- Determine which device(s) will be used to support a specific Network Access Policy.
- Configure the device(s) with the VLAN or Interface ID information for the Network Access Policy.
- Create a device group and add the device(s) for each set of devices that will be used for Network Access Policies. For example, you might have a group of devices that provide network access in Building A. That group of devices will provide different types of access than the devices in Building B, therefore you would create two separate device groups. See Groups view for information on groups.
If only some ports on a device or devices will be used for Network Access Policies, you can place just the required ports in a Port group specifically for use in Network Access Policies. First, determine which ports will participate in Network Access Policies and place those ports in the Role Based Access Group. Ports that are not in this group cannot apply policies. Once ports are in the Role Based Access group, place them in groups that will be associated with specific User/Host Profiles and Network Access Policies. See Groups view for information on groups.
Ports that are designated as connection locations for Network Access Policies are typically included in the Role Based Access Group. If a port is used in a policy but is not included in the Role Based Access Group, devices connecting to that port are placed in the default VLAN entered on the Model Configuration window for that device. They are not placed on the VLAN defined for the Network Access Policy.
- Determine which hosts or users will receive which network access. Create User/Host Profiles that would match each set of Users or Hosts that require different treatment. For example, if you want your Executives on VLAN 10 and you Admin Staff on VLAN 20 you must create a User/Host Profile for each set of users. See User/host profiles.
- Create a Network Access Configuration for each VLAN, CLI Configuration or VPN Group Policy that you wish to assign to connecting hosts. See Network access configurations.
- Create your Network Access Policies by mapping a User/Host Profile to a Network Access Configuration. See Network access policies.