Aruba Clearpass Implementation
Aruba Clearpass Implementation
Introduction..................................................................................................................................3
Network Access Control (NAC) Overview................................................................................. 3
Wired Access...........................................................................................................................3
802.1x...................................................................................................................................... 4
MAC Authentication Bypass (MAB)......................................................................................... 9
Wireless................................................................................................................................. 10
Initial Lab Topology................................................................................................................... 11
ClearPass................................................................................................................................... 12
Install..................................................................................................................................... 12
AD Join.................................................................................................................................. 15
Certificate Install.................................................................................................................... 16
Add Devices...........................................................................................................................21
Policy - Wired............................................................................................................................. 23
802.1x Wired..........................................................................................................................23
Create Authentication Source.......................................................................................... 23
Service Construction (802.1x Wired PEAP/MSCHAPv2)................................................ 26
802.1x Wired Device Configs................................................................................................ 28
Cisco IOS-XE...................................................................................................................28
Aruba OS-CX................................................................................................................... 30
Supplicant Configuration..................................................................................................31
ClearPass Verification......................................................................................................34
2
Aruba Clearpass -Brett Koelling 2024
Introduction
The following document explores a Clearpass policy manager deployment. The demonstration
environment utilizes Aruba and Cisco networking equipment. Primary employee and guest role
authentication will be demonstrated across various access mediums. The document will contain
both implementation and basic theory surrounding essential concepts.
Wired Access
In an unrestricted environment, as long as the supporting infrastructure is in place the device
has no issue gaining access to the network and its associated resources.
Through various iterations, network administrators may have made life more complicated for the
end user to roam the network freely. This would be implemented through access control lists,
virtual routing and forwarding (VRF), or topological decisions such as forcing all inter-vlan flows
through a firewall. While all of the abovementioned options successfully provide security and
isolation, they do not scale well without pre-planning. A void was present from a solution and
operation standpoint that would allow rapid change in policy while adapting to network expanse/
user demand. A network access server (Clearpass, NPS, Cisco ISE) provides a centralized
point where access is granted or denied.
4
Aruba Clearpass -Brett Koelling 2024
802.1x
The IEEE 802.1x standard enables port-based authentication. Within this protocol flow, there
are two distinct domains. The first is the communication between the end-user device and the
switch. A specific protocol known as Extensible Authentication Protocol Over LAN (EAPOL) is
used within this network segment. This protocol is used to share login information and enables a
challenge method. Devices receive specific labels when speaking in terms of 802.1x. The end
device in this example will be the supplicant, while the switch will be called the authenticator.
This communication will enable the initiation of an authentication flow to be sent toward the
server. Once the authentication flow reaches an accept or deny decision, the switch can take
action at the port level to provide the appropriate access the server determines. The next
segment of communication happens between the switch and the server. This communication
will utilize the Remote Authentication Dial-In User Service (RADIUS) protocol. Remembering the
distinction between the two is essential, as the EAPOL protocol will not traverse beyond the
single segment leading toward the end host. The EAP information is simply placed within a
RADIUS packet, which is the communication the server can decipher and act upon.
5
Aruba Clearpass -Brett Koelling 2024
Wireshark captures add further examples to the segmentation of protocol use. From the client
side, EAP can be observed initiating the flow and receiving the particular identity from the end
device.
EAP Transaction
Meanwhile, communication between the switch and Clearpass server strictly utilizes the
RADIUS protocol.
RADIUS Transaction
The RADIUS protocol shares many details that will be utilized during the authentication process.
A wealth of information can be observed by delving further into the Access-Request packet.
6
Aruba Clearpass -Brett Koelling 2024
These values are known as Attribute Value Pairs (AVP). They can be leveraged for
authentication needs, grouping requests, or calling specific details and forcing requests to
authenticate against particular rulesets. Skipping ahead and for the sake of understanding the
entire picture, the request can be seen on the Clearpass server with these same values present.
