Users Guide

which follows the same path until it reaches Role Mapping/Posture/Audit; this appends cached information
for this client to the request for passing to Enforcement.
6. Select the Enforcement Policy Sample_Allow_Access_Policy:
Navigation Setting
Select the Enforcement Policy:
l Enforcement (tab) >
l Use Cached Results (check
box): Select Use cached Roles
and Posture attributes from
previous sessions >
l Enforcement Policy
(selector):
UnmanagedClientPolicy
l When you are finished with
your work in this tab, click
Save.
Table 466: Enforcement Policy Navigation and Settings
Unlike the 802.1X service, which uses the same Enforcement Policy (but uses an explicit Role Mapping
Policy to assess Role), in this use case, Policy Manager applies post-audit rules against attributes captured by
the Audit server to infer Role(s).
7. Click Save.
The service now appears at the bottom of the Services list.
TACACS+ Use Case
This Service supports Administrator connections to Network Access Devices via TACACS+. The following image
illustrates the overall flow of control for this Policy Manager Service.
Dell Networking W-ClearPass Policy Manager 6.6 | User Guide Use Cases | 915