SCREEN View is a user friendly interface for the U.S. EPA screening model, SCREEN3. The SCREEN3 model can be used to estimate worst-case ground level concentrations for a single source as well as concentrations in the cavity zone, and concentrations due to inversion break-up and shoreline fumigation.
This article contains information about how to configure NetScaler Gateway EPA to scan the Media Access Control (MAC) address to authenticate the IP address of the user.
When authenticating the (MAC address of an internet user against predefined combinations of MAC addresses and IP addresses, the network-based MAC address scan fails. This is because the network traffic from the internet does not contain the actual MAC address of the user. The MAC address available with the network traffic is that of a gateway or an intermediate appliance.
Therefore, to scan the MAC address from the computer of the user, registry-based scan or a Client Security scan must be performed.
Complete the following procedure to perform a registry-based scan for the MAC address of an internet user to authenticate them against predefined combinations of MAC addresses and IP addresses:
Note: The following procedure contains a sample configuration with registry scan to search the MAC address or an equivalent entry in the registry of the computer.
Search the MAC address in the registry of the computer.The exact match of the MAC address might not be easy to search. However, you can search for an equivalent entry for the MAC address. To search, run the following command on from the command prompt:
net config rdr
The following is the sample output of the command:
The command completed successfully.
Caution! Refer to the Disclaimer at the end of this article before using Registry Editor.
Run the following command from the command prompt to start the Registry Editor utility:
regedt32
Note: Do not use the regedit command to start the Registry Editor utility. You cannot make the appropriate search if you run the regedit command.
Search the key identified in the Step 1, such as A38A41F5-783E-4AED-9035-A2798922CE33, in the registry of the computer.The search for the sample entry displays that the key exists at the following location in the registry:
The following screen shot displays the location of the key in the Registry Editor Window:
In addition, the search shows that the sub key for this entry is NetCfgInstanceId. To locate the actual network interface card (NIC), ensure that you check all the options available under the entry. In the preceding screen shot, the Status Bar of the Registry Editor Window displays the complete path of the sub key.
Run the following command from the command line interface of the NetScaler appliance to add the path that is identified in the preceding steps of the procedure:
add aaa preauthenticationpolicy scan_epa q/CLIENT.REG(HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlClass
{4D36E972-E325-11CE-BFC1-08002BE10318}
0011_NetCfgInstanceId).VALUE '
{ A38A41F5-783E-4AED-9035-A2798922CE33}
' && REQ.IP.SOURCEIP 10.103.0.42/ EPA
In this command, scan_epa is the name of the policy and EPA is the name of the action.
Run the following command from the NetScaler CLI to enable pre-authentication checks:
set aaa preauthenticationparameter -preauthenticationaction ALLOW -rule ns_true
Note: Use this procedure to authenticate a small group of users. However, it might not be practical to add each of the large number of Secure Access (SSL VPN) users.
The following is the preauthentication policy for MAC address and domain check:
Pl2303 usb-serial drivers for mac. EPA MAC Check CLIENT.SYSTEM('MAC_ADDR_anyof_XXXXXXXXXXXX[COMMENT: MAC Address]') EXISTS – no colons or spaces or dashes in the MAC address.
To enable preauthentication policy for MAC address, run the following command from CLI:
add aaa preauthenticationpolicy <policy name> 'CLIENT.SYSTEM('MAC_ADDR_anyof_<MAC address>[COMMENT: MAC Address]') EXISTS' <Action Name>
MAC's MAC addres filter in EPA will be as below
CLIENT.SYSTEM(MAC-MAC_ADDR_anyof_<MAC-addr>[COMMENT: MAC Address]) EXISTS
where as for Windows it appears as
MAC_ADDR_anyof_<MAC-addr>[COMMENT: MAC Address]

