06.05.2013 Views

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 14 Network <strong>Access</strong> Profiles<br />

OL-14386-02<br />

Step 7 Click Submit.<br />

Related Topics<br />

RADIUS Authorization Components, page 4-6<br />

Downloadable IP ACLs, page 4-13<br />

Configuring a Default Authorization Rule<br />

Configuring Policies <strong>for</strong> Profiles<br />

You can set a default authorization rule if a condition is not defined or no matched condition is found.<br />

You can deny or grant access based on Shared RACs and DACLs selections.<br />

To configure a default authorization rule:<br />

Step 1 Choose Network <strong>Access</strong> Profiles.<br />

Step 2 Choose the selected profile Authorization policy.<br />

The Authorization Rules <strong>for</strong> profile_name appears.<br />

Step 3 Click Add Rule.<br />

Step 4 Select Authentication Action <strong>for</strong> the line that contains the text If a condition is not defined or there is<br />

no matched condition.<br />

Step 5 Choose Authentication Actions.<br />

You may choose an authorization action to implement <strong>for</strong> the default rule:<br />

Deny <strong>Access</strong>–Choose this option to deny access <strong>for</strong> users that have matching conditions.You do not<br />

have to select any shared RACs or DACLs <strong>for</strong> this option.<br />

Shared RAC–Choose a Shared RAC from the drop-down list. For more in<strong>for</strong>mation, see<br />

Troubleshooting Profiles, page 14-38.<br />

Downloadable ACL–Choose a downloadable ACL from the drop-down list. See Downloadable IP<br />

ACLs, page 4-13 <strong>for</strong> more in<strong>for</strong>mation.<br />

Step 6 Set RADIUS attribute overrides.<br />

The following options are enabled by default. Uncheck them if you do not want to use RADIUS<br />

attributes per user record or per user’s group:<br />

Step 7 Click Submit.<br />

Ordering the Authorization Rules<br />

Include RADIUS attributes from user's group<br />

Include RADIUS attributes from user record<br />

The authorization policy first match is implemented to authorize a client request.<br />

Note You must place your highest priority authorization policies at the top of the list. If you select Any Group<br />

<strong>for</strong> the <strong>User</strong> Group or Any Assessment <strong>for</strong> the posture token first match, the underlying policies will not<br />

be effective because authorization accepts the first match.<br />

<strong>User</strong> <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> <strong>Access</strong> <strong>Control</strong> <strong>Server</strong> 4.2<br />

14-37

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!