Administrator Guide

374 | Policy Simulation Dell Networking W-ClearPass Policy Manager 6.5 | User Guide
Enforcement Policy
Given the service name (and the associated enforcement policy), a role or a set of roles, the system posture
status, and an optional date and time, the enforcement policy simulation evaluates the rules in the
enforcement policy and displays the resulting enforcement profiles and their contents.
Authentication Source and User Name inputs are used to derive dynamic values in the enforcement profile
that are retrieved from the authorization source. These inputs are optional.
Dynamic roles are attributes that are enabled as a role retrieved from the authorization source. For an example
of enabling attributes as a role, see Generic LDAP and Active Directory on page 170.
Simulation Tab
The following figure displays the Enforcement Policy Simulation tab:
Figure 351: Enforcement Policy Simulation Tab