Dell W-ClearPass Hardware Appliances, W-ClearPass Virtual Appliances User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell W-ClearPass Hardware Appliances User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell Networking
W-ClearPass Policy
Manager 6.6
User Guide
Dell Networking W-ClearPass Policy Manager | User Guide
Copyright Information
© Copyright 2017 Hewlett Packard Enterprise Development LP. Dell™, the DELL™ logo, and PowerConnect
are trademarks of Dell Inc.
All rights reserved. Specifications in this manual are subject to change without notice.
Originated in the USA. All other trademarks are the property of their respective owners.
Open Source Code
This product includes code licensed under the GNU General Public License, the GNU Lesser General Public
License, and/or certain other open source licenses. A complete machine-readable copy of the source code
corresponding to such code is available upon request. This offer is valid to anyone in receipt of this information
and shall expire three years following the date of the final distribution of this product version by Hewlett-
Packard Enterprise Company. To obtain such source code, send a check or money order in the amount of US
$10.00 to:
Hewlett-Packard Enterprise Company
Attn: General Counsel
3000 Hanover Street
Palo Alto, CA 94304
USA
Please specify the product and version for which you are requesting source code.
Dell Networking W-ClearPass Policy Manager 6.6 | User Guide Contents | 3
Contents
About W-ClearPass Policy Manager 21
About the W-ClearPass Access Management System 21
About This Guide 21
Getting Started 21
W-ClearPass Access Management System Overview 22
Key Features 23
Advanced Policy Management 23
W-ClearPass Specifications 24
Accessing Configuration Information 29
Introduction 30
Start Here 30
Services 30
Authentication and Authorization 31
Identity 31
Posture 31
Enforcement 31
Network 31
Policy Simulation 31
Profile Settings 32
Importing and Exporting Information 32
Importing Information Into W-ClearPass 32
Exporting Information From W-ClearPass 33
Services 35
Services Architecture and Flow 35
Start Here: About Policy Manager Service Templates 36
Creating Templates for W-ClearPass Services 36
Service Templates Provided 38
Service Templates Supported for High Capacity Guest Mode 38
Viewing the List of Services 39
Viewing Existing Services 40
Adding and Removing Services 41
Reordering Services 44
Configuring Service Templates 46
802.1X Wired, 802.1X Wireless, and Dell 802.1X Wireless Service Template 46
Auto Sign-On Service Template 50
Dell VPNAccess with Posture Checks Service Template 51
4 | Contents
Dell Networking W-ClearPass Policy Manager 6.6 | User
Guide
Certificate/Two-Factor Authentication for W-ClearPass Application Login Service Template 53
W-ClearPass Admin Access Service Template 55
W-ClearPass Admin SSO Login (SAML SP Service) Service Template 56
W-ClearPass Identity Provider (SAMLIdP Service) Service Template 57
Device MAC Authentication Service Template 58
EDUROAM Service Template 60
Encrypted Wireless Access via 802.1X Public PEAP Method Service Template 62
Guest Access Service Template 63
Guest Access Web Login Service Template 65
Guest Authentication with MAC Caching Service Template 66
Guest Social MediaAuthentication Service Template 68
OAuth2 API User Access Service Template 70
Onboard Service Template 70
Configuring Policy Manager Services 72
802.1X Wired Service 72
802.1X Wired—Identity Only Service 73
Dell 802.1X Wireless Service 73
802.1X Wireless—Identity Only Service 84
Dell 802.1X Wireless Service 85
Cisco Web Authentication Proxy Service 95
MAC Authentication Service 96
RADIUS Authorization Service 97
RADIUS Enforcement (Generic) Service 98
