unavailable. Load balancing is
where the testing of endpoints is spread evenly over all of the Enforcement
servers. A three-server installation is shown in the following figure:
2-4
Figure 2-2. Multiple-server Installation
Clusters and Servers
Installation Examples
When your network is more complex, you can continue to add clusters as
shown in the following figure:
The system configuration area allows you to select default settings for all
clusters, as well as override the default settings on a per-cluster basis. See
“System Configuration” on page 3-1 for task-based instructions.
The following recommendations should be followed when configuring your
network for best performance results:
■A maximum of five ESs per cluster
■A maximum of 10 ESs per MS
■A maximum of 3000 endpoints per ES
When these recommendations are followed, the following applies:
■80% of the 3000 endpoints will be tested in 30 seconds or less
■All endpoints are returned to the proper status within 15 minutes after
a network recovery (power failure, all endpoints attempting to reconnect, 3000 endpoints per ES)
User logins and associated user roles determine the access permissions for
specific functionality within NAC 800. The following table shows the default
home window menu options that are available by user role:
User roleHome window menu options available
System Administrator• Endpoint activity
• NAC policies
• System monitor
• Reports
• System configuration
Cluster Administrator• Endpoint activity
• System monitor
• Reports
• Enforcement clusters & servers
Help Desk Technician• Endpoint activity
• Reports
3-4
View-Only User• Endpoint activity
• Reports
Table 3-1.Default Menu Options
Only a system administrator can assign access permissions and access the
System configuration window. See Figure 1-1 on page 1-5 for the NAC 800 home
window of a user with system administration permissions. If you do not see
the System configuration menu option, you do not have system administrator
permissions.
NAC 800 configuration includes the following:
■Enforcement clusters & servers – “Enforcement Clusters and
Servers” on page 3-6
■Management server – “Management Server” on page 3-21
■User accounts – “User Accounts” on page 3-29
■User roles – “User Roles” on page 3-37
■License – “License” on page 3-43
■Test updates – “Test Updates” on page 3-45
System Configuration
■Quarantining – “Quarantining” on page 3-49
■Maintenance – “Maintenance” on page 3-91
■Cluster setting defaults
Introduction
•Testing Methods – “Testing Methods” on page 3-95
•Accessible services – “Accessible Services” on page 3-98
•Exceptions – “Exceptions” on page 3-100
•Notifications – “Notifications” on page 3-102
•End-user screens – “End-user Screens” on page 3-104
•Agentless credentials – “Agentless Credentials” on page 3-107
•Logging – “Logging” on page 3-111
•Advanced – “Advanced Settings” on page 3-114
NOTE:You can override any of the cluster default settings on a per-cluster basis.
3-5
System Configuration
Enforcement Clusters and Servers
Enforcement Clusters and Servers
The Enforcement clusters & servers menu option (figure 3-3) is where you
configure Enforcement clusters and servers. You can perform the following
tasks:
■Enforcement clusters
■Enforcement servers
•Add, edit, or delete Enforcement clusters
•Set operating parameters for specific Enforcement clusters, which
differ from the default Enforcement cluster and server settings set up
on the System configuration window
•View available Enforcement clusters and associated servers
•View status of Enforcement clusters and servers
•Select cluster access mode (normal, allow all, or quarantine all)
•Add, edit, or delete Enforcement servers
•Set Enforcement server network settings, date and time, SNMP set-
tings, and password
•View available Enforcement servers
•View status, memory usage, and disk space usage of Enforcement
servers
3-6
System Configuration
Enforcement Clusters
Enforcement Clusters
Adding an Enforcement Cluster
To add an Enforcement cluster:
NAC 800 Home window>>System configuration>>Enforcement clusters &
servers
Figure 3-1. System Configuration Window, Enforcement Clusters & Servers Area
3-7
System Configuration
Enforcement Clusters
1.Click Add an Enforcement cluster in the Enforcement clusters & servers area.
