Alternative Access Policies - Avaya WLAN 8100 Technical Configuration Manual

Wireless lan, identity engines
Hide thumbs Also See for WLAN 8100:
Table of Contents

Advertisement

avaya.com
Repeat this step to add other third party devices to the list of BYOD.

2.4 Alternative Access Policies

This guide shows one sample policy that may work for some enterprises, but may not represent the
security requirements of others. Identity Engines has the flexibility to implement virtually any set of
policies that you desire. This guide does not illustrate alternative configurations, though certainly the
possibilities are limitless. Below are some alternative policies, described in high level terms, but not
illustrated.
Avaya Inc. –External Distribution
August 2011
60

Advertisement

Table of Contents
loading

Table of Contents