What should she do?
Jennifer McHanry is CEO of ACME. She recently bought her own personal iPad. She wants use
her iPad to access the internal Finance Web server. Because the iPad is not a member of the
Active Directory domain, she cannot identify seamlessly with AD Query. However, she can enter
her AD credentials in the Captive Portal and then get the same access as on her office computer.
Her access to resources is based on rules in the R76 Firewall Rule Base.
To make this scenario work, the IT administrator must:
1) Enable Identity Awareness on a gateway and select Captive Portal as one of the Identity
Sources.
2) In the Portal Settings window in the User Access section, make sure that Name and password
login is selected.
3) Create a new rule in the Firewall Rule Base to let Jennifer McHanry access network
destinations. Select accept as the Action.
Ms. McHanry tries to access the resource but is unable. What should she do?
When using LDAP as an authentication method for Identity Awareness, the query:
When using LDAP as an authentication method for Identity Awareness, the query:
Which of the following firewall modes DOES NOT allow for Identity Awareness to be deployed?
Which of the following firewall modes DOES NOT allow for Identity Awareness to be deployed?
which of the following modes?
Identity Awareness can be deployed in which of the following modes?
What happens if the identity of a user is known?
What happens if the identity of a user is known?
Which of the following is an authentication method used by Identity Awareness?
Which of the following is an authentication method used by Identity Awareness?
What is the purpose of an Identity Agent?
What is the purpose of an Identity Agent?
What type of traffic can be re-directed to the Captive Portal?
What type of traffic can be re-directed to the Captive Portal?
The Captive Portal tool:
The Captive Portal tool:
Captive Portal is a __________ that allows the gateway to request login information from the user.
Captive Portal is a __________ that allows the gateway to request login information from the user.