Which Enforcement profile should be used on the health check service?
A ClearPass administrator wants to make Enforcement decisions during 802.1x authentication based on a client’s Onguard posture token.
Which Enforcement profile should be used on the health check service?
A . RADIUS CoA
B . Quarantine VLAN
C . Full Access VLAN
D . RADIUS Accept
E . RADIUS Reject
Answer: A
Explanation:
The Health Check Service requires a profile to terminate the session so that the RADIUS 802.1X authentication Service can use the posture token in a new authentication routine. The terminate session profile will utilize the Change of Authorization feature to force a re-authentication.
See step 6) below.
Navigate to the list of Enforcement Profiles by selecting, Configuration > Enforcement > Profiles.
Click the + Add link in the upper right hand corner.
From the Template dropdown menu, choose RADIUS Change of Authorization (CoA).
Name the policy. This example uses Dell Terminate Session as the profile name.
Leave all the other settings as default, and click Next > to move to the Attributes tab.
On the dropdown menu for Select RADIUS CoA Template, choose IETF-Terminate-Session-IETF.
Click Next > and review the Summary tab (Figure 22).
Click Save.
References: ClearPass NAC and Posture Assessment for Campus Networks Configuring ClearPass OnGuard, Switching, and Wireless (v1.0) (September 2015), page 22 http://en.community.dell.com/cfs-file/__key/telligent-evolution-components-attachments/13-4629-00-00-2044-16-18/ClearPass-NAC-and-Posture-Assessment-for-Campus-Networks.pdf?forcedownload=true
Latest HPE6-A15 Dumps Valid Version with 105 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund