Authentication settings
Add, edit, delete 802.1X devices
The following sections contain more information:
Section 3.10.1, "Selecting the Quarantine Method," on page 71
Section 3.10.2, "Selecting the Access Mode," on page 72
3.10.1 Selecting the Quarantine Method
To select the quarantine method:
Home window>>System configuration>>Quarantining
System Configuration, Quarantining
Figure 3-20
1 Select a cluster.
System Configuration
71
Need help?
Do you have a question about the ZENWORKS NETWORK ACCESS CONTROL 5.0 - 09-22-2008 and is the answer not in the manual?