The Add Enforcement cluster window appears. The General area is
displayed by default.
Figure 3-2. Add Enforcement Cluster Window
a.Enter a name for the Enforcement cluster in the Cluster name field.
b.Select one of the following access modes:
–normal – Either allows or quarantines endpoints depending on the
setup of the enforcement sever
–allow all – Allows all endpoints
–quarantine all – Quarantines all endpoints
NOTE:If you are setting up a cluster for the first time, and you have not yet added
an ES, select allow all until you have finished configuring NAC 800.
c.Select a NAC policy group from the NAC policy group drop-down list
(see “NAC Policies” on page 6-1).
2.Click Quarantining in the Add Enforcement cluster window. Complete the
steps described in “Quarantining” on page 3-49.
3-8
System Configuration
Enforcement Clusters
TIP:You can also access the quarantine area Enforcement cluster by clicking
Quarantining in the System configuration window (see “Quarantining” on
page 3-49 for more information).
3.The following cluster settings take on default values set from the System configuration window. To set up operating parameters that differ from
those default settings, select the menu item of the settings you want to
change, then select the For this cluster, override the default settings check
box, and make the desired changes. Refer to the sections listed below to
set up the default values, or for more information on the specific settings.
•Testing methods – See “Testing Methods” on page 3-95
•Accessible services – See “Accessible Services” on page 3-98
•Exceptions – See “Exceptions” on page 3-100
•Notifications – See “Notifications” on page 3-102
•End-user screens – See “End-user Screens” on page 3-104
•Agentless credentials – See “Agentless Credentials” on page 3-107
•Logging – See “Logging” on page 3-111
•Advanced – See “Advanced Settings” on page 3-114
Editing Enforcement Clusters
To edit the Enforcement clusters settings:
NAC 800 Home window>>System configuration>>Enforcement clusters &
servers
1.Click the cluster you want to edit. The Enforcement cluster window
appears, as shown in Figure 3-3 on page 3-11.
2.Click a menu option to access the cluster settings:
•General
•Quarantining
•Testing methods
•Accessible services
•Exceptions
•Notifications
•End-user screens
•Agentless credentials
•Logging
3-9
System Configuration
Enforcement Clusters
•Advanced
3.Enter or change information in the fields you want to modify, as described
in “Adding an Enforcement Cluster” on page 3-7.
4.Click ok.
Viewing Enforcement Cluster Status
There are two ways NAC 800 provides Enforcement cluster status:
■The icons next to the cluster name (see Figure 3-4 on page 3-13)
■The Enforcement cluster window (see the following steps)
To view Enforcement cluster statistics:
NAC 800 Home window>>System configuration>>Enforcement clusters &
servers
3-10
System Configuration
Enforcement Clusters
Click a cluster name, for example Austin. The Enforcement cluster window
appears:
Figure 3-3. Enforcement Cluster Window, General Option
The statistics shown in this window are per cluster, where the statistics shown
in the Home window are system-wide.
Deleting Enforcement Clusters
NOTE:Enforcement clusters need to be empty before the delete option appears next
to the name in the NAC 800 console.
To delete Enforcement clusters:
NAC 800 Home window>>System configuration>>Enforcement clusters &
servers
3-11
System Configuration
Enforcement Clusters
1.Click delete next to the cluster you want to remove. The Delete Enforcem ent
cluster confirmation window appears.
2.Click yes. The System configuration window appears (figure 3-1).
3-12
System Configuration
Enforcement Servers
Enforcement Servers
Adding an Enforcement Server
To add an Enforcement server:
NAC 800 home window>>System configuration>>Enforcement clusters &
servers
Figure 3-4. System Configuration Window, Enforcement Clusters & Servers Area
3-13
System Configuration
Enforcement Servers
1.Click Add an Enforcement server in the Enforcement clusters & servers area.
The Add Enforcement server window appears.
Figure 3-5. Add Enforcement Server Window
2.Select a cluster from the Cluster drop-down list.
