ClearPass Policy Manager 6.5 User Guide


Add to my manuals
690 Pages

advertisement

ClearPass Policy Manager 6.5 User Guide | Manualzz

ClearPass Policy

Manager 6.5

Copyright Information

© Copyright 2015 Hewlett Packard Enterprise Development LP

Open Source Code

This product includes code licensed under the GNU General Public License, the GNU Lesser General Public

License, and/or certain other open source licenses. A complete machine-readable copy of the source code corresponding to such code is available upon request. This offer is valid to anyone in receipt of this information and shall expire three years following the date of the final distribution of this product version by Hewlett-

Packard Company. To obtain such source code, send a check or money order in the amount of US $10.00 to:

Hewlett-Packard Company

Attn: General Counsel

3000 Hanover Street

Palo Alto, CA 94304

USA

Please specify the product and version for which you are requesting source code. You may also request a copy of this source code free of charge at: [email protected]

.

October 2015 | 0511731-04 ClearPass Policy Manager | User Guide

About ClearPass Policy Manager

About the ClearPass Access Management System

About This Guide

Getting Started

ClearPass Access Management System Overview

Key Features

Advanced Policy Management

ClearPass Specifications

Accessing Configuration Information

Introduction

Start Here

Services

Authentication and Authorization

Identity

Posture

Enforcement

Network

Policy Simulation

Profile Settings

Importing and Exporting Information

Importing Information Into ClearPass

Exporting Information Into ClearPass

Monitoring

Live Monitoring: Access Tracker

Editing the Access Tracker

Viewing Access Tracker Session Details

Live Monitoring: Accounting

Modifying the Accounting Table

RADIUS Accounting Details

TACACS+ Accounting Details

Live Monitoring: OnGuard Activity

Live Monitoring: Analysis and Trending

Live Monitoring: Endpoint Profiler

Live Monitoring: System Monitor

System Monitor Tab

Process Monitor Tab

ClearPass Policy Manager 6.5 | User Guide

Contents

17

17

28

29

29

26

26

26

24

24

25

25

25

26

26

27

27

27

18

19

20

17

17

18

46

48

54

30

31

38

38

39

55

56

57

57

Contents | 3

4 | Contents

Network Tab

ClearPass Tab

Audit Viewer

Event Viewer

Creating an Event Viewer Report Using Default Values

Creating an Event Viewer Report Using Custom Values

Viewing Report Details

Data Filters

Adding a Filter

Blacklisted Users

Services

Services Architecture and Flow

Creating Service Templates

Service Templates Provided

Services Supported for High Capacity Guest Mode

Viewing the List of Services

Viewing Existing Services

Adding and Removing Services

Reordering Services

802.1X Wired, 802.1X Wireless, and Aruba 802.1X Wireless

Aruba VPN Access with Posture Checks

Aruba Auto Sign-On

Certificate/Two-factor Authentication for ClearPass Application Login

ClearPass Admin Access

ClearPass Admin SSO Login (SAML SP Service)

ClearPass Identity Provider (SAML IdP Service)

Device Mac Authentication

EDUROAM Service

Encrypted Wireless Access via 802.1X Public PEAP method

Guest Access Web Login

Guest Access

Guest MAC Authentication

Guest Social Media Authentication

OAuth2 API User Access

Onboard

User Authentication with MAC Caching

Policy Manager Service Types

Aruba 802.1X Wireless

802.1X Wireless

802.1X Wired

MAC Authentication

Web-based Authentication

Web-based Health Check Only

ClearPass Policy Manager 6.5 | User Guide

63

63

63

59

60

61

64

65

66

68

71

71

71

121

122

122

123

124

100

101

103

105

105

107

110

110

93

94

95

98

99

89

91

92

78

80

82

85

87

71

75

76

77

Web-based Open Network Access

802.1X Wireless - Identity Only

802.1X Wired - Identity Only

RADIUS Enforcement (Generic)

RADIUS Proxy

RADIUS Authorization

TACACS+ Enforcement

Aruba Application Authentication

Aruba Application Authorization

Cisco Web Authentication Proxy

Authentication and Authorization

Supported Authentication Methods

Authentication and Authorization Architecture and Flow

Configuring Authentication Components

Adding and Modifying Authentication Methods

Authorize Authentication Method

CHAP and EAP-MD5

EAP-FAST

EAP-GTC

EAP-MSCHAPv2

EAP-PEAP

EAP-PEAP-Public

EAP-PWD

EAP-TLS

EAP-TTLS

MAC-AUTH

MSCHAP

PAP

Adding and Modifying Authentication Sources

Generic LDAP and Active Directory

Generic SQL DB

HTTP

Kerberos

Okta

RADIUS Server

Static Host List

Token Server

Configuring Identity Settings

Configuring Single Sign-On

SAML Service Provider (SP) Configuration

Identity Provider (IdP) Configuration

Managing Local Users

Adding a Local User

ClearPass Policy Manager 6.5 | User Guide

196

198

203

203

203

204

204

205

152

153

155

158

158

159

161

162

135

137

138

139

139

144

146

146

149

175

180

185

188

193

125

126

126

126

127

128

129

129

130

130

133

133

133

Contents | 5

6 | Contents

Modifying a Local User Account

Importing and Exporting Local Users

Setting Password Policy for Local Users

Adding and Modifying Static Host Lists

Adding and Modifying Endpoints

Viewing List of Authentication Endpoints

Viewing Endpoint Authentication Details

Triggering Actions Performed on Endpoints

Updating Device Fingerprints From a Hosted Portal

Manually Adding an Endpoint

Modifying an Endpoint

Configuring a Role and Role Mapping Policy

Identity Roles Architecture and Workflow

Adding and Modifying Roles

Adding and Modifying Role Mapping Policies

Posture

Posture Methods

Posture Architecture and Flow

Configuring Posture Policy Agents and Hosts

NAP Agent

OnGuard Agent (Persistent or Dissolvable)

Configuring Posture Policy Plug-ins

Configuring NAP Agent Plugins

Configuring OnGuard Agent Plugins

Configuring Posture Policy Rules

Configuring Posture for Services

Configuring Posture Servers

Posture Server Tab

Primary Server and Backup Server Tabs

Summary Tab

Configuring Audit Servers

Audit Service Flow Control

Built-In Audit Servers

Custom Audit Servers

Post-Audit Rules

Configuring Enforcement

Configuring Enforcement Policies

Configuring Enforcement Profiles

Agent Enforcement

Aruba Downloadable Role Enforcement

Aruba RADIUS Enforcement

Cisco Downloadable ACL Enforcement

Cisco Web Authentication Enforcement

285

293

297

297

299

301

305

315

317

319

276

278

279

280

281

281

281

282

223

225

226

228

231

232

233

275

211

211

212

214

214

217

217

219

206

207

207

208

210

210

219

223

223

ClearPass Policy Manager 6.5 | User Guide

ClearPass Entity Update Enforcement

CLI Based Enforcement

Filter ID Based Enforcement

Generic Application Enforcement

HTTP Based Enforcement

RADIUS Based Enforcement

RADIUS Change of Authorization (CoA)

Session Notification Enforcement

Session Restrictions Enforcement

SNMP Based Enforcement

TACACS+ Based Enforcement

VLAN Enforcement

Configuring Policy Simulation

Active Directory Authentication Simulation

Adding an Active Directory Simulation

Viewing the Simulation Results

Application Authentication Simulation

Simulation Tab

Attributes Tab

Results tab

Audit Simulation

Results Tab

Chained Simulation

Simulation Tab

Attributes Tab

Results Tab

Enforcement Policy Simulation

Simulation Tab

Attributes tab

Results Tab

RADIUS Authentication Simulation

Adding a RADIUS Authentication Simulation

Setting the Attributes to Be Tested

Viewing the Simulation Results

Role Mapping Simulation

Simulation Tab

Attributes Tab

Results Tab

Service Categorization Simulation

Simulation Tab

Attributes Tab

Results Tab

Import and Export Simulations

ClearPass Policy Manager 6.5 | User Guide

332

334

336

338

339

321

323

325

327

329

330

341

345

345

363

364

364

365

365

356

356

358

360

361

361

362

363

350

350

350

352

352

353

355

355

346

346

347

347

347

348

348

349

Contents | 7

8 | Contents

ClearPass Policy Manager Profile

ClearPass Profile Overview

Introduction

Enabling Endpoint Classification

Configuring CoA for an Endpoint-Connected Device

How Profile Classifies Endpoints

Fingerprint Dictionaries

Viewing Live Endpoint Information for a Specific Device

About the Device Profile

Endpoint Information Collectors

DHCP Collector

ClearPass Onboard Collector

HTTP User-Agent Strings Collector

MAC OUI Collector

ActiveSync Plugin Collector

CPPM OnGuard Agent

SNMP Collector

Subnet Scan Collector

SNMP Configuration for Wired Network Profiling

Network Access Devices

Introduction

Adding and Modifying Devices

Adding a Device

Additional Tasks

Adding and Modifying Device Groups

Adding and Modifying Proxy Targets

Adding a Proxy Target

Administration

ClearPass Portal

Admin Users

Adding an Admin User

Importing and Exporting Admin Users

Setting Password Policy for Admin Users

Admin Privileges

Creating Custom Administrator Privileges

Administrator Privilege XML File Structure

Administrator Privileges and IDs

Sample Administrator Privilege XML File

Server Configuration

Edit Server Configuration Settings

Set Date & Time

Change Cluster Password

Policy Manager Zones

376

377

379

379

379

380

386

386

389

389

391

392

401

402

434

436

437

393

393

394

394

395

396

396

397

400

367

372

372

373

373

373

373

374

374

367

367

367

368

369

370

371

372

ClearPass Policy Manager 6.5 | User Guide

NetEvents Targets

Virtual IP Settings

Clear Machine Authentication Cache

Make Subscriber

Cluster-Wide Parameters

Collect Logs

Backup

Restore

Cleanup

Shutdown/Reboot

Drop Subscriber

Log Configuration

Service Log Configuration

System Level

Local Shared Folders

License Management

Licensing Main Page

Adding an Application License

Activating a Server License

Activating an Application License

Updating a Server License

Updating an Application License

SNMP Trap Receivers

SNMP Trap Receivers Main Page

Adding an SNMP Trap Server

Importing an SNMP Trap Server

Exporting All SNMP Trap Servers

Exporting an SNMP Trap Server

Deleting an SNMP Trap Server

Syslog Targets

Syslog Targets Main Page

Adding a Syslog Target

Importing a Syslog Target

Exporting All Syslog Target

Exporting a Syslog Target

Deleting a Syslog Target

Syslog Export Filters

Syslog Export Filters Main Page

Adding a Syslog Export Filter

Importing a Syslog Filter

Exporting All Syslog Filter

Exporting a Syslog Filter

Deleting a Syslog Filter

ClearPass Policy Manager 6.5 | User Guide

469

470

470

471

472

472

473

473

463

463

463

464

465

466

467

468

455

456

458

459

460

460

460

462

438

439

440

441

442

454

480

487

488

489

490

474

474

475

476

477

478

478

479

Contents | 9

10 | Contents

Messaging Setup

Endpoint Context Servers

Introduction

Endpoint Context Servers Page

Adding an Endpoint Context Server

Importing an Endpoint Context Server

Exporting All Endpoint Context Servers

Modifying an Endpoint Context Server

Polling an Endpoint Context Server

Deleting an Endpoint Context Server

Configuring Endpoint Context Server Actions

Filtering an Endpoint Context Server Action Report

Configuring Endpoint Context Server Actions

Adding machine-os and host-type Endpoint Attributes

Adding Vendor-Specific Endpoint Context Servers

Adding an AirWatch Endpoint Context Server

Adding an AirWave Endpoint Context Server

Adding an Aruba Activate Endpoint Context Server

Adding a ClearPass Cloud Proxy Endpoint Context Server

Adding a Google Admin Console Endpoint Context Server

Adding a Generic HTTP Endpoint Context Server

Adding a JAMF Endpoint Context Server

Adding a MaaS360 Endpoint Context Server

Adding a MobileIron Endpoint Context Server

Adding a Palo Alto Networks Firewall Endpoint Context Server

Adding a Palo Alto Networks Panorama Endpoint Context Server

Adding an SAP Afaria Endpoint Context Server

Adding an SOTI Endpoint Context Server

Adding a XenMobile Endpoint Context Server

File Backup Servers

Server Certificate

Server Certificate Main Page

Server Certificate Type

Creating a Certificate Signing Request

Creating a Self-Signed Certificate

Exporting a Server Certificate

Importing a Server Certificate

Certificate Trust List

Certificate Trust List Main Page

Adding a Certificate

Viewing a Certificate Detail

Deleting a Certificate

Certificate Revocation Lists

ClearPass Policy Manager 6.5 | User Guide

519

522

524

525

527

529

530

532

507

507

510

511

513

515

517

518

495

496

501

501

501

501

501

505

490

492

492

492

493

494

545

546

546

546

547

533

533

534

536

539

544

544

545

Certificate Revocation Lists Main Page

Adding a Certificate Revocation List

Deleting a Certificate Revocation List

Using ClearPass Dictionaries

RADIUS Dictionary

Import RADIUS Dictionary

Posture Dictionary

TACACS+ Services Dictionary

Fingerprints Dictionary

Dictionary Attributes

Introduction

Adding a Dictionary Attribute

Modifying Dictionary Attributes

Importing Dictionary Attributes

Exporting All Dictionary Attributes

Exporting Selected Dictionary Attributes

Applications Dictionaries

Viewing an Application Dictionary

Deleting an Application Dictionary

OnGuard Settings

OnGuard Settings Main Page

Updating Policy Manager Software

Software Updates Main Page

Install Update Dialog Box

Reinstalling a Patch

Uninstalling a Skin, Translation, or Plugin

Updating Policy Manager Software

Software Updates Main Page

Install Update Dialog Box

Reinstalling a Patch

Uninstalling a Skin, Translation, or Plugin

Contact Support

Remote Assistance

Remote Assistance Process Flow

Adding a Remote Assistance Session

Documentation

Command Line Interface

Cluster Commands cluster drop-subscriber

cluster list cluster make-publisher cluster make-subscriber

cluster reset-database

ClearPass Policy Manager 6.5 | User Guide

574

577

577

577

578

578

578

579

563

564

566

566

566

567

569

570

557

558

558

558

559

559

560

562

570

571

571

571

572

550

552

553

554

554

555

556

556

547

547

548

548

549

550

Contents | 11

12 | Contents

cluster set-cluster-passwd

cluster sync-local-passwd

Configure Commands date

dns fips-mode

hostname ip

ip6 mtu

timezone

Network Commands ip

ip6

nslookup

ping ping6

reset traceroute traceroute6

Service Commands service <action> <service-name>

Show Commands all-timezones date dns

domain fipsmode hostname ip

license

sysinfo timezone version

System Commands apps-access-reset boot-image

cleanup

gen-recovery-key gen-support-key install-license morph-vm

refresh-license

593

593

593

593

594

594

594

594

588

589

589

590

590

590

591

591

582

582

583

583

585

585

585

587

579

580

580

580

581

581

599

599

599

599

600

595

596

596

596

597

597

597

598

ClearPass Policy Manager 6.5 | User Guide

reset-server-certificate

restart shutdown sso-reset

start-rasession status-rasession terminate-rasession update

upgrade

Miscellaneous Commands ad auth ad netjoin

ad netleave ad testjoin alias

backup dump certchain

dump logs dump servercert

exit help krb auth

krb list ldapsearch quit

restore system start-rasession

system terminate-rasession system status-rasession

Rules Editing and Namespaces

Namespaces

Application Namespace

Audit Namespaces

Authentication Namespaces

Authorization Namespaces

Certificate Namespaces

Connection Namespaces

Date Namespaces

Device Namespaces

Endpoint Namespaces

Guest User Namespaces

Host Namespaces

Local User Namespaces

ClearPass Policy Manager 6.5 | User Guide

620

621

621

621

621

615

615

617

618

619

620

612

612

613

613

614

610

610

610

611

611

606

607

607

608

608

609

609

609

602

602

603

605

605

605

606

606

600

601

601

601

602

602

Contents | 13

14 | Contents

Posture Namespaces

RADIUS Namespaces

Tacacs Namespaces

Tips Namespaces

Variables

Operators

SNMP Private MIB, SNMP Traps, System Events, Error Codes

ClearPass SNMP Private MIB

Introduction

System MIB Entries

RADIUS Server MIB Entries

Policy Server MIB Entries

Web Authentication Server MIB Entries

TACACS+ Server MIB Entries

Network Traffic MIB Entries

ClearPass SNMP Traps and OIDs

Introduction

ClearPass SNMP Traps

SNMP Trap Details

SNMP Daemon Traps

SNMP Daemon Trap Events

Network Interface up and Down Events

Network Interface Status Traps

CPPM Processes Stop and Start Events

Disk Space Threshold Traps

Disk Utilization Threshold Exceed Events

Process Status Traps

CPU Load Average Exceed Events for 1, 5, and 15 Minute Thresholds

CPU Load Average Traps

Important System Events

Admin UI Events

Admin Server Events

Async Service Events

ClearPass/Domain Controller Events

ClearPass System Configuration Events

ClearPass Update Events

Cluster Events

Command Line Events

DB Replication Services Events

Licensing Events

Policy Server Events

RADIUS/TACACS+ Server Events

SNMP Events

ClearPass Policy Manager 6.5 | User Guide

622

622

623

623

623

624

629

629

647

647

648

648

648

648

649

649

637

638

638

638

638

646

646

647

649

649

649

650

650

634

634

635

635

636

637

637

637

629

629

630

631

632

633

Support Shell Events

System Auxiliary Service Events

System Monitor Events

Service Names

Error Codes

Use Cases

802.1X Wireless Use Case

Configuring a Service

Creating a New Role Mapping Policy

Web Based Authentication Use Case

Configuring a Service

MAC Authentication Use Case

Configuring the Service

TACACS+ Use Case

Configuring the Service

Single Port Use Case

OnGuard Dissolvable Agent

Introduction

Native Agents Only Mode

Configuring Workflow in Native Agents Only Mode

End-to-end flow in Native Agents Only Mode

Native Agents with Java Fallback Mode

Configuring Native Agents with Java Fallback Mode

End-to-end flow in Native Agents with Java Fallback Mode

Configuring Web Agent Flow - Java Only Mode

Configuring Web Agent Flow in ClearPass Policy Manager

Configuring Web Agent Flow in ClearPass Guest

Native Dissolvable Agent - Supported Browsers

Supported Browsers and Java Versions

657

661

661

668

668

671

671

672

673

673

673

674

675

679

679

680

680

680

681

683

686

650

650

650

651

651

655

655

656

ClearPass Policy Manager 6.5 | User Guide Contents | 15

16 | Contents ClearPass Policy Manager 6.5 | User Guide

Chapter 1

About ClearPass Policy Manager

This chapter provides an overview of the ClearPass Policy Manager Access Management System.

This chapter includes the following information: l l l l

About the ClearPass Access Management System

Using the Policy Manager Dashboard

Accessing Configuration Information

Importing and Exporting Information

l l l l l

About the ClearPass Access Management System

This section contains the following information:

About This Guide

ClearPass Access Management System Overview

Key Features

Advanced Policy Management

ClearPass Specifications

About This Guide

Welcome to the ClearPass Policy Manager User Guide.

The ClearPass Policy Manager User Guide provides a general overview of ClearPass Policy Manager features, as well as detailed descriptions of the configuration settings used to manage and monitor your Policy Manager deployment.

Intended Audience

The intended audience for the ClearPass Policy Manager User Guideincludes customers, partners, and Aruba field SEs.

Please note that this document is not a training guide, and it is assumed that the reader has at minimum foundational training in ClearPass Essentials and, if possible, Aruba Certified Professional (ACCP) certification.

The user of this guide should have a working knowledge of the following: l l l

AAA technologies (Radius, TACACS, 802.1X, MAC authentication, and Web authentication)

Layer-2 and Layer-3 networking

User Identity stores, such as Active Directory

Providing information about network device configurations and capabilities is outside the scope of this guide. For information on these topics, refer to the documentation provided by the vendor of your network equipment.

Getting Started

If you are new to ClearPass Policy Manager, refer to the following sections: l l

For a general description of ClearPass Policy Manager features, refer to the following topics in this section,

ClearPass Access Management System Overview

and

Key Features .

For a description of how to use the Dashboard, see

Using the Policy Manager Dashboard on page 21

.

ClearPass Policy Manager 6.5 | User Guide About ClearPass Policy Manager | 17

l l

For a list of common configuration tasks and pointers to information about how to perform each task, refer to Accessing Configuration Information on page 1 .

If you are planning a new ClearPass Policy Manager deployment, refer to the ClearPass Deployment Guide.

The ClearPass Deployment Guide is organized in a way that presents the recommended sequence in which

ClearPass deployment should take place, and makes the major deployment tasks easy to understand and implement.

ClearPass Access Management System Overview

The ArubaClearPass Policy Manager™ Access Management System provides a window into your network and covers all your access security requirements from a single platform. You get complete views of mobile devices and users and have total control over what they can access.

With ClearPass, IT can centrally manage network policies, automatically configure devices and distribute security certificates, admit guest users, assess device health, and even share information with third-party solutions—through a single pane of glass, on any network and without changing the current infrastructure.

Role-Based and Device-Based Access

The Aruba ClearPass Policy Manager platform provides role-based and device-based network access control for employees, contractors, and guests across any wired, wireless, and VPN infrastructure.

ClearPass works with any multivendor network and can be extended to business and IT systems that are already in place.

Self-Service Capabilities

ClearPass delivers a wide range of unique self-service capabilities. Users can securely onboard their own devices for enterprise use or register AirPlay, AirPrint, Digital Living Network Alliance (DLNA), and Universal Plug and

Play (UPnP) devices that are enabled for sharing, sponsor guest Wi-Fi access, and even set up sharing for Apple

TV and Google Chromecast.

Leveraging Contextual Data

The power of ClearPass comes from integrating ultra-scalable AAA (authentication, authorization, and accounting) with policy management, guest network access, device onboarding, and device health checks with a complete understanding of context.

From this single ClearPass policy and AAA platform, contextual data is leveraged across the network to ensure that users and devices are granted the appropriate access privileges.

ClearPass leverages a user’s role, device, location, application use, and time of day to execute custom security policies, accelerate device deployments, and streamline network operations across wired networks, wireless networks, and VPNs.

Third-Party Security and IT Systems

ClearPass can be extended to third-party security and IT systems using REST-based APIs to automate work flows that previously required manual IT intervention. ClearPass integrates with mobile device management to leverage device inventory and posture information, which enables well-informed policy decisions.

Key Features

ClearPass's key features are as follows: l l

Bring Your Own Device (BYOD) Certificate Authority for secure self service onboarding

Auto Sign-On and single sign-on (SSO) support via Security Assertion Markup Language (SAML) v2.0

18 | About ClearPass Policy Manager ClearPass Policy Manager 6.5 |  User Guide

l l l l l l l l l l l

Social network and Cloud application SSO via OAuth2, Facebook, Twitter, LinkdIn, Office365, Google Apps, and so on

Enterprise reporting, monitoring, and alerting

Role-based network access enforcement for multivendor Wi-Fi, wired, and VPN networks

High performance, scalability, High Availability, and load balancing

A Web-based user interface that simplifies policy configuration and troubleshooting

Network Access Control (NAC), Network Access Protection (NAP) posture and health checks, and Mobile

Device Management (MDM) integration for mobile device posture checks

Advanced reporting of all user authentications and failures

HTTP/RESTful APIs for integration with third-party systems, Internet security, and MDM

Device profiling and self-service onboarding

Guest access with extensive branding and customization and sponsor-based approvals

IPv6 administration support

Advanced Policy Management

ClearPass advanced policy management support includes: l l l l l

Employee access

ClearPass offers user and device authentication based on 802.1X, non-802.1X, and Web Portal access methods. To strengthen security in any environment, you can concurrently use multiple authentication protocols, such as PEAP, EAP-FAST, EAP-TLS, EAP-TTLS, and EAP-PEAP-Public.

For fine-grained control, you can use attributes from multiple identity stores, such as Microsoft Active

Directory, LDAP-compliant directory, ODBC-compliant SQL database, token servers, and internal databases across domains within a single policy.

Additionally, you can add posture assessments and remediation to existing policies at any time.

Device profiling

ClearPass provides a profiling service that discovers and classifies all endpoints, regardless of device type.

You can obtain a variety of contextual data(such as MAC OUIs, DHCP fingerprinting, and other identitycentric device data) and use this data within policies.

Stored profiling data identifies device profile changes and dynamically modifies authorization privileges. For example, if a printer appears as a Windows laptop, ClearPass Policy Manager can automatically deny access.

Access for unmanaged endpoints

Unmanaged non-802.1X devices (such as printers, IP phones, and IP cameras) can be identified as known or

unknown upon connecting to the network. The identity of these devices is based on the presence of their

MAC address in an external or internal database.

Secure configuration of personal devices

ClearPass Onboard fully automates the provisioning of any Windows, Mac OS X, iOS, Android, Chromebook, and Ubuntu devices via a built-in captive portal. Valid users are redirected to a template-based interface to configure required SSIDs and 802.1X settings, and download unique device credentials.

Additional capabilities include the ability for IT to revoke and delete credentials for lost or stolen devices, and the ability to configure mobile email settings for Exchange ActiveSync and VPN clients on some device types.

Customizable visitor management

ClearPass Guest simplifies work flow processes so that receptionists, employees, and other non-IT staff can create temporary guest accounts for secure Wi-Fi and wired network access. Self-registration allows guests to create their credentials.

ClearPass Policy Manager 6.5 | User Guide About ClearPass Policy Manager | 19

l

Device health checks

ClearPass OnGuard, as well as separate OnGuard persistent or dissolvable agents, performs advanced endpoint posture assessments. Traditional NAC health-check capabilities ensure compliance and network safeguards before devices connect.

You can use information about endpoint integrity (such as status of anti-virus, anti-spyware, firewall, and peer-to-peer applications) to enhance authorization policies. Automatic remediation services are also available for non-compliant devices.

ClearPass Specifications

Aruba ClearPass Policy Manager l l l l l l l l

Comprehensive identity-based policy engine

Posture agents for Windows, Mac OS X, and Linux operating systems

Built-in AAA services: RADIUS, TACACS+, and Kerberos

Web, 802.1X, and non-802.1X authentication and authorization

Reporting, analytics, and troubleshooting tools

External captive portal redirect to multivendor equipment

Interactive policy simulation and monitor mode utilities

Deployment templates for any network type, identity store, and endpoint

Framework and Protocol Support l l l l l l l l l l l

RADIUS, RADIUS CoA, TACACS+, Web authentication, and SAML v2.0

EAP-FAST (EAP-MSCHAPv2, EAP-GTC, EAP-TLS)

PEAP (EAP-MSCHAPv2, EAP-GTC, EAP-TLS, EAP-PEAP-Public)

TTLS (EAP-MSCHAPv2, EAP-GTC, EAP- TLS, EAP-MD5, PAP, CHAP)

EAP-TLS

PAP, CHAP, MSCHAPv1, MSCHAPv2, and EAP-MD5

Wireless and wired 802.1X and VPN

Microsoft NAP and NAC

Windows machine authentication

MAC authentication (non-802.1X devices)

Audit based on port and vulnerability scans

Supported Identity Stores l l l l l l l

Microsoft Active Directory

Kerberos

Any LDAP-compliant directory

Any ODBC-compliant SQL server

Token servers

Built-in SQL store

Built-in static-hosts list

20 | About ClearPass Policy Manager ClearPass Policy Manager 6.5 |  User Guide

Using the Policy Manager Dashboard

The Policy Manager Dashboard organizes and presents the key information about the status and performance of the current ClearPass server or cluster, as well as a set of Quick Links to the most commonly used functions, such as configuring policies, viewing the Access Tracker, and so on.

The Dashboard information is illustrated in interactive bar chart, graph, and table formats.

To customize the Dashboard layout to display the information you most want to see (as described in

Table 1 ),

drag and drop from the list of the Widget elements on the left pane to one of the available Dashboard slots in the right pane.

Table 1: Dashboard Widget Summary

To view the table with latest system level events, drag and drop the Alerts widget to the Dashboard.

l Clicking on a row drills down to the Event Viewer.

To view the graph that displays all requests processed by Policy

Manager over the past week, drag and drop the All Requests widget.

l l

Processed requests include RADIUS, TACACS+, and

WebAuth requests.

Clicking on each bar in the graph drills down to the Access

Tracker page and shows the requests for the selected day.

To view the links to the Aruba Insight, Guest, and Onboard applications that are integrated with Policy Manager, drag and drop the Applications widget to the Dashboard.

To view a graph of the failed and successful requests over the past week, drag and drop the Authentication Status to the

Dashboard.

l l

This graph includes RADIUS, WebAuth, and TACACS+ requests. The default data filters Failed Requests and

Successful Requests are used to plot this graph.

Clicking on each circle on the line graph drills down to the

Access Tracker page that shows the failed and successful requests for the day specified.

To view the status of all nodes in a cluster, drag and drop the

Cluster Status widget to the Dashboard. The following fields are shown for each node: l l l l

Status: Shows the overall health status of the cluster.

Green indicates healthy status.

Red indicates connectivity problems or high CPU or high memory utilization. The status also shows red when a node is out-of-sync with the rest of the cluster.

Host Name: Specifies the name of the host and IP address of the node.

Zone: The configured cluster zone.

Server Role: Indicates whether the cluster node is a publisher or subscriber.

ClearPass Policy Manager 6.5 | User Guide About ClearPass Policy Manager | 21

Table 1: Dashboard Widget Summary (Continued) l l

Last Replication: Date of the last replication.

Status: Indicates the status of the cluster node.

To view the chart that shows the graph of all profiled devices categorized into the following categories: l l l l l l l l l l l

Access Points

Computer

Conflict

Datacenter Appliance

Game Console

Physical Security

Printer

Routers

Smart Devices

Unknown

VOIP phone n Unknown devices are the devices that are not included in the Profiler database.

n Conflict indicates a conflict occurred in the categorization of the device.

To view the device family of a particular device category:

1. Drag and drop the Device Category widget to the

Dashboard.

2. From the drop-down, select the device category.

The device family is displayed. For example, selecting

Computer would show that the device family is Windows.

To view a display that shows the number of smart devices, computers, and unmanaged devices, as well as the total number of devices defined by the Endpoint Profiler for this

ClearPass server, drag and drop the Endpoint Profiler

Summary widget to the Dashboard.

l l

To view the table with the latest failed authentications, drag and drop the Failed Authentications widget to the

Dashboard.

Clicking on a row drills down to the Access Tracker page and shows failed requests sorted by timestamp, with the latest request displayed on the top.

To view the graph of the healthy and unhealthy requests over the past week, drag and drop the Health Status widget.

l Healthy requests are the requests to which the health state was deemed to be healthy based on the posture data sent from the client.

l Unhealthy requests are the requests to which the health state was deemed to be quarantined (posture data received but health status is not compliant) or unknown (no posture data received).

22 | About ClearPass Policy Manager ClearPass Policy Manager 6.5 |  User Guide

Table 1: Dashboard Widget Summary (Continued) l

This includes RADIUS and WebAuth requests. The default data filters Health Requests and Unhealthy Requests are used to plot this graph.

Clicking on each circle on the line graph drills down to the

Access Tracker page that shows the healthy and unhealthy requests for the last week.

To view the table with the latest authentications, drag and drop the Latest Authentications widget to the Dashboard.

l Clicking on a row in the table drills down to the Access

Tracker page that shows requests sorted by timestamp with the latest request displayed on the top.

To view the charts that show the endpoints discovered, drag and drop the MDM Discovery Summary widget to the Dashboard.

l

The endpoints are displayed in separate charts based on the endpoint's operating system.

l Clicking a chart drills down to the Configuration > Identity

> Endpoints page. The results depends on the operating system selected.

For example, if you click the Android devices chart, you can view the list of only Android devices in the Endpoints page.

To view a display that shows the number of Linux, Mac, and

Windows OnGuard clients, as well as the total number of

OnGuard clients for this ClearPass server, drag and drop the

OnGuard Clients Summary to the Dashboard.

To view the links to the following configuration tasks, drag and drop the Quick Links widget to the Dashboard: l l

Start Configuring Policies

Manage Services l l l l l l

Access Tracker

Analysis and Trending

Network Devices

Server Manager

ClearPass Guest

ClearPass Onboard

To view the trend of total request processing time, drag and drop the Request Processing Time widget to the Dashboard.

To view the bar chart with each bar representing a categorized

Policy Manager service request, drag and drop the Service

Categorization widget to the Dashboard.

l

Clicking on a bar drills down to the Access Tracker that shows the requests that were categorized into a specific service.

ClearPass Policy Manager 6.5 | User Guide About ClearPass Policy Manager | 23

Table 1: Dashboard Widget Summary (Continued)

To view a table with the latest successful authentications, drag and drop the Successful Authentications widget to the

Dashboard.

l Clicking on a row in the table drills down to the Access

Tracker page that shows successful requests sorted by timestamp, with the latest request displayed on the top.

To view the CPU usage for the last 30 minutes, drag and drop the System CPU Utilization widget to the Dashboard.

l l

The widget displays the CPU utilization time in minutes and percentage for System, User, and IO Wait time, indicated by color.

CPU utilization is presented in five-minute increments.

To view the Percentage Used statistics for the following components, drag and drop the System Summary widget to

Dashboard: l l l l

Main Memory

Swap Memory

Disk

Swap Disk

Accessing Configuration Information

This section contains the following information: l l l l l l l l l l

Introduction

Start Here

Services

Authentication and Authorization

Identity

Posture

Enforcement

Network

Policy Simulation

Profile Settings

Introduction

This section provides pointers to information on how to configure the primary configuration tasks in ClearPass

Policy Manager. These configuration tasks include: l l l l l

Configuring servers

Authenticating users or devices against an authentication source

Storing user records

Configuring posture policies, posture servers, and audit servers

Configuring enforcement policies

24 | About ClearPass Policy Manager ClearPass Policy Manager 6.5 |  User Guide

l

Configuring Network Access Devices (NADs)

You can access all these configuration tasks via the CPPM Configuration menu.

To access the ClearPass Policy Manager Configuration menu, navigate to Configuration.

The following menu appears:

Figure 1: Policy Manager Configuration Menu

Start Here

The ClearPass Policy Manager Start Here page provides the ability to create templates for services where you can define baseline policies and require specific data when you create services.

For more information, see

Creating Service Templates on page 71 .

Services

The Services page provides options to add, modify, and remove a service. For more information, refer to the following sections: l l

Services Architecture and Flow on page 71

Policy Manager Service Types on page 110

This page also shows the current list and order of services that ClearPass Policy Manager keeps track of during authentication and authorization.

Authentication and Authorization

The Authentication page provides options to configure the following components: l l

Authentication Method

Authentication Source

ClearPass Policy Manager 6.5 | User Guide About ClearPass Policy Manager | 25

l

Authorization Source

For more information, refer to the following sections: l l l

Adding and Modifying Authentication Methods on page 137

Adding and Modifying Authentication Sources on page 161

Configuring Authentication Components on page 135

Identity

The Identity page provides options on the WebUI settings required to configure ClearPass Policy Manager

Identity settings. For more information, refer to the following sections: l l l l

Configuring Single Sign-On on page 203

Managing Local Users on page 204

Adding and Modifying Endpoints on page 210

Adding and Modifying Static Host Lists on page 208

Posture

The Posture page provides options to configure posture policies, posture servers, and audit servers. For more information, refer to the following sections: n n n

Posture Architecture and Flow on page 223

Configuring Posture Servers on page 278

Configuring Audit Servers on page 281

Enforcement

The Enforcement page provides options to configure the Enforcement Profiles globally and to reference in an enforcement policy that is associated with a service.

For more information, refer to the following section: l

Enforcement Architecture and Flow on page 1

Network

The Network page provides options to configure the Network Access Device (NAD) that sends network access requests to Policy Manager using the supported RADIUS, TACACS+, or SNMP protocol. The NAD in this context is usually a mobility controller or a switch.

For more information, refer to the following sections : l l l

Adding and Modifying Devices on page 379

Adding and Modifying Device Groups on page 386

Adding and Modifying Proxy Targets on page 389

Policy Simulation

The Policy Simulation page provides options to configure the Policy Simulation utility that applies a set of request parameters as input against a given policy component.

l

For more information, refer to

Configuring Policy Simulation on page 345

.

26 | About ClearPass Policy Manager ClearPass Policy Manager 6.5 |  User Guide

Profile Settings

The Profile Settings page provides options to configure Profiles, which is a Policy Manager module that automatically classifies endpoints using attributes obtained from software components called Collectors.

For more information, refer to the following sections: l l l

ClearPass Profile Overview on page 367

About the Device Profile on page 372

Endpoint Information Collectors on page 372

Importing and Exporting Information

This section contains the following information: l l

Importing Information Into ClearPass

Exporting Information Into ClearPass

The option to import or export is available from many ClearPass components, such as services, authentication methods, authentication sources, and enforcement policies.

Importing Information Into ClearPass

Most pages in Policy Manager allow you to import configuration and administration-related information.

This information is stored as an XML file, which can be password protected. For information about the tags and attributes in the XML file, refer to the ClearPass Policy ManagerConfiguration API Guide.

In the top-right corner of the configuration pages, the Add, Import, and Export All options are displayed:

To import information into ClearPass:

1. Click the Import link.

The Import from file dialog box appears.

Figure 2: Import From File Page

2. Click Choose File.

3. Select the file you want to import.

n

You must select an XML file in the correct format. See the ClearPass Policy Manager Configuration API

Guide for more information about the format and contents of XML files.

ClearPass Policy Manager 6.5 | User Guide About ClearPass Policy Manager | 27

n

If you have exported files from different locations within Policy Manager, ensure that you are selecting the correct file.

4. If the file is password protected, enter the password in the Enter secret for the file (if any) field.

5. Click Import.

Exporting Information Into ClearPass

Most pages in Policy Manager allow you to export configuration and administration-related information.

To export multiple items, select the check boxes in the rows of the specific items that you want to export.

The configuration and administration information is exported as an XML file and this file can be password protected. The tags and attributes in the XML file are explained in the ClearPass Policy ManagerConfiguration

API Guide.

To export information into ClearPass:

1. Click the Export All link at the top-right corner of the configuration page.

The Export to File dialog appears.

Figure 3: Export to File Dialog

2. If you want the file password protected, select Yes and enter a password in the Secret Key and Verify

Secret fields.

If you do not want the file password protected, select No.

3. Click Export.

Depending on the browser you use, the file is either automatically saved to your hard drive, or you are prompted to save it in a specific location.

28 | About ClearPass Policy Manager ClearPass Policy Manager 6.5 |  User Guide

Chapter 2

Monitoring

The Monitoring features in Policy Manager provide access to live monitoring of components and other functions. ClearPass Policy Manager includes the following Monitoring features: l l l l l

Live Monitoring n

Live Monitoring: Access Tracker on page 29

n n n n

Live Monitoring: Accounting on page 38

Live Monitoring: Analysis and Trending on page 54

Live Monitoring: Endpoint Profiler on page 55

Live Monitoring: OnGuard Activity on page 48

n

Live Monitoring: System Monitor on page 56

Audit Viewer n

Audit Viewer on page 61

Event Viewer n

Event Viewer on page 63

Data Filters n

Data Filters on page 65

Blacklisted Users n

Blacklisted Users on page 68

Live Monitoring: Access Tracker

The Access Tracker table provides a real-time display of per-session access activity on the selected server or domain. To view this page, navigate to Monitoring > Live Monitoring > Access Tracker.

The following figure displays the Access Tracker table:

Figure 4: Live Monitoring > Access Tracker Table

ClearPass Policy Manager 6.5 | User Guide Monitoring | 29

The following table describes the information in the Access Tracker table:

Table 2: Access Tracker Table Parameters

Parameter Description

Server Displays the IP address of the server.

Source

Username

Service

Login Status

Request Timestamp

Displays the authentication source for the session. For example, TACACS or web authentication.

Displays the username or MAC address of the user.

Displays the name of the service. For example, Health Only, MAC authentication, or

AirGroup Authorization.

Displays the status of the request, such as accept, reject, or timeout.

Displays the date and time when the status was last updated.

Editing the Access Tracker

Change the Access Tracker parameters by clicking the Edit button. The Access Tracker edit page appears, as displayed in the following figure:

Figure 5: Access Tracker Page (edit mode)

30 | Monitoring ClearPass Policy Manager 6.5 |  User Guide

The table below describes the configuration parameters on the Access Tracker Edit page:

Table 3: Access Tracker Edit Page Parameters

Parameter Description

Select

Server/Domain

Displays information for the selected server or domain on the Access Tracker page. Select all the servers to display transactions from all nodes in the Policy Manager cluster.

Select Filter Select a filter category to filter the displayed data. For a description of available filters, see

Data Filters on page 65 .

Modify Filter

Click the

page 65

.

icon to modify the current data filter. For more information, see

Data Filters on

Add Filter

Select Date Range Click the Last drop-down list to select the start of the range of dates for which the Access

Tracker table displays data. Available options are 1-6 days, or 1 week.

        Select Date

        Show Latest

Click the icon to select a date.

Click Show Latest to set the date in the before field to the current date.

Select Columns

Click the icon to add a data filter. The Data Filters page opens. For more information, see

Data Filters on page 65 .

This section displays the following two fields: l l

Available Columns: displays the data column available to display in an Access Tracker table.

Selected Columns: displays the data columns currently selected for display.

To move a column name from one field to another, select the column name and click the left or right arrows. To change the order in which the columns are displayed, click a column name in the Selected Columns field and click the Up or Down buttons.

l l

Viewing Access Tracker Session Details

Click any session in the Access Tracker table to display the Request Details window with details about that session. The information in this window varies, depending upon the session selected. Refer to the following sections for more information specific types of information that can appear on each tab of the Request

Details page: l l l l

Summary Tab on page 31

Input Tab on page 32

Output Tab on page 34

Alerts Tab on page 35

Viewing Access Tracker Session Details on page 31

Access Control Capabilities on page 36

Summary Tab

This tab shows a summary view of the transaction including policies that are applied and protocol-specific attributes. Click any table row in the Monitoring > Live Monitoring > Access Tracker page to view the

ClearPass Policy Manager 6.5 | User Guide Monitoring | 31

Summary tab.

The following figure displays the Summary tab:

Figure 6: Request Details - Summary Tab

Input Tab

This tab shows protocol-specific attributes that Policy Manager received in a transaction request, including authentication and posture details (if available). The Input tab also shows computed attributes that Policy

Manager derived from the request attributes. Click any table row in the Monitoring > Live Monitoring >

Access Tracker page to view the Input tab. All of these attributes can be used in role mapping rules.

32 | Monitoring ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Request Details - Input tab:

Figure 7: Request Details - Input tab

ClearPass Policy Manager 6.5 | User Guide Monitoring | 33

Output Tab

This tab shows the attributes that were sent to the network device (switch or controller) and the posturecapable endpoint (For example, MAC devices). Click any table row in the Monitoring > Live Monitoring >

Access Tracker page to view the Output tab.

The following figure displays the Request Details - Output tab:

Figure 8: Request Details - Output tab

Access tracker shows an alert if more than two anti-malware products are installed on a client.

Administrators can view the posture response and posture evaluation with accurate results. For example, the administrator can view details such as missing registry keys and the reasons for a failed registry key check.

34 | Monitoring ClearPass Policy Manager 6.5 |  User Guide

Alerts Tab

This tab shows information about a session with an error. The Alerts tab only appears in the Request Details window when you access the Monitoring > Live Monitoring > Access Tracker page. Click a table row for a session that has an error to view the Alerts tab. For example, if you select a row where the Login status displays a TIMEOUT or REJECT status.

The following figure displays the Request Details - Alerts tab:

Figure 9: Request Details - Alerts tab

Configuration Tab

This tab shows the attributes that Policy Manager received in a transaction request, including service rules, role mapping policies used, authorization sources, and enforcement policies used (if available). Click any table row in the Monitoring > Live Monitoring > Access Tracker page to view the Configuration tab.

ClearPass Policy Manager 6.5 | User Guide Monitoring | 35

The following figure displays the Request Details - Configuration tab:

Figure 10: Request Details - Configuration Tab

Access Control Capabilities

This page shows a summary view of the transaction, including policies that are applied and protocol-specific attributes. You can use the Access Control Capabilities page to view or change the access control type. The

Access Control Capabilities page is displayed if you click the Change Status button in the Request Details screen. The Change Status button is enabled only if you use the RADIUS and WebAuth authentication types.

The following figure displays the Access Control Capabilities tab:

Figure 11: Access Control Capabilities

36 | Monitoring ClearPass Policy Manager 6.5 |  User Guide

The following table describes the Request Details - Access Control Capabilities page parameters:

Table 4: Request Details - Access Control Capabilities Page Parameters

Parameter Description

Change Status You can view or change to any of the following access control types: .

l Agent - This control is available for a session where the endpoint has the

OnGuard Agent installed. The following actions are allowed: n n

Bouncing

Sending Messages l n

Tagging the status of the endpoint as Disabled or Known

SNMP - This control is available for any session for which Policy Manager has the switch and port-level information associated with the MAC address of the endpoint. Policy Manager bounces the switch port to which the endpoint is associated using SNMP.

NOTE: For this type of control, SNMP read and write community strings must be configured for the network device. You must configure Policy Manager as an

SNMP trap receiver to receive link up/down traps.

l RADIUS CoA - This control is available for any session where access was previously controlled by a RADIUS transaction.

NOTE: The network device must be RADIUS CoA capable and RADIUS CoA enabled, when you configure the network device in Policy Manager. The actions available depend on the type of device. The Disconnect or Terminate Section action is supported by all devices. Some devices support setting a session timeout, changing the VLAN for the session, and applying an ACL.

l Server Action - This control is available by default for any session. Select the server action from the drop-down list. The list includes the following options: n n n n

Check Point Login

Check Point Logout

Fortinet Login

Fortinet Logout n n

Handle AirGroup Time Sharing

Nmap Scan n SNMP Scan

NOTE: To Enable Nmap Scan or SNMP Scan, the endpoint must have an IP address.

Server Action

Context Server

Select the server action that is performed on endpoints. You can select from the following options: l l

Check Point Login

Check Point Logout l l l l

Fortinet Login

Fortinet Logout

Handle AirGroup Time Sharing

Nmap scan (Appears only if the server action contains a valid IP address) l Snmp Scan (Appears only if the server action contains a valid IP address)

Enter a valid server name. You can enter an IP address or domain name.

ClearPass Policy Manager 6.5 | User Guide Monitoring | 37

Table 4: Request Details - Access Control Capabilities Page Parameters (Continued)

Parameter Description

Server Type

Action

Description

Displays the server type configured when the server action was configured.

Specifies the description of the action. For example, the description can be "Delete all information stored" if the configured action is Remote Wipe.

Live Monitoring: Accounting

The Monitoring > Live Monitoring > Accounting page provides a dynamic report that describes session access, as reported by the network access device by means of RADIUS or TACACS+ accounting records. The following figure displays the Live Monitoring > Accounting page:

Figure 12: Live Monitoring > Accounting Page

The following table describes the Accounting parameters:

Table 5: Accounting Page Parameters

Parameter Description

Server Specifies the IP address of the host name.

Protocol Specifies the protocol used.

User Displays the user name.

Access Device Displays the IP address of the device.

Start Time Displays the date and time.

You can click any row in this table to drill down and display the corresponding Accounting Record

Details page for the session. For details, see

RADIUS Accounting Details on page 39

and

TACACS+

Accounting Details on page 46

Modifying the Accounting Table

You can filter or modify the information displayed in this table by creating a filter, or selecting a different server, domain, or time range. To filter the data currently displayed in the Accounting table,

1. Navigate to the Monitoring > Live Monitoring > Accounting page.

2. Click the Filter field and select Protocol, User, or Access Device to filter the data by a string in the protocol, user name or access device fields.

38 | Monitoring ClearPass Policy Manager 6.5 |  User Guide

3. Click the Contains drop-down list and indicate whether the table should display data that contains or does not contain the text string in the adjacent field.

4. Enter an alphanumerical string into the filter text box.

5. Click Go.

The following figure displays the Accounting Page - Edit Mode:

Figure 13: Accounting Page - Edit Mode

The following table describes the Accounting Page - Edit Mode parameters:

Table 6: Accounting Page - Edit Mode Parameters

Parameter Description

Select Server/Domain Select server for which the dashboard data to be displayed.

Select filter to constrain data display.

Select Filter

Modify

Click the icon to modify the data filter.

Add

Select Date Range

Show Latest

Select Columns

Click the icon to create a new data filter.

Select the number of days prior to the configured date for which the accounting data to be displayed. You can specify the number from 1 day to a week.

Set the date to Today to view the latest information.

Click the right or left arrows to move data between Available Columns and Selected

Columns. Click the Up or Down buttons to rearrange columns.

RADIUS Accounting Details

You can click any row in the Accounting table to drill down and display the corresponding Accounting Record

Details page for the session. Refer to the following sections for more information specific types of information that can appear on each tab for the RADIUS accounting records: l l l l

RADIUS Accounting Record Details - Summary Tab

RADIUS Accounting Record Details - Auth Sessions Tab

RADIUS Accounting Record Details - Utilization Tab

RADIUS Accounting Record Details - Details Tab

ClearPass Policy Manager 6.5 | User Guide Monitoring | 39

RADIUS Accounting Record Details - Summary Tab

The Accounting Record Details - Summary tab shows a summary view of the transaction including session

IDs, timestamp, and network details for the RADIUS protocol. The following figure displays the RADIUS

Accounting Record Details - Summary tab:

Figure 14: RADIUS Accounting Record Details Summary Tab

The following table describes the configuration parameters on the RADIUS Accounting Record Details -

Summary tab:

Table 7: RADIUS Accounting Record Details Summary Tab Parameters

Parameter Description

Session ID Specifies the Policy Manager session identifier. You can correlate this record with a record in

Access Tracker.

Account

Session ID

Start and End

Timestamp

Status

Specifies a unique ID for this accounting record.

Shows the start and end time of the session.

Shows the current connection status of the session.

40 | Monitoring ClearPass Policy Manager 6.5 |  User Guide

Table 7: RADIUS Accounting Record Details Summary Tab Parameters (Continued)

Parameter Description

Username

Termination

Cause

Username associated with this record.

Specifies the reason for termination of this session.

Service Type

Network Details

Shows the value of the standard RADIUS attribute service type.

NAS IP

Address

Shows the IP address of the network device.

NAS Port Type Shows the access methods. For example, Ethernet, or 802.11 Wireless.

Calling Station

ID

Specifies the MAC address of the client that is supported by Policy Manager.

Called Station

ID

Shows the MAC Address of the network device.

Framed IP

Address

Shows the IP Address of the client (if available).

Account Auth Specifies the type of authentication. Here this specifies RADIUS authentication.

RADIUS Accounting Record Details - Auth Sessions Tab

This section describes the parameters of the Accounting Record Details - Auth Sessions tab for the

RADIUS protocol. The following figure displays the the Accounting Record Details- Auth Sessions tab:

ClearPass Policy Manager 6.5 | User Guide Monitoring | 41

Figure 15: RADIUS Accounting Record Details - Auth Sessions Tab

The following table describes the RADIUS Accounting Record Details- Auth Sessions parameters:

Table 8: RADIUS Accounting Record Details Auth Sessions Tab Parameters

Parameter

Number of

Authentication

Sessions

Description

Specifies the total number of authentications (always 1) and authorizations in this session.

Authentication Sessions Details

Session ID Displays the Policy Manager session ID.

Type

Time Stamp

Specifies the type of authentication: Initial authentication or re-authentication.

Specifies the time when the event occurred.

42 | Monitoring ClearPass Policy Manager 6.5 |  User Guide

RADIUS Accounting Record Details - Utilization Tab

This section describes the parameters of the Accounting Record Details - Utilization tab for the RADIUS protocol. The following figure displays the RADIUS Accounting Record Details - Utilization tab:

Figure 16: RADIUS Accounting Record Details - Utilization Tab

The following table describes the configuration parameters on the RADIUS Accounting Record Details -

Utilization tab:

Table 9: RADIUS Accounting Record Details - Utilization Tab Parameters

Parameter Description

Active Time Displays the duration of the session that was active.

Account Delay

Time

Account Input

Octets

Displays how many seconds the network device has been trying to send this record for

(subtract from record time stamp to determine the time this record was actually generated by the device).

Specifies the quantity of octets sent to and received from the device port during the session.

ClearPass Policy Manager 6.5 | User Guide Monitoring | 43

Table 9: RADIUS Accounting Record Details - Utilization Tab Parameters (Continued)

Parameter Description

Account Output

Octets

Account Input

Packets

Specifies the packets sent and received from the device port during the session.

Account Output

Packets

RADIUS Accounting Record Details - Details Tab

This section describes the parameters of the Accounting Record Details - Details tab for the RADIUS protocol. The following figure displays the example of the RADIUS Accounting Record Details - Details tab:

Figure 17: RADIUS Accounting - Details Tab

44 | Monitoring ClearPass Policy Manager 6.5 |  User Guide

The following table describes the configuration parameters on the RADIUS Accounting Record Details -

Details tab:

Table 10: RADIUS Accounting Record - Details Tab Parameters

Parameter Description

Accounting

Packet Details

Shows details of RADIUS attributes sent and received from the network device during an initial authentication and subsequent re-authentications (each section in the Details tab corresponds to a 'session' in Policy Manager).

TACACS+ Accounting Record Details - Request Tab

This section describes the parameters of the Accounting Record Details - Request Sessions tab for the

TACACS+ protocol. The following figure displays the TACACS+ Accounting Record Details - Request tab:

Figure 18: TACACS+ Accounting Record Details - Request Tab

ClearPass Policy Manager 6.5 | User Guide Monitoring | 45

The following table describes the configuration parameters on the TACACS+ Accounting Record - Request tab:

Table 11: TACACS+ Accounting Record Request Tab Parameters

Parameter Description

Session ID

User Session ID

Specifies the Session ID, a unique ID, associated with a request.

Specifies a session ID that correlates authentication, authorization, and accounting records.

Start and End Timestamp

Username

Client IP

Remote IP

Flags

Privilege Level

Authentication Method

Authentication Type

Authentication Service

Shows the start and end time of the session.

Shows the username associated with this record.

Shows the IP address and tty of the device interface.

Shows the IP address from which Admin is logged in.

Shows the identifier corresponding to start, stop, or update accounting record.

Specifies the privilege level of the administrator. The range is from 1

(lowest) to 15 (highest).

Identifies the authentication method used for the access.

Identifies the authentication type used for the access.

Identifies the authentication service used for the access.

TACACS+ Accounting Details

You can click any row in the Accounting table to drill down and display the corresponding Accounting

Record Details page for the session. The following sections describe the accounting record details for

TACACS+ accounting records.

46 | Monitoring ClearPass Policy Manager 6.5 |  User Guide

TACACS+ Accounting Record Details - Auth Sessions Tab

This section describes the parameters of the Accounting Record Details - Auth Sessions tab for the

TACACS+ protocol. The following figure displays the TACACS+ Accounting Record Details - Auth Sessions tab:

Figure 19: TACACS+ Accounting Record Details - Auth Sessions Tab

The following table describes the configuration parameters on the TACACS+ Accounting Record Details -

Auth Sessions tab:

Table 12: TACACS+ Accounting Record Details Auth Sessions Tab Parameters

Parameter Description

Number of

Authentication

Sessions

Specifies the total number of authentications (always 1) and authorizations in this session.

Authentication

Sessions Details

Denotes whether the request is an authentication or authorization request, and the time at which the request was sent for each request ID.

ClearPass Policy Manager 6.5 | User Guide Monitoring | 47

TACACS+ Accounting Record Details - Details Tab

This section describes the parameters of the Accounting Record Details - Details tab for the TACACS+ protocol. The following figure displays the TACACS+ Accounting Record Details - Details tab:

Figure 20: TACACS+ Accounting Record Details - Details Tab

The following table describes the configuration parameters on the TACACS+ Accounting Record - Details tab:

Table 13: TACACS+ Accounting Record - Details Tab Parameters

Parameter Description

Accounting

Packet Details

Shows cmd (command typed), priv-lvl (privilege level of the administrator executing the command) and service (shell) for each authorization request.

Live Monitoring: OnGuard Activity

The OnGuard Activity page shows the real-time status of all endpoints that have Aruba OnGuard persistent or dissolvable agent in the Monitoring > Live Monitoring > OnGuard Activity page. This page also presents configuration tools to bounce an endpoint and to send unicast or broadcast messages to all endpoints running the OnGuard agent. The following image is an example of the OnGuard Activity screen:

Endpoint bounce only works with endpoints that run the persistent agent.

48 | Monitoring ClearPass Policy Manager 6.5 |  User Guide

Figure 21: OnGuard Activity Page

The following table describes the configuration parameters on the OnGuard Activity page:

Table 14: OnGuard Activity Parameters

Parameter Description

User Displays the name of the user.

Host MAC

Host IP

Host OS

Status

Date and Time

Authentication

Records

Displays the MAC address of the host.

Displays the IP address of the host.

Displays the operating system that runs on the host.

Displays the online status of the host. Green indicates online and red indicates offline.

Displays the date and time at which the user was created.

Click the View button to see the Endpoint Authentication Details screen with the authentication records.

For additional tasks, see: l l l l

Bouncing an Agent Using Non-SNMP on page 49

Bouncing a Client Using SNMP on page 52

Broadcast Message on page 53

Send Message on page 53

Bouncing an Agent Using Non-SNMP

This page is used to initiate a bounce on the managed interface on an endpoint. Initiating a bounce on the managed interface on the endpoint results in creating tags for the specified endpoint in the Endpoints table

(see Configuration > Identity > Endpoints). One or more of the following tags are created: l l l l l

Disabled by

Disabled Reason

Enabled by

Enabled Reason

Info URL

ClearPass Policy Manager 6.5 | User Guide Monitoring | 49

To bounce an agent, click a row on the OnGuard Activity page. After clicking a row, the Agent and Endpoint

details window opens. The following figure is an example of the Agent and Endpoint details screen:

Figure 22: Agent and Endpoint Details

The following table describes the configuration parameters on the Agent and Endpoint details page:

Table 15: Agent and Endpoint Details Parameters

Parameter Description

User Displays the name of the user.

Host MAC

Host IP

Status

Agent Type

Host OS

Registered Policy Manager

Server

Registered at

Displays the MAC address of the user.

Displays the IP address of the host.

Shows the online or offline status of the agent.

Specifies the type of the OnGuard agent.

Displays the operating system that runs on the endpoint.

Displays the name and IP address of the Policy Manager server.

Displays the date and time at which the Policy Manager installation was registered.

50 | Monitoring ClearPass Policy Manager 6.5 |  User Guide

Table 15: Agent and Endpoint Details Parameters (Continued)

Parameter Description

Last Seen Health Status

Unhealthy Health Classes

Displays the health status of the endpoint. For example, QUARANTINED or

HEALTHY.

Displays the health classes that are unhealthy. For example, AntiVirus and

PatchAgent.

Description

Status

Added by

Displays the status of the endpoint.

Displays the server name.

Click Bounce and the Bounce Agents window opens.

Figure 23: Bounce Agents Page

The following table describes the configuration parameters on the Bounce Agents page:

Table 16: Bounce Agents Page Parameters

Parameter Description

An optional message to display on the endpoint using the OnGuard interface.

Display

Message

(Optional)

Web link for more details

(Optional)

An optional clickable URL that is displayed along with the Display Message.

Endpoint

Status

No change in status - No change is made to the status of the endpoint. The existing status of

Known, Unknown, or Disabled continues to be applied. Access control is granted or denied based on the existing status of an endpoint.

Allow network access - Allow network access by white-listing this endpoint. Clicking Allow

network access sets the status of the endpoint as Known. You must configure Enforcement

Policy Rules to allow access to the endpoints with the status Known.

Block network access - Block network access by blacklisting this endpoint. Clicking Block

network access sets the status of the endpoint to Disabled. You must configure Enforcement

Policy Rules to allow access to the endpoints with the status Disabled.

ClearPass Policy Manager 6.5 | User Guide Monitoring | 51

Bouncing a Client Using SNMP

This page is used to initiate a bounce operation using SNMP with wired Ethernet switches.

Requirements

To bounce a client using SNMP successfully, the following conditions are mandatory: l l l

The network device must be added to Policy Manager and SNMP read and write parameters must be configured.

SNMP traps (link up and/or MAC notification) have to be enabled on the switch port.

The DHCP snooper service on Policy Manager must receive DHCP packets from the endpoint to specify the

IP address of the endpoint to bounce. Refer to your network device documentation to find out how to configure IP helper address.

Perform the following steps to bounce a client using SNMP:

1. Enter the client IP or MAC Address.

2. Click Go.

3. Click Bounce. The Bounce Client (Using SNMP) page appears.

Figure 24: Bounce Client (Using SNMP) Page

The following table describes the configuration parameters on the Bounce Client (Using SNMP) page:

Table 17: Bounce Client (Using SNMP) Page Parameters

Parameter Description

Client IP or MAC address Enter the Client IP or MAC address of the bounce client.

Host MAC

Host IP

Switch IP Address

Switch Port

Displays the MAC address of the host.

Displays the IP address of the host.

Displays the IP address of the switch.

Displays the port number of the switch.

52 | Monitoring ClearPass Policy Manager 6.5 |  User Guide

Table 17: Bounce Client (Using SNMP) Page Parameters (Continued)

Parameter Description

Description

Status

Displays the description of the client.

Displays the status of the client.

Added by Displays the name of the user who added the client.

Broadcast Message

After you click the Broadcast Message link on the top right of the OnGuard Activity page, a page appears that allows you to write and send a message to all active endpoints. The following figure is an example of the

Broadcast Notification to Agents screen:

Figure 25: Broadcast Notification to Agents Page

The following table describes the configuration parameters on the Broadcast Notification to Agents page:

Table 18: Broadcast Notification to Agents Page Parameters

Parameter Description

Display Message Enter the message that needs to be sent to the active endpoints.

Web link for more details

(Optional)

A clickable URL that is displayed along with the Display Message. This field is optional.

Send Message

Perform the following steps to send a message to a selected endpoint:

1. Select one or more rows on the OnGuard Activity page.

2. Click the Send Message button. The Send Notification to Agents screen opens.

3. Enter a message and click Send to send the message.

ClearPass Policy Manager 6.5 | User Guide Monitoring | 53

Figure 26: Send Notifications to Agents

The following table describes the configuration parameters on the Send Notifications to Agents page:

Table 19: Send Notifications to Agents Page Parameters

Parameter Description

Display Message Enter the message that needs to be sent to the active endpoints.

Web link for more details

(Optional)

A clickable URL that is displayed along with the Display Message. This field is optional.

Live Monitoring: Analysis and Trending

The Analysis and Trending page displays requests for the subset of components included in the selected filters over a selected time period: one month, two weeks, one week, one day, 12 hours, 6 hours, 3 hours, or one hour. The data can be aggregated by minute, hour, day, or week. The list at the end of this section shows the per-filter count for the aggregated data.

Each bar corresponding to each filter in the bar graph is clickable. Clicking a bar drills down into the

Live

Monitoring: Access Tracker on page 29

that shows session data for the specific time slice and for the specific requests.

54 | Monitoring ClearPass Policy Manager 6.5 |  User Guide

Figure 27: Analysis and Trending

Use the following components in the WebUI to customize and filter the Analysis and Trending page:

Component

Select Server

Update Now!

Customize This!

Toggle Chart Type

Add new Data Filter

Description

Select a node from the cluster for which data will be displayed.

Click to update the display with the latest available data.

Click to customize the display by adding filters. You can add a maximum of 4 filters.

Click to toggle chart display between line and bar type.

Click to add a data filter in the global filter list.

For more information on adding filters, refer to

Data Filters on page 65

.

Live Monitoring: Endpoint Profiler

If the Profile license is enabled, a list of the profiled endpoints are visible in the Endpoints Profiler table. The list of endpoints you view is based on the Device Category, Device Family, and Device Name items that you selected. Click Change Selection to modify the selection criteria used to list the devices. Click Change

View to see graphs that show information about distribution and update frequency for devices and computers.

The figure below shows an example of the Endpoint Profiler graphs available on the Monitoring > Live

Monitoring> Endpoint Profiler page:

ClearPass Policy Manager 6.5 | User Guide Monitoring | 55

Figure 28: Endpoint Profiler

Click a device in the table below the graphs to view endpoint details about a specific device. Select the Cancel button to return to the Endpoint Profiler page.

Figure 29: Endpoint Profiler Details

Live Monitoring: System Monitor

The System Monitor page has four tabs. Each tab provides one or more charts or graphs that give real-time information about various components.

Auto refresh ensures that the System Monitor page is updated for every 2 minutes. You can see the last updated

56 | Monitoring ClearPass Policy Manager 6.5 |  User Guide

time in the Last updated at field in the System Monitor page.

l l l l

System Monitor Tab on page 57

Process Monitor Tab on page 57

Network Tab on page 59

ClearPass Tab on page 60

System Monitor Tab

This tab displays charts and graphs that include information about CPU load and usage, memory usage, and disk usage.The System Monitor tab on the Monitoring > Live Monitoring > System Monitor page displays information about component usage and load.

Table 20: System Monitor Graphs

Graph

Monitoring CPU Usage

Description

Percentage of CPU usage based on User, System, IO Wait, and Idle time.

Monitoring CPU Usage

Monitoring Memory Usage

Monitoring Memory Usage

Monitoring Disk - Usage

Monitoring Disk - Swap Usage

Percentage of CPU load in increments of 1, 5, and 15 minutes.

Percentage of free and total memory in Gigabytes.

Percentage of free and total swap memory in Gigabytes.

Percentage of used and free disk space.

Percentage of used and total swap space.

Process Monitor Tab

This tab displays reports about a selected process. The processes that you can monitor include Policy server,

TACACS server, and stats collection service. The Process Monitor tab on the Monitoring > Live Monitoring

> System Monitor page displays CPU Usage and Main Memory Usage for a selected process or service. Click the Select Process drop-down list and select any of the following options to view CPU and Main Memory usage for that process or service: l l l l l l l l l l l l l

Admin UI service

AirGroup notification service

Async DB write service

Async network services

DB change notification server

DB replication service

Micros Fidelio FIAS

Multi-master cache

Policy server

Radius server

Stats aggregation service

Stats collection service

System auxiliary services

ClearPass Policy Manager 6.5 | User Guide Monitoring | 57

l l l

System monitor service

Tacacs server

Virtual IP service

Monitoring CPU Usage

This graph shows the CPU usage in time and percentage.

Figure 30: CPU Usage Graph Example

Monitoring Main Memory Usage

This graph shows the main memory usage in time and Kilobytes.

