Ibm Tivoli and Cisco Manual de usuario Pagina 245

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 516
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 244
Chapter 7. Network enforcement subsystem implementation 227
that you wish to include in the log file. Scroll down and change the file
management settings if desired.
We recommend that you include the following fields in Logged Attribute:
Network Access Profile Name
Shared RAC
Application Posture Token
System Posture Token
–Reason
These should be moved toward the top of the list of installed attributes for
easy access. This makes writing policy rules and troubleshooting much
easier. The
NAS-IP-Address and User Name fields also provide valuable
information during troubleshooting.
All client instances successfully completing the posture validation process are
logged in the passed authentications log even if the client has posture
validated into a state other than Healthy. The failed authentication attempts
log contains entries for clients failing to complete the posture validation
process.
When you are finished, click Submit.
5. Select CSV Failed Authentications (Figure 7-10).
Figure 7-10 Passed authentication logging
Vista de pagina 244
1 2 ... 240 241 242 243 244 245 246 247 248 249 250 ... 515 516

Comentarios a estos manuales

Sin comentarios