A customer wants to make enforcement decisions during 802.1x authentication based on a client's Onguard posture token.
What enforcement profile should be used in the health check service?
A customer wants to make enforcement decisions during 802.1x authentication based on a client's Onguard posture token.
What enforcement profile should be used in the health check service?
In 802.1x authentication scenarios where client health posture is assessed and subsequent enforcement decisions need to be made, the most appropriate enforcement profile to use in the health check service is a RADIUS Change of Authorization (CoA). This allows dynamic changes to the client's network access based on their health posture without requiring reauthentication. Therefore, RADIUS CoA is the correct enforcement profile to use in this situation.
the correct is B
this setting is a part of clearpass training . the "Quarantine VLAN" is used in the book.
Answer B is correct (COA)
Question is a little vague. Both A & E can be correct depending if the Posture is Unknown or Healthy. Initially the Posture is Unknown, so I would say A is correct
Configuring the Enforcement Profiles shows that your options are all RADIUS_COA. OnGuard heavily utilizes CoA to dynamically apply posture settings after authentication. So I think it is B.
A. question's ambigous. you dont need CoA if you have onguard Agent. but quarantine is the result not the policy.
The health check is used in the WEBAUTH service after which a RADIUS CoA is sent (enforcement profile) with the posture status of the client.
A is correct I think.