Users Guide

51 Dell Networking W-ClearPass Policy Manager 6.2 | User Guide
Policy Component Illustrative Use Cases
Configuration
Instructions
Authentication Source l "802.1x Wireless Use Case" on page 336
demonstrates the principle of multiple
authentication sources in a list. Policy
Manager tests the sources in priority order
until the client can be authenticated. In this
case Active Directory is listed first.
l "Dell Web Based Authentication Use Case
" on page 344 uses the local Policy
Manager repository, as this is common
practice among administrators configuring
Guest Users.
l "MAC Authentication Use Case" on page
350 uses a Static Host List for
authentication of the MAC address sent by
the switch as the device’s username.
l "TACACS+ Use Case" on page 354 uses
the local Policy Manager repository. Other
authentication sources would also be fine.
"Adding and Modifying
Authentication Sources "
on page 107
Role Mapping "802.1x Wireless Use Case" on page 336 has
an explicit Role Mapping Policy that tests
request attributes against a set of rules to
assign a role.
l "Adding and
Modifying Role
Mapping Policies " on
page 137
l "Adding and
Modifying Roles " on
page 140
l "Adding and
Modifying Local
Users " on page 141
l "Adding and
Modifying Guest
Users " on page 142
l "Adding and
Modifying Static Host
Lists " on page 147
Posture Policy "Dell Web Based Authentication Use Case " on
page 344 uses an internal posture policy that
evaluates the health of the originating client,
based on attributes submitted with the request
by the Dell Web Portal, and returns a
corresponding posture token.
"Adding and Modifying
Posture Policies " on
page 152
Posture Server "802.1x Wireless Use Case" on page 336
appends a third-party posture server to
evaluate health policies based on vendor-
specific posture credentials.
"Adding and Modifying
Posture Servers " on
page 177
Audit Server "MAC Authentication Use Case" on page 350,
uses an Audit Server to provide port scanning
for health.
"Configuring Audit
Servers" on page 180