Users Guide

l Create a new service that you will configure from scratch.
In the Services page, click Add a Service, then follow the configuration wizard from component to component by
clicking Next as you complete each tab.
l Remove a service.
In the Services page, fill the check box for a service, then click the Delete button. You can also disable/enable a
service from the service detail page by clicking Disable/Enable (lower right of page).
Figure 31: Disable/Enable toggle for a Policy Manager Service
Links to Use Cases and Configuration Instructions
For each of a Service’s policy components that you can configure, the following table references an illustrative Use
Case and detailed Configuration Instructions.
Table 18:
Policy Component Use Cases and Configuration Instructions
Policy Component Illustrative Use Cases
Configuration
Instructions
Service
l "802.1x Wireless Use Case" on page 67
l "Web Based Authentication Use Case " on
page 73.
l " MAC Authentication Use Case " on page 79.
l "TACACS+ Use Case" on page 83.
"Adding Services " on
page 102
Authentication Method "802.1x Wireless Use Case" on page 67
demonstrates the principle of multiple
authentication methods in a list. When Policy
Manager initiates the authentication handshake, it
tests the methods in priority order until one is
accepted by the client.
"Web Based Authentication Use Case " on page 73
has only a single authentication method, which is
specifically designed for authentication of the
request attributes received from the Dell Web
Portal.
"Adding and Modifying
Authentication Methods"
on page 111
Authentication Source l "802.1x Wireless Use Case" on page 67
demonstrates the principle of multiple
authentication sources in a list. Policy Manager
tests the sources in priority order until the client
can be authenticated. In this case Active
Directory is listed first.
l "Web Based Authentication Use Case " on
page 73 uses the local Policy Manager
repository, as this is common practice among
administrators configuring Guest Users.
l " MAC Authentication Use Case " on page 79
uses a Static Host List for authentication of the
MAC address sent by the switch as the device’s
username.
"Adding and Modifying
Authentication Sources "
on page 127
Dell Networking W-ClearPass Policy Manager 6.0 | User Guide 53