3.Enter the IP address for this Enforcement server in the IP address text box.
4.Enter the fully qualified hostname to set on this server in the Host name
text box.
5.Enter one or more DNS resolver IP addresses, separated by a commas,
semicolons, or spaces in the DNS IP addresses text box. For example,
10.0.16.100,10.0.1.1
6.Enter the password to set for the root user of the ES server’s operating
system in the Root password text box.
7.Re-enter the password to set for the root user of the ES server’s operating
system in the Re-enter root password text box.
8.Click ok.
3-14
System Configuration
Enforcement Servers
Cluster and Server Icons
The following figure shows the legend explaining the Enforcement cluster and
server status icons:
Figure 3-6. Enforcement Cluster Legend
Editing Enforcement Servers
To edit Enforcement server settings:
NAC 800 Home window>>System configuration>>Enforcement clusters &
servers
1.Click the Enforcement server you want to edit. The Enforcement server
window appears, as shown in Figure 3-7 on page 3-16.
3-15
System Configuration
Enforcement Servers
2.Click the Configuration menu option to access the Enforcement server’s
settings. The Configuration area is displayed:
Figure 3-7. Enforcement Server Configuration Window
3.Edit the following setting(s):
•Enforcement server network settings – “Changing the Enforcement
Server Network Settings” on page 3-17
•Enforcement server date and time – “Changing the Enforcement
Server Date and Time” on page 3-17
•Enforcement server SNMP settings – “Modifying the ES root Account
Password” on page 3-18
•Enforcement server password – “Modifying the ES root Account
Password” on page 3-18
4.Click ok.
3-16
System Configuration
Enforcement Servers
Changing the Enforcement Server Network Settings
CAUTION:Back up your system immediately after changing the MS or ES IP address. If
you do not back up with the new IP address, and later restore your system, it
will restore the previous IP address which can show an ES error condition
and cause authentication problems. See “Maintenance” on page 3-91 for
instructions on backing up and restoring your system.
To change the Enforcement server network settings:
NAC 800 Home window>>System configuration>>Enforcement clusters &
servers>>Select an ES>>Configuration
Modify any of the following Network settings you want to change:
■Enter a new Enforcement server in the Host name text field. For
example, garp.mycompany.com
■Enter a new Enforcement server address in the IP address text field.
For example, 192.168.153.35
■Enter a new netmask in the Network mask text field. For example,
255.255.255.0
■Enter a new gateway in the Gateway IP address text field. For example
192.168.153.2
■Enter one or more DNS resolver IP addresses, separated by commas,
semicolons, or spaces in the DNS IP addresses text box. For example:
10.0.16.100,10.0.1.1
NOTE:The NAC 800 Enforcement server’s host name must be a fully qualified domain
name (FQDN). For example, the FQDN should include the host and the
domain name—including the top-level domain.
For example, waldo.mycompany.com. Select names that are short, easy to
remember, have no spaces or underscores, and the first and last character
cannot be a dash (-).
NOTE:You cannot change the ES IP address for a single-server installation. You can
change the MS IP address for a single-server installation.
Changing the Enforcement Server Date and Time
To change the Enforcement server date and time:
3-17
System Configuration
Enforcement Servers
NAC 800 Home window>>System configuration>>Enforcement clusters &
servers>>Select an ES>>Configuration
1.Select a Region from the Region drop-down list in the Date and time area.
2.Select a time zone from the Time zone drop-down list.
3.Click ok.
NOTE:See “Selecting the Time Zone” on page 3-26 for information on changing the
time zone settings for the Management server.
WARNING:Manually changing the date/time by a large amount (other than a time zone
change) will require a restart of all servers. Rolling back the clock will have
adverse effects on the system.
Modifying the ES root Account Password
To change the Enforcement server root account password:
NAC 800 Home window>>System configuration>>Enforcement clusters &
servers>>Select an ES>>Configuration
1.Enter the new password in the Root password text box in the Other settings
area.
