Term
The rules engine and assigned profiles are examples of how different users and devices get assigned varying levels of access based on matching ____. |
|
Definition
|
|
Term
Devices are assigned access through the RADIUS Accept message when connecting to the network and they maintain that access for _____. |
|
Definition
the length of their session |
|
|
Term
ExtremeControl has logic built in that calculates when a device needs to be rediscovered. This rediscovery is called _____. |
|
Definition
|
|
Term
Re-authentication will trigger a new _____ Authentication depending on the method of visibility in use. |
|
Definition
MAC or 802.1x Authentication |
|
|
Term
There are _____ main methods that Access Control uses to re-authenticate a device. |
|
Definition
|
|
Term
If the device has a well known _____, AccessControl will use that to trigger a new MAC authentication or 802.1X authentication. |
|
Definition
|
|
Term
For wired devices, if there is no well-known re-authentication MIB, Access Control can _____ a port using the standard ifAdminStatus MIB. |
|
Definition
|
|
Term
The _____ re-authentication method simulates a client disconnecting from the physical port and re-connecting thus triggering a new authentication. |
|
Definition
|
|
Term
The _____ re-authentication method involves Access Control using a device's re-authentication MIB to trigger a new MAC authentication or 802.1X authentication. |
|
Definition
|
|
Term
SNMP Re-authentication is only used if a device has a well known _____. |
|
Definition
|
|
Term
For wireless devices, Access Control expects that RFC 3576 is supported in some manner. This standard allows for ______ sent from a RADIUS server to the wireless controller or switch. |
|
Definition
asynchronous RADIUS messages |
|
|
Term
Access Control utilizes _____ to trigger a new authentication by disconnecting the device from the session (DM) or by changing its access without disconnection (COA). |
|
Definition
|
|