Dell Powerconnect W-ClearPass Hardware Appliances W-ClearPass Policy Manager 6 - Page 92

Policy Manager Service Types, Service Type

Page 92 highlights

Policy Manager Service Types The following service types come preconfigured on Policy Manager: Table 39: Policy Manager Service Types Service Type Description/ Available Policy Components (in tabs)/ Service Rule (in Rules Editor)/ Service-specific policy components (called out with legend below) DellW-Series Wireless Template for wireless hosts connecting through a Dell W-Series 802.11 wireless access device or controller, with authentication via IEEE 802.1X. Service rules are customized for a typical Dell W-Series Mobility Controller deployment. Refer to the "802.1X Wireless " on page 92 service type for a description of the different tabs. For wireless clients connecting through an 802.11 wireless access device or controller, with authentication via IEEE 802.1X. By default, the template displays with the Service, Authentication, Roles, Enforcement, and Summary tabs. In the More Options section, click on Authorization, Posture Compliance, Audit End Hosts, or Profile Endpoints to enable additional tabs. 802.1X Wireless To configure authentication methods and authentication source, click on the Authentication tab. The Authentication methods used for this service depend on the 802.1X supplicants and the type of authentication methods you choose to deploy. The common types are PEAP, EAP-TLS, EAPFAST or EAP-TTLS (These methods are automatically selected). Non-tunneled EAP methods such as EAP-MD5 can also be used as authentication methods. The Authentication sources used for this type of service can be one or more instances of the following: Active Directory, LDAP Directory, SQL DB, Token Server or the Policy Manager local DB. For more information on configuring authentication sources, refer to "Adding and Modifying Authentication Sources " on page 127. You can enable Strip Username Rules to, optionally, pre-process the user name (to remove prefixes and suffixes) before authenticating and authorizing against the authentication source. To create an authorization source for this service click on the Authorization tab. This tab is not visible by default. To enable Authorization for this service select the Authorization check box on the Service tab. Policy Manager fetches role mapping attributes from the authorization sources associated with service, regardless of which authentication source was used to authenticate the user. For a given service, role mapping attributes are fetched from the following authorization sources: The authorization sources associated with the service. For more information on configuring authorization sources, refer to "Adding and Modifying Authentication Methods" on page 111. 92 Dell Networking W-ClearPass Policy Manager 6.0 | User Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372

92
Dell Networking W-ClearPass Policy Manager 6.0 | User Guide
Policy Manager Service Types
The following service types come preconfigured on Policy Manager:
Table 39:
Policy Manager Service Types
Service Type
Description/ Available Policy Components (in tabs)/ Service Rule (in Rules Editor)/
Service-specific policy components (called out with legend below)
DellW-Series
Wireless
Template for wireless hosts connecting through a Dell W-Series 802.11 wireless access device
or controller, with authentication via IEEE 802.1X. Service rules are customized for a typical Dell
W-Series Mobility Controller deployment.
Refer to the
"802.1X Wireless " on page 92
service type for a description of the different tabs.
802.1X Wireless
For wireless clients connecting through an 802.11 wireless access device or controller, with
authentication via IEEE 802.1X. By default, the template displays with the Service, Authentication,
Roles, Enforcement, and Summary tabs. In the
More Options
section, click on Authorization,
Posture Compliance, Audit End Hosts, or Profile Endpoints to enable additional tabs.
To configure authentication methods and authentication source, click on the
Authentication
tab.
The
Authentication methods
used for this service depend on the 802.1X supplicants and the type
of authentication methods you choose to deploy. The common types are PEAP, EAP-TLS, EAP-
FAST or EAP-TTLS (These methods are automatically selected). Non-tunneled EAP methods
such as EAP-MD5 can also be used as authentication methods.
The
Authentication sources
used for this type of service can be one or more instances of the
following: Active Directory, LDAP Directory, SQL DB, Token Server or the Policy Manager local
DB. For more information on configuring authentication sources, refer to
"Adding and Modifying
Authentication Sources " on page 127
.
You can enable
Strip Username Rules
to, optionally, pre-process the user name (to remove
prefixes and suffixes) before authenticating and authorizing against the authentication source.
To create an authorization source for this service click on the
Authorization
tab. This tab is not
visible by default. To enable Authorization for this service select the
Authorization
check box on
the
Service
tab. Policy Manager fetches role mapping attributes from the authorization sources
associated with service, regardless of which authentication source was used to authenticate the
user. For a given service, role mapping attributes are fetched from the following authorization
sources:
The authorization sources associated with the service. For more information on configuring
authorization sources, refer to
"Adding and Modifying Authentication Methods" on page 111
.