58 | Monitoring ClearPass Policy Manager 6.5 |  User Guide

Figure 31: Main Memory Usage Graph Example

Network Tab

This tab displays a graph about any selected network parameters such as web traffic and SSH. The Network tab on the Monitoring > Live Monitoring > System Monitor page displays network activity (in bytes) for the following traffic types: l l l l l l l

OnGuard

Database

Web Traffic

RADIUS

TACACS

SSH

NTP

ClearPass Policy Manager 6.5 | User Guide Monitoring | 59

Figure 32: Network Monitor Tab Graph Example - Web Traffic

ClearPass Tab

The ClearPass tab on the Monitoring > Live Monitoring > System Monitor page displays performance monitoring counters and timers for the last 30 minute of activity for the following components: l l l l l l l l l

Service Categorization

Authentication (RADIUS, TACACS, or WebAuth)

Authorization

Role Mapping

Posture Evaluation

Audit Scan

Enforcement

End to End request processing (RADIUS, TACACS, or WebAuth)

Advanced

When you select the Advanced component, you can view additional performance monitoring counters and timers. Select the type of performance monitoring counter by selecting the Type drop-down. If you do not select the performance monitoring counter from the Type field, the widgets will be blank.

60 | Monitoring ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Advanced components:

Figure 33: System Monitoring - ClearPass Tab

Audit Viewer

The Audit Viewer table on the Monitoring > Audit Viewer page provides a dynamic report on actions, device name, category of policy component, user, and timestamp.

Table 21

describes the information displayed in the Audit Viewer page.

Figure 34: Audit Viewer Page

The following table describes the configuration parameters on the Audit Viewer page:

Table 21: Audit Viewer Page Parameters

Parameter Description

Action

Name

Displays the type of actions. For example, ADD, MODIFY, or REMOVE.

Displays the name of the host.

Category

User

Timestamp

Displays the category of the user or endpoint.

Displays the user associated with the action.

Displays the server time when the status was last updated.

ClearPass Policy Manager 6.5 | User Guide Monitoring | 61

Click any row in the audit viewer to display detailed information about the selected event. The content in the

Audit Row Details window varies, depending upon type of event you select.

l l

Add events: Click a row with the Add action type to display additional details that are specific to the new policy component. For example, if a TACACS enforcement profile is added, the Audit Row Details window displays detailed information about that profile. If a policy is created, the Audit Row Details window displays information about the policy.

Modify Events: Click a row with the Modify action type to display additional details information about the change, including the previous values, the latest, updated values, and the differences between the two.

When you view a modify event, the Audit Row Details window contains the following three tabs: n

The Old Data tab displays a summary of details about the original data values. The Profile section shows a summary of the profile values. The Attributes section shows data about the original attributes and values.

l n

The New Data tab is a summary of details about the original data values. The Profile section shows a summary of the profile values. The Attributes section displays new and changed Attributes.

Remove Events: Click a row with the Remove action type to display details about attributes that were removed.

Table 22: Audit Row Details for Modify Events

62 | Monitoring ClearPass Policy Manager 6.5 |  User Guide

Event Viewer

The Event Viewer table on the Monitoring > Event Viewer page provides reports about system-level events.

Table 23

describes the information displayed in this table.

Figure 35: Event Viewer Page - Default Values

The following table describes the Event Viewer parameters:

Table 23: Event Viewer Page Parameters - Default Values

Parameter Description

Source Displays the source of the event. For example, AdminUI, RADIUS, or SnmpService.

Level

Category

Action

Timestamp

Displays the level of the event from the following options: l INFO l l

WARN

ERROR

Displays the category of the event. For example, Request, Authentication, and System.

Displays the status of the event action. For example, Success, Failed, Unknown, and None.

Displays the date and time when the event was occurred.

Creating an Event Viewer Report Using Default Values

1. In the Filter field, select Source as the filter parameter.

2. Leave the default term in the contains field.

3. Leave the text field blank.

4. Leave the Show records value at 10.

5. Click Go. The systems returns all event records.

Creating an Event Viewer Report Using Custom Values

1. Click the icon. A new Filter field is added. You can add up to four Filter fields.

2. Click Select ANY match.

3. In the first Filter field, select Level as the Filter value.

4. Leave the search term set to contains.

ClearPass Policy Manager 6.5 | User Guide Monitoring | 63

5. Enter ERROR in the text field.

6. In the second Filter field, select Source as the Filter value.

7. Change the search field to equals.

8. Enter SYSMON in the text field.

9. Change the Show records value to 20.

10.Click Go.

The following figure displays the Event Viewer report with custom values:

Figure 36: Event Viewer Report Example - Custom Values

Viewing Report Details

Click a row in the Event Viewer page to display the System Event Details page.

Figure 37: System Event Details Page

64 | Monitoring ClearPass Policy Manager 6.5 |  User Guide

The following table describes the System Event Details parameters:

Table 24: System Event Details Page Parameters

Parameter Description

Source Displays the source of the event. For example, AdminUI, RADIUS, and SnmpService.

Level

Category

Action

Timestamp

Description

Displays the level of the event from the following options: l INFO l l

WARN

ERROR

Displays the category of the event. For example, Request, Authentication, and System.

Displays the action of the events. For example, Success, Failed, Unknown, and None.

Displays the date and time when the event occurred.

Displays additional information about the event.

l l l l l l l l l l

Data Filters

The Data Filters table on the Monitoring > Data Filters page provides a way to filter data (limit the number of rows of data shown by defining custom criteria or rules) that is shown in the following components in Policy

Manager: l l l l

Live Monitoring: Access Tracker on page 29

Syslog Export Filters on page 478

Live Monitoring: Analysis and Trending on page 54

Live Monitoring: Accounting on page 38

Policy Manager is preconfigured with the following data filters:

All Requests - Shows all requests (without any rows filtered).

ClearPass Application Requests - Shows all Application session log requests.

Failed Requests - Shows all authentication requests that were rejected or failed.

Guest Access Requests - Shows all requests - RADIUS or Web Authentication - where the user was assigned with the built-in role Guest.

Healthy Requests - Shows all requests that were deemed healthy by Policy Manager.

RADIUS Requests - Shows all RADIUS requests.

Successful Requests - Shows all authentication requests that were successful.

TACACS Requests - Shows all TACACS requests.

Unhealthy Requests - Shows all requests that were not deemed healthy by Policy Manager.

WebAuth Requests - Shows all Web Authentication requests (requests originated from the Aruba Guest

Portal).

ClearPass Policy Manager 6.5 | User Guide Monitoring | 65

The following figure displays the Data Filters page:

Figure 38: Data Filters Page

The following table describes the configuration parameters on the Data Filters page:

Table 25: Data Filters Page Parameters

Parameter Description

Name Displays the name of the data filter.

Description Displays the description about the data filter.

Adding a Filter

To add a filter, click the Add link in the top-right corner of the Data Filters page. Define a name and description for the filter the Filter tab. If you select the Select Attributes configuration type on the Filter tab, you can define and its rules in the Rules tab. (The Rules tab appears only if the Select Attributes option is selected.)

Filter Tab

Table 26

describes the configuration settings available on the Filter tab.

Figure 39: Add Filter - Filter Tab

66 | Monitoring ClearPass Policy Manager 6.5 |  User Guide

The following table describes the Filter tab parameters:

Table 26: Add Filter - Filter Tab Parameters

Parameter Description

Name/Description Specify a name and a description of the filter.

Configuration

Type

Custom SQL

Choose one of the following configuration types: l Specify Custom SQL - Specify a custom SQL entry for the filter. If this is specified, the

Rules tab disappears and a SQL template displays in the Custom SQL field.

NOTE: This option is not recommended. Contact Support if you want to use this option.

l Select Attributes - This option is selected by default and enables the Rules tab. Use the

Rules tab to configure rules for this filter.

If Specify Custom SQL is selected, then this field populates with a default SQL template. In the text entry field, enter attributes for the type, attribute name, and attribute value.

NOTE: It is recommended to contact Support, if you choose to use this option. Support can assist you with entering the correct information in this template.

Rules Tab

The Rules tab displays only if you select the Select Attributes configuration type on the Filter tab. The configuration options in this tab are described in

Table 27

.

Figure 40: Add Filter - Rules Tab

The following table describes the Filter tab parameters:

Table 27: Add Filter - Rules Tab

Parameter Description

Rule Evaluation

Algorithm

Select ANY match is a logical OR operation of all the rules. Select ALL matches is a logical

AND operation of all the rules.

Add Rule

Move Up/Down

Edit/Remove Rule

Add a rule to the filter.

Change the ordering of rules to Up and Down.

Edit or remove a rule.

ClearPass Policy Manager 6.5 | User Guide Monitoring | 67

When you click on Add Rule or Edit Rule, the Dashboard Filter rules editorwindow appears.

Figure 41: Dashboard Filters - Rules Editor

The following table describes the Dashboard Filters parameters:

Table 28: Dashboard Filters Configuration Parameters

Parameter Description

Matches ANY matches one of the configured conditions.

ALL indicates to match all of the configured conditions.

Type This indicates the namespace for the attribute.

l

Common - Attributes common to RADIUS, TACACS, and WebAuth requests and responses.

l l l

RADIUS - Attributes associated with RADIUS authentication, accounting requests, and responses.

TACACS - Attributes associated with TACACS authentication, accounting, policy requests, and responses.

Web Authentication Policy - Policy Manager policy objects assigned after the evaluation of policies associated with Web Authentication requests. For example, Auth Method, Auth Source, and Enforcement Profiles.

Name

Operator

Value

Name of the attributes corresponding to the selected namespace (Type).

Select any subset of string data type operators from the following list: l

EQUALS l l l l l l l l l

NOT_EQUALS

LESS_THAN

LESS_THAN_OR_EQUALS

GREATER_THAN

GREATER_THAN_OR_EQUALS

CONTAINS

NOT_CONTAINS

EXISTS

NOT_EXISTS

The value of the attribute.

Blacklisted Users

The Blacklisted Users table on the Monitoring > Blacklisted Users page lists the MAC address and user name of all blacklisted users, the authentication source for that user, and indicates whether the bandwidth

68 | Monitoring ClearPass Policy Manager 6.5 |  User Guide

limit or session duration limits were exceeded by each blacklisted user.

To delete a user from this blacklist, select the user row and click Delete. After a user entry is removed from the blacklisted users table, the user is eligible to access the network again.

The following figure displays the Blacklisted Users page:

Figure 42: Blacklisted Users Page

ClearPass Policy Manager 6.5 | User Guide Monitoring | 69

70 | Monitoring ClearPass Policy Manager 6.5 |  User Guide

Chapter 3

Services

This chapter describes the following topics: l l l

Creating Service Templates

Viewing the List of Services

Policy Manager Service Types

The Policy Manager policy model groups policy components that serve a specific type of request into the

Services page.

Services Architecture and Flow

Architecturally, Policy Manager services are classified into the following: l l l

Parents of their policy components, which are wrapped (hierarchically) and coordinated in processing requests.

Siblings of other Policy Manager services within an order that determines the sequence in which they are tested against requests.

Children of Policy Manager, which test requests against their rules to find a matching service for each request.

The flow-of-control for requests follows this hierarchy: l l l

Policy Manager tests for the first request-to-service-rule match.

The matching service coordinates execution of its policy components.

Those policy components process the request to return enforcement profiles to the network access device and, optionally, posture results to the client.

There are two approaches to creating a new service in Policy Manager: l l

Bottom-Up: Create all policy components (authentication method, authentication source, role mapping policy, posture policy, posture servers, audit servers, enforcement profiles, and enforcement policy) first, as needed, and then create the service using the Service creation wizard.

Top-Down: Start with the Service creation wizard and create the associated policy components as and when required, all in the same flow.

To help you get started, Policy Manager provides 14 service types or templates. If these service types do not suit your needs, you can create a service using custom rules.

Creating Service Templates

Service templates provide a way to simply step through the template-creation process, so you can easily create services and define components, such as role-mapping policies, enforcement policies, and network devices.

To create templates for services for which you can define baseline policies and require specific data, navigate to the Configuration > Start Here page.

Fill in the various fields that are presented in the templates—Policy Manager then creates the configuration elements that are needed for that particular service.

Service Templates Provided

ClearPass provides the following service templates: l

802.1X Wired, 802.1X Wireless, and Aruba 802.1X Wireless on page 82

ClearPass Policy Manager 6.5 | User Guide Services | 71

l l l l l l l l l l l l l l l l

Aruba VPN Access with Posture Checks on page 85

Aruba Auto Sign-On on page 87

Certificate/Two-factor Authentication for ClearPass Application Login on page 89

ClearPass Admin Access on page 91

ClearPass Admin SSO Login (SAML SP Service) on page 92

ClearPass Identity Provider (SAML IdP Service) on page 93

Device Mac Authentication on page 94

EDUROAM Service on page 95

Encrypted Wireless Access via 802.1X Public PEAP method on page 98

Guest Access Web Login on page 99

Guest Access on page 100

Guest MAC Authentication on page 101

Guest Social Media Authentication on page 103

OAuth2 API User Access on page 105

Onboard on page 105

User Authentication with MAC Caching on page 107

72 | Services ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Service Templates page:

ClearPass Policy Manager 6.5 | User Guide Services | 73

Figure 43: Service Templates page

74 | Services ClearPass Policy Manager 6.5 |  User Guide

Services Supported for High Capacity Guest Mode

The following service templates are supported when the High Capacity Guest (HCG) mode is enabled: l l

ClearPass Admin Access (Active Directory)

ClearPass Admin SSO Login (SAML SP Service)

ClearPass Policy Manager 6.5 | User Guide Services | 75

l l l l l l

ClearPass Identity Provider (SAML IdP Service)

Encrypted Wireless Access via 802.1X Public PEAP method

Guest Access

Guest Access - Web Login

Guest MAC Authentication

OAuth2 API User Access

The following service types are supported when the HCG mode is enabled: l l l l l l l l l

MAC Authentication

RADIUS Authorization

RADIUS Enforcement

RADIUS Proxy

Aruba Application Authentication

Aruba Application Authorization

TACACS+ Enforcement

Web-based Authentication

Web-based Open Network Access

Authentication Methods Used in HCG Mode

The following authentication methods are used in service templates in the HCG mode: l l l l l l l

PAP

CHAP

MSCHAP

EAP_MD5

MAC_AUTH

AUTHORIZE

EAP_PEAP_PUBLIC

Viewing the List of Services

The Services page shows the current list and order of services that ClearPass Policy Manager follows during authentication and authorization. You can use the configured default service types or you can add additional services. Services included in "[ ]" indicate default services.

The following figure displays the Services page:

76 | Services ClearPass Policy Manager 6.5 |  User Guide

Figure 44: Service Listing Page

The following table describes the Services parameters:

Table 29: Services Page Parameters

Parameter Description

Name Displays the name of the service.

Type

Template

Status

Displays the type of authentication associated with the service. For example, RADIUS, Web

Authentication, and TACACS.

Specifies the type of the service template to create a service.

Displays the status of the service. A green/red icon indicates enabled/disabled state. Click the icon to toggle the status of a service between Enabled and Disabled.

NOTE: If a service is in Monitor mode, an [m] indicator is displayed next to the Status icon.

For more information, see: l l l

Adding Services on page 1

Modifying Services on page 1

Reordering Services on page 80

Viewing Existing Services

You can view all configured services in a list or drill down to individual services in the Services page. Click

Configuration > Services to view a list of services that you can filter by phrase or sort by order. In the

Services page, click the name of a Service to view its details. The following figure is an example of the

Services tab with the list of services with sorting tool:

ClearPass Policy Manager 6.5 | User Guide Services | 77

Figure 45: List of services with sorting tool

The Summary tab provides the detailed information about the selected service with the link to other tabs. For example, you can click Authentication to view the Authentication tab and add authentication sources and authentication methods. The following figure is an example of the Summary tab with service details:

Figure 46: Details for an individual service

Adding and Removing Services

You can modify a list of services on the Configuration > Services page by creating a new service, modifying, or deleting an existing service.

l l l

Create a new service: In the Services page, click Add, then follow the configuration wizard by clicking

Next as you complete each tab. To create a service template by making a copying an existing service, select the check box by a service, then click Copy.

Modify a service: To modify an existing service, click the check box by a service row in the page. This opens the Services > Edit - <service_name> form. Select the Service tab on this form to edit the service information.

Remove a service - From the Services page, select the check box by a service and then click the Delete button. You can also disable or enable a service from the Service details page by clicking Disable or Enable in the lower right of page.

78 | Services ClearPass Policy Manager 6.5 |  User Guide

The following figure is an example of the Add Service tab.

Table 30

describes the available configuration parameters on this tab. Note that the available settings will vary, depending upon the service type selected.

Figure 47: Add Service Page (all options enabled)

Table 30: Service Page (General Parameters)

Label Description

Type Select the desired service type from the drop-down list. When working with service rules, you can select from the following namespace dictionaries: l l

Application: The type of application for this service.

Authentication: The Authentication method to be used for this service.

l l l l

Connection: Originator address (Src-IP-Address, Src-Port), Destination address

(Dest-IP-Address, Dest-Port), and Protocol

Device: Filter the service based on a specific device type, vendor, operating system location, or controller ID.

Date: Time-of-Day, Day-of-Week, or Date-of-Year

Endpoint: Filter based on endpoint information such as enabled/disabled, device,

OS, location, and more.

l l

Host: Filter based on host Name, OSType, FQDN, UserAgent, CheckType,

UniqueID, Agent-Type, and InstalledSHAs,

RADIUS: Policy Manager ships with a number of vendor-specific namespace dictionaries and distinguishes vendor-specific RADIUS namespaces with the notation RADIUS:vendor (sometimes with an additional suffix for a particular device). To add a dictionary for a vendor-specific RADIUS namespace, navigate to

Administration > Dictionaries > Radius > Import (link).

The notation RADIUS:IETF refers to the RADIUS attributes defined in RFC 2865 and associated RFCs. As the name suggests, RADIUS namespace is only available if the request type is RADIUS.

l Any other supported namespace: See

Rules Editing and Namespaces on page

613

for an exhaustive list of namespaces and their descriptions.

To create new services, you can copy or import other services for use as is or as templates, or you can create a new service.

Name

Description

Monitor Mode

Enter the name or label for the service you want to create.

Enter a description that provides additional information to identify the service. This field is optional.

Optionally check the Enable to monitor network access without enforcement to

ClearPass Policy Manager 6.5 | User Guide Services | 79

Table 30: Service Page (General Parameters) (Continued)

Label Description allow authentication and health validation exchanges to take place between endpoint and Policy Manager, but without enforcement. In Monitor Mode, no enforcement profiles (and associated attributes) are sent to the network device.

Policy Manager also allows Policy Simulation (Monitoring > Policy Simulation), where the administrator can test the results of a particular configuration of policy components.

More Options Select any of the available check boxes to enable the configuration tabs for those options. The available check boxes varies based on the type of service that is selected and may include one or more of the following: l Authorization: Select an authorization source from the drop-down list to add the source or select the Add new Authentication Source link to create a new source.

l l

Posture Compliance: Select a Posture Policy from the drop-down list to add the policy or create a new policy by clicking the link. Select the default Posture token.

Specify whether to enable auto-remediation of non-compliant end hosts. If this is enabled, then enter the Remediation URL. You can specify the Posture Server from the drop-down list or add a new server by clicking the Add new Posture

Server link.

Audit End-hosts: Select an Audit Server, either built-in or customized. Refer to

Configuring Audit Servers on page 281

for audit server configuration steps. For this type of service, you can perform audit Always, When posture is not

available, or For MAC authentication requests.

You can specify to trigger an audit always, when posture is not available, or for

MAC authentication requests. If For MAC authentication requests is specified, then you can perform an audit For known end-hosts only or For unknown end

hosts only, or For all end hosts. Known end hosts are defined as those clients that are found in the authentication source(s) associated with this service.

Performing audit on a client is an asynchronous task, which means the audit can be performed only after the MAC authentication request has been completed and the client has acquired an IP address through DHCP. Once the audit results are available, Policy Manager re-applies policies on the network deviceby one of the following ways: n n

No Action: The audit does not apply policies on the network device after this audit.

Do SNMP bounce: This option bounces the switch port or force an 802.1X reauthentication (both done using SNMP).

NOTE: Bouncing the port triggers a new 802.1X or MAC authentication request by the client. If the audit server already has the posture token and attributes associated with this client in its cache, it returns the token and the attributes to Policy Manager.

l n Trigger RADIUS CoA action: This option sends a RADIUS CoA command to the network device by Policy Manager.

Optionally configure Profiler settings. Select one or more Endpoint Classification items from the drop down list, then select the RADIUS CoA action. You can also create a new action by selecting the Add new RADIUS CoA Action link.

Reordering Services

Policy Manager evaluates requests against the service rules of each service that is configured, in the order in which these services are defined. The service associated with the first matching service rule is then associated

80 | Services ClearPass Policy Manager 6.5 |  User Guide

with this request. To change the order in which service rules are processed, you can change the order of services.

1. To reorder services, navigate to the Configuration > Services page.

2. Click the Reorder button located on the lower-right portion of the page to open the Reorder Services page.

The following figures display the Services page and the Reorder Services page.

Table 31

describes the configuration settings on this page.

Figure 48: Service Reorder Button

Figure 49: Reordering Services

The following table describes the Reorder Services parameters:

Table 31: Reordering Services

Label Description

Name Displays the name of the selected service.

Service Details

Name Shows the name of the selected service.

ClearPass Policy Manager 6.5 | User Guide Services | 81

Table 31: Reordering Services (Continued)

Label Description

Template

Type

Displays the name of the service template used to create the service.

Displays the type of authentication used to create the service.

Description

Status

Service Rule

Shows additional information about the service.

Shows the status of the service from the options: Enabled or Disabled.

Displays the rules used to create the service.

802.1X Wired, 802.1X Wireless, and Aruba 802.1X Wireless

The 802.1X Wired template is designed for wired end-hosts connecting through an Ethernet LAN with authentication using IEEE 802.1X. The 802.1X Wired template allows configuration of both identity and posture-based policies.

The 802.1X Wireless template is intended for wireless end-hosts connecting through an 802.11 wireless access device or controller with authentication using IEEE 802.1X. The 802.1X Wireless template allows configuring both identity and posture based policies.

The Aruba 802.1X Wireless template is designed for wireless end-hosts connecting through an Aruba

802.11 wireless access device or controller with authentication using IEEE 802.1X (service rules customized for

Aruba WLAN controllers).

All three templates are configured using identical parameters.

Figure 50: Service Templates - 802.1X Wired Service Template

To add a new service for the selected service template,

1. Specify a unique Name Prefix (applies only to the selected template) in the General tab.

2. Update the required fields in the Authentication and Enforcement Details sections.

3. Click Add Service. An entry for the new set of configuration is created under the Services, Roles, Role

Mapping, Enforcement Policies and Profiles menus.

The sections shown in the figure and listed above are not same for all service templates. It is recommended to customize the respective templates when you add a new service.

82 | Services ClearPass Policy Manager 6.5 |  User Guide

Once you add a new service to the service template, the service denoted by the Name Prefix appears in the

Select Prefix dropdown. Selecting a prefix from the dropdown populates the existing configuration for the service. Edit the changes and click Edit Service to save the changes.

To delete a service, select the appropriate service from the Select Prefix dropdown and click Delete. All the configured entries under the Services, Authentication Source, Roles, Role Mapping, Enforcement

Policies and Profiles menu are deleted if these entities were created from the service template.

When you edit or delete the entities of a service, a message is displayed at the top of the entity page stating that the selected entity was created through the service template.

Do not delete entities used in service configurations that are not created using the service template.

The following table describes the parameters in the 802.1X Wired, 802.1X Wireless, and Aruba 802.1X Wireless service templates:

Table 32: 802.1X Wired, 802.1X Wireless, and Aruba 802.1X Wireless Service Template Parameters

Parameter

General

Description

Select Prefix Select a prefix from the existing list of prefixes. This populates the pre-configured information in the Authentication and Enforcement Details sections. The Name Prefix field is not editable.

Name Prefix Enter a prefix that is appended to services using this template. Use this to identify the services that use templates.

Authentication

Select

Authentication

Source

Select any available authentication source from the list, the information updated in the

Authentication and Enforcement Details tabs will be auto-populated.

Enter the active directory name. This field is mandatory.

Active

Directory

Name

Description Enter a description that helps you to identify the characteristics of this template. This field is mandatory.

Server

Port

Identity

Password

Enter the hostname or the IP address of the Active Directory server. This field is mandatory.

Enter the TCP port where the server is listening for a connection. This field is mandatory.

Enter the Distinguished Name (DN) of the administrator account. This field is mandatory.

Enter the account password. This field is mandatory.

NETBIOS

Base DN

Enter the server Active Directory domain name. This field is mandatory.

Enter DN of the node in your directory tree from which to start searching for records. This field is mandatory.

Enforcement Details

ClearPass Policy Manager 6.5 | User Guide Services | 83

Table 32: 802.1X Wired, 802.1X Wireless, and Aruba 802.1X Wireless Service Template Parameters (Continued)

Parameter Description

Attribute

Name

The attributes defined in the Authentication Source are listed here. Configure an optional enforcement policy based on the following attributes: l l

Email

Name l l

Phone

UserDN l l

Company member of l Title

For example, you can configure an enforcement policy for a contractor specifying that "If Name equals <contractor_name>, then assign the [Contractor] Role."

Attribute

Value

Enter the active directory attribute value for the selected name in the Attribute Name field.

VLAN ID Enter the standard RADIUS-IETF VLAN ID.

Wired Network Settings

Select Switch

Device Name

Select any switch from the drop-down list.

Enter the name of the device.

IP Address Enter the IP address of the device.

Vendor Name Select the manufacturer of the wired controller.

RADIUS

Shared Secret

Enter the shared secret that is configured on the controller and inside Policy Manager to send and receive RADIUS requests.

Enable

RADIUS CoA

RADIUS CoA

Port

Select to enable RADIUS initiated Change of Authorization (CoA) on the network device.

Specifies the default port 3799 if RADIUS CoA is enabled. Change this value only if you defined a custom port on the network device.

Wireless Network Settings

Enter the name of the wireless controller.

Wireless controller name

Controller

IP Address

Enter the IP address of the wireless controller.

Vendor Name Select the manufacturer of the wireless controller.

RADIUS

Shared Secret

Enter the shared secret that is configured on the controller and Policy Manager to send and receive RADIUS requests.

84 | Services ClearPass Policy Manager 6.5 |  User Guide

Table 32: 802.1X Wired, 802.1X Wireless, and Aruba 802.1X Wireless Service Template Parameters (Continued)

Parameter Description

Enable

RADIUS CoA

Select to enable RADIUS initiated CoA on the network device.

RADIUS CoA

Port

Posture Settings

Specifies the default port 3799 if RADIUS CoA is enabled. Change this value only if you defined a custom port on the network device.

Select the check box to perform health checks post authentication. This enables the Host

Operating System and Quarantine Message fields.

Enable

Posture

Checks

Host

Operating

System

Quarantine

Message

Select the operating system: Windows, Linux, or Mac OS X.

Specify the quarantine message that will appear on the client.

Aruba VPN Access with Posture Checks

This template authenticates Aruba VPN clients connecting remotely to corporate networks. Differentiated access is based on the result of posture checks. This template: l l l l

Configures an AD authentication source

Joins this node to the AD domain

Creates an enforcement policy for AD-based attributes

Creates a NAD

Posture checks are not performed if the High Capacity Guest mode is enabled in the cluster.

You can view only the default user role in the Aruba User Roles for different access privileges tab if the HCG mode is enabled in the cluster.

ClearPass Policy Manager 6.5 | User Guide Services | 85

The following figure displays the Aruba VPN Access with Posture Checks service template:

Figure 51: Aruba VPN access with Posture checks Service Template

The following table describes the Aruba VPN Access with Posture Checks service template parameters:

Table 33: Aruba VPN Access with Posture Checks Service Template Parameters

Parameter Description

General

Select Prefix

Name Prefix

Select a prefix from the existing list of prefixes. This populates the pre-configured information in the Authentication Aruba Wireless Controller for VPN Settings and Aruba User Roles

for different access privileges sections. The Name Prefix field is not editable.

Enter a prefix that you want to append to services using this template. Use this to identify services that use templates.

Authentication

Select

Authentication

Source

Active Directory

Name

Description

Server

Identity

NETBIOS

Select an authentication source from the list. The information provided in the Authentication,

Aruba Wireless Controller for VPN Settings, and Aruba User Roles for different access

privileges sections are auto-populated.

Enter the Active Directory name.

Enter a description that helps you to identify the characteristics of this template.

Enter the hostname or the IP address of the Active Directory server.

Enter the Distinguished Name of the administrator account.

Enter the server Active Directory domain name.

Base DN

Password

Enter the DN of the node in your directory tree from which to start searching for records.

Enter the account password.

Port Enter the TCP port where the server is listening for a connection.

Aruba Wireless Controller for VPN Access

Select Wireless

Controller

Select a wireless controller from the drop-down list.

86 | Services ClearPass Policy Manager 6.5 |  User Guide

Table 33: Aruba VPN Access with Posture Checks Service Template Parameters (Continued)

Parameter Description

Wireless controller name

Enter the name given to the wireless controller.

Controller

IP Address

Vendor Name

RADIUS Shared

Secret

Enable

RADIUS CoA

Enter the wireless controller's IP address.

Select the manufacturer of the wireless controller.

Enter the shared secret that is configured on the controller and inside Policy Manager to send and receive RADIUS requests.

Select this option to enable RADIUS initiated CoA on the network device.

RADIUS CoA Port Specifies the default port 3799 if RADIUS CoA is enabled. Change this value only if you defined a custom port on the network device.

Aruba User Roles for different access privileges - Create a new Enforcement Policy

Enter the initial role of the client before posture checks are performed.

Initial Role

(before posture checks)

Quarantined Role

(failed posture checks)

Enter the role of clients that fail posture checks.

Healthy Role

(passed posture checks)

Enter the role of the client after a posture check is passed and deemed healthy.

Aruba Auto Sign-On

This service template allows you to access the SAML-based single sign on enabled applications (such as Policy

Manager, Guest, Onboard, and Insight) using a network authenticated (802.1X) identity through Aruba controllers.

The following figure displays the Aruba Auto Sign-On service template :

Figure 52: Aruba Auto Sign-On Service Template

ClearPass Policy Manager 6.5 | User Guide Services | 87

The following table describes the Aruba Auto Sign-On service template parameters:

Table 34: ClearPass Aruba Auto Sign-On Service Template Parameters

Parameter

General

Description

Select Prefix

Name Prefix

Select a prefix from the existing list of prefixes. This field populates the pre-configured information in the Authentication, SP details, and Enforcement Details sections. The Name Prefix field is not editable.

Enter a prefix that you want to append to services using this template. Use this to identify services that use templates.

Authentication

Select

Authentication

Source

Select an authentication source from the list. The information provided in the Authentication,

Enforcement Details, and SP details tabs are auto-populated.

Enter the hostname or the IP address of the Active Directory server. This field is mandatory.

Active

Directory

Name

Description Enter a description that helps you to identify the characteristics of this template. This field is mandatory.

Server

Identity

NETBIOS

Base DN

Enter the hostname or the IP address of the Active Directory server. This field is mandatory.

Enter the DN of the administrator account. This field is mandatory.

Enter the server Active Directory domain name. This field is mandatory.

Enter the DN of the administrator account. This field is mandatory.

Password

Port

Enter the account password. This field is mandatory.

Enter the TCP port where the server is listening for a connection. This value defaults to 389. This field is mandatory.

Enforcement Details

Create new

Enforcement

Policy

The attributes defined in the authentication source are listed here. Configure an optional enforcement policy based on the following attributes: l l

Department

Email l l l

Name

Phone

UserDN l l company memberOf l Title

For example, you can configure an enforcement policy for a contractor as

"If Name equals <contractor_name>, then assign the [Contractor] Role."

88 | Services ClearPass Policy Manager 6.5 |  User Guide

Table 34: ClearPass Aruba Auto Sign-On Service Template Parameters (Continued)

Parameter Description

SP Details

SP URL Enter the Service Provider (SP) URL.

Attribute

Name

Attribute

Value

Enter attribute names and assign values to those names. These name/value pairs are included in

SAML responses.

Certificate/Two-factor Authentication for ClearPass Application Login

This template is designed to allow the administrators and operators to log in to CPPM using smart card and TLS certificates. Ensure that the services are configured using Certificate/Two-factor Authentication for

ClearPass Application Login service template to log in using smart card and TLS certificates.

The following figure displays the Certificate/Two-factor Authentication for ClearPass Application Login service template:

Figure 53: Certificate/Two-factor Authentication Service Template

The following table describes the Certificate/Two-factor Authentication for ClearPass Application Login service template parameters:

Table 35: ClearPass Certificate/Two-factor Authentication Service Template Parameters

Parameter

General

Description

Select Prefix Select a prefix from the existing list of prefixes. This field populates the pre-configured information in the Authentication, SP details, and Enforcement Details sections. The Name Prefix field is not editable.

Name Prefix Enter a prefix that you want to append to services using this template. Use this to identify services that use templates.

Service Rule

Application Select the application for which SAML-based Single Sign-On (SSO) should be enabled from the following options: Policy Manager, Guest, Insight, and Onboard.

Authentication

ClearPass Policy Manager 6.5 | User Guide Services | 89

Table 35: ClearPass Certificate/Two-factor Authentication Service Template Parameters (Continued)

Parameter Description

Select

Authentication

Source

Select an authentication source from the list. The information provided in the Authentication,

Enforcement Details, and SP details tabs are auto-populated.

Active

Directory

Name

Description

Enter the hostname or the IP address of the Active Directory server. This field is mandatory.

Enter a description that helps you to identify the characteristics of this template. This field is mandatory.

Enter the hostname or the IP address of the Active Directory server. This field is mandatory.

Server

Port

Identity

Password

NETBIOS

Base DN

Enter the TCP port where the server is listening for a connection. The default value is value defaults to 389. This field is mandatory.

Enter the DN of the administrator account. This field is mandatory.

Enter the account password. This field is mandatory.

Enter the server Active Directory domain name. This field is mandatory.

Enter the DN of the administrator account. This field is mandatory.

IdP Details

Page Name Select the Web Login pages from the drop-down list.

To create a new Web Login page, click the Add new Guest Web Login page link. This opens the

ClearPass Guest application in which you can create a new Guest Web Login page. Select Single

Sign On -SAML Identity Provider in the Vendor Settings field in the Web Login page

(ClearPass Guest > Configuration > Pages > Web Logins) to log in using smart card and TLS certificates. When you select Optional - Request a client certificate from the user, but allow none from the Client Certificate field, user need to provide certificate, username, and password. When you select Required - Require a client certificate from the user from the Client Certificate field, user need to provide only certificates for authentication. This enables the Authentication field with the following drop-down options: l l

Certificate only - No username or password required - Need only certificate authentication.

Credentials - Also require a username and password - Need username and password

Enforcement Details

90 | Services ClearPass Policy Manager 6.5 |  User Guide

Table 35: ClearPass Certificate/Two-factor Authentication Service Template Parameters (Continued)

Parameter Description

Certificate

Attribute -

Super Admin

Condition

Select the certificate attribute from the drop-down list. Enter the value in the Super Admin

Condition field that matches the Certificate Attribute value to provide the super administrator access.

Select the certificate attribute from the drop-down list. Enter the value in the Read Only Admin

Condition field that matches the Certificate Attribute value to provide the Read Only administrator access.

Certificate

Attribute -

Read Only

Admin

Condition

Certificate

Attribute -

Help Desk

Admin

Condition

Select the certificate attribute from the drop-down list. Enter the value in the Help Desk Admin

Condition field that matches the Certificate Attribute value to provide the help desk administrator access.

ClearPass Admin Access

This template is designed for services that authenticate users against Active Directory (AD). Use AD attributes to determine appropriate privilege levels for ClearPass Policy Manager admin access.

The following figure displays the ClearPass Admin Access service template:

Figure 54: ClearPass Admin Access Service Template

The following table describes the ClearPass Admin Access service template parameters:

Table 36: ClearPass Admin Access Service Template Parameters

Parameter

General

Description

Select Prefix

Name Prefix

Select a prefix from the existing list of prefixes. This populates the pre-configured information in the Authentication and Role Mapping sections. The Name Prefix field is not editable.

Enter a prefix that you want to append to services using this template. Use this to identify services that use templates.

Authentication

Select

Authentication

Select an authentication source from the list. The information updated in the Authentication and

Role Mapping tabs are auto-populated.

ClearPass Policy Manager 6.5 | User Guide Services | 91

Table 36: ClearPass Admin Access Service Template Parameters (Continued)

Parameter Description

Source

Active

Directory

Name

Description

Enter the hostname or the IP address of the Active Directory server. This field is mandatory.

Server

Identity

NETBIOS

Base DN

Enter a description that helps to identify the characteristics of this template. This field is mandatory.

Enter the hostname or the IP address of the Active Directory server. This field is mandatory.

Enter the DN of the administrator account. This field is mandatory.

Password

Port

Role Mapping

Attribute

Name

Select the active directory attribute.

Defines the various privilege levels.

Super Admin

Condition

Read Only

Admin

Condition

Help Desk

Condition

Enter the server Active Directory domain name. This field is mandatory.

Enter the DN of the administrator account. This field is mandatory.

Enter the account password. This field is mandatory.

Enter the TCP port where the server is listening for a connection. This field is mandatory.

ClearPass Admin SSO Login (SAML SP Service)

This application service template allows Security Asserting Markup Language (SAML) based Single Sign-On (SSO) authenticated users to access Policy Manager, Guest, Insight, and Operator pages.

The following figure displays the ClearPass Admin SSO Login service template:

Figure 55: ClearPass Admin SSO Login (SAML SP Service) Service Template

92 | Services ClearPass Policy Manager 6.5 |  User Guide

The following table describes the ClearPass Admin SSO Login service template parameters:

Table 37: ClearPass Admin SSO Login Service Template Parameters

Parameter Description

General

Select Prefix Select a prefix from the existing list of prefixes. This populates the pre-configured information in the

Service Rule tab. The Name Prefix field is not editable.

Name Prefix Enter a prefix that you want to append to services using this template. Use this to identify services that use templates.

Service Rule

Application Select the application that single-sign-on-authenticated administrative users can access.

ClearPass Identity Provider (SAML IdP Service)

This template is designed for services that act as an Identity Provider (IdP). This IdP feature allows the layer-2 device, RADIUS server, and SAML IdP to work together and deliver application-based single sign-on using network authentication information.

The following figure displays the ClearPass Identity Provider (SAML IdP Service) service template:

Figure 56: Identity Provider (SAML IdP Service)

The following table describes the ClearPass Identity Provider (SAML IdP Service) service template parameters:

Table 38: ClearPass Identity Provider (SAML IdP Service) Service Template Parameters

Parameter

General

Description

Select Prefix Select a prefix from the existing list of prefixes. This populates the pre-configured information in the Authentication and SP Details sections. The Name Prefix field is not editable.

Name Prefix Enter a prefix that you want to append to services using this template. Use this to identify services that use templates.

Authentication

Select

Authentication

Source

Select an authentication source from the list, the information updated in the Authentication and

SP Details tabs are auto-populated.

ClearPass Policy Manager 6.5 | User Guide Services | 93

Table 38: ClearPass Identity Provider (SAML IdP Service) Service Template Parameters (Continued)

Parameter Description

Active

Directory

Name

Enter the hostname or the IP address of the Active Directory server. This field is mandatory.

Description

Server

Identity

NETBIOS

Base DN

Password

Port

SP Details

SP URL

Enter a description that helps you to identify the characteristics of this template. This field is mandatory.

Enter the hostname or the IP address of the Active Directory server. This field is mandatory.

Enter the DN of the administrator account. This field is mandatory.

Enter the server Active Directory domain name. This field is mandatory.

Enter the DN of the administrator account. This field is mandatory.

Enter the account password. This field is mandatory.

Enter the TCP port where the server is listening for a connection. This field is mandatory.

Attribute

Name

Attribute

Value

Enter the Service Provider (SP) URL.

Enter the name of the attributes and assign values to those names. These name/value pairs are included in SAML responses.

Device Mac Authentication

This template is designed for authenticating guest devices based on their MAC address. You can limit the network access for guest devices that do not have user directly associated with them for a specific duration in days or the bandwidth limit.

The following figure displays the Device Mac Authentication service template:

Figure 57: Device Mac Authentication Service Template

94 | Services ClearPass Policy Manager 6.5 |  User Guide

The following table describes the parameters used in the Device Mac Authentication service template:

Table 39: Device Mac Authentication Template Parameters

Parameter

General

Description

Select Prefix

Name Prefix

Network Settings

Select Device Select a pre-configured device from the drop-down list. To create a new device, leave this field blank and enter the remaining fields.

Device Name

IP Address

The name of the device is populated automatically based on the device selected from the

Select Device field. If you create a new device, enter the name of the device.

The IP address of the device is populated automatically based on the device selected from the

Select Device field. If you create a new device, enter the name of the device.

Vendor Name

Select a prefix from the existing list of prefixes. This populates the pre-configured information in the Authentication and SP Details sections. The Name Prefix field is not editable.

Enter a prefix that you want to append to services using this template. Use this to identify services that use templates.

RADIUS Shared

Secret

Enable RADIUS

CoA

The name of the manufacturer of the device is populated automatically based on the device selected from the Select Device field. If you create a new device, enter the name of the manufacturer of the device.

Enter the shared secret that is configured on the controller and inside Policy Manager to send and receive RADIUS requests.

Select to enable RADIUS initiated Change of Authorization (CoA) on the network device.

RADIUS CoA Port Specifies the default port 3799 if RADIUS CoA is enabled. Change this value only if you defined a custom port on the network device.

Device Access Restrictions

Days allowed for access

Select the days on which network access is allowed.

Maximum bandwidth allowed per device

Enter a number to set an upper limit for the amount of data in megabytes to which a device is allowed per day. A value of 0 (zero), the default, means no limit is set.

EDUROAM Service

This template is designed for the following scenarios: l l l

Local campus users connecting to eduroam from the local wireless network.

Roaming users from an eduroam campus connecting to their campus network.

Roaming users connecting from local campus or other campuses that are part of the eduroam federation.

ClearPass Policy Manager 6.5 | User Guide Services | 95

You cannot view the EDUROAM service template if the HCG mode is enabled in the cluster.

The following figure displays the EDUROAM service template:

Figure 58: EDUROAM Service Template

The following table describes the parameters used in the EDUROAM service template:

Table 40: EDUROAM Service Template Parameters

Parameter

General

Description

Select Prefix Select a prefix from the existing list of prefixes. This populates the pre-configured information in the Authentication, Service Rule, Wireless, andFederation Level Radius

Server (FLR) tabs. The Name Prefix field is not editable.

Name Prefix Enter a prefix that you want to append to services using this template. Use this to identify services that use templates.

Service Rule

Enter domain details

Select Vendor

Authentication

Select Active

Directory

Active Directory

Name

Description

Enter the domain name of the network. For example, @edunet.ucla.com. This field is mandatory.

Select the vendor of the network device. This field is mandatory.

Select an authentication source from the list, the information updated in the Authentication,

Wireless, and Federation Level Radius Server (FLR) tabs are auto-populated.

Enter the hostname or the IP address of the Active Directory server. This field is mandatory.

Server

Identity

NETBIOS

Enter a description that helps you identify the characteristics of this template. This field is mandatory.

Enter the hostname or the IP address of the Active Directory server. This field is mandatory.

Enter the DN of the administrator account. This field is mandatory.

Enter the server Active Directory domain name. This field is mandatory.

96 | Services ClearPass Policy Manager 6.5 |  User Guide

Table 40: EDUROAM Service Template Parameters (Continued)

Parameter Description

Base DN Enter the DN of the administrator account. This field is mandatory.

Password

Port

Enter the account password. This field is mandatory.

Enter the TCP port where the server is listening for a connection. This field is mandatory.

Wireless Network Settings

Select wireless controller

Select a wireless controller from the drop-down list.

Enter the name given to the wireless controller.

Wireless controller name

Controller

IP Address

Vendor Name

Enter the IP address of the wireless controller.

RADIUS Shared

Secret

Select the manufacturer of the wireless controller.

Enter the shared secret that is configured on the controller and inside Policy Manager to send and receive RADIUS requests.

Enable RADIUS CoA Select to enable RADIUS initiated CoA on the network device.

RADIUS CoA Port Specifies the default port 3799 if RADIUS CoA is enabled. Change this value only if you defined a custom port on the network device.

Federation Level RADIUS Server (FLR)

Host Name Enter the hostname of the federation RADIUS server.

IP Address

Vendor Name

RADIUS Shared

Secret

Enter the IP address of the federation RADIUS server.

Select the manufacturer of the wireless controller.

Enter the shared secret that is configured on the controller and inside Policy Manager to send and receive RADIUS requests.

Enable RADIUS CoA Select to enable RADIUS initiated CoA on the network device.

RADIUS CoA Port Specifies the default port 3799 if RADIUS CoA is enabled. Change this value only if you defined a custom port on the network device.

RADIUS

Authentication Port

Enter a port number here.

RADIUS Accounting

Port

Enter a port number here.

ClearPass Policy Manager 6.5 | User Guide Services | 97

Encrypted Wireless Access via 802.1X Public PEAP method

This template is designed for providing encrypted wireless access to users using fixed 802.1X PEAP credentials.

This template configures an EAP PEAP Public type authentication method and creates enforcement policy for network access.

The following figure displays the Encrypted Wireless Access via 802.1X Public PEAP method service template:

Figure 59: Encrypted Wireless Access via 802.1X Public PEAP method Service Template

The following table describes the parameters used in the Encrypted Wireless Access via 802.1X Public

PEAP method service template:

Table 41: Encrypted Wireless Access via 802.1X Public PEAP Method Service Template Parameters

Parameter Description

General

Name Prefix Enter a prefix that you want to append to services using this template. You can use this to identify services that use templates.

Wireless Network Settings

Select wireless controller

Select a wireless controller from the drop-down list.

Enter the name given to the wireless controller.

Wireless controller name

Controller

IP Address

Vendor Name

Enter the IP address of the wireless controller.

RADIUS Shared

Secret

Select the manufacturer of the wireless controller.

Enter the shared secret that is configured on the controller and inside Policy Manager to send and receive RADIUS requests.

Enable RADIUS CoA Select to enable RADIUS initiated CoA on the network device.

RADIUS CoA Port Specifies the default port 3799 if RADIUS CoA is enabled. Change this value only if you defined a custom port on the network device.

Authentication Method

Public Username Enter public username for EAP PEAP Public type authentication method.

98 | Services ClearPass Policy Manager 6.5 |  User Guide

Table 41: Encrypted Wireless Access via 802.1X Public PEAP Method Service Template Parameters (Continued)

Parameter Description

Public Password Enter password for EAP PEAP Public type authentication method.

Access Restrictions

Days allowed for access

Select the days on which network access is allowed.

Guest Access Web Login

This service authenticates guests logging in using the Guest portal. To use this service, create a Guest Web

Login page that sets the Pre-Auth Check option to AppAuth - Check using Aruba Application

Authentication.

The following figure displays the Guest Access Web Login service template:

Figure 60: Guest Access Web Login Service Template

The following table describes the Guest Access Web Login service template parameters:

Table 42: Guest Web Login Service Template Parameters

Parameter

General

Description

Select Prefix

Name Prefix

Select any one prefix from the existing list of prefixes. This populates the pre-configured information in the Service Rule and Guest Web Login sections. The Name Prefix field is not editable.

Enter a prefix that you want to append to services using this template. Use this to identify services that use templates.

Service Rule

Page name Enter the name of the Guest Web Login page.

Add new

Guest Web

Login page

Click this link to launch a new Web UI session for the Guest Web Login page.

Guest Access Restrictions

Days allowed for access

Select the duration in number of days to enable on which the guest users are allowed network access.

ClearPass Policy Manager 6.5 | User Guide Services | 99

Guest Access

This template is designed for authenticating guest users who log in using captive portal. Guests must reauthenticate after session expiry. Guest access can be restricted based on day of the week, bandwidth limit, and number of unique devices used by the guest user.

The following figure displays the Guest Access service template:

Figure 61: Guest Access Service Template

The following table describes the parameters used in the Guest Access service template:

Table 43: Guest Access Service Template Parameters

Parameter

General

Description

Select Prefix Select any one prefix from the existing list of prefixes. This populates the pre-configured information in the Wireless Network Settings and Guest Access Restrictions sections. The

Name Prefix field is not editable.

Name Prefix Enter a prefix that you want to append to services using this template. Use this to identify services that use templates.

Wireless Network Settings

Enter the SSID value here.

Wireless SSID for Guest access

Select the wireless controller from the drop-down list if you already configured.

Select wireless controller

Wireless controller name

Enter the name of the wireless controller.

Controller

IP Address

Vendor Name

Enter the wireless controller's IP address.

Enable

RADIUS CoA

Select the manufacturer of the wireless controller.

RADIUS Shared

Secret

Enter the shared secret that is configured on the controller and inside Policy Manager to send and receive RADIUS requests.

Select to enable RADIUS initiated CoA on the network device.

100 | Services ClearPass Policy Manager 6.5 |  User Guide

Table 43: Guest Access Service Template Parameters (Continued)

Parameter Description

RADIUS CoA

Port

Specifies the default port 3799 if RADIUS CoA is enabled. Change this value only if you defined a custom port on the network device.

Posture Settings

Enable Posture

Checks

Select the check box to perform health checks post authentication. This enables the Host

Operating System and Quarantine Message fields.

Host Operating

System

Quarantine

Message

Select the operating system: Windows, Linux, or Mac OS X.

Specify the quarantine message that will appear on the client.

Guest Access Restrictions

Days allowed for access

Maximum bandwidth allowed per user

Select the duration in number of days to enable on which the guest users are allowed network access.

Enter a number to set an upper limit for the amount of data in megabytes to which a user is allowed per day. A value of 0 (zero), the default, means no limit is set.

Guest MAC Authentication

This template is designed for authenticating guest accounts based on the cached MAC Addresses used during authentication. A guest can belong to a specific role such as Contractor, Guest, or Employee, and each role can have different lifetime for the cached MAC Address.

The following figure displays the Guest MAC Authentication service template:

Figure 62: Guest MAC Authentication Service Template

ClearPass Policy Manager 6.5 | User Guide Services | 101

The following table describes the Guest MAC Authentication service template parameters:

Table 44: Guest MAC Authentication Service Template Parameters

Parameter

General

Description

Select Prefix

Name Prefix

Select a prefix from the existing list of prefixes. This populates the pre-configured information in the Wireless Network Settings, MAC Caching Settings, and Guest Access restrictions tabs. The Name Prefix field is not editable.

Enter a prefix that you want to append to services using this template. Use this to identify services that use templates.

Wireless Network Settings

Wireless SSID for

Guest access

Enter the SSID name of your network.

Select the wireless controller from the drop-down list if you already configured.

Select wireless controller

Wireless controller name

Enter the name of the wireless controller.

Enter the wireless controller's IP address.

Controller

IP Address

Vendor Name

RADIUS Shared

Secret

Enable

RADIUS CoA

Select the manufacturer of the wireless controller.

Enter the shared secret that is configured on the controller and inside Policy Manager to send and receive RADIUS requests.

Select to enable RADIUS initiated CoA on the network device.

RADIUS CoA Port Specifies the default port 3799 if RADIUS CoA is enabled. Change this value only if you defined a custom port on the network device.

MAC Caching Settings

Cache duration for Guest Role

Enter the duration in number of days the MAC account will remain valid for the Guest role.

After this the guest must re-authenticate using captive portal.

NOTE: You must enter cache duration for at least one role.

Cache duration for Employee role

Enter the duration in number of days the MAC account will remain valid for the Employee role.

After this the guest must re-authenticate using captive portal.

Cache duration for Contractor role

Enter the duration in number of days the MAC account will remain valid for the Contractor role. After this the guest must re-authenticate using captive portal.

Posture Settings

Enable Posture Select the check box to perform health checks post authentication. This enables the Host

102 | Services ClearPass Policy Manager 6.5 |  User Guide

Table 44: Guest MAC Authentication Service Template Parameters (Continued)

Parameter Description

Checks Operating System and Quarantine Message fields.

Host Operating

System

Quarantine

Message

Initial Role/VLAN

Select the operating system: Windows, Linux, or Mac OS X.

Specify the quarantine message that will appear on the client.

Enter the initial role of the client before posture checks are performed.

Enter the role of clients that fail posture checks.

Quarantine

Role/VLAN

Guest Access Restrictions

Days allowed for access

Maximum number of devices allowed per user

Select the duration in number of days to enable on which the guest users are allowed network access.

Enter a number to define how many devices users can connect to the network.

Maximum bandwidth allowed per user

Enter a number to set an upper limit for the amount of data in megabytes to which a user is allowed per day. A value of 0 (zero), the default, means no limit is set.

Guest Social Media Authentication

This template is designed for authenticating guest users logging in through captive portal with their social media accounts such as Google, Facebook, LinkedIn, and Twitter. Guests must re-authenticate after the session ends.

ClearPass Policy Manager 6.5 | User Guide Services | 103

The following figure displays the Guest Social Media Authentication service template:

Figure 63: Guest Social Media Authentication Service Template

The following table describes the Guest Social Media Authentication service template parameters:

Table 45: Guest Social Media Service Template Parameters

Parameter

General

Description

Select Prefix Select a prefix from the existing list of prefixes. This populates the pre-configured information in the Wireless Network Settings, MAC Caching Settings, and Guest Access restrictions tabs.

The Name Prefix field is not editable.

Name Prefix Enter a prefix that you want to append to services using this template. Use this to identify services that use templates.

Wireless Network Settings

Select wireless controller

Select the wireless controller from the drop-down list if you already configured.

Wireless controller name

Enter the name of the wireless controller.

Enter the wireless controller's IP address.

Controller

IP Address

Vendor Name

RADIUS

Shared Secret

Enable

RADIUS CoA

Select the manufacturer of the wireless controller.

Enter the shared secret that is configured on the controller and inside Policy Manager to send and receive RADIUS requests.

Select to enable RADIUS initiated CoA on the network device.

RADIUS CoA

Port

Specifies the default port 3799 if RADIUS CoA is enabled. Change this value only if you defined a custom port on the network device.

Guest Access Restrictions

104 | Services ClearPass Policy Manager 6.5 |  User Guide

Table 45: Guest Social Media Service Template Parameters (Continued)

Parameter Description

Select the social media network options: Google, Facebook, LinkedIn, and Twitter.

Social login

Provider

Days allowed for access

Maximum bandwidth allowed per user

Select the duration in number of days to enable on which the guest users are allowed network access.

Enter a number to set an upper limit for the amount of data in megabytes to which a user is allowed per day. A value of 0 (zero), the default, means no limit is set.

OAuth2 API User Access

This template is designed for configuration that supports ClearPass Policy Manager to authenticate API clients with username and OAuth2 grant type password. The OAuth2 API User Access service template uses the

Guest Operator Logins as the default enforcement policy. The Local User Repository and Admin User

Repository repositories are used as the default authentication sources.

The following figure displays the OAuth2 API User Access service template:

Figure 64: OAuth2 API User Access Service Template

The following table describes the OAuth2 API User Access service template parameters:

Table 46: OAuth2 API User Access Service Template Parameters

Description Parameter

General

Select Prefix

Name Prefix

Select a prefix from the existing list of prefixes.

Enter a prefix that is appended to services using this template. You can use this prefix to identify the services that use templates.

Onboard

This template is designed for configuration that allows to perform checks before allowing Onboard provisioning for Bring Your Own Device (BYOD) use-cases. This service creates an Onboard Pre-Auth service to check the user's credentials before starting the device provisioning process. This also creates an authorization service that checks whether a user's device can be provisioned using Onboard. Use an 802.1X Wireless service to authenticate users prior to device provisioning with Onboard and after device provisioning is completed.

ClearPass Policy Manager 6.5 | User Guide Services | 105

You cannot view the Onboard service template if the High Capacity Guest mode is enabled in the cluster.

The following figure displays the Onboard Authorization service template:

Figure 65: Onboard Authorization Service Template

The following table describes the Onboard Authorization service template parameters:

Table 47: Onboard Authorization Service Template Parameters

Parameter Description

General

Select Prefix Select a prefix from the existing list of prefixes. This populates the pre-configured information in the Wireless Network Settings, Device Access Restrictions, and Provisioning Wireless

Network Settings sections. The Name Prefix field is not editable.

Name Prefix

Wireless controller name

Enter a prefix that you want to append to services using this template. Use this to identify services that use templates.

Wireless Network Settings

Select the wireless controller from the drop-down list if you already configured.

Select wireless controller

Enter the name given to the wireless controller.

Enter the wireless controller's IP address.

Controller

IP Address

Vendor

Name

RADIUS

Shared

Secret

Select the manufacturer of the wireless controller.

Enter the shared secret that is configured on the controller and inside Policy Manager to send and receive RADIUS requests.

Enable

RADIUS CoA

RADIUS CoA

Port

Select to enable RADIUS initiated CoA on the network device.

Specifies the default port 3799 if RADIUS CoA is enabled. Change this value only if you defined a custom port on the network device.

106 | Services ClearPass Policy Manager 6.5 |  User Guide

Table 47: Onboard Authorization Service Template Parameters (Continued)

Parameter Description

Device Access Restrictions

Days allowed for access

Select the duration in number of days to enable on which the guest users are allowed network access.

Provisioning Wireless Network Settings

Enter the SSID of your network.

Wireless

SSID for

Onboard

Provisioning

Add new

Onboard

Network settings

Click the Add new Onboard Network settings link to launch the Web UI to modify the Onboard

Network settings.

User Authentication with MAC Caching

This template is designed for authenticating users once using captive portal and later to allow log-ins using cached MAC Address of the device. Users first log-in using captive portal and their MAC addresses are cached.

Subsequent log-ins will use MAC authentication and bypass the captive portal. Network access can be restricted based on day of the week, bandwidth limit, or number of unique devices used by the user. The cache lifetime of the MAC address can vary according to the user's role such as Guest, Employee, or Contractor and after that the user will have to re-authenticate through captive portal. Posture checks can be enabled, optionally, to validate the client device for AntiVirus, AntiSypware, Firewall status. These results will determine the enforcement for the device.

ClearPass Policy Manager 6.5 | User Guide Services | 107

The following figure displays the User Authentication with MAC Caching service template:

Figure 66: User Authentication with MAC Caching Service Template

The following table describes the User Authentication with MAC Caching service template parameters:

Table 48: User Authentication with MAC Caching Service Template Parameters

Parameter

General

Description

Select Prefix Select a prefix from the existing list of prefixes. This populates the pre-configured information in the Wireless Network Settings, MAC Caching Settings, and Guest

Access restrictions tabs. The Name Prefix field is not editable.

Name Prefix Enter a prefix that you want to append to services using this template. Use this to identify services that use templates.

Authentication

Select Authentication

Source

Select the authentication source from the drop-down list. Select Create a new Active

Directory option to select a new authentication source.

Wireless Network Settings

Wireless SSID Enter the SSID name of your network.

Select the wireless controller from the drop-down list if you already configured.

Select wireless controller

Wireless controller name

Enter the name of the wireless controller.

Controller IP Address

Vendor Name

Enter the wireless controller's IP address.

Select the manufacturer of the wireless controller.

RADIUS Shared Secret Enter the shared secret that is configured on the controller and inside Policy Manager to send and receive RADIUS requests.

Select to enable RADIUS initiated CoA on the network device.

Enable RADIUS CoA

RADIUS CoA Port Specifies the default port 3799 if RADIUS CoA is enabled. Change this value only if you defined a custom port on the network device.

108 | Services ClearPass Policy Manager 6.5 |  User Guide

Table 48: User Authentication with MAC Caching Service Template Parameters (Continued)

Parameter Description

MAC Caching Settings

Cache duration for

Employee

Cache duration for

Guest

Cache duration for

Contractor role

Enter the duration from the options: One day, One week, One month, or Six months to which the MAC account will remain valid for the Employee role. After this the guest must re-authenticate using captive portal.

Enter the duration from the options: Account Expiry Time, One day, One week, One month, or Six months to which the MAC account will remain valid for the Guest role. After this the guest must re-authenticate using captive portal.

NOTE: You must enter cache duration for at least one role.

Enter the duration from the options: Account Expiry Time, One day, One week, One month, or Six months to which the MAC account will remain valid for the Contractor role. After this the guest must re-authenticate using captive portal.

Posture Settings

Enable Posture Checks Select the check box to perform health checks post authentication.

Host Operating

System

Select the type of the host operating system: Windows, Linux, or Mac OS X.

Quarantine Message

Initial Role/VLAN

Specify the quarantine message that will appear on the client.

Enter the initial role of the client before posture checks are performed.

Quarantine Role/VLAN Enter the role of clients that fail posture checks.

Access Restrictions

Enter the Guest role to which the access to be restricted.

Guest Role/VLAN

Employee Role/VLAN Enter the Employee role to which the access to be restricted.

Enter the Contractor role to which the access to be restricted.

Contractor Role/VLAN

Captive Portal

Role/VLAN

Enter the Captive Portal role to which the access to be restricted.

Days allowed for access

Maximum number of devices allowed per user

Maximum bandwidth allowed per user

Select the duration in number of days to enable on which the guest users are allowed network access.

Enter a number to define how many devices users can connect to the network.

Enter a number to set an upper limit for the amount of data in megabytes to which a user is allowed per day. A value of 0 (zero), the default, means no limit is set.

ClearPass Policy Manager 6.5 | User Guide Services | 109

Policy Manager Service Types

The following service types are available in Policy Manager: l

l l l l l l l l l l l l l l l

Aruba 802.1X Wireless on page 110

802.1X Wireless on page 121

802.1X Wired on page 122

MAC Authentication on page 122

Web-based Authentication on page 123

Web-based Health Check Only on page 124

Web-based Open Network Access on page 125

802.1X Wireless - Identity Only on page 126

802.1X Wired - Identity Only on page 126

RADIUS Enforcement (Generic) on page 126

RADIUS Proxy on page 127

RADIUS Authorization on page 128

TACACS+ Enforcement on page 129

Aruba Application Authentication on page 129

Aruba Application Authorization on page 130

Cisco Web Authentication Proxy on page 130

Aruba 802.1X Wireless

Configure this service for wireless hosts by connecting through an Aruba 802.1X wireless access device or controller with authentication using IEEE 802.1X. Service rules are customized for a typical Aruba WLAN

Controller deployment. By default, the Aruba 802.1X service includes a rule that specifies that an Aruba ESSID exists.

The following are the default configuration tabs available in the Add Service (Configuration > Services >

Add) page: l l l l l

Service Tab on page 111

Authentication Tab on page 113

Roles Tab on page 115

Enforcement Tab on page 117

Summary Tab on page 121

You can also select the following additional tabs by checking the More Options field to access these configuration tabs: l l l l l

Authorization Tab on page 114

Posture Tab on page 116

Audit Tab on page 118

Profiler Tab on page 119

Accounting Proxy Tab on page 120

110 | Services ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Aruba 802.1X Wireless service configuration fields:

Figure 67: Aruba 802.1X Wireless Service

Service Tab

The Service tab includes basic information about the service. The Service Rules section defines a set of criteria that supplicants must match to trigger the service. Some service templates have one or more rules predefined. You can click on a service rule to modify any of its options.

The following figure displays the Service tab:

Figure 68: Aruba 802.1X Wireless Service - Service Tab

The following table displays the Service tab parameters:

Table 49: Aruba 802.1X Wireless Service - Service Tab Parameters

Parameter Description

Type Select a service from the drop-down list that defines what type of service can be configured.

Name

Description

Monitor Mode

Enter the name of the service.

Provide additional information that helps to identify the service.

Check this box to exclude enforcement.

ClearPass Policy Manager 6.5 | User Guide Services | 111

Table 49: Aruba 802.1X Wireless Service - Service Tab Parameters (Continued)

Parameter Description

Check these boxes to access the additional configuration tabs.

More Options

Service Rule

Type

Name

Operator

Value

Select the service rule type from the drop-down list.

Select the name of the service rule from the drop-down list.

Select an appropriate operator from the list of operators for the data type of the attribute. For example, you can select from BELONGS_TO, NOT_BELONGS_

TO, CONTAINS, or EQUALS.

Select the value from the drop-down list depends on the operator selected.

Service rules define a set of criteria that supplicants must match to trigger the service. Some service templates have one or more rules pre-defined. Click on a service rule to modify its options.

If you want to administer the same set of policies for wired and wireless access, you can combine the service rule to define one single service. The other option is to keep two services for wired and wireless access, but re-use the policy components (authentication methods, authentication source, authorization source, role mapping policies, posture policies, and enforcement policies) in both services.

112 | Services ClearPass Policy Manager 6.5 |  User Guide

Authentication Tab

The Authentication tab contains options for configuring authentication methods and authentication sources. The following figure displays the Authentication tab:

Figure 69: Aruba 802.1X Wireless Service - Authentication Tab

ClearPass Policy Manager 6.5 | User Guide Services | 113

The following table displays the Authentication tab parameters:

Table 50: Aruba 802.1X Wireless Service - Authentication Tab Parameters

Parameter Description

Authentication Methods Select authentication methods using the Select to Add field used for this service depend on the 802.1X supplicants and the type of authentication methods you choose to deploy. Policy Manager automatically selects the appropriate method for authentication, when a user attempts to connect. The common types, which are automatically selected include the following examples: l

EAP PEAP l l

EAP FAST

EAP TLS l EAP TTLS

The EAP-MD5 authentication type is not supported if you use ClearPass

Policy Manager in the FIPS mode.

The order of authentication is significant, when a client tries to perform an 802.1X authentication. Policy Manager proposes the first authentication method configured. However, the client can accept the authentication method proposed by Policy Manager and continue authentication or send a Negative-Acknowledgment (NAK) and propose a different authentication method. If the newly proposed authentication method is also configured, then the authentication proceeds, otherwise authentication fails.

If most of the clients in the network use a specific authentication method, that authentication method should be configured first in the list. This would reduce the number of RADIUS packets exchanged.

For more information, see the following: l

Adding and Modifying Authentication Methods on page 137

l

Adding and Modifying Authentication Sources on page 161

.

Authentication Sources Specify the authentication sources using the Select to Add field. This can be one or more instances of the following examples: l

Active Directory l l l l

LDAP Directory

SQL DB

Token Server

Policy Manager local DB

Strip Username Rules Select the check box to pre-process the user name (to remove prefixes and suffixes) before authenticating and authorizing against the authentication source.

Authorization Tab

Use the Authorization tab to select the authorization sources for this service. The Authorization tab is not displayed by default. To access this tab, select the Authorization check box from More Options on the

Services tab. Policy Manager fetches role mapping attributes from the authorization sources associated with the service, regardless of which authentication source was used to authenticate the user. For a given service, role mapping attributes are fetched from the following authorization sources: l l

Authorization sources associated with the authentication source

Authorization sources associated with the service

114 | Services ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Authorization tab:

Figure 70: Aruba 802.1X Wireless Service - Authorization Tab

The following table displays the Authorization tab parameters:

Table 51: Aruba 802.1X Wireless Service - Authorization Tab Parameters

Parameter

Authentication Source

Description

Displays the authorization sources from which role mapping attributes are fetched for each authentication source.

Attributes Fetched From Displays the source of attributes.

Select the additional authorization sources using the Select to Add drop-down list.

Additional authorization sources from which to fetch role-mapping attributes

For more information on configuring authorization sources, see

Adding and Modifying Authentication

Methods on page 137 .

