Configuring and Managing Security ACLs 367
You can also map a security ACL to a user group. For details, see
"Assigning a Security ACL to a User or a
Group" on page
451. For more information about authenticating and authorizing users, see
"About Adminis-
trative Access" on page 54
and
"AAA Tools for Network Users" on page
410.
Nortel WLAN Security Switch 2300 Series Configuration Guide