Jumping back to the switch and end client communication, the switch port must remain
restricted until the client correctly authenticates. This is a benefit of EAPOL, as the switch can
deny all protocols except EAP until a decision is returned. The end client does not need an IP
address to perform authentication, which alleviates the need for some artisanal access lists.
Upon completion of authentication, the switch can deploy a specific policy, and the end device
can begin communicating with necessary services (DNS, DHCP). This simple protocol pairing
eliminates the unprotected access environment and restricts all ports until the client is granted
to the network. While this section focuses on the wired component, the wireless medium
operates similarly.
The diagram above displays a rudimentary flow. Clearpass configuration sections will discuss
the many layers of details found within the flow decision depicted above. 802.1x relies on client
understanding of the 802.1x behavior. This service must be activated in Windows and will be
used for the demonstrations in this document.
The Wired AutoConfig service allows the use of 802.1x. The client must specify which
credentials to send and the method of how to send them. After activating the service, the
specific authentication details can be found in the particular interface settings.
The options are overwhelming, but only two main options are commonly deployed. One is
MSCHAPv2, a simple password-based protocol that utilizes specific hashes to verify a user. The
other is certificates, which allow for mutual client and server authentication. Some challenges
arise with this deployment option revolving around certificate dispersal, but thankfully, both
Windows and ClearPass have options to alleviate this hurdle.
9
Aruba Clearpass -Brett Koelling 2024
The end devices are unaware of authentication; they simply communicate as programmed.
Upon receiving traffic, the MAB-enabled port inspects the MAC and uses it as the username in
the RADIUS packet sent to ClearPass.
ClearPass will receive this access request and make an informed decision based on the
configured policy.
10
Aruba Clearpass -Brett Koelling 2024
MAB allows organizations to secure any device that communicates via MAC. This provides a
solution for securing more challenging domains such as IoT and large manufacturing
environments. MAB also offers a simple solution for office printers, scanners, and whatever else
802.1x can not operate on.
Wireless
The process within the wireless medium is similar. The difference usually becomes apparent
depending on the specific deployment and wireless vendor. Also, controller-based and
controlerless deployments each enable their unique requirements. The refreshing news is that
the wireless medium does not warrant a separate discussion regarding the authentication
theory. The topics previously discussed will be applicable.
11
Aruba Clearpass -Brett Koelling 2024
Moving forward with the lab details, the initial lab will encompass a multi-vendor environment
with Wireless and Wired solutions from Aruba and Cisco. This will demonstrate the use of
varying products and simulate a realistic transition phase that may be found in the real world.
Each device will be examined as it is configured within Clearpass. This should allow an easier
workflow instead of scrolling up and down the document. Basic IP addressing will be mentioned,
but it will be a minor focus of the lab.
12
Aruba Clearpass -Brett Koelling 2024
ClearPass
ClearPass is Aruba’s offering to fill the void of network access security. Clearpass and Cisco’s
ISE are usually the first to be mentioned in most discussions revolving around NAC. Clearpass
can be deployed via hardware appliance or OVA. This lab will utilize the virtual deployment.
**Access to the HPE Networking Support Portal will be necessary to replicate the scenarios in
this lab.
Install
Upon deploying the OVA, an input must be selected to specify the deployment type.
The simple LAB variant is used in this demonstration, and the required specs are listed in the
below:
CPU = 4
Memory = 6GB
Disk = 400GB
The installation will begin, and a login prompt will eventually appear on the console.
User: appadmin
Password: eTIPS123
Upon login, the user will be dropped off in the guided walkthrough for IP addressing and system
details. All of these settings are very straightforward. A single management interface can be
used for all ClearPass needs. If you must separate management and data, a second interface is
included.
Configuration summary
With the guided setup completed, the Web GUI should be active and ready for login.
14
Aruba Clearpass -Brett Koelling 2024
A successful login will display ClearPass's main dashboard. The first item to examine from the
main page is the server settings under the administration tab. Changes can be made to that
initial server deployment from this configuration page.
