Administrator Guide

Table Of Contents
Dell Networking W-ClearPass Policy Manager 6.6 | User Guide Configuring Enforcement | 343
Chapter 7
Configuring Enforcement
Policy Manager controls network access by sending a set of access-control attributes to the request-originating
Network Access Device (NAD). Policy Manager sends these attributes by evaluating an enforcement policy
associated with the service. Each enforcement policy contains a rule or set of rules for matching conditions
(role, posture, and time) to actions (enforcement profiles). Commonly used enforcement profiles include
attributes for VLAN, Filter ID, Downloadable ACL, and Proxy ACL. For a general overview of network access
enforcement policies, see Enforcement Architecture and Flow on page 1.
This chapter describes the following topics:
l Configuring Enforcement Policies on page 343
l Configuring Enforcement Profiles on page 345
Configuring Enforcement Policies
One and only one enforcement policy can be associated with each service. Enforcement policies can be added
in one of two ways:
l From Configuration > Enforcement > Enforcement Policies.
l From the Configuration >Services page as part of the flow of the Add Service wizard.
The following figure displays the Enforcement Policies page:
Figure 331: Enforcement Policies Page
1. To add a new enforcement policy, click Add.
The Add Enforcement Policy wizard opens: