Users Guide

432 | Configuring Policy Simulation Dell Networking W-ClearPass Policy Manager 6.6 | User Guide
Results Tab
The following figure displays the Chained Simulation - Results tab:
Figure 425: Chained Simulation Results Tab
Parameter Description
Summary
Provides the following information about the chained simulation:
l Status
l Roles
l System Posture Status
l Enforcement Profiles
Table 237: Chained Simulation Results Tab Parameters
Enforcement Policy Simulation
Given the service name (and the associated enforcement policy), a role or a set of roles, the system posture
status, and an optional date and time, the enforcement policy simulation evaluates the rules in the
enforcement policy and displays the resulting enforcement profiles and their contents.
Authentication Source and User Name inputs are used to derive dynamic values in the enforcement profile
that are retrieved from the authorization source. These inputs are optional.
Dynamic roles are attributes that are enabled as a role retrieved from the authorization source. For an example
of enabling attributes as a role, see Generic LDAP and Active Directory on page 208.