Interesting. I've tried it on our network and it didn't work. We're running 4.1.1 and had to use the workaround for bug CSCsj00939 that affects frame based login pages. Apparently it can't parse the webpage because of the external URL we're using.
The authors appear to be from UCI so it's written specifically to get around that configuration. I'd be curious to see if anyone else can get this to work. Doug DOUGLAS R. COOPER Systems Administrator, CCNA Information Technology Services Trinity University 210-999-7437 (w) 210-643-8811 (m) [EMAIL PROTECTED] http://www.trinity.edu/ <http://www.trinity.edu/> From: Cisco Clean Access Users and Administrators [mailto:[EMAIL PROTECTED] On Behalf Of James Moskwa Sent: Wednesday, April 16, 2008 8:07 AM To: [email protected] Subject: Dirty access agent Has anyone run into this yet? Any thoughts on how to neutralize it as a bypass? http://daa1000.tripod.com/ Regards, -- Jim Jim Moskwa Manager Networks & Security Information Technology Department Johnson & Wales University 8 Abbott Park Place Providence, RI 02903 Office: 401-598-1556 Fax: 401-598-1329 Email: [EMAIL PROTECTED]
