Shared Flashcard Set

Details

Edge ExtremeControl Solution 07
Visibility: Username & Hostname Resolution
14
Computer Networking
Professional
06/16/2020

Additional Computer Networking Flashcards

 


 

Cards

Term
If 802.1X authentication is used, a username is provided as part of _____. This is the most transparent and reliable method of recording a username.
Definition
the authentication process
Term
The main requirement for username resolution from Kerberos authentication to be successful is the ability to see _____ of the Kerberos conversation.
Definition
both sides
Term
Kerberos Authentication is common in a _____ since it's simple to interface the Access Control Engine and an Active Directory or Kerberos server to the same virtual switch
Definition
virtual environment
Term
_____ should have a timeout configured for how long the authentication is valid. A general best practice for a timeout is 12 hours.
Definition
Kerberos Authentication
Term
In Windows, a new Kerberos authentication occurs anytime someone _____.
Definition
logs onto their computer (from startup or locked screen)
Term
If an integration with a third-party system is implemented with ExtremeManagement, there are _____ in place that can be used to update the username.
Definition
APIs
Term
If the end system is redirected to the _____ and authenticates with a username and password, the username will be filled in for the end system.
Definition
captive portal
Term
If a guest user is granted access through a captive portal, the information that is completed by the guest is filled into the _____ in the format ‘LastName-FirstName’.
Definition
username field
Term
Using DNS Hostname Lookup – When the IP address of the end system is discovered, the Access Control Engine can do a _____ on the IP address to discover the hostname.
Definition
DNS reverse lookup
Term
For DNS Hostname Lookup to work properly, it is expected that both forward and reverse _____ are created and updated automatically by the DHCP server.
Definition
DNS zones
Term
The Access Control Engine will make a NetBIOS request to the end system to see if it will _____.
Definition
respond with a hostname
Term
If Kerberos snooping is configured, the Access Control Engine will use the hostname discovered in the _____ as the hostname.
Definition
Kerberos traffic
Term
If an integration with a third-party system is, you utilize _____ to update the hostname.
5
Definition
ExtremeMnagement API's
Term
When using DHCP snooping, the hostname is typically seen within the _____. If it is present, this hostname will be used by Access Control.
Definition
DHCP request
Supporting users have an ad free experience!