Users Guide

Parameter Action/Description
Audit Server Select the audit server from the following options:
l Nessus Server: Interfaces with Policy Manager primarily to perform
vulnerability scanning.
l Nmap Audit: Performs specific Nmap audit functions.
n To view the Policy Manager Entity Details dialog with the
summary of audit server details, click the View Details button.
n To view the Summary tab with audit server details, click the
Modify button.
Audit Trigger Conditions Select an audit trigger condition:
l Always: Always perform an audit.
l When posture is not available: Perform audit only when posture
credentials are not available in the request.
l For MAC Authentication Request: If you select this option, Policy Manager
presents the following three additional settings:
n For known end-hosts only: Select this option when you want to reject
unknown end-hosts and to audit known clients. Known end-hosts are
defined as clients that are found in the authentication source(s)
associated with this service.
n For unknown end-hosts only: Select this option when the known end-
hosts are assumed to be healthy, but you want to establish the identity of
unknown end-hosts and assign roles. Unknown end-hosts are end-hosts
that are not found in any of the authentication sources associated with
this service.
n For all end-hosts: For both known and unknown end-hosts.
Action After Audit Specify the audit that can be performed only after the MAC authentication
request is completed and the client has acquired an IP address through DHCP.
Once the audit results are available, Policy Manager reapplies policies on the
network device in one of the following ways:
l No Action: The audit does not apply policies on the network device after
completing this audit.
l Do SNMP bounce: This option bounces the switch port or forces an 802.1X
reauthentication (both done using SNMP).
Bouncing the port triggers a new 802.1X or MAC authentication request by
the client. If the audit server already has the posture token and attributes
associated with this client in its cache, it returns the token and the attributes
to W-ClearPass.
l Trigger RADIUS CoA action: This option sends a RADIUS CoA command
from W-ClearPass to the network device.
Table 36: Add Dell 802.1X Wireless Service > Audit End-Hosts Parameters
Profile Endpoints Configuration
The Profiler tab is not displayed by default. To access this tab, select the More Options > Profile Endpoints
check box.
The Add Profile Endpoints dialog opens:
Dell Networking W-ClearPass Policy Manager 6.6 | User Guide Services | 93