2.Re-enter the password in the Re-enter root password text box.
3.Click ok.
Viewing Enforcement Server Status
There are two ways NAC 800 provides ES status:
■The icons next to the server name (see Figure 3-6 on page 3-15)
■The Status window (see the following steps). The Enforcement server
window allows you to view the following information:
•Health status
•Upgrade status
•Process/thread status
•System load average for the server
•Current endpoints being tested/minute for the server
3-18
System Configuration
Enforcement Servers
•Percentage of memory used on the server
•Disk space usage for the server
To view Enforcement server status:
NAC 800 Home window>>System configuration>>Enforcement clusters &
servers
1.Click the server for which you want to view the status. The Enforcement
server window appears:
Figure 3-8. Enforcement Server Window, Status Option
2.Click ok or cancel.
3-19
System Configuration
Enforcement Servers
Deleting Enforcement Servers
NOTE:Servers need to be powered down for the delete option to appear next to the
name in the NAC 800 console.
To delete Enforcement servers:
NAC 800 Home window>>System configuration>>Enforcement clusters &
servers
1.Click delete next to the server you want to remove from the cluster. The
Delete Enforcement server confirmation window appears.
2.Click yes. The System configuration window appears.
Enforcement Server Recovery
If an existing ES goes down and comes back up, it can participate in its
assigned cluster, even if the MS is not available.
When a new ES is created, the MS must be available before the ES can
participate in a cluster.
3-20
System Configuration
Management Server
Management Server
Viewing Network Settings
To view Management servers status:
NAC 800 Home window>>System configuration>>Management server
3-21
System Configuration
Management Server
Figure 3-9. System Configuration, Management Server Window
1.Server status is shown in the Network settings area.
2.Click ok or cancel.
3-22
System Configuration
Management Server
Modifying Management Server Network Settings
CAUTION:Back up your system immediately after changing the MS or ES IP address. If
you do not back up with the new IP address, and later restore your system, it
will restore the previous IP address which can show an ES error condition
and cause authentication problems. See “Maintenance” on page 3-91 for
instructions on backing up and restoring your system.
To modify Management server network settings:
NAC 800 Home window>>System configuration>>Management server
WARNING:Changing the Management server network settings will cause the network
interface to restart.
1.Click edit network settings in the Network settings area.
2.Enter the values you want to modify:
•Enter a new name in the Host name text field. For example,
garp.mycompany.com
NOTE:Select names that are short, easy to remember, have no spaces or under-
scores, and the first and last character cannot be a dash (-).
•Enter a new address in the IP address text field. For example,
192.168.153.35
•Enter a new netmask in the Network mask text field. For example,
255.255.255.0
•Enter a new gateway in the Gateway IP address text field. For example
192.168.153.2
•Enter one or more DNS resolver IP addresses, separated by commas,
semicolons, or spaces in the DNS IP addresses text box. For example:
10.0.16.100,10.0.1.1
3.Click ok.
Selecting a Proxy Server
Connecting to the Internet is necessary for updating tests, validating license
keys, and sending support packages.
3-23
System Configuration
Management Server
To select a proxy server:
NAC 800 Home window>>System configuration>>Management server
1.Select Use a proxy server for Internet connections.
2.Enter the IP address of the server that will act as the proxy for Internet
connections in the Proxy server IP address text field.
3.Enter the port used for connecting to the proxy server in the Proxy server port text field.
4.If your proxy server requires authentication, select the Proxy server is authenticated check box.
a.Authentication method – Select the scheme used to authenticate
credentials on the proxy server. The following methods are
supported:
–Basic (not recommended) – The original and most compatible
authentication scheme for HTTP. Also the least secure because it
sends the user ID and password to the server unencrypted.
–Digest – Added in the HTTP 1.1 protocol, this scheme is signifi-
cantly more secure than basic authentication because it never
transfers the actual password across the network, but instead
uses it to encrypt a "nonce" value sent from the server.
