Users Guide

Container Description
l Input (Attributes tab): Use the Rules Editor to create a request with the attributes you want
to test. All namespaces relevant to posture evaluation (posture dictionaries) are loaded in
the attributes editor.
l Returns (Results tab):
System Posture Status
and
Status Messages
.
Type
Audit.
l Input (Simulation tab): Select the Audit Server and host to be Audited (IP address or
hostname)
l Returns (Results tab):
Summary Posture Status
,
Audit Attributes
and
Status
NOTE: Note: Audit simulations can take a while; an AuditInProgress status is shown until the
audit completes.
Type
Enforcement
Policy.
l Input (Simulation tab): Select Service (Enforcement Policy is implicit by its association with
the Service), Authentication Source (optional), User Name (optional), Roles, Dynamic Roles
(optional), System Posture Status, and Date/Time (optional).
l Input (Attributes tab): Use the Rules Editor to create a request with the attributes you want
to test. Connection and RADIUS namespaces are loaded in the attributes editor.
l Returns (Results tab):
Enforcement Profile(s)
and the attributes sent to the device.
NOTE: Authentication Source and User Name inputs are used to derive dynamic values in the
enforcement profile that are fetched from authorization source. These inputs are optional.
NOTE: Dynamic Roles are attributes (that are enabled as a role) fetched from the authorization
Dell Networking W-ClearPass Policy Manager 6.0 | User Guide 57