RADIUS Proxy Service 98
Dell W-Series Application Authentication Service 99
Dell W-Series Application Authorization Service 100
W-ClearPass OnConnect Enforcement Service 100
Event-Based Enforcement Service 102
TACACS+ Enforcement Service 104
Web-Based Authentication Service 107
Web-based Health Check Only Service 111
Web-Based Open Network Access Service 116
Monitoring 117
Live Monitoring: Access Tracker 117
About the Access Tracker 117
Customizing the Access Tracker 118
Viewing Access Tracker Session Details 120
Live Monitoring: Accounting 129
Modifying the Accounting Page Parameters 130
RADIUS Accounting Details> Summary Tab 131
RADIUS Accounting Record Details > Auth Sessions Tab 133
RADIUS Accounting Record Details > Utilization Tab 134
RADIUS Accounting Record Details > Details Tab 135
TACACS+ Accounting Record Details > Request Tab 137
TACACS+ Accounting Record Details > Auth Sessions Tab 138
TACACS+ Accounting Record Details > Details Tab 139
Live Monitoring: OnGuard Activity 140
About OnGuard Activity 140
Bouncing an Agent Using Non-SNMP 141
Bouncing a Client Using SNMP 144
Broadcasting a Message to Active Endpoints 145
Sending a Message to Selected Endpoints 146
Live Monitoring: Analysis and Trending 146
Live Monitoring: System Monitor 147
System Monitor Page 148
Process Monitor Page 149
Network Monitor Page 150
ClearPass Monitor Page 151
Profiler and Discovery 151
Profiler and Discovery: Endpoint Profiler 152
Profiler and Discovery: Network Discovery 153
About Network Discovery 153
Adding the Configurations to Query Seed Devices 154
SNMP Credentials Configuration 154
SSH Credentials Configuration 156
WMI Credentials Configuration 158
Initiating a Network Discovery Scan 160
About Auto-Refresh 162
Importing and Viewing Discovered Network Devices 162
Viewing Discovered Endpoints 165
Configuring Nmap-Based Endpoint Port Scans 166
Audit Viewer 167
Introduction 167
Add Events 167
Modify Events 168
Remove Events 169
Event Viewer 169
About the Event Viewer 170
Creating an Event Viewer Report Using Default Values 171
Creating an Event Viewer Report Using Custom Values 171
Viewing Report Details 172
Data Filters 172
About Data Filters 172
Adding a Data Filter 174
Restoring Blacklisted Users to the Network 177
Dell Networking W-ClearPass Policy Manager 6.6 | User Guide Contents | 5
6 | Contents
Dell Networking W-ClearPass Policy Manager 6.6 | User
Guide
Authentication Methods and Sources 179
Supported Authentication Methods 179
Tunneled EAP Authentication Methods 179
Non-Tunneled Authentication Methods 179
Authentication and Authorization Architecture and Flow 179
Configuring Authentication Methods for an Existing Service 181
Adding and Configuring Authentication Methods 183
Adding a New Authentication Method 183
Modifying an Existing Authentication Method 185
Authorize Authentication Method 185
CHAP Authentication Method 186
EAP-FAST Authentication Method 187
EAP-GTC Authentication Method 192
EAP-MSCHAPv2 193
EAP-PEAP 194
EAP-PEAP-Public 196
EAP-PWD 199
EAP-TLS 200
EAP-TTLS 202
MAC-AUTH Authentication Method 204
MSCHAP 205
PAP 206
Adding and Configuring Authentication Sources 207
Generic LDAP and Active Directory 208
Generic SQL DB 222
HTTP 227
Kerberos 232
Okta 235
RADIUSServer 240
Adding a Static Host List as an Authentication Source 243
About Static Host Lists 243
Adding a Static Host List as an Authentication Source 244
Token Server 245
Configuring Identity Settings 249
Configuring Single Sign-On 249
SAML Service Provider (SP) Configuration 249
SAML Identity Provider (IdP) Configuration 251
Managing Local Users 252
Adding a Local User 252
Modifying a Local User Account 254
Importing and Exporting Local Users 255