–Negotiable – Using this scheme, the client and the proxy server
negotiate a scheme for authentication. Ultimately, either the basic
or digest scheme will be used.
b.Enter the ID of a user account on the proxy server in the User name
text box.
c.Enter the password of the user account specified in the User name text
box in the Password text box.
d.Re-enter the password.
3-24
5.Click ok.
Setting the Date and Time
The Date and time area allows you to configure the following:
■Allow automatic synchronization with an NTP server
■Manually set date and time for the Management server
■Edit date and time:
•Set time zone
•Set date
System Configuration
Management Server
•Set time
NOTE:Date and time settings are applied to the MS; however, you can set the time
zone for each ES.
Automatically Setting the Time
To automatically set the time:
NAC 800 Home window>>System configuration>>Management server
1.Select Automatically receive NTP updates from and enter one or more
Network Time Protocol (NTP) servers, separated by commas. The NTP
protocol allows NAC 800 to synchronize its date and time with other
endpoints on your network. For example, time.nist.gov.
2.Click ok.
TIP:Use of NTP is strongly recommended.
Manually Setting the Time
To manually set the time:
NAC 800 Home window>>System configuration>>Management server
1.Select Manually set date & time.
2.Click edit. The Date and time window appears:
Figure 3-10. Date & Time Window
3-25
System Configuration
Management Server
3.Select the correct date and time.
4.Click ok.
5.Click ok.
CAUTION:Manually changing the date/time (other than a time zone change) a large
amount will require a restart of all servers. Rolling back the clock will have
adverse effects on the system.
Selecting the Time Zone
To set the time zone:
NAC 800 Home window>>System configuration>>Management server
1.Select the following:
a.Select a region from the Region drop-down list in the Date and time
area.
b.Select a time zone from the Time zone drop-down list.
2.Click ok.
Changing MS SNMP Settings
To change the Management server SNMP settings:
NAC 800 Home window>>System configuration>>Management server
1.Select the Enable SNMP check box to enable SNMP. Clear the check box
to disable SNMP. NAC 800 supports read-only SNMP v1 and v2.
2.Enter the Read community string. The default setting for network
equipment is often set to public. To prevent network information from
being divulged, change the community string to something unique.
3.Enter the SNMP Allowed source network. The value must be either
default or a network specified in CIDR notation.
4.Click ok.
Modifying the MS root Account Password
To change the Management server root account password:
3-26
System Configuration
Management Server
NAC 800 Home window>>System configuration>>Management server
1.Enter the new password in the Root password text box in the Other settings
area.
2.Re-enter the password in the Re-enter root password text box.
3.Click ok.
Checking for NAC 800 Upgrades
To check for system upgrades:
NAC 800 Home window>>System configuration>>Management server
1.Click check for upgrades in the System upgrade area. A progress window
appears.
2.A status window appears indicating if upgrades are available.
a.If no upgrades are available, click ok to clear the status window.
b.Click ok to return to System configuration.
c.If an upgrade is available, click yes to upgrade your system.
CAUTION:Installation of an upgrade can take several hours to download all the software.
You can continue to use NAC 800 during the download process. NAC 800 will
automatically shutdown and restart after the software downloads.
TIP:Since upgrading can take longer than the default timeout setting of the NAC
800 Console, ProCurve recommends that you increase the timeout value
when you have limited bandwidth by performing the steps described in
“Changing the NAC 800 Console Timeout”.
Changing the NAC 800 Console Timeout
To change the timeout value for the console:
Command window
1.Log in to the NAC 800 server as root, either using SSH or directly with a
keyboard.
<minutes> is the number of minutes of inactivity NAC 800 will wait before
requiring the user to log in to the console again. For example,30.
