06.05.2013 Views

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Configuring Policies <strong>for</strong> Profiles<br />

14-32<br />

A warning message appears.<br />

Step 5 Click OK.<br />

Setting a Posture-Validation Policy to Process Statements of Health<br />

<strong>User</strong> <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> <strong>Access</strong> <strong>Control</strong> <strong>Server</strong> 4.2<br />

Chapter 14 Network <strong>Access</strong> Profiles<br />

A posture-validation policy can have one or more posture-validation rules. When ACS uses a<br />

posture-validation policy to evaluate a posture-validation request, the first match is implemented. The<br />

chosen rules determine which internal and external policies will be activated <strong>for</strong> the request.<br />

You can configure posture-validation policies that might be associated with a rule in Internal or External<br />

Posture Validation Setup, as applicable.<br />

You can also set up a SoH posture validation rule.<br />

Be<strong>for</strong>e you begin:<br />

Ensure that you have:<br />

Checked the Allow Posture Validation option on the Authentication Settings page (see<br />

Authentication <strong>for</strong> profile_name Page, page 14-46).<br />

Set posture validation settings (see Configuring NAC in ACS, page 13-13 <strong>for</strong> details).<br />

Checked the Microsoft Network <strong>Access</strong> Protection Settings check box on the Advanced Options<br />

page.<br />

To add an SoH posture validation rule to a profile:<br />

Step 1 Choose Network <strong>Access</strong> Profiles.<br />

Step 2 Choose Posture Validation <strong>for</strong> the selected profile.<br />

The Posture Validation page appears.<br />

Step 3 Click Add Rule under the Statement of Health Posture Validation Rules table.<br />

The Statement of Health Posture Validation Rule page appears.<br />

Step 4 Enter a Name <strong>for</strong> the rule.<br />

Step 5 Configure the Endpoint Location.<br />

Step 6 Choose which External Posture Validation <strong>Server</strong>s are to be activated.<br />

Step 7 To configure ACS to reject a user if the Network Policy <strong>Server</strong> (NPS) is unable to finalize the Statement<br />

of Health <strong>for</strong> the client, check the Reject <strong>User</strong> check box.<br />

Note The Reject <strong>User</strong> option works only if the NPS <strong>Server</strong> is unable to finalize the Statement of<br />

Health <strong>for</strong> the client.<br />

Step 8 If you want to specify a token that will be used if the NPS <strong>Server</strong> is unable to finalize the Statement of<br />

Health <strong>for</strong> the client:<br />

Uncheck the Reject <strong>User</strong> check box.<br />

From the drop-down list in the Failure Posture Token field, choose a token type to assign.<br />

OL-14386-02

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!