O'Reilly logo

Cisco NAC Appliance: Enforcing Host Security with Clean Access by Alok Agrawal, Chad Sullivan - CCIE No. 6493, Jerry Lin - CCIE No. 6469, Jamey Heary - CCIE No. 7680

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 8. The Building Blocks: Roles, Authentication, Traffic Policies, and User Pages

This chapter covers the following topics:

It is important that you understand how to configure the various authentication mechanisms and role assignment mechanisms to best apply various policies in your NAC Appliance deployment. After they are applied, you will be able to control authenticated and guest access using various traffic-filtering and bandwidth control mechanisms.

Configuring User Roles

User roles are an extremely important concept that you must completely understand before attempting to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required