Management and Configuration Guide (Includes ACM xl) 2005-12

IX-4
for client addressing 2-21
E
encryption
specified in Access Policy
4-42
Ethernet bridging
enabling
6-27
Expire timer, See reauthentication timeout
export rights
5-57
External 4-48
external identity retrieval 5-37
F
Failover See Control Server redundancy
filters
display filters
2-11
folders
creating or editing
6-12
selecting for an Access Controller 6-11
vs. Locations 6-13
Full DCHP Subnet setting 6-30
G
Guest user
Guest Registration page custom template
5-48
logon options 5-43
registered guest option 5-43
guest user
registered guest
5-39
Guest users
pre-registering
4-14
H
Header bar 2-7
Help
for Administrative Interface
2-5
for CLI A-3
HTTP proxy
automatic
6-31
server configuration 6-31
HTTP Proxy filters 4-5, 4-79
creating or editing a filter 4-80
example 4-86
proxy filter types 4-81
Verify via DNS option 4-82
HTTP Proxy tab 4-52
I
Identity Profiles 4-10
and NT Domain logon 5-36
creating or editing 4-11
overview of 4-3
predefined profiles 4-10
Idle time
in session status display
3-10
images
logo image types
5-42
Stop image types 5-46
uploading for custom templates 5-48
importing rights 5-58
inaccessible Access Control Server,
troubleshooting
D-1
incorrect network configuration, troubleshooting
D-1
incorrect rights, troubleshooting D-3
Integrated Access Manager
changing administrator username/password
6-11
interfaces
port connection type
6-38
speed/duplex settings 6-38
Interfaces tab 6-38
iPlanet directory service 5-14
IPSec
and authentication
5-3
certificate configuration 7-5
configuring 7-2
configuring PKI for 7-5
shared secret 7-4
IPX/802.2 protocol 6-27
IPX/802.3 protocol 6-27
IPX/Ethernet II encapsulation protocol 6-27
K
Kerberos 5-2
configuring as authentication service 5-26
Kerberos realm 5-27
Key Distribution Center 5-27
L
L2TP/IPSec
and authentication
5-3
Layer 2 bridging 6-27
layer 3 roaming 1-5
layer 3 roaming, overview 2-23
LDAP service
authentication troubleshooting
D-2
configuring for authentication 5-8
configuring MAC address retrieval 4-23
non-user binding 5-10
retrieving MAC address users from 4-21
user binding 5-10
License Information
viewing
3-11
Lightweight Directory Access Protocol (LDAP)5-2
Linger timeout 2-23, 4-58
and client polling 6-29
configuring start 6-29