Dell Networking W-ClearPass Policy Model 6.0
An Introduction
From the point of view of a network device or other entities that need authentication services, Policy Manager
appears as a RADIUS, TACACS+ or Web Authentication server; however, its rich and extensible policy model
allows it to broker security functions across a range of existing network infrastructure, identity stores, health/posture
services and client technologies within the Enterprise.
Services Paradigm
Services
l Unique Categorization Rules (per Service) enable Policy Manager to test Access Requests ("Requests") against
NOTE: Policy Manager ships configured with a number of basic Service types. You can flesh out these Service types, copy them for
use as templates, import other Service types from another implementation (from which you have previously exported them), or
develop new Services from scratch.
l By wrapping a specific set of Policy Components, a Service can coordinate the flow of a request, from
Figure 1: Dell Networking W-ClearPass Policy Manager Flow of Control and Table 1: Policy Manager Service
Components illustrate and describe the basic Policy Manager flow of control and its underlying architecture.
are the highest level element in the Policy Manager policy model. They have two purposes:
available Services to provide robust differentiation of requests by access method, location, or other network
vendor-specific attributes.
authentication, to role and health evaluation, to determination of enforcement parameters for network access.
0511287-01 | Mar 2013 1
Figure 1: Dell Networking W-ClearPass Policy Manager Flow of Control
Table 1:
Policy Manager Service Components
Component Service:
component ratio
A - Authentication Method Zero or more per
service
Description
EAP or non-EAP method for client authentication.
Policy Manager supports four broad classes of authentication
methods:
l EAP, tunneled: PEAP, EAP-FAST, or EAP-TTLS.
l EAP, non-tunneled: EAP-TLS or EAP-MD5.
l Non-EAP, non-tunneled: CHAP, MS-CHAP, PAP, or MAC-
AUTH.
l MAC_AUTH must be used exclusively in a MAC-based
Authentication Service. When the MAC_AUTH method is
selected, Policy Manager: (1) makes internal checks to
verify that the request is indeed a MAC Authentication
request (and not a spoofed request) and (2) makes sure
that the MAC address of the device is present in the
authentication source.
2 Dell Networking W-ClearPass PolicyModel 6.0 | An Introduction