John Adams is an HR partner in the ACME organization. ACME IT wants to limit access to HR servers
to designated IP addresses to minimize malware infection and unauthorized access risks. Thus, the
gateway policy permits access only from John’s desktop which is assigned a static IP address
10.0.0.19.
John received a laptop and wants to access the HR Web Server from anywhere in the organization.
The IT department gave the laptop a static IP address, but that limits him tooperating it only from his
desk. The current Rule Base contains a rule that lets John Adams access the HR Web Server from his
laptop with a static IP (10.0.0.19). He wants to move around the organization and continue to have
access to the HR Web Server.
To make this scenario work, the IT administrator:
1) Enables Identity Awareness on a gateway, selects AD Query as one of the Identity Sources installs
the policy.
2) Adds an access role object to the Firewall Rule Base that lets John Adams PC access the HR Web
Server from any machine and from any location.
What should John do when he cannot access the web server from a different personal computer?
A.
John should lock and unlock his computer
B.
John should install the Identity Awareness Agent
C.
Investigate this as a network connectivity issue
D.
The access should be changed to authenticate the user instead of the PC