beautypg.com
iii
Overview ································································································································································ 52
Configuration Procedure······································································································································· 52
Configuring Bulletin Management ······························································································································· 53
Overview ································································································································································ 53
Configuration Tasks··············································································································································· 53
Adding a Bulletin ··················································································································································· 54
Modifying a Bulletin ·············································································································································· 55
Authentication Policy Configuration ························································································································· 56
Overview ········································································································································································· 56
Configuring the Local Authentication Policy ················································································································ 56
Overview ································································································································································ 56
Configuration Procedure······································································································································· 56
Configuring the RADIUS Authentication Policy ··········································································································· 57
Overview ································································································································································ 57
Configuration procedure ······································································································································ 57
Configuring the LDAP Authentication Policy ··············································································································· 60
Overview ································································································································································ 60
Configuration Procedure······································································································································· 60
Configuring the AD Authentication Policy ··················································································································· 62
Overview ································································································································································ 62
Configuration Procedure······································································································································· 62
Configuring the Combination Authentication Policy ·································································································· 63
Overview ································································································································································ 63
Configuration Procedure······································································································································· 63
Security Policy Configuration ···································································································································· 65
Overview ········································································································································································· 65
Configuration Tasks ······················································································································································· 65
Creating a Security Policy ············································································································································· 65
Configuring Security Policy Resources ························································································································· 67
Modifying a Security Policy ·········································································································································· 68
Configuration Examples ············································································································································ 70
Overview ········································································································································································· 70
Configuring Static Authorization ·································································································································· 70
Configuring a User ················································································································································ 70
Configure Resources ············································································································································· 70
Configure a Resource Group ······························································································································· 70
Configure a User Group ······································································································································· 71
Configuring Dynamic Authorization ···························································································································· 71
Configuring a Security Policy ······························································································································· 71
Configuring a Security Policy Resource ·············································································································· 71
Enabling Client Security Checking ······················································································································ 71
Completing the Configuration ······································································································································ 71
Login ················································································································································································ 72
Index ··········································································································································································· 73