Cisco Cisco Clean Access 3.5
9-15
Cisco Clean Access Manager Installation and Administration Guide
OL-7044-01
Chapter 9 Clean Access Implementation Overview
User Page Summary
Web Login /Network Scanner User Pages
Network
Scanning User
Agreement
Page
Scanning User
Agreement
Page
Enable in:
Device Management > Clean
Access > General Setup
Access > General Setup
Configure page in:
Device Management > Clean
Access > Network Scanner >
Scan Setup > User Agreement
Access > Network Scanner >
Scan Setup > User Agreement
See
and
.
If enabled, this page appears after a web login user authenticates and
passes network scanning. The user must click Accept to access the
network.
passes network scanning. The user must click Accept to access the
network.
Scan
Vulnerability
Report
Vulnerability
Report
Enable in:
Device Management > Clean
Access > General Setup
Access > General Setup
Configure page in:
Device Management > Clean
Access > Network Scanner >
Scan Setup > Vulnerabilities
Access > Network Scanner >
Scan Setup > Vulnerabilities
See
and
If enabled, this client report appears to web login users after network
scanning results in vulnerabilities. It can also be accessed as a link from
the Logout page. Administrators can view the admin version of the client
report from Device Management > Clean Access > Network Scanner >
Reports. Agent users with network scanning vulnerabilities see this
information in the context of Agent dialogs. The report appears as follows:
scanning results in vulnerabilities. It can also be accessed as a link from
the Logout page. Administrators can view the admin version of the client
report from Device Management > Clean Access > Network Scanner >
Reports. Agent users with network scanning vulnerabilities see this
information in the context of Agent dialogs. The report appears as follows:
Block Access
Page
Page
Device Management > Clean
Access > General Setup
Access > General Setup
See
If enabled, a web login user sees this page if blocked from the network
when vulnerabilities are found on the client system after network
scanning,
when vulnerabilities are found on the client system after network
scanning,
Table 9-2
User Page Summary (continued)
Page
Configured in:
Purpose