Users Guide

Select the Monitor Mode check box to exclude enforcement.
Select any of the More Options check boxes to access that category of configuration options.
Service Rules define a set of criteria that supplicants must match to trigger the service. Some service templates have
one or more rules pre-defined. Click on a service rule to modify any of its options.
Authentication Tab
The Authentication tab contains options for configuring authentication sources.
l Authentication Sources: Select the Authentication Sources used for this type of service.
You can select one item in the list and use the buttons on the right to:
l Move it up or down.
The order of authentication matters. When a client tries to do 802.1X authentication, Policy Manager proposes the
first authentication method configured. The client can accept the authentication method proposed by Policy
Manager and continue authentication or send a NAK and propose a different authentication method. If this
authentication method is also configured, then authentication will proceed. Otherwise authentication will fail.
If most of the clients in the network use a particular authentication method, that authentication method should be
configured first in the list. This would reduce the number of RADIUS packet exchanged.
l Remove it.
l View its details.
l Modify it.(See "Adding and Modifying Authentication Methods" on page 133 and "Adding and Modifying
Authentication Sources" on page 151.)
You can also use the links on the right to add a new authentication method or source.
Select Strip Username Rules to, optionally, pre-process the user name (to remove prefixes and suffixes) before
authenticating and authorizing against the authentication source.
There is no authentication method associated with this type of service.
Roles Tab
To associate a role mapping policy with this service click on the Roles tab. For information on configuring role
mapping policies, see "Configuring a Role Mapping Policy" on page 191.
Enforcement Tab
The Enforcement tab is where you select an enforcement policy for a service. You must select one.
See "Configuring Enforcement Policies" on page 281 for more information.
Dell W-Series Application Authorization
This type of service provides authorization for users of Dell applications: Guest and Insight. "Generic Application
Enforcement" on page 270 can be sent to these or other generic applications for authorizing the users.
Configuration options for this service are the same as Dell W-Series Application Authentication, except that
authentication options are not available. Refer to "Dell W-Series Application Authentication" on page 120
Dell Networking W-ClearPass Policy Manager 6.3 | User Guide Services | 121