Secure Access Configuration Guide For Wireless Clients Part Two: Wireless Data Privacy and Monitored Logon 2003-03

Figure 6.8 – Time of Day constraints
f. Click OK and Next to accept the Policy Conditions. Select the Grant
remote access permission radio button and click next.
Figure 6.9 – New Remote Access Policy Wizard
g. Select the Edit Profile button.
© Copyright 2005 Hewlett-Packard Company, LP. 50