Users Guide

802.1X Wireless
Configure the 802.1X Wireless service for wireless clients connecting through an 802.11 wireless access device or
controller with authentication via IEEE 802.1X.
The default configuration tabs are: Service, Authentication, Roles, and Enforcement. You can also select Authorization,
Posture Compliance, Audit End Hosts, and Profile Endpoints in the More Options section to access those
configuration tabs.
Figure 64: 802.1X Wireless Service
Service Tab
The Service tab includes basic information about the service including: Name, Description, and Service Type. When
adding a service, enter a Name and Description that will help you know what the service does without looking at its
details. The Service Type defines what can be configured.
Select the Monitor Mode check box to exclude enforcement.
Select any of the More Options check boxes to access that category of configuration options.
Service Rules define a set of criteria that supplicants must match to trigger the service. Some service templates have
one or more rules pre-defined. Click on a service rule to modify any of its options.
If you want to administer the same set of policies for wired and wireless access, you can combine the service rule to
define one single service. The other option is to keep two services for wired and wireless access, but re-use the policy
components (authentication methods, authentication source, authorization source, role mapping policies, posture
policies, and enforcement policies) in both services.
Authentication Tab
The Authentication tab contains options for configuring authentication methods and sources.
l Authentication Methods: The authentication methods used for this service depend on the 802.1X supplicants and
the type of authentication methods you choose to deploy. Policy Manager automatically selects the appropriate
method for authentication when a user attempts to connect. The common types, which are automatically selected,
are
n EAP PEAP
n EAP FAST
n EAP TLS
n EAP TTLS
Non-tunneled EAP methods such as EAP-MD5 can also be used as authentication methods.
l Authentication Sources: The Authentication Sources used for this type of service can be one or more instances of
the following: Active Directory, LDAP Directory, SQL DB, Token Server or the Policy Manager local DB.
Dell Networking W-ClearPass Policy Manager 6.3 | User Guide Services | 103