Identity Sources determine how the Identity Awareness Security Gateway learns the user names and computers that generate traffic on the network.
The PEP and PDP processes are the other key components of the system. Through them, administrators control user access and network protection.
I think C is correct
When configured, policy decision and enforcement is handled by the Identity Awareness Policy Decision Point (PDP) and Policy Enforcement Point (PEP). The basic workflow is: 1. An identity source acquires the identity (for example, username or computer) and associated IP address and sends this information to the PDP, which resides on a Check Point machine. 2. The PDP uses relevant user sources (LDAP / RADIUS / Internal DB) and runs authorization requests and group lookups on the ID to match Access Roles. 3. The PDP sends the identify information to the enforcing Security Gateway's PEP over a SIC connection. The PEP might be on the same Gateway or a different server. 4. The PEP enforces the traffic accordingly; for example, redirecting users to Captive Portal.
Best Answer "A"
Pg. 318 CCTE R80.20
"Identity Awareness uses the source and destination IP addresses of network traffic to identify users and computers. You can use these elements, bundled into an access role object, as matching criteria in the Source and Destination fields of Access Control policy rules"
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Obreroangel
8 months, 4 weeks agoAnth0ny
9 months, 3 weeks agoSakan
11 months agoz8d21oczd
11 months agogsvit
11 months, 1 week agoerickmga
11 months, 2 weeks ago