06.05.2013 Views

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Configuring Policies <strong>for</strong> Profiles<br />

14-34<br />

<strong>User</strong> <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> <strong>Access</strong> <strong>Control</strong> <strong>Server</strong> 4.2<br />

Chapter 14 Network <strong>Access</strong> Profiles<br />

A posture-validation policy can have 0-n ordered posture rules.<br />

The posture validation selected is the first that match of the mandatory credential types.<br />

The posture token that will return is the worst assessment that returned from the selected local policies<br />

and external posture servers.<br />

If the client is an agentless host, the selected Audit server will audit the client.<br />

To configure a posture validation policy <strong>for</strong> a NAH:<br />

Step 1 Choose Network <strong>Access</strong> Profiles.<br />

Step 2 Choose Posture Validation <strong>for</strong> the selected profile.<br />

The Posture Validation Page appears.<br />

Step 3 Choose Select Audit.<br />

The Select External Posture Validation Audit <strong>for</strong> profile_name Page appears.<br />

Step 4 Choose the relevant audit server. Select Do Not Use Audit <strong>Server</strong> if you do not want to use an audit<br />

server <strong>for</strong> posture validation.<br />

Step 5 To enable fail open:<br />

a. Check the Do Not reject when Audit failed check box.<br />

b. Choose the posture token to be used in the event of a failure.<br />

c. Enter a value <strong>for</strong> session-timeout <strong>for</strong> the audit server.<br />

d. To assign a user group, check the Assign a <strong>User</strong> Group check box and choose a group from the<br />

drop-down list.<br />

Step 6 Click Submit.<br />

Step 7 Click Apply and Restart <strong>for</strong> your changes to take effect.<br />

Authorization Policy Configuration <strong>for</strong> NAPs<br />

About Authorization Rules<br />

These topics provide in<strong>for</strong>mation on configuring authorization rules:<br />

About Authorization Rules, page 14-34<br />

Configuring an Authorization Rule, page 14-36<br />

Configuring a Default Authorization Rule, page 14-37<br />

Ordering the Authorization Rules, page 14-37<br />

Deleting an Authorization Rule, page 14-38<br />

Troubleshooting Profiles, page 14-38<br />

Authorization policies comprise rules that are applied to a NAP. Authorization policies are used <strong>for</strong><br />

authorizing an authenticated user. Authorization rules can be based on group membership, posture<br />

validation, or both. Authorization actions are built from RACs and ACLs.<br />

OL-14386-02

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!