A SERVICE OF

logo

Chapter 7. Network enforcement subsystem implementation 289
Configuring Network Access Profiles
We have now configured all the individual components to be in a position to bring
them together and create the Network Access Profiles, which determine what to
check and what action to take based on the results of those checks. Again, we
have deleted all the pre-configured sample configs to create our own from
scratch.
1. Repeat step 1 on page 271 through to step 18 on page 280 (Figure 7-67).
Figure 7-67 Ready to create Authorization rules
2. Click Add Rule.
3. From the User Group drop-down list, select Any.
4. From the System Posture Token drop-down list, select Healthy.
5. From the Shared RAC drop-down list, select Healthy_L2IP_RAC.