What should she do?

Jennifer McHanry is CEO of ACME. She recently bought her own personal iPad. She wants use
her iPad to access the internal Finance Web server. Because the iPad is not a member of the
Active Directory domain, she cannot identify seamlessly with AD Query. However, she can enter
her AD credentials in the Captive Portal and then get the same access as on her office computer.
Her access to resources is based on rules in the R76 Firewall Rule Base.
To make this scenario work, the IT administrator must:
1) Enable Identity Awareness on a gateway and select Captive Portal as one of the Identity
Sources.
2) In the Portal Settings window in the User Access section, make sure that Name and password
login is selected.
3) Create a new rule in the Firewall Rule Base to let Jennifer McHanry access network
destinations. Select accept as the Action.
Ms. McHanry tries to access the resource but is unable. What should she do?

Jennifer McHanry is CEO of ACME. She recently bought her own personal iPad. She wants use
her iPad to access the internal Finance Web server. Because the iPad is not a member of the
Active Directory domain, she cannot identify seamlessly with AD Query. However, she can enter
her AD credentials in the Captive Portal and then get the same access as on her office computer.
Her access to resources is based on rules in the R76 Firewall Rule Base.
To make this scenario work, the IT administrator must:
1) Enable Identity Awareness on a gateway and select Captive Portal as one of the Identity
Sources.
2) In the Portal Settings window in the User Access section, make sure that Name and password
login is selected.
3) Create a new rule in the Firewall Rule Base to let Jennifer McHanry access network
destinations. Select accept as the Action.
Ms. McHanry tries to access the resource but is unable. What should she do?

A.
Have the security administrator select the Action field of the Firewall Rule “Redirect HTTP
connections to an authentication (captive) portal”

B.
Install the Identity Awareness agent on her iPad

C.
Have the security administrator reboot the firewall

D.
Have the security administrator select Any for the Machines tab in the appropriate Access Role

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *