Extreme Networks Sentriant AG Software User's Manual page 16

Hide thumbs Also See for Sentriant AG:
Table of Contents

Advertisement

List of Figures
Figure 42: Add ExtremeXOS Device ..........................................................................................95
Figure 43: Add Foundry Device.................................................................................................96
Figure 44: Add HP ProCurve Device ..........................................................................................98
Figure 45: Add HP ProCurve WESM xl/zl Device .......................................................................101
Figure 46: Add HP ProCurve 420/530 AP Device .....................................................................103
Figure 47: Add Nortel Device .................................................................................................105
Figure 48: Add Other Device ..................................................................................................107
Figure 49: System Configuration, Quarantining, DHCP Enforcement...........................................109
Figure 50: Add a Quarantine Area ...........................................................................................110
Figure 51: Quarantine Area ....................................................................................................112
Figure 52: Post-connect Configuration Message .......................................................................113
Figure 53: System Configuration, Post-connect ........................................................................115
Figure 54: Post-connect Launch Window .................................................................................116
Figure 55: Post-connect Quarantine Details .............................................................................117
Figure 56: System Configuration, Maintenance ........................................................................119
Figure 57: Backup Successful Message ...................................................................................120
Figure 58: System Configuration, Testing Methods ...................................................................121
Figure 59: System Configuration, Quarantine/Guest Resources Area ...........................................124
Figure 60: System Configuration, Notifications.........................................................................127
Figure 61: System Configuration, End-user Screens..................................................................129
Figure 62: System Configuration, Agentless Credentials ............................................................131
Figure 64: System Configuration, Logging Option .....................................................................135
Figure 65: System Configuration, Advanced Option ..................................................................137
Figure 66: Endpoint Activity, Connected Endpoints ..................................................................139
Figure 67: Endpoint Activity, Primary Filtering Options .............................................................140
Figure 68: Endpoint Activity, Secondary Filtering Options .........................................................141
Figure 69: Search Criterion Affecting Endpoint Activity Results .................................................143
Figure 70: Display Endpoints Drop-down .................................................................................143
Figure 71: Access Control Status Rollover................................................................................145
Figure 72: Endpoint Activity Icon Legend ................................................................................146
Figure 73: Endpoint Test Status Rollover.................................................................................147
Figure 74: Endpoint, General Information ................................................................................148
Figure 75: Endpoint, Test Results...........................................................................................149
Figure 76: Local Area Connection Properties ............................................................................158
Figure 77: Local Area Connection Properties ............................................................................159
Figure 78: Group Policy Management Window..........................................................................160
Figure 79: New GPO Window..................................................................................................161
Figure 80: Group Policy Object Editor .....................................................................................161
Figure 81: Network Access Window.........................................................................................162
Figure 82: Network Security Window .......................................................................................163
Figure 83: Network Connection Properties Window ...................................................................164
Figure 84: Remote Procedure Call Properties Window ...............................................................164
Figure 85: Remote Registry Properties Window ........................................................................165
Figure 86: Windows Firewall Window ......................................................................................166
Figure 87: Microsoft Peer-to-Peer Window ...............................................................................167
16
Sentriant AG Software Users Guide, Version 5.3

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sentriant ag 5.3

Table of Contents