Users Guide

298 | Policy Simulation Dell Networking W-ClearPass Policy Manager 6.3 |User Guide
Parameter Description
Summary -
Provides the following information about the Chained Simulation:
l Status
l Roles
l System Posture Status
l Enforcement Profiles
Table 178:
Chained Simulation Results tab Parameters
Enforcement Policy
Given the service name (and the associated enforcement policy), a role or a set of roles, the system posture status, and
an optional date and time, the enforcement policy simulation evaluates the rules in the enforcement policy and
displays the resulting enforcement profiles and their contents.
Authentication Source and User Name inputs are used to derive dynamic values in the enforcement profile that are
retrieved from the authorization source. These inputs are optional.
Dynamic Roles are attributes that are enabled as a role retrieved from the authorization source. For an example of
enabling attributes as a role, see "Adding and Modifying Authentication Sources" on page 149.
Simulation tab
Figure 302: Enforcement Policy Simulation tab
Parameter Description
Service:
Select from:
l [Policy Manager Admin Network Login Service]
l [AirGroup Authorization Service]
l [Aruba Device Access Service]
l [Guest Operator Logins]
l Guest Access
l Guest Access With MAC Caching
Table 179:
Enforcement Policy Simulation tab Parameters