![]() These results determine the enforcement for the device. Optionally, posture checks can be enabled to validate the client device for antivirus or firewall status. Network access can be restricted based on day of the week, bandwidth limit, or number of unique devices used by the user. The cache lifetime of the MAC address can vary according to the user's role ( Guest, Employee, or Contractor) and after that the user will have to reauthenticate via the Captive Portal. Subsequent logins use MAC authentication and bypass the Captive Portal.Ī guest can belong to a specific role such as Contractor, Guest, or Employee, and each role can have a different lifetime for the cached MAC address. When users first log in via the Captive Portal, their MAC addresses are cached. ![]() This template is designed for authenticating guest accounts based on the cached MAC addresses used during authentication. Open topic with navigation Guest Authentication with MAC Caching Service Template
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |