Implementing Policy

To implement policy:
  • Identify the roles of users and devices in your organization that access the network.
  • Create a policy role for each identified user role.
  • Associate classification rules and administrative profiles with each policy role.
  • Optionally, configure a class of service and associate it directly with the policy role or through a classification rule.
  • Optionally, enable hybrid authentication, which allows RADIUS filter-ID and tunnel attributes to be used to dynamically assign policy roles and VLANs to authenticating users.
  • Optionally, set device response to invalid policy.