If the initial settings need no changes, the next step is to join the ClearPass server to a
Windows Active Directory Domain.
15
Aruba Clearpass -Brett Koelling 2024
AD Join
In the lab, Windows Server 2022 is enabled with DNS, Active Directory, and Certificate Authority
features. Some basic Windows config will be examined, but it is recommended that you seek
purpose-written tutorials on how to get that infrastructure piece up and running.
The correct DNS server must be specified, as ClearPass must resolve the domain controller in
this step. The account used will need adequate permissions to allow the ClearPass server to
join the domain as a compute object. The ClearPass Policy Manager (CPPM) should appear in
the AD Computers folder after a successful join.
16
Aruba Clearpass -Brett Koelling 2024
With the ClearPass server being domain joined, the next step involves adding the correct
certificates to the onboard trust list and generating certificate signing requests for the
appropriate services.
Certificate Install
ClearPass must either act as the cert authority or utilize an established certificate authority to
allow certificate-based authentication. In this example, the Windows certificate authority will be
used. The first order of operations is to add the Windows root certificate to the trust list within
ClearPass.
17
Aruba Clearpass -Brett Koelling 2024
The root certificate can be downloaded from the certsrv web page (http://X.X.X/certsrv/) using a
Windows certificate authority with web enrollment.
18
Aruba Clearpass -Brett Koelling 2024
After retrieving the certificate, it can be uploaded to the ClearPass trust list.
The usage selection will specify what operations this cert can be utilized for. In this simple
deployment of one node, we will only concern ourselves with EAP, Aruba Services, and Others.
Once the root certificate is in place, a certificate signing request can be generated to create
specific certs for the ClearPass operation. These operations will be handled via the Certificate
store.
19
Aruba Clearpass -Brett Koelling 2024
Certificate signing requests can be generated from this configuration menu. I have added
easy-to-identify names to the certificate for demonstration purposes.
Submitting the CSR generates the appropriate request, which can be saved as a file or copied
to the clipboard.
20
Aruba Clearpass -Brett Koelling 2024
Again, if you are using Windows as a Certificate Authority, you can paste this into the web enroll
menu to generate the proper certificate signed by the enterprise root.
With the CSR processed, the Server certificate can be uploaded to ClearPass with the proper
usage specified. For example, I created an RSA and ECC server CSR and generated the cert
through the Windows CA. After uploading the certificate to ClearPass, a logout is required to
see the change reflected.
The ClearPass WebPage now utilizes the enterprise root-signed certificate. This is a
rinse-and-repeat process for the Radius Service. The reason for separate certs comes down to
flexibility. When handing out user-specific certifications within the enterprise, you usually want to
avoid paying the premium to have those publicly signed. On your guest and onboard portal, you
will want a recognized certificate so you will not be inundated with “security warning” tickets.
Add Devices
The final step before actual policy construction is to add the network devices that will use
ClearPass to authenticate. The addition requires the correct IP, vendor, and shared secret
information. If a device is not specified and attempts to utilize ClearPass, the request will be
ignored, and an accompanying event log will be registered.
22
Aruba Clearpass -Brett Koelling 2024
The network configuration menu will be utilized to add the appropriate device.
Clearpass has various vendor profiles available. All of the devices under investigation in this lab
are already included.
23
Aruba Clearpass -Brett Koelling 2024
Enabling Dynamic Auth on all the added devices did not cause any issues within the lab. This
feature is common with network devices and is integral to certain authentication steps. All
devices and controllers will need to be added. Special considerations will be investigated as
more device demonstrations occur.
Policy - Wired
Once the essential prerequisites are completed, the first policy can be investigated. The
demonstration will start with a basic MSCHAPv2 802.1x Wired authentication and then proceed
to various combinations of methods.
802.1x Wired
802.1x Wired behavior is predictable and has fewer surprises than the wireless realm. A basic
802.1x policy will be constructed for the first demonstration, allowing user-based authentication
via Windows 802.1x supplicant.
