Chapter 13 example configuration, Chapter 15 appendix – Barracuda Networks VERSION SP4 User Manual

Page 223

Advertising
background image

221 Barracuda NG Network Access Client - Administrator’s Guide

Chapter 13 Example Configuration

Figure 13–1

Example configuration – environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

172

Figure 13–2

Example configuration – Personal Firewall rule set – Access Control Service - Rules – Outgoing tab example view . . . . . . . . . . . . . . . .

174

Figure 13–3

Example configuration – Personal Firewall rule set – Incoming tab example view . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

174

Figure 13–4

Example configuration – Configure an Access Control Service Trustzone – Local Machine: Create Policy Rule: catch-all . . . . . . . . . . . .

177

Figure 13–5

Example configuration – Configure a Access Control Service Trustzone – Local Machine: Edit Policy Rule: catch-all . . . . . . . . . . . . . . .

179

Figure 13–6

Example configuration – Configure a Access Control Service Trustzone – Local Machine: Edit Policy Rule – catch-all . . . . . . . . . . . . . .

180

Figure 13–7

Example configuration – Configure forwarding firewall rule set – Edit/Create User Object > User Condition . . . . . . . . . . . . . . . . . . . . . . .

181

Figure 13–8

Example configuration – Configure forwarding firewall rule set – Edit Rule: Healthy-Access-to-protected-Servers[Rule] . . . . . . . . . . . . .

182

Figure 13–9

Example configuration – Configure forwarding firewall rule set – Firewall - Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

182

Chapter 14 802.1X – Technical Guideline

Figure 14–1

802.1X configuration for the used ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

186

Figure 14–2

Status of a network interface on the switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

187

Figure 14–3

Sample debug information for EAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

188

Figure 14–4

phions.log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

190

Figure 14–5

Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

194

Figure 14–6

Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

194

Figure 14–7

Authentication Message Exchange Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

194

Figure 14–8

Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

196

Chapter 15 Appendix

Advertising