A. Authentication enforcer B. Directory server C. Captive authentication D. Authentication policy E. Role-mapping rules
A. Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service. B. Configure a security policy that references the unified-access-control captive-portal service. C. Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service. D. Configure a security policy that references the unified-access-control intranet-controller service.
A. The vendor must select a role from a list of eligible roles. B. The vendor must select a rule from a list of eligible rules. C. The vendor is automatically mapped to the first configured role D. The vendor is automatically granted a merged role.