HP 3350 - Cisco NAC Appliance Spezifikationen Seite 31

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 681
  • Inhaltsverzeichnis
  • FEHLERBEHEBUNG
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 30
1-7
Cisco NAC Appliance - Clean Access Manager Configuration Guide
OL-28003-01
Chapter 1 Introduction
Client Login Overview
The Web Login subpage enables network scanning controls per user role/OS.
In addition to dialog/web page content, you can specify whether pages appear when the user logs in with
a specific user role and OS. If you want to enable both Agent and network scanning for a role, make sure
to set role/OS options on both the Agent Login and Web Login configuration pages.
Note Agent/network scanning pages are always configured by both user role and client OS.
Agent Login
Agent users see the web login page and the Agent download page the first time they perform initial web
login in order to download and install the Agent setup installation file. After installation, Agent users
should login through the Agent dialog which automatically pops up when “Popup Login Window” is
selected from the system tray icon menu (default setting). Cisco NAC Agent users can also bring up the
login dialog by right-clicking the Agent system tray icon and selecting “Login.” Cisco NAC Web Agent
users are automatically connected to the network once their client machine is scanned and found
compliant with Agent Requirement settings.
Note Agent Login/Logout is disabled (grayed out) for special logins, such as VPN SSO, AD SSO, and MAC
address-based login. The Logout option is not needed for these deployments, since the machine always
attempts to log back in immediately.
Agent users will not see Quarantine role pages or popup scan vulnerability reports, as the Agent dialogs
perform the communication. You can also configure a Network Policy page (Acceptable Use Page) that
Agent users must accept after login and before accessing the network.
If you configure the Clean Access Manager to use a RADIUS server to validate remote users, the
end-user Agent login session may feature extra authentication challenge-response dialogs not available
in other dialog sessions—beyond the standard user ID and password. This additional interaction is due
to the user authentication profile on the RADIUS server, itself, and does not require any additional
configuration on the Clean Access Manager or Clean Access Server. For example, the RADIUS server
profile configuration may feature an additional authentication challenge like verifying a token-generated
PIN or other user-specific credentials in addition to the standard user ID and password. In this case, one
or more additional login dialog screens may appear as part of the login session.
Note Ensure that your RADIUS server and associated clients are configured to interact correctly according to
the RADIUS authentication method you choose.
Seitenansicht 30
1 2 ... 26 27 28 29 30 31 32 33 34 35 36 ... 680 681

Kommentare zu diesen Handbüchern

Keine Kommentare