The following screenshots will display the various tabs and information needed to add the Active
Directory authentication source.
25
Aruba Clearpass -Brett Koelling 2024
The attributes page can be left as-is. Confirm the correct information on the summary page and
save the configuration. The Active Directory source should now be ready to use. It is important
to reiterate that this is a lab. Do not join with THE domain admin account and scope down the
user groups as much as possible in a production environment.
Add a service and specify the prepackaged template of 802.1x Wired. Add a service description
from this page and identify the qualifying match parameters. The default values used will work
for this first demonstration.
27
Aruba Clearpass -Brett Koelling 2024
In the next tab, Authentication, the method of MSCHAPv2 and the AD source will be specified.
The role and enforcement policy can be the default for this specific example. We will explore
both of these configurations later.
28
Aruba Clearpass -Brett Koelling 2024
Service Summary
With the service in place, the network device configuration must be examined to allow
ClearPass to be used as the chosen authentication server.
Cisco IOS-XE
The following are the minimum steps to ensure reliable authentication from a Cisco IOS-XE
device.
Interface Configuration
interface GigabitEthernet1/0/23
description DOT1x_DEMO
switchport access vlan 909
switchport mode access
authentication host-mode multi-host
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
authentication periodic
authentication violation replace
mab
dot1x pae authenticator
end
Verification Commands
show aaa servers
test aaa group radius username password new-code
show run aaa
30
Aruba Clearpass -Brett Koelling 2024
Aruba OS-CX
The following are the minimum steps to ensure reliable authentication from an Aruba OS-CX
device.
Enable dot1x
aaa authentication port-access dot1x authenticator enable
31
Aruba Clearpass -Brett Koelling 2024
Enable MAB
aaa authentication port-access mac-auth enable
Interface Configuration
interface 1/1/1
description 1x_PORT
no shutdown
no routing
vlan access 1000
aaa authentication port-access client-limit 3
aaa authentication port-access dot1x authenticator
cached-reauth
cached-reauth-period 60
max-eapol-requests 1
max-retries 1
quiet-period 5
discovery-period 10
enable
Verification commands
show aaa authentication port-access dot1x authenticator interface 1/1/1
client-status
Supplicant Configuration
With ClearPass and the device configured, the Windows supplicant must apply the correct
configuration to supply the correct details.
32
Aruba Clearpass -Brett Koelling 2024
Authentication General
33
Aruba Clearpass -Brett Koelling 2024
Settings Menu
34
Aruba Clearpass -Brett Koelling 2024
Additional Settings
ClearPass Verification
The authentication flow can begin with the network device and the client configured. A
ClearPass log detailing the authentication details will be generated if all is well.
The Aruba access tracker will detail the services used and the attributes received.
As more complex policies are created, the Tracker will become one of the most visited areas. A
solid understanding of the RADIUS flows and how the attributes are being inspected will aid in
navigating failures.
Authentication Summary
36
Aruba Clearpass -Brett Koelling 2024
This concludes the simple 802.1x demonstration. In the next iteration, Certificates will be added
to the mix. Any network device configuration placed for the wired side will be left as is with no
need for alteration as we investigate more involved methods.
Windows Settings
In the initial demonstration, the Windows group policy will auto-enroll the users to receive a
certificate from the domain CA. The certificate can be viewed from the Microsoft management
center (Win+R mmc).
37
Aruba Clearpass -Brett Koelling 2024
Continuing with the Windows configuration, the authentication setting under the specific
interface must be altered.
Navigate to the settings page after selecting the certificate option on the drop-down menu.
Verify the server identity on this page, and specify the root certificate to verify with.
With those quick changes, the Windows client can participate in certificate-based authentication.
39
Aruba Clearpass -Brett Koelling 2024
ClearPass Policy
A new service will be created to keep things clean and manageable. The construction is similar
to the previous example, with some minor changes.