Setting Password Policy for Local Users 255
Disabling Local User Accounts 257
Adding and Modifying Endpoints 259
Viewing the List of Authentication Endpoints 259
Viewing Endpoint Authentication Details 260
Performing Bulk Updates of Endpoint Attributes 260
Triggering Actions to Be Performed on Endpoints 261
Updating Device Fingerprints From a Hosted Portal 262
Manually Adding an Endpoint 263
Modifying an Endpoint 264
Managing Static Host Lists 268
About Static Host Lists 268
Adding a Static Host List 269
Static Hosts Lists Configuration Summary 271
Editing a Static Host List 271
Importing and Exporting Static Host Lists 272
Configuring a Role and Role-Mapping Policy 272
Preconfigured Roles 272
Identity Roles Architecture and Workflow 273
Adding and Modifying Roles 274
Adding and Modifying Role-Mapping Policies 275
Posture 279
Posture Architecture and Flow 279
Posture Policy 279
Audit Servers 279
Assessing Client Consistency 280
Application Token 280
System Token 281
Unified Agent System Tray Status Icons 281
About the Unified Agent 281
Unified Agent System Tray Icons 281
OnGuard-Only System Tray Icons 283
Creating a New Posture Policy 283
About W-ClearPass Posture Policies 283
Creating a New Posture Policy 284
Configuring Posture Policy Agents and Hosts 285
Introduction 285
NAP Agent Posture Plug-ins 286
OnGuard Agent Posture Plug-ins 286
Configuring Posture Policy Plug-ins 288
Configuring OnGuard Agent Plugins 289
Configuring NAP Agent Plugins 348
Configuring Posture Policy Rules 352
Configuring Posture for Services 353
Configuring Audit Servers 355
Dell Networking W-ClearPass Policy Manager 6.6 | User Guide Contents | 7
8 | Contents
Dell Networking W-ClearPass Policy Manager 6.6 | User
Guide
Audit Service Flow Control 355
Default Audit Servers 356
Custom Audit Servers 359
Post-Audit Rules 368
Configuring Enforcement Policies and Profiles 371
Configuring Enforcement Policies 371
Configuring Enforcement Profile 373
Adding an Enforcement Profile 374
Modifying an Existing Enforcement Profile 376
Agent Enforcement Profile 376
Agent Script Enforcement Profile 379
Dell Downloadable Role Enforcement Profile 383
Dell RADIUS Enforcement Profile 393
Cisco Downloadable ACL Enforcement Profile 395
Cisco Web Authentication Enforcement Profile 397
W-ClearPass Entity Update Enforcement Profile 399
CLI-Based Enforcement Profile 401
Filter ID Based Enforcement Profile 403
Generic Application Enforcement Profile 405
HTTP Based Enforcement Profile 406
RADIUS Based Enforcement Profile 407
RADIUS Change of Authorization (CoA) Profile 409
Session Notification Enforcement Profile 411
Session Restrictions Enforcement Profile 413
SNMP-Based Enforcement Profile 418
TACACS+ Based Enforcement Profile 419
VLAN Enforcement Profile 422
Configuring Policy Simulation 425
Active Directory Authentication Simulation 425
Adding an Active Directory Simulation 426
Viewing the Simulation Results 426
Application Authentication Simulation 427
Simulation Tab 427
Attributes Tab 427
Results tab 428
Audit Simulation 428
Results Tab 429
Chained Simulation 430
Simulation Tab 430
Attributes Tab 430
Results Tab 432
Enforcement Policy Simulation 432
Simulation Tab 433
Attributes tab 434
Results Tab 435
RADIUS Authentication Simulation 436
Adding a RADIUS Authentication Simulation 436
Setting the Attributes to Be Tested 438
Viewing the Simulation Results 440
Role Mapping Simulation 441
Simulation Tab 441
Attributes Tab 442
Results Tab 443
Service Categorization Simulation 444
Simulation Tab 444
Attributes Tab 444
Results Tab 445
Import and Export Simulations 446
W-ClearPass Policy Manager Profile 447
W-ClearPass Profile Overview 447
Introduction 447
Enabling Endpoint Classification 447
Configuring CoA for an Endpoint-Connected Device 448
