Term
One of the core functionalities of the ExtremeControl solution is the ability to control the ____ of an end system on the network. |
|
Definition
|
|
Term
The ExtremeControl solution is designed to apply the control of the end system _____ as possible. |
|
Definition
as close to the edge of the network |
|
|
Term
If the device is wireless, it will assign the access permissions at ____. |
|
Definition
|
|
Term
If the device is wired, it will assign the access permissions on _____ specifically to that device (and no other devices attached to it). |
|
Definition
|
|
Term
There is a _____ that determines the type of access a device should have as well as how to assign the access. |
|
Definition
|
|
Term
The _____ evaluates end systems connecting to the network in order to assign a level of access. |
|
Definition
Access Control Rules Engine |
|
|
Term
The rules are an evaluation of a(n) _____ between multiple rule components. |
|
Definition
|
|
Term
If the Rules Engine determines that an end system matches the combination of rule components it is assigned a(n) _____. |
|
Definition
|
|
Term
When the Rules Engine assigns a Profile to an end system, the Profile also has an ______ which is assigned to the user. |
|
Definition
|
|
Term
The Rules Engine's rules are evaluated _____ similar to ACLs. |
|
Definition
|
|
Term
Best practice for creating new rules is to make them _____ while still matching the conditions needed. |
|
Definition
|
|
Term
The Access Control Rules Engine is considers a _____ engine. |
|
Definition
|
|