Some new options will be utilized on the authentication page. EAP-TLS will be the method used,
and the certificate to be used for this service will be specified (previously uploaded via CSR).
Everything else can be left as default, and the policy can be saved. The Auth flow should now
succeed. The EAP-TLS method has been utilized, and certificate details can now be viewed in
the computed attributes from the input details.
Authentication method
A new authentication method must be created with the certificate comparison field populated. In
this demonstration, the distinguished name will be reviewed.
42
Aruba Clearpass -Brett Koelling 2024
The newly created method must now be specified in the EAP-TLS service. Once that change
has been confirmed, a new authentication attempt can be made and should be successful.
With minor changes, additional security can be added to the 802.1x flow. This method ensures
that both the username sent and the certificate match, validating the fact that this request came
from the source specified.
Profiling Configuration
In the simple deployment, all that is needed to enable profiling is a DHCP helper command on
the VLAN interface where you wish to perform MAB.
interface Vlan909
description AUTH_DEMO
ip address 10.90.9.1 255.255.255.0
ip helper-address 100.64.100.129
ip ospf 100 area 0
end
44
Aruba Clearpass -Brett Koelling 2024
When the switch receives a DHCP request on the specific VLAN, it replicates the request and
sends it to ClearPass. ClearPass can then extract the critical information needed. After
completing the DHCP process, ClearPass displays further information about the connected
host.
You can see the profiling information on the right-hand pane when selecting the endpoint. This
can be adjusted as needed if a device is wrongly profiled. This simple configuration eases the
burden of adequately tracking MAB-based clients.
45
Aruba Clearpass -Brett Koelling 2024
For this example, the roles and enforcement settings can be left as is. The final change must be
made under the profiler tab.
Profiler Settings
47
Aruba Clearpass -Brett Koelling 2024
The settings above indicate that all profiled devices trigger a RADIUS CoA to bounce the port.
This will cause the user to reauthenticate, which can be assessed based on the profiler values.
A MAB flow can be observed with the configuration displayed thus far in place.
Access Tracker
The first step is to create the roles. The initial role configuration is simply an identifier.
Role configuration
A role that specifies the name of PROFILED_COMPUTER will be created, which will be called
in a mapping policy.
Computer role
A default role will also be created to aid in understanding the mapping process.
49
Aruba Clearpass -Brett Koelling 2024
Default Role
The created roles will then be called in a mapping policy. The Mapping configuration page is
found within the same ClearPass menu.
A simple name will be given, and the previously created default role will be used for this role.
The default role is applied if no mappings are made. Think of this as an implicit role at the end of
the map.
The following mapping rules are used to inspect the endpoint repository. If an endpoint has been
profiled as a computer, it assigns the role of PROFILED_COMPUTE. The rule can be saved
along with the mapping. An Enforcement policy will utilize the role maps to assign an action
based on role. The first component will be the enforcement profile.
Profiles can perform numerous actions within Clearpass and the network, such as assigning
ACLs and VLANs. A computer will be placed into the correct compute VLAN in this example.
51
Aruba Clearpass -Brett Koelling 2024
Profile Settings
ClearPass includes preconfigured profile templates, saving time as they already have the
correct RADIUS parameters to be sent. On the next page, we only need to update the VLAN
number to be used.
VLAN Enforcement
The profile can then be saved. Next, navigate through the same sub-menu and create the
enforcement policy.
52
Aruba Clearpass -Brett Koelling 2024
The previously configured components will be specified within the Rules page. This flow states
that if the PROFILED_COMPUTER role is assigned, the RADIUS action will be triggered to
place the user in the compute VLAN.
Enforcement Rules
With the Enforcement policy caved, these configured policies can now be called in the MAC
authentication policy.
53
Aruba Clearpass -Brett Koelling 2024
The policy can be saved, and the auth flow can commence. During the initial authentication, the
device is not yet profiled and will receive the default role. This will allow the device to request a
DHCP address, and ClearPass will receive that mirrored information and be able to profile the
device.
