Dell Powerconnect W-ClearPass Hardware Appliances 하드웨어 - 페이지 3
{카테고리_이름} Dell Powerconnect W-ClearPass Hardware Appliances에 대한 하드웨어을 온라인으로 검색하거나 PDF를 다운로드하세요. Dell Powerconnect W-ClearPass Hardware Appliances 4 페이지. W-clearpass policy manager 6.0 quick start guide
Dell Powerconnect W-ClearPass Hardware Appliances에 대해서도 마찬가지입니다: 매뉴얼 (10 페이지), 하드웨어 설치 매뉴얼 (13 페이지), 빠른 시작 매뉴얼 (28 페이지)
![Dell Powerconnect W-ClearPass Hardware Appliances 하드웨어](/uploads/products/server2/3227936/3227936.png)
Component
B - Authentication Source
C - Authorization Source
C - Role Mapping Policy
D - Internal Posture Policies
E - Posture Servers
F - Audit Servers
Dell Networking W-ClearPass Policy Model 6.0 | An Introduction
Service:
Description
component ratio
Some Services (for example, TACACS+) contain internal
authentication methods; in such cases, Policy Manager does
not make this tab available.
Zero or more per
An Authentication Source is the identity repository against
service
which Policy Manager verifies identity. It supports these
Authentication Source types:
Microsoft Active Directory
l
and LDAP compliant directory
l
RSA or other RADIUS-based token servers
l
SQL database, including the local user store.
l
Static Host Lists, in the case of MAC-based Authentication
l
of managed devices.
One or more per
An Authorization Source collects attributes for use in Role
Authentication
Mapping Rules. You specify the attributes you want to collect
Source and zero or
when you configure the authentication source. Policy
more per service
Manager supports the following authorization source types:
Microsoft Active Directory
l
any LDAP compliant directory
l
RSA or other RADIUS-based token servers
l
SQL database, including the local user store.
l
Zero or one per
Policy Manager evaluates Requests against Role Mapping
service
Policy rules to match Clients to Role(s). All rules are evaluated
and Policy Manager may return more than one Role. If no
rules match, the request takes the configured Default Role.
Some Services (for example, MAC-based Authentication) may
handle role mapping differently:
For MAC-based Authentication Services, where role
l
information is not available from an authentication source,
an Audit Server can determine role by applying post-audit
rules against the client attributes gathered during the
audit.
Zero or more per
An Internal Posture Policy tests Requests against internal
service
Posture rules to assess health. Posture rule conditions can
contain attributes present in vendor-specific posture
dictionaries.
Zero or more per
Posture servers evaluate client health based on specified
service
vendor-specific posture credentials, typically posture
credentials that cannot be evaluated internally by Policy
Manager (that is, not by internal posture policies).
Currently, Policy Manager supports two forms of posture
server interfaces: HCAP, RADIUS, and GAMEv2 posture
servers.
Zero or more per
Audit servers evaluate the health of clients that do not have an
service
3