Roles Tab

Use the Roles tab to associate a role mapping policy with this service. The following figure displays the Aruba

802.1X Wireless Service - Roles tab:

Figure 71: Aruba 802.1X Wireless Service - Roles Tab

ClearPass Policy Manager 6.5 | User Guide Services | 115

The following table displays the Roles tab parameters:

Table 52: Aruba 802.1X Wireless Service - Roles Tab Parameters

Parameter Description

Role Mapping Policy Policy Manager ships a number of preconfigured roles. Select a role mapping policy from the drop-down list.

NOTE: A service can be configured without a role mapping policy, but only one role mapping policy can be configured for each service.

Role Mapping Policy Details

Description

Default Role

Rules Evaluation Algorithm

Provides additional information about the selected role mapping policy.

Specifies the role to which Policy Manager defaults, when the role mapping policy does not produce a match.

Shows first matched rule and return the role or Select all matched rules and return a set of roles.

For information on configuring role mapping policies, see

Configuring a Role and Role Mapping Policy on page

217

.

l l

Posture Tab

The Posture tab is not enabled by default. To enable posture checking for this service, select the Posture

Compliance check box from the More Options field on the Service tab. You can enable the posture checking for this kind of service, if you deploy any of the following: l

Policy Manager in a Microsoft Network Access Protection (NAP)

Cisco Network Admission Control (NAC) Framework environment

Aruba hosted captive portal that performs posture checks through a dissolvable agent

You cannot view the Posture tab if you enable the High Capacity Guest mode in the cluster.

The following figure displays the Posture tab:

Figure 72: Aruba 802.1X Wireless Service - Posture Tab

116 | Services ClearPass Policy Manager 6.5 |  User Guide

The following table displays the Posture tab parameters:

Table 53: Aruba 802.1X Wireless Service - Posture Tab Parameters

Parameter Description

Posture Policies

Posture Policies

Default Posture Token

Select the posture policy from the Select to Add drop-down list. If you do not have any pre-configured posture policies, click Add new Posture Policy to create a new posture policy.

Only NAP agent type posture policies are applicable for this service.

Select the default posture token from the drop-down list.

Remediate End-Hosts Select the Enable auto-remediation of non-compliant end-hosts check box to perform remediation action, when a client is quarantined.

Enter the web link of a server resource to perform the remediation.

Remediation URL

Posture Servers

Posture Servers Select the posture server from the Select to Add drop-down list. If you do not have any pre-configured posture servers, click Add new Posture Server to create a new posture server.

For more information on configuring posture polices and posture servers, see l l

Configuring Posture Policy Agents and Hosts on page 225

Configuring Posture Servers on page 278

Enforcement Tab

Use this tab to select an enforcement policy for a service. The following figure displays the Enforcement tab:

Figure 73: Aruba 802.1X Wireless Service - Enforcement Tab

ClearPass Policy Manager 6.5 | User Guide Services | 117

The following table displays the Enforcement tab parameters:

Table 54: Aruba 802.1X Wireless Service - Enforcement Tab Parameters

Parameter Description

Use Cached Results Select this check box to use cached roles and posture attributes from previous sessions.

Enforcement Policy Select the preconfigured enforcement policy from the drop-down list. This is mandatory. If you do not have any pre-configured enforcement policies, click

Add new Enforcement Policy to create a new enforcement policy.

Enforcement Policy Details

Description

Default Profile

Rules Evaluation Algorithm

Displays additional information about the selected enforcement policy.

Displays a default profile applied by Policy Manager.

Shows first matched rule and return the role or select all matched rules and return a set of roles.

For more information, see

Configuring Enforcement Policies on page 297 .

Audit Tab

Use the Audit tab to enable the Audit checking for this service. Select the Audit End-hosts check box from the

More Options field on the Service tab to enable the Audit tab. The following figure displays the Audit tab:

Figure 74: Aruba 8021X Wireless Service - Audit Tab

118 | Services ClearPass Policy Manager 6.5 |  User Guide

The following table displays the Audit tab parameters:

Table 55: Aruba 802.1X Wireless Service - Audit Tab Parameters

Parameter Description

Audit Server Select the audit server from the following options: l

Nessus Server - Interfaces with Policy Manager primarily to perform vulnerability scanning l Nmap Audit - Performs specific audit functions

You can click the View Details button to view the Policy Manager Entity

Details pop-up with the summary of audit server details. Click the Modify button to view the Summary tab with audit server details.

Audit Trigger Conditions

Action after audit

Select an audit trigger condition.

Known end hosts are the clients that are found in the authentication source(s) associated with this service.

Specifies the audit that can be performed only after the MAC authentication request is completed and the client has acquired an IP address through DHCP.

Once the audit results are available, Policy Manager re-applies policies on the network device in one of the following ways: l

No Action - The audit does not apply policies on the network device after completing this audit.

l l

Do SNMP bounce - This option bounces the switch port or forces an 802.1X

re-authentication (both done using SNMP). Bouncing the port triggers a new

802.1X or MAC authentication request by the client. If the audit server already has the posture token and attributes associated with this client in its cache, it returns the token and the attributes to Policy Manager.

Trigger RADIUS CoA action - This option sends a RADIUS CoA command from Policy Manager to the network device.

Profiler Tab

The Profiler tab is not displayed by default. To access this tab, select the Profile Endpoints check box from the More Options field on the Services tab. The following figure displays the Profiler tab:

Figure 75: Aruba 802.1X Wireless Service - Profiler Tab

ClearPass Policy Manager 6.5 | User Guide Services | 119

The following table displays the Profiler tab parameters:

Table 56: Aruba 802.1X Wireless Service - Profiler Tab Parameters

Parameter Description

Endpoint Classification Select one or more endpoint classification items from the drop-down list.

RADIUS CoA Action Select the RADIUS CoA action from the drop-down list. Click the View

Details button to view the Policy Manager Entity Details page with the summary of enforcement profile details. Click the Modify button to view the Summary tab with profile details. You can click the Add new

RADIUS CoA Action link to create a new RADIUS CoA action.

Accounting Proxy Tab

Use the Accounting Proxy tab to broadcast the RADIUS accounting packets to all the proxy targets. You can configure the proxy targets to which RADIUS server should be forwarded and attributes to be added in the accounting. This enables the external security solutions (For example, CheckPoint, Fortinet, or Bluecoat) to use the RADIUS account event to detect when a user connects and disconnects to the server configuration. The following figure displays the Accounting Proxy tab:

Figure 76: 802.1X Wireless - Accounting Proxy Tab

The following table describes the Accounting Proxy parameters:

Table 57: Aruba 802.1X Wireless Service - Accounting Proxy Tab Parameters

Parameter Description

Accounting Proxy Targets

Add new Accounting Proxy

Target

Specify the proxy targets to which RADIUS server should be forwarded and attributes to be added in the accounting. Select the accounting proxy target from the Select to Add drop-down list.

Click this link to add a new accounting proxy target.

RADIUS attributes to be added for Accounting proxy

120 | Services ClearPass Policy Manager 6.5 |  User Guide

Table 57: Aruba 802.1X Wireless Service - Accounting Proxy Tab Parameters (Continued)

Parameter Description

Type

Name

Select the RADIUS attribute type from the drop-down list.

Select the name of the RADIUS attribute from the drop-down list.

Value Select the value: parameter, static, or role from the drop-down list. The values displayed here is depend on the name of the RADIUS attribute selected.

Summary Tab

The Summary tab presents the summary of parameters used in other tabs when you created a new service.

The following figure displays the Summary tab:

Figure 77: Aruba 802.1X Wireless Service - Summary Tab

802.1X Wireless

Configure the 802.1X Wireless service for wireless clients connecting an 802.11 wireless access device or controller with authentication using IEEE 802.1X. You can view the following default configuration tabs in the

Add Service (Configuration > Services > Add) page: l l l l

Service

Authentication

Roles

Enforcement

You can also select the following additional tabs by checking the More Options field to access these configuration tabs: l l l l

Authorization

Posture Compliance

Audit End Hosts

Profile Endpoints

ClearPass Policy Manager 6.5 | User Guide Services | 121

Posture checks are not performed if the High Capacity Guest mode is enabled in the cluster.

The following figure displays the 802.1X Wireless service configuration page:

Figure 78: 802.1X Wireless Service

If you want to administer the same set of policies for wired and wireless access, you can combine the service rules to define a single service. The other option is to keep two services for wired and wireless access, but re-use the policy components (authentication methods, authentication source, authorization source, role mapping policies, posture policies, and enforcement policies) in both services.

Configuring the 802.1X Wireless service for wireless clients connecting through an 802.11 wireless access device is similar to configuring the Aruba 802.1X Wireless service. For more information on configuration tabs, see

Aruba 802.1X Wireless on page 110

802.1X Wired

Configure this service for clients connecting through an Ethernet LAN with authentication using IEEE 802.1X.

Except for the NAS-Port-Type service rule value (which is Ethernet for 802.1X Wired and Wireless 802.11 for

802.1X Wireless), configuration for the rest of the tabs is similar to the Aruba 802.1X Wireless service. For more information, see

Aruba 802.1X Wireless on page 110 . The following figure displays the 802.1X Wired service

page:

Figure 79: 802.1X Wired Service

MAC Authentication

MAC-based authentication service is used for clients without an 802.1X supplicant or a posture agent (printers, other embedded devices, and computers owned by guests or contractors). The network access device sends a

122 | Services ClearPass Policy Manager 6.5 |  User Guide

MAC authentication request to Policy Manager. Policy Manager can look up the client in a white list or a black list, authenticate and authorize the client against an external authentication/authorization source, and optionally perform an audit on the client.

You cannot configure posture for this type of service.

The following figure displays the MAC Authentication service:

Figure 80: MAC Authentication Service

The Posture tab is not available for the MAC-based authentication service. Configuration for the rest of the tabs is similar to the Aruba 802.1X Wireless service. For more information on configuration tabs, See

Aruba

802.1X Wireless on page 110

for details.

Web-based Authentication

Configure this service for guests or agent-less hosts that connect through the Aruba built-in Portal. The user is redirected to the Aruba captive portal by the network device or by a DNS server that is set up to redirect traffic on a subnet to a specific URL. The web page collects username and password, and also optionally collects health information on the following operating systems: l l l l l l

Windows 7

Windows Vista

Windows XP

Windows Server 2008

Windows Server 2003

Linux

An internal service rule Connection:Protocol EQUALS WebAuth categorizes requests into this type of service. You can add additional rules if needed. The following figure displays the Web-based Authentication service:

ClearPass Policy Manager 6.5 | User Guide Services | 123

Figure 81: Web-based Authentication Service

The Audit End-hosts and Profile Endpoints options are not available for the Web-based Authentication service.

Configuring the Web-based Authentication service for guests or agentless hosts is similar to configuring the

Aruba 802.1X Wireless service. For more information on configuration tabs, see

Aruba 802.1X Wireless on page 110

.

Web-based Health Check Only

This type of service is the same as the Web-based Authentication service except that there is no authentication performed; only health check is done. The internal service rule Connection:Protocol EQUALS

WebAuth categorizes requests into this type of service. The external service rule Host:CheckType EQUALS

Health is automatically added when you select this type of service. For more information, see

Web-based

Authentication on page 123

.

This service does not include authentication options. This service performs health checks only.

124 | Services ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Web-Based Health Check Only service:

Figure 82: Web-Based Health Check Only Service

For more information on configuration tabs, see

Aruba 802.1X Wireless on page 110

Web-based Open Network Access

Configuration for this service is the same as Web-based Authentication service except that a health check is not performed on the endpoints. A Terms of Service page (as configured on the ClearPass Policy

Manager Guest Portal page) is presented to the user. Network access is granted, when you click Submit

Action. The Posture option is not available for the Web-based Authentication service. For more information, see

Web-based Authentication on page 123 . The following figure displays the Web-based Open

Network service page:

Figure 83: Web-based Open Network Access Service

ClearPass Policy Manager 6.5 | User Guide Services | 125

For more information on configuration tabs, see

Aruba 802.1X Wireless on page 110

.

802.1X Wireless - Identity Only

Configuration for this type of service is the same as the Aruba 802.1X Wireless service except that Posture and Audit policies are not configurable, when you use this template. For more information, see

802.1X

Wireless on page 121

. The following figure displays the 802.1X Wireless - Identity Only service:

Figure 84: 802.1X Wireless - Identity Only Service

802.1X Wired - Identity Only

Configure this service for clients connecting through an Ethernet LAN with authentication using IEEE 802.1X.

Configuration for the 802.1X Wired - Identity Only service is same as the 802.1X Wired service except that

Posture and Audit policies are not configurable, when you use this template. For more information, see

802.1X Wired on page 122

. The following figure displays the 802.1X Wired - Identity Only service:

Figure 85: 802.1X Wired - Identity Only Service

RADIUS Enforcement (Generic)

Configure the RADIUS Enforcement (Generic) service for any kind of RADIUS request.

The [AirGroup Authorization Service] service is the only RADIUS Enforcement (Generic) service that is available by default.

The default configuration tabs include Service, Authentication, Roles, and Enforcement. You can also select Authorization, Posture Compliance, Audit End Hosts, and Profile Endpoints in the More Options field on the Service tab.

There are no default rules associated with this service type. Rules can be added to handle any type of standard or vendor-specific RADIUS attributes (any attribute that is loaded through the pre-packaged vendor-specific or

126 | Services ClearPass Policy Manager 6.5 |  User Guide

standard RADIUS dictionaries, or through other dictionaries imported into Policy Manager). The following figure displays the RADIUS Enforcement (Generic) service:

Figure 86: RADIUS Enforcement (Generic) Service

Configuring a service for RADIUS requests is similar to configuring the Aruba 802.1X Wireless service. For more information on configuration tabs, see

Aruba 802.1X Wireless on page 110

.

RADIUS Proxy

Configure the RADIUS Proxy service for any kind of RADIUS request that needs to be proxied to another

RADIUS server (a Proxy Target). There are no default rules associated with this service type. Rules can be added to handle any type of standard or vendor-specific RADIUS attributes. Typically, proxying is based on a realm or the domain of the user trying to access the network.

Configuration of this service is the same as the RADIUS Enforcement (Generic) service except that you do not configure Authentication or Posture policies with this service type. However, you need to configure proxy targets (the servers to which requests are proxied). Requests can be dispatched to the proxy targets randomly, and are load balanced. However, in the Failover mode, requests can be dispatched to the first proxy target in the ordered list of targets and subsequently to the other proxy targets if the prior requests failed. When you select the Enable proxy for accounting requests accounting requests are also sent to the proxy targets.

ClearPass Policy Manager 6.5 | User Guide Services | 127

The following figure displays the RADIUS Proxy service:

Figure 87: RADIUS Proxy Service

For more information, see

RADIUS Enforcement (Generic) on page 126

.

RADIUS Authorization

Configure the RADIUS Authorization service type for services that perform authorization using RADIUS.

When this service is selected, the Authorization tab is enabled by default. The following figure displays the

RADIUS Authorization service:

Figure 88: RADIUS Authorization Service

Configuration for this service is the same as the RADIUS Enforcement (Generic) service except that you do not configure authentication or posture with this service type. Refer to

RADIUS Enforcement (Generic) on page

126

for more information.

128 | Services ClearPass Policy Manager 6.5 |  User Guide

TACACS+ Enforcement

Configure the TACACS+ Enforcement service for any kind of TACACS+ request. TACACS+ users can be authenticated against any of the supported authentication source types: Local DB, SQL DB, Active Directory,

LDAP Directory, or Token Servers with a RADIUS interface. Similarly, service level authorization sources can be specified from the Authorization tab. Note that this tab is not enabled by default. Select the Authorization check box from More Options on the Service tab to enable this tab. A role mapping policy can be associated with this service from the Roles tab.

The result of evaluating a TACACS+ enforcement policy is one or more TACACS+ enforcement profiles. For more information on TACACS+ enforcement profiles, see

TACACS+ Based Enforcement on page 339

for more information. The following figure displays the TACACS+ Enforcement service:

Figure 89: TACACS+ Enforcement Service

Configuring the TACACS+ Enforcement service is similar to configuring the Aruba 802.1X Wireless service except that the Posture Compliance, Audit End-hosts, and Profile Endpoints options are not available. For more information on configuration tabs, see

Aruba 802.1X Wireless on page 110

.

Aruba Application Authentication

This type of service provides authentication and authorization to users of Aruba applications: ClearPass Guest and ClearPass Insight. You can send

Generic Application Enforcement on page 327

to these or other generic applications for authenticating and authorizing the users. The following figure displays the Aruba Application

Authentication service:

Figure 90: Aruba Application Authentication

ClearPass Policy Manager 6.5 | User Guide Services | 129

Configuring the Application Authentication service is similar to configuring the Aruba 802.1X Wireless service except that the Posture Compliance, Audit End-hosts, and Profile Endpoints options are not available. For more information on configuration tabs, see

Aruba 802.1X Wireless on page 110 .

Aruba Application Authorization

This type of service provides authorization for users of Aruba applications: ClearPass Guest and ClearPass

Insight.

Generic Application Enforcement on page 327

can be sent to these or other generic applications for authorizing the users. The following figure displays the Aruba Application Authorization service:

Figure 91: Aruba Application Authorization

Configuring the Aruba Application Authorization service is similar to configuring the Aruba 802.1X Wireless service except that the Posture Compliance, Audit End-hosts, and Profile Endpoints options are not available. For more information on configuration tabs, see

Aruba 802.1X Wireless on page 110 .

Cisco Web Authentication Proxy

This service is a web-based authentication service for guests or agent-less hosts. The Cisco switch hosts a captive portal and the portal web page that collects username and password information. Subsequently, the switch sends a RADIUS request in the form of a password authentication protocol (PAP) authentication request to Policy Manager. By default, this service uses the PAP authentication method. You can click on the

Authorization and Audit End-hosts options to enable additional tabs.

130 | Services ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Cisco Web Authentication Proxy service:

Figure 92: Cisco Web Authentication Proxy Service

Configuring the Cisco Web Authentication Proxy service is similar to configuring the Aruba 802.1X

Wireless service except that the Posture Compliance and Profile Endpoints options are not available. For more information on configuration tabs, see

Aruba 802.1X Wireless on page 110

.

ClearPass Policy Manager 6.5 | User Guide Services | 131

132 | Services ClearPass Policy Manager 6.5 |  User Guide

Chapter 4

Authentication and Authorization

As a first step in the service-based processing, Policy Manager uses an authentication method to authenticate the user or device against an authentication source. After the user or device is authenticated, Policy Manager

fetches attributes for role mapping policies from the authorization sources associated with this authentication source. For a general overview of Policy Manager authentication and authorization, see Authentication and

Authorization Architecture and Flow on page 133

For more information, see: l l l l

Supported Authentication Methods on page 133

Adding and Modifying Authentication Methods on page 137

Adding and Modifying Authentication Sources on page 161

Configuring Authentication Components on page 135

Supported Authentication Methods

Policy Manager supports the following authentication methods: l l l

Tunneled EAP authentication n

EAP Protected EAP (EAP-PEAP) n n n

EAP Flexible Authentication Secure Tunnel (EAP-FAST)

EAP Transport Layer Security (EAP-TLS)

EAP Tunneled TLS (EAP-TTLS)

Non-tunneled authentication n n

EAP Message Digest 5 (EAP-MD5) - ClearPass Policy Manager does not support EAP-MD5 in the FIPS mode

EAP Microsoft Challenge Handshake Authentication Protocol version 2 (EAP- MSCHAPv2) n n n n

EAP Generic Token Card (EAP-GTC)

Challenge Handshake Authentication Protocol (CHAP)

Password Authentication Protocol (PAP)

Microsoft CHAP version 1 and 2 n

MAC authentication method (MAC-AUTH)

Authorize authentication

The MAC_AUTH authentication type must be used exclusively in a MAC-based authentication service. When the

MAC_AUTH method is selected, Policy Manager makes internal checks to verify that the request is a MAC_

Authentication request and not a spoofed request. In tunneled EAP methods, authentication and posture credential exchanges occur inside a protected outer tunnel.

Authentication and Authorization Architecture and Flow

Policy Manager divides the architecture of authentication and authorization into the following three components: l l l

Authentication method

Authentication source

Authorization source

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 133

Authentication Method

Policy Manager initiates the authentication handshake by sending available methods in a priority order until the client accepts a method or until the client rejects the last method (with NAKs) with the following possible outcomes: n n n

Successful negotiation returns a method, which is used to authenticate the client against the authentication source.

Where no method is specified (for example, for unmanageable devices), Policy Manager passes the request to the next configured policy component for this service.

Policy Manager rejects the connection.

An authentication method is configurable only for some service types. For more information, see

Policy Manager

Service Types on page 110

. All 802.1X wired and wireless services have an associated authentication method. For example, the MAC_AUTH authentication method can be associated with the MAC authentication service type.

Authentication Source

In Policy Manager, an authentication source is the identity store (Active Directory, LDAP directory, SQL DB, token server) against which users and devices are authenticated. Policy Manager first tests whether the connecting entity (the device or user) is present in the ordered list of configured authentication sources. Policy

Manager looks for the device or user by executing the first filter associated with the authentication source.

After the device or user is found, Policy Manager then authenticates this entity against this authentication source. The flow is outlined below: l l l

On successful authentication, Policy Manager moves on to the next stage of policy evaluation, which collects role mapping attributes from the authorization sources.

Where no authentication source is specified (for example, for unmanageable devices), Policy Manager passes the request to the next configured policy component for this service.

If Policy Manager does not find the connecting entity in any of the configured authentication sources, it rejects the request.

After Policy Manager successfully authenticates the user or device against an authentication source, it retrieves role mapping attributes from each of the authorization sources configured for that authentication source. It also, optionally, can retrieve attributes from authorization sources configured for the service. The flow of control for authentication takes these components in sequence:

134 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

Figure 93: Authentication and Authorization Flow of Control

Configuring Authentication Components

To add or modify an authentication method or source for an existing service, navigate to the Services

(Configuration > Services > Add) page and click the Authentication tab) . For a new service, the Policy

Manager wizard automatically opens the Authentication tab for configuration. You can open an authentication method or source from the Configuration > Authentication > Methods or Configuration

> Authentication > Sources page. The following figure is an example of the Authentication tab:

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 135

Figure 94: Authentication Components

Table 58: Authentication Options at the Service Level

Component Configuration Steps

Sequence of

Authentication

Methods l l l

Select a method, then select Move Up, Move Down, or Remove.

Select View Details to view the details of the selected method.

Select Modify to modify the selected authentication method. This displays a popup with the edit widgets for the select authentication method.

n To add a previously configured authentication method, select from the Select to

Add drop-down list.

n To configure a new method, click the Add new Authentication Method link. For more information about authentication methods, see

Adding and Modifying

Authentication Methods on page 137

.

NOTE: An authentication method is only configurable for some service types. For more information, refer to

Policy Manager Service Types on page 110

.

Sequence of

Authentication

Sources

Whether to standardize the form in which usernames are present l l l l l

Select a source, then Move Up, Move Down, or Remove.

Select View Details to view the details of the selected authentication source.

Select Modify to modify the selected authentication source. This displays the

Authentication Source Configuration wizard for the selected authentication source.

To add a previously configured authentication source, select from the Select to Add drop-down list.

To configure a new authentication source, click the Add new Authentication Source link. For more information about authentication sources, see

Adding and Modifying

Authentication Sources on page 161

.

Select the Enable to specify a comma-separated list of rules to strip usernames check box to pre-process the user name and to remove prefixes and suffixes before authenticating it to the authentication source.

136 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

Adding and Modifying Authentication Methods

From the Services (Configuration > Services) page, you can configure authentication for a new service

(using the Add Service wizard) or modify an existing authentication method directly (Configuration >

Authentication > Methods, then click any row in the Authentication Methods page). When you click Add from any of these locations, Policy Manager displays the Add Authentication Method popup.

The following figure displays the Add Authentication Method page:

Figure 95: Add Authentication Method Page

The EAP-MD5 authentication type is not supported if you use ClearPass Policy Manager in the FIPS (Administration

> Server Manager > Server Configuration > FIPS tab) mode.

You can configure the following authentication methods: l l l l l l l l l

Authorize Authentication Method on page 138

CHAP and EAP-MD5 on page 139

EAP-FAST on page 139

EAP-GTC on page 144

EAP-MSCHAPv2 on page 146

EAP-PEAP on page 146

EAP-PEAP-Public on page 149

EAP-PWD on page 152

EAP-TLS on page 153

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 137

l l l l

EAP-TTLS on page 155

MAC-AUTH on page 158

MSCHAP on page 158

PAP on page 159

Authorize Authentication Method

This is an authorization-only method that you can add with a custom name. The General tab labels the authentication method and defines session details. The following figure displays the Authorization - General tab:

Figure 96: Add Authentication - General Tab

The following table describes the Authorize General parameters:

Table 59: Authorize General Tab Parameters

Parameter Description

Name

Description

Specify the label of the authentication method.

Provide additional information that helps to identify the authentication method.

Type Select the type of authentication. In this context, select Authorize.

138 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

CHAP and EAP-MD5

Policy Manager is packaged with CHAP and EAP-MD5 authentication methods. You can create one or more instances of CHAP and EAP-MD5 authentication methods by assigning a customized name to each one. These methods can also be associated to a service as authentication methods.

The EAP-MD5 authentication type is not supported if you use ClearPass Policy Manager in the FIPS (Administration

> Server Manager > Server Configuration > FIPS tab) mode.

The following figure is an example of the General tab for the CHAP authentication method:

Figure 97: General Tab (CHAP)

The following table describes the CHAP and EAP-MD5 - General parameters:

Table 60: CHAP and EAP-MD5 - General Tab Parameters

Parameter Description

Name Specify the name of the authentication method.

Description

Type

Provide the additional information that helps to identify the authentication method.

Select the type of authentication. In this context, always CHAP or EAP-MD5.

EAP-FAST

EAP-Flexible Authentication through Secure Tunneling (EAP-FAST) is an authentication method that encrypts

EAP transactions within a TLS tunnel. The EAP-FAST method contains the following four tabs: l l l l

General Tab on page 140

Inner Methods Tab on page 141

PACs Tab on page 142

PAC Provisioning Tab on page 142

The PACs and PAC Provisioning tabs are available only when Using PACs is specified in the End-Host

Authentication field on the General tab.

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 139

General Tab

The General tab labels the authentication method and defines session details. The following figure displays the EAP-FAST - General tab:

Figure 98: EAP-FAST - General Tab

Table 61: EAP_FAST - General Tab Parameters

Parameter Description

Name Specify the name of the authentication method.

Description Provide the additional information that helps to identify the authentication method.

Type Select the type of authentication. In this context, select EAP_FAST.

140 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

Table 61: EAP_FAST - General Tab Parameters (Continued)

Parameter Description

Session

Resumption

Caches EAP-FAST sessions on Policy Manager for reuse if the user/end-host reconnects to Policy

Manager within the session timeout interval. By default, this option is enabled.

Session

Timeout

Caches EAP-FAST sessions on Policy Manager for reuse if the user/end-host reconnects to Policy

Manager within the session timeout interval. If session timeout value is set to 0, then the cached sessions are not purged.

Fast

Reconnect

Enable this check box to allow fast reconnect. When Fast Reconnect is enabled, the inner method of the server-authenticated outer tunnel is also bypassed. This makes the process of reauthentication faster. For the fast reconnect to work, session resumption must be enabled.

Inner Methods Tab

The Inner Methods tab controls the inner methods for the EAP-FAST method. The following figure displays the EAP-FAST - Inner Methods tab:

Figure 99: EAP-FAST Add Authentication Method - Inner Methods Tab

The EAP-MD5 authentication method is not supported if you use ClearPass Policy Manager in the FIPS

(Administration > Server Manager > Server Configuration > FIPS tab) mode.

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 141

Table 62: EAP-FAST - Inner Methods Tab Parameters

Parameter Description

Specify inner authentication methods in the preferred order

Select any method available in the current context from the drop-down list.

Functions available in this tab include: l To append an inner method to the displayed list, select from the Select a

method drop-down list. The list can contain multiple inner methods, which

Policy Manager sends in priority order until negotiation succeeds.

l l

To remove an inner method from the displayed list, select the method and click

Remove.

To set an inner method as the default inner method (the method tried first), select a method and click Default.

PACs Tab

The PACs tab enables or disables Protected Access Credential (PAC) types. The following figure displays the

EAP-FAST - PACs tab:

Figure 100: EAP_FAST PACs Tab

PAC Provisioning Tab

The PAC Provisioning tab controls anonymous and authenticated modes. The following figure displays the

EAP-FAST PAC - Provisioning tab:

142 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

Figure 101: EAP_FAST PAC Provisioning Tab

Table 63: EAP_FAST PAC Provisioning Tab Parameters

Parameter Description

In-Band PAC Provisioning

Allow anonymous mode

When in anonymous mode, phase 0 of EAP_FAST provisioning establishes an outer tunnel without endhost/Policy Manager authentication (not as secure as the authenticated mode).

After an outer tunnel is established, end-host and

Policy Manager perform mutual authentication using

MSCHAPv2, then Policy Manager provisions the endhost with an appropriate PAC (tunnel or machine).

Allow authenticated mode

Enable to allow authenticated mode provisioning.

When Allow authenticated mode is in phase 0,

Policy Manager establishes the outer tunnel inside a server-authenticated tunnel. The end-host authenticates the server by validating the Policy

Manager certificate.

Considerations

Authenticated mode is more secure than anonymous provisioning mode.

After the server is authenticated, the phase 0 tunnel is established. The endhost and Policy Manager perform mutual authentication and provision on the end-host with an appropriate PAC

(tunnel or machine): l l

If both anonymous and authenticated provisioning modes are enabled and the end-host sends a cipher suite that supports server authentication, Policy Manager picks the authenticated provisioning mode.

If the appropriate cipher suite is supported by the end-host, Policy

Manager performs anonymous provisioning.

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 143

Table 63: EAP_FAST PAC Provisioning Tab Parameters (Continued)

Parameter Description Considerations

Accept endhost after authenticated provisioning

After the authenticated provisioning mode is complete and the end-host is provisioned with a PAC, Policy

Manager rejects end-host authentication; the end-host subsequently re-authenticates using the newly provisioned PAC. When this field is enabled, Policy

Manager accepts the end-host authentication in the provisioning mode itself; the end-host does not have to re-authenticate.

None.

None.

Required end-host certificate for provisioning

In authenticated provisioning mode, the end-host authenticates the server by validating the server certificate resulting in a protected outer tunnel; the end-host is authenticated by the server inside this tunnel. When this field is enabled, the server can require the end-host to send a certificate inside the tunnel for the purpose of authenticating the end-host.

EAP-GTC

EAP-Generic Token Card (GTC) enables the exchange of clear-text authentication credentials across the network. EAP-GTC is used inside a TLS tunnel created by TTLS or PEAP to provide server authentication in wireless environments. The EAP-GTC method contains the General tab that labels the authentication method and defines session details.

144 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the EAP-GTC - General tab:

Figure 102: EAP-GTC - General Tab

The following figure displays the EAP-GTC General parameters:

Table 64: EAP-GTC General Tab Parameters

Parameter Description

Name Specify the name of the authentication method.

Description Provide the additional information that helps to identify the authentication method.

Type

Method Details

Select the type of authentication. In this context, select EAP-GTC.

Challenge Specify an optional password.

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 145

EAP-MSCHAPv2

The EAP-MSCHAPv2 method contains the General tab that labels the method and defines session details. The following figure is an example of the EAP-MSCHAPv2 - General tab:

Figure 103: EAP-MSCHAPv2 - General Tab

The following table describes the EAP-MSCHAPv2 - General parameters:

Table 65: EAP-MSCHAPv2 - General Tab Parameters

Parameter Description

Name Specify the name of the authentication method.

Description

Type

Provide the additional information that helps to identify the authentication method.

Select the type of authentication. In this context, select EAP-MSCHAPv2.

EAP-PEAP

EAP-Protected Extensible Authentication Protocol (EAP-PEAP) is a protocol that creates an encrypted (and more secure) channel before the password-based authentication occurs. PEAP is an 802.1X authentication method that uses server-side public key certificate to establish a secure tunnel in which the client authenticates with server. The PEAP authentication creates an encrypted SSL/TLS tunnel between client and authentication server.

146 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

The exchange of information is encrypted and stored in the tunnel ensuring that the user credentials are kept secure.

The EAP-PEAP authentication method contains the following two tabs: l l

General Tab on page 147

Inner Methods Tab on page 148

General Tab

The General tab labels the authentication method and defines session details. The following figure is an example of the EAP-PEAP General tab:

Figure 104: EAP-PEAP - General Tab

The following table describes the EAP-PEAP - General parameters:

Table 66: EAP-PEAP - General Tab Parameters

Parameter Description

Name Specify the name of the authentication method.

Description

Type

Method Details

Provide the additional information that helps to identify the authentication method.

Specify the type of authentication. In this context, select EAP-PEAP.

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 147

Table 66: EAP-PEAP - General Tab Parameters (Continued)

Parameter Description

Session

Resumption

Session

Timeout

Caches EAP-PEAP sessions on Policy Manager for reuse if the user/client reconnects to Policy

Manager within the session timeout interval.

Caches EAP-PEAP sessions on Policy Manager for reuse if the user/client reconnects to Policy

Manager within the session timeout interval. If session timeout value is set to 0, the cached sessions are not purged.

Fast

Reconnect

Enable this check box to allow fast reconnect. When fast reconnect is enabled, the inner method that happens inside the server authenticated outer tunnel is also bypassed. This makes the process of re-authentication faster. For the fast reconnect to work, session resumption must be enabled.

Inner Methods Tab

The Inner Methods tab controls the inner methods for the EAP-PEAP authentication method. The following figure is an example of the EAP-PEAP - Inner Methods tab:

Figure 105: EAP-PEAP - Inner Methods Tab

The EAP-MD5 authentication method is not supported if you use ClearPass Policy Manager in the FIPS

(Administration > Server Manager > Server Configuration > FIPS) mode.

148 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

The following table describes the EAP-PEAP Inner Methods parameters:

Table 67: EAP-PEAP Inner Methods Tab Parameters

Parameter Description

Specify inner authentication methods in the preferred order

Select any method available in the current context from the drop-down list.

Functions available in this tab include: l

To append an inner method to the displayed list, select it from the Select a

method drop-down list. The list can contain multiple inner methods, which

Policy Manager sends in priority order until negotiation succeeds.

l l

To remove an inner method from the displayed list, select the method and click

Remove.

To set an inner method as the default (the method tried first), select it and click

Default.

EAP-PEAP-Public

The EAP-PEAP-Public method is used for authenticating and providing a secured wireless guest access to the endpoints. To provide a secured wireless guest access, the Wi-Fi Protected Access (WPA) is provided for publicly known username and password. This ensures that every device gets a unique wireless session key that is used to encrypt the traffic and provide secured wireless access without intruding the privacy of others though the same username and password is shared to all devices.

The EAP-PEAP-Public method contains the following two tabs: l l

General on page 150

Inner Methods on page 151

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 149

General

The General tab labels the authentication method and defines session details. The following figure is an example of the EAP-PEAP-Public - General tab:

Figure 106: EAP-PEAP-Public - General Tab

The following table describes the EAP-PEAP-Public - General parameters:

Table 68: EAP-PEAP-Public - General Tab Parameters

Parameter Description

Name Specify the name of the authentication method.

Description Provide the additional information that helps to identify the authentication method.

Type Specify the type of authentication. In this context, select EAP-PEAP-Public.

Session

Resumption

Caches EAP-PEAP-Public sessions on Policy Manager for reuse if the user/client reconnects to

Policy Manager within the session timeout interval. By default, this option is enabled.

Session

Timeout

Caches EAP-PEAP-Public sessions on Policy Manager for reuse if the user/client reconnects to

Policy Manager within the session timeout interval in hours. If session timeout value is set to 0, the cached sessions are not purged. The default session timeout is 6 hours.

150 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

Table 68: EAP-PEAP-Public - General Tab Parameters (Continued)

Parameter Description

Fast

Reconnect

Public

Username

Enable this check box to allow fast reconnect. When fast reconnect is enabled, the inner method that happens inside the server authenticated outer tunnel is also bypassed. This makes the process of re-authentication faster. For the fast reconnect to work, session resumption must be enabled.

Enter the Guest username. In this context, enter 'public'.

Public

Password

Enter the Guest password. In this context, enter 'public'.

Inner Methods

The Inner Methods tab controls the inner methods for the EAP-PEAP-Public authentication method. The following figure is an example of the EAP-PEAP-Public - Inner Methods tab:

Figure 107: EAP-PEAP-Public - Inner Methods Tab

The EAP-MD5 authentication method is not supported if you use ClearPass Policy Manager in the FIPS

(Administration > Server Manager > Server Configuration > FIPS tab) mode.

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 151

Table 69: EAP-PEAP-Public Inner Methods Tab Parameters

Parameter Description

Specify inner authentication methods in the preferred order

Select the inner authentication method available from the drop-down list. In this context, only the EAP-MSCHAPv2 method is available. The following functions are available in this tab: l To append an inner method to the displayed list, select it from the drop-down list. The list can contain multiple inner methods, which Policy Manager sends in priority order until negotiation succeeds.

l l

To remove an inner method from the displayed list, select the method and click

Remove.

To set an inner method as the default (the method tried first), select it and click

Default.

EAP-PWD

EAP-PWD is an EAP authentication method, which uses a shared password for authentication. EAP-PWD addresses the problem of password-based authenticated key exchange using a possibly weak password for authentication to derive an authenticated and cryptographically strong shared secret. The EAP-PWD method contains the General tab that labels the authentication method and defines session details.

The following figure displays the EAP-PWD - General tab:

Figure 108: EAP-PWD - General Tab

152 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

The following table describes the EAP-PWD - General parameters:

Table 70: EAP-PWD - General Tab Parameters

Parameter Description

Name Specify the name of the authentication method.

Description Provide the additional information that helps to identify the authentication method.

Type Specify the type of authentication. In this context, select EAP-PWD.

Method Details

Group Select the group from the drop-down list. Each party to the exchange derives ephemeral keys with respect to a particular set of domain parameters, that is a 'group'. A group can be based on Finite

Field Cryptography (FFC) or Elliptic Curve Cryptography (ECC).

Server Id Specify the string that identifies the server to the peer.

EAP-TLS

EAP-Transport Layer Security (EAP-TLS) requires an exchange of proof of identities through public key cryptography (such as digital certificates). EAP-TLS secures this exchange with an encrypted TLS tunnel which helps to resist dictionary or other attacks. The EAP-TLS authentication method contains the General tab that labels and defines session details.

The following figure displays the EAP-TLS - General tab:

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 153

Figure 109: EAP-TLS - General Tab

The following table describes the EAP_TLS - General parameters:

Table 71: EAP_TLS - General Tab Parameters

Parameter Description

Name Specify the name of the authentication method.

Description

Type

Session

Resumption

Provide the additional information that helps to identify the authentication method.

Specify the type of authentication. In this context, select EAP_TLS.

Caches EAP-TLS sessions on Policy Manager for reuse if the user/client reconnects to Policy

Manager within the session timeout interval.

Session Timeout Specifies the duration in hours for the cached EAP-TLS sessions to be retained.

Check Enable to specify whether to perform an authorization check.

Authorization

Required

Certificate

Comparison

Specify the type of certificate comparison (identity matching) upon presenting Policy Manager with a client certificate:

154 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

Table 71: EAP_TLS - General Tab Parameters (Continued)

Parameter Description l l l

To skip the certificate comparison, choose Do not compare.

To compare specific attributes, choose Compare Common Name (CN), Compare

Subject Alternate Name (SAN), or Compare CN or SAN.

To perform a binary comparison of the stored (in the client record in Active Directory or another LDAP-compliant directory) and presented certificates, choose Compare Binary.

Verify Certificate using OCSP

Select Optional or Required if the certificate to be verified by the Online Certificate Status

Protocol (OCSP). Select None to not to verify the certificate.

Override OCSP

URL from the

Client

OCSP URL

Select this option to use a different URL for OCSP. After this option is enabled, you can enter a new URL in the OCSP URL field.

If the Override OCSP URL from the Client field is enabled, then enter the replacement URL.

EAP-TTLS

EAP-Tunneled Transport Layer Security (EAP-TTLS) is designed to provide authentication that is similar to EAP-

TLS, but each user does not require a certificate be issued. The certificates are issued only to authentication servers.

The EAP-TTLS method contains the following two tabs: l l

General Tab on page 156

Inner Methods Tab on page 157

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 155

General Tab

The General tab labels the method and defines session details. The following figure is an example of the EAP-

TTLS - General tab:

Figure 110: EAP-TTLS - General Tab

The following table describes the EAP-TTLS - General parameters:

Table 72: EAP-TTLS - General Tab Parameters

Parameter Description

Name Specify the name of the authentication method.

Description Provide the additional information that helps to identify the authentication method.

Type

Method Details

Select the type of authentication. In this context, select EAP-TTLS.

NOTE: The EAP-MD5 authentication type is not supported if you use ClearPass Policy Manager in the FIPS (Administration > Server Manager > Server Configuration > FIPS tab) mode.

Session

Resumption

Caches EAP-TTLS sessions on Policy Manager for reuse if the user/client reconnects to Policy

Manager within the session timeout interval.

Session

Timeout

Specify the duration in hours for the EAP-TTLS sessions to be cached.

156 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

Inner Methods Tab

The Inner Methods tab controls the inner methods for the EAP-TTLS method. The following figure is an example of the EAP-TTLS - Inner Methods tab:

Figure 111: EAP_TTLS - Inner Methods Tab

The following table describes the EAP-TTLS - Inner Methods parameters:

Table 73: EAP-TTLS - Inner Methods Tab Parameters

Parameter Description

Specify inner authentication methods in the preferred order

Select any method available in the current context from the drop-down list.

Functions available in this tab include: l To append an inner method to the displayed list, select it from the drop-down list. The list can contain multiple inner methods, which Policy Manager sends in priority order until negotiation succeeds.

l l

To remove an inner method from the displayed list, select the method and click

Remove.

To set an inner method as the default (the method that tried first), select it and click Default.

NOTE: The EAP-MD5 authentication type is not supported if you use ClearPass

Policy Manager in the FIPS (Administration > Server Manager > Server

Configuration > FIPS tab) mode.

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 157

MAC-AUTH

The MAC-AUTH method contains the General tab that labels the authentication method and defines session details. The following figure is an example of the MAC-AUTH - General tab:

Figure 112: MAC-AUTH - General Tab

The following table describes the MAC-Auth - General parameters:

Table 74: MAC-Auth - General Tab Parameters

Parameter Description

General

Name Specify the name of the authentication method.

Description Provide the additional information that helps to identify the authentication method.

Type

Method Details

Select the type of authentication. In this context, select MAC-AUTH.

Allow

Unknown

End-Hosts

Enables further policy processing of MAC authentication requests of unknown clients.

If this is not enabled, Policy Manager automatically rejects a request whose MAC address is not in a configured authentication source. This setting is enabled, for example, when you want Policy

Manager to trigger an audit for an unknown client. By selecting this check box and enabling audit

(See

Configuring Audit Servers on page 281

), you can trigger an audit of an unknown client.

MSCHAP

The MS-CHAP authentication method authenticates remote Windows-based workstations, integrating the functionality to which LAN-based users are accustomed with the hashing algorithms used on Windows networks. MS-CHAP uses a challenge-response mechanism to authenticate connections without sending any passwords. The MSCHAP method contains the General tab that labels the authentication method and defines session details.

158 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

The following figure is an example of the MSCHAP - General tab:

Figure 113: MSCHAP - General Tab

The following table describes the MSCHAP - General parameters:

Table 75: MSCHAP - General Tab Parameters

Parameter Description

Name Specify the name of the authentication method.

Description

Type

Provide the additional information that helps to identify the authentication method.

Select the type of authentication. In this context, select MSCHAP.

PAP

Password Authentication Protocol (PAP) is an authentication protocol in which the user name and password is sent to the remote access server in unencrypted form. The PAP method contains the General tab that labels the authentication method and defines session details.

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 159

The following figure is an example of the PAP - General tab:

Figure 114: PAP - General Tab

The following table describes the PAP - General parameters:

Table 76: PAP - General Tab Parameters

Parameter Description

Name Specify the name of the authentication method.

Description Provide the additional information that helps to identify the authentication method.

Type Select the type of authentication. In this context, select PAP.

160 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

Table 76: PAP - General Tab Parameters (Continued)

Parameter Description

Method Details

Encryption

Scheme

Select the PAP authentication encryption scheme from the drop-down list. The following encryption schemes are supported: l l

Clear

Crypt l l l l

MD5

SHA1

SHA256

NT Hash l l

LM Hash

Aruba-SSO

NOTE: The MD5 encryption scheme is not supported if you use ClearPass Policy Manager in the

FIPS (Administration > Server Manager > Server Configuration > FIPS tab) mode.

Adding and Modifying Authentication Sources

Policy Manager supports multiple authentication sources. Navigate to the Configuration > Services page to configure an authentication source for a new service using the Add Service wizard. Alternatively, navigate to

Configuration > Authentication > Sources to modify an existing authentication source.

The following figure displays the Authentication Sources page:

Figure 115: Authentication Sources Page

After clicking Add Authentication Source from either of these locations, Policy Manager displays the Add page. Different tabs and fields appear, depending on the Authentication Source selected.

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 161

Figure 116: Add Authentication Source Page

You can configure the following authentication sources: l l l l l l l l

Generic LDAP and Active Directory

Generic SQL DB

HTTP

Kerberos

Okta

RADIUS Server

Static Host List

Token Server

Generic LDAP and Active Directory

Policy Manager can perform NTLM/MSCHAPv2, PAP/GTC, and certificate-based authentications against

Microsoft Active Directory and against any LDAP-compliant directory. For example, Novell eDirectory,

OpenLDAP, or Sun Directory Server. Both LDAP and Active Directory based server configurations are similar.

You can retrieve role mapping attributes by using filters. For more information, see

Adding and Modifying Role

Mapping Policies on page 219 .

Use the following tabs to configure Generic LDAP and Active Directory authentication sources on the

Configuration > Authentication > Sources >Add page: l l l l

General Tab on page 162

Primary Tab on page 164

Attributes Tab on page 166

Summary Tab on page 175

General Tab

The General tab labels the authentication source and defines session details. The following image is an example of the Active Directory - General tab:

162 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

Figure 117: Generic LDAP or Active Directory - General Tab

The following table describes the Generic LDAP or Active Directory - General parameters:

Table 77: Generic LDAP or Active Directory - General Tab Parameters

Parameter Description

Name Specify the name of the authentication source.

Description

Type

Provide the additional information that helps to identify the authentication source.

Select the type of authentication source. In this context, select General LDAP or Active Directory.

Use for

Authorization

Enable this check box instruct Policy Manager to fetch role mapping attributes (or authorization attributes) from this authentication source. If a user or device successfully authenticates against this authentication source, then Policy Manager also fetches role mapping attributes from the same source if the Use for Authorization field is enabled. This box is checked (enabled) by default.

Authorization

Sources

Specifies additional sources from which role mapping attributes to be fetched. Select a previously configured authentication source from the drop-down list and click Add to add authentication source to the list of authorization sources. Click Remove to remove the authentication source from the list.

If Policy Manager authenticates the user or device from this authentication source, then also fetches role mapping attributes from these additional authorization sources

NOTE: You can specify additional authorization sources at the service level. Policy Manager fetches role mapping attributes regardless of which authentication source the user or device was authenticated against.

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 163

Table 77: Generic LDAP or Active Directory - General Tab Parameters (Continued)

Parameter Description

Server

Timeout

Cache

Timeout

Specifies the duration in number of seconds that Policy Manager waits before considering this server unreachable. If multiple backup servers are available, then this value indicates the duration in number of seconds that Policy Manager waits before attempting to fail over from the primary to backup servers in the order in which they are configured.

Policy Manager caches attributes fetched for an authenticating entity. This parameter controls the duration in number of seconds for which the attributes are cached.

Backup

Servers

Priority

Click Add Backup to add a backup server. If the Backup 1 tab appears, you can specify connection details for a backup server (same fields as for primary server that is specified below).

To remove a backup server, select the server name and click Remove. Select Move Up or Move

Down to change the server priority of the backup servers. This is the order in which Policy

Manager attempts to connect to the backup servers if the primary server is unreachable.

Primary Tab

The Primary tab defines the settings for the primary server. The following image is an example of the Generic

Active Directory - Primary tab:

Figure 118: Generic LDAP or Active Directory - Primary Tab

164 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

The following table describes the Generic LDAP or Active Directory - Primary parameters:

Table 78: Generic LDAP or Active Directory - Primary Tab Parameters

Parameter Description

Hostname Specify the hostname or the IP address of the LDAP or Active Directory server.

Connection

Security l l l

Select None for default non-secure connection (usually port 389).

Select StartTLS for secure connection that is negotiated over the standard LDAP port. This is the preferred way to connect to an LDAP directory securely.

Select LDAP over SSL or AD over SSL to choose the legacy way of securely connecting to an

LDAP directory. Port 636 must be used for this type of connection.

Port Specifies the TCP port at which the LDAP or Active Directory server is listening for connections.

The default TCP port for LDAP connections is 389 and the default port for LDAP over SSL is 636.

Select this checkbox to verify the server certificate as part of authentication.

Verify Server

Certificate

Bind DN Specify the DN of the administrator account. Policy Manager uses this account to access all other records in the directory.

NOTE: For Active Directory, the bind DN can also be in the administrator@domain format (for example, [email protected]).

Bind Password Specify the password for the administrator DN entered in the Bind DN field.

NetBIOS

Domain Name

Specify the Active Directory domain name for this server. Policy Manager prepends this name to the user ID to authenticate users found in this Active Directory.

NOTE: This setting is available only for Active Directory.

Base DN

Search Scope

Enter the DN of the node in your directory tree from which to start searching for records. After entering the values for the fields described above, click Search Base DN to browse the directory hierarchy. The LDAP browser opens. You can navigate to the DN that you want to use as the base

DN.

Click on any node in the tree structure that is displayed to select it as a base DN. Note that the base DN is displayed at the top of the LDAP browser.

NOTE: This is also a method to test the connectivity to your LDAP or AD directory. If the values entered for the primary server attributes are correct, you can browse the directory hierarchy by clicking Search Base Dn.

Select the scope of the search you want to perform, starting at the base DN.

l Base Object Search allows you to search at the level specified by the base DN.

l l

One Level Search allows you to search up to one level lesser to the immediate children of the base DN.

Subtree Search allows you to search the entire subtree under the base DN (including at the base DN level).

LDAP Referral Enable this check box to automatically follow referrals returned by your directory server in search results. Refer to your directory documentation for more information on referrals.

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 165

Table 78: Generic LDAP or Active Directory - Primary Tab Parameters (Continued)

Parameter Description

Bind User Enable this checkbox to authenticate users by performing a bind operation on the directory using the credentials (user name and password) obtained during authentication. For clients to be authenticated by using the LDAP bind method, Policy Manager must receive the password in cleartext.

Password

Attribute

(Available only for Generic

LDAP)

Enter the name of the attribute in the user record from which user password can be retrieved.

This is not available for Active Directory.

Password

Type

(Available only for Generic

LDAP)

Specify whether the password type is Cleartext, NT Hash, or LM Hash.

Password

Header

(Available only for Generic

LDAP)

Specifies the Oracle's LDAP implementation that prepends a header to a hashed password string. If using Oracle LDAP, enter the header in this field to correctly identify and read the password .

Enter the name of the attribute in the user record from which user certificate can be retrieved.

User

Certificate

Always use

NETBIOS name

Check this option to always use NETBIOS name instead of the domain part in username for authentication.

NOTE: This field is available only if you select Active Directory as an authentication source.

Attributes Tab

The Attributes tab defines the Active Directory or LDAP Directory query filters and the attributes to be fetched by using those filters. The following images are the examples of the Active Directory - Attributes tab and the Generic LDAP Directory - Attributes tab:

166 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

Figure 119: Active Directory Attributes Tab (with Default Data)

Figure 120: Generic LDAP Directory - Attributes Tab

The following table describes the Active Directory/LDAP Attributes Tab - Filter Listing Screen parameters:

Table 79: Active Directory/LDAP Attributes Tab - Filter Listing Screen Parameters

Parameter Description

Filter Name

Attribute Name

Specify the name of the filter.

Specify the name of the LDAP/AD attributes defined for this filter.

Alias Name

Enable As

Specify the alias name for each attribute name selected for the filter.

Specify whether this value to be used directly as a role or attribute in an enforcement policy.

This bypasses the step to assign a role in Policy Manager through a role mapping policy.

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 167

The following table describes the available directories:

168 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

Table 80: Active Directory/LDAP Default Filters

Directory Default Filters

Active

Directory l l l l l

Authentication: This filter is used for authentication. The query searches in the objectClass of the type user. This query finds both user and machine accounts in Active Directory:

(&(objectClass=user)(sAMAccountName=%{Authentication:Username}))

After a request arrives, Policy Manager populates %{Authentication:Username} with the authenticating user or machine. This filter is also configured to fetch the following attributes based on this filter query: n dn (alias of UserDN): This is an internal attribute that is populated with the user or machine record’s DN n n n n n department title company

memberOf: In Active Directory, this attribute is populated with the groups that the user or machine belongs to. This is a multi-valued attribute.

telephoneNumber n n mail displayName n accountExpires

Group: This is a filter used for retrieving the name of the groups a user or machine belongs to.

(distinguishedName=%{memberOf})

This query fetches all group records, where the distinguished name is the value returned by the

memberOf variable. The values for the memberOf attribute are fetched by the first filter

(authentication) described above. The attribute fetched with this filter query is cn, which is the name of the group.

Machine: This query fetches the machine record in Active Directory.

(&(objectClass=computer)(sAMAccountName=%{Host:Name}$))

%{Host:Name} is populated by Policy Manager with the name of the connecting host if available.

dNSHostName, operatingSystem, and operatingSystemServicePack attributes are fetched with this filter query.

Onboard Device Owner: This is the filter for retrieving the name of the owner the onboard device belongs to. This query finds the user in the Active Directory

(&(sAMAccountName=%{Onboard:Owner})(objectClass=user))

%{Onboard:Owner} is populated by Policy Manager with the name of the onboarded user.

Onboard Device Owner Group: This filter is used for retrieving the name of the group the onboarded device owner belongs to.

(distinguishedName=%{Onboard memberOf})

This query fetches all group records where the DN is the value returned by the Onboard

memberOf variable. The attribute fetched with this filter query is cn, which is the name of the

Onboard group.

Generic

LDAP

Directory

Authentication: This is the filter used for authentication.

(&(objectClass=*)(uid=%{Authentication:Username}))

When a request arrives, Policy Manager populates %{Authentication:Username} with the authenticating user or machine. This filter is also set up to fetch the following attributes based on this filter query: n

dn (aliased to UserDN): This is an internal attribute that is populated with the user record’s

DN.

Group: This is the filter used for retrieving the name of the groups to which a user belongs.

(&(objectClass=groupOfNames)(member=%{UserDn}))

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 169

Table 80: Active Directory/LDAP Default Filters (Continued)

Directory Default Filters n This query fetches all group records (of objectClass groupOfNames), where the member field contains the DN of the user record (UserDN, which is populated after the authentication filter query is executed. The attribute fetched with this filter query is cn, which is the name of the group (this is aliased to a more readable name: groupName)).

Add More

Filters

Click this button to open the Authentication Sources > Add page to open the Configure Filter page. From this page, you can define a filter query and the related attributes to be fetched.

Browse Tab

The Browse tab shows an LDAP browser from which you can browse the nodes in the LDAP or AD directory, starting at the base DN. This is presented in the read-only mode. Selecting a leaf node (a node that has no children) displays the attributes associated with that node.

The following image is an example of the AD/LDAP Configure Filter - Browse tab:

Figure 121: AD/LDAP Configure Filter - Browse Tab

The following table describes the AD/LDAP Configure Filter Page - Browse tab parameters:

Table 81: AD/LDAP Configure Filter Page - Browse Tab Parameters

Navigation Description

Find Node Find the node by entering the DN and clicking the Go button.

170 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

Filter Tab

The Filter tab provides an LDAP browser interface to define the filter search query. You can define the attributes used in the filter query using this interface.

The following image is an example of the AD/LDAP Create Filter Page - Filter tab:

Figure 122: Active Directory/LDAP Create Filter Page - Filter Tab

Policy Manager is pre-configured with filters and selected attributes for Active Directory and generic LDAP directory.

Create new filters only if you need Policy Manager to fetch role mapping attributes from a new type of record.

You can fetch different types of records by specifying multiple filters that use different dynamic session attributes.

For example, Policy Manager can fetch the user record associated with %{Authentication:Username} and a machine record associated with %{RADIUS:IETF:Calling-Station-ID} for a given request.

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 171

The following table describes the Configure Filter Page - Filter tab parameters:

Table 82: Configure Filter Page - Filter Tab Parameters

Parameter Description

Find Node Find a node by entering the DN and clicking the Go button.

Select the attributes for filter

This table has a name and value column. You can enter the attribute name in the following two ways: l By selecting a node, inspecting the attributes, and then manually entering the attribute name by clicking on Click to add... in the table row.

l

By selecting an attribute on the right hand side of the LDAP browser. The attribute name and value are automatically populated in the table.

The attribute value can be a value that is automatically populated by selecting an attribute from the browser, or it can be manually populated. To aid in populating the value with dynamic session attribute values, a drop-down with the commonly used namespace and attribute names is presented.

Creating Filters

The goal of filter creation is to help Policy Manager to understand how to find a user or device connecting to the network in LDAP or Active Directory. Use the following steps to create a filter:

1. From the Filter tab, click on a node that you want to extract user or device information from. For example, browse the Users container in Active Directory and select the node for a user (Alice, for example). On the right hand side, you can view the attributes associated with that user.

2. Click on attributes that help Policy Manager to identify the user or device.

For example, in Active Directory, an attribute called sAMAccountName stores the user ID.

The attributes that you select are automatically populated in the Filter table displayed below the browser section with their values.

In this example, if you select sAMAccountName, the row in the Filter table shows this attribute with a value of Alice (assuming you picked Alice’s record as a sample user node).

3. After Step 2, you can have values for a specific record (in this example, Alice’s record). Change the value to a dynamic session attribute that helps Policy Manager associate a session with a specific record in LDAP/AD.

For example, if you selected the sAMAccountName attribute in AD, click the Value field and select %

{Authentication:Username}.

When Policy Manager processes an authentication request, %{Authentication:Username} is populated with the user ID of the user connecting to the network.

4. Add more attributes from the selected node and continue with Step 2.

Attributes Tab

The Attributes tab defines the attributes to be fetched from the Active Directory or LDAP directory.

You can also enable each attribute as a role, which means the value fetched for this attribute can be used directly in enforcement policies. For more information, see

Configuring Enforcement Policies on page 297 .

172 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Active Directory/LDAP Configure Filter - Attributes tab:

Figure 123: Active Directory/LDAP Configure Filter - Attributes Tab

The following table describes the Active Directory/LDAP Configure Filter Page - Attributes tab parameters:

Table 83: Active Directory/LDAP Configure Filter Page - Attributes Tab Parameters

Parameter Description

Enter values for parameters

Policy Manager parses the filter query (created in the Filter tab and shown at the top of the

Attributes tab) and prompts to enter the values for all dynamic session parameters in the query.

For example, if you have %{Authentication:Username} in the filter query, you are prompted to enter the value for it. You can enter wildcard character (*) here to match all entries.

NOTE: If there are thousands of entries in the directory, entering the wildcard character (*) can take a while to fetch all matching entries.

Execute After entering the values for all dynamic parameters, click Execute to execute the filter query. You can see all entries that match the filter query. Click on one of the entries (nodes) to view the list of attributes for that node. You can now click on the attribute names that you want to use as role mapping attributes.

Name

Enable As

Specify the name of the attribute.

Alias Name Specify the alternative name for the attribute. By default, this is the same as the attribute name.

Click this to enable this attribute value to be used directly as a role in an enforcement policy. This bypasses the step of assigning a role in Policy Manager through a role mapping policy.

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 173

Configuration Tab

The Configuration tab shows the filter and attributes configured in the Filter and Attributes tabs respectively. From this tab, you can also manually edit the filter query and attributes to be fetched.

The following figure displays the Configure Filter - Configuration tab:

Figure 124: Configure Filter Popup - Configuration Tab

Modify Default Filters

When you add a new authentication source of type Active Directory or LDAP, a few default filters and attributes are populated. You can modify these pre-defined filters by selecting a filter on the Authentication

> Sources > Attributes tab. This opens the Configure Filter page for the specified filter.

A minimum of one filter must be specified for the LDAP and Active Directory authentication source. This filter is used by Policy Manager to search for the user or device record. If not specified, authentication requests are rejected.

Figure 125: Modify Default Filters - Configuration Tab

174 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

The attributes that are defined for the authentication source display as attributes in role mapping policy rules editor under the authorization source namespace.

Then, on the Role Mappings - Rules Editor page, the operator values that display are based on the Data

type specified here.

For example, if you modify the Active Directory department to be an integer rather than a string, then the list of operator values populate with values that are specific to integers.

Summary Tab

You can use the Summary tab to view configured parameters. The following figure is an example of the

Generic LDAP - Summary tab:

Figure 126: Generic LDAP - Summary Tab

Generic SQL DB

Policy Manager can perform MSCHAPv2 and PAP/GTC authentication against any Open Database Connectivity

(ODBC) compliant SQL database such as Microsoft SQL Server, Oracle, MySQL, or PostgrSQL. Specify a stored procedure to query the relevant tables and retrieve role mapping attributes by using filters.

Configure the primary and backup servers, session details, filter query, and role mapping attributes to fetch the

Generic SQL authentication sources on the following tabs: l l l l

General Tab on page 176

Primary Tab on page 177

Attributes Tab on page 178

Summary Tab on page 180

The Configuration > Authentication > Sources > Add page includes two configuration options for managing existing Generic SQL DB authentication source. The Clear Cache option on the main page clears the attributes cached by Policy Manager for all entities that authorize against this serve, and the Copy option creates a copy of this authentication/authorization source.

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 175

General Tab

The General tab labels the authentication source and defines session details, authorization sources, and backup server details. The following figure displays the Generic SQL DB - General tab:

Figure 127: Generic SQL DB - General Tab

The following table describes the General SQL DB - General parameters:

Table 84: General SQL DB - General Tab Parameters

Parameter Description

Name Specify the name of the authentication source.

Description

Type

Provide the additional information that helps to identify the authentication source.

Select the type of source. In this context, select Generic SQL DB.

Use for

Authorization

Enable this option to request Policy Manager to fetch role mapping attributes (or authorization attributes) from this authentication source. If a user or device successfully authenticates against this authentication source, then Policy Manager also fetches role mapping attributes from the same source if the Use for Authorization field is enabled. This check box is enabled by default.

176 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

Table 84: General SQL DB - General Tab Parameters (Continued)

Parameter Description

Authorization

Sources

Specify additional sources from which to fetch role mapping attributes. Select a previously configured authentication source from the drop-down list and click Add to add to the list of authorization sources. Click Remove to remove the authorization source from the list.

If Policy Manager authenticates the user or device from this authentication source, then Policy

Manager also fetches role mapping attributes from these additional authorization sources.

NOTE: You can specify additional authorization sources at the service level. Policy Manager fetches role mapping attributes irrespective of which authentication source the user or device was authenticated against.

Backup

Servers

Cache

Timeout

To add a backup server, click Add Backup. From the Backup 1 tab, you can specify connection details for a backup server (same fields as for primary server that are specified below).

To remove a backup server, select the server name and click Remove. Select Move Up or Move

Down to change the server priority of the backup servers. This is the order in which Policy

Manager attempts to connect to the backup servers.

Policy Manager caches attributes fetched for an authenticating entity. This parameter controls the time period for which the attributes are cached.

Primary Tab

The Primary tab defines the settings for the primary server. The following figure displays the General

SQL DB - Primary tab:

Figure 128: General SQL DB - Primary Tab

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 177

The following table describes the Generic SQL DB - Primary parameters:

Table 85: Generic SQL DB - Primary Tab Parameters

Parameter Description

Server

Name

Enter the hostname or IP address of the database server.

Specify a port value to override the default port.

Port

(Optional)

Database

Name

Login

Username

Password

Timeout

Enter the name of the database from which records can be retrieved.

ODBC

Driver

Password

Type

Enter the name of the user used to log into the database. This account must have read access to all the attributes that need to be retrieved by the specified filters.

Enter the password for the user account entered in the Login Username field.

Enter the duration in seconds that Policy Manager waits before attempting to fail over from primary to backup servers (in the order in which they are configured).

Select the ODBC driver (Postgres, Oracle11g, or MSSQL) to connect to the database.

MySQL is supported in versions 6.0 and later. Aruba does not ship MySQL drivers by default. If you require MySQL, contact Aruba support to get the required patch. This patch does not persist across upgrades. If you are using MySQL, you should contact support before upgrading.

If you connect to a Microsoft SQL server using Integrated Authentication, the login username in the authentication source, formatted as either domain/username or UPN (User Principal Name), the backslash ( \ ) and at-sign (@) characters in addition to the hyphen and underscore characters are supported.

Specify how the user password is stored in the database: l Cleartext : Password is stored as clear, unencrypted text.

l l

NT Hash: Password is stored with an NT hash using MD4.

LM Hash : Password is stored with a LAN Manager Hash using DES.

l l

SHA: Password is stored with a Secure Hash Algorighm (SHA) hash.

SHA256: Password is stored with an SHA-256 hash function.

Attributes Tab

The Attributes tab defines the SQL DB query filters and the attributes to be fetched by using those filters. The following figure displays the Generic SQL DB - Attributes tab:

178 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

Figure 129: Generic SQL DB - Attributes Tab

The following table describes the Generic SQL DB - Attributes (Filter List) parameters:

Table 86: Generic SQL DB - Attributes Tab (Filter List) Parameters

Tab Parameter/Description

Filter

Name

Specifies the name of the filter.

Attribute

Name

Specifies the name of the SQL DB attributes defined for this filter.

Alias

Name

Specifies an alias name for each attribute name selected for the filter.

Enabled

As

Indicates whether the filter is enabled as a role or attribute type. This can also be blank.

Add

More

Filters

Click this button to open the Configure Filter page. Use this page to define a filter query and the related attributes to be fetched from the SQL DB store.

Figure 130

displays the Generic SQL DB -

Configure Filter page.

The following figure displays the Generic SQL DB - Configure Filter page:

Figure 130: Generic SQL DB - Configure Filter Page

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 179

The following table describes the Generic SQL DB - Configure Filter parameters:

Table 87: Generic SQL DB Configure Filter Page Parameters

Parameter Description

Filter Name Enter the name of the filter.

Filter Query Specify an SQL query to fetch the attributes from the user or device record in DB.

Name Specify the name of the attribute.

Alias Name Specify the name for the attribute. By default, this is the same as the attribute name.

Data Type Specify the data type for this attribute such as String, Integer, or Boolean.

Enabled As Specify whether this value to be used directly as a role or attribute in an enforcement policy. This bypasses the step of having to assign a role in Policy Manager through a role mapping policy.

Summary Tab

Use the Summary tab to view the parameters configured in the General, Primary, and Attributes tabs. The following figure displays the Generic SQL DB - Summary tab:

Figure 131: Generic SQL DB - Summary Tab

.