Once the device is profiled, the service is set to send a RADIUS AVP to bounce the port. When
the port recovers, the device will begin its authentication flow again. The second authentication
displays the configured role, and a Wireshark verification shows the correct VLAN ID sent via
the RADIUS packet.
At this point in the lab, an unknown device can authenticate via MAC address and undergo
profiling, and then the ClearPass policy can act upon those collected attributes.
Policy - Wireless
The wireless medium will utilize near-identical policies to authenticate users and enforce policy
within ClearPass. The one significant addition in this section will be Guest authentication. I have
excluded guest authentication from the wired sections because I consider that a corner case in
2024. The first method to be explored for uniformity will be simple 802.1x with a username.
802.1x Wireless
Basic Service Construction
The initial wireless service will mirror the initial wired configuration and verify based on the
username sent in the RADIUS message against the Active Directory source. The basic service
construction will look for wireless-based authentication from a specific SSID.
The Authentication method can allow various profiles as long as the source is AD. In the future,
the methods will be scoped down for certificate-based authentication.
The role and enforcement section can be left blank in the default state for this initial
demonstration. With the policy in place, an authentication can now be attempted via a wireless
access point. This specific attempt will be made from the IOS-XE WLC.
57
Aruba Clearpass -Brett Koelling 2024
All previous configurations can remain once the services have been updated to reflect the
changes above.
Enterprise environment, this configuration can be pushed via GPO and be transparent to end
users.
Specify SSID
With the demonstrated settings in place, the Windows device can now utilize the certificate
received from the domain controller for authentication.
63
Aruba Clearpass -Brett Koelling 2024
Aruba Instant AP
The following are the minimum steps to ensure reliable authentication from an Aruba Instant AP.
The next page presents many options, the most important being the first three. Here, you can
specify the ClearPass server, which will take you to another menu to create a new server
instance.
64
Aruba Clearpass -Brett Koelling 2024
Server Settings
The final page allows access rules to be assigned and the option to download roles. For this
example, this will be left in the default configuration.
65
Aruba Clearpass -Brett Koelling 2024
This configuration will allow basic authentication over the Aruba Wireless infrastructure.
To add a RADIUS server to the Cisco AireOS WLC, you will first navigate to the security tab.
Use the “new” button on the top right of the page.
The basic details of your specific deployment of ClearPass will then need to be entered.
66
Aruba Clearpass -Brett Koelling 2024
The settings demonstrated are the necessary configurations for Cisco AireOS controllers.
To add a RADIUS server in newer Cisco IOS-XE WLCs navigate to the following section.
The details for your specific instance of ClearPass will then be provided.
You can add the radius server group from this page and specify the type as dot1x.
69
Aruba Clearpass -Brett Koelling 2024
With these parameters in place, the AAA config can be called in a WLAN configuration.
This concludes the necessary configuration for ClearPass when utilizing a Cisco IOS-XE WLC.
70
Aruba Clearpass -Brett Koelling 2024
Meraki AP
The Meraki AP setup is one of the most straightforward when bringing in a RADIUS server. All
the needed configurations are conducted on a single page upon creating a new SSID.
The first is to specify the correct security settings to allow 802.1x.
The RADIUS server will then need to be specified. When using ClearPass, you should utilize
the Aruba-Role specification.
71
Aruba Clearpass -Brett Koelling 2024
The first configuration point will be the standalone access point or controller. An SSID will need
to be configured to allow for MAC authentication. The specific configuration will depend on the
vendor. The AP will then pass the MAC address as the RADIUS username to the ClearPass
server. A configured service will handle the MAC authentication attempt. If the user has not
previously authenticated or their account has expired, a role will be assigned that triggers a
RADIUS flow. The specific flow for new/expired users will forward an ACL/VLAN with an
accompanying redirect URL. The AP will then redirect all client traffic attempts to the URL,
forcing the user to complete the necessary steps to log in to the network.
