Dell Powerconnect W-ClearPass Hardware Appliances W-ClearPass Policy Manager 6 - Page 103
Table 41, Service General Parameters
View all Dell Powerconnect W-ClearPass Hardware Appliances manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 103 highlights
Table 41: Service Page (General Parameters) Label Description Type Select the desired service type from the drop down menu. When working with service rules, you can select from the following namespace dictionaries: l Application: The type of application for this service. l Authentication: The Authentication method to be used for this service. l Connection: Originator address (Src-IP-Address, Src-Port), Destination address (Dest-IP-Address, Dest-Port), and Protocol l Device: Filter the service based on a specific device type, vendor, operating system location, or controller ID. l Date: Time-of-Day, Day-of-Week, or Date-of-Year l Endpoint: Filter based on endpoint information, such as enabled/disabled, device, OS, location, and more. l Host: Filter based on host Name, OSType, FQDN, UserAgent, CheckType, UniqueID, Agent-Type, and InstalledSHAs, l RADIUS: Policy Manager ships with a number of vendor-specific namespace dictionaries and distinguishes vendor-specific RADIUS namespaces with the notation RADIUS:vendor (sometimes with an additional suffix for a particular device). To add a dictionary for a vendor-specific RADIUS namespace, navigate to Administration > Dictionaries > Radius > Import Dictionary (link). The notation RADIUS:IETF refers to the RADIUS attributes defined in RFC 2865 and associated RFCs. As the name suggests, RADIUS namespace is only available when the request type is RADIUS. l Any other supported namespace. See "Namespaces" on page 341 for an exhaustive list of namespaces and their descriptions. To create new Services, you can copy or import other Services for use as is or as templates, or you can create a new Service from scratch. Name Label for a Service. Description Description for a Service (optional). Monitor Mode Optionally check the Enable to monitor network access without enforcement to allow authentication and health validation exchanges to take place between endpoint and Policy Manager, but without enforcement. In monitor mode, no enforcement profiles (and associated attributes) are sent to the network device. Policy Manager also allows Policy Simulation (Monitoring > Policy Simulation) where the administrator can test for the results of a particular configuration of policy components. More Options Select any of the available check boxes to enable the configuration tabs for those options. The available check boxes varies based on the type of service that is selected and may include one or more of the following: l Authorization: Select an authorization source from the drop down menu to add the source or select the Add new Authentication Source link to create a new source. l Posture Compliance: Select a Posture Policy from the drop down menu to add the policy or create a new policy by clicking the link. Select the default Posture token. Specify whether to enable auto-remediation of non-compliant end hosts. If this is enabled, then enter the Remediation URL. Finally, specify the Posture Server from the drop down menu or add a new server by clicking the Add new Posture Server link. Dell Networking W-ClearPass Policy Manager 6.0 | User Guide 103