
272 Building a Network Access Control Solution with IBM Tivoli and Cisco Systems
4. The newly created NAP is shown (Figure 7-51) with the three policies that
comprise the NAP —
authentication, posture validation, and authorization.
Each of these will have to be configured in turn, after clicking Apply and
Restart.
Figure 7-51 Newly created NAP
Note: Be careful in the selection of Deny access when no profile matches
or
Grant access using global authentication when no profile matches. In
our example, we use
Grant access....
Kommentare zu diesen Handbüchern