Raritan Computer Home Security System 用户手册

下载
页码 384
 
 
149
 
Policies are rules that define which nodes and devices users can access, 
when they can access them, and whether virtual-media permissions are 
enabled, where applicable. The easiest way to create policies is to 
categorize your nodes and devices into node groups and device groups, 
and then create policies that allow and deny access to the nodes and 
devices in each group. After you create a policy, you assign it to a user 
group. See 
Assigning Policies To User Groups
CC-SG includes a Full Access Policy. If you want to give all users access 
to all nodes and devices at all times, assign the Full Access Policy to all 
user groups. 
If you completed Guided Setup, a number of basic policies may already 
have been created. See 
Configuring CC-SG with Guided Setup
 (on 
page 13). 
 
To control access using policies: 
• 
Create Node Groups to organize the nodes you want to create 
access rules for. See 
Add a Node Group
 (on page 124). 
• 
Create Device Groups to organize the devices you want to create 
access rules for. See 
Add a Device Group
 (on page 50). 
• 
Create a policy for a node or device group specifying when access to 
that node or device group can occur. See 
Adding a Policy
 (on page 
150). 
• 
Apply the policy to a user group. See 
Assigning Policies To User 
Groups
 (on page 153). 
 
In This Chapter 
 
 
Chapter 10  Policies for Access Control