Designing Access Controls

Finalize Security Policies

Table 3-88. Resources Allowed in Access Profiles

Access Profile

VLAN ID

Resources

Rate Limit

QoS

Access Policy Group Rules. After you have created the access profiles, you can create access policy group rules, which match users in the group to the profile according to other inputs.

1.Normal access rights—You might set up one rule in each group for what you define as “normal” access conditions for the user—in other words, the conditions that must be met for the user to receive all of his or her rights. These conditions might be normal work hours or any hours, switch ports in the user’s department or any location, and a WLAN with WPA/ WPA2 encryption. In a network that enforces endpoint integrity, the EI posture should be Pass. After defining these conditions as inputs, you select the access profile you created for the access policy group.

2.Limited access rights—You might then set up other rules in each group for limited access under other conditions. For example, if you have created an after hours access profile, you can create a rule that matches the evening hours with that profile. Or if your network has an unsecured WLAN, you could create a rule that matches that WLAN with an “unencrypted_wireless” access profile.

3-115

Page 231
Image 231
HP Access Control Client Software manual Resources Allowed in Access Profiles, Resources Rate Limit QoS