Dell Powerconnect W-ClearPass Hardware Appliances W-ClearPass Policy Manager 6 - Page 95

Posture Polices, Posture Servers, Add new RADIUS CoA Action

Page 95 highlights

Service Type Description/ Available Policy Components (in tabs)/ Service Rule (in Rules Editor)/ Service-specific policy components (called out with legend below) You can enable posture checking for this kind of service if you are deploying Policy Manager in a Microsoft NAP or Cisco NAC framework environment, or if you are deploying aDell hosted captive portal that does posture checks through a dissolvable agent. You can also choose to Enable auto-remediation of non-compliant end-hosts and enter the Remediation URL of a server resource that can perform remediation action (when a client is quarantined). For more information on configuring Posture Polices and Posture Servers refer to topics: "Adding and Modifying Posture Policies " on page 172 and "Adding and Modifying Posture Servers " on page 199. By default, this type of service does not have Audit checking enabled. To enable posture checking for this service select the Audit End-hosts check box on the Service tab. Select an Audit Server - either built-in or customized. Refer to "Configuring Audit Servers" on page 204 for audit server configuration steps. You can specify to trigger an audit always, when posture is not available, or for MAC authentication requests. If For MAC authentication requests is specified, then you can perform an audit For known end-hosts only or For unknown end hosts only, or For all end hosts. Known end hosts are defined as those clients that are found in the authentication source(s) associated with this service. Performing audit on a client is an asynchronous task, which means the audit can be performed only after the MAC authentication request has been completed and the client has acquired an IP address through DHCP. Once the audit results are available, there should be a way for Policy Manager to re-apply policies on the network device. This can be accomplished in one of the following ways: l No Action: The audit will not apply policies on the network device after this audit. l Do SNMP bounce: This option will bounce the switch port or to force an 802.1X reauthentication (both done via SNMP). NOTE: Bouncing the port triggers a new 802.1X/MAC authentication request by the client. If the audit server already has the posture token and attributes associated with this client in its cache, it returns the token and the attributes to Policy Manager. l Trigger RADIUS CoA action: This option sends a RADIUS Change of Authorization command to the network device by Policy Manager. You must select an enforcement policy (see "Configuring Enforcement Policies " on page 229) for a service. Optionally configure Profiler settings. Select one or more Endpoint Classification items from the drop down list, then select the RADIUS CoA action. You can also create a new action by selecting the Add new RADIUS CoA Action link. Dell Networking W-ClearPass Policy Manager 6.0 | User Guide 95

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372

Service Type
Description/ Available Policy Components (in tabs)/ Service Rule (in Rules Editor)/
Service-specific policy components (called out with legend below)
You can enable posture checking for this kind of service if you are deploying Policy Manager in
a Microsoft NAP or Cisco NAC framework environment, or if you are deploying aDell hosted
captive portal that does posture checks through a dissolvable agent. You can also choose to
Enable auto-remediation of non-compliant end-hosts
and enter the
Remediation URL
of a server
resource that can perform remediation action (when a client is quarantined).
For more information on configuring
Posture Polices
and
Posture Servers
refer to topics:
"Adding and Modifying Posture Policies " on page 172
and
"Adding and Modifying Posture
Servers " on page 199
.
By default, this type of service does not have Audit checking enabled. To enable posture
checking for this service select the
Audit End-hosts
check box on the
Service
tab.
Select an
Audit Server
- either built-in or customized. Refer to
"Configuring Audit Servers" on
page 204
for audit server configuration steps.
You can specify to trigger an audit always, when posture is not available, or for MAC
authentication requests. If
For MAC authentication requests
is specified, then you can perform
an audit
For known end-hosts only
or
For unknown end hosts only
, or
For all end hosts
. Known
end hosts are defined as those clients that are found in the authentication source(s) associated
with this service. Performing audit on a client is an asynchronous task, which means the audit
can be performed only after the MAC authentication request has been completed and the client
has acquired an IP address through DHCP. Once the audit results are available, there should be
a way for Policy Manager to re-apply policies on the network device. This can be accomplished
in one of the following ways:
l
No Action:
The audit will not apply policies on the network device after this audit.
l
Do SNMP bounce:
This option will bounce the switch port or to force an 802.1X
reauthentication (both done via SNMP).
NOTE:
Bouncing the port triggers a new 802.1X/MAC authentication request by the client. If the
audit server already has the posture token and attributes associated with this client in its cache,
it returns the token and the attributes to Policy Manager.
l
Trigger RADIUS CoA action:
This option sends a RADIUS Change of Authorization command
to the network device by Policy Manager.
You must select an enforcement policy (see
"Configuring Enforcement Policies " on page 229
)
for a service.
Optionally configure
Profiler
settings. Select one or more Endpoint Classification items from the
drop down list, then select the RADIUS CoA action. You can also create a new action by
selecting the
Add new RADIUS CoA Action
link.
Dell Networking W-ClearPass Policy Manager 6.0 | User Guide
95