HTTP

The HTTP authentication source relies on the GET method to retrieve information. The client submits a request, and then the server returns a response. All request parameters are included in the URL. For example, URL:

https//hostname/webservice/…/%{Auth:Username}?param1=%{…}&param2=value2. HTTP relies on the assumption that the connection between the client and server is secure and can be trusted.

Configure primary and backup servers, session details, filter query, and role mapping attributes to fetch HTTP authentication sources using the following tabs: l l l

General Tab on page 181

Primary Tab on page 182

Attributes Tab on page 183

180 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

l

Summary Tab on page 185

General Tab

The General tab labels the authentication source and defines session details, authorization sources, and backup server details. The following figure displays the HTTP - General tab:

Figure 132: HTTP - General Tab

The following table describes the HTTP - General tab parameters:

Table 88: HTTP - General Tab Parameters

Parameter Description

Name Specify the name of the authentication source.

Description

Type

Provide the additional information that helps to identify the authentication source.

Select the type of source. In this context, select HTTP.

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 181

Table 88: HTTP - General Tab Parameters (Continued)

Parameter Description

Use for

Authorization

Enable this option to request Policy Manager to fetch role mapping attributes (or authorization attributes) from this authentication source. If a user or device successfully authenticates against this authentication source, then Policy Manager also fetches role mapping attributes from the same source if the Use for Authorization field is enabled. This check box is enabled by default.

Authorization

Sources

Specify additional sources from which to fetch role mapping attributes. Select a previously configured authentication source from the drop-down list and click Add to add it to the list of authorization sources. Click Remove to remove the selected additional resource from the list.

If Policy Manager authenticates the user or device from this authentication source, then also fetches role mapping attributes from these additional authorization sources.

NOTE: You can specify additional authorization sources at the service level. Policy Manager fetches role mapping attributes irrespective of which authentication source the user or device was authenticated against.

Backup

Servers

To add a backup server, click Add Backup. From the Backup 1 tab, you can specify connection details for a backup server (same fields applicable for primary server specified below).

To remove a backup server, select the server name and click Remove. Select Move Up or Move

Down to change the server priority of the backup servers. This is the order in which Policy

Manager attempts to connect to the backup servers.

Primary Tab

The Primary tab defines the settings for the primary server. The following figure displays the HTTP - Primary tab:

Figure 133: HTTP - Primary Tab

182 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

The following table describes the HTTP - Primary tab parameters:

Table 89: HTTP - Primary Tab Parameters

Parameter Description

Base URL Enter the base URL (host name) or IP address of the HTTP server.

For example, http://<hostname> or <fully-qualified domain name>:xxxx, where xxxx is the port to access the HTTP Server.

Login

Username

Password

Enter the name of the user used to log into the database. This account must have read access to all the attributes that need to be retrieved by the specified filters.

Enter the password for the user account entered in the Login Username field.

Attributes Tab

The Attributes tab defines the HTTP query filters and the attributes to be fetched by using those filters.

Figure 134: HTTP - Attributes Tab

The following table describes the HTTP - Attributes tab parameters:

Table 90: HTTP - Attributes tab (Filter List) Parameters

Parameter Description

Filter Name

Attribute Name

Displays the name of the filter.

Specifies the name of the SQL DB attributes defined for this filter.

Alias Name

Enabled As

Specifies the name of an alias name for each attribute name selected for the filter.

Indicates whether an attribute is enabled as a role.

Add More Filters Opens the Configure Filter page. For more information, see

Add More Filters on page 184 .

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 183

Add More Filters

The Configure Filter page defines a filter query and the related attributes to be fetched from the SQL DB store. The following figure displays the HTTP Filter Configure page:

Figure 135: HTTP Filter Configure Page

The following table describes the HTTP Configure - Filter parameters:

Table 91: HTTP Configure Filter Page Parameters

Parameter Description

Filter Name Displays the name of the selected filter.

Filter Query Specifies the HTTP path (without the server name) to fetch the attributes from the HTTP server. For example, if the full path name to the filter is http server URL = http://<hostname or fqdn>:xxxx/abc/def/xyz, you enter /abc/def/xyz.

Name Specifies the name of the attribute.

Alias Name Specifies the alias name for the attribute. By default, this is the same as the attribute name.

Data Type Specifies the data type for this attribute such as String, Integer, and Boolean.

Enabled As Specify whether the value to be used directly as a role or attribute in an enforcement policy. This bypasses the step of assigning a role in Policy Manager through a role mapping policy.

184 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

Summary Tab

You can use the Summary tab to view configured parameters. The following figure is an example of the HTTP

- Summary tab:

Figure 136: HTTP - Summary Tab l l

Kerberos

Policy Manager can perform standard PAP/GTC or tunneled PAP/GTC (for example, EAP-PEAP[EAP-GTC]) authentication against any Kerberos 5 compliant server such as Microsoft Active Directory server. It is mandatory to pair this source type with an authorization source (identity store) containing user records.

You can configure Kerberos authentication sources using the following tabs: l

General Tab on page 186

Primary Tab on page 187

Summary Tab on page 188

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 185

General Tab

The General tab labels the authentication source and defines session details, authorization sources, and backup server details. The following figure displays the Kerberos - General tab:

Figure 137: Kerberos - General Tab

The following table describes the Kerberos - General parameters:

Table 92: Kerberos - General Tab Parameters

Parameter Description

Name

Description

Specify the name of the authentication source.

Provide the additional information that helps to identify the authentication source.

Type Select the type of source. In this context, select Kerberos.

186 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

Table 92: Kerberos - General Tab Parameters (Continued)

Parameter Description

Use for Authorization Disable in this context.

Authorization Sources Specify one or more authorization sources from which role mapping attributes to be fetched. Select a previously configured authentication source from the drop-down list and click Add to add it to the list of authorization sources. Click Remove to remove the selected authentication source from the list.

NOTE: You can specify additional authorization sources at the service level. Policy

Manager fetches role mapping attributes irrespective of which authentication source the user or device was authenticated against.

Backup Servers To add a backup kerberos server, click Add Backup. From the Backup 1 tab, you can specify connection details for a backup server (same fields applicable for primary server specified below).

To remove a backup server, select the server name and click Remove. Select Move Up or Move Down to change the server priority of the backup servers. This is the order in which Policy Manager attempts to connect to the backup servers.

Primary Tab

The Primary tab defines the settings for the primary server. The following figure displays the Kerberos -

Primary tab:

Figure 138: Kerberos - Primary Tab

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 187

The following table describes the Kerberos - Primary parameters:

Table 93: Kerberos - Primary Tab Parameters

Parameter Description

Hostname Specify the name of the host or the IP address of the kerberos server.

Port Specify the port at which the token server listens for kerberos connections. The default port is 88.

Specify the domain of authentication. In the case, specify Kerberos domain.

Realm

Service Principal Name Enter the identity of the service principal as configured in the Kerberos server.

Service Principal

Password

Enter the password for the service principal.

Summary Tab

You can use the Summary tab to view configured parameters. The following figure displays the Kerberos -

Summary tab:

Figure 139: Kerberos - Summary Tab

Okta

You can use Okta as an authentication source only for servers of the type Aruba Application Authentication.

Configure Okta authentication sources on the following tabs: l l l l

General Tab on page 189

Primary Tab on page 190

Attributes Tab on page 191

Summary Tab on page 193

188 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

General Tab

The General tab labels the authentication source and defines session details, authorization sources, and backup server details. The following figure is an example of the Okta - General tab:

Figure 140: Okta - General Tab

The following table describes the Okta - General parameters:

Table 94: Okta - General Tab Parameters

Parameter

Name

Description

Specify the name of the authentication source.

Description

Type

Use for

Authorization

Provide the additional information that helps to identify the authentication source.

Select the type of source. In this context, select Okta.

Enable this check box to request Policy Manager to fetch role mapping attributes (or authorization attributes) from this authentication source. If a user or device successfully authenticates against this authentication source, then Policy Manager also fetches role mapping attributes from the same source if the Use for Authorization field is enabled. This check box is enabled by default.

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 189

Table 94: Okta - General Tab Parameters (Continued)

Description Parameter

Server Timeout Specify the duration in number of seconds that Policy Manager waits before considering this server unreachable. If multiple backup servers are available, then this value indicates the duration in number of seconds that Policy Manager waits before attempting to fail over from the primary to the backup servers in the order in which they are configured.

Cache Timeout

Backup Servers

Priority

Policy Manager caches attributes fetched for an authenticating entity. This parameter controls the duration in number of seconds for which the attributes are cached.

Click Add Backup to add a backup server. From the Backup 1 tab, you can specify connection details for a backup server (same fields as for primary server that are specified below).

To remove a backup server, select the server name and click Remove. Select Move Up or

Move Down to change the server priority of the backup servers. This is the order in which

Policy Manager attempts to connect to the backup servers.

Primary Tab

The Primary tab defines the settings for the primary server. The following figure displays the Okta - Primary tab:

Figure 141: Okta - Primary Tab

The following table describes the Okta - Primary parameters:

Table 95: Okta - Primary Tab Parameters

Description Parameter

Connection Details

URL

Authorization Token

Enter the address of the Okta server.

Enter the authorization token provided by Okta support.

190 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

Attributes Tab

The Attributes tab defines the Okta query filters and the attributes to be fetched by using those filters. The following figure displays the Okta - Attributes tab:

Figure 142: Okta - Attributes Tab

The following table describes the Okta - Attributes parameters:

Table 96: Okta - Attributes Tab Parameters

Parameter Description

Filter Name Displays the name of the filter.

You can configure only Group for Okta.

Attribute Name

Alias Name

Enable As

Specifies the name of the LDAP/AD attributes defined for this filter.

Specifies the alias name for each attribute name selected for the filter.

Specifies whether value to be used directly as a role or attribute in an enforcement policy. This bypasses the step of assigning a role in Policy Manager through a role mapping policy.

Add More Filters Click this button to open the Configure Filter page. Refer to

Add More Filters on page 192

.

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 191

Add More Filters

The Configure Filter page defines a filter query and the related attributes to be fetched from the SQL DB store. The following figure displays the Okta - Configure Filter page:

Figure 143: Okta - Configure Filter Page

The following table describes the Okta Configure Filter parameters:

Table 97: Okta Configure Filter Page

Parameter Description

Filter Name Enter the name of the filter.

Filter Query Specifies an SQL query to fetch attributes from the user or device record in DB.

Name Displays the name of the attribute.

Alias Name Specifies an alias name for the attribute. By default, this is the same as the attribute name.

Data Type

Enabled As

Specifies the data type for this attribute such as String, Integer, and Boolean.

Specify whether this value is to be used directly as a role or attribute in an enforcement policy. This bypasses the step of having to assign a role in Policy Manager through a role mapping policy.

192 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

Summary Tab

You can use the Summary tab to view configured parameters. The following figure displays the Okta -

Summary tab:

Figure 144: Okta - Summary Tab

RADIUS Server

You can use the RADIUS Server as an authentication source to allow ClearPass to query a third-party

RADIUS Server for authentication. Configure RADIUS Server authentication sources on the following tabs: l l l l

General Tab on page 193

Primary Tab on page 194

Attributes Tab on page 195

Summary Tab on page 196

General Tab

The General tab labels the authentication source and defines session details, authorization sources, and backup server details. The following figure displays the RADIUS Server - General tab:

Figure 145: RADIUS Server - General Tab

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 193

The following table describes the Radius Server - General parameters:

Table 98: Radius Server - General Tab Parameters

Parameter

Name

Description

Specify the name of the authentication source.

Description

Type

Use for

Authorization

Server Timeout

Backup Servers

Priority

Provide the additional information that helps to identify the authentication source.

Select the type of source. In this context, select RADIUS Server.

Enable this check box to request Policy Manager to fetch role mapping attributes (or authorization attributes) from this authentication source. If a user or device successfully authenticates against this authentication source, then Policy Manager also fetches role mapping attributes from the same source if the Use for Authorization field is enabled. This check box is enabled by default.

Specify the duration in number of seconds that Policy Manager waits before considering this server unreachable. If multiple backup servers are available, then this value indicates the duration in number of seconds that Policy Manager waits before attempting to fail over from the primary to the backup servers in the order in which they are configured.

Click Add Backup to add a backup server. From the Backup 1 tab, you can specify connection details for a backup server (same fields as for primary server that are specified below).

To remove a backup server, select the server name and click Remove. Select Move Up or

Move Down to change the server priority of the backup servers. This is the order in which

Policy Manager attempts to connect to the backup servers.

Primary Tab

The Primary tab defines the settings for the primary server. The following figure displays the RADIUS Server -

Primary tab:

Figure 146: RADIUS Server - Primary Tab

194 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

The following table describes the Radius Server - Primary parameters:

Table 99: RADIUS Server - Primary Tab Parameters

Parameter

Connection Details

Description

Server Names Enter the name of the RADIUS Server.

Port

Secret

The default port number is 1812. You may enter a different port number if required.

Enter the secret key for authentication.

Attributes Tab

The Attributes tab defines the Okta query filters and the attributes to be fetched by using those filters. The following figure displays the RADIUS Server - Attributes tab:

Figure 147: RADIUS Server - Attributes Tab

The following table describes the RADIUS Server - Attributes parameters:

Table 100: RADIUS Server - Attributes Tab Parameters

Parameter Description

RADIUS Pre-

Proxy attributes

The following attributes that can be set prior to the proxy authentication: l Type - Select a type from the drop-down.

l l

Name - Select a name from the drop-down.

Value - Enter a value in the text box.

Save the changes by clicking the Save icon that appears at the end of the row.

RADIUS Post-

Proxy attributes

The attributes for the post-proxy authentication are identical except that these can be set after the proxy authentication.

l l

Type - Select a type from the drop-down.

Name - Select a name from the drop-down.

l Value - Enter a value in the text box.

Save the changes by clicking the Save icon that appears at the end of the row.

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 195

Summary Tab

You can use the Summary tab to view configured parameters. The following figure displays the RADIUS

Server - Summary tab:

Figure 148: RADIUS Server - Summary Tab

Static Host List

l l l

An internal relational database stores the Policy Manager configuration data and locally configured user and device accounts. The following three pre-defined authentication sources represent the following three databases used to store local users, guest users, and registered devices respectively:

[Local User Repository]

[Guest User Repository]

[Guest Device Repository]

While regular users reside in an authentication source such as Active Directory (or in other LDAP-compliant stores), you can configure the temporary users including guest users in the Policy Manager local repositories.

For a user account created in local database, the role is statically assigned to that account. This means you do not need to specify a role mapping policy for user accounts in the local database. However, if new custom attributes are assigned to a user (local or guest) account in the local database, these can be used in role mapping policies.

The local user database is pre-configured with a filter to retrieve the password and the expiry time for the account. Policy Manager can perform MSCHAPv2 and PAP/GTC authentication against the local database.

Configure primary and backup servers, session details, and the list of static hosts for Static Host List authentication sources on the following tabs: l l l

General Tab on page 197

Static Host Lists Tab on page 197

Summary Tab on page 198

196 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

General Tab

The General tab labels the authentication source. The following figure displays the Static Host List -

General tab:

Figure 149: Static Host List - General Tab

The following table describes the Static Host List - General parameters:

Table 101: Static Host List - General Tab Parameters

Parameter Description

Name Specify the name of the authentication source.

Description

Type

Use for

Authorization

Authorization

Sources

Provide the additional information that helps to identify the authentication source.

Select the type of authentication. In this context, select Static Host List.

This option is not configurable.

This option is not configurable.

Static Host Lists Tab

The Static Hosts List tab defines the list of static hosts to be included as part of an authorization source. The following figure displays the Static Host List - Static Host Lists tab:

Figure 150: Static Host List - Static Host Lists Tab

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 197

The following table describes the Static Host List - Static Host Lists parameters:

Table 102: Static Hosts List - Static Host Lists Tab Parameters

Parameter Description

MAC

Address

Host Lists

Select a static host list from the drop-down list and click Add to add it to the list. Click Remove to remove the selected static host list. Click on View Details to view the contents of the selected static host list. Click on Modify to modify the selected static host list.

Only static host lists of type MAC Address List or MAC Address Regular Expression can be configured as authentication sources. Refer to

Adding and Modifying Static Host Lists on page 208

for more information.

Summary Tab

You can use the Summary tab to view configured parameters. The following figure displays the Static Hosts

List - Summary tab:

Figure 151: Static Hosts List - Summary Tab

Token Server

Policy Manager can perform GTC authentication against any token server than can authenticate users by acting as a RADIUS server (for example, RSA SecurID Token Server) and can authenticate users against a token server and fetch role mapping attributes from any other configured authorization source.

Pair this source type with an authorization source (identity store) containing user records. When using a token server as an authentication source, use the administrative interface to optionally configure a separate authorization server. Policy Manager can also use the RADIUS attributes returned from a token server to create role mapping policies. For more information, see

Namespaces on page 613

.

You configure primary and backup servers, session details, and the filter query and role mapping attributes to fetch for token server authentication sources on the following tabs: l l l l

General Tab on page 199

Primary Tab on page 200

Attributes Tab on page 200

Summary Tab on page 201

198 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

General Tab

The General tab labels the authentication source and defines session details, authorization sources, and backup server details. The following figure displays the Token Server - General tab:

Figure 152: Token Server - General Tab

The following table describes the Token Server - General parameters:

Table 103: Token Server - General Tab Parameters

Parameter Description

Name Specify the label of the authentication source.

Description Provide the additional information that helps to identify the authentication source.

Type Select the type of authentication. In this context, select Token Server.

Use for

Authorization

Enable this check box to instruct Policy Manager to fetch role mapping attributes (or authorization attributes) from this authentication source. If a user or device successfully authenticates against this authentication source, then Policy Manager also fetches role mapping attributes from the same source if the Use for Authorization field is enabled. This check box is enabled by default

Authorization

Sources

Specify additional sources from which to fetch role mapping attributes. Select a previously configured authentication source from the drop-down list, and click Add to add it to the list of authorization sources. Click Remove to remove it from the list.

If Policy Manager authenticates the user or device from this authentication source, then it also fetches role mapping attributes from these additional authorization sources.

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 199

Table 103: Token Server - General Tab Parameters (Continued)

Parameter Description

Server

Timeout

NOTE: You can specify additional authorization sources at the service level. Policy Manager fetches role mapping attributes irrespective of which authentication source the user or device was authenticated against.

Specify the duration in seconds that Policy Manager waits before attempting to fail over from primary to backup servers (in the order in which they are configured).

Backup

Servers

Priority

To add a backup server, click Add Backup. From the Backup 1 tab, you can specify connection details for a backup server (same fields as for primary server that are specified below).

To remove a backup server, select the server name and click Remove. Select Move Up or Move

Down to change the server priority of the backup servers. This is the order in which Policy

Manager attempts to connect to the backup servers.

Primary Tab

The Primary tab defines the settings for the primary server. The following figure displays the Token Server -

Primary tab:

Figure 153: Token Server - Primary Tab

The following table describes the Token Server - Primary parameters:

Table 104: Token Server - Primary Tab Parameters

Parameter Description

Server

Name

Displays the host name or the IP address of the token server,

Port

Secret

Specifies the UDP port at which the token server listens for RADIUS connections. The default port is

1812.

Specify the RADIUS shared secret to connect to the token server.

Attributes Tab

The Attributes tab defines the RADIUS attributes to be fetched from the token server. These attributes can be used in role mapping policies. Policy Manager loads all RADIUS vendor dictionaries in the Type drop-down list with attributes.

200 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

The following figure is an example of the Token Server - Attributes tab:

Figure 154: Token Server - Attributes Tab

See

Configuring a Role and Role Mapping Policy on page 217

for more information. The following table describes the Token Server - Attribute parameters:

Table 105: Token Server - Attribute Tab Parameters

Parameter Description

Type

Name

Select the type of authentication source from the drop-down list.

Specifies the name of the token server attributes.

Enabled as

Role

Specifies whether value is to be used directly as a role or attribute in an enforcement policy. This bypasses the step of assigning a role in Policy Manager through a role mapping policy.

Summary Tab

The Summary tab provides the summarized view of the parameters configured in the General, Primary, and

Attributes tab. The following figure displays the Summary tab:

Figure 155: Token Servers - Summary Tab

ClearPass Policy Manager 6.5 | User Guide Authentication and Authorization | 201

202 | Authentication and Authorization ClearPass Policy Manager 6.5 |  User Guide

Chapter 5

Configuring Identity Settings

This chapter provides information on the following topics: l l l l

Configuring Single Sign-On on page 203

Managing Local Users on page 204

Adding and Modifying Endpoints on page 210

Adding and Modifying Static Host Lists on page 208

This chapter provides details on the WebUI settings required to configure ClearPass Policy Manager Identify settings.

The Policy Manager database supports storage of user records when a particular class of users is not present in a central user repository (for example, when there is neither Active Directory nor any other database).

To authenticate local users from a particular service, include Local User Repository among the authentication sources.

Configuring Single Sign-On

The Single Sign-On (SSO) settings on the Configuration > Identity > Single Sign-On page allows ClearPass users that have signed in ClearPass Policy Manager to access the Onboard, Guest, and Insight applications and

Policy Manager administration settings without re-authenticating. ClearPass provides SSO support using the

Security Assertion Markup Language (SAML).

The single-sign on section of the ClearPass Policy Manager UI contains two tabs: l l

SAML Service Provider (SP) Configuration on page 203

Identity Provider (IdP) Configuration on page 204

SAML Service Provider (SP) Configuration

Select the application(s) you want users to access with single sign-on, and create trusted relationships between a Service Provider (SP) and Identity Provider (IdP) by providing the Identity Provider (IdP) URL and IdP certificate.

The following table describes the Configuration > Identity > Single Sign-On>SAML SP Configuration tab parameters:

Table 106: SAML Service Provider Configuration Settings

Parameter

Identity Provider

(IdP) URL

Description

Enter the URL of the identity provider.

Enable SSO For Select Onboard, Guest or Insight to enable single-sign on access to these applications. Select

Policy Manager to enable single-sign on access to Policy Manager administration settings.

Select Certificate Select the Identity Provider (IdP) certificate to use for single-sign on. When you select a certificate, the UI tab displays the following information about the certificate:

ClearPass Policy Manager 6.5 | User Guide Configuring Identity Settings | 203

Table 106: SAML Service Provider Configuration Settings (Continued)

Parameter Description l l l

Subject DN

Issuer DN

Issue Date/Time l l l l

Expiry Date/Time

Validity Status

Signature Algorithm

Public Key Format l l

Serial Number

Enabled

This field only displays certificates that are enabled in the certificate trust list. See also

Certificate Trust List on page 545

CPPM Service

Provider (SP)

Metadata l l

SP Metadata: Click Download to download and view an XML file containing metadata for the Service Provider Uniform Resource Identifier (URI).

Metadata URI : View the Uniform Resource Identifier (URI) for the SP metadata resource.

Identity Provider (IdP) Configuration

The following table describes the Configuration > Identity > Single Sign-On>SAML IdP Configuration tab:

Table 107: SAML Identity Provider Configuration Settings

Parameter

IdP Portal Name

Description

Enter the name of the identity provider portal. Click Download to download and view an XML file containing metadata for the Identity Provider Uniform Resource Identifier (URI).

IdP Metadata URI

Service Provider

(SP) Metadata

CPPM Service

Provider (SP)

Metadata

View the Uniform Resource Identifier (URI) for the IdP metadata resource.

If you upload metadata for an SAML Service Providers, ClearPass can upload the SP metadata for validation during the single-sign on process

1. Click Add SP Metadata.

2. Enter the name of the service provider.

3. Upload the service provider metadata file. For information on obtaining a service provider metadata file, see

CPPM Service Provider (SP) Metadata on page 204

l l

SP Metadata section: Click Download to download and view an XML file containing metadata for the Service Provider Uniform Resource Identifier (URI).

The Metadata URI : View the location of this metadata file.

l l l l

Managing Local Users

This section provides the following information:

Adding a Local User

Modifying a Local User Account

Importing and Exporting Local Users

Setting Password Policy for Local Users

204 | Configuring Identity Settings ClearPass Policy Manager 6.5 |  User Guide

Policy Manager lists all local users in the Configuration > Identity > Local Users page.

You can also add, import, export, and set password policies for the local users using the links provided at the top-right corner of the Local Users page.

The following figure displays the Local Users page:

Figure 156: Local Users Listing

Adding a Local User

To add a local user in the Local Users table:

1. Click Add link at the top-right corner the page. The Add Local User window is displayed.

2. In the User ID and Name fields, specify a user ID and name for the local user.

3. In the Password and Verify Password fields, specify a password for the local user.

4. Select the Enable User check box to enable the user account. Otherwise, the user account is disabled.

5. Select a static role to be assigned to the user from the Role drop-down list.

6. Under the Attributes tab, click the Click to add... row to add attributes for the local users. A new row is created with a drop-down list in the Attribute column. This field is optional. By default, the drop-down list contains the following attributes: l

Phone l l l l

Email

Sponsor

Title

Department l

Designation a. Select an attribute from the drop-down list or enter any string to add a custom attribute in the

Attribute column.

If you add a new custom attribute, it is available for selection in the Attribute drop-down list for all local users.

b. In the Value column, enter a value for the attribute specified in the corresponding row.

All attributes entered for a local user are available in the role mapping rules editor under the LocalUser namespace.

7. Click Add.

ClearPass Policy Manager 6.5 | User Guide Configuring Identity Settings | 205

The following figure displays the Add Local User page:

Figure 157: Add Local User

Modifying a Local User Account

To modify a local user account in the Local Users table:

1. Click the User ID row that you want to edit. The Edit Local User window is displayed.

2. Modify any values in the Edit Local User window. For more information on editing the fields, see

Adding a

Local User on page 205

.

3. Click Save.

206 | Configuring Identity Settings ClearPass Policy Manager 6.5 |  User Guide

Figure 158: Modify Local User

Importing and Exporting Local Users

You can import or export the admin user accounts by using the Import and Export All links at the top-right corner of the Local Users page. You can also export specific user accounts by using the Export button that appears after selecting one or more user accounts from the list.

The passwords of the local user accounts are not stored in cleartext when exported to an XML file.

Setting Password Policy for Local Users

To set password policies for the local users:

1. Click the Password Policy link from the upper right portion of the page. The Password Policy window is displayed.

2. Specify the minimum length required for the password in the Minimum Length field.

3. Select the complexity setting from the Complexity drop-down list. The complexity settings can be one of the following: l l

No password complexity requirement

At least one uppercase and one lowercase letter l l

At least one digit

At lease one letter and one digit l l l

At least one of each: uppercase letter, lowercase letter, digit

At least one symbol

At least one of each: uppercase letter, lowercase letter, digit, and symbol

ClearPass Policy Manager 6.5 | User Guide Configuring Identity Settings | 207

4. Specify the characters not to be allowed in the password in the Disallowed Characters field.

5. Specify the words not to be allowed in the password in the Disallowed Words (CSV) field.

6. Select any additional checks, if required. The options are: l

May not contain User ID or its characters in reversed order l

May not contain repeated character four or more times consecutively

7. Set the password expiry time for the local users.

The allowed range is 0–500 days. The default value is 0.

If the value is set to 0, the password never expires. For any other value, the local users are forced to reset the expired password when they log in to the UI. The Policy Manager user interface alerts the users five days before the password expires.

8. Click Save.

Password Policy settings are effective only for the users created or modified after the changes are saved.

The following figure displays the Password Policy Settings window:

Figure 159: Set (Local User) Password Policy

Adding and Modifying Static Host Lists

A static host list comprises a named list of MAC or IP addresses, which can be invoked in the following ways: l l

In service and role-mapping rules as a component.

For non-responsive services on the network (for example, printers or scanners), as an authentication source.

Only static host lists of type MAC address are available as authentication sources. A static host list often functions, in the context of the service, as a whitelist or a blacklist. Therefore, they are configured independently at the global level.

208 | Configuring Identity Settings ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Static Host Lists page:

Figure 160: Static Host Lists Page

To add a static host list, go to the Configuration > Identity > Static Host Lists page and click the Add link.

The Add Static Host List pop-up opens. For more information, see the and

Table 108 :

Figure 161: Add Static Host List Page

The following table describes the Static Host Lists page parameters:

Table 108: Add Static Host List Page Parameters

Parameter Description

Name Enter the name of the static host list.

Description Enter the description that provides additional information about the static host list.

Host

Format

Host Type

List

Select a format for expression of the address: subnet, IP address, or regular

expression.

Select a host type: IP Address or MAC Address (radio buttons).

Use the Add Host and Remove Host widgets to maintain membership in the current

Static Host List.

Additional Available Tasks l l l

To edit a static host list from the Static Host Lists listing page, click on the name to display the Edit Static

Host List pop-up.

To delete a static host List from the Static Host Lists listing page, select a static host list using check box and click the Delete button.

To export a static host list, in the Static Host Lists listing page, select a static host list using check box and click the Export button.

ClearPass Policy Manager 6.5 | User Guide Configuring Identity Settings | 209

l l

To export all static host lists, in the Static Host Lists listing page, click the Export All link.

To import static host lists, in the Static Host Lists listing page, click the Import link l l l l l l

Adding and Modifying Endpoints

This section provides the following information:

Viewing List of Authentication Endpoints

Viewing Endpoint Authentication Details

Triggering Actions Performed on Endpoints

Updating Device Fingerprints From a Hosted Portal

Manually Adding an Endpoint

Modifying an Endpoint

Viewing List of Authentication Endpoints

Policy Manager automatically lists all endpoints that are authenticated in the Configuration > Identity >

Endpoints page.

The following figure shows an example of the Endpoints page.

Figure 162: List of Endpoints

Table 109: Endpoint Page Parameters

Parameter Description

MAC

Address

Displays the MAC address of the endpoint.

Hostname

Device

Category

Specifies the hostname of the policy server.

Specifies the built-in category of the profiled device belongs to. For example, Smart devices, Access

Points, Computer, VOIP phone, and so on.

210 | Configuring Identity Settings ClearPass Policy Manager 6.5 |  User Guide

Table 109: Endpoint Page Parameters (Continued)

Parameter Description

Device OS

Family

Status

Specifies the operating system that the device is configured with. For example, when the category is

Computer, ClearPass shows a Device OS Family of Windows, Linux, or Mac OS X.

Displays the status of the endpoint.

Profiled Displays whether the device is profiled or not.

Viewing Endpoint Authentication Details

To view the authentication details of an endpoint, select an endpoint by clicking the check box and click the

Authentication Records button from the Endpoints page.

This displays the Endpoint Authentication Details page.

Figure 163: Endpoint Authentication Details

Triggering Actions Performed on Endpoints

To trigger actions that are performed on endpoints, select an endpoint by clicking the check box and click the

Trigger Server Action button from the Endpoints page.

For example, locking a device, triggering a remote, enterprise wipe, and so on.

The following figure displays the Trigger Server Action page:

ClearPass Policy Manager 6.5 | User Guide Configuring Identity Settings | 211

Figure 164: Endpoints - Trigger Server Action Page

The following figure displays the Trigger Server Action page parameters:

Table 110: Trigger Server Action Page Parameters

Parameter Description

Server

Action

Select the server action from the drop-down list. The list includes the following options: l

Check Point Login l

Check Point Logout l l l l l

Fortinet Login

Fortinet Logout

Handle AirGroup Time Sharing

Nmap Scan

SNMP Scan

Context

Server

Enter a valid server name. You can enter an IP address or domain name.

Server Type Specifies the server type configured when the server action was configured.

Action

Description

Specifies the description of the action. For example, the description can be "Delete all information stored" if the configured action is Remote Wipe.

Updating Device Fingerprints From a Hosted Portal

To update device fingerprints from a hosted portal, select an endpoint by clicking the check box and click the

Update Fingerprint button from the Endpoints page.

212 | Configuring Identity Settings ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Update Device Fingerprint page:

Figure 165: Update Device Fingerprint

The following table describes the Update Device Fingerprint page:

Table 111: Update Device Fingerprint parameters

Parameter Description

Device

Category

Device OS

Family

Select the built-in category of the profiled device belongs to. For example, Smartdevices, Access

Points, Computer, VOIP phone, and so on.

Select the operating system configured on the device. For example, when the category is Computer, you can select Windows, Linux, or Mac OS X.

Device

Name

Enter the name of the device. You can select the name of the device from the built-in list.

ClearPass Policy Manager 6.5 | User Guide Configuring Identity Settings | 213

Manually Adding an Endpoint

To manually add an endpoint, click Add to view the Add Endpoint page.

The following figure displays the Add Endpoint page.

Figure 166: Add Endpoint Page

The following table describes the Add Endpoint page parameters:

Table 112: Add Endpoint Page Parameters

Parameter Description

MAC

Address

Specifies the MAC address of the endpoint.

Description Specifies the description that provides additional information about the endpoint.

Status

Attributes

Mark the status as Known, Unknown, or Disabled client. The Known and Unknown status can be used in role mapping rules using the Authentication:MacAuth attribute. You can use the Disabled status to block access to a specific endpoint. This status is automatically set when an endpoint is blocked from the Endpoint Activity table (in the Live Monitoring section).

Add custom attributes for this endpoint. Click on the Click to add... row to add custom attributes.

You can enter any name in the attribute field. All attributes are of String datatype. The Value field can also be populated with any string. Each time you enter a new custom attribute, it is available for selection in the Attribute drop-down list for all endpoints. All attributes entered for an endpoint are available in the role mapping rules editor under the Endpoint namespace.

Modifying an Endpoint

To modify an endpoint in the Endpoints page, click an endpoint from the list of endpoints to display the Edit

Endpoint page.

214 | Configuring Identity Settings ClearPass Policy Manager 6.5 |  User Guide

Notice that the Policy Cache Values section lists the role(s) assigned to the user and the posture status.

Policy Manager can use these cached values in authentication requests from this endpoint. Clear Cache clears the computed policy results (roles and posture).

Figure 167: Edit Endpoint Page

The following table describes the Edit Endpoint page parameters:

Table 113: Edit Endpoint Page Parameters

Parameter Description

MAC

Address

Displays the MAC address of the endpoint.

Description Specifies the description that provides additional information about the endpoint.

Status

MAC

Vendor

Added by

Mark the status as Known client, Unknown client, or Disabled client. The Known and Unknown status can be used in role mapping rules using the Authentication:MacAuth attribute. You can use the Disabled client status to block access to a specific endpoint. This status is automatically set when an endpoint is blocked from the Endpoint Activity table (in the Live Monitoring section).

Displays the MAC OUI (Organizationally Unique Identifier) information for all endpoints even when no other profiling information is available for an endpoint.

Online

Status

Displays the name of the ClearPass server that added the endpoint.

Displays the online status of the endpoint.

ClearPass Policy Manager 6.5 | User Guide Configuring Identity Settings | 215

Table 113: Edit Endpoint Page Parameters (Continued)

Parameter Description

IP Address

Static IP

Displays the IP address that is associated with the endpoint.

Specifies the static IP address of the endpoint. You can select TRUE or FALSE. The default options is

FALSE.

Hostname

Device

Category

Enter the hostname or the IP address of the endpoint.

Specifies the built-in category of the endpoint belongs to. For example, Smart Devices, Access

Points, Computer, VOIP phone, and so on.

Device OS

Family

Specifies the operating system that the endpoint is configured with. For example, when the category is Computer, ClearPass Policy Manager shows a Device OS Family of Windows, Linux, or

Mac OS X.

Enter the name of the device. You can select the name of the device from the built-in list.

Device

Name

Added At Displays the time at which the endpoint was added.

Updated At Displays the time at which the endpoint was updated.

Show

Fingerprint

Select this option to view the endpoint fingerprint details.

Endpoint Fingerprint Details

Host User

Agent

Host OS

Type

Displays the host user agent of the endpoint. For example, Mozilla/5.0 (compatible; MSIE 10.0;

Windows NT 6.2; Trident/6.0).

Displays the type of the host operating system. For example, Windows 8.

Device

Category

Device

Family

Device

Name

Displays the category of the device. For example, Computer.

Displays the operating system family of the endpoint. For example, Windows.

Displays the name of the device.

Additional Available Tasks l l

To delete an endpoint, in the Endpoints page, select an endpoint (using check box) and click the Delete button.

To export an endpoint, in the Endpoints page, select an endpoint (using check box) and click the Export button.

216 | Configuring Identity Settings ClearPass Policy Manager 6.5 |  User Guide

l l

To export all endpoints, in the Endpoints page, click the Export All link in the upper right corner of the page.

To import endpoints, in the Endpoints page, click the Import link in the upper right corner of the page.

Configuring a Role and Role Mapping Policy

After authenticating a request, a Policy Manager service invokes its role mapping policy, resulting in assignment of a role(s) to the client. This role becomes the identity component of enforcement policy decisions.

A service can be configured without a role mapping policy, but only one role mapping policy can be configured for each service.

Policy Manager ships a number of preconfigured roles, including the following: l l l l l l l l l l

[Contractor] - Default role for a contractor

[Employee] - Default role for an employee

[Guest] - Default role for guest access

[Other] - Default role for other user or device

[TACACS API Admin] -API administrator role for Policy Manager admin

[TACACS Help Desk] - Policy Manager Admin role, limited to views of the Monitoring screens

[TACACS Network Admin] - Policy Manager Admin role, limited to Configuration and Monitoring UI screens

[TACACS Read-only Admin] - Read-only administrator role for Policy Manager Admin

[TACACS Receptionist] - Policy Manager Guest provisioning role

[TACACS Super Admin] - Policy Manager Admin role with unlimited access to all UI screens

Additional roles are available with AirGroup and Onboard licenses.

For additional tasks, see the following: l l

Adding and Modifying Role Mapping Policies on page 219

Adding and Modifying Roles on page 219

Identity Roles Architecture and Workflow

Roles can range in complexity from a simple user group (e.g., Finance, Engineering, or Human Resources) to a combination of a user group with some dynamic constraints (e.g., “San Jose Night Shift Worker”- An employee in the Engineering department who logs in through the San Jose network device between 8:00 PM and 5:00

AM on weekdays). It can also apply to a list of users.

A Role Mapping Policy reduces client (user or device) identity or attributes associated with the request to Role(s) for Enforcement Policy evaluation. The roles ultimately determine differentiated access.

ClearPass Policy Manager 6.5 | User Guide Configuring Identity Settings | 217

Figure 168: Role Mapping Process

A role can be: l l l l l l

Authenticated through predefined Single Sign-On rules.

Associated directly with a user in the Policy Manager local user database.

Authenticated based on predefined allowed endpoints.

Associated directly with a static host list, again through role mapping.

Discovered by Policy Manager through role mapping. Roles are typically discovered by Policy Manager by retrieving attributes from the authentication source. Filter rules associated with the authentication source tell Policy Manager where to retrieve these attributes.

Assigned automatically when retrieving attributes from the authentication source. Any attribute in the authentication source can be mapped directly to a role.

For more information, see: l

Configuring a Role and Role Mapping Policy on page 217

218 | Configuring Identity Settings ClearPass Policy Manager 6.5 |  User Guide

Adding and Modifying Roles

Policy Manager lists all available roles in the Configuration > Identity > Roles page. The following figure displays the Roles page:

Figure 169: Roles Page

You can configure a role from within a role mapping policy (Add New Role), or independently from the

Configuration > Identity > Roles > Add page. In either case, roles exist independently of an individual service and can be accessed globally through the role mapping policy of any service.

When you click Add roles from any of these locations, Policy Manager displays the Add New Role pop-up. The following figure displays the Add New Role page:

Figure 170: Add New Role Page

The following table describes the Add New Role parameters:

Table 114: Add New Role Page Parameters

Parameter Description

Name Enter the name of the role.

Description Enter the description that provides additional information about the new role.

Adding and Modifying Role Mapping Policies

From the Configuration > Services page, you can configure role mapping for a new service (as part of the flow of the Add Service wizard), or modify an existing role mapping policy directly from the Configuration >

Identity > Role Mappings page.

ClearPass Policy Manager 6.5 | User Guide Configuring Identity Settings | 219

The following figure displays the Role Mappings page:

Figure 171: Role Mappings Page

When you click Add role mapping from any of these locations, Policy Manager displays the Role Mappings page, which contains the following three tabs: l l

Policy Tab on page 220

Mapping Rules Tab on page 221

Policy Tab

The Policy tab labels the method and defines the default role. The default role is the role to which Policy

Manager defaults if the mapping policy does not produce a match for a given request.

The following figure displays the Role Mappings - Policy tab:

Figure 172: Role Mappings - Policy Tab

The following figure displays the Role Mappings - Policy tab parameters:

Table 115: Role Mappings - Policy Tab Parameters

Parameter Description

Policy

Name

Enter the name of the role mapping policy.

Description Enter the description that provides additional information about the role mapping policy.

Default Role Select the role to which Policy Manager will default when the role mapping policy does not produce

220 | Configuring Identity Settings ClearPass Policy Manager 6.5 |  User Guide

Table 115: Role Mappings - Policy Tab Parameters (Continued)

Parameter Description a match.

View Details Click on View Details to view the details of the default role.

Modify

Add new

Role

Click on Modify to modify the default role.

Click on Add new Role to add a new role.

Mapping Rules Tab

The Mapping Rules tab selects the evaluation algorithm to add, edit, remove, and reorder rules. On the

Mapping Rules tab, click the Add Rule button to create a new rule, or select an existing rule (by clicking on the row) and then click the Edit Rule or Remove Rule button.

The following figure displays the Role Mapping - Mapping Rules tab:

Figure 173: Role Mapping - Mapping Rules Tab

When you select Add Rule or Edit Rule, Policy Manager displays the Rules Editor pop-up.

Figure 174: Rules Editor Page

ClearPass Policy Manager 6.5 | User Guide Configuring Identity Settings | 221

The following table describes the Role Mappings Page - Rules Editor page parameters:

Table 116: Role Mappings Page - Rules Editor Page Parameters

Parameter Description

Type The rules editor appears throughout the Policy Manager interface. It exposes different namespace dictionaries depending on context. (Refer to

Namespaces on page 613 .)

In the role mapping context, Policy Manager allows attributes from following namespaces: l l l l l l l l

Application

Application:ClearPass

Authentication

Authorization

Authorization:<authorization_source_instance> - Policy Manager shows each instance of the authorization source for which attributes have been configured to be fetched. (See

Adding and Modifying Authentication Sources on page 161

). Only those attributes that have been configured to be fetched are shown in the attributes drop-down list.

Certificate

Connection

Date l l l l l l l l

Device

Endpoint

GuestUser

Host

LocalUser

Onboard

TACACS

RADIUS - All enabled RADIUS vendor dictionaries.

Name

Operator

Value

Displays the drop-down list of attributes present in the selected namespace.

Displays the drop-down list of context-appropriate (with respect to the attribute data type) operators. Operators have the obvious meaning; for stated definitions of operator meaning, refer to

Operators on page 624

.

Depending on attribute data type, this may be a free-form (one or many line) edit box, a dropdown list, or a time/date widget.

The operator values that display for each type and name are based on the data type specified for the authentication source (from the Configuration > Authentication > Sources page). If, for example, you modify the UserDN Data type on the authentication sources page to be an integer rather than a string, then the list of operator values here will populate with values that are specific to integers.

After you save your role mapping configuration, it appears in the Mapping Rules list. In this interface, you can select a rule, and then use the various widgets to move up, move down, edit the rule, or remove the rule.

222 | Configuring Identity Settings ClearPass Policy Manager 6.5 |  User Guide

Chapter 6

Posture

ClearPass Policy Manager evaluates the health of the clients that request access using posture policies, posture servers, and an audit server. These methods all return Posture Tokens (For example, Healthy and Quarantine) for use by Policy Manager as input for into an enforcement policy. One or more posture methods can be associated with a service.

This chapter describes the following topics: l l l l l

Posture Architecture and Flow on page 223

Posture Methods on page 223

Configuring Posture for Services on page 276

Configuring Posture Policy Agents and Hosts on page 225

Configuring Posture Servers on page 278

Posture Methods

ClearPass Policy Manager can forward all or part of the posture data received from the client to a posture server. Policy Manager supports redundant posture severs, ensuring posture evaluations in the event of a server failure. NMAP or Nessus audit servers provide posture checking for unmanageable devices, such as devices lacking adequate posture agents or supplicants. For more information on posture servers or audit servers, see

Configuring Posture Servers on page 278

and

Configuring Audit Servers on page 281

.

The Posture Policies table on the Configuration > Posture > Posture Policies page displays a list of all existing posture policies. The following figure displays the Posture Policies page:

Figure 175: Posture Policies Page

From the Posture Policies page, you can create a new policy or edit an existing policy. To create a new policy.

click the Add link at the top-right corner of the Posture Policies page. To edit an existing policy, click the name of any policy in the Posture Policies page.

For more information, refer to the following topics: l l l

Configuring Posture Policy Agents and Hosts on page 225

Configuring Posture Policy Plug-ins on page 231

Configuring Posture Policy Rules on page 275

Posture Architecture and Flow

Policy Manager supports three types of posture checking: posture policies, posture servers, and audit servers.

ClearPass Policy Manager 6.5 | User Guide Posture | 223

Posture Policy

Policy Manager supports four pre-configured posture plug-ins for Windows, one plug-in for Linux

®

, and one plug-in for Mac OS

®

X, against which administrators can configure rules that test for specific attributes of client health and correlate the results to return application posture tokens for processing by enforcement policies.

Posture Server

Policy Managercan forward all or part of the posture data received from the client to a posture server. The posture server evaluates the posture data and returns application posture tokens. Policy Manager supports the Microsoft NPS server for Microsoft NAP integration.

Audit Server

Audit servers provide posture checking for unmanageable devices, such as devices lacking adequate posture agents or supplicants. In the case of such clients, the audit server’s post-audit rules map clients to roles.

Policy Manager supports two types of audit servers: l l

NMAP audit server: Primarily used to derive roles from post-audit rules.

NESSUS audit server: Primarily used for vulnerability scans (and, optionally, post-audit rules).

Figure 176: Posture Evaluation Process

Policy Manager uses posture evaluation to assess client consistency with enterprise endpoint health policies, specifically with respect to: l l l

Operating system version/type

Registry keys/services present (or absent)

Antivirus/antispyware/firewall configuration

224 | Posture ClearPass Policy Manager 6.5 |  User Guide

l l l l

Patch level of different software components

Peer-to-Peer (P2P) application checks

Services to be running or not running

Processes to be running or not running

Each configured health check returns an application token representing health: l l l l l l

Healthy. Client is compliant: there are no restrictions on network access.

Checkup. Client is compliant; however, there is an update available. This can be used to proactively remediate to healthy state.

Transient. Client evaluation is in progress; typically associated with auditing a client. The network access granted is interim.

Quarantine. Client is out of compliance; restrict network access so the client only has access to the remediation servers.

Infected. Client is infected and is a threat to other systems in the network; network access should be denied or severely restricted.

Unknown. The posture token of the client is unknown.

Upon completion of all configured posture checks, Policy Manager evaluates all application tokens and calculates a system token, equivalent to the most restrictive rating for all returned application tokens. The system token provides the health posture component for input to the enforcement policy.

A service can also be configured without any posture policy.

Configuring Posture Policy Agents and Hosts

Navigate to the Policy tab on the Configuration > Posture > Posture Policies > Add page to configure the policy name and description, select a posture agent and host operating system, and specify role restrictions.

ClearPass Policy Manager 6.5 | User Guide Posture | 225

The following figure displays the Policy tab:

Figure 177: Policy Tab - Policies Page

The following table describes the Policy tab parameters:

Table 117: Policy Tab Parameters

Feature

Policy Name

Description

Enter the name assigned to the policy by the ClearPass Policy Manager administrator.

Description

Posture

Agent

Host

Operating

System

Restrict by

Roles

Specify the description that provides additional information about the posture policy.

Select the posture agent type. For for information on these agents, see

NAP Agent on page 226

and

OnGuard Agent (Persistent or Dissolvable) on page 228 .

Specify whether the host is using a Window, Linux, or MAC OS X operating system.

Apply the posture policy to the selected roles.

NAP Agent

If you select the Posture Agent: NAP Agent in the Policy tab, you can configure the following posture plugins:

226 | Posture ClearPass Policy Manager 6.5 |  User Guide

Table 118: NAP Agent Posture Plug-ins for Windows Operating System

Operating System Versions

Plug-in

Name

Description Windows

8

Windows

7

Windows

Vista

Windows

XP Service

Pack 3

Windows

Server

2008 yes

Windows

Server

2008R2 yes Windows

System

Health

Validator

Windows

Security

Health

Validator

The Windows

System Health

Validator parameters permit or deny client computers to connect to your network, and to restrict client access to computers that have a service pack less than service pack x.

yes

The Windows

Security Health

Validator parameters permit or deny client computers access to your network, subject to checks of the client's system for Firewall,

Virus Protection,

Spyware

Protection,

Automatic

Updates, and

Security

Updates*.

yes yes yes yes yes yes yes no no

* If you configure the Windows Security Health Validator posture plug-in for Windows XP, spyware protection is disabled.

ClearPass Policy Manager 6.5 | User Guide Posture | 227

Table 119: NAP Agent Posture Plug-ins for Linux Operating Systems

LINUX Operating Systems

Plug-in Name Description CentOS Fedora RedHat

Enterprise

Linux

ClearPass Linux

Universal System

Health Validator

Services, which allows you to enable or disable health checks, set auto remediation checks, select or insert available services, and set which services to run and which to stop.

yes yes yes

SUSE Linux

Enterprise yes

Ubuntu yes

OnGuard Agent (Persistent or Dissolvable)

Select OnGuard Agent (Persistent or Dissolvable) from the Posture Agent field (Configuration >

Posture > Posture Policies > Add) for use in the following scenarios: l l

An environment that does not support 802.1X based authentication. For example, some legacy Microsoft

Windows operating systems or legacy network devices.

An environment configured with an operating system that provides native support for 802.1X natively, but does not have a built-in health agent. The MAC OS X is an example of this type of environment.

If you select the Posture Agent: OnGuard Agent (Persistent or Dissolvable) on the Policy tab, you can configure the following posture plug-ins:

228 | Posture ClearPass Policy Manager 6.5 |  User Guide

Table 120: OnGuard Agent Validator Supported Windows Operating Systems

Supported Operating System Versions

Posture Plug-in

Name

Description Windo ws 2003

Windo ws 8

Windo ws 7

Windo ws

Vista

Windo ws XP

Service

Pack 3 yes yes yes yes ClearPassWindo ws Universal

System Health

Validator

Manageme nt, Windows

HotFixes,

USB

Devices,

Virtual

Machines,

Network

Connection s, Disk

Encryption, and

Installed

Application s.

The configurable parameter categories for this validator are

Services,

Processes,

Registry

Keys,

AntiVirus,

AntiSpywar e, Firewall,

Peer To

Peer, Patch yes

Windows System

Health Validator

The configurable parameter categories for this validator allow you to configure client computers that can connect to your yes yes yes yes yes

Windo ws

Server

2008 yes yes

Windo ws

Server

2008R2 yes yes

ClearPass Policy Manager 6.5 | User Guide Posture | 229

Table 120: OnGuard Agent Validator Supported Windows Operating Systems (Continued)

Supported Operating System Versions network, and clients that are restricted from your network.

Access is determined by a check of the service pack level. You can determine the service pack level.

Windows

Security Health

Validator

The configurable parameter categories for this validator allow you to configure parameters that permit or deny client computers access to your network, subject to checks of the client's system for

Firewall,

Virus

Protection,

Spyware

Protection,

Automatic

Updates, and Security

Updates*.

no yes yes yes yes

* If you configure the posture plug-in for Windows XP, spyware protection is disabled.

no no

230 | Posture ClearPass Policy Manager 6.5 |  User Guide

Table 121: OnGuard Agent (Persistent or Dissolvable) Posture Plug-ins for Mac OS X

Name of the Plug-in Description

ClearPass Mac OS X Universal System

Health Validator

The configurable parameter categories for this validator are: l Services l l l

Processes

AntiVirus

AntiSpyware l l l l l l l l

Firewall

Patch Management

Peer To Peer

USB Devices

Virtual Machines

Network Connections

Disk Encryption

Installed Applications

Table 122: OnGuard Agent (Persistent or Dissolvable) Posture Plug-ins for Linux

Name of the Plug-in Description

ClearPass Linux Universal System

Health Validator

The configurable parameter categories for this validator are: l Services l AntiVirus

Configuring Posture Policy Plug-ins

The Posture Plugins tab of the Posture Policies page allows you to configure plug-ins for the posture policy.

The plug-ins available on this tab vary, depending upon whether the policy is using a network access protection

(NAP) agent or the OnGuard agent plug-in. To configure posture policy plug-ins, navigate to Configuration >

Posture > Posture Policies > Add, and click the Posture Plugins tab on the Posture Policies window.

You can configure the following posture plug-ins in the Posture Policies page: l l l

ClearPass Windows Universal System Health Validator

Windows System Health Validator

Windows Security Health validator

Select the check box of the specific plug-in and Click Configure button to view the configuration options. The following figure displays the Posture Policies page:

Figure 178: Posture Policies Page

ClearPass Policy Manager 6.5 | User Guide Posture | 231

Configuring NAP Agent Plugins

If your posture policy is using a NAP agent, the Posture Plugins tab allows you to configure the following plug-in types: l l

Windows System Health Validator - NAP Agent on page 232

Windows Security Health Validator - NAP Agent on page 233

The following figure displays the NAP Agent - Posture Plugins tab:

Figure 179: NAP Agent - Posture Plugins Options

Windows System Health Validator - NAP Agent

The Windows System Health Validator - NAP Agent checks for the level of Windows Service Packs. To configure the minimum service pack level required, perform the following steps:

1. Click a check box to enable support of specific operating systems.

2. Enter the minimum Service Pack level required on the client computer to connect to your network.

3. Click Save.

The following figure displays the Windows System Health Validator page:

Figure 180: Windows System Health Validator

232 | Posture ClearPass Policy Manager 6.5 |  User Guide

Windows Security Health Validator - NAP Agent

This validator checks for the presence of specific types of security applications. You can use the check boxes to restrict access based on the absence of the selected security application types.

The following figure displays the Windows Security Health Validator page:

Figure 181: Windows Security Health Validator

Configuring OnGuard Agent Plugins

If you select the OnGuard Agent option in the Policy tab of the Posture Policies page, the Posture Plugins tab allows you to configure different plugin types for hosts running Windows, Linux, and Mac OS X operating systems. Refer to the following topics for details on each plugin type: l l l

For Windows: n

ClearPass Windows Universal System Health Validator - OnGuard Agent on page 234

n n

Windows System Health Validator - OnGuard Agent on page 258

Windows Security Health Validator - OnGuard Agent on page 259

For Linux:

ClearPass Linux Universal System Health Validator Plugin on page 260

For Mac OS X:

ClearPass Mac OS X Universal System Health Validator - OnGuard Agent on page 262

ClearPass Policy Manager 6.5 | User Guide Posture | 233

The following figure displays the Posture Policies - Posture Plugins tab:

Figure 182: OnGuard Agent Plugin Options for Mac OS X

ClearPass Windows Universal System Health Validator - OnGuard Agent

Select OnGuard Agent and the Windows host operating system in the Posture Plugins tab (Configuration

> Posture > Posture Policies > Add) to view the ClearPass Windows Universal System Health Validator page.

The following figure displays the ClearPass Windows Universal System Health Validator page:

Figure 183: ClearPass Windows Universal System Health Validator

Select a version of Windows and click the Enable checks for Windows Server check box to enable checks for the selected version. Enabling checks for a specific version displays the following set of configuration pages: l l l l l l l l l l

Services on page 235

Processes on page 236

Registry Keys on page 238

AntiVirus on page 241

AntiSpyware on page 243

Firewall on page 244

Peer To Peer on page 245

Patch Management on page 246

Windows Hotfixes on page 250

USB Devices on page 250

234 | Posture ClearPass Policy Manager 6.5 |  User Guide

l l l l l

Virtual Machines on page 251

Network Connections on page 252

Disk Encryption on page 254

Installed Applications on page 254

File Check on page 255

Services

The Services page provides a set of widgets for specifying services to run or stop.

Figure 184: Services Page

The following table describes the Services parameters:

Table 123: Services Page

Parameter Description

Auto

Remediation

Enable to allow auto remediation for service checks (Automatically stop or start services based on the entries in Service to run and Services to stop configuration).

User

Notification

Enable to allow user notifications for service check policy violations.

Available

Services

Insert

Delete

This scrolling list contains a list of services that you can select and move to the Services to run or

Services to stop panels (using their associated widgets). This list varies depending on OS types.

Click the >> or << to add or remove, respectively, the services from the Service to run or Services

to stop boxes.

To add a service to the list of available services, enter its name in the text box adjacent to this button, then click Insert.

To remove a service from the list of available services, select it and click Delete.

ClearPass Policy Manager 6.5 | User Guide Posture | 235

Processes

The Processes page provides a set of parameters to specify which processes to be explicitly present or absent on the system. The following figure displays the Processes page:

Figure 185: Processes Page (Overview)

The following table describes the Process parameters:

Table 124: Process Page (Overview - Pre-Add)

Parameter Description

Auto

Remediation

Enable to allow auto remediation for registry checks (Automatically add or remove registry keys based on the entries in Registry keys to be present and Registry keys to be absent configuration).

User

Notification

Enable to allow user notifications for registry check policy violations.

Processes to be present/absent

Click Add to specify a process to be added, either to the Processes to be present or Processes

to be absent lists.

Click Add for Process to be Present to display the Process page detail.

Processes to be Present

Figure 186: Process to be Present Page (Detail)

236 | Posture ClearPass Policy Manager 6.5 |  User Guide

Table 125: Process to be Present Page (Detail)

Parameter Description

Process Location

Enter the Process name

Choose from Applications: UserBin, UserLocalBin, UserSBin, or None.

Specifies the path name containing the process executable name.

Enter the Display name Enter a user friendly name for the process. This is displayed in end-user facing messages.

After you save your Process details, the key information appears in the Processes to be present page list.

Processes to be Absent

Figure 187: Process to be Absent Page (Detail)

ClearPass Policy Manager 6.5 | User Guide Posture | 237

The following table describes the Process to be Absent parameters:

Table 126: Process to be Absent Page (Detail)

Parameter Description

Check Type Select the type of process check to perform. The agent can look for: l

Process Name - The agent looks for all processes that matches with the given name. For example, if notepad.exe is specified, the agent kills all processes whose name matches, regardless of the location from which these processes were started.

l MD5 Sum - This specifies one or more (comma separated) MD5 checksums of the process executable file. For example, if there are multiple versions of the process executable, you can specify the MD5 sums of all versions here. The agent enumerates all running processes on the system, computes the MD5 sum of the process executable file, and matches this with the specified list. One or more of the matching processes are then terminated.

Enter the

Display name

Enter a user friendly name for the process. This is displayed in end-user facing messages.

Figure 188: Process Page (Overview - Post Add)

Registry Keys

The Registry Keys page allows you to specify which registry keys are to be explicitly present or absent.

238 | Posture ClearPass Policy Manager 6.5 |  User Guide

Figure 189: Registry Keys Page (Overview)

The following table describes the Registry Keys page parameters:

Table 127: Registry Keys Page (Overview - Pre-Add)

Parameter Description

Auto

Remediation

Enable auto remediation for registry checks. Use this page to automatically add or remove registry keys based on the entries in Registry keys to be present and Registry keys to be absent fields.

User

Notification

Enable user notifications for registry check policy violations.

Monitor

Mode

Registry keys to be present

Registry keys to be absent

Enable this to set the health status of the Registry Keys health class healthy. This allows administrators to collect information related to missing registry keys without marking the clients as unhealthy even if some registry keys are missing.

Click Add to specify a registry key to be added to the Registry keys to be present list. If the specified registry key is not present, the remediation message that is added in the Registry Keys

Page (Detail) window is displayed on OnGuard Agent.

Click Add to add a registry key to the Registry keys to be absent list. If the specified registry key is not absent, the remediation message that is added in the Registry Keys Page (Detail) window is displayed on OnGuard Agent.

Click Add to display the Registry page detail.

ClearPass Policy Manager 6.5 | User Guide Posture | 239

Figure 190: Registry Keys Page (Detail)

The following table describes the Registry Keys - Detail parameters:

Table 128: Registry Keys Page (Detail)

Parameter Description

Select the Registry Hive Specify the registry hive from the following options: l HKEY_CLASSES_ROOT l l l

HKEY_CURRENT_USER

HKEY_LOCAL_MACHINE

HKEY_USERS l HKEY_CURRENT_CONFIG

Enter the Registry key Specify the registry key using the examples given in the GUI.

Enter the Registry value name

Select the Registry value data type

Specify the name of the registry value.

Specify the registry value data types. The data type can be any of the following: l Multi String l l

String

DWORD l l

QWORD

Expandable String

Enter the Registry value data Specify the registry value.

Enter Remediation Message Specify the custom remediation message to be displayed to end users if registry check is failed.

After you save the registry details, the remediation message appears in the Registry page list.

240 | Posture ClearPass Policy Manager 6.5 |  User Guide

Figure 191: Registry Keys Page (Overview - Post Add)

AntiVirus

In the Antivirus page, you can turn on an Antivirus application. Click An anti-virus application is on to configure the Antivirus application information.

Figure 192: Antivirus Page (Overview - Before)

When enabled, the Antivirus detail page appears.

Figure 193: Antivirus Page (Detail 1)

Click Add to specify product, and version check information.

ClearPass Policy Manager 6.5 | User Guide Posture | 241

Figure 194: Antivirus Page (Detail 2)

After you save your Antivirus configuration, it appears in the Antivirus page list.

Figure 195: Antivirus Page (Overview - After)

Table 129: Antivirus Page

Interface Parameter

Antivirus

Page l l l l

An Antivirus Application is

On

Auto Remediation

User Notification

Display Update URL

Antivirus

Page (Detail

1)

Antivirus

Page (Detail

2) l Add l l l l

Product-specific checks

Select the antivirus product

Product version check

Engine version check

Description l l l l

Click Antivirus application is on to enable testing of health data for configured Antivirus application(s).

Check the Auto Remediation check box to enable auto remediation of anti-virus status.

Check the User Notification check box to enable user notification of policy violation of anti-virus status.

Check the Display Update URL check box to show the origination URL of the update.

l To configure Antivirus application attributes for testing against health data, click Add.

Configure the specific settings for which to test against health data. All of these checks may not be available for some products. Where checks are not available, they are shown in disabled state on

242 | Posture ClearPass Policy Manager 6.5 |  User Guide

Table 129: Antivirus Page (Continued)

Interface Parameter l l l l l

Engine version check

Datafile version check

Data file has been updated in

Last scan has been done before

Real-time Protection Status

Check

Description the UI.

l Select the antivirus product - Select a vendor from the list.

l Product version check - No Check, Is Latest

(requires registration with ClearPass portal),

At Least, In Last N Updates (requires registration with ClearPass Portal).

l l l l

Engine version check - Same choices as product version check.

Data file version check - Same choices as product version check.

Data file has been updated in - Specify the interval in hours, days, weeks, or months.

Last scan has been done before - Specify the interval in hours, days, weeks, or months.

l Real-time Protection Status Check n

No Check - ClearPass Policy Manager does not use RTP Status value for health evaluation. This means that the client is treated as healthy irrespective of the value of RTP.

n n

On - Client is marked as healthy only if the value of RTP status is On.

Off - Client is marked as healthy only if the value of RTP status is Off.

AntiSpyware

In the AntiSpyware page, an administrator can specify that an AntiSpyware application must be on and allows drill-down to specify information about the AntiSpyware application. Click An Antipyware Application is On to configure the AntiSpyware application information.

Figure 196: AntiSpyware Page (Overview Before)

When enabled, the AntiSpyware detail page appears.

Figure 197: AntiSpyware Page (Detail 1)

Click Add to specify product, and version check information.

ClearPass Policy Manager 6.5 | User Guide Posture | 243

Figure 198: AntiSpyware Page (Detail 2)

Figure 199: AntiSpyware Page (Overview After)

When you save your AntiSpyware configuration, it appears in the AntiSpyware page list.

The configuration elements are the same for antivirus and antispyware products. Refer to the previous

AntiSpyware

configuration instructions.

Firewall

In the Firewall page, you can specify that a Firewall application must be on and specify information about the

Firewall application.

Figure 200: Firewall Page (Overview Before)

In the Firewall page, click A Firewall Application is On to configure the Firewall application information.

Figure 201: Firewall Page (Detail 1)

When enabled, the Firewall detail page appears.

244 | Posture ClearPass Policy Manager 6.5 |  User Guide

Figure 202: Firewall Page (Detail 2)

When you save your Firewall configuration, it appears in the Firewall page list.

Figure 203: Firewall Page (Overview After)

The following table describes the Firewall parameters:

Table 130: Firewall Page Parameters

Interface Parameter Description

Firewall

Page l l l l

A Firewall

Application is On

Auto

Remediation

User

Notification

Uncheck to allow any product l l l l

Check the Firewall Application is On check box to enable testing of health data for configured firewall application(s).

Check the Auto Remediation check box to enable auto remediation of firewall status.

Check the User Notification check box to enable user notification of policy violation of firewall status.

Uncheck the Uncheck to allow any product check box to check whether any firewall application (any vendor) is running on the end host.

Firewall

Page

(Detail 1)

Firewall

Page

(Detail 2) l l

Add

Trashcan icon l l

To configure firewall application attributes for testing against health data, click

Add.

To remove configured firewall application attributes from the list, click the

trashcan icon in that row.

Product/Version Configure the specific settings for which to test against health data. All of these checks may not be available for some products. Where checks are not available, they are shown in disabled state on the UI.

l l

Select the firewall product - Select a vendor from the list

Product version is at least - Enter the version of the product.

Peer To Peer

The Peer To Peer page provides a set of widgets for specifying specific peer to peer applications or networks to be explicitly stopped. When you select a peer to peer network, all applications that make use of that network are stopped.

ClearPass Policy Manager 6.5 | User Guide Posture | 245

The following figure displays the Peer To Peer health class configuration page:

Figure 204: Peer to Peer Page

The following table describes the Peer to Peer parameters:

Table 131: Peer to Peer Page

Parameter Description

Auto

Remediation

Enable to allow auto remediation for service checks (Automatically stop peer to peer applications based on the entries in Applications to stop configuration).

User

Notification

Enable to allow user notifications for peer to peer application/network check policy violations.

By Application /

By Network

Select the appropriate radio button to select individual peer to peer applications or a group of applications that use specific p2p networks.

Available

Applications

This scrolling list contains a list of applications or networks that you can select and move to the

Applications to stop panel.

Click the >> or << to add or remove, respectively, the applications or networks from the

Applications to stop box.

Patch Management

In the Patch Management page, you can specify that a patch management application must be on and allows drill-down to specify information about the patch management application. Click A patch

management application is On to configure the patch management application information.

The following figure displays the Patch Management page:

Figure 205: Patch Management Page (Overview - Before)

When enabled, the Patch Management detail pop-up appears.

246 | Posture ClearPass Policy Manager 6.5 |  User Guide

Figure 206: Patch Management Page (Detail 1)

Click Add to specify PM Product Name, Product Version, Status Check, and Install Level Check information.

Figure 207: Patch Management Page (Detail 2)

When you save your patches configuration, it appears in the Patch Management page list.