Once the user has completed the necessary actions prompted by the web authentication page,
specific attributes will be assigned to the MAC address. ClearPass will then send some
reauthentication method, forcing the client to be assessed again. ClearPass will now possess
additional details, allowing the policy to be evaluated based on said values.
73
Aruba Clearpass -Brett Koelling 2024
As shown above, the guest user can now authenticate, and ClearPass will discover the
additional roles and determine access. The web authentication flow allows an unknown
endpoint to access a network and be assessed to determine access without administrator
intervention. This process also enables some user tracking.
Wizard Flow
Wizard needed
The Guest Authentication with MAC Caching wizard will initially create most of the necessary
objects. When naming the objects, the wizard allows the input of a prefix. A recognizable
naming prefix will make life much easier down the road.
The SSID to be used for web authentication is a required value. For the time being, this can be
an arbitrary value, as changing it is very straightforward within the service.
74
Aruba Clearpass -Brett Koelling 2024
Specify SSID
The following options pertain to the access duration for the predetermined roles. This is entirely
determined by user preference/need. Once the account has expired, the end user will be
required to complete the web authentication process again to gain access to the network.
The final configuration page will determine the enforcement type. This deployment will use
Aruba roles to steer clients to specific flows. The Captive Portal Access field specifies which role
will be directed to the captive portal. This will become easier to grasp as implementation
progresses. The number of devices per user and the assigned roles for the specific user groups
are also specified. These are kept the same for simplicity in the demo, as ClearPass already
defines these values.
Access configuration
75
Aruba Clearpass -Brett Koelling 2024
Once complete, the wizard will create various role mappings, enforcement profiles, policies, and
two new services. These services will be labeled MAC Authentication and User Authentication
with MAC Caching. These policies will work out of the box for an Aruba deployment, but in this
demonstration, we will utilize a Cisco 9800 controller, which requires additional configuration.
This additional configuration will aid in policy exploration and understanding.
The specified match conditions need to match the Cisco RADIUS value rather than the Aruba.
This value will be as follows:
The following changes will be the redirect URL presented to the AP. Again, this will need to be a
Cisco-specific format. The redirect is triggered via the enforcement settings.
url-redirect-acl=REDIRECT
url-redirect=https://100.64.100.129/guest/guest_register.php?cmd-login&mac=%{Connection:Client-Mac-
Address-Hyphen}&switchip=%{Radius:IETF:NAS-IP-Address}
The policy can now be saved with the changes made, and the correct information will be sent to
the wireless controller upon authentication. A test can be conducted to verify the configuration
so far. Upon connecting to the configured SSID, users will be sent to the Aruba guest
registration page. From this page, a user can input their name and email address, which can
then be placed in a queue for activation via an administrator. In this example, the guest user can
register without any admin activation.
77
Aruba Clearpass -Brett Koelling 2024
Upon accepting the terms of use and registering, the user is pushed to the next page, where
they can log in via a single button. The authentication method for this still needs to be
configured but will be covered next.
Error in login
To remedy the log-in issue, a service must be created for Web Authentication to reference a
specified repository. In this instance, the guest user repository will be utilized.
The most involved configuration will be creating a new enforcement policy. The enforcement
policy will execute various actions upon successful login with credentials found in the guest
repository.
78
Aruba Clearpass -Brett Koelling 2024
WebAuth Policy
Many objects created in the initial Wizard will be called in the actions. These will impose a
device limit, bandwidth limit, MAC expiration, etc. One of the most important is the
CP_MAC-CAHCE Guest MAC Caching action. This will give the user the tag to be allowed on
the network. Finally, a Cisco AVP for session reauthentication is sent to force the user to
reauthenticate. If the user successfully registers and logs in, additional tags will be present, and
network access will be allowed.
Guest Menu
79
Aruba Clearpass -Brett Koelling 2024
From the guest menu, our focus will be on the configuration of the self-registration page.
