Term
The base functionality provided in any Access Control deployment is _____ into what is attached to the network. |
|
Definition
|
|
Term
ExtremeControl provides as much information as possible for every _____ that appears on the network. |
|
Definition
|
|
Term
The primary method of identifying and locating devices across the network is through the use of ____. |
|
Definition
RADIUS-based authentication |
|
|
Term
By using a RADIUS-based authentication method, ExtremeControl can keep track of when devices _____ the network |
|
Definition
appear on and disconnect from |
|
|
Term
By using a RADIUS-based authentication method, ExtremeControl can keep track of where devices are _____. |
|
Definition
|
|
Term
There are two types of RADIUS-based authentication that are used for visibility: _____ and _____. |
|
Definition
MAC Authentication and 802.1X Authentication. |
|
|
Term
In addition to the information provided from RADIUS-based authentication, ExtremeControl leverages _____ to acquire additional information |
|
Definition
DHCP snooping and Kerberos snooping |
|
|
Term
If there are no existing 802.1X authentication methods deployed on a network, _____ is used to detect end system connected at the edge of the network. |
|
Definition
|
|
Term
The MAC Authentication process is triggered by the source MAC address of the device when _____. |
|
Definition
a device connects to a port |
|
|
Term
When the MAC Authentication process is triggered, the switch sends a _____ destined to the Access Control Engine for authentication. |
|
Definition
|
|
Term
When the _____ authenticates the RADIUS request, it sends a RADIUS Accept message back to the switch |
|
Definition
|
|
Term
Once the switch receives a _____, it allows traffic from the authenticated MAC address on its port, and the user is granted access to the network. |
|
Definition
|
|
Term
After the device is granted access to the network, the switch sends _____ to the Access Control Engine at the start of the session, on an interim basis, and at the end of the session. |
|
Definition
RADIUS accounting information |
|
|
Term
A switch will continue to forward RADIUS accounting information about a device to the Access Control Engine, including the _____ of when the device connected to the network. |
|
Definition
|
|
Term
A switch will continue to forward RADIUS accounting information about a device to to the Access Control Engine, including the physical info of a _____ such as switch IP, switch port ID, and a user-defined switch port name. |
|
Definition
|
|
Term
A switch will continue to forward RADIUS accounting information about a device to the Access Control Engine, including the physical info of a _____ such as the wireless controller, AP Name, AP MAC Address, AP serial number, AP Zone, and the SSID. |
|
Definition
|
|
Term
A switch will continue to forward RADIUS accounting information about a device to the Access Control Engine, including the MAC address. From the MAC address, the _____ can also be determined. |
|
Definition
|
|
Term
A switch will continue to forward RADIUS accounting information about a device to the Access Control Engine, including the new location of a wireless device if the device _____. |
|
Definition
|
|
Term
A switch will continue to forward RADIUS accounting information about a device to the Access Control Engine, including the timestamp of when the device disconnects from the network if _____ is enabled. |
|
Definition
|
|
Term
A switch will continue to forward RADIUS accounting information about a device to the Access Control Engine, including the _____ of the device if RADIUS accounting is _____. |
|
Definition
IP address
fully implemented |
|
|