Figure 208: Patch Management Page (Overview - After)

ClearPass Policy Manager 6.5 | User Guide Posture | 247

The following table describes the Patch Management parameters:

Table 132: Patch Management Page Parameters

Parameter Interface

Patch Management Page l l l l

A patch management application is on

Auto Remediation

User Notification

Uncheck to allow any product

Patch Management Page

(Detail 1)

Patch Management Page

(Detail 2) l l

Add

Trashcan icon

Product/Version

Description l l l l

Check the A patch management application is on to enable testing of health data for configured

Antivirus application(s).

Check the Auto Remediation check box to enable auto remediation of patch management status.

Check the User Notification check box to enable user notification of policy violation of patch management status.

Clear Uncheck to allow any product check box to check whether any patch management application

(any vendor) is running on the end host.

l l

To configure patch management application attributes for testing against health data, click Add.

To remove configured patch management application attributes from the list, click the

trashcan icon in that row.

Configure settings for which to test against health data.

All checks might not be available for some products.

Where checks are not available, they are shown in disabled state on the UI.

l Select Patch Management product: Select a vendor. This option is only enabled if the Productspecific checks check box is checked.

l l

Product version is at least: Enter version number.

This option is only enabled if the Product-specific checks check box is checked.

Status Check Type: Select this field to check whether Patch Agent is enabled or not. ClearPass

Policy Manager server compares the Patch Agent

Status sent by OnGuard Agent with the configured value. If the Patch Agent Status value is different from configured value, then client is treated as unhealthy. If Auto-remediation is enabled, then

OnGuard Agent changes the Patch Agent Status on client to the configured value. Select any of the following options: n n

No Check - ClearPass Policy Manager server ignores Patch Agent Status value. This means it will not check status of Patch Agent application on client.

Enabled - Patch Agent is turned on and automatically update the client.

n n

Disabled - Patch Agent is disabled and it will not check for missing patches and update the client.

Notify Before Download - Patch Agent is turned on and will notify user before downloading updates.

248 | Posture ClearPass Policy Manager 6.5 |  User Guide

Table 132: Patch Management Page Parameters (Continued)

Interface Parameter Description n Notify Before Install - Patch Agent is turned on and will notify user before installing updates.

NOTE: The values specific to the selected product are displayed in the Status Check Type field. For example, all the 5 values are displayed for Microsoft Windows

Automatic Update. For SCCM, only No Check,

Disabled, and Notify Before Install are displayed.

l

Install Level Check Type: Select No Check, All,

Selected on Server, or Security. This option is only enabled if the Product-specific checks check box is checked. For Microsoft SCCM, selecting All, Selected on Server, or Security will return the full list of all missing patches.

n n

All: Check for all missing patches, and search for all available patches.

Selected on Server: Check only for the patches pre-selected on the server. Some Patch

Management products can push the patches to the endpoint device. This option provides the ability to check for only the pre-selected patches.

n Security: Check only for security updates. Some of the products can install only security-related patches.

NOTE: If you select the Microsoft Windows Update

Agent from the Select Patch Management product list and you select an option from the Install Level

Check Type list, the results are listed below: n n n n

All: Returns the full list of missing patches.

Selected on Server: Returns a list of missing patches that are pre-selected on the server site.

Security: Returns a list of missing patches that

Microsoft classifies as Security Updates.

No Check - Disables the Grace Period and Scan

Interval fields.

l Grace Period: Configure the time period for which

OnGuard Agent should ignore missing patches. You can specify the grace period in hours, days, weeks, or months. For example, if the Grace Period is set to

3 days, then clients will be treated as ‘healthy’ for 3 days even if some patches are missing. After 3 days,

OnGuard Agent will treat clients as ‘unhealthy’ if the patches are still missing. You can enable Auto-

remediation to install the missing patches and to treat them as ‘healthy’. This field is disabled if you selected No Check from the Install Level Check

Type field.

ClearPass Policy Manager 6.5 | User Guide Posture | 249

Table 132: Patch Management Page Parameters (Continued)

Interface Parameter Description l Scan Interval: Configure the time interval after which OnGuard Agent should check for missing patches. You can configure the time period in hours, days, weeks, or months. The default scan interval is

1 hour. This field is disabled if you selected No

Check from the Install Level Check Type field.

Windows Hotfixes

The Windows Hotfixes page provides a set of widgets for checking if specific Windows hotfixes are installed on the endpoint. The following figure displays the Windows Hotfixes health class configuration page:

Figure 209: Windows Hotfixes Page

The following table describes the Windows Hotfixes parameters:

Table 133: Windows Hotfixes Page Parameters

Parameter Description

Auto

Remediation

Enable to allow auto remediation for hotfixes checks (Automatically trigger updates of the specified hotfixes).

User

Notification

Enable to allow user notifications for hotfixes check policy violations.

Click to enable Monitor Mode.

Monitor

Mode

Available

Hotfixes

The first scrolling list lets you select the criticality of the hotfixes. Based on this selection, the second scrolling list contains a list of hotfixes that you can select and move to the Hotfixes to be present panel (using their associated widgets).

Click the >> or << to add or remove, respectively, the hotfixes from the Hotfixes to run boxes.

USB Devices

The USB Devices page provides configuration to control USB mass storage devices attached to an endpoint.

250 | Posture ClearPass Policy Manager 6.5 |  User Guide

Figure 210: USB Devices

The following table describes the USB Devices parameters:

Table 134: USB Devices

Parameter Description

Auto Remediation

User Notification

Enable to allow auto remediation for USB mass storage devices attached to the endpoint (Automatically stop or eject the drive).

Enable to allow user notifications for USB devices policy violations.

Remediation Action for USB

Mass Storage Devices l l l

No Action - Take no action; do not eject or disable the attached devices.

Remove USB Mass Storage Devices - Eject the attached devices.

Remove USB Mass Storage Devices - Stop the attached devices.

Virtual Machines

The Virtual Machines page provides configuration to Virtual Machines utilized by your network.

Figure 211: Virtual Machines

ClearPass Policy Manager 6.5 | User Guide Posture | 251

The following table describes the Virtual Machines parameters:

Table 135: Virtual Machines

Parameter Description

Auto Remediation Enable to allow auto remediation for virtual machines connected to the endpoint.

User Notification

Allow access to clients running on Virtual

Machine

Allow access to clients hosting Virtual

Machine

Remediation Action for clients hosting

Virtual Machines

Enable to allow user notifications for virtual machine policy violations.

Enable to allow clients that running a VM to be accessed and validated.

Enable to allow clients that hosting a VM to be accessed and validated.

l l l

No Action - Take no action; do not stop or pause virtual machines.

Stop all Virtual Machines running on Host - Stop the VM clients that are running on Host.

Pause all Virtual Machines running on Host - Pause the VM clients that are running on Host.

Network Connections

The Network Connections page provides configuration to control network connections based on connection type. The following figure displays the Network Connections health class configuration page:

Figure 212: Network Connections Page

Select the Check for Network Connection Types check box, and then click Configure to specify the type of connection that you want to include.

Configure Network Connection Type

252 | Posture ClearPass Policy Manager 6.5 |  User Guide

Figure 213: Network Connection Type Configuration

The following table describes the Network Connection Type Configuration parameters:

Table 136: Network Connection Type Configuration Page

Parameter Description

Allow Network Connections

Type l l l

Allow Only One Network Connection

Allow One Network Connection with VPN

Allow Multiple Network Connections

Network Connection Types Click the >> or << to add or remove Others, Wired, and Wireless connection types.

Remediation Action for USB

Mass Storage Devices l l

No Action - Take no action; do not eject or disable the attached devices.

Disable Network Connections - Disable network connections for the configured network type.

Click Save after you finish. This returns you to the Network Connections Configuration page. The remaining fields on this page are described below:

Table 137: Network Connections Configuration

Parameter Description

Auto Remediation Enable to allow auto remediation for network connections.

User Notification

Remediation Action for

Bridge Network

Connection

Remediation Action for

Internet Connection

Sharing

Remediation Action for

Adhoc/Hosted Wireless

Networks

Enable to allow user notifications network connection policy violations.

If Allow Bridge Network Connection is disabled, then specify whether to take no action when a bridge network connection exists or to disable all bridge network connections.

If Allow Internet Connection Sharing is disabled, then specify whether to take no action when Internet connection sharing exists or to disable Internet connection sharing.

If Allow Adhoc/Hosted Wireless Networks is disabled, then specify whether to take no action when an adhoc wireless networks exists or to disable all adhoc/hosted wireless networks.

ClearPass Policy Manager 6.5 | User Guide Posture | 253

Disk Encryption

Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people. Disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. Disk encryption prevents unauthorized access to data storage.

The following figure displays the Disk Encryption health class configuration page:

Figure 214: Disk Encryption Configuration Page

The following table describes the Disk Encryption parameters:

Table 138: Disk Encryption Parameters

Parameter Description

User

Notification

Enable to allow user notifications for virtual machine policy violations.

Productspecific checks

Clear to allow disk encryption on any product. The Select Disk Encryption product and Product Version is at least fields are disabled after you clear the check box.

Select a specific disk encryption product.

Select Disk

Encryption product

Product

Version is at least

Locations to

Check

Search for the production version of the selected product.

Select location to check. The options are None, System Root Drive, All Drives, or

Specific Locations.

Installed Applications

The Installed applications category groups classes that represent software-related objects. Access to these objects is supported by Windows Installer. Examples of objects in this category are installed products, file specifications, and registration actions.

In the Installed Applications page, you can turn on the installed applications check and specify information about which installed applications you want to monitor. You can take the following actions: l l

Specify installed applications to monitor on a mandatory basis.

Specify installed applications to be monitored on an optional basis.

254 | Posture ClearPass Policy Manager 6.5 |  User Guide

l l

Specify installed applications that are never monitored.

Specify that only the mandatory and optional applications are monitored.

The following table describes the Installed Applications Configuration parameters:

Table 139: Installed Applications Configuration Page Parameters

Parameter Description

Remediation checks Auto-remediation for Installed Applications health class is not supported.

User Notification

Monitor Mode

Applications Allowed (Mandatory)

Applications Allowed (Optional)

Allow only Mandatory and Optional Applications

A Remediation message having a list of applications to install/uninstall will be displayed to end user.

Enable Monitor Mode to treat all the installed applications as always healthy.

Enter the application name as it is shown in

Add/Remove Programs.

Enter the application name as it is shown in

Add/Remove Programs.

Check to allow only selected applications. All applications other than 'Allowed Applications, including both mandatory and optional' must be removed or uninstalled.

File Check

Use the File Check page to verify the group of files to present or absent. In the File Check page, you can turn on the file check and specify information about which the files you want to check.

ClearPass Policy Manager 6.5 | User Guide Posture | 255

The following figure displays the File Check health class configuration page:

Figure 215: Windows File Check Health Class

The following table describes the File Check Configuration parameters:

Table 140: File Check Configuration Parameters

Parameter Description

Remediation checks Auto-remediation for the File Check health class is not supported.

User Notification

Monitor Mode

File Groups to be Present

File Groups to be Absent

A remediation message having a list of files to present/absent will be displayed to end user.

Enable Monitor Mode to treat all the file check health classes as always healthy.

Click Add to add the files to be present in the File Check health class.

Click Add to add the files to be absent in the File Check health class.

Click Add to open the File Group to be Present - Add page in which you can configure the name of the file group and evaluation rule for the file group. The following figure displays the File Group to be Present - Add pop-up:

256 | Posture ClearPass Policy Manager 6.5 |  User Guide

The following table describes the File Group to be Present - Add parameters:

Table 141: File Group to be Present - Add Parameters

Parameter

Enter the File Group

Name

Description

Enter the name of the file group.

File Group Evaluation Rule Pass All - Select this evaluation rule if you want the File Check health class to be deemed as 'healthy' only if all the configured file groups are present.

Pass Any One - Select this evaluation rule if you want the File Check health class to be deemed as 'healthy' even any one of the configured file group is present.

Click Add from File Groups to be Present to configure the name of the file group and evaluation rule for the file group. The following figure displays the File to be Present - Add pop-up:

Figure 216: File to be Present - Add Pop-up

ClearPass Policy Manager 6.5 | User Guide Posture | 257

The following table describes the File to be Present - Add parameters:

Table 142: File to be Present - Add Parameters

Parameter Description

File Location Select any location of the file from the drop-down list: l SystemDrive l l

Systemroot

ProgramFiles l l l l

ProgramFiles (x86)

HOMEDRIVE

HOMEPATH

None

Enter the File Path

Enter the File Name

Enter the MD5 Sum

Remediation Message

Enter the file path as described in the examples from the GUI.

Enter the name of the file.

Specifies one or more (comma separated) MD5 checksums of the process executable file. This field is optional.

Specify the custom remediation message to be displayed to end users if File check is failed.

The parameters configured in the File to be Present - Add pop-up will reflect in the File Groups to be

Present page as described in the following figure:

Figure 217: File Group to be Present Pop-up

Windows System Health Validator - OnGuard Agent

This validator checks for current Windows Service Packs. The OnGuard Agent also supports legacy Windows operating systems such as and Windows Server 2003. An administrator can use the check boxes to enable

258 | Posture ClearPass Policy Manager 6.5 |  User Guide

support of specific operating systems and to restrict access based on service pack level.

Figure 218: Windows System Health Validator - OnGuard Agent (Overview)

Windows Security Health Validator - OnGuard Agent

This validator checks for the presence of specific types of security applications. An administrator can use the options to restrict access based on the absence of the selected security application types.

The following figure displays the Windows Security Health Validator page:

Figure 219: Windows Security Health Validator

ClearPass Policy Manager 6.5 | User Guide Posture | 259

ClearPass Linux Universal System Health Validator Plugin

The ClearPass Linux Universal System Health Validator plugin appears on the Posture Plugins

(Configuration > Posture > Posture Policies > Add) tab. Select the Linux host operating system and

OnGuard Agent posture agent from the Policy tab in the Posture Policy page. Click Configure to configure antivirus settings and service types.

The OnGuard Dissolvable Agent version of the ClearPass Linux Universal System Health Validator plugin supports the following health classes: l l

Antivirus on page 260

Services on page 262

Antivirus

Use the Antivirus page to turn on an Antivirus application. Click An antivirus application is on to configure the Antivirus application information. The following figure displays the Antivirus health class configuration page:

Figure 220: Antivirus Page

The following table describes the Antivirus parameters:

Table 143: Antivirus Configuration Parameters

Parameter Description

Remediation checks Auto-remediation for the File Check health class is not supported.

User Notification

Antivirus

Prd Version

Eng Version

Dat Version

A remediation message having a list of files to present/absent will be displayed to end user.

Shows the name of the Antivirus configured. Click Add to configure the name of the

Antivirus.

Shows the version of the Antivirus.

Shows the version of the engine.

Shows the version of the data file.

260 | Posture ClearPass Policy Manager 6.5 |  User Guide

Click Add to configure the Antivirus product specific checks. The values configured in the Antivirus Product

configuration pop-up will be displayed in the Antivirus page. The following figure is an example of the

Antivirus Product configuration pop-up:

Figure 221: Antivirus Product configuration Pop-up

The following table describes the Antivirus Product configuration parameters:

Table 144: Antivirus Product configuration Parameters

Parameter Description

Product-specific checks Select this check box if you want to configure a specific antivirus product. If you want to allow any antivirus product, do not select this field.

Select the Antivirus from the drop-down list.

Select the Antivirus product

Product version check

Engine version check

Data file version check

Select to check the product version from the options: No Check, Is Latest, or In Last N

Updates.

Select to check the engine version from the options: No Check, Is Latest, or In Last N

Updates.

Select to check the data file version from the options: No Check, Is Latest, or In Last N

Updates.

ClearPass Policy Manager 6.5 | User Guide Posture | 261

Services

The Services page provides a set of widgets for specifying services to run or stop. The following figure displays the Services page:

Figure 222: Services Page

The following table describes the Services page parameters:

Table 145: Services Page

Parameter Description

Auto

Remediation

Enable to allow auto remediation for service checks (Automatically stop or start services based on the entries in Service to run and Services to stop configuration).

User

Notification

Enable to allow user notifications for service check policy violations.

Available

Services

Insert

Delete

This scrolling list contains a list of services that you can select and move to the Services to run or

Services to stop panels (using their associated widgets). This list varies depending on OS types.

Click the >> or << to add or remove, respectively, the services from the Service to run or Services

to stop boxes.

To add a service to the list of available services, enter its name in the text box adjacent to this button, then click Insert.

To remove a service from the list of available services, select it and click Delete.

ClearPass Mac OS X Universal System Health Validator - OnGuard Agent

Navigate to the Configuration > Posture > Posture Policies > Add page, and click Configure in the Posture

Plugins tab of the Posture configuration page. Select ClearPass Mac OS X Universal System Health

Validator and click Configure. The ClearPass Mac OS X Universal System Health Validator page opens.

Select the Enable checks for Mac OS X check box to enable checks for Mac OS X.

Enabling these check boxes display a corresponding set of configuration pages that are described in the following sections.

l l

Services on page 263

Processes on page 264

262 | Posture ClearPass Policy Manager 6.5 |  User Guide

l l l l l l l l l

Antivirus on page 265

AntiSpyware on page 265

Firewall on page 266

Patch Management on page 267

USB Devices on page 268

Virtual Machine on page 268

Network Connections on page 269

Disk Encryption on page 269

Installed Applications on page 270

The following figure displays the ClearPass Mac OS X Universal System Health Validator page:

Figure 223: ClearPass Mac OS X Universal System Health Validator - OnGuard Agent

Services

From the Services page, you can configure which services to run and which services to stop. See

ClearPass

Windows Universal System Health Validator - OnGuard Agent on page 234

for description of the fields on this page.

The following figure displays the Services health class configuration page:

ClearPass Policy Manager 6.5 | User Guide Posture | 263

Figure 224: Services Health Class Configuration Page

Processes

From the Processes page, you can view and add processes. Clicking Enable checks for Mac OS X provides a set of components to specify the processes that need to be explicitly present or absent on the system.

Figure 225: Processes Page

Click Add to open the page with options to configure the name, location, and display name of the processes.

The following figure displays the Process to be Present - Add page:

Figure 226: Processes to be Present - Add Page

264 | Posture ClearPass Policy Manager 6.5 |  User Guide

Antivirus

In the Antivirus page, you can specify information about the antivirus application. Click on An antivirus-

application is on to configure the anti-virus application information.

The following figure displays the Antivirus page:

Figure 227: Antivirus Page (Detail 1)

Click Add to specify product and version check information in the antivirus configuration page.

Figure 228: Antivirus Configuration Page (Detail 2)

When you save your antivirus configuration, it appears in the Antivirus page list. See

ClearPass Windows

Universal System Health Validator - OnGuard Agent on page 234

for antivirus page and field descriptions.

AntiSpyware

In the AntiSpyware page, an administrator can specify information about the antispyware application. The following figures describe the examples of the AntiSpyware page and the AntiSpyware - Add page:

Figure 229: Anti-Spyware Page

ClearPass Policy Manager 6.5 | User Guide Posture | 265

In the Antispyware page, click An Antispyware Application is On to configure different configuration elements specific to the antispyware product that you select. When you save the antispyware configuration, it appears in the Antispyware page list.

Figure 230: Anti-Spyware Add Page

The configuration elements are the same for antivirus and antispyware products.

Firewall

From the Firewall page, click A Firewall Application is On to configure the firewall application information.

The following figure displays the Firewall page:

Figure 231: Firewall Page

Click Add from the Firewall page to configure different configuration elements specific to the firewall product that you select. When you save the firewall configuration, it appears in the Firewall page list.

266 | Posture ClearPass Policy Manager 6.5 |  User Guide

Figure 232: Firewall Add Page

When enabled, the Firewall detail page appears. See

ClearPass Windows Universal System Health Validator -

OnGuard Agent on page 234

for firewall page and field descriptions.

Patch Management

From the Patch Management page, you can view and add the patch management product. Select A patch

management application is on to configure auto remediation and user notification features.

The following figure displays the Patch Management page:

Figure 233: Patch Management Page

Click Add in the Patch Management page to view the configuration options for the specific patch management product. The following figure displays the Patch Management - Add page:

Figure 234: Patch Management - Add Page

Peer To Peer

From the Peer To Peer page, you can view and add peer-to-peer applications. Clicking A Peer to Peer

application is on provides configuration options to specify peer to peer applications or networks that need to be explicitly stopped. When you select a peer to peer network, all applications that make use of that network are stopped.

ClearPass Policy Manager 6.5 | User Guide Posture | 267

The following figure displays the Peer To Peer page:

Figure 235: Peer To Peer Page

USB Devices

Use this page to configure the Auto Remediation and User Notification parameters. You can also configure the options to take remediation action for USB mass storage devices or to remove USB mass storage devices from the Remediation Action for USB Mass Storage Devices drop-down.

The following figure displays the USB Devices page:

Figure 236: USB Devices Page

Virtual Machine

The Virtual Machines page provides configuration options to virtual machines utilized by the network. Select the Virtual Machine Detection is on option to enable the Auto Remediation and User Notification options.

The following figure displays the Virtual Machine page:

Figure 237: Virtual Machine Page

268 | Posture ClearPass Policy Manager 6.5 |  User Guide

Network Connections

The Network Connections page provides configuration options to control network connections based on connection type. Enabling the Network Connection Check is on check box provides the options to specify the remediation checks or user notification.

The following figure displays the Network connections page:

Figure 238: Network Connections Page

Select the Check for Network Connection Types check box from the Network Connections page, and then click Configure to specify type of network connection. You can select and allow the network connection types from the Network Connections Configuration page as described in the following figure:

Figure 239: Network Connections Configuration Page

Disk Encryption

Disk encryption is a technology that protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people. Disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume. Disk encryption prevents unauthorized access to data storage.

The following figure displays the Disk Encryption page:

Figure 240: Disk Encryption Page

ClearPass Policy Manager 6.5 | User Guide Posture | 269

Click A disk encryption application is on from the Disk Encryption page to configure the remediation options. Click Add to configure the product specific encryption checks. You can select the Uncheck to allow

any product check box from the Product-specific checks field to not to allow any encryption product to check disk encryption.

The following image is an example of the Disk Encryption - Add page:

Figure 241: Disk Encryption Add Page l l

Installed Applications

The Installed Applications category groups classes that represent software-related objects. From the

Installed Applications page, you can select the Installed Applications Check is on to specify information about which installed applications you want to monitor.

You can take the following actions: l l l l

Enable the auto remediation or user notification.

Enable Monitor Mode to treat all the installed applications as always healthy.

Specify installed applications to be monitored on a mandatory basis.

Specify installed applications to be monitored on an optional basis.

Specify installed applications that are never monitored.

Specify that only the mandatory and optional applications to be monitored.

270 | Posture ClearPass Policy Manager 6.5 |  User Guide

Figure 242: Installed Applications Page

Click Add in the Installed Applications page to configure the mandatory application that needs to be checked.

Figure 243: Installed Applications Add Page

File Check

Use the File Check page to verify the group of files to present or absent. In the File Check page, you can turn on the file check and specify information about which the files you want to check.

ClearPass Policy Manager 6.5 | User Guide Posture | 271

The following figure is an example of the File Check health class configuration pop-up:

Figure 244: Mac OS X File Check Health Class

The following table describes the File Check Configuration parameters:

Table 146: File Check Configuration Parameters

Parameter

Remediation checks

Description

Auto-remediation for the File Check health class is not supported.

User Notification

Monitor Mode

File Groups to be Present

File Groups to be Absent

A remediation message having a list of files to present/absent will be displayed to end user.

Enable Monitor Mode to treat all the file check health classes as always healthy.

Click Add to add the files to be present in the File Check health class.

Click Add to add the files to be absent in the File Check health class.

272 | Posture ClearPass Policy Manager 6.5 |  User Guide

Click Add to open the File Group to be Present - Add page in which you can configure the name of the file group and evaluation rule for the file group. The following figure displays the File Group to be Present - Add pop-up:

Figure 245: MacOSX - File Group to be Present - Add Pop-up

The following table describes the File Group to be Present - Add parameters:

Table 147: File Group to be Present - Add Parameters

Parameter Description

Enter the File Group

Name

Enter the name of the file group.

File Group Evaluation Rule Pass All - Select this evaluation rule if you want the File Check health class to be deemed as 'healthy' only if all the configured file groups are present.

Pass Any One - Select this evaluation rule if you want the File Check health class to be deemed as 'healthy' even any one of the configured file group is present.

ClearPass Policy Manager 6.5 | User Guide Posture | 273

Click Add from File Groups to be Present to configure the name of the file group and evaluation rule for the file group. The following figure displays the File to be Present - Add page:

Figure 246: File to be Present - Add Pop-up

The following table describes the File to be Present - Add parameters:

Table 148: File to be Present - Add Parameters

Parameter Description

File Location Select any location of the file from the drop-down list: l Applications l l

UserBin

UserLocalBin l l

UserSBin

None

Enter the File Path

Enter the File Name

Enter the MD5 Sum

Remediation Message

Enter the file path as described in the examples from the GUI.

Enter the name of the file.

Specifies one or more (comma separated) MD5 checksums of the process executable file. This field is optional.

Specify the custom remediation message to be displayed to end users if File check is failed.

274 | Posture ClearPass Policy Manager 6.5 |  User Guide

The parameters configured in the File to be Present - Add pop-up will reflect in the File Groups to be

Present pop-up as described in the following figure:

Figure 247: File Group to be Present Pop-up

Configuring Posture Policy Rules

Once you have defined the posture hosts, agents, and plugins, you must configure the rules for the posture policy. To configure posture policy rules, navigate to Configuration > Posture > Posture Policies > Add, and click the Rules tab on the Posture Policies window.

ClearPass Policy Manager 6.5 | User Guide Posture | 275

Figure 248: Posture Policy Rules Tab and Rules Editor

The following table describes the Rules Editor configuration parameters:

Table 149: Posture Policy Rules Editor Parameters

Parameter

Select Plugin Checks

Select Plugins

Posture Token

Description

Click select one of the following plugin check types for System Health Validators (SHVs): l Passes all SHV checks l l

Passes one or more SHV checks

Fails all SHV checks l Fails one or more SHV checks

Select the plug-in to which the plug-in checks should apply.

Select one of the following posture token types.

Configuring Posture for Services

Policy Manager can forward all or part of the posture data received from the client to a posture server. The posture server evaluates the posture data and returns application posture tokens. Policy Manager supports the Microsoft NPS Server for Microsoft NAP integration. To configure the posture for a service, navigate to the

Add Service (Configuration > Services > Add) page. The Posture tab is not enabled by default. To enable posture checking for this service, select the Posture Compliance check box from the More Options field on the Service tab.

You can enable the posture checking for this kind of service, if you deploy any of the following: l l

Policy Manager in a Microsoft Network Access Protection (NAP)

Cisco Network Admission Control (NAC) Framework environment

276 | Posture ClearPass Policy Manager 6.5 |  User Guide

l

Aruba hosted captive portal that performs posture checks through a dissolvable agent

The following figure displays an example on how to configure a posture at the service level:

The Posture Compliance check box must be selected on the Service tab in order for posture to be enabled.

Figure 249: Posture Features at the Service Level

You can configure the following components of a posture:

Table 150: Posture Features at the Service Level

Configurable

Component

How to Configure

Sequence of

Posture Policies

Select a policy, then select Move Up, Move Down, Remove, or View Details.

l

To add a previously configured policy, select from the Select drop-down list, then click Add.

l l

To configure a new policy, click the Add link at the top-right corner of the

Configuration > Posture Policies page. For more information, see

Configuring Posture Policy Agents and Hosts on page 225

.

To edit the selected posture policy, click Modify. For more information, see

Configuring Posture Policy Agents and Hosts on page 225

.

Default Posture

Token

The default posture token is UNKNOWN (100). You can select the default posture token from the drop-down list.

Remediation End-

Hosts

Select this check box to enable auto-remediation action on non-compliant endpoints.

ClearPass Policy Manager 6.5 | User Guide Posture | 277

Table 150: Posture Features at the Service Level (Continued)

Configurable

Component

How to Configure

Remediation URL This URL defines where to send additional remediation information to endpoints.

Sequence of

Posture Servers

Select a posture server, then select Move Up, Move Down, Remove, or View

Details.

l To add a previously configured posture server, select from the Select dropdown list, then click Add. l l

To configure a new posture server, click Add link at the top-right corner of the Configuration > Posture Policies page. For more information, see

Configuring Posture Servers on page 278

.

To edit the selected posture server, click Modify. For more information, see

Configuring Posture Servers on page 278

.

Enable autoremediation of non-compliant endhosts

Select the Enable auto-remediation of non-compliant end-hosts check box to enable the specified remediation server to enable auto-remediation.

Remediation server is optional. A popup appears on the client box with the URL of the remediation server.

Configuring Posture Servers

Policy Manager can forward all or part of the posture data received from the client to posture servers. The posture server evaluates the posture data and returns application posture tokens.

The following figure displays the Posture Servers page:

Figure 250: Posture Servers Page

You can configure a posture server in the following two different ways: l l

Configure a posture server for new service using the Add Service wizard from the Configuration >

Services page.

Modify an existing posture server by selecting a server from the Posture Servers table on the

Configuration > Posture > Posture Servers page.

The Posture Servers > Add page contains the following tabs: l l l l

Posture Server Tab on page 279

Primary Server and Backup Server Tabs on page 280

Primary Server and Backup Server Tabs on page 280

Summary Tab

278 | Posture ClearPass Policy Manager 6.5 |  User Guide

Posture Server Tab

When you click Add Posture Server, Policy Manager displays the Posture Servers configuration page. The tabs and fields that appear on the Configuration > Posture > Posture Servers > Add page may vary depending upon the protocol and credentials defined for that server.

The following figure displays the Posture Server tab:

Figure 251: Posture Servers - Posture Server Tab

The following table describes the Posture Server tab parameters:

Table 151: Posture Server Tab Parameters

Parameter Description

Name Enter the name of the posture server.

Description

Server Type

Default Posture Token

Enter the description that provides additional information about the posture server.

Select the Microsoft NPS option when you want Policy Manager to have NAP

Statement of Health (SoH) credentials evaluated by the Microsoft NPS server.

Click the Default Posture Token drop-down list and select the default status assigned to the server assigned if the server is unreachable or posture check is failed.

ClearPass Policy Manager 6.5 | User Guide Posture | 279

Primary Server and Backup Server Tabs

Use the Primary Server and Backup Server tabs to configure the RADIUS server name and port. The following figure displays the Primary Server and Backup Server tabs:

Figure 252: Primary and Backup Server Tabs

The following table describes the Primary and Backup server tabs parameters:

Table 152: Primary and Backup Server Tabs Parameters

Parameter

RADIUS Server

Backup

Description

(Backup Server tab only) Select this option to enable failover to the backup server in the event that the primary server fails to respond.

RADIUS Server

Name/Port

Specifiy the hostname or IP address of the server.

Specify the RADIUS server UDP port. The default port is 1812.

RADIUS

ServerPort

Shared Secret

Timeout

Enter the shared secret for RADIUS message exchange; the same secret has to be entered on the RADIUS server or Microsoft NPS server.

Specify the number of seconds that must pass before ClearPass Policy Manager deems the connection dead. If a backup server is configured, Policy Manager will attempt to connect to the backup server after this timeout.

For the backup server to be invoked on primary server failover, check the Enable to use

backup when primary does not respond check box.

280 | Posture ClearPass Policy Manager 6.5 |  User Guide

Summary Tab

The Summary tab summarizes the parameters configured in the Posture Server, Primary Server, and

Backup Server tabs. The following figure displays the Summary tab:

Figure 253: Posture Servers - Summary Tab

Configuring Audit Servers

The Policy Manager server contains built-in Nessus (version 2.X) and NMAP servers. For enterprises with existing audit server infrastructure, or with external audit servers, Policy Manager supports these servers externally.

For more information, see: l l l

Built-In Audit Servers on page 282

Custom Audit Servers on page 285

Post-Audit Rules on page 293

Audit Service Flow Control

Audit servers evaluate posture, role, or both for unmanaged or unmanageable clients. One example is clients that lack an adequate posture agent or an 802.1X supplicant. For example, printers, PDAs, or guest users might not be able to send posture credentials or identify themselves.

A Policy Manager Service can trigger an audit by sending a client ID to a pre-configured audit server, and the server returns attributes for role mapping and posture evaluation.

Audit servers are configured at a global level. Only one audit server can be associated with a service. The flowof-control of the audit process is shown in the figure.

For more information, see

Configuring Audit Servers on page 281 .

ClearPass Policy Manager 6.5 | User Guide Posture | 281

Figure 254: Flow of Control of Policy Manager Auditing

Built-In Audit Servers

When you configure an audit as part of a Policy Manager service, you can select the default Nessus (Nessus

Server) or NMAP (Nmap Audit) configuration.

Adding Auditing to a Policy Manager Service

1. Navigate to the Audit tab from one of the following locations: l

To configure an audit server for a new service (as part of the flow of the Add Service wizard), navigate to

Configuration > Services. Select the Add Services link in the top-right corner. In the Add Services form, select the Audit tab.

You must select the Audit End-hosts check box on the Services tab to display the Audit tab.

282 | Posture ClearPass Policy Manager 6.5 |  User Guide

l

To modify an existing audit server, navigate to Configuration > Posture > Audit Servers, then select an audit server from the list.

2. Configure auditing and complete the fields in the Audit tab as described in

Figure 255 :

Figure 255: Audit Tab

ClearPass Policy Manager 6.5 | User Guide Posture | 283

Table 153: Audit tab

Parameter Description

Audit

Server

Select a built-in server profile from the list: l The [Nessus Server] performs vulnerability scanning and returns a

Healthy/Quarantine result.

l The [Nmap Audit] performs network port scans. The health evaluation always returns a Healthy result. The port scan gathers attributes that allow determination of role(s) through post-audit rules.

For Policy Manager to trigger an audit on an end-host, it needs to get the IP address of the end-host. The IP address of the end-host is not available at the time of initial authentication for 802.1X and MAC authentication requests. Policy Manager has a builtin DHCP snooping service that can examine DHCP request and response packets to derive the IP address of the end-host. For this to work, you need to use this service,

Policy Manager must be configured as a DHCP “IP Helper” on your router/switch in addition to your main DHCP server. Refer to your switch documentation for “IP Helper” configuration.

To audit devices that have a static IP address assigned, it is recommended to create a static binding between the MAC and IP address of the endpoint in your DHCP server.

Refer to your DHCP server documentation for configuring such static bindings.

NOTE: Policy Manager does not issue the IP address; it only examines the DHCP traffic to derive the IP address of the end-host.

Audit

Trigger

Conditions

Select from the following audit trigger conditions: l Always: Always perform an audit.

l l

When posture is not available: Perform audit only when posture credentials are not available in the request.

For MAC Authentication Request: If you select this option, then Policy Manager presents the following three additional settings: n n

For known end-hosts only: For example, select this option when you want to reject unknown end-hosts and to audit known clients. Known end-hosts are defined as clients that are found in the authentication source(s) associated with this service.

For unknown end-hosts only: For example, select this option when known endhosts are assumed to be healthy, but you want to establish the identity of unknown end-hosts and assign roles. Unknown end-hosts are end-hosts that are not found in any of the authentication sources associated with this service.

n For all end-hosts: For both known and unknown end-hosts.

Action after audit

Select an Action after audit. Performing audit on a client is an asynchronous task, which means the audit can be performed only after the MAC authentication request is completed and the client has acquired an IP address through DHCP. Once the audit results are available, there should be a way for Policy Manager to re-apply policies on the network device. This can be accomplished in one of the following ways: l

No Action: The audit will not apply policies on the network device after this audit.

l l

Do SNMP bounce: This option will bounce the switch port or force an 802.1X

reauthentication (both done using SNMP). Bouncing the port triggers a new

802.1X/MAC authentication request by the client. If the audit server already has the posture token and attributes associated with this client in its cache, it returns the token and the attributes to Policy Manager.

Trigger RADIUS CoA action: This option sends a RADIUS CoA command to the network device.

284 | Posture ClearPass Policy Manager 6.5 |  User Guide

Modifying Built-In Audit Servers

To reconfigure a default Policy Manager audit servers:

1. Open the audit server profile. Navigate to Configuration > Posture > Audit Servers, then select an audit server from the list of available servers.

Figure 256: Audit Servers Listing

2. Modify the profile, plugins, and/or preferences.

l

In the Audit tab, you can modify the In Progress Posture Status and Default Posture Status.

l l

If you selected a NESSUS Server, then the Primary/Backup Server tabs allow you to specify a scan profile. In addition, when you add a new scan profile, you can select plugins and preferences for the profile. Refer to

Nessus Scan Profiles on page 287

for more information.

The built-in Policy Manager Nessus audit server ships with approximately 1000 most commonly used

Nessus plugins.

In the Rules tab, you can create post-audit rules for determining role based on identity attributes discovered by the audit. For more information on creating post-audit rules, see

Post-Audit Rules on page

293

.

Custom Audit Servers

For enterprises with existing audit server infrastructure or preferring custom audit servers, Policy Manager supports NESSUS (2.x and 3.x) and NMAP scans using the NMAP plug-in on these external Nessus servers.

To configure a custom audit server:

1. Open the Audit page.

l

To configure an audit server for a new service (as part of the flow of the Add Service wizard), navigate to

Configuration > Posture > Audit Servers, then click Add Audit Server.

l

To modify an existing audit server, navigate to Configuration > Posture > Audit Server, and select an audit server.

2. Add a custom audit server l

When you click Add Audit Server, Policy Manager displays the Add Audit Server page. Configuration settings vary depending on audit server type: n n

Nessus Audit Server on page 285

NMAP Audit Server on page 291

Nessus Audit Server

Policy Manager uses the Nessus audit server interface primarily to perform vulnerability scanning. It returns a

Healthy/Quarantine result. The Audit tab identifies the server and defines configuration details.

ClearPass Policy Manager 6.5 | User Guide Posture | 285

Figure 257: Nessus Audit Server - Audit Tab

Table 154: Nessus Audit Server - Audit Tab

Parameter Description

Name Specify the name of the audit server.

Description

Type

In-Progress

Posture Status

Default Posture

Status

Enter the description that provides additional information about the audit server.

Specify the type of audit server from NMAP or NESSUS.

Specifies the posture status during audit. Select the status from the drop-down list.

Specifies the posture status if evaluation does not return a condition/action match.

Select the status from the drop-down list.

The Primary Server and Backup Server tabs specify connection information for the NESSUS audit server.

286 | Posture ClearPass Policy Manager 6.5 |  User Guide

Figure 258: Nessus Audit Server - Primary and Backup Tabs

Table 155: Nessus Audit Server - Primary and Backup Server Tabs

Parameter Description

Server Name and

Port/ Username/

Password

Scan Profile

Specifies the standard NESSUS server configuration fields.

NOTE: For the backup server to be invoked on primary server failover, check the

Enable to use backup when primary does not respond check box.

You can accept the default scan profile or select Add/Edit Scan Profile to create other profiles and add them to the scan profile list. Refer to

Nessus Scan

Profiles on page 287

.

The Rules tab specifies rules for post-audit evaluation of the request to assign a role. For more information, refer to

Post-Audit Rules on page 293

.

Nessus Scan Profiles

A scan profile contains a set of scripts (plugins) that perform specific audit functions. To Add/Edit Scan Profiles, select Add/Edit Scan Profile (link) from the Primary Server tab of the Nessus Audit Server configuration.

The Nessus Scan Profile Configuration page displays.

ClearPass Policy Manager 6.5 | User Guide Posture | 287

Figure 259: Nessus Scan Profile Configuration Page

You can refresh the plugins list (after uploading plugins into Policy Manager, or after refreshing the plugins on your external Nessus server) by clicking Refresh Plugins List. The Nessus Scan Profile Configuration page provides three views for scan profile configuration: l

The Profile tab identifies the profile and provides a mechanism for selection of plugins: n

From the Filter plugins by family drop-down list, select a family to display all available member plugins in the list below. You may also enter the name of a plugin in Filter plugins by ID or name text box.

n n

Select one or more plugins by enabling their corresponding check boxes (at left). Policy Manager will remember selections as you select other plugins from other plugin families.

When finished, click the Selected Plugins tab.

288 | Posture ClearPass Policy Manager 6.5 |  User Guide

Figure 260: Nessus Scan Profile Configuration - Profile Tab l

The Selected Plugins tab displays all selected plugins, plus any dependencies.

To display a synopsis of any listed plugin, click on its row.

ClearPass Policy Manager 6.5 | User Guide Posture | 289

Figure 261: Nessus Scan Profile Configuration Profile Tab - Plugin Synopsis

Of special interest is the section of the synopsis entitled Risks. To delete any listed plugin, click on its corresponding trashcan icon. To change the vulnerability level of any listed plugin, click on the link to change the level to one of

HOLE, WARN, or INFO. This action tells Policy Manager the vulnerability level that is considered to be assigned

QUARANTINE status.

Figure 262: Nessus Scan Profile Configuration - Selected Plugins Tab

Figure 263: Nessus Scan Profile Configuration Selected Plugins Tab - Vulnerability Level

For each selected plugin, the Preferences tab contains a list of fields that require entries.

In many cases, these fields will be pre-populated. In other cases, you must provide information required for the operation of the plugin.

290 | Posture ClearPass Policy Manager 6.5 |  User Guide

By way of example of how plugins use this information, consider a plugin that must access a particular service, in order to determine some aspect of the client’s status; in such cases, login information might be among the preference fields.

Figure 264: Nessus Scan Profile Configuration - Preferences Tab

After saving the profile, plugin, and preference information for your new (or modified) plugin, you can go to the

Primary/Backup Servers tabs and select it from the Scan Profile drop-down list.

NMAP Audit Server

To create an NMAP audit server, Navigate to Configuration > Posture > Audit Servers page and click Add.

From the Audit tab, select the NMAP radio button in the Type field. Policy Manager uses the NMAP audit server interface exclusively for network port scans. The health evaluation always returns the Healthy status.

The port scan gathers attributes that allow determination of role(s) through post-audit rules. The NMAP audit server has the following tabs: l l l l

Audit

NMAP Options

Rules

Summary

Audit Tab

You can use the Audit tab to identify the server and define configuration details.

Figure 265

shows an example of the Audit tab:

ClearPass Policy Manager 6.5 | User Guide Posture | 291

Figure 265: Audit Tab - NMAP Audit Server

The following table describes the parameters configured in the Audit tab:

Table 156: Audit Tab Parameters

Parameter

Name

Description

Description

Enter the name of the NMAP audit server.

Enter the description of the NMAP audit server that provides some additional information.

Type

In Progress

Posture Status

Default Posture

Status

Specify the type of an NMAP audit server. In this context, select NMAP.

Posture status during audit. Select a status from the drop-down list.

Select the posture status if evaluation does not return a condition/action match.

Select a status from the drop-down list.

NMAP Options Tab

You can use the NMAP Options tab to specify scan configuration.

292 | Posture ClearPass Policy Manager 6.5 |  User Guide

Figure 266: NMAP Options Tab

Table 157: NMAP Options Tab

Parameter Description

TCP Scan To specify a TCP scan, select from the TCP Scan drop-down list. Refer to

NMAP documentation for more information on these options. NMAP option -scanflags.

UDP Scan

Service Scan

Detect Host

Operating System

To enable, check the UDP Scan check box. NMAP option -sU.

To enable, check the Service Scan check box. NMAP option -sV.

To enable, check the Detect Host Operating System check box. NMAP option -A.

Port Range/ Host

Timeout/ In Progress

Timeout l l l

Port Range - Range of ports to scan. NMAP option -p.

Host Timeout - Give up on target host after this long. NMAP option --hosttimeout

In Progress Timeout - How long to wait before polling for NMAP results.

The Rules tab provides specifies rules for post-audit evaluation of the request to assign a role. Refer to

Post-

Audit Rules on page 293

.

Post-Audit Rules

The Rules tab specifies rules for post-audit evaluation of the request to assign a role.

ClearPass Policy Manager 6.5 | User Guide Posture | 293

Figure 267: All Audit Server Configurations - Rules Tab

Table 158: All Audit Server Configurations - Rules Tab

Parameter Description

Rules Evaluation

Algorithm

Select first matched rule and return the role or Select all matched rules and return a set of roles.

Add Rule

Move Up/Down

Edit Rule

Remove Rule

Add a rule. Brings up the rules editor. See below.

Reorder the rules.

Brings up the selected rule in edit mode.

Remove the selected rule.

Figure 268: All Audit Server Configurations - Rules Editor

294 | Posture ClearPass Policy Manager 6.5 |  User Guide

Table 159: All Audit Server Configurations - Rules Editor

Parameter Description

Conditions

Actions

The Conditions list includes five dictionaries: Audit-Status, Device-Type, Output-Msgs,

Mac-Vendor, Network-Apps, Open-Ports, and OS-Info. Refer to

Namespaces on page

613 .

The Actions list includes the names of the roles configured in Policy Manager.

Save To commit a Condition/Action pairing, click Save.

ClearPass Policy Manager 6.5 | User Guide Posture | 295

296 | Posture ClearPass Policy Manager 6.5 |  User Guide

Chapter 7

Configuring Enforcement

Policy Manager controls network access by sending a set of access-control attributes to the request-originating

Network Access Device (NAD). Policy Manager sends these attributes by evaluating an enforcement policy associated with the service. Each enforcement policy contains a rule or set of rules for matching conditions

(role, posture, and time) to actions (enforcement profiles). Commonly used enforcement profiles include attributes for VLAN, Filter ID, Downloadable ACL, and Proxy ACL. For a general overview of network access enforcement policies, see Enforcement Architecture and Flow on page 1 .

This chapter describes the following topics: l l

Configuring Enforcement Policies on page 297

Configuring Enforcement Profiles on page 299

Configuring Enforcement Policies

One and only one enforcement policy can be associated with each service. Enforcement policies can be added in one of two ways: l l

From the Configuration > Enforcement > Enforcement Policies.

From the Configuration > Services page as part of the flow of the Add Service wizard.

The following figure displays the Enforcement Policies page:

Figure 269: Enforcement Policies Listing Page

Click Add Enforcement Policy to open the Add Enforcement Policy wizard:

ClearPass Policy Manager 6.5 | User Guide Configuring Enforcement | 297

Figure 270: Add Enforcement Policy - Enforcement tab

The following table describes the Add Enforcement Policy - Enforcement tab parameters:

Table 160: Add Enforcement Policy - Enforcement Tab Parameters

Parameter Description

Name/Description Freeform label and description.

Type

Default Profile

Select: RADIUS, TACACS+, WebAuth (SNMP/CLI)/CoA or Application. Based on this selection, the Default Profile list shows the right type of enforcement profiles in the dropdown list (See Below).

NOTE: Web-based Authentication or WebAuth (HTTPS) is the mechanism used by authentications performed via a browser, and authentications performed via Aruba OnGuard.

Both SNMP and CLI (SSH/Telnet) based Enforcement Profiles can be sent to the network device based on the type of device and the use case.

An enforcement policy applies conditions (roles, health and time attributes) against specific values associated with those attributes to determine the enforcement profile. If none of the rules matches, Policy Manager applies the default profile.

Click Add new Enforcement Profile to add a new profile (This is integrated into the flow.

After you create a profile, Policy Manager brings you back to the current tab.)

In the Rules tab, click New Rule to display the Rules Editor:

Figure 271: Add Enforcement Policy (Rules Tab)

298 | Configuring Enforcement ClearPass Policy Manager 6.5 |  User Guide

The following table describes the Add Enforcement Policy - Rules tab parameters:

Table 161: Add Enforcement Policy (Rules tab)

Field Description

Add/Edit Rule Bring up the rules editor to add/edit a rule.

Move Up/Down

Remove Rule

Reorder the rules in the enforcement policy.

Remove a rule.

Table 162: Add Enforcement Policy (Rules Editor)

Field Description

Conditions/Enforcement

Profiles

Select conditions for this rule. For each condition, select a matching action

(enforcement profile).

NOTE: A condition in an enforcement policy rule can contain attributes from the following namespaces: Tips:Role, Tips:Posture, and Date.

NOTE: The value field for the Tips:Role attribute can be a role defined in Policy

Manager, or a role fetched from the authorization source. (Refer to see how Enable as

Role can be turned on for a fetched attribute). Role names fetched from the authorization source can be entered freeform in value field. To commit the rule, click

Save.

Enforcement Profiles If the rule conditions match, attributes from the selected enforcement profiles are sent to Network Access Device. If a rule matches and there are multiple enforcement profiles, the enforcement profile disambiguation rules apply. Refer to

Configuring

Enforcement Profiles on page 299

for a list of the default profiles.

Configuring Enforcement Profiles

You can configure Policy Manager enforcement profiles globally, but they must be referenced to an enforcement policy that is associated with a service.

For information about configuring individual enforcement profiles, see: l l l l l l l l l l l l

Agent Enforcement on page 301

Aruba Downloadable Role Enforcement on page 305

Aruba RADIUS Enforcement on page 315

Cisco Downloadable ACL Enforcement on page 317

Cisco Web Authentication Enforcement on page 319

ClearPass Entity Update Enforcement on page 321

CLI Based Enforcement on page 323

Filter ID Based Enforcement on page 325

Generic Application Enforcement on page 327

HTTP Based Enforcement on page 329

RADIUS Based Enforcement on page 330

RADIUS Change of Authorization (CoA) on page 332

ClearPass Policy Manager 6.5 | User Guide Configuring Enforcement | 299

l l l l

Session Restrictions Enforcement on page 336

SNMP Based Enforcement on page 338

TACACS+ Based Enforcement on page 339

VLAN Enforcement on page 341

To configure an enforcement profile:

1. Navigate to Configuration > Enforcement > Profiles.

2. Click Add at the top-right corner of the Enforcement Policies page and use the wizard. You can modify an existing enforcement profile directly from Configuration > Enforcement > Profiles page and then click a name in the Enforcement Profile listing.

The following figure displays the Enforcement Profiles page:

Figure 272: Enforcement Profiles Page

The following table describes the default profiles pre-packaged with Policy Manager:

Table 163: Default Enforcement Profiles

Profile

[Aerohive - Terminate Session]

Available for the following Enforcement Types

RADIUS_CoA

[AirGroup Personal Device]

[AirGroup Response]

[AirGroup Shared Device]

[Allow Access Profile]

[Allow Application Access Profile]

[Aruba TACACS read-only Access]

[Aruba TACACS root Access]

[Aruba Terminate Session]

RADIUS

RADIUS

RADIUS

RADIUS

Application

TACACS

TACACS

RADIUS_CoA

300 | Configuring Enforcement ClearPass Policy Manager 6.5 |  User Guide

Table 163: Default Enforcement Profiles (Continued)

Profile Available for the following Enforcement Types

[Cisco - Bounce-Host-Port] RADIUS_CoA

[Cisco - Disable Host-Port]

[Cisco - Reauthenticate-Session]

[Cisco - Terminate-Session]

[Deny Access Profile]

[Deny Application Access Profile]

[Drop Access Profile]

[Handle AirGroup Time Sharing]

[HP - Terminate Session]

[Juniper Terminate Session]

[Motorola - Terminate Session]

[Operator Login - Admin Users]

[Operator Login - Local Users]

[TACACS API Admin]

[TACACS Deny Profile]

[TACACS Help Desk]

[TACACS Network Admin]

[TACACS Read-only Admin]

[TACACS Receptionist]

[TACACS Super Admin]

[Trapeze - Terminate Session]

[Update Endpoint Known]

RADIUS_CoA

RADIUS_CoA

Application

Application

TACACS

TACACS

TACACS

TACACS

RADIUS_CoA

RADIUS_CoA

RADIUS_CoA

RADIUS

Application

RADIUS

HTTP

RADIUS_CoA

TACACS

TACACS

TACACS

RADIUS_CoA

Post-Authentication

Agent Enforcement

Use this page to configure profile and attribute parameters for the Agent Enforcement profile. The Agent

Enforcement profile contains the following configuration tabs: l l l

Profile Tab on page 302

Attributes Tab on page 303

Summary Tab on page 305

ClearPass Policy Manager 6.5 | User Guide Configuring Enforcement | 301

Profile Tab

Use the Profile tab to configure the template, type of the profile, and device group list. The following figure displays the Agent Enforcement - Profile tab:

Figure 273: Agent Enforcement - Profile Tab

The following table describes the Agent Enforcement - Profile tab parameters:

Table 164: Add Agent Enforcement - Profile Tab Parameters

Parameter Description

Template Select the template from the drop-down list. In this context, select Agent Enforcement.

Name

Description

Enter the name of the profile. The name is displayed in the Name column on the Configuration

> Enforcement > Profiles page.

Enter a description of the profile. This description is displayed in the Description column on the

Configuration > Enforcement > Profiles page.

Type

Action

This field is populated automatically.

By default, this field is disabled. Enabled only when RADIUS type is selected. Click to Accept,

Deny, or Drop to define the action taken on the request.

Device Group

List

Select a device group from the drop-down list. The list displays all configured device groups.

All configured device groups are listed in the Device Groups ( Configuration > Network >

Device Groups) page. After you add one or more device group(s), you can select a group and take one of the following actions: l

Click Remove to delete the selected Device Group List entry.

l l

Click View Details to see the device group parameters.

Click Modify to change the parameters of the selected device group.

Add new Device

Group

To add a new device group, click the Add new Device Group link. For more information, see

Adding and Modifying Device Groups on page 386 .

302 | Configuring Enforcement ClearPass Policy Manager 6.5 |  User Guide

Attributes Tab

Use the Attributes tab to configure the attribute name and attribute value. The following figure displays the

Agent Enforcement- Attributes tab:

Figure 274: Agent Enforcement - Attributes Tab

ClearPass Policy Manager 6.5 | User Guide Configuring Enforcement | 303

The following table describes the Agent Enforcement - Attributes tab parameters:

Table 165: Agent Enforcement - Attributes Tab Parameters

Attribute Parameter

Attribute Name Select one of the following attribute names: l

Bounce Client - Set the value to true by checking the box to terminate the network connection.

l l l l l

Message - Enter the message that needs to be notified on the endpoint.

Enable to hide Retry button - Set the value to true to hide the Retry button in the

OnGuard Agent.

Enable to hide Logout button - Set the value to true to hide the Logout button in the

OnGuard Agent.

Health Check Interval (in hours) - Specify the health check interval value in hours for different Agent Enforcement Profiles for different users. The allowed range is of 0 – 1000 hours. For example, you can create Student-Enforcement-Profile with a value of 8 hours and

Staff-Enforcement-Profile with a value of 48 hours. The value configured in the Health

Check Quiet Period (in hours) field in the Agent Enforcement Attribute tab takes precedence over the value configured in the Global Agent Settings field. If both the values are configured, then the Agent Enforcement Attribute value is used by OnGuard Agent.

The value of the Policy result cache timeout (path: Administration > Server Manager >

Server Configuration > Cluster-Wide Parameters > General tab) field must be greater than the highest value of all the Health Check Interval (in hours) field values. For example, if you have created the profiles Student-Enforcement-Profile and Staff-Enforcement-Profile with health check interval configured, then the value of the Policy result cache timeout field must be greater than the highest value of Health Check Quiet Period (in hours) configured in the following fields: n n

Global Agent Settings

Student-Enforcement-Profile n

Staff-Enforcement-Profile

Note the following information when you set the OnGuard Health Check Interval parameter: n n

You can set this parameter if OnGuard mode is set to health only.

This parameter is valid only for wired and wireless interface types.

n This parameter is not applicable for the OnGuard Dissolvable Agent, VPN, and other interface types.

Session Timeout (in seconds) - Configure the agent session timeout interval to reevaluate the system health again. OnGuard triggers auto-remediation using this value to enable or disable AV-RTP status check on endpoint. Agent re-authentication is determined based on session-time out value. You can specify the session timeout interval from 60 – 600 seconds. Setting the lower value for session timeout interval results numerous authentication requests in Access Tracker page. The default value is 0.

Attribute Value Set the value depends on the selected Attribute Name.

304 | Configuring Enforcement ClearPass Policy Manager 6.5 |  User Guide

Summary Tab

The Summary tab summarizes the parameters configured in the Profile and Attribute tabs. The following figure displays the Agent Enforcement - Summary tab:

Figure 275: Agent Enforcement - Summary Tab

Aruba Downloadable Role Enforcement

Use this page to configure profile and role configuration attributes for the Aruba Downloadable Role

Enforcement profile. The Aruba Downloadable Role Enforcement profile contains the following tabs: l l l

Profile Tab on page 305

Role Configuration Tab on page 306

Summary Tab on page 315

Profile Tab

Use the Profile tab to configure the template, type of the profile, and device group list. The following figure displays the Aruba Downloadable Role Enforcement - Profile tab:

Figure 276: Aruba Downloadable Role Enforcement - Profile Tab

The following table describes the Aruba Downloadable Role Enforcement - Profile parameters:

Table 166: Aruba Downloadable Role Enforcement - Profile Tab Parameters

Parameter Description

Template Select the template from the drop-down list. In this context, select Aruba Downloadable Role

Enforcement.

Name

Description

Enter the name of the profile. The name is displayed in the Name column on the Configuration

> Enforcement > Profiles page.

Enter a description of the profile. This description is displayed in the Description column on the

Configuration > Enforcement > Profiles page.

ClearPass Policy Manager 6.5 | User Guide Configuring Enforcement | 305

Table 166: Aruba Downloadable Role Enforcement - Profile Tab Parameters (Continued)

Parameter Description

Type

Action

Specifies the type of authentication. In this context, RADIUS. This field is automatically populated.

Click Accept, Reject, or Drop to define the action taken on the request. The default action is

Accept.

Device Group

List

Select a device group from the drop-down list. The list displays all configured device groups. All configured device groups are listed in the Device Groups (Configuration > Network > Device

Groups) page. After adding one or more device group(s), you can select a group and perform one of the following actions: l l

Click Remove to delete the selected device group list entry.

Click View Details to see the device group parameters.

l Click Modify to change the parameters of the selected device group.

Add new Device

Group

To add a new device group, click the Add new Device Group link. For more information, see

Adding and Modifying Device Groups on page 386 .

Role Configuration Tab

The fields on the Role Configuration tab require you to select a link to launch a new page where you set role configuration attributes. For example, adding a Captive Portal profile. The following figure displays the Aruba

Downloadable Role Enforcement Role Configuration tab:

Figure 277: Aruba Downloadable Role Enforcement Role - Configuration Tab

306 | Configuring Enforcement ClearPass Policy Manager 6.5 |  User Guide

The following table describes the Role Configuration - Attributes parameters:

Table 167: Role Configuration - Attributes Page Parameters

Parameters Configuration

Captive Portal

Profile

Select the captive portal profile from the drop-down list if already configured. Click Add

Captive Portal Profile link to add a new captive portal profile. For more information, see

Captive Portal Profile on page 308

.

Policer Profile

QoS Profile

VoIP Profile Select the VoIP profile from the drop-down list if already configured. Click Add VoIP Profile link to add a new VoIP profile. For more information, see

VoIP Profile on page 311

.

Reauthentication

Interval Time (0-

4096)

Enter the number of minutes between reauthentication intervals. You can select the range between 0 to 4096 minutes.

Enter a number between 1 and 4094 that defines when the VLAN is to be assigned.

VLAN To Be

Assigned (1-

4904)

NetService

Configuration

Select the Manage NetServices link to add, edit, and delete the NetService definitions.

NetDestination

Configuration

Time Range

Configuration

NAT Pool

Configuration

ACL Type

Select the policer profile from the drop-down list if already configured. Click Add Policer

Profile link to add a new policer profile. For more information, see

Policer Profile on page

309 .

Select the QoS profile from the drop-down list if already configured. Click Add QoS Profile link to add a new QoS profile. For more information, see

QOs Profile on page 310

.

Select the Manage NetDestinations link to add, edit, and delete the NetDestinations definitions.

Select the Manage Time Ranges link to add, edit, and delete time range definitions.

Select the Manage NAT Pool link to add, edit and delete NAT Pool definitions.

ACL Name

User Role

Configuration

Select from the following ACL types: l Ethertype l l l

MAC

Session

Stateless

Click the name of the ACL type. Click Add to move the ACL Name to the ACL field.

Click Move Up, Move Down, or Remove to modify the names in the ACL list.

Check the Summary tab for generated role configuration.

ClearPass Policy Manager 6.5 | User Guide Configuring Enforcement | 307

Captive Portal Profile

Click the Add Captive Portal Profile link. Enter a name of the profile and configure the required attributes.

The following figure displays the Add Captive Portal Profile pop-up:

Figure 278: Add Captive Portal Profile Pop-up

308 | Configuring Enforcement ClearPass Policy Manager 6.5 |  User Guide

Policer Profile

Click the Add Policer Profile link. Enter a name of the profile and configure the required attributes. The following figure displays the Add Policer Profile pop-up:

Figure 279: Add Policer Profile Pop-up

ClearPass Policy Manager 6.5 | User Guide Configuring Enforcement | 309

QOs Profile

Click the Add QoS Profile link. Enter a name of the profile and configure the required attributes. The following figure displays the Add QoS Profile pop-up:

Figure 280: Add QosProfle Pop-up

310 | Configuring Enforcement ClearPass Policy Manager 6.5 |  User Guide

VoIP Profile

Click the Add VoIP Profile link. Enter a name for the profile and configure the required attributes. The following figure displays the Add VoIP Profile pop-up:

Figure 281: Add VoIP Profile Pop-up

NetService Configuration

Click the Manage NetServices link and configure the required attributes. The following figure displays the

Manage NetServices pop-up:

Figure 282: Manage NetServices Pop-up

ClearPass Policy Manager 6.5 | User Guide Configuring Enforcement | 311

NetDestination Configuration

Click the Manage NetDestinations link and configure the required attributes. The following figure displays the Manage NetDestinations pop-up:

Figure 283: Manage NetDestinations Pop-up

Time Range Configuration

Click the Manage Time Ranges link and configure the required attributes. The following figure displays the

Manage Time Ranges pop-up:

Figure 284: Time Range Configuration Pop-up

312 | Configuring Enforcement ClearPass Policy Manager 6.5 |  User Guide

NAT Pool Configuration

Use the NAT Pool Configuration page to configure the start and end of the source NAT range and associate them with session ACLs. The following figure displays the NAT Pool Configuration pop-up:

Figure 285: NAT Pool Configuration Pop-up

ACL

Click the Add Stateless Access Control List link. Enter a name for the Stateless ACL. Click the Add Rule link on the General tab. Enter the required attributes in the Rule Configuration tab and click Save Rule or

Cancel.

The following figure displays the Add Stateless Access Control List pop-up:

Figure 286: Stateless Access Control List Configuration Pop-up

Click the Add Session Access Control List link and enter the name for the Session ACL. Click the Add Rule link on the General tab. You can view different fields depends on the Action type you choose from the drop-

ClearPass Policy Manager 6.5 | User Guide Configuring Enforcement | 313

down list. For example, if you select the dual-nat action type, you can view the Dual NAT Pool field additionally to specify the action. Enter the required attributes in the Rule Configuration tab and click Save

Rule or Cancel.

The following figure displays the Session Access Control List Attributes pop-up:

Figure 287: Session Access Control List Attributes Pop-up

Click the Add Ethernet/MAC Access Control List link. Enter a name for the Ethernet/MAC ACL. Enter the required attributes in the Rules section of the page and click Reset, Save Rule. Then click Save or Cancel.

314 | Configuring Enforcement ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Ethernet/MAC Access Control List Attributes pop-up:

Figure 288: Ethernet/MAC Access Control List Attributes Pop-up

Summary Tab

The Summary tab summarizes the parameters configured in the Profile and Role Configuration tabs. The following figure displays the Aruba Downloadable Role Enforcement - Summary tab:

Figure 289: Aruba Downloadable Role Enforcement - Summary Tab

Aruba RADIUS Enforcement

Use this page to configure profile and attribute parameters for the Aruba RADIUS Enforcement profile. The the Aruba RADIUS Enforcement profile contains the following configuration tabs: l l

Profile Tab on page 316

Attributes Tab on page 317

ClearPass Policy Manager 6.5 | User Guide Configuring Enforcement | 315

l

Summary Tab on page 317

Profile Tab

Use the Profile tab to configure the template, type of the profile, and device group list. The following figure displays the Aruba RADIUS Enforcement - Profile tab:

Figure 290: Aruba RADIUS Enforcement - Profile Tab

The following table describes the Aruba RADIUS Enforcement - Profile tab parameters:

Table 168: Aruba RADIUS Enforcement - Profile Tab Parameters

Parameter Description

Template

Name

Select the template from the drop-down list. In this context, select Aruba RADIUS Enforcement.

Enter the name of the profile. The name is displayed in the Name column on the Configuration

> Enforcement > Profiles page.

Description Enter a description that provides additional information about the profile. This description is displayed in the Description column on the Configuration > Enforcement > Profiles page.

This field is populated automatically.

Type

Action

Device Group

List

Click Accept, Reject, or Drop to define the action taken on the request.

Select a device group from the drop-down list. The list displays all configured device groups. All configured device groups are listed in the Device Groups ( Configuration > Network >

Device Groups) page.

After adding one or more device group(s), you can select a group and take one of the following actions: l l l

Click Remove to delete the selected Device Group List entry.

Click View Details to see the device group parameters.

Click Modify to change the parameters of the selected device group.

Add new Device

Group

Click this link to add a new device group, For more information, see

Adding and Modifying

Device Groups on page 386

.

316 | Configuring Enforcement ClearPass Policy Manager 6.5 |  User Guide

Attributes Tab

Use the Attribute tab to configure the attribute type, name, and value for the enforcement profile. The following figure displays the Aruba RADIUS Enforcement - Attributes tab:

Figure 291: Aruba RADIUS Enforcement - Attributes Tab

The following table describes the Aruba RADIUS Enforcement - Attributes tab parameters:

Table 169: Aruba RADIUS Enforcement - Attributes Tab Parameters

Attribute Description

Type Select one of the following attribute types: l l l l

Radius:Aruba

Radius:IETF

Radius:Cisco

Radius:Microsoft l Radius:Avenda

For more information, see

RADIUS Namespaces on page 622

.

Name

Value

Specifies the options displayed for the Name attribute depend on the Type attribute selected.

Specifies the options displayed for the Value attribute depend on the Type and Name attributes selected.

Summary Tab

The Summary tab summarizes the parameters configured in the Profile and Attributes tab. The following figure displays the Aruba RADIUS Enforcement - Summary tab:

Figure 292: Aruba RADIUS Enforcement - Summary Tab l l

Cisco Downloadable ACL Enforcement

Use this page to configure profile and attribute parameters for the Cisco Downloadable ACL Enforcement profile. The Cisco Downloadable ACL Enforcement profile contains the following configuration tabs: l

Profile Tab on page 318

Attributes Tab on page 318

Summary Tab on page 319

ClearPass Policy Manager 6.5 | User Guide Configuring Enforcement | 317

Profile Tab

Use the Profile tab to configure the template, type of the profile, and device group list. The following figure displays the Cisco Downloadable ACL Enforcement - Profile tab:

Figure 293: Cisco Downloadable ACL Enforcement - Profile Tab

The following table describes the Cisco Downloadable ACL Enforcement - Profile parameters:

Table 170: Cisco Downloadable ACL Enforcement - Profile Tab Parameters

Parameter Description

Template Select the template from the drop-down list. In this context, select Cisco Downloadable ACL

Enforcement.

Name

Description

Enter the name of the profile. The name is displayed in the Name column on the Configuration

> Enforcement > Profiles page.

