I think by definition the user has to authenticate ("log in") so as to
identify a restricted role the user can then be placed in. If the user
doesn't log in, how would you know what user to apply policy to?
Greg
Greg Schaffer, CISSP
Director of Network Services
Middle Tennessee State University
_____
From: Cisco Clean Access Users and Administrators
[mailto:[EMAIL PROTECTED] On Behalf Of Miller, Paul
Sent: Friday, April 18, 2008 9:22 AM
To: [email protected]
Subject: Block user
Can anyone tell me if there is a way to restrict a user from logging in to
Clean Access. I noticed that I can restrict a device, but no options for a
user.
Paul Miller
Network Administrator
Dominican University
River Forest, IL
708-524-6641