3-28
System Configuration
User Accounts
User Accounts
NAC 800 allows you to create multiple user accounts. User accounts provide
and limit access to NAC 800 functions based on permissions (user roles) and
clusters assigned. See “User Roles” on page 3-37 for more information on
setting permissions for the user roles.
The User accounts menu option allows you to do the following:
■View user accounts
■Search by user ID, user name, or email address
■Add a user account
■Edit a user account
■Delete a user account
Adding a User Account
To add a user account:
NAC 800 Home window>>System configuration>>User accounts
3-29
System Configuration
User Accounts
Figure 3-11. System Configuration, User Accounts
3-30
System Configuration
User Accounts
1.Click Add a user account. The Add user account window appears:
Figure 3-12. Add User Account
2.Enter the following information:
3.Select an Account status:
4.In the User roles area, select one of the following default roles for the user
•User ID – The user ID used to log into NAC 800
•Password – The password used to log into NAC 800
•Full name – The name associated with the user account
•Email address – The email address used for notifications
•enabled – This status allows an account to log into the console
•disabled – This status prevents an account from logging into the
console
account: (See “User Roles” on page 3-37 for more information about user
roles and permissions associated with user roles.)
3-31
System Configuration
User Accounts
•Cluster Administrator
•View-Only User
•System Administrator
•Help Desk Technician
•You can select a custom user role if you have created any.
NOTE:Users must be assigned at least one role.
5.In the Clusters area, select a cluster or clusters.
NOTE:Users must be assigned at least one Enforcement cluster.
User Role NameDescription
Cluster AdministratorFor their clusters, users having this role can configure their assigned
View-Only UserUsers having this role can view endpoint activity and generate reports
about their clusters.
3-32
System AdministratorUsers having this role have all permissions.
Help Desk TechnicianFor their clusters, users having this role can view endpoint activity,
change endpoint access control, retest endpoints, and run reports.
User-defined roleCreate your own user roles and definitions.
Table 3-2.Default User Roles
6.Click ok.
Searching for a User Account
To search for a user account:
NAC 800 Home window>>System configuration>>User accounts
1.Select one of the following from the Search drop-down list:
•user ID
•full name
•email address
System Configuration
User Accounts
2.Enter the text to search for in the for field.
3.Click search.
TIP:Click reset to clear the text field and to refresh the display to show all accounts
after a search.
Sorting the User Account Area
To sort the user account area:
NAC 800 Home window>>System configuration>>User accounts
Click the column heading for user id, full name, email address, user roles, or
clusters. The user accounts reorder according to the column heading selected.
Click the column heading again to change from ascending to descending.
Copying a User Account
To copy a user account:
NAC 800 Home window>>System configuration>>User accounts
3-33
System Configuration
User Accounts
1.Click copy next to the user account you want to duplicate. The Copy user
account window appears. The account information is duplicated from the
original account.
Figure 3-13. Copy User Account
2.Enter the User ID of the new account.
3.Enter the Password.
4.Re-enter the password.
5.Select the Account status (enable or disable).
6.Select the User role for the account.
7.Select the Cluster(s) that the user account can access.
8.Click ok.
Editing a User Account
To edit a user account:
3-34
System Configuration
User Accounts
NAC 800 Home window>>System configuration>>User accounts
1.Click the name of the user account that you want to edit. The User account
window appears:
Figure 3-14. User Account
2.Change or enter information in the fields you want to change. See “Adding
a User Account” on page 3-29 for information on user account settings.
3.Click ok.
Deleting a User Account
You must always have at least one account with System Administrator permissions.
CAUTION:Do not delete or edit the account with which you are currently accessing the
interface. Doing so can produce an error and lock you out of the interface
until your session has timed out.
3-35
System Configuration
User Accounts
To delete a user account:
NAC 800 Home window>>System configuration>>User accounts
1.Click delete next to the user account you want to remove. The Delete user
account confirmation window appears.
2.Click yes.