Enter a description of the profile. The description is displayed in the Description column on the

Configuration > Enforcement > Profiles page.

Type

Action

The field is populated automatically.

Click Accept, Reject, or Drop to define the action taken on the request.

Device Group

List

Select a Device Group from the drop-down list. The list displays all configured device groups.

All configured device groups are listed in the Device Groups (Configuration > Network >

Device Groups) page. After adding one or more device group(s), you can select a group and take one of the following actions: l l

Click Remove to delete the selected device group List entry.

Click View Details to see the device group parameters.

l Click Modify to change the parameters of the selected device group.

Add new Device

Group

To add a new a device group, click the Add new Device Group link. For more information, see

Adding and Modifying Device Groups on page 386 .

Attributes Tab

Use the Attribute tab to configure the attribute type, name, and value for the enforcement profile. The following figure displays the Cisco Downloadable ACL Enforcement - Attributes tab:

Figure 294: Cisco Downloadable ACL Enforcement - Attributes Tab

318 | Configuring Enforcement ClearPass Policy Manager 6.5 |  User Guide

The following table describes the Cisco Downloadable ACL Enforcement - Attributes parameters:

Table 171: Cisco Downloadable ACL Enforcement - Attributes Tab Parameters

Parameter Description

Type Select one of the following attribute types: l

Radius:Aruba l l l l

Radius:IETF

Radius:Cisco

Radius:Microsoft

Radius:Avenda

For more information, see

RADIUS Namespaces on page 622

Name

Value

The options displayed for the Name attribute depend on the Type attribute that was selected.

The options displayed for the Value attribute depend on the Type and Name attributes that were selected.

Summary Tab

The Summary tab summarizes the parameters configured in the Profile and Attribute tabs. The following figure displays the Cisco Downloadable ACL Enforcement - Summary tab:

Figure 295: Cisco Downloadable ACL Enforcement - Summary Tab l l

Cisco Web Authentication Enforcement

Use this page to configure profile and attribute parameters for the Cisco Web Authentication Enforcement profile. The Cisco Web Authentication Enforcement profile contains the following tabs: l

Profile Tab on page 320

Attributes Tab on page 320

Summary Tab on page 321

ClearPass Policy Manager 6.5 | User Guide Configuring Enforcement | 319

Profile Tab

Use the Profile tab to configure the template, type of the profile, and device group list. The following figure displays the Cisco Web Authentication Enforcement - Profile tab:

Figure 296: Cisco Web Authentication Enforcement - Profile Tab

The following table describes the Cisco Web Authentication Enforcement - Profile tab parameters:

Table 172: Cisco Web Authentication Enforcement - Profile Tab Parameters

Parameter Description

Template Select the template from the drop-down list. In this context, select Cisco Web Authentication

Enforcement.

Name

Description

Enter the name of the profile. The name is displayed in the Name column on the Configuration

> Enforcement > Profiles page.

Enter a description that provides additional information about the profile. This description is displayed in the Description column on the Configuration > Enforcement > Profiles page.

This field is populated automatically.

Type

Action

Device Group

List

Click Accept, Reject, or Drop to define the action taken on the request.

Select a device group from the drop-down list. The list displays all configured device groups. All configured device groups are listed in the Device Groups ( Configuration > Network >

Device Groups) page. After adding one or more device group(s), you can select a group and take one of the following actions: l l l

Click Remove to delete the selected Device Group List entry.

Click View Details to see the device group parameters.

Click Modify to change the parameters of the selected device group.

Add new Device

Group

Click this link to add a new device group, For more information, see

Adding and Modifying

Device Groups on page 386

.

Attributes Tab

Use the Attributes tab to configure the attribute name and attribute value. The following figure displays the

Cisco Web Authentication Enforcement - Profile tab:

Figure 297: Cisco Web Authentication Enforcement - Attributes Tab

320 | Configuring Enforcement ClearPass Policy Manager 6.5 |  User Guide

The following table describes the Cisco Web Authentication Enforcement - Attribute parameters:

Table 173: Cisco Web Authentication Enforcement - Attribute Tab Parameters

Parameter Description

Type Select one of the following attribute types: l

Radius:Aruba l l l l

Radius:IETF

Radius:Cisco

Radius:Microsoft

Radius:Avenda

For more information, see

RADIUS Namespaces on page 622

Name

Value

The options displayed for the Name attribute depend on the Type attribute that was selected.

The options displayed for the Value attribute depend on the Type and Name attributes that were selected.

Summary Tab

The Summary tab summarizes the parameters configured in the Profile and Attribute tabs. The following figure displays the Cisco Web Authentication Enforcement - Summary tab:

Figure 298: Cisco Web Authentication Enforcement - Summary Tab

ClearPass Entity Update Enforcement

Use this page to configure profile and attribute parameters for the ClearPass Entity Update Enforcement profile. The ClearPass Entity Update Enforcement profile contains the following tabs: l l l

Profile Tab on page 322

Attributes Tab on page 322

Summary Tab on page 323

ClearPass Policy Manager 6.5 | User Guide Configuring Enforcement | 321

Profile Tab

Use the Profile tab to configure the template, type of the profile, and device group list. The following figure displays the ClearPass Entity Update Enforcement - Profile tab:

Figure 299: ClearPass Entity Update Enforcement - Profile Tab

The following table describes the ClearPass Entity Update Enforcement - Profile tab parameters:

Table 174: ClearPass Entity Update Enforcement - Profile Tab Parameters

Parameter Description

Template Select the template from the drop-down list. In this context, select ClearPass Entity Update

Enforcement.

Name

Description

Enter the name of the profile. The name is displayed in the Name column on the Configuration

> Enforcement > Profiles page.

Enter a description that provides additional information about the profile. This description is displayed in the Description column on the Configuration > Enforcement > Profiles page.

Type This field is populated automatically.

Click Accept, Reject, or Drop to define the action taken on the request.

Action

Device Group

List

Select a device group from the drop-down list. The list displays all configured device groups. All configured device groups are listed in the Device Groups ( Configuration > Network >

Device Groups) page. After adding one or more device group(s), you can select a group and take one of the following actions: l l l

Click Remove to delete the selected Device Group List entry.

Click View Details to see the device group parameters.

Click Modify to change the parameters of the selected device group.

Add new Device

Group

Click this link to add a new device group, For more information, see

Adding and Modifying

Device Groups on page 386

.

Attributes Tab

Use the Attribute tab to configure the attribute type, name, and value for the enforcement profile. The following figure displays the ClearPass Entity Update Enforcement - Attributes tab:

Figure 300: ClearPass Entity Update Enforcement Attributes tab

322 | Configuring Enforcement ClearPass Policy Manager 6.5 |  User Guide

The following table describes the ClearPass Entity Update Enforcement - Attributes tab parameters:

Table 175: ClearPass Entity Update Enforcement - Attributes Tab Parameters

Attribute Description

Type Select one of the following attribute types: l

Endpoint l l l

Expire-Time-Update

GuestUser

Status-Update

Name

Value

The options displayed for the Name attribute depend on the Type attribute that was selected.

The options displayed for the Value attribute depend on the Type and Name attributes that were selected.

Summary Tab

The Summary tab summarizes the parameters configured in the Profile and Attributes tab. The following figure displays the ClearPass Entity Update Enforcement - Summary tab:

Figure 301: ClearPass Entity Update Enforcement - Summary Tab

CLI Based Enforcement

Use this page to configure profile and attribute parameters for the CLI Based Enforcement profile. The CLI

Based Enforcement profile contains the following tabs: l l l

Profile Tab on page 324

Attributes Tab on page 324

Summary Tab on page 325

ClearPass Policy Manager 6.5 | User Guide Configuring Enforcement | 323

Profile Tab

Use the Profile tab to configure the template, type of the profile, and device group list. The following figure displays the CLI Based Enforcement - Profile tab:

Figure 302: CLI Based Enforcement - Profile Tab

The following table describes the CLI Based Enforcement - Profile tab parameters:

Table 176: CLI Based Enforcement - Profile Tab Parameters

Parameter Description

Template Select the template from the drop-down list. In this context, select CLI Based Enforcement.

Name

Description

Type

Action

Enter the name of the profile. The name is displayed in the Name column on the Configuration

> Enforcement > Profiles page.

Enter a description that provides additional information about the profile. This description is displayed in the Description column on the Configuration > Enforcement > Profiles page.

This field is populated automatically.

Click Accept, Reject, or Drop to define the action taken on the request.

Device Group

List

Select a device group from the drop-down list. The list displays all configured device groups. All configured device groups are listed in the Device Groups ( Configuration > Network >

Device Groups) page.

After adding one or more device group(s), you can select a group and take one of the following actions: l l l

Click Remove to delete the selected Device Group List entry.

Click View Details to see the device group parameters.

Click Modify to change the parameters of the selected device group.

Add new Device

Group

Click this link to add a new device group, For more information, see

Adding and Modifying

Device Groups on page 386

.

Attributes Tab

Use the Attribute tab to configure the attribute type, name, and value for the enforcement profile. The following figure displays the CLI Based Enforcement - Attributes tab:

Figure 303: CLI Based Enforcement - Attributes Tab

324 | Configuring Enforcement ClearPass Policy Manager 6.5 |  User Guide

The following table describes the CLI Based Enforcement - Attributes tab parameters:

Table 177: CLI Based Enforcement - Attributes Tab Parameters

Attribute Parameter

Attribute Name Select Command or Target Device.

Attribute Value Displays the options for the Attribute Value depend on the selected Attribute Name.

Summary Tab

The Summary tab summarizes the parameters configured in the Profile and Attributes tab. The following figure displays the CLI Based Enforcement - Summary tab:

Figure 304: CLI Based Enforcement - Summary Tab

Filter ID Based Enforcement

Use this page to configure profile and attribute parameters for the Filter ID based enforcement profile. The

Filter ID Based Enforcement profile contains the following tabs: l l

Profile Tab on page 325

Attributes Tab on page 326

Profile Tab

The following figure displays the Filter ID Based Enforcement - Profile tab:

Figure 305: Filter ID Based Enforcement Profile tab

ClearPass Policy Manager 6.5 | User Guide Configuring Enforcement | 325

The following table describes the Filter ID Based Enforcement Profile tab parameters:

Table 178: Filter ID Based Enforcement - Profile Tab Parameters

Parameter Description

Template Select the template from the drop-down list. In this context, select Filter ID Based Enforcement

Name

Description

Type

Enter the name of the profile. The name is displayed in the Name column on the Configuration

> Enforcement > Profiles page.

Enter a description of the profile. The Description is displayed in the Description column on the

Configuration > Enforcement > Profiles page.

RADIUS. The field is populated automatically.

Action

Device Group

List

Enabled. Click Accept, Reject, or Drop to define the action taken on the request.

Select a Device Group from the drop-down list. The list displays all configured Device Groups.

All configured device groups are listed in the Device Groups page: Configuration > Network

> Device Groups. After you add one or more device group(s), you can select a group and take one of the following actions: l l l

Click Remove to delete the selected Device Group List entry.

Click View Details to see the device group parameters.

Click Modify to change the parameters of the selected device group.

Add new Device

Group

To add a new a device group, click the Add new Device Group link and see

Adding and

Modifying Device Groups on page 386

.

Attributes Tab

The following figure displays the Filter ID Based Enforcement Profile - Attributes tab:

Figure 306: Filter ID Based Enforcement Profile - Attributes Tab

326 | Configuring Enforcement ClearPass Policy Manager 6.5 |  User Guide

The following table describes the Filter ID Based Enforcement - Attributes tab parameters:

Table 179: Filter ID Based Enforcement Profile - Attributes Tab Parameters

Parameter Description

Type

Select one of the following attribute types: l Radius:Aruba l l

Radius:IETF

Radius:Cisco l Radius:Microsoft l Radius:Avenda

For more information, see

RADIUS Namespaces on page 622

Name The options displayed for the Name attribute depend on the attribute that was selected.

Value The options displayed for the Value attribute depend on the Type attribute and Name attribute that were selected.

Generic Application Enforcement

Use this page to configure profile and attribute parameters for the Generic Application Enforcement profile. The Generic Application Enforcement profile contains the following tabs: l l l

Profile Tab on page 327

Attributes Tab on page 328

Summary Tab on page 329

Profile Tab

Use the Profile tab to configure the template, type of the profile, and device group list. The following figure displays the Generic Application Enforcement - Profile tab:

Figure 307: Generic Application Enforcement - Profile Tab

ClearPass Policy Manager 6.5 | User Guide Configuring Enforcement | 327

The following table describes the Generic Application Enforcement - Profile tab parameters:

Table 180: Generic Application Enforcement - Profile Tab Parameters

Parameter Description

Template Select the template from the drop-down list. In this context, select Generic Application

Enforcement.

Name

Description

Enter the name of the profile. The name is displayed in the Name column on the Configuration

> Enforcement > Profiles page.

Enter a description that provides additional information about the profile. This description is displayed in the Description column on the Configuration > Enforcement > Profiles page.

Type

Action

This field is populated automatically.

Click Accept, Reject, or Drop to define the action taken on the request.

Device Group

List

Select a device group from the drop-down list. The list displays all configured device groups. All configured device groups are listed in the Device Groups ( Configuration > Network >

Device Groups) page.

After adding one or more device group(s), you can select a group and take one of the following actions: l l

Click Remove to delete the selected Device Group List entry.

Click View Details to see the device group parameters.

l Click Modify to change the parameters of the selected device group.

Add new Device

Group

Click this link to add a new device group, For more information, see

Adding and Modifying

Device Groups on page 386

.

Attributes Tab

Use the Attribute tab to configure the attribute type, name, and value for the enforcement profile. The following figure displays the Generic Application Enforcement - Attributes tab:

Figure 308: Generic Application Enforcement - Attributes Tab

The following table describes the Generic Application Enforcement - Attributes tab parameters:

Table 181: Generic Application Enforcement - Attributes Tab Parameters

Parameter Description

Attribute Name Select an attribute name from the drop-down list. The list has multiple names.

Attribute Value Displays the options for the Attribute Value depend on the selected Attribute Name.

328 | Configuring Enforcement ClearPass Policy Manager 6.5 |  User Guide

Summary Tab

The Summary tab summarizes the parameters configured in the Profile and Attributes tab. The following figure displays the Generic Application Enforcement - Summary tab:

Figure 309: Generic Application Enforcement - Summary Tab

HTTP Based Enforcement

Use this page to configure profile and attribute parameters for the HTTP based enforcement profile.

Profile Tab

The following figure displays the HTTP Based Enforcement - Profile tab:

Figure 310: HTTP Based Enforcement Profile tab

The following table describes the HTTP Based Enforcement - Profile tab parameters:

Table 182: HTTP Based Enforcement Profile tab Parameters

Parameter Description

Template

Name

Select the template from the drop-down list. In this context, select HTTP

Based Enforcement.

Enter the name of the profile. The name is displayed in the Name column on the Configuration > Enforcement > Profiles page.

Description

Type

Enter a description of the profile. The description is displayed in the

Description column on the Configuration > Enforcement > Profiles page.

Specifies the type of authentication. In this context, HTTP. This field is populated automatically.

ClearPass Policy Manager 6.5 | User Guide Configuring Enforcement | 329

Table 182: HTTP Based Enforcement Profile tab Parameters (Continued)

Parameter Description

Action

Device Group

List

Disabled.

Select a Device Group from the drop-down list. The list displays all configured Device Groups. All configured device groups are listed in the

Device Groups page: Configuration > Network > Device Groups. After you add one or more device group(s), you can select a group and take one of the following actions: l l l

Click Remove to delete the selected Device Group List entry.

Click View Details to see the device group parameters.

Click Modify to change the parameters of the selected device group.

Add new Device

Group

To add a new a device group, click the Add new Device Group link and see

Adding and Modifying Device Groups on page 386 .

Attributes Tab

Figure 311: HTTP Based Enforcement Attributes tab

Table 183: HTTP Based Enforcement Attributes tab Parameters

Parameter Description

Attribute Name

Attribute Value

Select Target Server or Action.

The options displayed for the Attribute Value depend on the Attribute Name that was selected.

RADIUS Based Enforcement

Use this page to configure profile and attribute parameters for the RADIUS based enforcement profiles.

Profile Tab

The following figure displays the RADIUS Based Enforcement Profile tab:

Figure 312: RADIUS Based Enforcement - Profile Tab

330 | Configuring Enforcement ClearPass Policy Manager 6.5 |  User Guide

The following table describes the RADIUS Based Enforcement Profile tab parameters:

Table 184: RADIUS Based Enforcement Profile Tab Parameters

Parameter Description

Template Select the template from the drop-down list. In this context, select RADIUS Based Enforcement.

Name

Description

Type

Enter the name of the profile. The name is displayed in the Name column on the Configuration

> Enforcement > Profiles page.

Enter a description of the profile. The Description is displayed in the Description column on the

Configuration > Enforcement > Profiles page.

RADIUS. The field is populated automatically.

Action

Device Group

List

Enabled. Click Accept, Reject or Drop to define the action taken on the request.

Select a Device Group from the drop-down list. The list displays all configured Device Groups.

All configured device groups are listed in the Device GroupsConfiguration > Network >

Device Groups page. After you add one or more device group(s), you can select a group and take one of the following actions: l l l

Click Remove to delete the selected Device Group List entry

Click View Details to see the device group parameters

Click Modify to change the parameters of the selected device group

Add new Device

Group

To add a new a device group, click the Add new Device Group link and see

Modifying Device Groups on page 386

.

Adding and

Attributes Tab

The following figure displays the RADIUS Based Enforcement - Attributes tab:

Figure 313: RADIUS Based Enforcement Attributes Tab

ClearPass Policy Manager 6.5 | User Guide Configuring Enforcement | 331

The following table describes the RADIUS Based Enforcement - Attributes tab parameters:

Table 185: RADIUS Based Enforcement - Attributes Tab Parameters

Parameter Description

Type

Select one of the following attribute types: l Radius:Aruba l l

Radius:IETF

Radius:Cisco l Radius:Microsoft l Radius:Avenda

For more information, see

RADIUS Namespaces on page 622

Name The options displayed for the Name attribute depend on the Type attribute that was selected.

Value The options displayed for the Value attribute depend on the Type and Name attributes that were selected.

RADIUS Change of Authorization (CoA)

Use this page to configure profile and attribute parameters for the RADIUS Change of Authorization (CoA) enforcement profile.

Profile Tab

The following figure displays the Radius Change of Authorization (CoA) - Profile tab:

Figure 314: Radius Change of Authorization (CoA) Profile Tab

332 | Configuring Enforcement ClearPass Policy Manager 6.5 |  User Guide

The following table describes the Radius Change of Authorization (CoA) - Profile tab parameters:

Table 186: Radius Change of Authorization (CoA) Profile Tab Parameters

Parameter Description

Template

Type

Select from: l

Cisco-Disable-Host-Port l l l l l l l l

Cisco - Bounce-Host-Port

Cisco - Reauthenticate-Session

HP - Change-VLAN

HP - Generic-CoA

Aruba - Change-User-Role

IETF - Terminate-Session-IETF

Aruba - Change-VPN-User-Role

IETF- Generic-CoA-IETF

Select one of the following attribute types: l Radius:Aruba l l l

Radius:IETF

Radius:Cisco

Radius:Microsoft l Radius:Avenda

For more information, see

RADIUS Namespaces on page 622

Name The options displayed for the Name Attribute depend on the RADIUS CoA Template selected and the Type Attribute that were selected.

Value

Type

The options displayed for the Value Attribute depend on the RADIUS CoA Template selected and the Type Attribute that were selected.

RADIUS_CoA. The field is populated automatically.

Action

Device Group

List

Disabled.

Select a Device Group from the drop-down list. The list displays all configured Device Groups.

All configured device groups are listed on the Device Groups page: Configuration > Network

> Device Groups. After you add one or more device group(s), you can select a group and take one of the following actions: l l l

Click Remove to delete the selected Device Group List entry.

Click View Details to see the device group parameters.

Click Modify to change the parameters of the selected device group.

Add new Device

Group

To add a new a device group, click the Add new Device Group link and see

Adding and

Modifying Device Groups on page 386

.

ClearPass Policy Manager 6.5 | User Guide Configuring Enforcement | 333

Attributes Tab

The following figure displays the Radius Change of Authorization (CoA) - Attributes tab:

Figure 315: Radius Change of Authorization (CoA) - Attributes Tab

The following table describes the Radius Change of Authorization (CoA) - Attributes tab parameters:

Table 187: Radius Change of Authorization (CoA) Attributes Tab Parameters

Parameter Description

RADIUS CoA

Template

Type

Select from: l Cisco-Disable-Host-Port l l l

Cisco - Bounce-Host-Port

Cisco - Reauthenticate-Session

HP - Change-VLAN l l l l l

HP - Generic-CoA

Aruba - Change-User-Role

IETF - Terminate-Session-IETF

Aruba - Change-VPN-User-Role

IETF- Generic-CoA-IETF

Select one of the following attribute types: l Radius:Aruba l l

Radius:IETF

Radius:Cisco l l

Radius:Microsoft

Radius:Avenda

For more information, see

RADIUS Namespaces on page 622

Name

Value

The options displayed for the Name Attribute depend on the Template and Type Attribute that were selected.

The options displayed for the Value Attribute depend on the Template, Type Attribute and

Name Attribute that were selected.

Session Notification Enforcement

Use this page to configure profile and attribute parameters for Session Notification Enforcement profile.

Notification of a change in IP address can now be sent to any external context server (such as a firewall) by configuring that server as a generic HTTP server and adding the appropriate generic HTTP context server actions. The content of the payload to be posted by Policy Manager to the external server is based on the REST

API defined by the external server for communication.

The Session Notification Enforcement page contains the following tabs: l l

Profile Tab on page 335

Attributes Tab on page 335

334 | Configuring Enforcement ClearPass Policy Manager 6.5 |  User Guide

l

Summary Tab on page 336

Profile Tab

The following figure displays the Session Notification Enforcement - Profile tab:

Figure 316: Session Notification Enforcement - Profile Tab

The following table describes the Session Notification Enforcement - Profile tab parameters:

Table 188: Session Notification Enforcement Profile Tab Parameters

Parameter Description

Template Select Session Notification Enforcement.

Name

Description

Enter the name of the profile. The name is displayed in the Name column on the Configuration

> Enforcement > Profiles page.

Enter a description of the profile. The Description is displayed in the Description column on the

Configuration > Enforcement > Profiles page.

Post_Authentication. The field is populated automatically.

Type

Action

Device Group

List

Disabled.

Select a device group from the drop-down list. The list displays all configured device groups. All configured device groups are listed in the Device Groups Configuration > Network > Device

Groups page.

Add new Device

Group

To add a new a device group, click the Add new Device Group link and see

Adding and

Modifying Device Groups on page 386

.

Attributes Tab

The following figure displays the Session Notification Enforcement - Attributes tab:

Figure 317: Session Notification Enforcement - Attributes Tab

ClearPass Policy Manager 6.5 | User Guide Configuring Enforcement | 335

The following table describes the Session Notification Enforcement - Attributes tab:

Table 189: Session Notification Enforcement - Attributes Tab

Parameter Description

Type

Select from: l Session-Check l

Session-Notify

Palo Alto integration is extended to Guest MAC Caching use cases. Configure the following:

Session-Check::Username = %{Endpoint:Username}

NOTE: Post Auth sends the Guest username instead of the MAC Address in the user id updates.

For Session-Notify Type attribute, the Name can be Server Type, Server IP, Login Action, or

Logout Action. The values for Server Type can be Generic HTTP, Palo Alto Networks Panorama, or Palo Alto Networks Firewall. Selecting Server IP for Name provides a choice of ipaddress/hostnames for corresponding type of server as Value. Once the server IP is selected,

Login Action and Logout Action can be selected (the list of actions defined for the selected server will be shown as available choices for value).

This enforcement type should be used both for Palo Alto Devices and any Generic HTTP servers. Pre-6.5 configurations containing Session Restrictions Enforcement profile for Palo

Alto devices (with attribute Session-Check::IP-Address-Change-Notify) will be migrated to this new enforcement profile during an upgrade (any profiles defined with more than one Palo Alto device or combined with any other Session Restrictions attributes will not be migrated and need to re-configured).

Name The options displayed for the Name attribute depend on the Type attribute that was selected.

Value The options displayed for the Value attribute depend on the Type attribute and Name attribute that were selected.

Summary Tab

This tab summarizes the parameters configured in the Summary tab. The following figure displays the

Session Notification Enforcement - Summary tab:

Figure 318: Session Notification Enforcement - Summary Tab

Session Restrictions Enforcement

Use this page to configure profile and attribute parameters for Session Restrictions enforcement profile.

336 | Configuring Enforcement ClearPass Policy Manager 6.5 |  User Guide

Profile Tab

The following figure displays the Session Restrictions Enforcement - Profile tab:

Figure 319: Session Restrictions Enforcement Profile Tab

The following table describes the Session Restrictions Enforcement - Profile tab parameters:

Table 190: Session Restrictions Enforcement Profile Tab Parameters

Parameter Description

Template Select the template from the drop-down list. In this context, select Session Restrictions enforcement.

Name

Description

Type

Enter the name of the profile. The name is displayed in the Name column on the Configuration

> Enforcement > Profiles page.

Enter a description of the profile. The Description is displayed in the Description column on the

Configuration > Enforcement > Profiles page.

Post_Authentication. The field is populated automatically.

Action

Device Group

List

Disabled.

Select a Device Group from the drop-down list. The list displays all configured Device Groups.

All configured device groups are listed in the Device Groups ( Configuration > Network >

Device Groups) page. After you add one or more device group(s), you can select a group and take one of the following actions: l l l

Click Remove to delete the selected Device Group List entry.

Click View Details to see the device group parameters.

Click Modify to change the parameters of the selected device group.

Add new Device

Group

To add a new a device group, click the Add new Device Group link and see

Modifying Device Groups on page 386

.

Adding and

Attributes Tab

The following figure displays the Session Restrictions Enforcement - Attributes tab:

Figure 320: Session Restrictions Enforcement Attributes Tab

ClearPass Policy Manager 6.5 | User Guide Configuring Enforcement | 337

The following table describes the Session Restrictions Enforcement - Attributes parameters:

Table 191: Session Restrictions Enforcement Attributes Tab

Parameter Description

Type

Select from: l Bandwidth-Check l l

Expire-Check

Post-Auth-Check l Session-Check

Name The options displayed for the Name attribute depend on the Type attribute that was selected.

Value The options displayed for the Value attribute depend on the Type and Name attributes that were selected.

SNMP Based Enforcement

Use this page to configure profile and attribute parameters for the SNMP based enforcement profile.

Profile Tab

The following figure displays the SNMP Based Enforcement - Profile tab:

Figure 321: SNMP Based Enforcement - Profile Tab

The following table describes the SNMP Based Enforcement - Profile parameters:

Table 192: SNMP Based Enforcement - Profile Tab Parameters

Parameter Description

Template Select the template from the drop-down list. In this context, select SNMP Based Enforcement.

Name

Description

Type

Enter the name of the profile. The name is displayed in the Name column on the Configuration

> Enforcement > Profiles page.

Enter a description of the profile. The Description is displayed in the Description column on the

Configuration > Enforcement > Profiles page.

SNMP. The field is populated automatically.

338 | Configuring Enforcement ClearPass Policy Manager 6.5 |  User Guide

Table 192: SNMP Based Enforcement - Profile Tab Parameters (Continued)

Parameter Description

Action

Device Group

List

Disabled.

Select a Device Group from the drop-down list. The list displays all configured Device Groups.

All configured device groups are listed in the Device Groups page: Configuration > Network

> Device Groups. After you add one or more device group(s), you can select a group and take one of the following actions: l

Click Remove to delete the selected Device Group List entry.

l l

Click View Details to see the device group parameters.

Click Modify to change the parameters of the selected device group.

Add new Device

Group

To add a new a device group, click the Add new Device Group link and see

Adding and

Modifying Device Groups on page 386

.

Attributes tab

The following figure displays the SNMP Based Enforcement - Attributes tab:

Figure 322: SNMP Based Enforcement - Attributes Tab

The following table describes the SNMP Based Enforcement - Attributes tab parameters:

Table 193: SNMP Based Enforcement Attributes Tab Parameters

Parameter Description

Attribute Name

Select from: l

VLAN ID l l

Session Timeout (in seconds)

Reset Connection (after the settings are applied)

Attribute Value The options displayed for the Attribute value is depend on the Attribute name that was selected.

TACACS+ Based Enforcement

Use this page to configure profile, service, and attribute parameters for the TACACS+ based enforcement profile.

ClearPass Policy Manager 6.5 | User Guide Configuring Enforcement | 339

Profile Tab

The following figure displays the TACACS+ Based Enforcement - Profile tab:

Figure 323: TACACS+ Based Enforcement Profile Tab

The following table describes the TACACS+ Based Enforcement Profile - Profile tab parameters:

Table 194: TACACS+ Based Enforcement Profile Tab Parameters

Parameter Description

Template Select the template from the drop-down list. In this context, select TACACS+ Based

Enforcement.

Name

Description

Type

Action

Enter the name of the profile. The name is displayed in the Name column on the Configuration

> Enforcement > Profiles page.

Enter a description of the profile. The Description is displayed in the Description column on the

Configuration > Enforcement > Profiles page.

TACACS. The field is populated automatically.

Disabled.

Device Group

List

Select a Device Group from the drop-down list. The list displays all configured Device Groups.

All configured device groups are listed in the Device Groups ( Configuration > Network >

Device Groups) page. After you add one or more device group(s), you can select a group and take one of the following actions: l l l

Click Remove to delete the selected Device Group List entry.

Click View Details to see the device group parameters.

Click Modify to change the parameters of the selected device group.

Add new Device

Group

To add a new a device group, click the Add new Device Group link and see

Adding and

Modifying Device Groups on page 386

.

340 | Configuring Enforcement ClearPass Policy Manager 6.5 |  User Guide

Services Tab

The following figure displays the TACACS+ Based Enforcement - Services tab:

Figure 324: TACACS+ Based Enforcement Services Tab

The following table describes the TACACS+ Based Enforcement Profile - Service tab parameters:

Table 195: TACACS+ Based Enforcement Services Tab Parameters

Parameter Description

Privilege Level Select a level between 0 and 15.

Selected

Services

Export All

Custom

Services

Type

Name

Value

Select a service from the list and add it to the Selected Services: field. Click Remove to remove a service from the field.

Click this link to download the TACACS+ Services dictionary is downloaded to the local computer.

To add new TACACS+ services / attributes, upload the modified dictionary xml click Update

TACACS+ Services Dictionary.

Select a service attribute parameter from the list.

The options displayed for the Name attribute depend on the Type attribute that was selected.

The options displayed for the Value attribute depend on the Type and Name attributes that were selected.

VLAN Enforcement

Use this page to configure profile and attribute parameters for the VLAN enforcement profile.

Profile Tab

The following figure displays the VLAN Enforcement - Profile tab:

Figure 325: VLAN Enforcement - Profile Tab

ClearPass Policy Manager 6.5 | User Guide Configuring Enforcement | 341

The following table describes the VLAN Enforcement - Profile tab parameters:

Table 196: VLAN Enforcement - Profile Tab Parameters

Parameter Description

Template Select the template from the drop-down list. In this context, select VLAN Enforcement.

Name

Description

Type

Action

Enter the name of the profile. The name is displayed in the Name column on the Configuration

> Enforcement > Profiles page.

Enter a description of the profile. The Description is displayed in the Description column on the

Configuration > Enforcement > Profiles page.

RADIUS. The field is populated automatically.

Enabled. Click Accept, Reject, or Drop to define the action taken on the request.

Device Group

List

Select a Device Group from the drop-down list. The list displays all configured Device Groups.

All configured device groups are listed in the Device Groups page: Configuration > Network

> Device Groups. After you add one or more device group(s), you can select a group and take one of the following actions: l l l

Click Remove to delete the selected Device Group List entry.

Click View Details to see the device group parameters.

Click Modify to change the parameters of the selected device group.

Add new Device

Group

To add a new a device group, click the Add new Device Group link and see

Adding and

Modifying Device Groups on page 386

.

Attributes Tab

The following figure displays the VLAN Enforcement - Attributes tab:

Figure 326: VLAN Enforcement Attributes Tab

342 | Configuring Enforcement ClearPass Policy Manager 6.5 |  User Guide

The following table describes the RADIUS Based Enforcement - Attributes tab parameters:

Table 197: VLAN Enforcement Attributes Tab Parameters

Parameter Description

Type

Select one of the following attribute types: l Radius:Aruba l l

Radius:IETF

Radius:Cisco l Radius:Microsoft l Radius:Avenda

For more information, see

RADIUS Namespaces on page 622

Name The options displayed for the Name attribute depend on the Type attribute that was selected.

Value The options displayed for the Value attribute depend on the Type and Name attributes that were selected.

ClearPass Policy Manager 6.5 | User Guide Configuring Enforcement | 343

344 | Configuring Enforcement ClearPass Policy Manager 6.5 |  User Guide

Chapter 8

Configuring Policy Simulation

This chapter describes the following types of simulations: l l l l l l l l

Active Directory Authentication Simulation

Application Authentication Simulation

Audit Simulation

Chained Simulation

Enforcement Policy Simulation

RADIUS Authentication Simulation

Role Mapping Simulation

Service Categorization Simulation

After creating the policies, use the Policy Simulation utility in the Configuration > Policy Simulation page to evaluate those policies before deployment.

The Policy Simulation utility applies a set of request parameters as input against a given policy component and displays the outcome.

The following figure displays the Policy Simulation page:

Figure 327: Policy Simulation page

The following table describes the Policy Simulation page parameters:

Table 198: Policy Simulation Configuration Parameters

Parameter Description

Name

Type

Description

Displays the name of the name of the policy simulation.

Displays the type of the policy simulation.

Displays additional information about the policy simulation.

Active Directory Authentication Simulation

This section provides the following information: l l

Adding an Active Directory Simulation

Viewing the Simulation Results

This simulation tests authentication against an Active Directory domain or trusted domain to verify that the

ClearPass Policy Manager domain membership is valid.

ClearPass Policy Manager 6.5 | User Guide Configuring Policy Simulation | 345

The Attributes tab is not available for this simulation type.

Adding an Active Directory Simulation

To add the RADIUS authentication server for the authentication test:

1. Navigate to the Configuration > Policy Simulation > Add page.

The Add Policy Simulation dialog appears.

2. Enter the Name of the simulation.

3. From the Type drop-down list, select Active Directory Authentication.

The following figure displays the Active Directory Authentication Simulation dialog.

Figure 328: Active Directory Authentication - Simulation Tab

The following table describes the Active Directory Authentication - Simulation tab parameters:

Table 199: Active Directory Authentication Simulation Tab Parameters

Parameter Description

Active Directory Domain

Username

Password

Select the domain(s) to which the node is joined.

Enter the username to login to the domain.

Enter the password to login to the domain.

Viewing the Simulation Results

The Results tab for the Active Directory Authentication simulation displays a summary of the

Authentication test and provides a status message.

The following figure displays the Active Directory Authentication - Results tab:

Figure 329: Active Directory Authentication Results Tab

346 | Configuring Policy Simulation ClearPass Policy Manager 6.5 |  User Guide

Table 200: Active Directory Authentication Results Tab Parameters

Parameter Description

Summary

Status

Displays the results of the Active Directory Authentication simulation.

Displays the status message.

Application Authentication Simulation

This simulation tests authentication requests generated from ClearPass Guest. The following figure displays the Application Authentication policy simulation settings available on the Configuration > Policy

Simulation > Add page:

Simulation Tab

Figure 330: Application Authentication - Simulation Tab

Table 201: Application Authentication Simulation Tab Parameters

Parameter Description

CPPM IP Address/FQDN

Username

Password

Enter the IP Address or FQDN of the domain(s) to which the node is joined.

Enter the username.

Enter the password.

Attributes Tab

Enter the attributes of the policy component to be tested. The following figure displays the Application

Authentication - Attributes tab:

Figure 331: Application Authentication - Attributes Tab

ClearPass Policy Manager 6.5 | User Guide Configuring Policy Simulation | 347

Table 202: Application Authentication - Attributes Tab Parameters

Attribute Parameter

Type Select Application or select Application:ClearPass. See

Application Namespace on page 614

Name

Value

The options displayed for the Name Attribute depend on the Type Attribute that was selected.

The options displayed for the Value Attribute depend on the Type Attribute and Name

Attribute that were selected.

Results tab

The Results tab of the Application Authentication simulation displays the outcome of the Authentication

Result and the Application Authentication Output Attributes. The following figure displays the

Application Authentication Results tab:

Figure 332: Application Authentication Results Tab

Table 203: Application Authentication Results Tab Parameters

Parameter Description

Summary

Application Authentication

Output Attributes

Displays the results of the Active Directory Authentication simulation.

Displays the output attributes, such as Super Administrator.

Audit Simulation

This simulation allows you to specify an audit against a Nessus Server or Nmap Server with its IP address.

The Attributes tab is not available for this simulation type.

Audit simulations can take more than 30 minutes. An AuditinProgress status message is displayed until the audit is completed.

348 | Configuring Policy Simulation ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Audit Simulation tab:

Figure 333: Audit Simulation - Simulation Tab

The following table describes the Audit Simulation - Simulation tab parameters:

Table 204: Audit Simulation Tab Parameters

Parameter Description

Audit Server Select [Nessus Server] or [Nmap Audit].

Audit Host IP Address Enter the host IP address of the audit host.

Results Tab

The following figure displays the Audit Simulation - Results tab:

Figure 334: Audit Simulation Results Tab

The following table describes the Audit Simulation - Results tab parameters:

Table 205: Audit Results Tab Parameters

Parameter Description

Summary Displays information about the Audit Status, Temporary Status, and Audit Timeout.

Audit Output Attributes Displays the Audit-Status such as AUDIT_INPROGRESS.

ClearPass Policy Manager 6.5 | User Guide Configuring Policy Simulation | 349

Chained Simulation

Given the service name, authentication source, user name, and an optional date and time, the chained simulation combines the results of role mapping, posture validation and enforcement policy simulations and displays the corresponding results.

Simulation Tab

The following figure displays the Chained Simulation Simulation tab:

Figure 335: Chained Simulation Tab

The following table describes the Chained Simulation - Results tab parameters:

Table 206: Chained Simulation Tab Parameters

Parameters Description

Service Select from: l l l l l l

[Policy Manager Admin Network Login Service]

[AirGroup Authorization Service]

[Aruba Device Access Service]

[Guest Operator Logins]

Guest Access

Guest Access With MAC Caching

Authentication

Source

Default Value = [Local User Repository] if you select:  l [Policy Manager Admin Network Login Service] l [Aruba Device Access Service]

Default Value = [Guest Device Repository] if you select: l [AirGroup Authorization Service] l l

Guest Access

Guest Access With MAC Caching

Values = [Guest Device Repository] or [Local User Repository] if you select [Guest Operator

Logins]

Username

Test Date and

Time

Enter the username.

Click the calendar icon to select a start date and time for simulation test. For more information, see

Date Namespaces on page 620

Attributes Tab

Enter the attributes of the policy component to be tested.

350 | Configuring Policy Simulation ClearPass Policy Manager 6.5 |  User Guide

Figure 336: Chained Simulation Attributes Tab

The following table describes the Chained Simulation Attributes - Results tab parameters:

Table 207: Chained Simulation Attributes tab Parameters

Attribute

Type

Host

Parameter

Select the type of attributes from the drop-down list.

See

Host Namespaces on page 621

Authentication See

Authentication Namespaces on page 615

Connection See

Connection Namespaces on page 619

Application

Certificate l l l l l l l l l l l

Radius:IETF

Radius:Cisco

Radius:Microsoft

Radius:Avenda

Radius:Aruba

Trend:AV

Cisco: HIPS

Cisco:HOST

Cisco:PA

NAI:AV

Symantec:AV

See

Application Namespace on page 614

See

Certificate Namespaces on page 618

See

RADIUS Namespaces on page 622

Name

Value

The options displayed for the Name attribute depend on the Type attribute that was selected.

The options displayed for the Value attribute depend on the Type and

Name attributes that were selected.

ClearPass Policy Manager 6.5 | User Guide Configuring Policy Simulation | 351

Results Tab

The following figure displays the Chained Simulation - Results tab:

Figure 337: Chained Simulation Results Tab

Table 208: Chained Simulation Results Tab Parameters

Parameter Description

Summary

Provides the following information about the chained simulation: l Status l l l

Roles

System Posture Status

Enforcement Profiles

Enforcement Policy Simulation

Given the service name (and the associated enforcement policy), a role or a set of roles, the system posture status, and an optional date and time, the enforcement policy simulation evaluates the rules in the enforcement policy and displays the resulting enforcement profiles and their contents.

Authentication Source and User Name inputs are used to derive dynamic values in the enforcement profile that are retrieved from the authorization source. These inputs are optional.

Dynamic roles are attributes that are enabled as a role retrieved from the authorization source. For an example of enabling attributes as a role, see

Generic LDAP and Active Directory on page 162

.

352 | Configuring Policy Simulation ClearPass Policy Manager 6.5 |  User Guide

Simulation Tab

The following figure displays the Enforcement Policy Simulation tab:

Figure 338: Enforcement Policy Simulation Tab

The following table describes the Enforcement Policy Simulation tab parameters:

Table 209: Enforcement Policy Simulation tab Parameters

Parameter Description

Service Select from: l [Policy Manager Admin Network Login Service] l l

[AirGroup Authorization Service]

[Aruba Device Access Service] l l l

[Guest Operator Logins]

Guest Access

Guest Access With MAC Caching

Enforcement Policy

Authentication Source l l l l l l

Autofilled with [Admin Network Login Policy] if you select [Policy Manager Admin

Network Login Service]

Autofilled with [AirGroup Enforcement Policy] if you select [AirGroup

Authorization Service]

Autofilled with [Aruba Device Access Policy] if you select [Aruba Device Access

Service]

Autofilled with [Guest Operator Logins] if you select [Guest Operator Logins] service

Autofilled with Copy_of_Guest Access Policy if you select Guest Access service

Autofilled with Guest Access With MAC Caching Policy if you select Guest Access

With MAC Caching

Value = [Local User Repository] if you select: l

[Policy Manager Admin Network Login Service] l

[Aruba Device Access Service]

Value = [Guest Device Repository] if you select: l [AirGroup Authorization Service] l l

Guest Access

Guest Access With MAC Caching

ClearPass Policy Manager 6.5 | User Guide Configuring Policy Simulation | 353

Table 209: Enforcement Policy Simulation tab Parameters (Continued)

Parameter Description

Values = [Local User Repository] or [Guest Device Repository] if you select Guest

Operator Logins

Username

Roles

Dynamic Roles

System Posture Status

Test Date and Time

Enter username.

Select from: l [Machine Authenticated] l l

[User Authenticated]

[Guest] l l l

[TACACS Read-only Admin]

[TACACS API Admin]

[TACACS Help Desk] l l l l l l l l

[TACACS Receptionist]

[TACACS Network Admin]

[TACACS Super Admin]

[Contractor]

[Other]

[Employee]

[MAC Caching

[Onboard Android] l l l l l l l l l

[Onboard Windows]

[Onboard Mac OS X]

Onboard iOS]

[Aruba TACACS root Admin]

[Aruba TACACS read-only Admin]

[Device Registration]

[BYOD Operator]

[AirGroup V1]

[AirGroup v2]

Add Role: Enter the name of a dynamic role in the Add Role field and click the Add Role button to populate the Dynamic Roles list.

Remove role: Highlight a dynamic role and click Remove Role button.

Select from: l

HEALTHY (0) l

CHECKUP (10) l l l l

TRANSITION (15)

QUARANTINE (20)

INFECTED (30)

UNKNOWN (100)

See

Posture Namespaces on page 622

Click calendar icon to select start date and time for simulation test. See

Namespaces on page 620

Date

354 | Configuring Policy Simulation ClearPass Policy Manager 6.5 |  User Guide

Attributes tab

Enter the attributes of the policy component to be tested. The following figure displays the Enforcement

Policy - Attributes tab:

Figure 339: Enforcement Policy Attributes Tab

Table 210: Enforcement Policy Attributes tab Parameters

Attribute Description

Type:

Host

Select the type of attributes from the drop-down list.

See

Host Namespaces on page 621

Authentication

Connection

Application l l l l l

Radius:IETF

Radius:Cisco

Radius:Microsoft

Radius:Avenda

Radius:Aruba

See

Authentication Namespaces on page 615

See

Connection Namespaces on page 619

See

Application Namespace on page 614

See

RADIUS Namespaces on page 622

Name

Value

The options displayed for the Name attribute depend on the Type attribute that was selected.

The options displayed for the Value attribute depend on the Type and Name attributes that were selected.

Results Tab

The following figure displays the Enforcement Policy - Results tab:

Figure 340: Policy Simulation Results Tab

ClearPass Policy Manager 6.5 | User Guide Configuring Policy Simulation | 355

Table 211: Enforcement Policy Results Tab Parameters

Parameter Description

Deny Access

Displays the output of the Deny Access test.

Enforcement Profile Displays the name of the Enforcement Profile.

RADIUS Authentication Simulation

This section provides the following information: l l l

Adding a RADIUS Authentication Simulation

Setting the Attributes to Be Tested

Viewing the Simulation Results

Dictionaries in the RADIUS namespace come prepackaged with the ClearPass Policy Manager. The administration interface does provide a way to add dictionaries into the system (see

RADIUS Dictionary on page 549

for more information).

The RADIUS namespace uses the notation RADIUS:Vendor, where Vendor is the name of the company that has defined attributes in the dictionary. The same vendor can have multiple dictionaries, in which case the "Vendor" portion includes a suffix or some other unique string by the name of the device to differentiate the dictionaries.

Adding a RADIUS Authentication Simulation

To add the RADIUS authentication server for the authentication test:

1. Navigate to the Configuration > Policy Simulation > Add page.

The Add Policy Simulation dialog appears.

2. Enter the Name of the simulation.

3. From the Type drop-down list, select RADIUS Authentication.

The following figure displays the RADIUS Authentication Simulation dialog, with the Server parameter set to Remote.

356 | Configuring Policy Simulation ClearPass Policy Manager 6.5 |  User Guide

Figure 341: RADIUS Authentication Simulation Dialog (Remote Server Selected)

4. Enter the values for each of the RADIUS Simulation parameters as described in

Table 212

.

Table 212: RADIUS Simulation Tab Parameters

Parameter Description

Server Select Local or Remote.

ClearPass IP Address or

FQDN

Port

This field is displayed only if Remote Server is selected.

Enter the IP address or the fully qualified domain name (FQDN) of the remote

ClearPass Policy Manager server.

This field is displayed only if Remote Server is selected.

Enter the port number of the remote ClearPass Policy Manager server. The default port number is 1812.

Shared Secret

NAS IP Address (optional)

NAS Type

Displayed only if Remote Server is selected.

Enter the shared secret between the target ClearPass server and this node. You must add the node as a Network Device on the target ClearPass server.

To populate the NAS-IP-Address attribute in a RADIUS request, enter the IP address of the network device.

Select the type of network device to simulate in terms of RADIUS attributes in the request. The NAS types are: l l l l

Aruba Wireless Controller

Aruba Wired Switch

Cisco Wireless Controller

Generic

ClearPass Policy Manager 6.5 | User Guide Configuring Policy Simulation | 357

Table 212: RADIUS Simulation Tab Parameters (Continued)

Parameter Description

Authentication outer method

Client MAC Address

(optional) l l l l l l

PAP: Authentication inner method: disabled.

CHAP: Authentication inner method: disabled.

MSCHAPv2: Authentication inner method: disabled.

PEAP: Authentication inner method: enabled. The selections are as follows: n n n

EAP-MSCHAPv2

EAP-GTC

EAP-TLS

TTLS: Authentication inner method field: enabled. The selections are: n PAP n n

CHAP

MSCHAPv2 n n

EAP-MSCHAPv2

EAP-GTC n

EAP-TLS

TLS: Authentication inner method: disabled.

For more information, see

Authentication Namespaces on page 615

.

Enter the client MAC address to be populated in the request.

Username

Password

CA Certificate (optional)

Client Certificate PKCS12

(PFX)*

Enter the user name.

Enter the password.

1. Click Choose File.

2. Navigate to the optional Root CA certificate that is required to verify the RADIUS server's certificate.

3. Click Open.

4. Click Upload.

1. Click Choose File.

2. Navigate to the client certificate that is used for TLS in PKCS12 - .pfx format, .pfx, or .p12 format.

3. Click Open.

4. Click Upload.

Passphrase for PFX file* Enter the pass phrase for the selected PFX file.

* These fields are displayed only if you select TTLS or PEAP as the authentication outer method and you select

EAP-TLS as the authentication inner method.

Setting the Attributes to Be Tested

Enter the attributes of the policy component to be tested.

The attributes that you set depend on the NAS Type selected on the Simulation page.

358 | Configuring Policy Simulation ClearPass Policy Manager 6.5 |  User Guide

NAS Type: Aruba Wireless Controller

Figure 342: Aruba Wireless Controller Type - Attributes Tab

Table 213: Aruba Wireless Controller Required - Attribute Settings

Attribute Parameter

Line 1: l Type = Radius:IETF l l

Name = NAS-Port-Type

Value = Wireless-802.11 (19)

Line 2: l Type = Radius:IETF l l

Name = Service-Type

Value = Login-User (1)

Line 3: l Type = Radius:Aruba l l

Name = Aruba-Essid-Name

Value = SSID

NAS Type: Aruba Wired Switch Controller

Figure 343: NAS Type: Aruba Wired Switch Controller Attributes Tab

Table 214: NAS Type: Aruba Wired Switch Controller Required Attribute Settings

Attribute

Line 1: l Type = Radius:IETF l l

Name = NAS-Port-Type

Value = Ethernet (15)

Line 2: l

Type = Radius:IETF l

Name = Service-Type l Value = Login-User (1)

ClearPass Policy Manager 6.5 | User Guide Configuring Policy Simulation | 359

NAS Type: Cisco Wireless Switch

Figure 344: NAS Type: Cisco Wireless Switch Attributes Tab

Table 215: [NAS Type: Cisco Wireless Switch Required Attribute Settings

Attribute

Line 1: l Type = Radius:IETF l l

Name = NAS-Port-Type

Value = 802.11(19)

Line 2: l Type = Radius:IETF l l

Name = Service-Type

Value = Framed-User(2)

Viewing the Simulation Results

The following figure displays the Policy Simulation RADIUS - Results dialog:

Figure 345: Results Tab

360 | Configuring Policy Simulation ClearPass Policy Manager 6.5 |  User Guide

Table 216: RADIUS Authentication Results Tab Parameters

Parameter Description

Summary

Displays a summary of the simulation.

Authentication Result

Details

Displays the outcome of the Authentication test.

Click this link to open a popup that provides details about the

Authentication test. You can take the following actions: l

Click the Summary, Input, and Output tabs l

Click the Change Status, Show Logs, Export, or Close buttons.

Status Message(s) Displays the status messages resulting from the test.

Role Mapping Simulation

The role mapping simulation tests Role-Mapping policy rules to determine which roles will be output, given the service name (and associated role mapping policy), the authentication source and the user name.

You can also use role mapping simulation to test whether the specified authentication source is reachable.

Simulation Tab

The following figure displays the Role Mapping Simulation tab:

Figure 346: Role Mapping Simulation Tab

ClearPass Policy Manager 6.5 | User Guide Configuring Policy Simulation | 361

Table 217: Role Mapping Simulation Tab Parameters

Parameter Description

Service

Role Mapping Policy

Authentication Source

Select from: l [Policy Manager Admin Network Login Service] l l

[AirGroup Authorization Service]

[Aruba Device Access Service] l l l

[Guest Operator Logins]

Guest Access

Guest Access With MAC Caching

Field is disabled if you select: l [Policy Manager Admin Network Login Service] l l l

[Aruba Device Access Service]

[Guest Operator Logins]

Field is auto-filled with [AirGroup Version Match] if you select [AirGroup

Authorization Service] l l

Field is autofilled with [Guest Roles] if you select Guest Access

Field is autofilled with Guest MAC Authentication Role Mapping if you select

Guest Access With MAC Caching

Value = [Local User Repository] if you select:  l

[Policy Manager Admin Network Login Service] l

[Aruba Device Access Service]

Value = [Guest Device Repository] if you select: l [AirGroup Authorization Service] l l

Guest Access

Guest Access With MAC Caching

Values = [Guest Device Repository] or [Local User Repository] if you select [Guest

Operator Logins]

Username

Test Date and Time

Enter the user name.

Click calendar icon to select start date and time for simulation test. For more information, see

Date Namespaces on page 620

Attributes Tab

Enter the attributes of the policy component to be tested. The following figure displays the Role Mapping

Simulation Attributes tab:

Figure 347: Role Mapping Simulation Attributes Tab

The following table describes the Role Mapping Simulation Attributes tab parameters:

362 | Configuring Policy Simulation ClearPass Policy Manager 6.5 |  User Guide

Table 218: Role Mapping Simulation Attributes Tab Parameters

Attribute Parameter

Type

Host

Select the type of attributes from the drop-down list.

See

Host Namespaces on page 621

Authentication See

Authentication Namespaces on page 615

Connection See

Connection Namespaces on page 619

Application

Certificate l l l l l

Radius:IETF

Radius:Cisco

Radius:Microsoft

Radius:Avenda

Radius:Aruba

See

Application Namespace on page 614

See

Certificate Namespaces on page 618

See

RADIUS Namespaces on page 622

Name

Value

The options displayed for the Name attribute depend on the Type attribute that was selected.

The options displayed for the Value attribute depend on the Type and

Name attributes that were selected.

Results Tab

The following figure displays the Role Mapping Simulation - Results tab:

Figure 348: Results Tab

The following table describes the Role Mapping Simulation - Results tab parameters:

Table 219: Role Mapping Results Tab Parameters

Parameter Description

Summary Displays the results of the simulation.

Service Categorization Simulation

A service categorization simulation allows you to specify a set of attributes in the RADIUS or Connection namespace and test which configured service the request will be categorized into. The request attributes that you specify represent the attributes sent in the simulated request.

ClearPass Policy Manager 6.5 | User Guide Configuring Policy Simulation | 363

Simulation Tab

The following figure displays the Service Categorization Simulation - Simulation tab:

Figure 349: Service Categorization Simulation Tab

Table 220: Service Categorization Simulation Tab Parameter s

Parameter Type Namespace Details

Test Date and Time Click calendar widget and select: l Test start date l Test start time

Attributes Tab

Enter the attributes of the policy component to be tested. The following figure displays the Service

Categorization Simulation - Attributes tab:

Figure 350: Service Categorization Attributes Tab

Table 221: Service Categorization Simulation Attributes Tab Parameters

Attribute Parameter

Type

Host

Select the type of attributes from the drop-down list.

See

Host Namespaces on page 621

Authentication See

Authentication Namespaces on page 615

Connection See

Connection Namespaces on page 619

Application See

Application Namespace on page 614

364 | Configuring Policy Simulation ClearPass Policy Manager 6.5 |  User Guide

Table 221: Service Categorization Simulation Attributes Tab Parameters (Continued)

Attribute Parameter

See

RADIUS Namespaces on page 622

l l l l

Radius:IETF

Radius:Cisco

Radius:Microsoft

Radius:Aruba

Name

Value

The options displayed for the Name attribute depend on the Type attribute that was selected.

The options displayed for the Value attribute depend on the Type and Name attributes that were selected.

Results Tab

The following figure displays the Service Categorization - Results tab:

Figure 351: Results Tab

The following table describes the Service Categorization Simulation Results tab parameters:

Table 222: Service Configuration Results Tab Parameters

Parameter Description

Summary

Gives the name of the service.

Import and Export Simulations

Navigate to Configuration > Policy Simulation and select the Import link. The following figure shows an example of the Import from file page.

Figure 352: Import Simulations

ClearPass Policy Manager 6.5 | User Guide Configuring Policy Simulation | 365

Table 223: Import from file page Parameters

Parameter Description

Select file Browse to select name of simulations to import.

Enter secret for the file (if any) If the file was exported with a secret key for encryption, enter the same key here.

Export Simulations

Click the Export All link to export all simulations. The browser displays the Save As dialog box in which you can enter the name of the XML file to export all simulations. The following image shows an example of the

Export page to file page.

Figure 353: Export Simulations

To export a specific simulation, click Export. In the Save As dialog box, enter the name of the XML file to contain the export data.

Table 224: Export Simulations

Parameter Description

Export file with password protection Select Yes to export the file with password protection.

Secret Key Enter the secret key in this field.

Verify Secret Enter the same secret key to confirm and complete export.

366 | Configuring Policy Simulation ClearPass Policy Manager 6.5 |  User Guide

Chapter 9

ClearPass Policy Manager Profile

This chapter contains the following information: l l l

ClearPass Profile Overview

About the Device Profile

Endpoint Information Collectors

l l l l l l

ClearPass Profile Overview

This section contains the following information:

Introduction

Enabling Endpoint Classification

Configuring CoA for an Endpoint-Connected Device

How Profile Classifies Endpoints

Fingerprint Dictionaries

Viewing Live Endpoint Information for a Specific Device

Introduction

ClearPass Profile is a ClearPass Policy Manager module that automatically classifies endpoints using attributes obtained from software components called Collectors.

ClearPass Profile associates an endpoint with a specific user or location and offers an efficient and accurate way to differentiate access by endpoint type (for example, laptop or tablet).

Profiling allows you to gather device type and operating system information by inspecting packets that are sent by these devices in the network. For example, you can identify that a device is a smart device, a laptop, or a printer or IP phone.

You can use this information to implement Bring Your Own Device (BYOD) flows during enforcement, assigning the appropriate privileges and access to users based on their device type and the identity of the user.

Enabling Endpoint Classification

When you enable ClearPass Profile on a ClearPass server, you enable the server for endpoint classification. This associates each endpoint with a specific user or location and secures access for devices.

To enable ClearPass Profile:

1. Navigate to Administration > Server Manager > Server Configuration.

2. Select the CPPM node in the zone that you want to designate as a Profiler.

The System tab for the Server Configuration page appears.

ClearPass Policy Manager 6.5 | User Guide ClearPass Policy Manager Profile | 367

Figure 354: Enable Profile Option

3. If it is not already enabled, select the Enable this server for endpoint classification check box, then click Save.

Configuring CoA for an Endpoint-Connected Device

After profiling an endpoint, use the Profiler page to configure CoA on the network device to which an endpoint is connected.

The Profiler tab is not displayed by default. To access the Profiler tab:

1. Navigate to Configuration > Services, then click Add.

2. Enter the name of the service.

3. From the More Options field on the Service tab, enable the Profile Endpoints check box .

The Profiler tab is added to the Services tabs:

Figure 355: Adding the Profiler Page

4. Select the Profiler tab.

The Profiler page appears.

368 | ClearPass Policy Manager Profile ClearPass Policy Manager 6.5 |  User Guide

Figure 356: Profiler Page

5. You can select a set of categories and a CoA profile to be applied when the profile matches one of the selected categories.

CoA is triggered using the selected CoA profile. You can use any option from Endpoint Classification to invoke CoA on a change of any one of the fields (category, family, and name).

XREF describes the Profiler page parameters:

Table 225: Profiler Page Parameters

Parameter

Endpoint Classification

Action/Description

1. Select one or more endpoint classification items from the drop-down list.

You can select a new action, or remove a current action.

RADIUS CoA Action 2. Select the RADIUS CoA action from the drop-down list.

3. To view the Policy Manager Entity Details page with the summary of enforcement profile details, click View Details.

4. To view the Summary tab with profile details, click Modify.

Add new RADIUS CoA

Action

5. To create a new RADIUS CoA action, click the Add new RADIUS CoA Action link.

6. When finished, click Save.

How Profile Classifies Endpoints

The Profile module uses a two-stage approach to classify endpoints using input attributes.

Stage 1: Deriving Device Profiles

During Stage 1, ClearPass Profile derives device profiles using static dictionary lookups. Based on the available attributes available, Stage 1 looks up DHCP, HTTP, ActiveSync, MAC OUI, and SNMP dictionaries and derives multiple matching profiles.

After multiple matches are returned, the priority of the source that provided the attribute is used to select the appropriate profile.

The following list shows the profile order of priority, from highest priority to lowest: a. OnGuard/ActiveSync plugin b. HTTP User-Agent c. SNMP

ClearPass Policy Manager 6.5 | User Guide ClearPass Policy Manager Profile | 369

d. DHCP e. MAC OUI

Stage 2: Refining Results

CPPM includes a set of rules that evaluates a device profile. The Rules engine uses all input attributes and device profiles from Stage 1. The resulting rule evaluation may or may not result in a profile. Stage 2 refines the results of profiling.

Example

With DHCP options, Stage 1 can identify an Android device. Stage 2 uses rules to combine this with the MAC

OUI to further classify an Android device as Samsung Android and HTC Android.

Fingerprint Dictionaries

CPPM uses a set of dictionaries and rules to perform device fingerprinting.

Because these dictionaries can change frequently, CPPM provides a way to automatically update fingerprints from a hosted portal. The device fingerprints are updated from the ArubaClearPass Update Portal (for more information, see

Updating Policy Manager Software on page 566 ).

To view the contents of the fingerprints dictionary:

1. Navigate to Administration > Dictionaries > Fingerprints.

The Device Fingerprints page appears. This page lists all the device fingerprints recognized by the Profile module.

Figure 357: Device Fingerprints Page

2. To view the device fingerprint dictionary attributes, select the device fingerprint of interest.

The attributes for the selected Device Fingerprint Dictionary are displayed:

370 | ClearPass Policy Manager Profile ClearPass Policy Manager 6.5 |  User Guide

Figure 358: Device Fingerprint Dictionary Attributes Page

3. To exit, click Close.

Viewing Live Endpoint Information for a Specific Device

The ClearPass Live Monitoring feature allows you to view endpoint information in graphic format for the device category, device family, and device name items you selected. You can also examine the endpoint details and attributes about a specific device .

To access the Endpoint Profiler Live Monitoring information:

1. Navigate to Monitoring > Live Monitoring > Endpoint Profiler.

The Endpoint Profiler appears.

Figure 359: Endpoint Profiler

2. To view endpoint details about a specific device, click a device in the table below the graphs.

3. To return to the Endpoint Profiler page, click Cancel.

For more information, see: n

Live Monitoring: Endpoint Profiler on page 55

The Cluster Status Dashboard widget shows basic distribution of device types. For more information, see:

ClearPass Policy Manager 6.5 | User Guide ClearPass Policy Manager Profile | 371

n

Using the Policy Manager Dashboard on page 21

About the Device Profile

A device profile is a hierarchical model consisting of three elements that are derived by the endpoint attributes—DeviceCategory, DeviceFamily, and DeviceName.

Table 226: Elements of a Device Profile

Endpoint

Attributes

DeviceCategory

Description

DeviceFamily

DeviceName

Denotes the type of the device, for example, Computer, Smart Device, Printer, or

Access Point.

Classifies devices based on the type of operating system or vendor. For example, when the category is Computer, ClearPass Policy Manager shows a device family of Windows, Linux, or Mac OS X.

Denotes the name of the device. Devices in a family are organized based on characteristics such as their operating system version. For example, in a

DeviceFamily of Windows, ClearPass Policy Manager shows a DeviceName of

Windows 8.1 or Windows Server 2012.

This hierarchical model provides a structured view of all endpoints accessing the network. In addition to these, a device profile also collects and stores the following: l l l l l

IP address

Host name

Device vendor (via MAC OUI)

Timestamp indicating when the device was first discovered

Timestamp indicating when the device was last seen l l l l l l l l l

Endpoint Information Collectors

Collectors are the network elements that provide data in order to profile endpoints. This section contains the following information:

DHCP Collector

ClearPass Onboard Collector

HTTP User-Agent Strings Collector

MAC OUI Collector

ActiveSync Plugin Collector

CPPM OnGuard Agent

SNMP Collector

Subnet Scan Collector

SNMP Configuration for Wired Network Profiling

DHCP Collector

Dynamic Host Configuration Protocol (DHCP) attributes such as option 55 (parameter request list), option 60

372 | ClearPass Policy Manager Profile ClearPass Policy Manager 6.5 |  User Guide

(vendor class), and the options list from the Discover and Request packets can uniquely fingerprint most devices that use the DHCP mechanism to acquire an IP address on the network.

You can configure switches and controllers to forward DHCP Discover, Request, and Inform packets to CPPM.

These DHCP packets are decoded by CPPM to arrive at the appropriate device category, family, and device name. In addition to fingerprints, DHCP also provides the host name and IP address.

Sending DHCP Traffic to CPPM

To configure your Aruba mobility controller and Cisco switch to send DHCP traffic to CPPM, enter the following

CLI commands: interface <vlan_name> ip address <ip_addr> <netmask> ip helper-address <dhcp_server_IO> ip helper-address <cppm_IP>end end

You can configure multiple ip helper-address statements to send DHCP packets to servers other than the

DHCP server.

ClearPass Onboard Collector

ClearPass Onboard collects authentic device information from all devices during the onboarding process.

Onboard then posts this information to ClearPass Profile via the Profile API.

Because the information collected is definitive, ClearPass Profile can directly classify these devices into their category, family, and name without having to rely on any other fingerprinting information.

HTTP User-Agent Strings Collector

In some cases, DHCP fingerprinting alone cannot fully classify a device. A common example is the Apple family of smart devices; for example, DHCP fingerprints cannot distinguish between an iPad and an iPhone.

In these scenarios, user-agent strings sent by browsers in the HTTP protocol are useful to further refine classification results.

User-agent strings are collected from the following: l l l

ClearPass Guest

ClearPass Onboard

Aruba mobility controller through an IF-MAP (Interface for Metadata Access Points) interface

MAC OUI Collector

The MAC OUI (Organization Unique Identifier) is expressed in the first 24 bits of a MAC address for a networkconnected device. Thus, the MAC OUI indicates the specific vendor for that device. The MAC OUI is acquired through various authentication mechanisms, such as 802.1X and MAC authentication.

The MAC OUI can be useful in some cases to more accurately classify endpoints. An example is Android™ devices where DHCP fingerprints can only classify a device as generic Android, but it cannot provide more details regarding the vendor.

Combining this information with MAC OUI, the ClearPass Profiler can classify a device as HTC™ Android,

Samsung™ Android, or Motorola® Android.

MAC OUI is also useful to profile devices such as printers that might be configured with static IP addresses.

ActiveSync Plugin Collector

You can install the ActiveSync plugin provided by Aruba on Microsoft Exchange servers.

ClearPass Policy Manager 6.5 | User Guide ClearPass Policy Manager Profile | 373

When a device communicates with an Exchange server using the Active Sync protocol, the device provides attributes such as device-type and user-agent.

These attributes are collected by the ActiveSync plugin and sent to the CPPM Profiler. Profiler uses dictionaries to derive profiles from these attributes.

CPPM OnGuard Agent

The ClearPass OnGuard agent performs advanced endpoint posture assessment. This agent can collect and send operating system details from endpoints during authentication.

The Policy Manager Profiler uses the OnGuard os_type attribute to derive a profile.

SNMP Collector

Endpoint information obtained by reading the Simple Network Management Protocol (SNMP) MIBs of network devices is used to discover and profile static IP devices in the network. For related information, see

SNMP

Configuration for Wired Network Profiling on page 377

.

