Policy Set Settings
This section describes how to configure rule-based policy sets that include authentication, authorization and exception policies.
Policy Set Configuration Settings
The following table describes the fields in the Policy Sets window, from which you can configure policy sets, including authentication, exception and authorization policies. Choose for network access policies.Choose for device administration policies.
Field Name |
Usage Guidelines |
---|---|
Status |
Choose the status of this policy. It can be one of the following:
|
Policy Set Name |
Enter a unique name for this policy set. |
Conditions |
From a new policy row, click the plus (+) icon or from an existing policy row, click the Edit icon to open the Conditions Studio. |
Description |
Enter a unique description for the policy. |
Allowed Protocols or Server Sequence |
Choose an allowed protocol that you have already created, or click the (+) sign to Create a New Allowed Protocol , to Create a New Radius Sequence, or to Create a TACACS Sequence. |
Conditions |
From a new exceptions row, click the plus (+) icon or from an existing exception row, click the Edit icon to open the Conditions Studio. |
Hits |
Hits are a diagnostic tool indicating the number of times the conditions have matched. Hover over the icon to view when this was last updated, reset to zero and to view the frequency of updates. |
Actions |
Click the cog icon
|
View |
Click the arrow icon to open the Set view of the specific policy set and view its authentication, exception, and authorization sub-policies. |
Authentication Policy Configuration Settings
The following table describes the fields in the Authentication Policy section of the Policy Sets window, from which you can configure authentication subpolicies as part of your policy sets. For network access policies, choose . For device administration policies, choose . From the Policy Sets page, choose
Field Name |
Usage Guidelines |
---|---|
Status |
Choose the status of this policy. It can be one of the following:
|
Rule Name |
Enter a name for this authentication policy. |
Conditions |
From a new policy row, click the plus (+) icon or from an existing policy row, click the Edit icon to open the Conditions Studio. |
Use |
Choose the identity source that you want to use for authentication. You can also choose an identity source sequence if you have configured it. You can edit the default identity source that you want Cisco ISE to use in case none of the identity sources defined in this rule match the request. |
Options |
Define a further course of action for authentication failure, user not found, or process failure events. You can choose one of the following options:
|
Hits |
Hits are a diagnostic tool indicating the number of times the conditions have matched. |
Actions |
Click the cog icon
|
Local and Global Exceptions Configuration Settings
For network access policies, choose Policy Sets window, choose or Global Exceptions Policy.
. For device administration policies, choose . From theAuthorization exception settings are identical to the Authorization policy settings and are as described in Authorization Policy Settings.
Authorization Policy Settings
The following table describes the fields in the Authorization Policy section of the Policy Sets window, from which you can configure authorization policies as part of your policy sets. For network access policies, choose . For device administration policies, choose . From the Policy Sets page, choose .
Field Name |
Usage Guidelines |
---|---|
Status |
Choose the status of this policy. It can be one of the following:
|
Rule Name |
Enter a unique name for this policy. |
Conditions |
From a new policy row, click the plus (+) icon or from an existing policy row, click the Edit icon to open the Conditions Studio. |
Results or Profiles |
Select the relevant authorization profile, which determines the different levels of permissions offered to the configured security group. If you have not yet configured the relevant authorization profile, you can do so inline. |
Results or Security Groups |
Select the relevant security group, which determines the groups of users relevant to the specific rule. If you have not yet configured the relevant security group, you can do so inline. |
Results or Command Sets |
Command sets enforce the specified list of commands that can be executed by a device administrator. When a device administrator issues operational commands on a network device, ISE is queried to determine whether the administrator is authorized to issue these commands. This is also referred to as command authorization. |
Results or Shell Profiles |
TACACS+ shell profiles control the initial login session of the device administrator. |
Hits |
Hits are a diagnostic tool indicating the number of times the conditions have matched. |
Actions |
Click the cog icon
|