Dell Powerconnect W-ClearPass Hardware Appliances Quick Start Guide Page 31

  • Download
  • Add to my manuals
  • Print
  • Page
    / 34
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 30
Navigation Settings
Configure the Audit Server:
l Audit (tab) >
l Audit End Hosts (enable) >
l Audit Server (selector): NMAP
l Trigger Conditions (radio
button): For MAC
authentication requests
l Reauthenticate client (check
box): Enable
Table 15:
Audit Server Navigation and Settings
Upon completion of the audit, Policy Manager caches Role (NMAP and NESSUS) and Posture (NESSUS), then
resets the connection (or the switch reauthenticates after a short session timeout), triggering a new request, which
follows the same path until it reaches Role Mapping/Posture/Audit; this appends cached information for this client
to the request for passing to Enforcement. Select an Enforcement Policy.
4. Select the Enforcement Policy Sample_Allow_Access_Policy:
Navigation Setting
Select the Enforcement Policy:
l Enforcement (tab) >
l Use Cached Results (check
box): Select Use cached Roles
and Posture attributes from
previous sessions >
l Enforcement Policy (selector):
UnmanagedClientPolicy
l When you are finished with your
work in this tab, click Save.
Table 16:
Enforcement Policy Navigation and Settings
Unlike the 802.1X Service, which uses the same Enforcement Policy (but uses an explicit Role Mapping Policy to
assess Role), in this use case Policy Manager applies post-audit rules against attributes captured by the Audit Server
to infer Role(s).
5. Save the Service.
Click Save. The Service now appears at the bottom of the Services list.
TACACS+ Use Case
This Service supports Administrator connections to Network Access Devices via TACACS+. The following image
illustrates the overall flow of control for this Policy Manager Service.
Dell Networking W-ClearPass Policy Manager | Getting Started Guide Use Cases | 31
Page view 30
1 2 ... 26 27 28 29 30 31 32 33 34

Comments to this Manuals

No comments