3-36
System Configuration
User Roles
The User roles menu option allows you to configure the following:
■View current user roles and details associated with those roles
■Add a new user role
•Name the new user role
•Provide a detail description for the new user role
•Assign permissions to the new user role
■Edit a user role
•Edit the name of the user role
•Edit the detail description of the user role
•Edit the assigned permissions for the user role
■Delete a user role
Adding a User Role
To add a user role:
User Roles
NAC 800 Home window>>System configuration>>User roles
3-37
System Configuration
User Roles
Figure 3-15. System Configuration Window, User Roles
3-38
System Configuration
User Roles
1.Click add a user role in the User roles area. The Add user role window
appears.
Figure 3-16. Add User Role Window
2.Enter a descriptive name in the Role name field.
3.Enter a description of the role in the Description field.
4.Select the permissions for the user role. For more information about
permissions, the following table:
PermissionDescription
Configure clustersAllows you to add clusters, configure the settings of all your assigned clusters, and delete
any of your clusters.
Configure serversAllows you to configure all servers within your clusters
Configure the systemAllows you to configure all system-level settings
View system alertsAllows you to view system alerts on your home screen
Generate reportsAllows you to generate reports about any of your assigned clusters
Table 3-3.User Role Permissions
3-39
System Configuration
User Roles
PermissionDescription
Manage NAC policiesAllows you to manage the NAC policies for all of your clusters
View endpoint activityAllows you to view details about all endpoints in your clusters
Monitor system statusAllows you to monitor the system status
Control AccessAllows you to quarantine or grant network access to endpoints in your clusters
Retest endpointsAllows you to have endpoints in your clusters retested
Table 3-3.User Role Permissions (cont.)
Editing User Roles
NOTE:You cannot edit the System Administrator user role.
To edit user role s:
NAC 800 Home window>>System configuration>>User roles
3-40
System Configuration
1.Click the role you want to edit. The user role window appears:
User Roles
Figure 3-17. User Role Window
2.Enter the information in the fields you want to change. See “Adding a User
Role” on page 3-37 for information on user role settings.
3.Click ok.
Deleting User Roles
NOTE:You cannot delete the System Administrator role.
To delete user roles:
NAC 800 Home window>>System configuration>>User roles
1.Click delete next to the user role you want to remove. The Delete user role
confirmation window appears.
2.Click yes.
3-41
System Configuration
User Roles
Sorting the User Roles Area
To sort the user roles area:
NAC 800 Home window>>System configuration>>User roles
1.Click user role name or description column heading. The selected category
sorts in ascending or descending order.
2.Click ok.
3-42
System Configuration
License
The License menu option allows you to configure the following:
■View license start and end dates
■View number of days remaining on license, and associated renewal
date
■View remaining endpoints and servers available under license
Updating Your License
To update your license:
NAC 800 Home window>>System configuration>>License
License
3-43
System Configuration
License
Figure 3-18. System Configuration Window, License
1.Click submit license request.
2.Click ok on the license validated pop-up window.
3-44
System Configuration
Test Updates
Test Updates
The Test updates menu option allows you to configure the following:
■View last successful test update date/time
■Check for test updates (forces an immediate check for test updates)
■Set time or times for downloading test updates
■View test update logs
Manually Checking for Test Updates
To manually check for test updates:
NAC 800 Home window>>System configuration>>Test updates
3-45
System Configuration
Test Updates
Figure 3-19. System Configuration Window, Test Updates
1.In the Last successful test update area, click check for test updates.
2.Click ok.
NOTE:It is important to check for test updates during the initial configuration of
NAC 800.
Selecting Test Update Times
To select test update times:
NAC 800 Home window>>System configuration>>Test updates
3-46
System Configuration
1.Using the hour check boxes, select the time periods in which you would
like NAC 800 to check for available test updates.
By default, NAC 800 checks once every hour using the ProCurve Secure
Rule Distribution Center. All times listed are dependent upon the clock
setting and time zone of the hardware on which NAC 800 is running.
2.Click ok.
