Policy¶
Introduction to Policy¶
Policies define access control rules that determine how Identities, Endpoints, and MAC addresses are authorized on the network. Each policy consists of rules with conditions (based on identity, endpoint, network device, time) and actions (access, reject, VLAN assignment, captive portal). Policies can be configured for wired and wireless connections, support various authorization methods (802.1X, MAC, Captive Portal), and can include VPN access parameters. The system uses draft and installed policy versions - changes are made in the draft and must be installed to take effect.