Implementing Policy
To implement policy:
- Identify the roles of users and devices in your organization that access
the network.
- Create a policy role for each identified user role.
- Associate classification rules and administrative profiles with each
policy role.
- Optionally, configure a class of service and associate it directly with
the policy role or through a classification rule.
- Optionally, enable hybrid authentication, which allows RADIUS (Remote Authentication Dial In User Service) filter-ID and tunnel attributes to be used to
dynamically assign policy roles and VLANs to authenticating
users.
- Optionally, set device response to invalid policy.
- Optionally, set captive portal to use HTTP redirection to force a
client‘s web browser to be redirected to a particular administrative
web page for authentication purposes (user login and password),
payment (for example, at an airport hotspot), or use-policy
enforcement (installing necessary software, agreeing to terms of
service (TOS), etc.).