How W-ClearPass Profile Classifies Endpoints 449
Fingerprint Dictionaries 450
Viewing Live Endpoint Information for a Specific Device 451
About the Device Profile 452
Endpoint Information Collectors 452
DHCP Collector 453
NetFlow Collector 453
W-ClearPass Onboard Collector 453
HTTP User-Agent Strings Collector 453
MAC OUI Collector 454
ActiveSync Plug-in Collector 454
W-ClearPass OnGuard Agent 454
SNMP Collector 454
About the Subnet Scan Collector 457
Configuring Subnet Scans 457
SNMP Configuration for Wired Network Profiling 459
Accessing SSH and WMI Configuration Information 461
Network Access Devices 463
Introduction 463
Adding and Modifying Network Devices 464
Adding a Network Device 464
Adding and Modifying Proxy Targets 473
Adding a Proxy Target 473
Dell Networking W-ClearPass Policy Manager 6.6 | User Guide Contents | 9
10 | Contents
Dell Networking W-ClearPass Policy Manager 6.6 | User
Guide
Adding and Modifying Device Groups 474
Configuring the Ingress Event Sources 476
Administration 479
W-ClearPass Guest Portal 480
Managing Admin Users 481
Changing the Administration Password 481
Adding an Admin User 482
Importing and Exporting Admin Users 483
Setting Password Policy for Admin Users 483
Disabling Admin User Accounts 485
Managing Admin Privileges 486
Overview 486
Defining Custom Admin Privileges 486
Creating Custom Administrator Privileges 489
Administrator Privilege XML File Structure 489
Administrator Privileges and Task IDs 489
Sample Administrator Privilege XML File 493
Server Configuration 494
Editing Server Configuration Settings 495
Cluster-Related Options 496
Modifying W-ClearPass Server Settings 496
Configuration Tasks for Disabled Nodes in a Cluster 496
Server Configuration Cluster Options 537
Synchronizing the Cluster Date and Time with the NTP Server 537
Changing the Cluster-Wide Password 540
Managing Policy Manager Zones 541
About Policy Manager Zones 541
Adding Policy Manager Zones 541
Mapping Policy Manager Zones 542
Configuring NetEvents Targets 543
Configuring Virtual IPSettings 545
Clearing Machine Authentication Cache 545
Making a Subscriber Node 546
Cluster-Wide Parameters 547
Collecting Logs 562
Backing Up the Policy Manager Database 563
Restoring Policy Manager Configuration Data 564
Performing a System Cleanup 565
Shutting Down or Rebooting the Server 566
Dropping a Subscriber Node 567
Log Configuration 567
Service Log Configuration 567
System Level Configuration 569
Downloading Local Shared Folders 570
License Management 571
About License Usage Limits 571
Managing Licenses 572
Adding an Application License 573
Activating a Server License 574
Activating an Application License 576
Updating a Server License 579
Updating an Application License 580
SNMP Trap Receivers 581
SNMP Trap Receivers Main Page 582
Adding an SNMP Trap Server 582
Importing an SNMP Trap Server 584
Exporting All SNMP Trap Servers 585
Exporting an SNMP Trap Server 586
Deleting an SNMP Trap Server 587
Syslog Targets 587
Syslog Targets Main Page 587
Adding a Syslog Target 588
Importing a Syslog Target 589
Exporting All Syslog Target 590
Exporting a Syslog Target 590
Deleting a Syslog Target 591
Syslog Export Filters 591
About Syslog Export Filters 591
Syslog Export Filters Page 592
Adding a Syslog Export Filter 592
Importing a Syslog Filter 601
Exporting All Syslog Filter 602
Exporting a Syslog Filter 602
Deleting a Syslog Filter 603
Messaging Setup 603
Configuring Messaging 603
Sending a Test Email Message 604
Sending a Test SMS Message 605
Endpoint Context Servers 606
Introduction 606
Endpoint Context Servers Page 606
Adding an Endpoint Context Server 607
Importing an Endpoint Context Server 609
Exporting All Endpoint Context Servers 610
