Interesting. I've tried it on our network and it didn't work. We're
running 4.1.1 and had to use the workaround for bug CSCsj00939 that
affects frame based login pages. Apparently it can't parse the webpage
because of the external URL we're using.

The authors appear to be from UCI so it's written specifically to get
around that configuration.

I'd be curious to see if anyone else can get this to work.



Doug





DOUGLAS R. COOPER

Systems Administrator, CCNA

Information Technology Services

Trinity University



210-999-7437 (w)

210-643-8811 (m)

[EMAIL PROTECTED]



http://www.trinity.edu/ <http://www.trinity.edu/>







From: Cisco Clean Access Users and Administrators
[mailto:[EMAIL PROTECTED] On Behalf Of James Moskwa
Sent: Wednesday, April 16, 2008 8:07 AM
To: [email protected]
Subject: Dirty access agent



Has anyone run into this yet? Any thoughts on how to neutralize it as a
bypass?
http://daa1000.tripod.com/
Regards,
-- Jim

Jim Moskwa
Manager Networks & Security
Information Technology Department
Johnson & Wales University
8 Abbott Park Place
Providence, RI 02903
Office: 401-598-1556
Fax: 401-598-1329
Email: [EMAIL PROTECTED]

Reply via email to