Select Edit
80
Aruba Clearpass -Brett Koelling 2024
Advanced editor
Some parameters will be changed in the Advanced editor to allow the web page to be used with
the Cisco controller. First, the vendor selection must match your implementation; then, we will
use a CoA to force the reauthentication.
Pre-Auth checks allow additional messages to inform the user of a login error, which this
example will not use.
Login Delay
Login Verification
With those settings in place, a login should now be possible. After clicking login, a 10-second
delay is initiated.
On the back end, ClearPass is sending the CoA from the Web Authentication service.
This forces the client (Wireless Controller) to reauthenticate the session. Upon this re-auth, the
correct attributes are placed in Clearpass, and the user can access the network.
For one final flow investigation, the diagram below will display what happens during Web
authentication.
AD Addition to source
The enforcement policy for users authenticating via AD will have most of the same policies
found in the Guest flow, with one attribute added. In our example, an arbitrary attribute value will
be used.
84
Aruba Clearpass -Brett Koelling 2024
When a user authenticates via the WebAuth service, the employee role is assigned if the Active
Directory identity is used.
AD Employee Role
AD Tag enforcement
The final action of the enforcement policy caused the device to re-authenticate. When the
device is evaluated, it now possesses the AD compute tag, which is then utilized to assign the
MAC Cache and Employee role, allowing network access.
86
Aruba Clearpass -Brett Koelling 2024
The user will now be allowed access while still following the expiration rules.
Aire-OS
Throughout the lab progression, I updated my Cisco AP to the 17.x software train to join the
9800. This Aire-OS demonstration will be untested but demonstrated/
87
Aruba Clearpass -Brett Koelling 2024
Meraki
The Meraki configuration is relatively straightforward.
89
Aruba Clearpass -Brett Koelling 2024
90
Aruba Clearpass -Brett Koelling 2024
In the Group Policy section, you specify the roles assigned via ClearPass. From here, you can
specify Layer 7 and Layer 3 firewall entries that will be placed when a user with that role
accesses the network.
Aruba IAP
The Aruba IAP setup provides improved configuration flow as ClearPass and Instant access
points “speak the same language”. The initial steps are straightforward and then role
assignments will be utilized to force users to the captive portal.
91
Aruba Clearpass -Brett Koelling 2024
Create SSID
Security setting to specify an External splash page and the associated CPPM profile
93
Aruba Clearpass -Brett Koelling 2024
The URL will be the exact string used in the Cisco redirect, with the slight quirk that the base IP
is specified in a separate box.
/guest/guest_register.php?cmd-login&mac=%{Connection:Client-Mac-Address-Hyphen}&switchi
p=%{Radius:IETF:NAS-IP-Address}
94
Aruba Clearpass -Brett Koelling 2024
Role assignment
The role assignment rule acts just like the ClearPass policy. Requests will be sent to the
ClearPass policy manager, which returns a role. The role matches an existing role on the Instant
Virtual controller, and the proper action is taken based on that role.
If Endpoint unknown:
Role = PORTAL
If Endpoint in repo:
Role = GUEST
GUEST = Full Access
PORTAL role
GUEST role
The configured redirect in CPPM sends the role of PORTAL, which then enforces the captive
portal via the instant controller.
CPPM redirect
The user will then go through the Web Authentication Process and be assigned the Guest role.
CPPM will then send the RADIUS message containing the User Role.
The IAP controller will receive this and grant the user full access. The role policy can be tailored
to any specific access need and remain straightforward in its implementation.
Summary
This document lays the groundwork for complex policy. Various devices were explored to
demonstrate ClearPasses' flexibility as a chosen access server. Secure network access is
commonplace in today's environments, and many NAC deployments have been in place for
many years. Transitioning or rebuilding a new solution can be a huge undertaking. Hopefully, lab
environments and simple guides like this can help ease the burden. Thank you for reading!