06.05.2013 Views

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

User Guide for Cisco Secure Access Control Server - Stewing Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Network <strong>Access</strong> Profiles Pages Reference<br />

Posture Validation Page<br />

14-48<br />

<strong>User</strong> <strong>Guide</strong> <strong>for</strong> <strong>Cisco</strong> <strong>Secure</strong> <strong>Access</strong> <strong>Control</strong> <strong>Server</strong> 4.2<br />

Chapter 14 Network <strong>Access</strong> Profiles<br />

Use this page to order and associate Posture Validation rules.<br />

To display this page, click Posture Validation in the Network <strong>Access</strong> Profiles Page, page 14-39.<br />

Table 14-25 Posture Validation Page <strong>for</strong> profile_name Page<br />

Field Description<br />

Posture Validation Rules<br />

Rule Name The name of the posture-validation rule.<br />

Required The Available Credentials list displays the credential types that ACS does not require.<br />

Credential Types<br />

The Selected Credentials list displays the credential types that ACS requires in a posture-validation<br />

request in order to use this posture-validation rule to evaluate the posture-validation request.<br />

Associate With The policies that are associated with a rule.<br />

Up/Down Sets the order of evaluation.<br />

Add Rule Opens the Posture Validation Rule <strong>for</strong> profile_name Page on which you create a new posture-validation<br />

rule.<br />

Select Audit Opens the Select External Posture Validation Audit <strong>for</strong> profile_name Page to configure an audit server<br />

<strong>for</strong> NAH. NAC-compliant AAA clients can handle NAC <strong>for</strong> computers that do not respond to attempts to<br />

start a posture-validation session with the <strong>Cisco</strong> Trust Agent by querying an audit server. If the <strong>Cisco</strong><br />

Trust Agent is not installed on the computer or is unreachable <strong>for</strong> other reasons, NAC-compliant AAA<br />

clients will attempt to per<strong>for</strong>m posture validation on an audit server. The result that an audit server returns<br />

is a posture token.<br />

Related Topics<br />

Chapter 13, “Posture Validation”<br />

Setting a Posture-Validation Policy, page 14-30<br />

Posture Validation Rule <strong>for</strong> profile_name Page<br />

Use this page to define a Posture Validation rule.<br />

To display this page, click Add Rule in the Posture Validation Page, page 14-48.<br />

Table 14-26 Posture Validation Rule <strong>for</strong> profile_name Page<br />

Field Description<br />

Rule Name Displays the rule name <strong>for</strong> identification.<br />

Add Rule Click to add a posture-validation rule. The Posture Validation Rule configuration page appears.<br />

Edit Rule Highlight the Rule Name. The Posture Validation Rule configuration page <strong>for</strong> the specific profile appears<br />

<strong>for</strong> editing.<br />

Action<br />

Select Internal<br />

Posture Validation<br />

Policies<br />

Select the internal posture validation policies that ACS will apply to the attributes received in the request<br />

<strong>for</strong> this rule.<br />

OL-14386-02

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!