Modifying an Endpoint Context Server 611
Polling an Endpoint Context Server 613
Dell Networking W-ClearPass Policy Manager 6.6 | User Guide Contents | 11
12 | Contents
Dell Networking W-ClearPass Policy Manager 6.6 | User
Guide
Deleting an Endpoint Context Server 613
Configuring Endpoint Context Server Actions 614
Filtering an Endpoint Context Server Action Report 614
Configuring Endpoint Context Server Actions 614
Adding machine-os and host-type Endpoint Attributes 618
Adding Vendor-Specific Endpoint Context Servers 619
Adding an AirWatch Endpoint Context Server 620
Adding an AirWave Endpoint Context Server 622
Adding an Aruba Activate Endpoint Context Server 624
Adding a ClearPass Cloud Proxy Endpoint Context Server 626
Adding a Google Admin Console Endpoint Context Server 627
Adding a Generic HTTP Endpoint Context Server 629
Integrating W-ClearPass with Infoblox 630
Integrating W-ClearPass with Juniper Networks SRX 645
Adding a JAMF Endpoint Context Server 655
Adding a MaaS360 Endpoint Context Server 656
Adding a MobileIron Endpoint Context Server 659
Adding a Palo Alto Networks Firewall Endpoint Context Server 661
Adding a Palo Alto Networks Panorama Endpoint Context Server 663
Adding an SAP Afaria Endpoint Context Server 664
Adding a SOTI Endpoint Context Server 666
Adding a XenMobile Endpoint Context Server 668
File Backup Servers 669
Server Certificates 671
Server Certificate Page 671
Server Certificate Type 672
Creating a Certificate Signing Request 674
Creating and Installing a Self-Signed Certificate 676
Importing a Server Certificate 679
Exporting a Server Certificate 680
Certificate Trust List 681
Certificate Trust List Main Page 681
Adding a Certificate 682
Viewing a Certificate Detail 682
Deleting a Certificate 682
Certificate Revocation Lists 683
About Certificate Revocation Lists 683
Updating All Certificate Revocation Lists 683
Adding a Certificate Revocation List 683
Deleting a Certificate Revocation List 684
RADIUS Dictionary 685
Import RADIUS Dictionary 686
TACACS+ Services Dictionary 686
Device Fingerprints Dictionary 688
Dictionary Attributes 689
Introduction 689
Adding a Dictionary Attribute 690
Modifying Dictionary Attributes 691
Importing Dictionary Attributes 691
Exporting All Dictionary Attributes 692
Exporting Selected Dictionary Attributes 693
Software Updates and OnGuard Settings 693
Software Updates 693
About Software Updates 694
Software Updates Page 694
Install Update Dialog Box 696
Reinstalling a Patch 698
Uninstalling a Skin 698
OnGuard Settings and OnGuard Custom Web Pages 699
Introduction 699
About the OnGuard Custom Interface and the Remediation Process 699
Configuring OnGuard Settings 700
Creating OnGuard Custom Web Pages 702
OnGuard Global Agent Settings 708
About Global Agent Settings 708
Global Agent Settings Parameters for OnGuard Agents 709
Global Agent Settings: Run OnGuard As Parameter 710
Using W-ClearPass Dictionaries 711
Cluster Upgrade/Update Tool 713
About the Cluster Update Tool 713
About the Cluster Update Feature 713
Before Updating the Cluster 714
Updating the Cluster 714
Viewing Update Status 716
About the Cluster Upgrade Tool 718
Introduction 719
Cluster Upgrade Process Overview 719
Before You Upgrade 719
Installing the Cluster Upgrade Tool 720
Launching the Cluster Upgrade Tool 721
Upgrading the W-ClearPass Cluster 723
Viewing Upgrade Status 726
Steps in the Upgrade Tool’s Automated Workflow 727
Sample Times Required for Upgrade 728
Troubleshooting Tips 728
Dell Networking W-ClearPass Policy Manager 6.6 | User Guide Contents | 13
14 | Contents
Dell Networking W-ClearPass Policy Manager 6.6 | User
Guide
Configuring Processing for Ingress Events 731
Overview 731
