Implementing Policy

To implement policy:
  • Identify the roles of users and devices in your organization that access the network.
  • Create a policy role for each identified user role.
  • Associate classification rules and administrative profiles with each policy role.
  • Optionally, configure a class of service and associate it directly with the policy role or through a classification rule.
  • Optionally, enable hybrid authentication, which allows RADIUS (Remote Authentication Dial In User Service) filter-ID and tunnel attributes to be used to dynamically assign policy roles and VLANs to authenticating users.
  • Optionally, set device response to invalid policy.
  • Optionally, set captive portal to use HTTP redirection to force a client‘s web browser to be redirected to a particular administrative web page for authentication purposes (user login and password), payment (for example, at an airport hotspot), or use-policy enforcement (installing necessary software, agreeing to terms of service (TOS), etc.).