218
Novell ZENworks Network Access Control Users Guide
no
vd
ocx
(e
n)
24
Ma
rch 20
09
The following describes the process in more detail:
Access mode
(1) overrides the items below it in the previous list (2, 3, 4, and 5). Use the
Access mode
radio buttons (
System monitor>>select a
cluster>>Quarantining
) to act globally on all endpoints in an Enforcement cluster.
The
Temporarily quarantine for
/
Temporarily grant access for
radio
buttons (
Endpoint activity>>select an endpoint check box>>Change
access
) override the items below them in the list (3, 4, and 5).
Use
Temporarily quarantine for
to temporarily quarantine endpoints that:
Have been designated
Whitelist
(
System configuration>>Exceptions
)
Are defined in NAC policies and have passed tests
Use
Temporarily grant access for
to allow temporary access to endpoints that:
Have been designated
Blacklist
(
System configuration>>Exceptions
).
Are defined in NAC policies and have failed tests
TIP:
Use the Clear temporary access control status radio button to remove the temporary access or
temporary quarantine state enabled by the Temporarily quarantine for/Temporarily grant access for
radio buttons.
Endpoint testing exceptions
overrides items following it in the list (4, and 5). Use
Endpoint testing exceptions
(
System configuration>>Exceptions
) to
always allow or always quarantine endpoints that are defined in NAC policies. For example, a
NAC policy might have a range of IP addresses defined for testing, but you want to exclude
specific IP addresses within that range from the tests, so you could specify them here as
Whitelist
or
Blacklist
.
Post-connect
overrides the item following it in the list (5).
TIP:
The change access button on the System Configuration>>Endpoint activity window is enabled
only when the action is possible; for example, when an endpoint or endpoints are selected.
7.2 Using Ports in Accessible Services and
Endpoints
To use a port number when specifying accessible services and endpoints (cluster
default):
Home window>>System configuration>>Accessible services
Summary of Contents for ZENworks Network Access Control 5.0
Page 4: ...4 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Page 14: ...14 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 Glossary 525 ...
Page 136: ...136 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Page 156: ...156 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Page 216: ...216 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Page 224: ...224 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Page 234: ...234 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Page 294: ...294 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Page 310: ...310 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Page 328: ...328 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Page 378: ...378 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Page 384: ...384 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Page 392: ...392 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Page 436: ...436 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Page 442: ...442 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Page 450: ...450 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Page 460: ...460 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Page 524: ...524 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...
Page 534: ...534 Novell ZENworks Network Access Control Users Guide novdocx en 24 March 2009 ...