Term
When an accept policy is used to assign the level of access to the end system, it needs to map to _____ on the device. |
|
Definition
|
|
Term
The name of the policy mapping is listed as an _____ in an Access Control Profile |
|
Definition
|
|
Term
A policy mapping is considered a container to map together all necessary _____ needed by the switches and wireless controllers to assign the appropriate level of access |
|
Definition
|
|
Term
For Extreme networking equipment, the typical control method is the ____. |
|
Definition
|
|
Term
Where do the Policies exist |
|
Definition
locally on the switch or wireless APs |
|
|
Term
Policies are dynamically assigned based on the name that is sent in the _____. |
|
Definition
|
|
Term
Policies are dynamically assigned based on the _____ that is sent in the RADIUS Accept message |
|
Definition
|
|
Term
When a new Role is created in Access Control, a corresponding Access Control Profile is _____ to match the Policy |
|
Definition
|
|
Term
For non-Extreme devices, _____ can be used to assign access. |
|
Definition
|
|
Term
VLANs can assign access via a combination of _____ that are compliant to the IETF RFC 3580 standard. |
|
Definition
|
|
Term
if a switch or wireless controller can accept additional RADIUS attributes to control an end system, the RADIUS attribute can be defined in a mapping. |
|
Definition
|
|
Term
An assessment configuration only needs to be defined if _____ is used in the network. |
|
Definition
|
|
Term
An assessment configuration is a component of a(n) _____. |
|
Definition
|
|
Term
An assessment configuration defines how to run _____, or assessment, against an end system. |
|
Definition
|
|
Term
An assessment configuration is composed of a combination of ____ that are run against the end system. |
|
Definition
|
|
Term
In most environments where assessment is used, a combination of _____ and _____ assessment is enabled. |
|
Definition
agent-based and agent-less |
|
|