PART 3
Configuring an Infranet Controller
Copyright © 2010, Juniper Networks, Inc.
Configuring User Roles and Administrator Roles on page 35
Configuring Security Requirements for Administrators and Users on page 61
Configuring the Infranet Controller RADIUS Server and Layer 2 Access on page 73
Configuring Authentication Realms on page 87
Configuring Infranet Enforcer Policies on page 93
Configuring Host Enforcer Policies on page 105
Configuring IF-MAP Federation Settings on page 107
Configuring Authentication Servers on page 117
Configuring Sign-In Policies on page 149
Configuring Host Checker Policies on page 155
33