单项选择题
An administrator has created three different Odyssey Access Client preconfiguration files and assigned them to three different roles in the same realm.Which action should the administrator take to ensure that users get the correct Odyssey Access Client preconfiguration file?()
A. Configure each user account in the auth server with the appropriate Odyssey Access Client preconfiguration files.
B. Configure the role-mapping rules with the appropriate Odyssey Access Client preconfiguration files.
C. Ensure that merge roles is selected in the role-mapping rules.
D. Ensure that the first role a user is mapped to is the role with the appropriate Odyssey Access Client preconfiguration file.
相关考题
-
多项选择题
You are the network administrator for your company. A user is complaining that they are not able to access the network with the Junos Pulse client. You run a packet capture on the network interface to monitor the 802.1X authentication process. You notice that after the EAP- request/identity packet is received, and the supplicant responds with an EAP-response/identity packet, no further communication occurs for several seconds. What are three causes for this behavior? ()
A. The authenticator is not licensed to support Junos Pulse.
B. The authenticator did not receive the EAP-response/identity packet.
C. The authentication server is not receiving the RADIUS packet containing the EAP-response/identity data.
D. The authenticator is sending the request over its loopback interface.
E. The authentication server is sending back a RADIUS response packet, but the authenticator is not forwarding the response back to the supplicant. -
多项选择题
Which two actions are available in the GUI for creating location awareness rules?()
A. WINS server
B. DNS server
C. IP reachability
D. Resolve address -
单项选择题
A users Junos Pulse client uses 802.1X to access a wired network and is failing to authenticate. You run a packet capture from the users PC and notice that immediately after the client machine sends an EAPoL-start packet, an EAP-failure packet is returned. You review the RADIUS troubleshooting logs on the MAG Series device and do not see any authentication attempts from the user. Other users on the same Ethernet switch are successfully authenticating. Which device is sending the EAP-failure packet to the workstation?()
A. The RADIUS server
B. The EAPoL server
C. The workstation's network adapter
D. The Ethernet switch
