D-Link DUA-2000 Policy Manager User Manual
31
8.
Policy & Object
Policy Rule
Rule
The Policy Rule links all of the different configuration elements that are used to authenticate
a user or device. It is based on the User Group, Device Type, Location Profile and Schedule
Profile and references the Authentication Database configured in the Identity Domain. If it is
not possible to authenticate a user or device, then they are denied access by the Wireless
Controller. If it is possible to authenticate a user or device, then the Authorization Profile is
returned to the Wireless Controller.
NOTE:
It is not possible to deny access to a user or device using the Policy
Rule. This is done by the Wireless Controller and is based on the Policy Rule
being unable to authenticate the device or user.
To get to the following page, browse to:
Policy & Object >> Policy Rule >> Rule
:
Figure 9-1 – Rule
The following fields are available:
Field
Description
User Group
Select the User Group to display the policy rules for.
Location Profile
Select the Location Profile to display the policy rules for.
Schedule Profile
Select the Schedule Profile to display the policy rules for.
Table 9-1 – Rule 1
Click
Get Rules
to search for rules using the fields selected.