292 Novell eDirectory 8.8 Administration Guidenovdocx (en) 11 July 2008To apply a WAN policy to the LAN Area object, thereby applying the policy to all the serversin the group, see “Applying WAN Policies” on page 293.7 Click Apply, then click OK.Adding Additional Information to a LAN Area ObjectYou can use ConsoleOne ® to add descriptive information to a LAN Area object. This feature is notavailable in Novell iMonitor.1 In ConsoleOne, right-click a LAN Area object.2 Click Properties > General.3 Add the Owner, Description, Location, Department, and Organization information you want.4 Click Apply, then click OK.12.1.2 WAN Traffic PoliciesA WAN traffic policy is a set of rules that control the generation of eDirectory traffic. These rulesare created as text and are stored as an eDirectory property value on the Server object, the LAN Areaobject, or both. The policy is interpreted according to a simple processing language.You can apply policies to individual servers or you can create LAN Area objects and assign severalservers to one of these objects. Any policy that is applied to the LAN Area object is automaticallyapplied to all servers that are assigned to the object.WAN Traffic Manager comes with several predefined policy groups. You can use these policies asthey are, modify them to meet your needs, or write new policies. “Applying WAN Policies” on page 293 “Modifying WAN Policies” on page 293 “Renaming an Existing Policy” on page 294 “Creating New WAN Policies” on page 295Predefined Policy GroupsThe following table lists groups of predefined policies with similar functions:Policy Group Description1-3am.wmg Limits the time traffic is sent to between 1 a.m. and 3 a.m.7am-6pm.wmg Limits the time traffic is sent to between 7 a.m. and 6 p.m.costlt20.wmg Allows only traffic that has a cost factor below 20 to be sent.ipx.wmg Allows only IPX traffic.ndsttyps.wmg Provides sample policies for various eDirectory traffic types.onospoof.wmg Allows only existing WAN connections to be used.opnspoof.wmg Allows only existing WAN connections to be used but assumes that aconnection that hasn't been used for 15 minutes is being spoofed andshould not be used.