Term
If 802.1X authentication is used, a username is provided as part of _____. This is the most transparent and reliable method of recording a username. |
|
Definition
the authentication process |
|
|
Term
The main requirement for username resolution from Kerberos authentication to be successful is the ability to see _____ of the Kerberos conversation. |
|
Definition
|
|
Term
Kerberos Authentication is common in a _____ since it's simple to interface the Access Control Engine and an Active Directory or Kerberos server to the same virtual switch |
|
Definition
|
|
Term
_____ should have a timeout configured for how long the authentication is valid. A general best practice for a timeout is 12 hours. |
|
Definition
|
|
Term
In Windows, a new Kerberos authentication occurs anytime someone _____. |
|
Definition
logs onto their computer (from startup or locked screen) |
|
|
Term
If an integration with a third-party system is implemented with ExtremeManagement, there are _____ in place that can be used to update the username. |
|
Definition
|
|
Term
If the end system is redirected to the _____ and authenticates with a username and password, the username will be filled in for the end system. |
|
Definition
|
|
Term
If a guest user is granted access through a captive portal, the information that is completed by the guest is filled into the _____ in the format ‘LastName-FirstName’. |
|
Definition
|
|
Term
Using DNS Hostname Lookup – When the IP address of the end system is discovered, the Access Control Engine can do a _____ on the IP address to discover the hostname. |
|
Definition
|
|
Term
For DNS Hostname Lookup to work properly, it is expected that both forward and reverse _____ are created and updated automatically by the DHCP server. |
|
Definition
|
|
Term
The Access Control Engine will make a NetBIOS request to the end system to see if it will _____. |
|
Definition
|
|
Term
If Kerberos snooping is configured, the Access Control Engine will use the hostname discovered in the _____ as the hostname. |
|
Definition
|
|
Term
If an integration with a third-party system is, you utilize _____ to update the hostname. 5 |
|
Definition
|
|
Term
When using DHCP snooping, the hostname is typically seen within the _____. If it is present, this hostname will be used by Access Control. |
|
Definition
|
|