6.3.8 Assigning Endpoints and Domains to a Policy
Select which endpoints are associated with each policy.
To assign endpoints and domains to a policy:
Home window>>NAC policies>>Select a NAC Policy>>Domains and endpoints menu option
1 Enter a single endpoint or list of endpoints separated by a carriage return using the endpoint IP
address, MAC address, or NetBIOS name. Enter a range of IPs using a dash (-) between them,
or by using CIDR notation (see
page
338).
2 In the Windows domains area, enter a domain name or list of domain names separated by a
carriage return.
3 Click ok.
NOTE: Adding an endpoint or domain to multiple policies results in the endpoint being assigned to
the first enabled NAC policy in the list.
6.3.9 NAC Policy Hierarchy
If an endpoint is listed in more than one NAC policy, the order of use is as alphabetical by name of
NAC policy (not including the default NAC policy).
6.3.10 Setting Retest Time
Retest endpoints connected to your network frequently to guard against potential changes in the
remote endpoint configurations.
To set the time to wait before retesting a connected endpoint:
Home window>>NAC policies>>Select a NAC Policy>>Basic settings menu option
1 In the Retest frequency area, enter how frequently in minutes, hours, or days Novell
ZENworks Network Access Control should retest a connected endpoint.
TIP: A lower number ensures higher security, but puts more load on the Novell ZENworks
Network Access Control server.
2 Click ok.
6.3.11 Setting Connection Time
When an endpoint is inactive for a period of time, you can elect to automatically move the endpoint
to a quarantined state. Quarantining inactive endpoints guards against unauthorized access to the
network. When the endpoint becomes active again, the usual process occurs for moving the endpoint
out of quarantine. For example, if the endpoint was in good standing prior to the inactivity
quarantine, the end-user may just need to log in again; however, other changes (such as a policy
change or new required hotfix) may require the end-user to perform some action before being
allowed on the network again.
210 Novell ZENworks Network Access Control Users Guide
Section 16.6, "Entering Networks Using CIDR Format," on