Table 227

describes the MIBs used by the SNMP Collector.

Table 227: SNMP MIBs Used by the SNMP Collector

MIB Description

SysDescr A textual description of the entity used both for profiling switches, controllers, and routers configured in CPPM, and for profiling printers and other static IP devices discovered through SNMP or subnet scans (RFC1213).

cdpCacheTable A table containing the cached information obtained via receiving CDP (Cisco Discovery

Protocol) messages from CDP-capable devices. Used to discover neighbor devices connected to the switch or controller configured in CPPM.

lldpRemTable

ARPtable

This table contains one or more rows per physical network connection known to this agent read from LLDP (Link Layer Discovery Protocol)-capable devices. Used to discover and profile neighbor devices connected to the switch or controller configured in CPPM.

Address Resolution Protocol (ARP) information read from the network devices. Used as a means to discover endpoints in the network.

Setting SNMP Community Attributes

The SNMP-based mechanism is capable of profiling devices only if they respond to SNMP, or if the device advertises its capability via LLDP (Link Layer Discovery Protocol). When performing SNMP reads for a device,

CPPM uses SNMP Read credentials configured in Network Devices, or defaults to using SNMPv2 with "public" community strings specified.

To specify SNMPv2 with community strings:

1. Navigate to Configuration > Network > Devices.

2. From the Network Devices screen, select the appropriate device for configuration.

The Edit Device Details dialog appears.

3. Select the SNMP Read Settings tab.

374 | ClearPass Policy Manager Profile ClearPass Policy Manager 6.5 |  User Guide

Figure 360: Specifying SNMP v2 with Community Strings a. If not already enabled, enable the Allow SNMP Read check box.

b. From the SNMP Read Setting drop-down, select SNMPv2 with community strings.

c. Enter the Community String value.

d. Enable the Force Read check box to ensure that all CPPM nodes in the cluster read SNMP information from this device regardless of trap configuration on the device.

This option is especially useful when demonstrating static IP-based device profiling because the Force

Read option does not require any trap configuration on the network device.

e. Enable the Read ARP Table Info check box if this is a Layer-3 device, and you want to use the ARP table on this device as a way to discover endpoints in the network.

Static IP endpoints discovered this way are further probed via SNMP to profile the device.

4. Click Save.

Configuring the Device Info Poll Interval

Network devices configured with SNMP Read enabled are polled periodically for updates based on the time interval configured in the Device Info Poll Interval (the default is 60 minutes).

To set this poll interval, navigate to Administration > Server Configuration > Service Parameters >

ClearPass network services > Device Info Poll Interval.

ClearPass Policy Manager 6.5 | User Guide ClearPass Policy Manager Profile | 375

Figure 361: Specifying the Device Info Poll Interval

Subnet Scan Collector

A network subnet scan discovers the IP addresses of devices in the network.

The devices discovered in this way are further probed using SNMP to fingerprint and assign a profile to the device. Network subnets to be scanned are configured per CPPM Zone.

This is particularly useful in deployments that are geographically distributed. In such deployments, Aruba recommends that you:

1. Assign the CPPM nodes in a cluster to multiple zones (from Administration > Server Manager > Server

Configuration > Manage Policy Manager Zones), depending on the geographical area served by that node.

2. Then enable the profile for a minimum of one node per zone.

For more information, see

Policy Manager Zones on page 437 .

Configuring Subnet Scans

To configure the subnet scans:

1. Navigate to the Configuration > Profile Settings page.

Figure 362: Profile Settings: Subnet Scans Dialog

376 | ClearPass Policy Manager Profile ClearPass Policy Manager 6.5 |  User Guide

2. Select a Policy Manager Zone by clicking the Click to add drop-down.

3. To enter the IP subnets, click IP Subnet to Scan , then click Save.

4. Click On-demand Subnet Scan.

The Initiate On-Demand Subnet Scan dialog opens.

Figure 363: Initiate On-Demand Subnet Scan Dialog

5. Specify the IP subnets to be scanned in the Subnets to scan text field for discovering hosts.

Separate multiple subnets with commas.

6. Click Submit.

The subnet scan progress is shown on the Profile Settings page. You can view the subnet scan events in the Monitoring > Event Viewer page.

Figure 364

displays the subnet scan logs in the Event Viewer page:

Figure 364: Subnet Scan Logs

SNMP Configuration for Wired Network Profiling

For wired network profiling, you can configure a list of multiple SNMP community strings to query static IP devices discovered by the Profiler.

If a static IP device does not respond to queries from the default public community string, the SNMP service can use the credentials from this custom list to query the device.

To configure SNMP for wired network profiling:

1. Navigate to Configuration > Profile Settings.

Figure 365

displays the Profile SNMP Configuration panel:

ClearPass Policy Manager 6.5 | User Guide ClearPass Policy Manager Profile | 377

Figure 365: Profile SNMP Configuration Panel

2. Click Add SNMP configuration.

The SNMP Configuration dialog appears.

Figure 366: Configuring SNMP Community Strings a. In the IP Subnet field, enter the IP subnet address and subnet mask.

b. From the SNMP Version drop-down, select the appropriate SNMP version.

c. Optionally, in the Description field, enter a description of this SNMP configuration.

d. In the Community String field, enter the community string, then reenter the communty string in the

Verify field.

3. When finished, click Save Entry, then click Save.

378 | ClearPass Policy Manager Profile ClearPass Policy Manager 6.5 |  User Guide

Chapter 10

Network Access Devices

This chapter describes the following tasks that you can perform by using the Policy Manager user interface: l l l

Adding and Modifying Devices on page 379

Adding and Modifying Device Groups on page 386

Adding and Modifying Proxy Targets on page 389

Introduction

A Policy Manager device represents a Network Access Device (NAD) that sends network access requests to

Policy Manager using the supported RADIUS, TACACS+, or SNMP protocol. You can add or modify a device or a device group from the Policy Manager server.

For the Policy Manager server to discover and access the network devices, you must perform the following tasks: l l l l l

Configure SNMP read credentials on the network device to enable Policy Manager server to query against network devices or perform SNMP write operations.

Configure SNMP trap configurations on the network device to send SNMP traps to the Policy Manager server. Ensure that the same SNMP Trap credentials are configured in the SnmpService section under the

Administration > Server Configuration > Service Parameters tab of the Policy Manager UI.

Configure SNMPTRAPD on the Policy Manager server to receive SNMP traps. For SNMP enforcement on the network device, one or more of the following traps must be configured on the device: n

Link Up trap n n n n

Link Down trap

MAC Notification trap

In addition, the device must also support one or more of the following SNMP MIBs: n

RFC-1213 MIB

IF-MIB, BRIDGE-MIB

ENTITY-MIB n n n n

Q-BRIDGE-MIB

CISCO-VLANMEMBERSHIP-MIB

CISCO-STACK-MIB

CISCO-MAC-NOTIFICATION-MIB

These traps and MIBs enable Policy Manager to correlate the MAC address, IP address, switch port, and switch information.

Configure SSH CLI data on the Policy Manager server to allow phantom login to network devices.

Configure DHCP Relay configuration on the network device to ensure that DHCP requests are forwarded from the clients.

Adding and Modifying Devices

A Network Access Device (NAD) must belong to the global list of devices in the Policy Manager database to connect with Policy Manager using any of the supported protocols.

ClearPass Policy Manager 6.5 | User Guide Network Access Devices | 379

The Policy Manager Devices page displays the device name, IP address or subnet, and a brief description of each configured device.

To view this page, navigate to Configuration > Network > Devices.

The following figure displays the Network Devices page:

Figure 367: Network Devices Page

This page includes the following additional tasks: l l

Adding a Device on page 380

Additional Tasks on page 386

Adding a Device

To add a device:

1. Navigate to the Configuration > Network > Devices page

2. Click the Add link at the top-right corner.

l l

The Add Device page appears.

This page contains the following tabs used to configure device settings:

Device on page 381

SNMP Read Settings on page 382

l l

SNMP Write Settings on page 384

CLI Settings on page 385

380 | Network Access Devices ClearPass Policy Manager 6.5 |  User Guide

Device

Use the Device tab to define the device name, IP address, shared secret, and device attributes. The following displays the Add Device tab:

Figure 368: Device Tab

The following table describes the Device tab parameters:

Table 228: Device Tab Parameters

Parameter Description

Name Enter the name of the device.

Description

IP Address or

Subnet

Enter the description that provides additional information to identify the device.

Specify the IP address or the subnet of the device. You can use a hyphen to indicate the range of device IP addresses following the format a.b.c.d-e. For example, 192.168.1.1-20.

RADIUS/TACACS+

Shared Secret

Enter a shared secret for each of the two supported request protocols.

ClearPass Policy Manager 6.5 | User Guide Network Access Devices | 381

Table 228: Device Tab Parameters (Continued)

Parameter Description

Vendor Specify the dictionary to be loaded for this device. This field is optional.

NOTE: RADIUS:IETF, the dictionary containing the standard set of RADIUS attributes, is always loaded. When you specify a vendor here, the RADIUS dictionary associated with this vendor is automatically enabled.

Enable RADIUS

CoA

RADIUS CoA Port

Attributes

Enable RADIUS CoA (RFC 3576/5176) for this device. Set the UDP port on the device to send

CoA actions. The default value is 3799.

Add custom attributes for this device. Click on the “Click to add...” row to add custom attributes. By default, four custom attributes appear in the Attribute drop down: Location,

OS-Version, Device-Type, and Device-Vendor. You can enter any name in the Attribute field.

All attributes are of string datatype. The Value field can also be populated with any string.

Each time you enter a new custom attribute, it is available for selection in the Attribute drop down for all devices.

NOTE: All attributes entered for a device are available in the role mapping rules editor under the Device namespace.

SNMP Read Settings

Use the SNMP Read Settings tab to define values that allow ClearPass Policy Manager to read information from the device using SNMPv1, SNMPv2, or SNMPv3.

The following figure displays the SNMP Read Settings tab:

Large or geographically spread cluster deployments, typically do not want each CPPM node to probe all SNMP configured devices. By default, a CPPM node in a cluster only reads network device information for devices configured to send traps to that CPPM node.

Figure 369: SNMP Read Settings Tab

382 | Network Access Devices ClearPass Policy Manager 6.5 |  User Guide

The following table describes the SNMP Read Settings tab parameters:

Table 229: SNMP Read Settings Parameters

Parameter Description

Allow SNMP

Read

Toggle to enable or disable SNMP read.

SNMP Read

Setting

Community

String (SNMP v2 only)

Specify the SNMPrRead settings for the device. You can set any of the following options: l SNMP v1 with community strings l l

SNMP v2 with community strings

SNMP v3 with no Authentication l l l l

SNMP v3 with Authentication using MD5 and no Privacy

SNMP v3 with Authentication using MD5 and with Privacy

SNMP v3 with Authentication using SHA and no Privacy

SNMP v3 with Authentication using SHA and with Privacy

NOTE: The MD5 authentication type is not supported if you use ClearPass Policy Manager in the

FIPS (Administration > Server Manager > Server Configuration > FIPS)mode.

Enter the community string for sending the traps.

Verify

Re-enter the community string for sending the traps.

Force Read

(SNMP v1 and v2 only)

Enable this setting to ensure that all ClearPass Policy Manager nodes in the cluster read SNMP information from this device regardless of the trap configuration on the device. This option is useful when demonstrating a static IP-based device profiling because this does not require any trap configuration on the network device.

Read ARP

Table Info

Enable this setting on a Layer 3 device if you intend to use the ARP table on this device to discover endpoints in the network. Static IP endpoints are discovered this way are further probed using

SNMP to profile the device.

Specify the Admin user name to use for SNMP read operations.

Username

(SNMP v3 only)

Authentication

Key (SNMP v3 only)

Specify the SNMP v3 with authentication option (SHA or MD5).

NOTE: The EAP-MD5 authentication type is not supported if you run ClearPass Policy Manager in the FIPS (Administration > Server Manager > Server Configuration > FIPS) mode.

Privacy Key

(SNMP v3 only)

Specify the SNMP v3 with privacy option.

Privacy

Protocol

(SNMP v3 with privacy only)

Choose one of the available privacy protocols: l

DES-CBC l

AES-128

ClearPass Policy Manager 6.5 | User Guide Network Access Devices | 383

SNMP Write Settings

Use the SNMP Write Settings tab to define values that allow ClearPass Policy Manager to write to (manage) the device using SNMPv1, SNMPv2, or SNMPv3.

The following figure displays the SNMP Write Settings tab:

Figure 370: SNMP Write Settings Tab

The following table describes the SNMP Write Settings parameters:

Table 230: SNMP Write Settings Tab Parameters

Parameter Description

Allow SNMP

Write

Toggle to enable or disable SNMP write.

Default

VLAN

Specify the VLAN port setting after SNMP-enforced session expires.

SNMP Write

Settings

Specify the SNMP Write settings for the device. You can set any of the following options: l SNMP v1 with community strings l l l

SNMP v2 with community strings

SNMP v3 with no Authentication

SNMP v3 with Authentication using MD5 and no Privacy l l

SNMP v3 with Authentication using MD5 and with Privacy

SNMP v3 with Authentication using SHA and no Privacy l SNMP v3 with Authentication using SHA and with Privacy

NOTE: The MD5 authentication type is not supported if you use ClearPass Policy Manager in the

FIPS (Administration > Server Manager > Server Configuration > FIPS) mode.

384 | Network Access Devices ClearPass Policy Manager 6.5 |  User Guide

Table 230: SNMP Write Settings Tab Parameters (Continued)

Parameter Description

Community

String

Enter the community string for sending the traps.

Verify Re-enter the community string for sending the traps.

CLI Settings

Use the CLI Settings tab to enable or disable the CLI, and define user names, passwords, and port settings for accessing the CLI.

The following figure displays the CLI Settings tab:

Figure 371: CLI Settings Tab

The following table describes the CLI Settings tab parameters:

Table 231: CLI Settings Tab Parameters

Parameter Description

Allow CLI

Access

Toggle to enable or disable CLI access.

Access Type

Port

Username

Password

Select SSH or Telnet. Policy Manager uses the selected access method to log into the device CLI.

Specify the SSH or Telnet TCP port number.

Enter the username to log into the CLI.

Enter the password to log into the CLI.

ClearPass Policy Manager 6.5 | User Guide Network Access Devices | 385

Table 231: CLI Settings Tab Parameters (Continued)

Parameter Description

Username

Prompt Regex

Specify the regular expression for the username prompt. Policy Manager looks for this pattern to recognize the telnet username prompt.

Password

Prompt Regex

Specify the regular expression for the password prompt. Policy Manager looks for this pattern to recognize the telnet password prompt.

Command

Prompt Regex

Specify the regular expression for the command line prompt. Policy Manager looks for this pattern to recognize the telnet command line prompt.

Enable

Prompt Regex

Specify the regular expression for the command line in the enable prompt. Policy Manager looks for this pattern to recognize the telnet command line prompt.

Enable

Password

Enter and re-enter the credentials for Enable the password in the CLI.

Additional Tasks

Importing a Device

To import a device:

1. Click Import.

2. In the Import from File page, browse to select a file, and then click Import.

3. If you entered a secret key to encrypt the exported file, enter the same secret key to import the device back.

Exporting All Devices

To export all devices from the configuration:

1. Click Export.

2. In the Export to File page, specify a file path, then click Export.

3. In the Export to File page, you can choose to encrypt the exported data with a key.

This protects data such as shared secret from being visible in the exported file. To import it back, you specify the same key with which you exported.

Exporting a Single Device

To export a single device from the configuration:

1. Select it (using the check box on the left).

2. click Export.

3. In the Save As dialog, specify a file path, then click Export.

Adding and Modifying Device Groups

Policy Manager groups devices into Device Groups, which function as a component in service and role mapping rules. Device groups can also be associated with enforcement profiles; Policy Manager sends the attributes associated with these profiles only if the request originated from a device belong to the device groups.

386 | Network Access Devices ClearPass Policy Manager 6.5 |  User Guide

Administrators configure device groups at the global level. Device groups can contain the members of the IP address of a specified subnet, regular expression-based variation, or devices that are previously configured in the Policy Manager database.

Policy Manager lists all configured device groups in the Device Groups ( Configuration > Network > Device

Groups) page. The following figure displays the Network Device Groups page:

Figure 372: Device Groups Page

ClearPass Policy Manager 6.5 | User Guide Network Access Devices | 387

To add a device group, click Add at the top-right corner of the Network Device Groups page. Complete the fields in the Add New Device Group page as described in the following figure:

Figure 373: Add New Device Group Page

The following table describes the Add New Device Group page parameters:

Table 232: Add New Device Group Page

Parameter Description

Name Enter the name of the device group.

Description

Format

Enter the description that provides additional information about the device group.

Select the format: Subnet, Regular Expression, or List.

388 | Network Access Devices ClearPass Policy Manager 6.5 |  User Guide

Table 232: Add New Device Group Page (Continued)

Parameter Description

Subnet

Regular

Expression

Enter a subnet consisting of network address and the network suffix (CIDR notation). For example, 192.168.5.0/24.

Specify a regular expression that represents all IPv4 addresses matching that expression.

For example, ^192(.[0-9]*){3}$.

List:

Available/Selected

Devices

Use the widgets to move device identifiers between Available and Selected. Click Filter to filter the list based on the text in the associated text box.

Adding and Modifying Proxy Targets

In Policy Manager, a proxy target represents a RADIUS server (Policy Manager or third party) that is the target of a proxied RADIUS request. For example, when a branch office employee visits a main office and logs into the network, Policy Manager assigns the request to the first service in priority order that contains a service rule for

RADIUS proxy services and appending the domain to the username.

Proxy targets are configured at a global level. They can be used in configuring RADIUS proxy services. Refer to

Policy Manager Service Types on page 110

for more information. Policy Manager lists all configured proxy servers in the Proxy Targets page. To view the Proxy Targets page, navigate to Configuration > Network

> Proxy Targets.

The following figure displays the Proxy Targets page:

Figure 374: Proxy Targets Page

Adding a Proxy Target

To add a proxy target, click Add and complete the fields in the Add Proxy Target popup. You can also add a new proxy target from the Services page (Configuration > Services) as part of the flow of the Add Service wizard for a RADIUS proxy service type.

ClearPass Policy Manager 6.5 | User Guide Network Access Devices | 389

The following figure displays the Add Proxy Target pop-up:

Figure 375: Add Proxy Target Pop-up

The following table describes the Add Proxy Target pop-up parameters:

Table 233: Add Proxy Target pop-up

Parameter Description

Name Enter the name of the proxy target.

Description Enter the description that provides additional information about the proxy target.

Hostname/Shared

Secret

Specify the RADIUS hostname and shared secret. Use the same secret that you entered on the proxy target (refer to your RADIUS server configuration).

RADIUS

Authentication

Port

Enter the UDP port to send the RADIUS request. Default value for this port is 1812.

RADIUS

Accounting Port

Enter the UDP port to send the RADIUS accounting request. Default value for this port is

1813.

390 | Network Access Devices ClearPass Policy Manager 6.5 |  User Guide

Chapter 11

Administration

All administrative activities including server configuration, log management, certificate and dictionary maintenance, portal definitions, and administrator user account maintenance are done from the following

Administration menus: l l l l l l l l

ClearPass Portal n

ClearPass Portal on page 392

Users and privileges n n

Admin Users on page 393

Admin Privileges on page 395

Server Manager n

Server Configuration on page 401

n n

Log Configuration on page 460

Local Shared Folders on page 463

n

License Management on page 463

External Servers n n n n

SNMP Trap Receivers on page 469

Syslog Targets on page 473

Syslog Export Filters on page 478

Messaging Setup on page 490

n n

Endpoint Context Servers on page 492

File Backup Servers on page 532

Certificates n

Server Certificate on page 533

n n

Certificate Trust List on page 545

Certificate Revocation Lists on page 547

Dictionaries n

RADIUS Dictionary on page 549

n n n n

Posture Dictionary on page 550

TACACS+ Services Dictionary on page 552

Fingerprints Dictionary on page 553

Dictionary Attributes on page 554

n n

Applications Dictionaries on page 558

Configuring Endpoint Context Server Actions on page 501

Agents and Software Updates n

OnGuard Settings on page 559

n

Updating Policy Manager Software on page 566

Support n n

Contact Support on page 571

Remote Assistance on page 571

ClearPass Policy Manager 6.5 | User Guide Administration | 391

n

Documentation on page 574

ClearPass Portal

Navigate to the Administration > Agents and Software Updates > ClearPass Portal page. Using this page you can customize the content for your enterprise.

The following figure displays the ClearPass Portal page:

Figure 376: ClearPass Portal

The following table describes the ClearPass Portal parameters:

Table 234: ClearPass Portal Parameters

Parameter Description

Select Option Select the page that the user first sees after logging in to ClearPass: l

Default Landing Page l

Application Login Page: l n n n n

ClearPass Policy Manager

ClearPass Guest

ClearPass Insight

ClearPass Onboard

Guest Portal

Page Title

Logo Image

Click and type the text to appear as the page title in the default landing page.

Click and browse to select an image for the banner in the default landing page.

392 | Administration ClearPass Policy Manager 6.5 |  User Guide

Table 234: ClearPass Portal Parameters (Continued)

Parameter Description

Top section

Bottom section

Click and type the text to appear as the header in the default landing page.

Click and type the text to appear as the footer in the default landing page.

Copyright Click and type the copyright text to appear in the default landing page.

Both HTTP and HTTPS protocols are supported for ClearPass Portal re-direction.

Admin Users

This section describes the following topics: l l l

Adding an Admin User

Importing and Exporting Admin Users

Setting Password Policy for Admin Users

To view a list of all the ClearPass Policy Manager administrators, navigate to Administration > Users and

Privileges > Admin Users.

In this page, you can view the administrator details such as user ID, user name, and privilege level.

You can also add, import, export, and set password policies for the admin users by using the links provided at the top-right corner of this page.

The following figure displays the Admin Users page:

Figure 377: Admin Users

Adding an Admin User

To add a new admin user to the Admin Users table:

1. Click the Add link at the top-right corner the page. The Add Admin User dialog is displayed.

2. In the User ID and Name fields, specify a user ID and name for the admin user.

3. In the Password and Verify Password fields, specify a password for the admin user.

4. Select a privilege level from the Privilege Level drop-down list.

5. Click Add.

ClearPass Policy Manager 6.5 | User Guide Administration | 393

The following figure displays the Add Admin User dialog:

Figure 378: Add Admin User

Importing and Exporting Admin Users

You can import or export the admin user accounts by using the Import and Export All links at the top-right corner of the Admin Users page. You can also export specific admin user accounts by using the Export button that appears after selecting one or more admin user accounts from the list.

The passwords of the admin user accounts are not stored in clear text when exported to an XML file.

Setting Password Policy for Admin Users

To set password policies for the administrators:

1. Click the Password Policy link at the top right corner of the page. The Password Policy dialog is displayed.

2. Specify the minimum length required for the password in the Minimum Length field.

3. Select the complexity setting from the Complexity drop-down list. The complexity settings can be one of the following: l l

No password complexity requirement

At least one uppercase and one lowercase letter l l l l

At least one digit

At lease one letter and one digit

At least one of each: uppercase letter, lowercase letter, digit

At least one symbol l

At least one of each: uppercase letter, lowercase letter, digit, and symbol

4. Specify the characters not to be allowed in the password in the Disallowed Characters field.

5. Specify the words not to be allowed in the password in the Disallowed Words (CSV) field.

6. Select any additional checks, if required. The options are: l l

May not contain User ID or its characters in reversed order

May not contain repeated character four or more times consecutively

7. Set the password expiry time for the admin users. The allowed range is 0–500 days. The default value is 0.

If the value is set to 0, the password never expires. For any other value, the admin users are forced to reset the expired password when they log in to the UI. The Policy Manager UI alerts the users five days before the password expires.

394 | Administration ClearPass Policy Manager 6.5 |  User Guide

8. Click Save.

Password Policy settings are effective only for the users created or modified after the changes are saved.

The following figure displays the Password Policy Settings dialog:

Figure 379: Set (Admin) Password Policy

Admin Privileges

ClearPass Policy Manager ships with six read-only default administrator privilege XML files. You can export one or more default files and modify the file to create a customized administrator privileges file. Customized administrator privileges are defined in an XML file with a specific format and then imported into ClearPass

Policy Manager on the Admin Privileges page.

To view the available admin Privileges, navigate to Administration > Users and Privileges > Admin

Privileges page.

The following figure displays the Admin Privileges page:

Figure 380: Admin Privileges Page

For more information about the admin privileges file structure, refer to the following topics: l l l l

Creating Custom Administrator Privileges on page 396

Administrator Privilege XML File Structure on page 396

Administrator Privileges and IDs on page 397

Sample Administrator Privilege XML File on page 400

ClearPass Policy Manager 6.5 | User Guide Administration | 395

Creating Custom Administrator Privileges

To create a custom admin privilege XML file, you must use a plain text or XML editor.

Do not use word processing applications such as Microsoft Word which introduce tags and corrupt the XML file.

To create a custom administrator privilege:

1. Create an XML file that defines a privilege.

2. Store the new file.

3. Navigate to Administration > Users and Privileges > Admin Privileges.

4. Click Import Admin Privileges.

5. Import the administrator privilege file you created in step 1.

After you complete steps 1 through 5, the new administrator privileges document is displayed on the Admin

Privileges page.

Administrator Privilege XML File Structure

Admin privilege files are XML files with a specific structure. It must have a header at the beginning of the file in the following format:

<?xml version="1.0" encoding="UTF-8" standalone="yes"?>

The root tag is

TipsContents

. It is a container for the data in the XML file which must be in the following format:

<TipsContents xmlns="http://www.avendasys.com/tipsapiDefs/1.0">

â‹®

</TipsContents>

An optional TipsHeader tag can follow the TipsContents tag. The actual admin privileges information is defined with the AdminPrivilege and AdminTask tags. You can use one AdminPrivilege tag for each admin privilege you want to define. The AdminPrivilege tag contains the following two attributes: l l name description

You can have one or more AdminTask tags inside the AdminPrivilege tag. Each AdminTask tag defines a lace within the ClearPass Policy Manager application that a user with that privilege can view or change. The

AdminTask tag contains one taskid attribute and a single AdminTaskAction tag. The AdminTaskAction tag contains an attribute, type which can take a value, RO (read only) or RW (read/write).

The following sample gives the basic structure of an admin privilege file:

<AdminPrivileges>

<AdminPrivilege name="" description="">

<AdminTask taskid="">

<AdminTaskAction type=""/>

</AdminTask>

<AdminTask taskid="">

<AdminTaskAction type=""/>

</AdminTask>

</AdminPrivilege>

</AdminPrivileges>

396 | Administration ClearPass Policy Manager 6.5 |  User Guide

Administrator Privileges and IDs

Every UI element in the ClearPass Policy Manager application has a task ID associated with it. The users have access to the elements based on the permissions set for each task or element. By default, any permission provided for a task is applicable for all its sub-tasks. For example, if you give RW permissions for the task,

Enforcements (con.en), it is automatically applied to its sub-tasks, Policies (con.en.epo) and Profiles

(con.en.epr). Hence, you need not explicitly define the same permission for those sub-tasks.

The following list provides the tasks and sub-tasks of the ClearPass Policy Manager application and their associated task IDs:

Table 235: Administrator Privileges and IDs

Area (ClearPass Policy Manager Menu)

Dashboard

Monitoring l Live Monitoring n Access Tracker n Accounting n Onguard Activity n Analysis and Trending n Endpoint Profiles n System Monitor l Audit Viewer l Blacklisted Users l Event Viewer l Data Filters

Configuration l Start Here (Services Wizard) l Services l Service Templates l Authentication n Methods n Sources

Task ID dnd mon mon.li

mon.li.ad

mon.li.ac

mon.li.ag

mon.li.sp

mon.li.ep

mon.li.sy

mon.av

mon.bl

mon.ev

mon.df

con con.sh

con.se

con.st

con.au

con.au.am

con.au.as

ClearPass Policy Manager 6.5 | User Guide Administration | 397

n Single Sign-On n Local Users n Endpoints n Static Host Lists n Roles n Role Mappings l Posture n Posture Policies n Posture Servers n Audit Servers l Enforcements n Policies n Profiles l Network n Devices n Device Groups n Proxy Targets

Policy Simulation

Profile Settings

Administration l User and Privileges n ClearPass Portal n Admin Users n Admin Privileges

Table 235: Administrator Privileges and IDs (Continued)

Area (ClearPass Policy Manager Menu) l Identity

Task ID con.id

con.pv.ex

con.pv.au

con.en

con.en.epo

con.en.epr

con.nw

con.nw.nd

con.nw.ng

con.nw.pr

con.id.sso

con.id.lu

con.id.ep

con.id.sh

con.id.rs

con.id.rm

con.pv

con.pv.in

con.ps

con.prs

adm adm.us

adm.po.cp

adm.us.au

adm.us.ap

398 | Administration ClearPass Policy Manager 6.5 |  User Guide

n Server Configuration n Log Configuration n Local Shared Folders n Licensing l External Servers n SNMP Trap Receivers n Syslog Targets n Syslog Export Filters n Messaging Setup n Endpoint Context Servers n Context Server Actions l Certificates n Server Certificate n Trust List n Revocation List l Dictionaries n RADIUS n Posture n TACACS+ Services n Fingerprints n Attributes n Applications l Agents and Software Updates n Onguard Settings

Table 235: Administrator Privileges and IDs (Continued)

Area (ClearPass Policy Manager Menu) l Server Manager

Task ID adm.mg

adm.xs.me

adm.xs.cs

adm.di.csa

adm.cm

adm.cm.mc

adm.cm.ctl

adm.cm.crl

adm.di

adm.mg.sc

adm.mg.ls

adm.mg.sf

adm.mg.li

adm.xs

adm.xs.st

adm.xs.es

adm.xs.sx

adm.di.rd

adm.di.pd

adm.di.td

adm.di.df

adm.di.at

adm.di.ad

adm.po

adm.po.aas

ClearPass Policy Manager 6.5 | User Guide Administration | 399

Table 235: Administrator Privileges and IDs (Continued)

Area (ClearPass Policy Manager Menu) n Software Updates

Task ID adm.po.es

l Support n Contact Support n Remote Assistance n Documentation adm.su

adm.su.cs

adm.su.ra

adm.su.doc

If you provide permission for an area, the same permission for all sub-areas is included by default. For example, if you give RW permissions for Enforcements (con.en), you grant permissions for its sub-areas, in this case, Policies (con.en.epo) and Profiles (con.en.epr), and you do not have to explicitly define the same permission for those sub-areas.

Sample Administrator Privilege XML File

This section provides sample XML files with different admin privileges for various UI elements.

The following sample provides Read Only (R) Privilege to all the sections (dnd, con, mon, adm):

<?xml version="1.0" encoding="UTF-8" standalone="yes"?>

<TipsContents xmlns="http://www.avendasys.com/tipsapiDefs/1.0">

<TipsHeader exportTime="Thu Jul 26 17:57:50 IST 2012" version="6.0"/>

<AdminPrivileges>

<AdminPrivilege name="Read-only Administrator" description="A read-only administrator is only allowed to read all configuration elements">

<AdminTask taskid="con"> //Refers to Configuration

<AdminTaskAction type="R"/>

</AdminTask>

<AdminTask taskid="dnd"> //Refers to DashBoard

<AdminTaskAction type="R"/>

</AdminTask>

<AdminTask taskid="mon"> //Refers to Monitoring

<AdminTaskAction type="R"/>

</AdminTask>

<AdminTask taskid="adm"> //Refers to Administration

<AdminTaskAction type="R"/>

</AdminTask>

</AdminPrivilege>

</AdminPrivileges>

</TipsContents>

The following sample provides Read/Write access only to Guest, Local and Endpoint Repository:

<?xml version="1.0" encoding="UTF-8" standalone="yes"?>

<TipsContents xmlns="http://www.avendasys.com/tipsapiDefs/1.0">

<TipsHeader exportTime="Thu Jul 26 17:57:50 IST 2012" version="6.0"/>

<AdminPrivileges>

<AdminPrivilege name="Read/Write Access to Guest, Local and Endpoint Repository" description="A read-only administrator is only allowed to read all configuration elements">

<AdminTask taskid="con.id.lu"> //Refers to Local Users Section

<AdminTaskAction type="RW"/>

</AdminTask>

<AdminTask taskid="con.id.gu"> //Refers to Guest Users Section

<AdminTaskAction type="RW"/>

</AdminTask>

400 | Administration ClearPass Policy Manager 6.5 |  User Guide

<AdminTask taskid="con.id.ep"> //Refers to Endpoints Section

<AdminTaskAction type="RW"/>

</AdminTask>

</AdminPrivilege>

</AdminPrivileges>

</TipsContents>

The following sample provides Read/Write permissions to DashBoard/ Monitoring and ReadOnly permissions to Server Configuration:

<?xml version="1.0" encoding="UTF-8" standalone="yes"?>

<TipsContents xmlns="http://www.avendasys.com/tipsapiDefs/1.0">

<TipsHeader exportTime="Thu Jul 26 17:57:50 IST 2012" version="6.0"/>

<AdminPrivileges>

<AdminPrivilege name="Limited access permission" description="A read-only administrator is only allowed to read all configuration elements">

<AdminTask taskid="dnd"> //Refers to DashBoard

<AdminTaskAction type="RW"/>

</AdminTask>

<AdminTask taskid="mon"> //Refers to Monitoring

<AdminTaskAction type="RW"/>

</AdminTask>

<AdminTask taskid="adm.mg.sc"> //Refers to Server Configuration

<AdminTaskAction type="R"/>

</AdminTask>

</AdminPrivilege>

</AdminPrivileges>

</TipsContents>

Server Configuration

You can perform various server configuration tasks by navigating to Administration > Server Manager >

Server Configuration page in the ClearPass Policy Manager UI.

The following figure displays the Server Configuration page:

Figure 381: Server Configuration Page

This section describes the following server configuration tasks: l l l l l l l l

Edit Server Configuration Settings on page 402

Set Date & Time on page 434

Change Cluster Password on page 436

Policy Manager Zones on page 437

NetEvents Targets on page 438

Virtual IP Settings on page 439

Clear Machine Authentication Cache on page 440

Make Subscriber on page 441

ClearPass Policy Manager 6.5 | User Guide Administration | 401

l l l l l l

Cluster-Wide Parameters on page 442

Collect Logs on page 454

Backup on page 455

Restore on page 456

Shutdown/Reboot on page 459

Drop Subscriber on page 460

Edit Server Configuration Settings

You can edit the configuration settings of a server by clicking the server name listed in the Administration >

Server Manager > Server Configuration page.

You can perform the following additional tasks only for a disabled node: l l l l

Setting Time Zone

Synchronizing Cluster Password

Promoting to Publisher

Joining a Server Back to Cluster

The Server Configuration pop-up contains the following tabs:  l l l l l l

System Tab on page 406

Services Control Tab on page 411

Service Parameters Tab on page 412

System Monitoring Tab on page 425

Network Tab on page 427

FIPS Tab on page 432

Setting Date and Time

Use the Set Time Zone link at the top-right corner of the Server Configuration (Administration > Server

Manager > Server Configuration) page to set the date and time specific to the selected node in a cluster. To set the date and time, select a time zone from the areas listed. The selected time zone is displayed in the

Current time zone field. The following figure displays the Time Zone Settings pop-up:

402 | Administration ClearPass Policy Manager 6.5 |  User Guide

Figure 382: Time Zone Settings

Synchronizing Cluster Password

Use the Synchronize Cluster Password link to synchronize the password of the selected node with cluster.

Synchronizing the cluster password will change the appadmin password for all the nodes in the cluster.

The following figure displays the Synchronize Cluster Password with Publisher pop-up:

Figure 383: Synchronize Cluster Password with Publisher

Promoting to Publisher

Use the Promote To Publisher link to promote the selected node as a publisher node. You can enable this node as a publisher node using any other active node which is part of the same cluster. All application licenses will be de-activated and you need to contact support to re-activate these licenses. The following figure displays the Promote To Publisher pop-up:

ClearPass Policy Manager 6.5 | User Guide Administration | 403

Figure 384: Promote to publisher

Joining a Server Back to Cluster

Use the Join server back to cluster link to join server back to cluster. You can use this option only to a server that is in the Disabled state in the Server Configuration (Administration > Server Manager > Server

Configuration) page.

The following figure displays the Server Configuration page:

Figure 385: Server Configuration Page with Disabled Node

For more information on the Service Configuration, see

Server Configuration on page 401

.

The users with Admin access only can join a server back to cluster.

To join a server back to the cluster, use the following steps:

1. Select a subscriber node which is in Disabled state. The Server Configuration – System tab opens.

404 | Administration ClearPass Policy Manager 6.5 |  User Guide

Figure 386: Server configuration - Join server back to cluster

2. Click the Join server back to cluster link at the top-right corner. A warning message appears with a prompt to promote the node to ‘Publisher’. This option can only be triggered from a node that is currently active in the cluster. The following message displays the warning message:

Figure 387: Join server back to cluster

3. Click Yes from the warning message pop-up. A progress indicator shows the progress with log entries.

ClearPass Policy Manager 6.5 | User Guide Administration | 405

The following figure displays the Join server back to cluster progress indicator:

Figure 388: Join server back to cluster - Progress

4. For a failed publisher node, the following message will be displayed in the Dashboard page:

Figure 389: Publisher Warning Message

System Tab

By default, the Server Configuration page opens on the System tab.

406 | Administration ClearPass Policy Manager 6.5 |  User Guide

Figure 390

displays the System tab:

Figure 390: System Tab

Table 236

describes the System tab parameters:

Table 236: Server Configuration System Tab Parameters

Parameter Description

Hostname Specify the hostname of Policy Manager appliance.

You need not enter the fully qualified domain name in this field.

Policy

Manager Zone

To add or delete zones, select a previously configured zone from the drop-down list.

Then click the Policy Manager Zones link.

For more information on adding or deleting zones, see

Policy Manager Zones .

Enable Profile

Enable

Performance

Monitoring

Insight Setting

To enable the Policy Manager server to perform endpoint classifications, select the check box.

To enable the ClearPass Policy Manager server to perform performance monitoring, select the check box.

To enable the Insight reporting tool on this node, select the Enable Insight check box.

NOTE: l l l

When you enable this check box for Insight on a node in a cluster, the [Insight Repository] configuration is updated automatically to point to the management IP address of that server.

When this check box is enabled for other servers in the cluster, they are added as backups for the same authentication source.

The order of the primary and backup servers in the [Insight Repository] is the same order in which the user enables Insight on the server.

Enable as

Insight Master

To specify the current server in a cluster as an Insight Master, select this check box.

NOTE: This option is available only if Enable Insight is enabled.

ClearPass Policy Manager 6.5 | User Guide Administration | 407

Table 236: Server Configuration System Tab Parameters (Continued)

Parameter Description

Span Port

Enable

TCP/ARP

Fingerprinting

This field is optional.

If necessary, select a port for DHCP spanning.

On selecting a port, the Enable TCP/ARP Fingerprinting check box appears.

To enable TCP/ARP fingerprinting, select the check box.

This feature allows the Netbridge service to capture TCP and ARP packets and post the derived inputs to the device profiler.

NOTE: This option appears only when you specify a Span Port .

Management

Port

Data/External

Port

DNS Settings

AD Domains

To open the Configure Management Port window and configure the following management interface parameters, click Configure: l Select IP Version: Select the IP version as IPv4 or IPv6.

l l l

IP Address: IP address to access the ClearPass Policy Manager UI. Specify an IPv4 or IPv6 address.

Subnet Mask: Specify the management interface subnet mask for IPv4 address.

Default Gateway: Specify the default gateway for the management interface.

NOTE: IPv6 addresses do not require a netmask as they use Classless Inter-Domain Routing

(CIDR).

To open the Configure Data/External Port window and configure the following data or external port parameters, click Configure: l

Select IP Version: Select the IP version as IPv4 or IPv6.

l l l

IP Address: Specify the IP address of the data interface. All authentication and authorization requests appear on the data interface.

Subnet Mask: Specify the data interface subnet mask for IPv4 address.

Default Gateway: Specify the default gateway for the data interface.

NOTE: IPv6 addresses use Classless Inter-Domain Routing (CIDR), so you do not need to specify a netmask for IPv6 addresses.

To open the Configure DNS Settings window and configure the following DNS settings, click

Configure: l l l

Primary DNS: Specify the primary DNS for name lookup.

Secondary DNS: Specify the secondary DNS for name lookup.

Tertiary DNS: Specify the tertiary DNS for name lookup.

Displays a list of joined Active Directory domains.

To join an active directory domain, click Join Domain.

For more information on joining AD domains, see

Join AD Domain on page 408 ; also refer to

Chapter 3, "Preparing for Active Directory Authentication" in the ClearPass Deployment Guide.

After an AD Domain is added, the domain controller can be setup as a password server. For more information on adding a password server, see

Add Password Server on page 410

.

Join AD Domain

You can join CPPM to an Active Directory (AD) domain to authenticate users and computers that are members of an Active Directory domain. If you join CPPM to an Active Directory domain, it creates a computer account for the CPPM node in the AD database. Users can then authenticate into the network using 802.1X and EAP methods, such as PEAP-MSCHAPv2, with their own their own AD credentials.

408 | Administration ClearPass Policy Manager 6.5 |  User Guide

If you need to authenticate users belonging to multiple AD forests or domains in your network, and there is no trust relationship between these entities, then you must join CPPM to each of these untrusted forests or domains.

CPPM does not require to join multiple domains belonging to the same AD forest because a one-way trust relationship exists between those domains. In this case, CPPM can join the root domain.

CPPM can join or leave an AD domain by using the following two buttons in the System tab of the Server

Configuration page: l l

Join Domain—Click this button to join this CPPM appliance to an Active Directory domain. Password servers can be configured after Policy Manager is successfully joined. For more information on adding a password server, see

Add Password Server on page 410

.

Leave Domain— If the server is already part of multiple AD domains, click this button to disassociate this

Policy Manager appliance from an Active Directory domain.

For most use cases, if you have multiple nodes in the cluster, you must join each node to the same Active Directory domain.

The following figure displays the Join AD Domain window:

Figure 391: Join AD Domain

ClearPass Policy Manager 6.5 | User Guide Administration | 409

The following table describes the Join AD Domain parameters:

Table 237: Join AD Domain Parameters

Parameter Description

Domain

Controller

Fully qualified name of the Active Directory domain controller.

NETBIOS name

(optional)

The NETBIOS name of the domain. Enter this value only if this is different from your regular

Active Directory domain name. If this is different from your domain name (usually a shorter name), enter that name here. Contact your AD administrator about the NETBIOS name.

NOTE: If you enter an incorrect value for the NETBIOS name, you see a warning message in the

UI. If you see this warning message, leave the domain by clicking on the Leave Domain button, which replaces the Join Domain button once you join the domain. After leaving the domain, join again with the right NETBIOS name.

Domain

Controller name conflict

In some deployments (especially if there are multiple domain controllers, or if the domain name has been wrongly entered in the last step), the domain controller FQDN returned by the DNS query can be different from what was entered. In this case, you may: l l l

Use specified Domain Controller - Continue to use the domain controller name that you entered.

Use Domain Controller returned by DNS query - Use the domain controller name returned by the DNS query.

Fail on conflict - Abort the Join Domain operation.

Check this box to use the Administrator user name to join the domain Use default domain admin user

Username

Password

User ID of the domain administrator account. This field is disabled if the Use default domain

admin user checkbox is selected.

Password of the domain administrator account.

Add Password Server

After CPPM successfully joins an AD domain, you can configure a restricted list of domain controllers to be used for MSCHAP authentication. If not configured, then all available domain controllers obtained from DNS will be included.

To add a password server:

1. In the AD Domains section of the System tab, click the Add Password Server icon . This icon appears only after CPPM joins at least one AD domain (See

Figure 392

).

Figure 392: Add Password Server icon

2. The Configure AD Password Servers page appears. Specify the domain name, NetBIOS Name, and the password servers. The password servers can be hostname or IP address. Use a new line for each entry.

3. Click Save to complete adding the password servers.

410 | Administration ClearPass Policy Manager 6.5 |  User Guide

The Following figure displays the Configure AD Password Servers window:

Figure 393: Configure AD Password Servers

Services Control Tab

From the Services Control tab, you can view a service status and control (stop or start) various Policy

Manager services, including any AD Domains that the server joins.

ClearPass Policy Manager 6.5 | User Guide Administration | 411

The following figure displays the Services Control tab:

Figure 394: Services Control Tab

Service Parameters Tab

Navigate to the Service Parameters tab to change system parameters of a variety of services. The options on this page vary based on the selected service. Determine the service that you want to edit.

This section describes the following topics: l l l l l l l l

Async Network Services Options on page 412

ClearPass Network Services Options on page 413

ClearPass System Services Options on page 416

Policy Server Options on page 419

Radius Server Options on page 420

Stats Collection Service Options on page 424

System Monitor Service Options on page 424

Tacacs Server Options on page 425

The following figure displays the Service Parameters tab:

Figure 395: Service Parameters tab - Policy server example

Async Network Services Options

Configure the Post-Auth and Command Control parameters for the Async network service in this tab.

412 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Async network services parameters in the Service Parameters tab:

Figure 396: Async Network Services

The following table describes the Async network services parameters in the Service Parameters tab:

Table 238: Service Parameters - Async Network Services

Parameter

Post Auth

Description

Number of request processing threads

Set the number of request processing threads. The default value is 20 threads, and the allowed values are between 20 and 100.

Lazy handler polling frequency

Set the Lazy handler polling frequency. The frequency is configured in minutes. The default value is 5 minutes, and the allowed values are from 3-10 minutes.

Eager handler polling frequency

Set the Eager handler polling frequency. The frequency is measured in seconds. The default value is 30 seconds, and the allowed values are from 10-300 seconds.

Send Posture Data

Command Control

CoA Delay

Set this to TRUE if you want to send posture data to Palo Alto Firewall server.

Enable SNMP

Bounce Action

Set the CoA Delay value. The default value is measured in seconds. The default value is 2, and the allowed values are from 0-15 seconds.

Set the Enable SNMP Bounce Action value. The default value is FALSE.

ClearPass Network Services Options

The ClearPass Network Services parameters aggregate service parameters from the following services: l l l l

DhcpSnooper Service

Snmp Service

WebAuth Service

Posture Service

ClearPass Policy Manager 6.5 | User Guide Administration | 413

The following figure displays the ClearPass network services parameters in the Service Parameters tab:

Figure 397: ClearPass Network Services - Service Parameters Tab

The following figure displays the ClearPass network services parameters in the Service Parameters tab in

FIPS mode:

Figure 398: ClearPass Network Services - Service Parameters Tab FIPS Mode

414 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following table describes the parameters for ClearPass network services parameters in the Service

Parameters tab :

Table 239: Service Parameters - ClearPass Network Services

Service

Parameters

Description

DhcpSnooper

MAC to IP

Request Hold time

Specifies the number of seconds to wait before responding to a query to get an IP address corresponding to a MAC address. Any DHCP message received in this time period refreshes the MAC to IP binding. Typically, audit service requests for a MAC to IP mapping as soon the RADIUS request is received, but the client may take some more time receive and IP address through DHCP. This wait period takes into account the latest DHCP IP address that the client got.

DHCP Request

Probation

Time

Specifies the number of seconds to wait before considering the MAC to IP binding received in a DHCPREQUEST message as final. This wait handles cases where client receives a

DHCPNAK for a DHCPREQUEST and receives a new IP address after going through the

DHCPDISCOVER process again.

SnmpService

SNMP

Timeout

SNMP Retries

LinkUp

Timeout

Specifies the seconds to wait for an SNMP response from the network device.

Specifies the number of retries for SNMP requests.

Specifies the seconds to wait before processing link-up traps. If a MAC notification trap arrives in this time, SNMP service does not try to poll the switch for MAC addresses behind a port for link-up processing.

Specifies the duration in seconds for which MAC to IP lookup response is cached.

IP Address

Cache

Timeout

Uplink Port

Detection

Threshold

SNMP v2c

Trap

Community

Shows the limit for the number of MAC addresses found behind a port after which the port is considered an uplink port and not considered for SNMP lookup and enforcement.

Specifies the community string that must be checked in all incoming SNMP v2 traps.

SNMP v3 Trap

Username

Specifies the SNMP v3 Username to be used for all incoming traps.

SNMP v3 Trap

Authentication

Protocol

Specifies the SNMP v3 Authentication protocol for traps. Must be one of MD5, SHA, or empty (to disable authentication).

ClearPass Policy Manager 6.5 | User Guide Administration | 415

Table 239: Service Parameters - ClearPass Network Services (Continued)

Service

Parameters

Description

NOTE: The EAP-MD5 authentication type is not supported if you use the ClearPass Policy

Manager in the FIPS mode.

SNMP v3 Trap

Privacy

Protocol

Specifies the SNMP v3 Privacy protocol for traps. Must be one of DES_CBC, AES_128, or empty (to disable privacy).

NOTE: The DES_CBC privacy protocol is not supported if you use the ClearPass Policy

Manager in the FIPS mode.

SNMP v3 Trap

Authentication

Key

Specifies the SNMP v3 authentication key and privacy key for incoming traps.

SNMP v3 Trap

Privacy Key

Device Info

Poll Interval

Specifies the time (in minutes) between polling for device information.

WebAuthService

Max time to determine network device where client is connected

In some usage scenarios where the web authentication request does not originate from the network device. Policy Manager has to determine the network device to which the client is connected through an out-of-band SNMP mechanism. The network device deduction can take some time. This parameter specifies the maximum time to wait for Policy Manager to determine the network device to which the client is connected.

PostureService

Audit Thread

Pool Size

Specifies the number of threads to use for connections to audit servers.

Audit Result

Cache

Timeout

Audit Host

Ping Timeout

Specifies the time (in seconds) for which audit result entries are cached by Policy Manager.

Specifies the number of seconds for which Policy Manager pings an end-host before giving up and deeming the host to be unreachable.

ClearPass System Services Options

You can use the ClearPass system service parameters for PHP configuration and for http traffic flowing through a proxy server. ClearPass Policy Manager relies on an http connection for Aruba ClearPass update portal to download the latest information for posture services.

416 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the ClearPass system services parameters in the Service Parameters tab:

Figure 399: ClearPass System Services Parameters (partial view)

The following table describes the ClearPass system services parameters in the Service Parameters tab:

Table 240: Service Parameters - ClearPass System Services

Service

Parameter

Description

PHP System Configuration

Memory

Limit

Maximum memory that can be used by the PHP applications.

Form POST

Size

File Upload

Size

Input Time

Socket

Timeout

Maximum HTTP POST content size that can be sent to the PHP application.

Maximum file size that can be uploaded into the PHP application.

Time limit after which the server will detect no activity from the user and will take some action.

Maximum time for any socket connections.

Enable zlib output compression

Setting to compress the output files.

Include

PHP header in web server response

Setting to include PHP header in the HTTP responses.

ClearPass Policy Manager 6.5 | User Guide Administration | 417

Table 240: Service Parameters - ClearPass System Services (Continued)

Service

Parameter

Description

HTTP Proxy

Proxy Server Hostname or IP address of the proxy server.

Port

Username

Port at which the proxy server listens for HTTP traffic.

Username to authenticate with proxy server.

Password Password to authenticate with proxy server.

Database Configuration

Maximum connections

Specify a number between 300 and 2000 for a maximum number of allowed connections.

TCP Keepalive Configurations

Keep Alive

Time

Specify a value in seconds from 10-86400.

Specify a value in seconds from 1-3600.

Keep Alive

Interval

Keep Alive

Probes

Specify a value from 1-100 for the number of probes.

Web Server Configuration

Maximum

Clients

Specify a value from 10-20000 for the maximum number of clients allowed.

Timeout

Keep Alive

Request

Wait

Specify a server timeout value in seconds from 1-60.

Select TRUE or FALSE to enable or disable keep alive for the web-server.

Specify the request wait time in seconds from 1-60. The default value is 4 seconds.

418 | Administration ClearPass Policy Manager 6.5 |  User Guide

Table 240: Service Parameters - ClearPass System Services (Continued)

Service

Parameter

Description

Maximum

Requests

Specify a number between 0 and 3000 for the maximum number of requests allowed. The default value is 500.

Enable Host

Header check

Specify TRUE or FALSE. The default value is TRUE. When you set this value to TRUE, the Host

Header Restriction check is enabled and only the allowed or whitelisted host headers are allowed. When you set this value to FALSE, irrespective of Host Headers in the http packet,

ClearPass Policy Manager redirects to https://<cppm-server>/tips .

WhiteList

Host Names

When the Enable Host Header check value is set to TRUE, the web access is allowed for Whitelist

Host Names, hostnames, IP addresses, and VIP addresses in ClearPass Policy Manager. The comma separated whitelist host names are allowed to support multiple hostnames.

When the Enable Host Header check value is set to TRUE and the WhiteList Host Names field is blank, the web access is allowed only for hostnames, IP addresses, and VIP addresses in ClearPass

Policy Manager.

Policy Server Options

The following figure displays the Policy server parameters in the Service Parameters tab:

Figure 400: Policy Server Service Parameters

The following table describes the Policy server parameters in the Service Parameters tab:

Table 241: Service Parameters - Policy Server service

Service

Parameter

Description

Machine

Authentication

Cache Timeout

This specifies the time (in hours) for which machine authentication entries are cached by

Policy Manager.

Authentication

Thread Pool Size

LDAP Primary

Retry Interval

This specifies the number of threads to use for LDAP/AD and SQL connections.

After a primary LDAP server is down, Policy Manager connects to one of the backup servers.

This parameter specifies how long Policy Manager waits before it tries to connect to the

ClearPass Policy Manager 6.5 | User Guide Administration | 419

Table 241: Service Parameters - Policy Server service (Continued)

Service

Parameter

Description primary server again.

External Posture

Server Thread Pool

Size

This specifies the number of threads to use for posture servers.

External Posture

Server Primary

Retry Interval

After a primary posture server is down, Policy Manager connects to one of the backup servers. This parameter specifies how long Policy Manager waits before it tries to connect to the primary server again.

Audit SPT Default

Timeout

Time for which Audit success or error response is cached in policy server.

Number of request processing threads

Maximum number of threads used to process requests.

Authentication

Cache Timeout

HTTP Thread Pool

Size

Specifies the time in seconds for which authentication information is cached by Policy

Manager.

Specify the number of threads allotted for the HTTP thread pool.

Radius Server Options

The following figure displays the RADIUS server parameters in the Service Parameters tab:

Figure 401: RADIUS Server Parameters (partial view)

420 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following table describes the RADIUS server parameters in the Service Parameters tab:

Table 242: Service Parameters - Radius Server Service

Service

Parameter

Description

Proxy

Maximum

Response Delay

Maximum

Reactivation Time

Maximum Retry

Counts

Security

Time delay before retrying a proxy request, if the target server has not responded.

Time to elapse before retrying a dead proxy server.

Maximum number of times to retry a proxy request if the target server doesn't respond.

Reject Packet Delay Delay time before sending an actual RADIUS Access-Reject after the server decides to reject the request.

Maximum

Attributes

Maximum number of RADIUS attributes allowed in a request.

Process Server-

Status Request

Main

Send replies to Status-Server RADIUS packets.

Authentication Port Ports on which radius server listens for authentication requests. Default values are 1645,

1812.

Accounting Port Ports on which radius server listens for accounting requests. Default values are 1646, 1813.

Maximum time allowed for processing a request after which it is considered timed out.

Maximum Request

Time

Cleanup Time Time to cache the response sent to a RADIUS request after sending it. If the RADIUS server gets a duplicate request for which the response is already sent, the cached response is resent if the duplicate request arrives within this time period.

Local DB

Authentication

Source Connection

Count

Maximum number of Local DB connections opened.

AD/LDAP

Authentication

Maximum number of AD/LDAP connections opened.

ClearPass Policy Manager 6.5 | User Guide Administration | 421

Table 242: Service Parameters - Radius Server Service (Continued)

Service

Parameter

Description

Source Connection

Count

SQL DB

Authentication

Source Connection

Count

Maximum number of SQL DB.

Kerberos

Authentication

Source Connection

Count

Maximum number of Kerberos connections opened.

EAP - TLS Fragment

Size

Maximum allowed size for the EAP-TLS fragment.

Use Inner Identity in Access-Accept

Reply

Specify TRUE to use the inner identity in the Access-Accept replies. Else, specify FALSE.

Reject if OCSP response does not have Nonce

Include Nonce in

OCSP request

Specify TRUE to reject an OCSP response without a nonce. Else, specify FALSE.

Specify TRUE or FALSE. This determines whether OCSP request should have nonce or not. If the OCSP server does not support the nonce, then set the value as FALSE for this parameter to avoid the EAP-TLS authentication failure. The default value is TRUE.

Specify TRUE or FALSE. This determines whether ClearPass should sign an OCSP request with a RADIUS server certificate. The default value is FALSE.

Enable signing for

OCSP Request

Check the validity of all certificates in the chain against

CRLs

Specify TRUE to check the validity of all certificates in the chain against CRLs. Else, specify

FALSE.

ECDH Curve Select one of the following ECDH curve options from the drop-down list: l X9.62/SECG curve over a 256 bit prime field l NIST/SECG curve over a 384 bit prime field

Re-attempt AD login with different

Username formats

Specify TRUE to re-attempt AD login with different Username formats. Else, specify FALSE.

TLS Session Cache

Limit

Number of TLS sessions to cache before purging the cache (used in TLS based 802.1X EAP

Methods).

422 | Administration ClearPass Policy Manager 6.5 |  User Guide

Table 242: Service Parameters - Radius Server Service (Continued)

Service

Parameter

Description

Thread Pool

Maximum Number of Threads

Maximum number of threads in the RADIUS server thread pool to process requests.

Number of Initial

Threads

Initial number of thread in the RADIUS server thread pool to process requests.

AD (Active

Directory) Errors

AD (Active Directory) Errors

Window Size

Number of Errors

Recovery Action

Enter a duration during which Active Directory errors are accumulated for possible action.

The default is 5 minutes.

Enter a number. If this number of Active Directory errors occurs within the defined Window

Size, the self-healing Recovery Action is taken. The default is 150.

Select one of the following recovery actions from the drop-down list: l

None - To initiate no self-recovery action [Default].

l l

Exit - To restart the RADIUS server (Monitoring daemon will restart it).

Restart Domain Service - To restart the Domain service.

EAP-FAST

Master Key Expire

Time

Master Key Grace

Time

Specify the lifetime of a generated EAP-FAST master key.

Specify the grace period for an EAP-FAST master key after its lifetime. If a client presents a

PAC that is encrypted using the master key in this period after its TTL, it is accepted and a new PAC encrypted with the latest master key is provisioned on the client.

Select true if PACs generated by this server are valid across the cluster. Else, select false.

PACs are valid across cluster

Accounting

Log Accounting

Interim-Update

Packets

Select TRUE to store the Interim-Update packets in session logs. Else, select FALSE.

ClearPass Policy Manager 6.5 | User Guide Administration | 423

Stats Collection Service Options

The following figure displays the Stats Collection service parameters in the Service Parameters tab:

Figure 402: Stats Collection Service Parameters

The following table describes the Stats collection service parameters in the Service Parameters tab:

Table 243: Service Parameters - Stats Collection Service

Service

Parameter

Description

Enable

Stats

Collection

This option enables or disables Stats Collection and Stats Aggregation. If this is not enabled, then stats collection and aggregation services will not run on the node. In addition, the following error message will display if the admin attempts to start these services:

Failed to start Stats collection service - Ignoring service start request as Stats Collection option is disabled on the node

NOTE: Enabling/disabling this parameter requires a restart of cpass-statsd-server and cpasscarbon-server.

System Monitor Service Options

The following figure displays the System monitor service parameters in the Service Parameters tab:

Figure 403: System Monitor Service Parameters

424 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following table describes the System monitor service parameters in the Service Parameters tab:

Table 244: Services Parameters - System Monitor Service

Service

Parameter

Description

Free Disk

Space

Threshold

This parameter monitors the available disk space. If the available disk free space falls below the specified threshold (default 30%), then system sends SNMP traps to the configured trap servers.

1 Min CPU load average

Threshold

5 Min CPU load average

Threshold

15 Min CPU load average

Threshold

These parameters monitor the CPU load average of the system, specifying thresholds for 1-min, 5min and 15-min averages, respectively. If any of these loads exceed the associated maximum value, then system sends traps to the configured trap servers.

Tacacs Server Options

The following figure displays the TACACS+ server parameters in the Service Parameters tab:

Figure 404: TACACS+ Service Parameters

The following table describes the TACACS+ server parameters in the Service Parameters tab:

Table 245: Service Parameters tab - TACACS server

Service

Parameter

Description

TACACS+ Profiles

Cache Timeout

This specifies the time (in seconds) for which TACACS+ profile result entries are cached by ClearPass Policy Manager.

System Monitoring Tab

You can configure the SNMP parameters in the System Monitoring tab under the Administration > Server

Manager > Server Configuration page. You can edit the system configuration of a server manager by clicking a table entry. By configuring this tab, you can ensure that external Management Information Base

(MIB) browsers can browse the system level MIB objects exposed by the ClearPass Policy Manager appliance.

The options in this page vary based on the SNMP version that you select.

ClearPass Policy Manager 6.5 | User Guide Administration | 425

The following figure displays the System Monitoring tab:

Figure 405: System Monitoring Tab

The following table describes the System Monitoring tab parameters:

Table 246: System Monitoring tab Parameters

Parameter Description

System

Location

Specify the location of the ClearPass Policy Manager appliance.

System

Contact

Specify the contact information of the ClearPass Policy Manager appliance.

SNMP Configuration

Version

Community

String

Username

Specify the SNMP version from the options V1, V2C, or V3. The GUI options on this page vary based on the SNMP version selected.

Enter and re-enter the community string for sending traps. This is applicable only for SNMP V1 and V2C versions

Specify the user name to use for SNMP v3 communication. This field is available only if you selected the V3 as the SNMP version in the Version field.

Security Level Select any of the following options: l NOAUTH_NOPRIV (no authentication or privacy) - If you select this security level, only the SHA authentication protocol is available.

l AUTH_NOPRIV (authenticate, but no privacy) - If you select this security level, the MD5 and

SHA authentication protocols are available.

426 | Administration ClearPass Policy Manager 6.5 |  User Guide

Table 246: System Monitoring tab Parameters (Continued)

Parameter Description l AUTH _PRIV (authenticate and keep the communication private) - If you select this security level, the MD5 and SHA authentication protocols are available.

This field is available only if you selected V3 as the SNMP version in the Version field.

Authentication

Protocol

Select the authentication protocol from MD5 or SHA. These protocols vary depends on the security level that you selected in the Security Level field. This field is available only if you selected V3 as the SNMP version in the Version field.

NOTE: The MD5 authentication protocol is not supported in the FIPS mode.

Authentication key

Enter and re-enter the authentication key. This field is available only if you selected V3 as the

SNMP version in the Version field.

Privacy

Protocol

Privacy Key

Select the privacy protocol from DES or AES. This field is available only if you selected V3 as the

SNMP version in the Version field.

Enter the privacy key. This field is available only if you selected V3 as the SNMP version in the

Version field.

Network Tab

You can navigate to the Network tab and perform the following tasks: l l l l

Create GRE Tunnels on page 427

Create IPSec Tunnel on page 429 on page 429

Define Access Restrictions on page 431

The following figure displays the Network tab:

Figure 406: Network Interfaces Tab

Create GRE Tunnels

You can navigate to the Network tab and click Create Tunnel to create a GRE tunnel. This protocol can be used to create a virtual point-to-point link over standard IP network or the internet.

ClearPass Policy Manager 6.5 | User Guide Administration | 427

The following figure displays the Create Tunnel pop-up:

Figure 407: Create Tunnel

The following table describes the Create Tunnel parameters:

Table 247: Create Tunnel Parameters

Parameter Description

Display Name Specify the name for the tunnel interface. This name is used to identify the tunnel in the list of network interfaces.

Local Inner IP

Remote Outer IP

Remote Inner IP

Local IP address of the tunnel network interface.

IP address of the remote tunnel endpoint.

Remote IP address of the tunnel network interface.

Enter a value here to automatically create a route to this address through the tunnel.

Local IP address of the tunnel endpoint.

Local Outer IP

(Optional)

Create/Cancel Commit or dismiss changes.

428 | Administration ClearPass Policy Manager 6.5 |  User Guide

Create IPSec Tunnel

Navigate to the Network tab and click Create VLAN to create VLAN interfaces. The following figure displays the Create IPSec Tunnel pop-up:

Figure 408: Create IPSec Tunnel

The following table describes the Create IPSec Tunnel parameters:

Table 248: Create IPSec Tunnel Parameters

Parameter Description

Local Interface Specify the local (management) port.

Remote IP Address

IPSec Mode

IKE Version

IKE Phase 1 Mode

PRF

Shows the IP address of the remote host.

Select the IPSec mode from the options: Tunnel or Transport.

Specify the version of the Internet Key Exchange (IKE) protocol from the options: 1 or 2.

Specify the mode of the IKE phase from the options: Main or Aggressive.

Specify the pseudorandom function (PRF) from the following options:

ClearPass Policy Manager 6.5 | User Guide Administration | 429

Table 248: Create IPSec Tunnel Parameters (Continued)

Parameter Description l l l l

PRF-HMAC-MD5

PRF-HMAC-SHA1

PRF-HMAC-SHA256

PRF-HMAC-SHA384

Encryption Algorithm

Hash Algorithm

Diffie Hellman Group

Authentication Type

IKE Shared Secret

Verify IKE Shared Secret

Enabled

Select encryption algorithm to use from the following: l 3DES l l l

AES128

AES192

AES256

Select hash algorithm to use from the following: l HMAC SHA l l

HMAC-SHA256

HMAC-SHA384 l HMAC-MD5

Select the Diffie Hellman group from the following: l

Group 1 l l l l l

Group 2

Group 5

Group 14

Group 19

Group 20

Select the authentication type from the options: Pre-Shared Key or Certificate.

Enter the secret key.

Enter the secret key again to confirm.

Specifies the IPSec tunnel is enabled or not.

Create VLANs

Navigate to the Network tab and click Create VLAN to create VLAN interfaces.

430 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Create VLAN pop-up:

Figure 409: Create VLAN

The following table describes the Create VLAN parameters:

Table 249: Create VLAN Parameters

Parameter Description

Physical

Interface

VLAN Name

The physical port on which to create the VLAN interface. This is the interface through which the VLAN traffic will be routed.

Name for the VLAN interface. This name is used to identify the VLAN in the list of network interfaces.

VLAN ID 802.1Q VLAN identifier. Enter a value between 1- 4094.

The VLAN ID cannot be changed after the VLAN interface has been created.

IP Address

Netmask

IP address of the VLAN.

Netmask for the VLAN.

Create/Cancel Commit or dismiss changes.

Your network infrastructure must support tagged 802.1Q packets on the physical interface selected. VLAN ID

1 is often reserved for use by certain network management components; avoid using this ID unless you know it will not conflict with a VLAN already defined in your network.

Define Access Restrictions

Use this function to define specific network resources and allow or deny them access to specific applications.

You can create multiple definitions. Navigate to the Network tab and click Restrict Access.

