Dell Powerconnect W-ClearPass Hardware Appliances W-ClearPass Policy Manager 6 - Page 54

Policy Simulation, Configuration > Policy Simulation

Page 54 highlights

Policy Component Role Mapping Posture Policy Posture Server Audit Server Enforcement Policy and Profiles Illustrative Use Cases Configuration Instructions l "TACACS+ Use Case" on page 83 uses the local Policy Manager repository. Other authentication sources would also be fine. "802.1x Wireless Use Case" on page 67 has an explicit Role Mapping Policy that tests request attributes against a set of rules to assign a role. l "Adding and Modifying Role Mapping Policies " on page 155 l "Adding and Modifying Roles " on page 158 l "Adding and Modifying Local Users " on page 159 l "Adding and Modifying Guest Users " on page 161 l "Adding and Modifying Static Host Lists " on page 166 "Web Based Authentication Use Case " on page 73 uses an internal posture policy that evaluates the health of the originating client, based on attributes submitted with the request by the Dell Web Portal, and returns a corresponding posture token. "Adding and Modifying Posture Policies " on page 172 "802.1x Wireless Use Case" on page 67 appends a third-party posture server to evaluate health policies based on vendor-specific posture credentials. "Adding and Modifying Posture Servers " on page 199 " MAC Authentication Use Case " on page 79, uses an Audit Server to provide port scanning for health. "Configuring Audit Servers" on page 204 All Use Cases have an assigned Enforcement Policy and corresponding Enforcement Rules. l "Configuring Enforcement Profiles " on page 218 l "Configuring Enforcement Policies " on page 229 Policy Simulation Once the policies have been set up, the Policy Simulation utility can be used to evaluate these policies - before deployment. The Policy Simulation utility applies a set of request parameters as input against a given policy component and displays the outcome, at: Configuration > Policy Simulation. The following types of simulations are supported: 54 Dell Networking W-ClearPass Policy Manager 6.0 | User Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372

54
Dell Networking W-ClearPass Policy Manager 6.0 | User Guide
Policy Component
Illustrative Use Cases
Configuration
Instructions
l
"TACACS+ Use Case" on page 83
uses the
local Policy Manager repository. Other
authentication sources would also be fine.
Role Mapping
"802.1x Wireless Use Case" on page 67
has an
explicit
Role Mapping Policy
that tests request
attributes against a set of rules to assign a role.
l
"Adding and
Modifying Role
Mapping Policies " on
page 155
l
"Adding and
Modifying Roles " on
page 158
l
"Adding and
Modifying Local Users
" on page 159
l
"Adding and
Modifying Guest
Users " on page 161
l
"Adding and
Modifying Static Host
Lists " on page 166
Posture Policy
"Web Based Authentication Use Case " on page 73
uses an internal posture policy that evaluates the
health of the originating client, based on attributes
submitted with the request by the Dell Web Portal,
and returns a corresponding posture token.
"Adding and Modifying
Posture Policies " on page
172
Posture Server
"802.1x Wireless Use Case" on page 67
appends a
third-party posture server to evaluate health policies
based on vendor-specific posture credentials.
"Adding and Modifying
Posture Servers " on page
199
Audit Server
" MAC Authentication Use Case " on page 79
,
uses an Audit Server to provide port scanning for
health.
"Configuring Audit
Servers" on page 204
Enforcement Policy and
Profiles
All Use Cases have an assigned Enforcement Policy
and corresponding Enforcement Rules.
l
"Configuring
Enforcement Profiles
" on page 218
l
"Configuring
Enforcement Policies
" on page 229
Policy Simulation
Once the policies have been set up, the Policy Simulation utility can be used to evaluate these policies - before
deployment. The Policy Simulation utility applies a set of request parameters as input against a given policy
component and displays the outcome, at:
Configuration > Policy Simulation
.
The following types of simulations are supported: