beautypg.com
iv
8 Configuring user access policies ························································································································ 124
Configuring access policies ········································································································································ 125
Accessing the access policy list page ··············································································································· 125
Querying access policies ··································································································································· 125
Viewing access policy details ···························································································································· 126
Adding an access policy ···································································································································· 128
Modifying an access policy ······························································································································· 132
Deleting an access policy ··································································································································· 132
Configuring access SSIDs ··········································································································································· 132
Accessing the wireless client SSID list page ····································································································· 133
Querying SSIDs ··················································································································································· 133
Adding an SSID ··················································································································································· 133
Modifying an SSID ·············································································································································· 133
Deleting SSIDs ····················································································································································· 133
Configuring hard disk serial numbers ························································································································ 134
Accessing the hard disk serial number list page ····························································································· 134
Querying hard disk serial numbers ··················································································································· 134
Adding a hard disk serial number····················································································································· 135
Importing hard disk serial numbers in batches ································································································ 135
Modifying a hard disk serial number ················································································································ 135
Deleting hard disk serial numbers ····················································································································· 136
Configuring access MAC addresses ·························································································································· 136
Setting MAC filter ················································································································································ 136
Accessing the access MAC address list page ·································································································· 137
Querying access MAC addresses ····················································································································· 137
Adding an access MAC address ······················································································································· 137
Importing access MAC addresses in batches ·································································································· 137
Modifying an access MAC address ·················································································································· 138
Deleting access MAC addresses ······················································································································· 138
Configuring access ACLs ············································································································································ 139
Accessing the access ACL list page ·················································································································· 139
Viewing the access ACL details ························································································································· 139
Adding an access ACL ······································································································································· 140
Modifying an access ACL ·································································································································· 141
Deleting an access ACL ······································································································································ 141
9 Managing endpoint identification ······················································································································ 142
Managing endpoint fingerprint ·································································································································· 142
Managing endpoint vendors ······························································································································ 142
Managing endpoint types ·································································································································· 143
Managing endpoint OSs ···································································································································· 145
Managing endpoint identification characters ··········································································································· 146
Managing DHCP characters ······························································································································ 147
Managing HTTP user agents ······························································································································ 149
Managing MAC addresses ································································································································ 151
Endpoint identification configuration example ········································································································· 153
10 Configuring BYOD ············································································································································ 155
Overview ······································································································································································· 155
Configuring access services ········································································································································ 155
Accessing the access service list page ·············································································································· 155
Viewing access service details ··························································································································· 156
Adding an access service ··································································································································· 157
Modifying a service ············································································································································ 160
Deleting a service ················································································································································ 160