beautypg.com
vi
Maintaining accounts in a file ··························································································································· 242
Querying and maintaining accounts in batches ······························································································ 248
Exporting accounts in batches ··························································································································· 254
Exporting access details in batches ··················································································································· 258
12 Managing endpoint devices ···························································································································· 261
Managing endpoint devices ······································································································································· 261
Viewing the endpoint list ···································································································································· 261
Querying endpoints ············································································································································ 262
Viewing endpoint details ···································································································································· 263
Importing endpoint information ························································································································· 264
Modifying endpoint information ························································································································ 265
Configuring transparent authentication for endpoints ····················································································· 265
Associating users with an endpoint device ······································································································ 266
Clearing associated users for endpoint devices ······························································································ 266
Batch deleting endpoints ···································································································································· 266
Clearing endpoint information ··························································································································· 267
Managing endpoint configurations ···························································································································· 267
BYOD quick deployment process for iOS/OS X endpoints ··········································································· 267
BYOD quick deployment process for Android endpoints ··············································································· 267
BYOD quick deployment process for Windows PC endpoints ······································································· 268
Configuring endpoint configuration templates ································································································· 268
Configuring endpoint configuration distribution policies ················································································ 282
Managing endpoint configuration tools ··········································································································· 284
Managing the endpoint configuration history ·································································································· 285
13 Configuring access devices ······························································································································ 287
Access device configuration tasks ······························································································································ 287
Configuring access devices ········································································································································ 287
Accessing the access device list page ·············································································································· 288
Querying access devices ···································································································································· 288
Viewing access device details ··························································································································· 290
Viewing the access device configuration ········································································································· 290
Adding access devices ······································································································································· 291
Modifying access devices ·································································································································· 295
Deleting access devices ······································································································································ 295
Synchronizing port configurations on access devices ····················································································· 295
Deploying configurations to access devices ····································································································· 296
Configuring ARP spoofing attack protection ···································································································· 301
Configuring access device types ································································································································ 302
Accessing the Access Device Type List page ··································································································· 302
Viewing access device type details ··················································································································· 303
Adding an access device type ··························································································································· 304
Modifying an access device type ······················································································································ 304
Deleting an access device type ························································································································· 304
Modifying the priority of an access device type ······························································································ 304
Configuring the Proprietary Attribute List ·········································································································· 305
Configuring proprietary attribute assignment policies ····························································································· 306
Proprietary attribute assignment policy workflow ···························································································· 306
Accessing the Proprietary Attribute Assignment Policy List page ··································································· 306
Viewing proprietary attribute assignment policy details ················································································· 306
Adding a proprietary attribute assignment policy ··························································································· 307
Modifying a proprietary attribute assignment policy ······················································································ 308
Deleting a proprietary attribute assignment policy ·························································································· 308