Administrator Guide

Dell Networking W-ClearPass Policy Manager 6.5 | User Guide Policy Simulation | 367
Chapter 12
Policy Simulation
After creating the policies, use the Policy Simulation utility in the Configuration > Policy Simulation page
to evaluate those policies before deployment. The Policy Simulation utility applies a set of request
parameters as input against a given policy component and displays the outcome.
This chapter describes the following types of simulations:
l Active Directory Authentication on page 367
l Application Authentication on page 369
l Audit on page 370
l Chained Simulation on page 1
l Enforcement Policy on page 1
l RADIUS Authentication on page 377
l Role Mapping on page 1
l Service Categorization on page 1
The following figure displays the Policy Simulation page:
Figure 340: Policy Simulation page
The following table describes the Policy Simulation page parameters:
Parameter Description
Name Displays the name of the name of the policy simulation.
Type Displays the type of the policy simulation.
Description Displays additional information about the policy simulation.
Table 204:
Policy Simulation Configuration Parameters
Active Directory Authentication
This simulation tests authentication against an Active Directory domain or trusted domain to verify that the
CPPM domain membership is valid.
The Attributes tab is not available for this simulation type.