Ibm Tivoli and Cisco Manuel d'utilisateur Page 245

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 516
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 244
Chapter 7. Network enforcement subsystem implementation 227
that you wish to include in the log file. Scroll down and change the file
management settings if desired.
We recommend that you include the following fields in Logged Attribute:
Network Access Profile Name
Shared RAC
Application Posture Token
System Posture Token
–Reason
These should be moved toward the top of the list of installed attributes for
easy access. This makes writing policy rules and troubleshooting much
easier. The
NAS-IP-Address and User Name fields also provide valuable
information during troubleshooting.
All client instances successfully completing the posture validation process are
logged in the passed authentications log even if the client has posture
validated into a state other than Healthy. The failed authentication attempts
log contains entries for clients failing to complete the posture validation
process.
When you are finished, click Submit.
5. Select CSV Failed Authentications (Figure 7-10).
Figure 7-10 Passed authentication logging
Vue de la page 244
1 2 ... 240 241 242 243 244 245 246 247 248 249 250 ... 515 516

Commentaires sur ces manuels

Pas de commentaire