Users Guide

Policy Component Illustrative Use Cases
Configuration
Instructions
Role Mapping "802.1X Wireless Use Case" on page 479 has
an explicit Role Mapping Policy that tests
request attributes against a set of rules to
assign a role.
l "Adding and
Modifying
Role
Mapping
Policies" on
page 190
l "Adding and
Modifying
Roles" on
page 189
l "Adding and
Modifying
Local Users"
on page 183
l "Adding and
Modifying
Static Host
Lists" on
page 187
Posture Policy "Web Based Authentication Use Case" on
page 485 uses an internal posture policy that
evaluates the health of the originating client,
based on attributes submitted with the request
by the Dell Web Portal, and returns a
corresponding posture token.
"Adding a
Posture Policy"
on page 198
Posture Server "802.1X Wireless Use Case" on page 479
appends a third-party posture server to
evaluate health policies based on vendor-
specific posture credentials.
"Adding and
Modifying
Posture
Servers" on
page 230
Audit Server "MAC Authentication Use Case" on page 492,
uses an Audit Server to provide port scanning
for health.
"Configuring
Audit Servers"
on page 233
Enforcement Policy and
Profiles
All Use Cases have an assigned Enforcement
Policy and corresponding Enforcement Rules.
l "Configuring
Enforcement
Profiles " on
page 246
l "Configuring
Enforcement
Policies" on
page 277
Table 26:
Policy Component Use Cases and Configuration Instructions (Continued)
Policy Simulation
After the policies have been set up, the Policy Simulation utility can be used to evaluate these policies - before
Dell Networking W-ClearPass Policy Manager 6.3 | User Guide Policy Manager Policy Model | 77