Users Guide

Parameter Action/Description
Select Wireless Controller Select a wireless controller from the drop-down list.
Wireless controller name Enter the name given to the wireless controller.
Controller IPAddress Enter the wireless controller's IP address.
Vendor Name Select the manufacturer of the wireless controller.
RADIUS Shared Secret Enter the shared secret that is configured on the controller and inside Policy
Manager to send and receive RADIUS requests.
Enable RADIUSCoA Select this option to enable RADIUS initiated CoA on the network device.
RADIUS CoA Port Specifies the default port 3799 if RADIUS CoA is enabled.
NOTE: Change this value only if you defined a custom port on the network device.
Dell User Roles for different access privileges - Create a new Enforcement Policy
Initial Role (before posture
checks)
Enter the initial role of the client before posture checks are performed.
Quarantined Role (failed
posture checks)
Enter the role of clients that fail posture checks.
Healthy Role (passed
posture checks)
Enter the role of the client after a posture check is passed and deemed healthy.
Table 7: Dell VPNAccess with Posture Checks Service Template Parameters (Continued)
Certificate/Two-Factor Authentication for W-ClearPass Application Login Service
Template
This service template allows administrators and operators to log in to W-ClearPass using a smart card and TLS
(Transport Layer Security) certificates.
To log in using a smart card and TLS certificates, ensure that the services are configured using the
Certificate/Two-Factor Authentication for ClearPass Application Login service template.
The following figure displays the Certificate/Two-Factor Authentication for ClearPass Application Login
service template:
Figure 20: Certificate/Two-Factor Authentication Service Template
Dell Networking W-ClearPass Policy Manager 6.6 | User Guide Services | 53