Management and Configuration Guide Supplement 4.4.0.50

10
Defining a Location as a MAC Address
ration, and HTTP requests can be redirected to the system HTTP
pages, but the weaknesses of the internal proxy server may nullify
any additional capabilities of the external server.
When an external HTTP proxy server is configured within an Access
Policy, HTTP traffic associated with that Access Policy is sent directly
to the external server without being filtered internally. This removes
the limitations imposed by the internal proxy server, but does have
some disadvantages: client browsers will need to be configured with
the proxy server IP address and port, and HTTP traffic under that
Access Policy cannot be redirected to system HTTP pages.
These methods of handling HTTP traffic can be combined, so that, depending
on the Access Policy, some HTTP traffic can be handled by the internal HTTP
Proxy filter, and some HTTP traffic can be sent directly to an external HTTP
Proxy Server. For example, the Access Policy for Unauthenticated clients
might have Proxy filtering disable, or enabled using the internal proxy server,
ensuring that unauthenticated clients are presented with the system’s Logon
page. Traffic from Authenticated users, however, could be sent directly to the
external proxy server.
See “The HTTP Proxy Tab” under “Access Policies” in Chapter 4 of the
ProCurve Secure Access 700wl Series Management and Configuration
Guide for a more detailed discussion of the automatic HTTP Proxy Server
feature, HTTP filtering, and the various ways to configure HTTP Proxy servers.
Defining a Location as a MAC Address
A “Location” is a named set of physical connections into the ProCurve Secure
Access 700wl Series system. It is one of the components used to define a
Connection Profile, which in turn is used to determine the access rights to be
granted to a prospective user.
Prior to software version 4.4, a Location could be either all ports on an Access
Controller, or a single port on an Access Controller.
In software version 4.4, a Location may now be defined as a client MAC
address. This enables a Policy Administrator to restrict connections to a select
group of client systems, identified by their MAC addresses. Access rights can
be granted based on the client device a user is using to access the network—