Cisco ASA 5505 Configuration Manual page 1309

Asa 5500 series
Hide thumbs Also See for ASA 5505:
Table of Contents

Advertisement

Chapter 63
Configuring IKE, Load Balancing, and NAC
What to Do Next
Following the configuration of the NAC policy, you must assign it to a group policy for it to become
active. To do so, choose Configuration > Remote Access VPN> Network (Client) Access > Group
Policies > Add or Edit > General > More Options and the NAC policy name from the drop-down list
next to the NAC Policy attribute.
Modes
The following table shows the modes in which this feature is available:
Firewall Mode
Routed
Modes
The following table shows the modes in which this feature is available:
Firewall Mode
Routed
Add/Edit Posture Validation Exception
The Add/Edit Posture Validation Exception dialog pane lets you exempt remote computers from posture
validation, based on their operating system and other optional attributes that match a filter.
OL-20339-01
Posture Validation Exception List—Displays one or more attributes that exempt remote computers
from posture validation. At minimum, each entry lists the operating system and an Enabled setting
of Yes or No. An optional filter identifies an ACL used to match additional attributes of the remote
computer. An entry that consists of an operating system and a filter requires the remote computer to
match both to be exempt from posture validation. The adaptive security appliance ignores the entry
if the Enabled setting is set to No.
Add—Adds an entry to the Posture Validation Exception list.
Edit—Modifies an entry in the Posture Validation Exception list.
Delete—Removes an entry from the Posture Validation Exception list.
Security Context
Transparent Single
Security Context
Transparent Single
Operating System—Choose the operating system of the remote computer. If the computer is running
this operating system, it is exempt from posture validation. The default setting is blank.
Enable—The adaptive security appliance checks the remote computer for the attribute settings
displayed in this pane only if you check Enabled. Otherwise, it ignores the attribute settings. The
default setting is unchecked.
Filter— (Optional) Use to apply an ACL to filter the traffic if the operating system of the computer
matches the value of the Operating System attribute.
Configuring Network Admission Control Policies
Multiple
Context
System
Multiple
Context
System
Cisco ASA 5500 Series Configuration Guide using ASDM
63-29

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Asa 5510Asa 5540Asa 5520Asa 5550Asa 5580

Table of Contents