SIMULATION

SIMULATION
Network topology exhibit:

Cisco Clean Access Manager Exhibit:

You work as a network engineer at Domain .com. Please study the topology exhibit carefully. Also examine the Cisco Clean Access Manager Exhibit. Domain .com has implemented a Cisco NAC Appliance solution. The internal server Certkiller C has been set up to provide HTTP and HTTPS services only. These services are only available for Domain .com internal users.
Your boss, Mrs. Certkiller, has asked you to provide the following configuration tasks:
* define a NAC Appliance IP-based traffic policy for the “Temporary Role”
* configure the policy so that it is able to access this remediation server over HTTP and HTTPS for clients on the 10.158.10.0, 255.255.255.0 subhet.
* after the configuration has been completed you must be able to launch the link to access the remediation server from the Certkiller B client computer.

SIMULATION
Network topology exhibit:

Cisco Clean Access Manager Exhibit:

You work as a network engineer at Domain .com. Please study the topology exhibit carefully. Also examine the Cisco Clean Access Manager Exhibit. Domain .com has implemented a Cisco NAC Appliance solution. The internal server Certkiller C has been set up to provide HTTP and HTTPS services only. These services are only available for Domain .com internal users.
Your boss, Mrs. Certkiller, has asked you to provide the following configuration tasks:
* define a NAC Appliance IP-based traffic policy for the “Temporary Role”
* configure the policy so that it is able to access this remediation server over HTTP and HTTPS for clients on the 10.158.10.0, 255.255.255.0 subhet.
* after the configuration has been completed you must be able to launch the link to access the remediation server from the Certkiller B client computer.

A.

B.

C.

D.

Explanation:

1.) Select “User Roles”
2.) At “Temporary Role” klick “Add Policy”
3.) Enter the Following Values:
Priority: 1
Action: Allow
State: Enabled
Category: IP
Protocol: TCP / 6 ( see
http://www.iana.org/assignments/protocol-numbers/ ) Untrusted: 10.158.10.0 / 255.255.255.0 / *
Trusted: 172.162.7.100 / 255.255.255.255 / 80,443 Klick “Add Policy”



Leave a Reply 0

Your email address will not be published. Required fields are marked *