What should she do?
Jennifer McHanry is CEO of ACME. She recently bought her own personal iPad. She wants use her iPad to
access the internal Finance Web server. Because the iPad is not a member of the Active Directory domain, she
cannot identify seamlessly with AD Query. However, she can enter her AD credentials in the Captive Portal and
then get the same access as on her office computer. Her access to resources is based on rules in the R77
Firewall Rule Base.
To make this scenario work, the IT administrator must:
1) Enable Identity Awareness on a gateway and select Captive Portal as one of the Identity Sources.
2) In the Portal Settings window in the User Access section, make sure that Name and password login is
selected.
3) Create a new rule in the Firewall Rule Base to let Jennifer McHanry access network destinations. Select
accept as the Action.
4) Install policy.Ms McHanry tries to access the resource but is unable. What should she do?
What is the Manual Client Authentication TELNET port?
What is the Manual Client Authentication TELNET port?
Which of the following firewall modes DOES NOT allow fo…
Which of the following firewall modes DOES NOT allow for Identity Awareness to be deployed?
Which R77 GUI would you use to see number of packets ac…
Which R77 GUI would you use to see number of packets accepted since the last policy install?
Which of the following actions do NOT take place in IKE…
Which of the following actions do NOT take place in IKE Phase 1?
Where do you verify that UserDirectory is enabled?
Where do you verify that UserDirectory is enabled?
What is Consolidation Policy?
What is Consolidation Policy?
Which kind of user group do you need in the Client Auth…
Your users are defined in a Windows 2008 R2 Active Directory server. You must add LDAP users to a Client
Authentication rule. Which kind of user group do you need in the Client Authentication rule in R77?
Which of the Security Servers can NOT perform authentic…
All R77 Security Servers can perform authentication with the exception of one. Which of the Security Servers
can NOT perform authentication?
What must happen after authentication that allows the c…
You have configured SNX on the Security Gateway. The client connects to the Security Gateway and the user
enters the authentication credentials. What must happen after authentication that allows the client to connect to
the Security Gateway’s VPN domain?