Chapter 13 Example Configuration
Figure 13–1
Example configuration – environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Figure 13–2
Example configuration – Personal Firewall rule set – Access Control Service - Rules – Outgoing tab example view . . . . . . . . . . . . . . . .
Figure 13–3
Example configuration – Personal Firewall rule set – Incoming tab example view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Figure 13–4
Example configuration – Configure an Access Control Service Trustzone – Local Machine: Create Policy Rule: catch-all . . . . . . . . . . . .
Figure 13–5
Example configuration – Configure a Access Control Service Trustzone – Local Machine: Edit Policy Rule: catch-all . . . . . . . . . . . . . . .
Figure 13–6
Example configuration – Configure a Access Control Service Trustzone – Local Machine: Edit Policy Rule – catch-all . . . . . . . . . . . . . .
Figure 13–7
Example configuration – Configure forwarding firewall rule set – Edit/Create User Object > User Condition . . . . . . . . . . . . . . . . . . . . . . .
Figure 13–8
Example configuration – Configure forwarding firewall rule set – Edit Rule: Healthy-Access-to-protected-Servers[Rule] . . . . . . . . . . . . .
Figure 13–9
Example configuration – Configure forwarding firewall rule set – Firewall - Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 14 802.1X – Technical Guideline
Figure 14–1
802.1X configuration for the used ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Figure 14–2
Status of a network interface on the switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Figure 14–3
Sample debug information for EAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Figure 14–4
phions.log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Figure 14–5
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Figure 14–6
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Figure 14–7
Authentication Message Exchange Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Figure 14–8
Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 15 Appendix
221 Barracuda NG Network Access Client - Administrator's Guide
172
174
174
177
179
180
181
182
182
186
187
188
190
194
194
194
196
Need help?
Do you have a question about the NG Network Access Client SP4 and is the answer not in the manual?
Questions and answers