Ibm Tivoli and Cisco Manual do Utilizador Página 350

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 516
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 349
332 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems
The completed ruleset should look like Figure 7-100.
Figure 7-100 Untrusted
Trusted rule creation
11.Repeat steps 6 through 10 for the quarantine role and temporary role. Users
in this scenario, utilizing CCA, are placed in the temporary role if
noncompliant. The quarantine role is used for users not passing a network
scan, which is out of the scope of this guide.
Creating local users
CAM has the ability to perform user authentication using a variety of methods,
such as RADIUS, LDAP, Active Directory SSO, and so on.
For the purposes of this book, we use local database authentication.
1. Click User Management Local Users New Local User.
Note: The rules used here are specific to our lab environment. Think carefully
about what rules will need to be used in your own environment, such as DNS,
DHCP, different subnets and hosts.
Vista de página 349
1 2 ... 345 346 347 348 349 350 351 352 353 354 355 ... 515 516

Comentários a estes Manuais

Sem comentários