46
Click on “OK” twice and repeat this step for all the Remote Access Policies which are to be modified.
Step 8: Logging
IAS adds log entries to the Event Log and writes them to a file.
Open “Event Viewer” and select “System”. All events under Source “IAS” are logs generated by IAS.
IAS creates the log entries “Error”, “Warning” and “Information”
The logs contain a great deal of useful information such as:
Содержание 4402 - Wireless LAN Controller
Страница 23: ...23 Security Layer 3 shall be None ...
Страница 36: ...36 A 4 Default VLAN Now go to SECURITY SSID Manager and specify the default VLAN ...
Страница 43: ...43 Create a Connection Request Policy for every connection this RADIUS server is to serve ...
Страница 60: ...More Best Practice Documents are available at www terena org campus bp campus bp announcements terena org ...