Test Updates
Viewing Test Update Logs
To view test update logs:
NAC 800 Home window>>System configuration>>Test updates
3-47
System Configuration
Test Updates
1.Click the View test update log link just to the right of the Check for test
updates button. The Test update log window appears:
3-48
Figure 3-20. Test Update Log Window
The Test update log window legend is shown in the following figure:
Figure 3-21. Test Update Log Window Legend
System Configuration
Quarantining
Quarantining
The Quarantining menu option allows you to configure the following by
cluster:
■Select the quarantine method
■Basic 802.1X settings
■Set up authentication method
■Add, edit, delete 802.1X devices
Selecting the Quarantine Method
To select the quarantine method:
NAC 800 Home window>>System configuration>>Quarantining
3-49
System Configuration
Quarantining
Figure 3-22. System Configuration Window, Quarantining
1.Select a cluster.
2.In the Quarantine method area, select one of the following quarantine
methods:
•802.1X – When using the 802.1X quarantine method, NAC 800 must sit
in a place on the network where it can communicate with your
RADIUS server, which communicates with your switch or router,
which performs the quarantining.
•DHCP – When configured with a DHCP quarantine area, NAC 800 must
sit inline with your DHCP server. All endpoints requesting a DHCP IP
address are issued a temporary address on a quarantine subnetwork.
Once the endpoint is allowed access, the IP address is renewed, and
the main DHCP server assigns an address to the main LAN. With a
multiple subnetwork or VLAN network, one quarantine area must be
configured for each sub-network.
3-50
System Configuration
•Inline – When using the inline quarantine method, NAC 800 must be
placed on the network where all traffic to be quarantined passes
through NAC 800. It must be inline with an endpoint like a VPN.
3.Click ok.
Quarantining
Entering Basic 802.1X Settings
To enter basic 802.1X settings:
NAC 800 home window>>System configuration>>Quarantining>>802.1X
quarantine method radio button
1.Enter an IP address in the Identity Driven Manager (IDM) server IP address
text field.
2.Enter one or more non-quarantined subnets, separated by commas in the
Quarantine subnets text field. All subnets should be entered using CIDR
addresses.
3.Select a RADIUS server type by selecting one of the following radio buttons:
•Local – Enables a local RADIUS server on the Enforcement server
which can be configured to perform authentication itself or proxy to
another server.
•Remote IAS – Disables the local RADIUS server so that an IAS server
configured with the NAC IAS plug-in to point to an Enforcement
server can be used instead. When possible, a local RADIUS server that
proxies to the IAS server should be the preferred configuration.
4.Click ok.
Selecting the RADIUS Authentication method
To select the RADIUS authentication method:
NAC 800 home window>>System configuration>>Quarantining>>802.1X
quarantine method radio button
1.Select the Local radio button in the Basic 802.1X settings area.
2.Select an End-user authentication method:
•Manual – RADIUS server authentication settings are configured man-
ually from the command line. See “Enabling NAC 800 for 802.1X” on
page 11-43 for configuration information.
3-51
System Configuration
Quarantining
•Windows domain – Authentication requests are handled by a Windows
domain through NTLM protocol. The Enforcement server must be
able to join to the domain for this to work. See “Configuring Windows
Domain Settings” on page 3-52 for more information.
•OpenLDAP – User credentials are queried from an OpenLDAP direc-
tory service. See “Configuring OpenLDAP Settings” on page 3-54 for
more information.
•Novell eDirectory – User credentials are queried from a Novell eDirec-
tory directory service. See “Configuring Novell eDirectory Settings”
on page 3-57 for more information.
•Proxy – Authentication requests are proxied to a remote RADIUS
server configured to allow the Enforcement server as a client NAS.
3.Click ok.
Configuring Windows Domain Settings
To configure Windows domain settings:
NAC 800 home window>>System configuration>>Quarantining>>802.1X
Quarantine method radio button>>Local radio button
3-52
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.