background image

Component

Service:
component ratio

Description

Some Services (for example,

) contain internal

authentication methods; in such cases, Policy Manager does
not make this tab available.

B

- Authentication Source

Zero or more per
service

An Authentication Source is the identity repository against
which Policy Manager verifies identity. It supports these
Authentication Source types:

l

Microsoft Active Directory

l

and LDAP compliant directory

l

RSA or other RADIUS-based token servers

l

SQL database, including the local user store.

l

Static Host Lists, in the case of MAC-based Authentication
of managed devices.

C

- Authorization Source

One or more per
Authentication
Source and zero or
more per service

An Authorization Source collects attributes for use in Role
Mapping Rules. You specify the attributes you want to collect
when you configure the authentication source. Policy
Manager supports the following authorization source types:

l

Microsoft Active Directory

l

any LDAP compliant directory

l

RSA or other RADIUS-based token servers

l

SQL database, including the local user store.

C

- Role Mapping Policy

Zero or one per
service

Policy Manager evaluates Requests against Role Mapping
Policy rules to match Clients to Role(s). All rules are evaluated
and Policy Manager may return more than one Role. If no
rules match, the request takes the configured Default Role.

Some Services (for example,

MAC-based Authentication

) may

handle role mapping differently:

l

For

MAC-based Authentication

Services, where role

information is not available from an authentication source,
an Audit Server can determine role by applying post-audit
rules against the client attributes gathered during the
audit.

D

- Internal Posture Policies

Zero or more per
service

An Internal Posture Policy tests Requests against internal
Posture rules to assess health. Posture rule conditions can
contain attributes present in vendor-specific posture
dictionaries.

E

- Posture Servers

Zero or more per
service

Posture servers evaluate client health based on specified
vendor-specific posture credentials, typically posture
credentials that cannot be evaluated internally by Policy
Manager (that is, not by internal posture policies).

Currently, Policy Manager supports two forms of posture
server interfaces:

HCAP

,

RADIUS

, and

GAMEv2

posture

servers.

F

- Audit Servers

Zero or more per
service

Audit servers evaluate the health of clients that do not have an

Dell Networking W-ClearPass Policy Model 6.0 | An Introduction

3

Summary of Contents for Powerconnect W-ClearPass Hardware Appliances

Page 1: ...s Requests Requests against available Services to provide robust differentiation of requests by access method location or other network vendor specific attributes NOTE Policy Manager ships configured with a number of basic Service types You can flesh out these Service types copy them for use as templates import other Service types from another implementation from which you have previously exported...

Page 2: ...EAP non tunneled EAP TLS or EAP MD5 l Non EAP non tunneled CHAP MS CHAP PAP or MAC AUTH l MAC_AUTH must be used exclusively in a MAC based Authentication Service When the MAC_AUTH method is selected Policy Manager 1 makes internal checks to verify that the request is indeed a MAC Authentication request and not a spoofed request and 2 makes sure that the MAC address of the device is present in the ...

Page 3: ...cy Manager evaluates Requests against Role Mapping Policy rules to match Clients to Role s All rules are evaluated and Policy Manager may return more than one Role If no rules match the request takes the configured Default Role Some Services for example MAC based Authentication may handle role mapping differently l For MAC based Authentication Services where role information is not available from ...

Page 4: ...les G Enforcement Policy One per service mandatory Policy Manager tests Posture Tokens Roles and system time against Enforcement Policy rules to return one or more matching Enforcement Policy rules to return one or more matching Enforcement Profiles that define scope of access for the client H Enforcement Profile One or more per service Enforcement Policy Profiles contain attributes that define a ...

Reviews: