Rule-based compliance policies
Rule-based compliance enables you to create custom configuration rules and policies that Catalyst Center periodically evaluates across your network to detect any violations. Platform-specific compliance policy rules can use string comparisons, regular expressions, and expression evaluations. These apply to configurations, CLI show commands, and device properties. Each rule can have variables, multiple conditions, and configurable violation messages, along with the severity level of the violation.
For example you can configure policies that:
-
Ensure that ACL logging is off.
-
Ensure that Telnet is disabled in the network.
-
Ensure that the login authentication uses an external AAA server.
-
Configure a minimum number of RADIUS servers.
-
Configure the DHCP lease time for a specific number of days.
-
Check that a console connection is allowed.
-
Enable tracking of failed login attempts.
-
Verify the password policy.
Scale Considerations
Rule-Based Compliance must provide flexibility in defining policies, rules, and conditions. However it should also have limits to prevent overload.
These limits are recommended at both the system and per-device levels.
|
Category |
System Limit |
Individual Limits |
|---|---|---|
|
Policies |
500 |
|
|
Rules |
5000 |
One policy: Up to 20 rules |
|
Variables |
12,500 (50% of rules use variables, avg. 5 per rule) |
One rule: Up to 10 variables |
|
Conditions |
25,000 (avg., 5 conditions per rule |
One rule: Up to 10 conditions |

Feedback