Enabling Ingress Event Dictionaries 731
Configuring the Ingress Event Sources 732
Configuring the Ingress Receiving Ports 734
Configuring an Event-Based Enforcement Service 734
Introduction 734
Adding an Event-Based Enforcement Service 735
Associating the Enforcement Service with an Enforcement Policy 735
Enabling Ingress Events Processing 736
OnGuard Dissolvable and Native Agents 739
Introduction 739
Accessing the OnGuard Support Charts 739
Upgrading From OnGuard Plugin Version 1.0 to 2.0 740
Overview 740
Creating a New Enforcement Profile to Set the SDKType 740
Modifying an Existing Enforcement Policy for OnGuard Plugin v2.0 742
Creating a New Posture Policy for OnGuard Plugin v2.0 Agents 743
Creating a WebAuth Service for OnGuard Plugin v2.0 Agents 747
Important Points 748
Native Agents Only Mode 749
Configuring Workflow in Native Agents Only Mode 749
End-to-End Flow in Native Agents Only Mode 750
Native Agents with Java Fallback Mode 754
Configuring Native Agents with Java Fallback Mode 754
End-to-End Flow in Native Agents with Java Fallback Mode 755
Configuring Web Agent Flow - Java Only Mode 755
Configuring Web Agent Flow in W-ClearPass Policy Manager 755
Configuring Web Agent Flow in W-ClearPass Guest 756
Native Dissolvable Agent Supported Operating Systems and Browsers 759
OnGuard Dissolvable Agent Supported Browsers and Java Versions 762
W-ClearPass Insight Reports 769
About W-ClearPass Insight 769
Introduction 769
Enabling Insight and Specifying a Master Insight Node 770
Launching Insight 771
About the Insight Dashboard 772
Dashboard Overview 772
Adding a Report Widget to the Dashboard Landing Page 773
Removing a Report Widget from the Dashboard Landing Page 773
Creating a Report or Alert From the Dashboard 774
Specifying the Date Range for Data Collection 775
Authentication Dashboard 776
Endpoints Dashboard 777
Guest Dashboard 778
Network Dashboard 779
Posture Dashboard 779
System Dashboard 780
System Monitor Dashboard 780
Searching the Insight Database 781
About Insight Search 782
Search Example 782
Creating Alerts 783
Introduction 783
Creating New Alerts 784
Modifying the User Watchlist 785
Adding or Removing Users from the Watchlist 788
Creating Reports 789
Overview 790
Settings Configuration 791
Report Filters Configuration 793
Specifying the Logo and Branding 793
Report Summary Page 795
Configured Reports Page 796
Viewing Reports 796
Insight Report Categories Reference 798
Introduction 798
Authentication Category Reports 798
Endpoint Category Reports 801
Guest Authentication Category Reports 802
Network Category Reports 805
OnGuard Category Reports 806
Onboard Category Report 809
RADIUS Authentication Category Reports 810
System Category Reports 811
TACACS Category Reports 812
Administration Operations 813
Overview 813
File Transfer Settings Configuration 814
Testing File Transfer Configuration 815
Database Settings Configuration 816
Managing Insight Admin Privileges 817
Overview 817
Viewing the Default Insight Admin Privileges 817
Defining Custom Insight Admin Privileges 818
Insight UIDifferences for Read-Only Users 820
Dell Networking W-ClearPass Policy Manager 6.6 | User Guide Contents | 15
16 | Contents
Dell Networking W-ClearPass Policy Manager 6.6 | User
Guide
Command Line Interface 821
Cluster Commands 821
cluster drop-subscriber 821
cluster list 822
cluster make-publisher 822
cluster make-subscriber 822
cluster reset-database 823
cluster set-cluster-passwd 823
cluster sync-cluster-passwd 824
Configure Commands 824
configure date 824
configure dns 826
configure fips-mode 826
configure hostname 827
configure ip 827
configure ip6 828
configure mtu 828
configure timezone 830
Network Commands 830
network ip6 831
network ip 832
nslookup 833
network ping6 834
network ping 835
network reset 835
network traceroute6 836
network traceroute 836
Miscellaneous Commands 836
ad auth 837
ad netjoin 837
ad netleave 838
ad passwd-server 838
ad testjoin 839
alias 839
backup 840
dump certchain 841
dump logs 841
dump servercert 842
exit 842
help 842
krb auth 843
krb list 843
ldapsearch 843
quit 844
restore 844
Service Commands 845
service <action> <service-name> 845
Show Commands 847
show all-timezones 847
show date 847
show dns 848
show domain 848
show fipsmode 849
show hostname 849
show ip 849
show license 850
show ntp 851
show sysinfo 851
show timezone 851
show version 852
SSH Timed Account Lockout 852
Introduction 852
SSH Account Lockout Configuration 853
SSH Account Lockout Alerts 855
SSH Account Lockout Behavior 855
System Commands 856
system apps-access-reset 856
system boot-image 856
system cleanup 857
system create-api-client 858
system gen-recovery-key 858
system gen-support-key 858
system install-license 858
system morph-vm 859
system refresh-license 860
system reset-server-certificate 860
system restart 860
system shutdown 861
system sso-reset 861
system start-rasession 861
system status-rasession 862
system terminate-rasession 862
system update 862
system upgrade 863
SNMP Private MIB, SNMP Traps, System Events, Error Codes 867
W-ClearPass SNMP Private MIB 867
Dell Networking W-ClearPass Policy Manager 6.6 | User Guide Contents | 17
18 | Contents
Dell Networking W-ClearPass Policy Manager 6.6 | User
Guide
Introduction 867
System MIB Entries 867
RADIUS Server MIB Entries 868
Policy Server MIBEntries 869
Web Authentication Server MIBEntries 871
TACACS+ Server MIB Entries 871
Network Traffic MIB Entries 872
W-ClearPass SNMP Traps and OIDs 872
Introduction 873
W-ClearPass SNMP Traps 873
SNMP Trap Details 874
SNMP Daemon Traps 875
SNMP Daemon Trap Events 875
Network Interface up and Down Events 875
Network Interface Status Traps 875
W-ClearPass Processes Stop and Start Events 876
Disk Space Threshold Traps 876
Disk Utilization Threshold Exceed Events 876
Process Status Traps 876
CPU Load Average Exceed Events for 1, 5, and 15 Minute Thresholds 888
CPU Load Average Traps 888
Important System Events 889
Admin User Interface Events 889
Admin Server Events 890
Async Service Events 890
W-ClearPass/Domain Controller Events 890
W-ClearPass System Configuration Events 890
W-ClearPass Update Events 891
Cluster Events 891
Command Line Events 891
Database Replication Services Events 891
Licensing Events 892
Policy Server Events 892
RADIUS/TACACS+ Server Events 892
Service Names 892
SNMPEvents 893
Support Shell Events 893
System Auxiliary Service Events 893
System Monitor Events 893
Error Codes 894
Use Cases 899
802.1X Wireless Use Case 899
Configuring a Service 900
Creating a New Role Mapping Policy 900
Web Based Authentication Use Case 905
Configuring a Service 905
MAC Authentication Use Case 912
Configuring the Service 912
TACACS+ Use Case 915
Configuring the Service 916
Single Port Use Case 917
Rules Editing and Namespaces 919
Namespaces 919
Application Namespace 920
Audit Namespaces 921
Authentication Namespaces 921
Authorization Namespaces 923
Certificate Namespaces 924
Connection Namespaces 925
Date Namespaces 926
Device Namespaces 926
Endpoint Namespaces 927
Guest User Namespaces 927
Host Namespaces 927
Local User Namespaces 927
Posture Namespaces 928
RADIUS Namespaces 928
TACACS Namespaces 929
Tips Namespaces 929
Variables 929
Operators 930
Applications Dictionaries 934
Viewing an Application Dictionary 934
Deleting an Application Dictionary 935
Dell Networking W-ClearPass Policy Manager 6.6 | User Guide Contents | 19
20 | Contents
Dell Networking W-ClearPass Policy Manager 6.6 | User
Guide
/