ClearPass Policy Manager 6.5 | User Guide Administration | 431

The following figure displays the Restrict Access pop-up:

Figure 410: Restrict Access dialog box

The following table describes the Restrict Access parameters:

Table 250: Restrict Access Parameters

Parameter Description

Resource

Name

Select the application to which you want to allow or deny access.

Access

Network

Select one of the access control options: l

Allow— Allows access to the selected application.

l Deny—Denies access to the selected application.

Enter one or more hostnames, IP addresses, or IP subnets per line. The devices defined by what you enter here will be either specifically allowed or specifically denied access to the application you select.

FIPS Tab

This section provides information on using ClearPass Policy Manager in Federal Information Processing

Standards 140-2 (FIPS) approved mode. The United States Government developed FIPS 140-2 to define procedures, architectures, cryptographic algorithms, and other security techniques for use in government applications and networks that use cryptography. When running in FIPS Approved mode, ClearPass Policy

Manager utilizes a FIPS 140-2 validated cryptographic module. Support is not available for non-approved authentication methods such as EAP-MD5 and MD5 digest algorithm.

432 | Administration ClearPass Policy Manager 6.5 |  User Guide

See http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm#1747 for details on the FIPS 140-2 validated cryptographic module.

You can enable FIPS mode in ClearPass Policy Manager during installation using the CLI or post-installation using the Web UI. The following figure displays the prompt to enable FIPS Mode using the CLI:

Figure 411: Enabling FIPS Mode

After enabling FIPS mode using the CLI commands, you can verify whether FIPS mode is enabled or not in the

Configuration Summary page. The following figure displays the Configuration Summary page:

Figure 412: FIPS Mode - Configuration Summary

ClearPass Policy Manager 6.5 | User Guide Administration | 433

Alternatively, you can enable or disable the FIPS mode in the Administration > Server Manager > Server

Configuration > FIPS tab. The following figure displays the Server Configuration - FIPS tab in the ClearPass

Policy Manager UI:

Figure 413: Server Configuration - FIPS Tab

Important Points to Remember

Note the following important points, when you enable FIPS mode in ClearPass Policy Manager UI: l l l l l l

The database is reset when you enable the FIPS mode in ClearPass Policy Manager. Ensure that you backed up your database before enabling FIPS mode.

Configuration backup file from the ClearPass Policy Manager in the non-FIPS mode cannot be restored on

ClearPass Policy Manager in FIPS mode. However, configuration backup file from the ClearPass Policy

Manager in FIPS mode can be restored on the ClearPass Policy Manager in non-FIPS mode.

The server will be removed from the cluster if FIPS mode is enabled.

All nodes in a cluster must be either in FIPS or non-FIPS mode. The ClearPass Policy Manager nodes in FIPS mode cannot be connected to the cluster whose nodes are in the non-FIPS mode.

The legacy authentication method such as EAP-MD5 and MD5 digest algorithm are not supported in FIPS mode. You cannot import the certificates that are created with the MD5 authentication type to the

Certificates Trust List (Administration > Certificates > Certificate Trust List) page.

The server reboots when you enable FIPS mode. You need to log in again to the Administration UI.

You can view the status of FIPS mode in the status bar. The following figure displays the Status bar with the status of FIPS mode:

Figure 414: FIPS Status

You can also view the status of the FIPS mode using the CLI commands. For more information, see

Show

Commands on page 593 .

Set Date & Time

Click the Set Date and Time link under the Administration > Server Manager > Server Configuration page to access the Change Date and Time pop-up where can set the date and time for the server.

The Change Date and Time pop-up has the following two tabs: l l

Date & Time Tab on page 435

Time Zone on Publisher Tab on page 435

434 | Administration ClearPass Policy Manager 6.5 |  User Guide

Date & Time Tab

You can set the date and time for the server using this tab. The following figure displays the Date & Time tab of the Change Date and Time pop-up:

Figure 415: Change Date and Time - Date & Time tab

The following table describes the Date and Time tab parameters:

Table 251: Change Date and Time - Date & Time tab Parameters

Parameter Description

Date in yyyy-mmdd format

To specify date and time, use the indicated syntax. This is available only when Synchronize time with NTP server is unchecked.

Time in hh:mm:ss format

Synchronize Time

With NTP Server

To synchronize with a Network Time Protocol Server, enable this check box and specify the

NTP servers. You can specify one primary and one secondary server.

Specify the primary NTP server.

NTP Server

(primary)

Specify the secondary NTP server.

NTP Server

(secondary)

Time Zone on Publisher Tab

After configuring the date and time, select the time zone on the Time zone on publisher tab. This displays a time zone list in alphabetical order. Select a time zone and click Save.

This option is available only on the publisher. To set time zone on the subscriber, select the specific server and set time zone from the server-specific page.

ClearPass Policy Manager 6.5 | User Guide Administration | 435

The following figure displays the Time zone on publisher tab of the Change Date and TIme pop-up:

Figure 416: Time zone on publisher tab

Change Cluster Password

To change the cluster-wide password, follow the procedure below:

1. Navigate to the Administration > Server Manager > Server Configuration page and click the Change

Cluster Password link. The Change Cluster password pop-up appears.

2. Enter the new password, then verify the password.

3. Click Save.

Changing this password changes the password for the CLI user appadmin as well.

436 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Change Cluster Password pop-up:

Figure 417: Change Cluster Password Dialog

Policy Manager Zones

ClearPass Policy Manager shares a distributed cache of runtime states across all nodes in a cluster. These runtime states include: l l l

Roles and postures of connected entities

Connection status of all endpoints running OnGuard

Endpoint details gathered by OnGuard Agent

ClearPass Policy Manager uses this runtime state information to make policy decisions across multiple transactions.

In a deployment where a cluster spans WAN boundaries and multiple geographic zones, it is not necessary to share all of this runtime state across all nodes in the cluster.

For example, when endpoints present in one geographical area are not likely to authenticate or be present in another area, it is more efficient from a network bandwidth usage and processing perspective to restrict the sharing of such runtime state to a given geographical area.

You can configure zones in ClearPass Policy Manager to match with the geographical areas in your deployment.

There can be multiple zones per cluster, and each zone has a number of ClearPass Policy Manager nodes that share their runtime state.

Managing Policy Manager Zones

To add or delete a Policy Manager Zone:

1. Navigate to the Administration > Server Manager > Server Configuration page and click the Manage

Policy Manager Zones link.

2. To add a new Policy Manager Zone, click Click to add... and enter the name of the Policy Manager Zone to be added, then click Save.

3. To delete a zone, click the trashcan icon .

ClearPass Policy Manager 6.5 | User Guide Administration | 437

Figure 418

displays the Policy manager Zones dialog:

Figure 418: Policy Manager Zones Dialog

NetEvents Targets

NetEvents are a collection of details for various ClearPass Policy Manager users, endpoints, guests, authentications, accounting details, and so on. This information is periodically posted to a server that is configured as the NetEvents target.

If the ClearPass Insight feature is enabled on a ClearPass Policy Manager, it will receive netevents from all other server nodes within the same CPPM cluster. If you want to post these details to any external server that can aggregate these events or to an external dedicated ClearPass Insight server for multiple CPPM clusters, you have to configure an external NetEvents Target.

To configure Netevents Target, navigate to the Administration > Server Manager > Server Configuration page and click the NetEvents Targets link.

The following figure displays the NetEvents Targets pop-up:

Figure 419: NetEvents Targets

438 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following table describes the NetEvents Targets parameters:

Table 252: NetEvents targets

Parameter Description

Target URL HTTP URL for the service that support POST and requires

Authentication using Username / Password.

NOTE: To specify an external Insight server, use http://<CPPM-IP-

Address>:4231/netwatch/netevents in Target URL.

Username/Password

Reset

Delete

Credentials configured for authentication for the HTTP service that is provided in the Target URL.

Resets the values entered in the pop-up.

Deletes the selected Target URL.

Virtual IP Settings

You can configure two nodes in a cluster to share a Virtual IP address. The Virtual IP address is bound to the primary node by default. The secondary node takes over when the primary node is unavailable.

In a virtual machine deployment of ClearPass Policy Manager, enable forged transmits on the VMWare distributed virtual switch for the Virtual IP feature to be effective.

To configure a virtual IP address, navigate to the Administration > Server Manager > Server

Configuration page and click the Virtual IP Settings link.

The following figure displays the Virtual IP Settings pop-up:

Figure 420: Virtual IP Settings

ClearPass Policy Manager 6.5 | User Guide Administration | 439

The following table describes the Virtual IP Settings parameters:

Table 253: Virtual IP Settings Parameters

Parameter Description

Virtual IP Enter the IP address you want to define as the virtual IP address.

Primary Node Select the servers to use as the primary node.

Secondary Node Select the servers to use as the secondary node.

Interface Select an interface on each server to which the virtual IP address is bound.

Subnet

Enabled

This value is automatically filled after selecting the interface.

Select the check box to enable the Virtual IP address.

Clear Machine Authentication Cache

To clear machine authentication cache on all the nodes in a cluster:

1. Navigate to the Administration > Server Manager > Server Configuration page and click the Clear

Machine Authentication Cache link.

2. Click Yes to confirm. The following message appears:

Machine authentication cache cleared from all nodes

The following figure displays the Server Configuration page:

Figure 421: Server Configuration - Clear Machine Authentication Cache

The following figure displays the confirmation prompt for clearing the machine authentication cache:

Figure 422: Clear Machine Authentication Cache Prompt

440 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the message displayed after clearing the Machine authentication cache successfully :

Figure 423: Clear Machine Authentication Cache Success Message

Make Subscriber

In the Policy Manager cluster environment, the publisher node acts as master. A Policy Manager cluster can contain only one publisher node. Administration, configuration, and database write operations may occur only on this master node.

The Policy Manager appliance defaults to a publisher node unless it is made a subscriber node. Cluster commands can be used to change the state of the node, hence the publisher can be made a subscriber. When it is a subscriber, you will not see this link.

To add a subscriber, navigate to the Administration > Server Manager > Server Configuration page, and click the Make Subscriber link. The following figure displays the Add Subscriber Node pop-up:

Figure 424: Add Subscriber Node

ClearPass Policy Manager 6.5 | User Guide Administration | 441

The following table describes the Add Subscriber Node parameters:

Table 254: Add Subscriber Node

Parameter Description

Publisher IP

Publisher Password

Specify publisher address and password.

NOTE: The password specified here is the password for the CLI user appadmin

Restore the local log database after this operation

Select the check box to restore the log database following addition of a subscriber node.

Do not backup the existing databases before this operation

Select the check box only if you do not require a backup to the existing database.

Cluster-Wide Parameters

You can configure the parameters that apply to all the nodes in a cluster by clicking the Cluster-Wide

Parameters link in the Administration > Server Manager > Server Configuration page. Cluster-wide parameters include Cache timeouts, Cleanup intervals, Auto backup, System alert notification, Virtual AP and so on.

The Cluster-Wide Parameters pop-up contains the following tabs: l l l l l l l

General on page 443

Cleanup Intervals on page 445

Notifications on page 447

Standby Publisher on page 448

Virtual IP Configuration on page 449

Mode on page 450

Database on page 453

442 | Administration ClearPass Policy Manager 6.5 |  User Guide

General

The following figure displays the General tab of Cluster-Wide Parameters:

Figure 425: Cluster-Wide Parameters - General Tab

ClearPass Policy Manager 6.5 | User Guide Administration | 443

The following table describes the General tab parameters of Cluster-Wide Parameters:

Table 255: Cluster-Wide Parameters - General Tab Parameters

Parameter Description

Policy result cache timeout Specifies the duration allowed in minutes to store the role mapping and posture results derived by the policy engine during a policy evaluation. This result can then be used in subsequent evaluation of policies associated with a service, if the Use cached Roles and Posture attributes from previous sessions option is turned on for the service. A value of 0 disables caching.

NOTE: The value of the Policy result cache timeout field must be greater than the highest value set in the

Health Check Interval (in hours) fields. For example, if you have created the profiles Student-

Enforcement-Profile and Staff-Enforcement-Profile with health check interval configured, then the value of the Policy result cache timeout field must be greater than the highest value of the Health Check

Quiet Period (in hours) value configured among the following profiles: l l l

Global Agent Settings

Student-Enforcement-Profile

Staff-Enforcement-Profile

Free disk space threshold value

Free memory threshold value

Profile subnet scan interval

Endpoint Context Servers polling interval

Automatically check for available Software Updates

Specifies the percentage below which disk usage warnings are issued in the Monitoring > Event Viewer page. For example, a value of 30% indicates that a warning is issued only when the available disk space is 30% or lower. The error message similar to the following may appear in the System Event Details pop-up:

'System is running with low disk space.

Aggressive cleanup will be initiated when the available disk space falls below 80%. Current

available disk space = 75%'.

Specifies the percentage below which RAM usage warnings are issued in the Policy Manager Event

Viewer. For example, a value of 30 indicates that a warning is issued only when the available RAM is 30% or lower.

Specify the profile subnet scan interval in hours. The default value is 24 hours.

Enter the interval in minutes between polling of endpoint context servers. The default interval is 60 minutes.

Select the check box to enable automatic check for

444 | Administration ClearPass Policy Manager 6.5 |  User Guide

Table 255: Cluster-Wide Parameters - General Tab Parameters (Continued)

Parameter Description

Login Banner Text available software updates.

Customize the banner text that appears on the

ClearPass login screen and CLI access. You may use the banner to warn users of restrictions to access the website.

Admin Session Idle Timeout

Multi Master Cache Durability

Specify the maximum idle time permitted for the admin users beyond which the session times out. The default value is 30 minutes. The allowed range is 5–

1440 minutes.

Set this to Normal or Full for the Multi Master

Cache to survive most abrupt shutdowns. The default value is OFF.

NOTE: Enabling this feature may result in some performance drop.

Cleanup Intervals

The following figure displays the Cleanup Interval tab of Cluster-Wide Parameters:

Figure 426: Cluster-Wide Parameters - Cleanup Interval Tab

ClearPass Policy Manager 6.5 | User Guide Administration | 445

The following table describes the Cleanup Interval tab parameters of Cluster-Wide Parameters:

Table 256: Cluster-Wide Parameters - Cleanup Interval Tab Parameters

Parameter Description

Maximum inactive time for an endpoint

Specifies the duration in number of days to which an endpoint is retained in the endpoints table since its last authentication. If the endpoint is not authenticated for this period, the entry is removed from the endpoint table. 0 specifies no time limit configured.

Cleanup interval for

Session log details in the database

Specify the duration in number of days to keep the following data in the Policy Manager DB: l session logs (found on Access Tracker page) l event logs (found on Event Viewer page) l machine authentication cache

The default value is 7 days.

Cleanup interval for information stored on the disk

Specify the duration in number of days to keep log files that are written to the disk. The default value is 7 days.

Known endpoints cleanup interval

Specify the duration in number of days that ClearPass uses to determine when to start deleting known or disabled entries from the Endpoint repository. Known entries are deleted based on the last Added At value for each Endpoint. For example, if this value is 7, then known Endpoints that do not have the Added At value within the last 7 days are deleted.

The default value is 0 days. This indicates that no cleanup interval is specified.

Unknown endpoints cleanup interval

Specify the duration in number of days that ClearPass uses to determine when to start deleting unknown entries from the Endpoint repository. Unknown entries are deleted based on the last

Updated At value for each Endpoint. For example, if this value is 7, then unknown Endpoints that do not have the Updated At value within the last 7 days (stale endpoints) are deleted. The default value is 0 days. This indicates that no cleanup interval is specified.

Specify the cleanup interval for expired guest accounts. This indicates the number of days after expiry that the cleanup occurs. 0 specifies no expired guest accounts cleanup interval. The default value is 365 days.

Expired guest accounts cleanup interval

Profiled

Unknown endpoints cleanup interval

Specify the cleanup interval in number of days that ClearPass uses to determine when to start deleting profiled unknown entries from the Endpoint repository. Profiled unknown entries are deleted based on their last Updated At value for each Endpoint. For example, if this value is 7, then the Profiled Unknown Endpoints that do not have an Updated At value within the last 7 days are deleted. The default value is 0.

446 | Administration ClearPass Policy Manager 6.5 |  User Guide

Table 256: Cluster-Wide Parameters - Cleanup Interval Tab Parameters (Continued)

Parameter Description

Static

IP endpoints cleanup option

Specify whether to enable the option to cleanup static IP endpoints. You can select TRUE or FALSE.

The default options is FALSE.

Old Audit

Records cleanup interval

Specify the cleanup interval in number of days that ClearPass uses to determine when to start deleting old audit records from the Audit Viewer page. The default value is 7 days.

Profiled

Known endpoints cleanup option

Specify the cleanup interval in number of days that ClearPass uses to determine when to start deleting profiled known entries from the Endpoint repository. The default value is FALSE.

Notifications

The following figure displays the Notifications tab of Cluster-Wide Parameters:

Figure 427: Cluster-Wide Parameters - Notifications Tab

ClearPass Policy Manager 6.5 | User Guide Administration | 447

The following table describes the Notifications tab parameters of Cluster-Wide Parameters:

Table 257: Cluster-Wide Parameters - Notifications Tab Parameters

Parameter Description

System

Alert Level

Specify the alert notifications that are generated for system events logged at this level or higher. If you select INFO, alerts for INFO, WARN, and ERROR messages are generated. If you select WARN, alerts for WARN and ERROR messages are generated. If you select ERROR, then alerts for ERROR messages are only generated. The default value is WARN.

Alert

Notification

Timeout

Indicates the timeout in hours that determines how often alert messages are generated and sent out. If you select the Disabled option, the alert generation is disabled. The default value is 2 hours.

Alert

Notification

- eMail

Address

Specify comma separated list of email addresses to which alert messages are sent.

Alert

Notification

- SMS

Address

Specify comma separated list of SMS addresses to which alert messages are sent.

Standby Publisher

The following figure displays the Standby Publisher tab of Cluster-Wide Parameters:

Figure 428: Cluster-Wide Parameters - Standby Publisher Tab

448 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following table describes the Standby Publisher tab parameters of Cluster-Wide Parameters:

Table 258: Cluster-Wide Parameters - Standby Publisher Tab Parameters

Parameter Description

Enable

Publisher

Failover

Select TRUE to authorize a node in a cluster on the system to act as a publisher if the primary publisher fails. The default value is FALSE.

Designated

Standby

Publisher

Select the server in the cluster to act as the standby publisher. The default value is 0.

NOTE: If the Standby Publisher is on a different subnet from the Publisher, then ensure that a reliable connection between the two sub-nets is available to avoid unwanted network segmentation and potential data loss from false failover.

Failover

Wait Time

The time (in minutes) for which the secondary node waits before it acquires a Virtual IP address after the primary node fails . The default failover wait time is 10 minutes. This avoids the secondary node from taking over when the primary node is temporarily unavailable during restart.

Virtual IP Configuration

The following figure displays the Virtual IP Configuration tab of Cluster-Wide Parameters:

Figure 429: Cluster-Wide Parameters - Virtual IP Configuration Tab

The following table describes the Virtual IP Configuration tab parameters of Cluster-Wide Parameters:

Table 259: Cluster-Wide Parameters - Virtual IP Configuration Tab

Parameter Description

Failover

Wait Time

Enter the number of seconds for the secondary node to wait after primary node failure before it acquires the Virtual IP Address. The default failover wait time is 10 seconds so the secondary node takes over and respond quickly to authentication access and requests.

You can define a virtual IP address only with a primary server without a secondary server, if required. This can be used to add an additional IP address to the ClearPass Policy Manager server without any redundancy.

ClearPass Policy Manager 6.5 | User Guide Administration | 449

Mode

The Mode tab in Cluster-Wide Parameters pop-up allows you to enable or disable High Capacity Guest mode. The High Capacity Guest mode addresses the high volume licensing requirements in the Public Facing

Enterprises (PFE) environment, where a large volume of unique endpoints need wireless access.

The licensing scheme in the High Capacity Guest mode supports high volume of user traffic in the following

PFEs where the count of endpoints keep changing everyday: l l l l l l

Transportation—Airports and Rail Stations

Hospitality—Hotels, Casinos, and Resorts

Healthcare—Hospitals, Clinics, and Health Centers

Retail—Shopping Malls

Large Public Venues—Stadiums, Convention Centers, and Theaters

Restaurants and Coffee Shops—Quick-Serve Restaurants

In enterprise deployments, the CPPM licensing accumulates the unique endpoint count for 7 days, which can cause the number of licenses to exceed. To address this license limit in the PFE environment, you can enable the High Capacity Guest mode on a cluster. In the High Capacity Guest mode, the count of unique endpoints is reset everyday instead of accumulating the count for 7 days. In the High Capacity Guest mode, only you can view the supported guest authentication methods such as PAP, CHAP, MSCHAP, EAP_MD5, MAC_

AUTH, AUTHORIZE, and EAP_PEAP_in the Authentication Methods page.

You cannot enable the RADIUS services with the following authentication methods when the High Capacity

Guest mode is enabled: l l l l l l

EAP-FAST

EAP-GTC

EAP-MSCHAPv2

EAP-PEAP

EAP-TLS

EAP-TTLS

Licensing

You can add only guest licenses to the High Capacity Guest mode and this mode is intended to handle only high volume of guest users in PFE environment. After enabling the High Capacity Guest mode, you cannot add enterprise licenses.

If the number of licenses used exceeds the number of licenses purchased, a warning message appears four months after the number is exceeded. The number of licenses used is based on the daily moving average. In the High

Capacity Guest mode, a maximum of 2x licenses are allowed. For example, if you use the CP-HW-5K platform that supports 5k licenses, a maximum of 10k licenses are allowed in the High Capacity Guest mode.

Restrictions

When the High Capacity Guest mode is enabled in a cluster, the following restrictions apply: l l l l

Configuration settings cannot be moved from one cluster to another cluster that operates in the High

Capacity Guest mode.

Restoring configuration is allowed only with the backup files from the High Capacity Guest mode enabled servers.

The High Capacity Guest mode is intended only for high volumes of guest access.

Use-case related settings other than the High Capacity Guest mode are restricted.

450 | Administration ClearPass Policy Manager 6.5 |  User Guide

l l l

OnGuard and OnBoard access are restricted.

Default cleanup interval values are reset.

Only guest application licenses are allowed.

The following figure displays the Mode tab of Cluster-Wide Parameters:

Figure 430: Cluster-Wide Parameters - Mode Tab

The following table describes the Mode tab parameters of Cluster-Wide Parameters:

Table 260: Cluster-Wide Parameters - Mode Tab

Parameter Description

High Capacity

Guest Mode

Select TRUE or FALSE to enable or disable the High Capacity Guest mode. By default, the

High Capacity Guest mode is disabled.

The following table describes the default cleanup interval values when the High Capacity Guest mode is enabled:

Table 261: Cleanup Interval Values in the High Capacity Guest Mode

Parameter Description

Cleanup interval for

Session log details in the database

The default value is 3 days.

Known endpoints cleanup interval

The default value of the known endpoints cleanup interval is 3 days.

Unknown endpoints cleanup interval

The default value of the unknown endpoints cleanup interval is 3 days.

ClearPass Policy Manager 6.5 | User Guide Administration | 451

Table 261: Cleanup Interval Values in the High Capacity Guest Mode (Continued)

Parameter Description

The default value of the Expired guest accounts cleanup interval is 10 days.

Expired guest accounts cleanup interval

Profiled endpoints cleanup interval

The default value of the Profiled endpoints cleanup interval is 3 days.

The default value of the Old Audit Records cleanup interval is 10 days.

Old Audit Records cleanup interval

Profiled Known endpoints cleanup option

Specify the cleanup interval in number of days that ClearPass uses to determine when to start deleting profiled known entries from the Endpoint repository. The default value is TRUE.

The following service templates are supported when the High Capacity Guest (HCG) mode is enabled: l l l l l l l l

ClearPass Admin Access (Active Directory)

ClearPass Admin SSO Login (SAML SP Service)

ClearPass Identity Provider (SAML IdP Service)

Encrypted Wireless Access via 802.1X Public PEAP method

Guest Access

Guest Access - Web Login

Guest MAC Authentication

OAuth2 API User Access

The following service types are supported when the HCG mode is enabled: l l l l l l l l l

MAC Authentication

RADIUS Authorization

1RADIUS Enforcement

RADIUS Proxy

Aruba Application Authentication

Aruba Application Authorization

TACACS+ Enforcement

Web-based Authentication

Web-based Open Network Access

The following authentication methods are used in service templates in the HCG mode: l l l l l l l

PAP

CHAP

MSCHAP

EAP_MD5

MAC_AUTH

AUTHORIZE

EAP_PEAP_PUBLIC

452 | Administration ClearPass Policy Manager 6.5 |  User Guide

Database

The following figure displays the Database tab of Cluster-Wide Parameters:

Figure 431: Cluster-Wide Parameters - Database Tab

The following table describes the Database tab parameters of Cluster-Wide Parameters:

Table 262: Cluster-Wide Parameters - Database Tab Parameters

Parameter Description

Auto backup configuration options Select any of the following auto backup configuration options: l Off - Select this to not to perform periodic backups.

NOTE: Select Off before upgrading ClearPass Policy

Manager to avoid the interference between Auto backup and migration process.

l Config - Perform a periodic backup of the configuration database only. This is the default auto backup configuration option.

l Config|SessionInfo - Perform a backup of the configuration database and the session log database.

NOTE: It is recommended that you set this option to

Off or Config before starting an upgrade. This ensures the Auto Backup process does not interfere with migration post upgrade. If required, you may change this setting back to Config|SessionInfo 24 hours after upgrade completion.

Database user "appexternal" password

Replication Batch Interval

Enter the password for the appexternal username for this connection to the database.

Configure the time interval at which the subscribers

ClearPass Policy Manager 6.5 | User Guide Administration | 453

Table 262: Cluster-Wide Parameters - Database Tab Parameters (Continued)

Parameter Description

Store Password Hash for MSCHAP authentication

Store Local User Passwords using reversible encryption synchronize with the publisher. The default value is 5 seconds. The allowed range is 1–60 seconds.

Set this to TRUE to store passwords for admin and local users to Hash and NTLM hash formats which enables RADIUS MSCHAP authentications against admin or local repositories. If you set this to FALSE,

RADIUS MSCHAP authentications are not possible because the NTLM hash passwords are removed for all the users.

NOTE: To re-enable RADIUS MSCHAP authentication against the user repositories, you must reset all the passwords after setting this value to TRUE.

Set this to TRUE to enable cleartext password comparison against local users. If you set this to

FALSE cleartext password comparison against local users is not possible because the reversible passwords for local users are removed.

NOTE: To re-enable cleartext password comparison against local users, you must reset all the local user passwords after setting this value to TRUE.

Collect Logs

When you need to review performance or troubleshoot issues in detail, Policy Manager can compile and save transactional and diagnostic data into several log files. These files are saved in Local Shared Folders and can be downloaded to your computer.

To collect logs:

1. Navigate to Administration > Server Manager > Server Configuration,

2. Click Collect Logs. The Collect Logs pop-up appears.

3. Enter an output filename and add the .tar.gz extension to the filename.

4. Select the types of logging information you want to collect. The types of logging are: n n n

System Logs

Logs from all Policy Manager services

Capture network packets Duration of dump

Use this option only when you want to debug a problem. System performance can be severely impacted.

n n

Diagnostic dumps from Policy Manager services

Backup CPPM Configuration data

5. Enter the time period for which you want to collect the information.

n

Specify a number to collect logs for the number of days until the current day.

n

Select the Specify date range check box and enter a start date and end date in yyyy.mm.dd format in the respective fields to collect logs for the specified time period.

454 | Administration ClearPass Policy Manager 6.5 |  User Guide

6. Click Start. You'll see the progress of the information collection.

7. Click Close to finish or click Download File to save the log file to your computer.

If you are attempting to open a capture file (.cap or .pcap) using WireShark, untar or unzip the file (based on the file extension). When the entire file is extracted, navigate to the PacketCapture folder. In this folder, you will find a file with a .cap extension. WireShark can be used to open this file and study the network traffic.

The following figure displays the Collect Logs pop-up:

Figure 432: Collect Logs

Backup

Navigate to the Administration > Server Manager > Server Configuration page and click the Back Up button.

ClearPass Policy Manager 6.5 | User Guide Administration | 455

The following figure displays the Backup Policy Manager Database pop-up:

Figure 433: Backup Popup

The following table describes the Backup Policy Manager Database parameters:

Table 263: Backup Policy Manager Database

Parameter Description

Generate filename

Filename

Select the check box to enable Policy Manager to generate a filename; otherwise, specify a filename. Backup files are in the gzipped tar format (tar.gz extension). The backup file is automatically placed in the Shared Local Folder under folder type Backup Files (See

Local

Shared Folders ).

Select the check box if you do not want to backup the log database.

Do not backup log database

Do not backup password fields in configuration database

Backup databases for installed applications

Select the check box if you do not want to backup password fields in configuration database.

Select the check box if you want the backup to include databases for installed applications.

Restore

Navigate to the Administration > Server Manager > Server Configuration page and click the Restore button to restore ClearPass Policy Manager configuration data.

456 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Restore Policy Manager Database pop-up:

Figure 434: Restore Policy Manager Database

The following table describes the Restore Policy Manager Database parameters:

Table 264: Restore Policy Manager Database

Parameter Description

Restore file location

Upload file path

Select either Upload file to server or File is on server.

Browse to select name of backup file.

NOTE: This option is available only when the Upload file to server option is selected.

Shared backup files present on the server

If the files is on a server, select a file from the files in the local shared folders. (See

Local Shared Folders

.)

NOTE: This is displayed only when the File on server option is selected.

Restore CPPM configuration data (if it exists in the backup)

Select the check box to include an existing configuration data in the restore.

Select the check box to include the log data in the restore.

Restore CPPM session log data (if it exists in the backup).

Restore Insight data (if it exists in the backup)

Select the check box to include Insight reporting data in the restore.

ClearPass Policy Manager 6.5 | User Guide Administration | 457

Parameter

Ignore version mismatch and attempt data migration

Restore cluster server/node entries from backup.

Description

Select the check box if you are migrating configuration and/or log data from a backup file that was created with a previous compatible version.

Select the check box to include the cluster server/node entries in the restore.

Do not backup the existing databases before this operation.

Select the check box if you do not want to backup the existing databases before performing a restore.

Cleanup

You can perform a system cleanup operation to purge the following records: l l l l l l

System and application log files

Past authentication records

Audit records

Expired guest accounts

Past auto and manual backups

Stored reports

To perform a system cleanup:

1. Navigate to the Administration > Server Manager > Server Configuration page and click the Cleanup button. The Force Cleanup Files pop-up is displayed.

2. Enter a number to cleanup files that are older than the specified number of days. The allowed range is 0-15.

3. Click Start to initiate the cleanup process.

The following figure displays the Cleanup option in the Server Configuration page:

Figure 435: Server Configuration - Cleanup

458 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Force Cleanup Files pop-up:

Figure 436: Force Cleanup Files

The following figure displays the cleanup progress:

Figure 437: Cleanup Progress Screen

Shutdown/Reboot

Navigate to the Administration > Server Manager > Server Configuration page and click the Shutdown or Reboot buttons to shutdown or reboot the node.

ClearPass Policy Manager 6.5 | User Guide Administration | 459

Drop Subscriber

Navigate to the Administration > Server Manager > Server Configuration page and click the Drop

Subscriber button to drop a subscriber from the cluster.

This option is not available in a single node deployment.

Log Configuration

Navigate to the Adminitration > Server Manager > Log Configuration page to configure logs for services and system level.

The Log Configuration page contains the following tabs: l l

Service Log Configuration on page 460

System Level on page 462

Service Log Configuration

The following figure displays the Service Log Configuration tab:

Figure 438: Log Configuration - Service Log Configuration Tab

460 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following table describes the Service Log Configuration tab parameters:

Table 265: Log Configuration - Service Log Configuration tab Parameters

Parameter Description

Select Server Specify the server for which you want to configure logs. All nodes in the cluster appear in the drop-down list.

Select Service

Module Log Level

Settings

Default Log Level

Specify the service for which you want to configure logs.

Select the check box to set the log level for each module individually (listed in decreasing level of verbosity. For optimal performance you must run Policy Manager with log level set to ERROR or FATAL): l l

DEBUG

INFO l l l

WARN

ERROR

FATAL

If this option is disabled, then all module level logs are set to the default log level.

This drop-down list is available if the Module Log Level Settings option is disabled. This sets the default logging level for all modules. Available options include the following: l

DEBUG l l l l

INFO

WARN

ERROR

FATAL

NOTE: Set this option first, and then override any modules as necessary.

Module Name & Log

Level:

If the Module Log Level Settings option is enabled, select log levels for each available module (listed in decreasing level of verbosity): l l

DEBUG

INFO l l l

WARN

ERROR

FATAL

Restore

Defaults/Save

Click Save to save changes or Restore Defaults to restore default settings.

ClearPass Policy Manager 6.5 | User Guide Administration | 461

System Level

The following figure displays the System Level tab:

Figure 439: Log Configuration - System Level tab

The following table describes the System Level tab parameters:

Table 266: Log Configuration - System Level tab Parameters

Parameter Description

Select Server Specify the server for which you want to configure logs.

Number of log files

Specify the number of log files of a specific module to keep at any given time. When a log file reaches the specified size (see below), Policy Manager rolls the log over to another file until the specified number of log files is reached; once the number of log files exceeds the specified value, Policy Manager overwrites the oldest file.

Limit each log file size to

Limit each log file to this size, before the log rolls over to the next file. The default value is 50 MB.

Syslog Server

Syslog Port

Specify the syslog server and port number. Policy Manager sends the configured module logs to this syslog server.

Service Name

Enable Syslog

Syslog Filter

Level

For each service, you can select the Enable Syslog check box and then override the

Syslog Filter level. The current Syslog Filter level is based on the default log level specified on the Service Log Configuration tab.

Restore

Defaults/Save

Click Save to save changes or Restore Defaults to restore default settings.

462 | Administration ClearPass Policy Manager 6.5 |  User Guide

Local Shared Folders

To download a local shared folder, navigate to Administration > Server Manager > Local Shared Folders.

Choose a file type from the Select folder drop-down list. The browser download box appears. Currently supported folder types are listed below: l l l

Backup files - Database backup files backed up manually

Log files - Log files backed up via the

Collect Logs on page 454

mechanism

Automated Backup files - Database backup files backed up automatically on a daily basis

The following figure displays the Local Shared Folders page:

Figure 440: Local Shared Folders Page

License Management

The Licensing page shows all the licenses that is activated for the entire ClearPass Policy Manager cluster. You must have a ClearPass Policy Manager base license for every instance of the product.

If the number of licenses used exceeds the number of licenses purchased, you will see a warning four months after the number is exceeded. The number of used licenses is based on the daily moving average.

This section describes the following topics: l l l l l l

Licensing Main Page on page 463

Adding an Application License on page 464

Activating a Server License on page 465

Activating an Application License on page 466

Updating a Server License on page 467

Updating an Application License on page 468

On a VM instance of CPPM, the permanent license must be entered.

Licensing Main Page

To manage licenses, navigate to Administration > Server Manager > Licensing. The Licensing page has the following tabs: l l l

License Summary Tab on page 464

Servers Tab on page 464

Applications Tab on page 464

ClearPass Policy Manager 6.5 | User Guide Administration | 463

The Applications tab gets activated on adding an application license like OnGuard, Guest, or Onboard.

License Summary Tab

You can add and activate OnGuard, Guest, Onboard, and Enterprise licenses. The License Summary tab displays the number of purchased licenses for Policy Manager, OnGuard, Guest, Onboard, and ClearPass

Enterprise. The following figure displays the License Summary tab:

Figure 441: License Summary Tab

Servers Tab

The Servers tab displays the Policy Manager server IP address, the product type, license type, license activation status, and many more parameters. The following figure displays the Servers tab:

Figure 442: Servers Tab

Applications Tab

The Applications tab displays the ClearPass Policy Manager application license details like product type, license type, license activation status, and many more. The following figure displays the Applications tab:

Figure 443: Applications Tab

Adding an Application License

To add an application license:

1. Navigate to Administration > Server Manager > Licensing.

2. Click the Add License link on the top right section of the page. The Update License pop-up appears.

3. Choose a product from the Product drop-down list.

4. Enter the license key.

5. Click the I agree to the above terms and conditions. check box.

6. Click Add.

464 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Update License pop-up:

Figure 444: Update License Pop-up

Activating a Server License

You must activate a server license only once, when you first install Policy Manager on a server. To activate a server license:

1. Navigate to Administration > Server Manager > Licensing.

2. Click the Servers tab. Servers that are not activated have the keyword Activate next to the red dot in the

Activation Status field heading.

3. Click Activate next to the red dot in the Activation Status field heading. The Activate License pop-up appears.

4. In the Online Activation section of the Activate License pop-up, click Activate Now.

If you are not connected to the Internet, follow the instructions in the Offline Activation section. Download an activation request token from the Policy Manager server and email the file to Aruba support. You will receive an activation key that you can upload.

ClearPass Policy Manager 6.5 | User Guide Administration | 465

The following figure displays the Activate License pop-up:

Figure 445: Activate License Pop-up

Activating an Application License

After you add or update an application license, it must be activated. Adding an application license installs an

Application tab on the Licensing page.

1. Navigate to Administration > Server Manager > Licensing.

2. Click the Applications tab. Applications that are not activated have the keyword Activate next to the red dot in the Activation Status field heading.

3. Click Activate next to the red dot in the Activation Status field heading. The Activate License pop-up appears.

4. In the Online Activation section of the Activate License pop-up, click Activate Now.

If you are not connected to the Internet, follow the instructions in the Offline Activation section. Download an activation request token from the Policy Manager server and email the file to Aruba support. You will receive an activation key that you can upload.

466 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Activate License pop-up:

Figure 446: Activate License Pop-up

Updating a Server License

Licenses typically require updating after they expire, for example, after the evaluation license expires, or when capacity exceeds its licensed amount. To update a server license:

1. Navigate to Administration > Server Manager > Licensing.

2. Click the Servers tab.

3. Click anywhere on a server entry except the Activation Status field entry. The Update License pop-up appears.

4. Enter the new license key.

5. Click the I agree to the above terms and conditions. check box.

6. Click Update.

ClearPass Policy Manager 6.5 | User Guide Administration | 467

The following figure displays the Update License pop-up:

Figure 447: Update License Pop-up

Updating an Application License

Licenses typically require updating after they expire, for example, after the evaluation license expires, or when capacity exceeds its licensed amount. To update an application license:

1. Navigate to Administration > Server Manager > Licensing.

2. Click the Applications tab.

3. Click anywhere on an application entry except the Activation Status field entry. The Update License pop-up appears.

4. Enter the new license key.

5. Click the I agree to the above terms and conditions. check box.

6. Click Update.

468 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Update License pop-up:

Figure 448: Update License Pop-up

SNMP Trap Receivers

This section describes the following topics: l l l l l l

SNMP Trap Receivers Main Page on page 470

Adding an SNMP Trap Server on page 470

Importing an SNMP Trap Server on page 471

Exporting All SNMP Trap Servers on page 472

Exporting an SNMP Trap Server on page 472

Deleting an SNMP Trap Server on page 473

Policy Manager sends SNMP traps that expose the following server information: l l l l l l

System up-time— Provides information about how long the system is running.

Network interface statistics [up/down]— Provides information if the network interface is up or down.

Process monitoring information— Check for the processes that should be running. Maximum and minimum number of allowed instances. Sends traps if there is a change in value of maximum and minimum numbers.

Disk usage— Check for disk space usage of a partition. The agent can check the amount of available disk space and make sure it is above the set limit. The value can be in percentage as well. Sends traps if there is a change in the value.

CPU load information— Check for unreasonable load average values. For example, if 1 minute CPU load average exceeds the configured value [in percentage] then system sends a trap to the configured destination.

Memory usage— Report the memory usage of the system.

ClearPass Policy Manager 6.5 | User Guide Administration | 469

SNMP Trap Receivers Main Page

To view a list of SNMP trap receivers configured on the ClearPass Policy Manager server, navigate to

Administration > External Servers > SNMP Trap Receivers.

The following figure displays the SNMP Trap Receivers page:

Figure 449: SNMP Trap Receivers Page

About the ClearPass SNMP Private MIB

For information about the ClearPass SNMP Private MIB, see

ClearPass SNMP Private MIB on page 629

.

Adding an SNMP Trap Server

To add an SNMP trap server:

1. Navigate to Administration > External Servers > SNMP Trap Receivers.

2. Click the Add link on the top right section of the page. Enter the details based on

Table 267

.

3. Click Save.

The following figure displays the Add SNMP Trap Server pop-up:

Figure 450: Add SNMP Trap Server Pop-up

The following table describes the Add SNMP Trap Server parameters:

470 | Administration ClearPass Policy Manager 6.5 |  User Guide

Table 267: Add SNMP Trap Server Parameters

Parameter Description

Host Address Enter the trap destination hostname or IP address.

NOTE: This server must have an SNMP trap receiver or trap viewer installed.

Description

SNMP Version

Enter a short description of the SNMP trap server.

Select the SNMP version.

Community String / Verify Enter and re-enter the community string for sending the traps.

Server Port Port number for sending the traps. By default, the port number is 162.

NOTE: Configure the trap server firewall for traffic on this port.

Importing an SNMP Trap Server

To import an SNMP trap server:

1. Navigate to Administration > External Servers > SNMP Trap Receivers.

2. Click the Import link on the top right section of the page. Enter the details based on

Table 268 .

3. Click Import.

The following figure displays the Import from file pop-up:

Figure 451: Import from file Pop-up

ClearPass Policy Manager 6.5 | User Guide Administration | 471

The following table describes the Import from file parameters:

Table 268: Import from file Parameters

Parameter Description

Select File Browse to the SNMP Trap Server configuration file to be imported.

Enter secret for the file (if any) If the file was exported with a secret key for encryption, enter the secret key here.

Exporting All SNMP Trap Servers

This link exports all configured SNMP Trap Receivers. To export all SNMP trap servers:

1. Navigate to Administration > External Servers > SNMP Trap Receivers.

2. Click the Export All link on the top right section of the page. Enter the details based on

Table 269

.

3. Click Export.

4. Enter the XML file name in the Save As dialog box.

5. Click Save.

The following figure displays the Export to file pop-up:

Figure 452: Export to file Pop-up

The following table describes the Export to file parameters:

Table 269: Export to file Parameters

Parameter Description

Choose Yes to export the file with password protection.

Export file with password protection

Secret Key Enter the secret key.

Verify Secret Re-enter the secret key.

Exporting an SNMP Trap Server

To export a single SNMP trap server:

1. Navigate to Administration > External Servers > SNMP Trap Receivers.

472 | Administration ClearPass Policy Manager 6.5 |  User Guide

2. Select the Host Address from the list of check boxes and click Export. Enter the details based on

Table

270 .

3. Enter the name of the XML file in the Save As dialog.

4. Click Save.

The following figure displays the Export to file pop-up:

Figure 453: Export to file Pop-up

The following table describes the Export to file parameters:

Table 270: Export to file Parameters

Parameter Description

Export file with password protection

Choose Yes to export the file with password protection.

Secret Key

Verify Secret

Enter the secret key.

Re-enter the secret key.

Deleting an SNMP Trap Server

To delete a single SNMP trap server:

1. Navigate to Administration > External Servers > SNMP Trap Receivers.

2. Click the check box next to the Host Address entry and click Delete.

3. Click Yes.

Syslog Targets

ClearPass Policy Manager can export session data (see

Live Monitoring: Access Tracker on page 29

), audit records (see

Audit Viewer on page 61 ) and event records (see

Event Viewer on page 63

). This information can be sent to one or more syslog targets (servers). You configure syslog targets from this page. To configure syslog target, navigate to Administration > External Servers > Syslog Targets.

This section describes the following topics: l l l

Syslog Targets Main Page on page 474

Adding a Syslog Target on page 474

Importing a Syslog Target on page 475

ClearPass Policy Manager 6.5 | User Guide Administration | 473

l l l

Exporting All Syslog Target on page 476

Exporting a Syslog Target on page 477

Exporting a Syslog Target on page 477

Syslog Targets Main Page

The following figure displays the Syslog Targets page:

Figure 454: Syslog Targets Page

The following table describes the Syslog Targets parameters:

Table 271: Syslog Targets Parameters

Parameter Description

Add Opens the Add Syslog Target pop-up.

Import

Export All

Export

Delete

Opens the Import from file pop-up. You can import the syslog target from a file.

Opens the Export to file pop-up. You can export all the syslog target entries to a file.

Opens the Export to file pop-up. With this option, you can export individual syslog targets.

Deletes a syslog target server.

Adding a Syslog Target

To add a syslog target:

1. Navigate to Administration > External Servers > Syslog Targets.

2. Click the Add link on the top right section of the page. Enter the details based on

Table 272

.

3. Click Save.

474 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Add Syslog Target pop-up:

Figure 455: Add Syslog Target Pop-up

The following table describes the Add Syslog Target parameters:

Table 272: Add Syslog Target Parameters

Parameter Description

Host Address

Description

Syslog server hostname or IP address.

Enter a short description of the syslog server.

Protocol

Server Port

Select one of the following options: l UDP: This option reduces overhead and latency.

l

TCP: this option provides error checking and packet delivery validation.

Port number for sending the syslog messages. Default port number is 514.

Importing a Syslog Target

To import a syslog target:

1. Navigate to Administration > External Servers > Syslog Targets.

2. Click the Import link on the top right section of the page. Enter the details based on

Table 273 .

3. Click Import.

ClearPass Policy Manager 6.5 | User Guide Administration | 475

The following figure displays the Import from file pop-up:

Figure 456: Import from file Pop-up

The following table describes the Import from file parameters:

Table 273: Import from file Parameters

Parameter Description

Select File Browse to the Syslog Target configuration file to be imported.

Enter secret for the file (if any) If the file was exported with a secret key for encryption, enter the same key here.

Exporting All Syslog Target

To export all syslog targets:

1. Navigate to Administration > External Servers > Syslog Targets.

2. Click the Export All link on the top right section of the page. Enter the details based on

Table 274

.

3. Click Export.

4. Enter the XML file name in the Save As dialog box.

5. Click Save.

476 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Export to file pop-up:

Figure 457: Export to file Pop-up

The following table describes the Export to file parameters:

Table 274: Export to file Parameters

Parameter Description

Export file with password protection

Choose Yes to export the file with password protection.

Secret Key

Verify Secret

Enter the secret key.

Re-enter the secret key.

Exporting a Syslog Target

To export a syslog target:

1. Navigate to Administration > External Servers > Syslog Targets.

2. Select the Host Address from the list of check boxes and click Export. Enter the details based on

Table

274 .

3. Enter the name of the XML file in the Save As dialog.

4. Click Save.

The following figure displays the Export to file pop-up:

Figure 458: Export to file Pop-up

ClearPass Policy Manager 6.5 | User Guide Administration | 477

The following table describes the Export to file parameters:

Table 275: Export to file Parameters

Parameter Description

Export file with password protection

Choose Yes to export the file with password protection.

Secret Key

Verify Secret

Enter the secret key.

Re-enter the secret key.

Deleting a Syslog Target

To delete a syslog target:

1. Navigate to Administration > External Servers > Syslog Targets.

2. Click the check box next to the Host Address entry and click Delete.

3. Click Yes.

Syslog Export Filters

Policy Manager can export session data (see

Live Monitoring: Access Tracker on page 29 ), audit records (see

Audit Viewer on page 61

) and event records (see

Event Viewer on page 63 ). You configure syslog export filters

to instruct Policy Manager where to send this information, and what kind of information should be sent through data filters. To configure syslog export filters, navigate to Administration > External Servers >

Syslog Export Filters.

This section describes the following topics: l l l l l l

Syslog Export Filters Main Page on page 479

Adding a Syslog Export Filter: n n n

General Tab on page 480

Filter and Columns Tab on page 484

Summary Tab on page 487

Importing a Syslog Filter on page 487

Exporting All Syslog Filter on page 488

Exporting a Syslog Filter on page 489

Deleting a Syslog Filter on page 490

478 | Administration ClearPass Policy Manager 6.5 |  User Guide

Syslog Export Filters Main Page

The following figure displays the Syslog Export Filters page:

Figure 459: Syslog Export Filters Page

The following table describes the Syslog Export Filters parameters:

Table 276: Syslog Export Filters Page Parameters

Parameter Description

Add Add a syslog export filter.

Import

Export All

Enable/Disable

Export

Delete

Opens Import from file pop-up. You can import the syslog export filters from a file.

Opens Export to file pop-up. You can export all the syslog export filter entries to a file.

Enable or disable the syslog filter.

Opens the Export to file pop-up. With this option, you can export individual syslog export filters.

Deletes a syslog export filter.

ClearPass Policy Manager 6.5 | User Guide Administration | 479

Adding a Syslog Export Filter

To add a syslog export filter, follow the instructions described below.

General Tab

This section describes the parameters in the General tab of the Administration > External Servers >

Syslog Export Filters > Add page. The following figure displays the Syslog Export Filters - General tab:

Figure 460: Syslog Export Filters - General Tab

The Filter and Columns tab shown in the figure above is only visible if you select Insight Logs or Session Logs as the export template in the General tab. For more information, see

Filter and Columns Tab on page 484 .

The following table describes the Syslog Export Filters - General tab parameters:

Table 277: Syslog Export Filters - General Tab Parameters

Parameter Description

Name Enter the name of the syslog export filter.

Description Enter the description that provides additional information about the syslog export filter.

Export

Template

Select any one of the templates from the following options: l Audit Records l l

Insight Logs

Session Logs l System Events

NOTE: If you select Insight Logs or Session Logs, the Filter and Columns tab is enabled. For more information, see

Filter and Columns Tab on page 484 .

480 | Administration ClearPass Policy Manager 6.5 |  User Guide

Table 277: Syslog Export Filters - General Tab Parameters (Continued)

Parameter Description

Export

Event

Format

Type

Select any one of the export event formats from the following options: l Standard – Select this event format type to send the event types in raw syslog format. This is the default event format type.

l LEEF - Select this event format type to send the event types in Log Enhanced Event Format

(LEEF).

l CEF - Select this event format type to send the event types in Common Event Format (CEF).

For sample event format types, see

Export Event Format Types - Examples on page 481 .

Syslog

Servers

ClearPass

Servers

Syslog servers define the receivers of syslog messages sent by servers in the ClearPass cluster.

l To add a syslog server, select it from the --Select to Add-- drop-down list.

l l l

To view details about a syslog server, select the syslog server, then click View Details.

To change details about a syslog server, select the syslog server, then click Modify. For information about syslog server details, see

Adding a Syslog Target on page 474

To remove a syslog server (from receiving syslog messages), select the syslog server, then click

Remove.

If the syslog server does not appear in the drop-down list, you can click Add new Syslog target. For more information about syslog target, see

Adding a Syslog Target on page 474

for more information.

You can designate syslog messages to be sent from exactly one server in the ClearPass cluster or from all of them.

l

To add a ClearPass server, select it from the Select to Add drop-down list.

l To remove the ClearPass server, select the ClearPass server, then click Remove.

NOTE: When no servers are listed, syslog messages are sent from all servers in the cluster.

Export Event Format Types - Examples

This section shows few examples of Standard, LEEF, and CEF event format types for the syslog export filter templates.

The following example describes the Standard event format type for the Audit Events syslog export filter template:

Mar 20 21:18:56 10.17.5.228 2015-01-19 21:19:50,118 10.17.5.228 Audit Logs 96 1 0

TimestampFormat=yyyy-MM-dd

HH:mm:ss,S,User=clusteradmin,Category=Endpoint,Action=ADD,EntityName=34a39527afc0,src=10.17.5.

228,Timestamp=Jan 19, 2015 21:18:54 IST

Mar 20 21:20:56 10.17.5.228 2015-01-19 21:21:50,111 10.17.5.228 Audit Logs 97 1 0

TimestampFormat=yyyy-MM-dd HH:mm:ss,S,User=admin,Category=Cluster-wide

Parameter,Action=MODIFY,EntityName=Endpoint Context Servers polling interval,src=10.17.5.228,Timestamp=Jan 19, 2015 21:20:22 IST

Mar 21 09:28:59 10.17.5.228 2015-01-20 09:29:54,3 10.17.5.228 Audit Logs 99 1 0

TimestampFormat=yyyy-MM-dd HH:mm:ss,S,User=admin,Category=Network

Device,Action=REMOVE,EntityName=1.1.1.1,src=10.17.5.228,Timestamp=Jan 20, 2015 09:29:13 IST

The following example describes the Standard event format type for the System Events syslog export filter template:

Mar 21 16:46:29 10.17.5.228 2015-01-20 16:47:23,880 10.17.5.228 System Events 0 1 0

TimestampFormat=yyyy-MM-dd HH:mm:ss,S,Description=User: arubasupport\nClient IP Address:

10.20.23.178,Category=Logged in,Action=None,Level=INFO,src=10.17.5.228,Component=Support

Shell,Timestamp=Jan 20, 2015 16:45:59 IST

Mar 21 16:49:10 10.17.5.228 2015-01-20 16:50:05,210 10.17.5.228 System Events 1 1 0

TimestampFormat=yyyy-MM-dd HH:mm:ss,S,Description='Failed to start ClearPass Virtual IP

ClearPass Policy Manager 6.5 | User Guide Administration | 481

service',Category=start,Action=Failed,Level=WARN,src=10.17.5.228,Component=ClearPass Virtual

IP service,Timestamp=Jan 20, 2015 16:48:53 IST

2015-01-20 16:50:05,210 [pool-6-thread-1] [R:] DEBUG com.avenda.tips.syslog.Syslogger - 2015-

01-20 16:50:05,210 10.17.5.228 System Events 2 1 0 TimestampFormat=yyyy-MM-dd

HH:mm:ss,S,Description=Performed action stop on cpass-domain-server_

CPATS,Category=stop,Action=Success,Level=INFO,src=10.17.5.228,Component=cpass-domain-server_

CPATS,Timestamp=Jan 20, 2015 16:48:57 IST

2015-01-20 16:50:05,211 [pool-6-thread-1] [R:] DEBUG com.avenda.tips.syslog.Syslogger - 2015-

01-20 16:50:05,211 10.17.5.228 System Events 3 1 0 TimestampFormat=yyyy-MM-dd

HH:mm:ss,S,Description=Performed action start on cpass-domain-server_

CPATS,Category=start,Action=Success,Level=INFO,src=10.17.5.228,Component=cpass-domain-server_

CPATS,Timestamp=Jan 20, 2015 16:49:00 IST

The following example describes the Standard event format type for the Session Events syslog export filter template:

Mar 21 16:31:49 10.17.5.211 2015-01-20 16:32:41,552 10.17.5.211 Radius Session Logs 4 1 0

Common.NAS-IP-Address=10.17.4.7,RADIUS.Acct-Delay-Time=null,RADIUS.Acct-Framed-IP-

Address=null,RADIUS.Auth-Source=AD:win2008R2-64bit.bangalore.avendasys.com,RADIUS.Acct-

Timestamp=null,RADIUS.Acct-Authentic=null,RADIUS.Auth-Method=EAP-PEAP,EAP-

MSCHAPv2,Common.Host-MAC-Address=58a2b5d05ac9,RADIUS.Acct-Termination-Cause=null,RADIUS.Acct-

Service-Name=null,RADIUS.Acct-Session-Time=null,TimestampFormat=yyyy-MM-dd

HH:mm:ss,S,RADIUS.Acct-NAS-Port=null,Common.Username=test1,RADIUS.Acct-Session-

Id=null,RADIUS.Acct-Called-Station-Id=null,RADIUS.Acct-NAS-Port-

Type=null,src=10.17.5.211,RADIUS.Acct-NAS-IP-Address=null,Common.Service=Test Post

Authentication Rules,RADIUS.Acct-Input-Pkts=null,RADIUS.Acct-Status-Type=null,RADIUS.Acct-

Calling-Station-Id=null,Common.Request-Timestamp=2015-01-20 16:31:46+05:30,RADIUS.Acct-Output-

Pkts=null,RADIUS.Acct-Output-Octets=null,RADIUS.Acct-Username=null,RADIUS.Acct-Input-

Octets=null

Mar 21 16:31:49 10.17.5.211 2015-01-20 16:32:41,550 10.17.5.211 Radius Session Logs 3 2 0

Common.NAS-IP-Address=10.17.4.7,RADIUS.Acct-Delay-Time=0,RADIUS.Acct-Framed-IP-

Address=10.17.4.148,RADIUS.Auth-Source=AD:win2008R2-64bit.bangalore.avendasys.com,RADIUS.Acct-

Timestamp=2015-01-20 16:31:50+05:30,RADIUS.Acct-Authentic=RADIUS,RADIUS.Auth-Method=EAP-

PEAP,EAP-MSCHAPv2,Common.Host-MAC-Address=e0f8471a5450,RADIUS.Acct-Termination-

Cause=null,RADIUS.Acct-Service-Name=null,RADIUS.Acct-Session-Time=null,TimestampFormat=yyyy-

MM-dd HH:mm:ss,S,RADIUS.Acct-NAS-Port=0,Common.Username=test1,RADIUS.Acct-Session-

Id=test1E0F8471A5450-54BE336C,RADIUS.Acct-Called-Station-Id=000B8661CD70,RADIUS.Acct-NAS-Port-

Type=Wireless-802.11,src=10.17.5.211,RADIUS.Acct-NAS-IP-Address=10.17.4.7,Common.Service=Test

Post Authentication Rules,RADIUS.Acct-Input-Pkts=null,RADIUS.Acct-Status-

Type=Start,RADIUS.Acct-Calling-Station-Id=E0F8471A5450,Common.Request-Timestamp=2015-01-20

16:31:45+05:30,RADIUS.Acct-Output-Pkts=null

Mar 21 16:35:58 10.17.5.228 2015-01-20 16:36:52,346 10.17.5.228 Tacacs authetnications 2 1 0

TACACS.Request-Type=TACACS_AUTHORIZATION,TACACS.Enforcement-Profiles=[TACACS Super

Admin],TACACS.Acct-Flags=null,TACACS.Authen-Service=AUTHEN_SVC_NONE,TACACS.Acct-Session-

Id=null,TACACS.Remote-Address=10.20.23.178,Common.Request-Timestamp=2015-01-20

16:34:54.647+05:30,TimestampFormat=yyyy-MM-dd HH:mm:ss,S,TACACS.Authen-Action=,TACACS.Authen-

Method=AUTHEN_METH_TACACSPLUS,Common.Username=a,TACACS.Authen-Type=AUTHEN_TYPE_

PAP,TACACS.Auth-Source=[Local User Repository],src=10.17.5.228,TACACS.Privilege-

Level=1,Common.Service=[Policy Manager Admin Network Login Service]

Mar 21 16:35:58 10.17.5.228 2015-01-20 16:36:52,346 10.17.5.228 Tacacs authetnications 3 1 0

TACACS.Request-Type=TACACS_AUTHENTICATION,TACACS.Enforcement-Profiles=[TACACS Super

Admin],TACACS.Acct-Flags=null,TACACS.Authen-Service=AUTHEN_SVC_NONE,TACACS.Acct-Session-

Id=null,TACACS.Remote-Address=10.20.23.178,Common.Request-Timestamp=2015-01-20

16:34:54.647+05:30,TimestampFormat=yyyy-MM-dd HH:mm:ss,S,TACACS.Authen-Action=AUTHEN_ACTION_

LOGIN,TACACS.Authen-Method=AUTHEN_METH_TACACSPLUS,Common.Username=a,TACACS.Authen-Type=AUTHEN_

TYPE_PAP,TACACS.Auth-Source=[Local User Repository],src=10.17.5.228,TACACS.Privilege-

Level=1,Common.Service=[Policy Manager Admin Network Login Service]

The following example describes the Standard event format type for the Session Events syslog export filter template:

Mar 21 16:59:12 10.17.5.211 2015-01-20 17:00:04,745 10.17.5.211 Insight Events 0 1 0

Auth.Username=keerthi,Auth.Request-Timestamp=2015-01-20 16:56:17+05:30,Auth.Source=Bangalore

AD,Auth.Auth-Username=keerthi,Auth.Protocol=RADIUS,Auth.Request-Id=R0000000b-01-

54be3b58,Auth.NAS-Port=null,Auth.SSID=cppm-dot1x-test,TimestampFormat=yyyy-MM-dd

HH:mm:ss,S,Auth.NAS-Port-Type=19,Auth.Roles=[User Authenticated],Auth.Service=Test Post

482 | Administration ClearPass Policy Manager 6.5 |  User Guide

Authentication Rules,Auth.NAS-IP-

Address=10.17.4.7,src=10.17.5.211,Auth.CalledStationId=000B8661CD70,Auth.NAS-

Identifier=ClearPassLab3600

Mar 21 16:57:24 10.17.5.228 2015-01-20 16:58:18,909 10.17.5.228 Test Syslogs 0 1 0

TimestampFormat=yyyy-MM-dd HH:mm:ss,S,Endpoint.Status=null,Endpoint.Device-Name=Mac OS

X,Endpoint.Device-Family=Apple Mac,Endpoint.Device-Category=Computer,Endpoint.MAC-

Address=e0f8471a5450,src=10.17.5.228,Endpoint.Hostname=apples-air,Endpoint.Added-At=2015-01-19

17:06:51+05:30,Endpoint.MAC-Vendor=Apple,Endpoint.Fingerprint={"dhcp": {"option55":

["1,3,6,15,119,95,252,44,46"], "options": ["53,55,57,61,50,51,12"]}},Endpoint.Updated-At=2015-

01-20 16:55:37+05:30

The following example describes the LEEF event format type for the Insight Logs syslog export filter template:

Dec 03 2014 16:50:44.085 IST 10.17.4.208 LEEF:1.0|Aruba Networks|ClearPass|6.5.0.69058|0-1-

0|Auth.Username=host/Asif-Test-PC2 Auth.Authorization-Sources=null Auth.Login-Status=216

Auth.Request-Timestamp=2014-12-03 16:48:41+05:30 Auth.Protocol=RADIUS Auth.Source=null

Auth.Enforcement-Profiles=[Allow Access Profile] Auth.NAS-Port=null Auth.SSID=cppm-dot1x-test

TimestampFormat=MMM dd yyyy HH:mm:ss.SSS z Auth.NAS-Port-Type=19 Auth.Error-Code=216

Auth.Roles=null Auth.Service=Test Wireless Auth.Host-MAC-Address=6817294b0636

Auth.Unhealthy=null Auth.NAS-IP-Address=10.17.4.7 src=10.17.4.208

Auth.CalledStationId=000B8661CD70 Auth.NAS-Identifier=ClearPassLab3600

The following example describes the CEF event format type for the Insight Logs syslog export filter template:

Dec 03 2014 16:31:28.861 IST 10.17.4.208 CEF:0|Aruba Networks|ClearPass|6.5.0.69058|0-1-

0|Insight Logs|0|Auth.Username=host/Asif-Test-PC2 Auth.Authorization-Sources=null Auth.Login-

Status=216 Auth.Request-Timestamp=2014-12-03 16:28:20+05:30 Auth.Protocol=RADIUS

Auth.Source=null Auth.Enforcement-Profiles=[Allow Access Profile] Auth.NAS-Port=null

Auth.SSID=cppm-dot1x-test TimestampFormat=MMM dd yyyy HH:mm:ss.SSS zzz Auth.NAS-Port-Type=19

Auth.Error-Code=216 Auth.Roles=null Auth.Service=Test Wireless Auth.Host-MAC-

Address=6817294b0636 Auth.Unhealthy=null Auth.NAS-IP-Address=10.17.4.7 src=10.17.4.208

Auth.CalledStationId=000B8661CD70 Auth.NAS-Identifier=ClearPassLab3600

The following example describes the CEF event format type for the Audit Logs syslog export filter template:

Nov 19 2014 18:22:40.700 IST 10.17.4.221 CEF:0|Aruba Networks|ClearPass|6.5.0.68754|13-1-

0|Audit Records|5|cat=Role timeFormat=MMM dd yyyy HH:mm:ss.SSS zzz rt=Nov 19, 2014 18:21:13

IST src=Test Role 10 act=ADD usrName=admin

The following example describes the LEEF event format type for the Audit Logs syslog export filter template:

Nov 19 2014 14:31:10.422 IST 10.17.4.221 LEEF:1.0|Aruba Networks|ClearPass|6.5.0.68754|0-1-

0|cat=Syslog Export Data devTime=Nov 19, 2014 14:30:35 IST action=ADD src=Audit Events - LEEF usrName=admin devTimeFormat=MMM dd yyyy HH:mm:ss.SSS z

The following example describes the CEF event format type for the System Events syslog export filter template:

Nov 19 2014 17:15:52.348 IST 10.17.4.221 CEF:0|Aruba Networks|ClearPass|6.5.0.68754|0-1-

0|System Events|10|cat=WebService Error level=ERROR description=No valid subscription

ID\nCheck Subscription ID, Network Connectivity, http_proxy credentials.\nClick on 'Check

Status Now' after correcting the configuration. timeFormat=MMM dd yyyy HH:mm:ss.SSS zzz rt=Nov

19, 2014 17:15:12 IST src=ClearPass Firmware Update Checker act=None

The following example describes the LEEF event format type for the System Events syslog export filter template:

Dec 02 2014 20:38:40.901 IST 10.17.4.206 LEEF:1.0|Aruba Networks|ClearPass|6.5.0.68878|295-1-

0|cat=start devTime=Dec 02, 2014 20:38:12 IST level=WARN description='Failed to start

ClearPass Virtual IP service' action=Failed src=ClearPass Virtual IP service devTimeFormat=MMM dd yyyy HH:mm:ss.SSS z

ClearPass Policy Manager 6.5 | User Guide Administration | 483

The following example describes the CEF event format type for the Session Logs syslog export filter template:

Dec 01 2014 15:28:40.540 IST 10.17.4.206 CEF:0Aruba Networks|ClearPass|6.5.0.68878|1604-1-

0|Session Logs|0|RADIUS.Acct-Calling-Station-Id=00:32:b6:2c:28:95 RADIUS.Acct-Framed-IP-

Address=192.167.230.129 RADIUS.Auth-Source=AD:10.17.4.130 RADIUS.Acct-Timestamp=2014-12-01

15:26:43+05:30 RADIUS.Auth-Method=PAP RADIUS.Acct-Service-Name=Authenticate-Only RADIUS.Acct-

Session-Time=3155 TimestampFormat=MMM dd yyyy HH:mm:ss.SSS zzz RADIUS.Acct-NAS-Port=0

RADIUS.Acct-Session-Id=R00001316-01-547c3b5a RADIUS.Acct-NAS-Port-Type=Wireless-802.11

RADIUS.Acct-Output-Octets=578470212 RADIUS.Acct-Username=A_user2 RADIUS.Acct-NAS-IP-

Address=10.17.6.124 RADIUS.Acct-Input-Octets=786315664

The following example describes the LEEF event format type for the Session Logs syslog export filter template:

Dec 02 2014 15:35:14.944 IST 10.17.4.206 LEEF:1.0Aruba Networks|ClearPass|6.5.0.68878|1309854-

1-0|RADIUS.Acct-Calling-Station-Id=00:88:57:2d:12:a4 RADIUS.Acct-Framed-IP-

Address=192.167.203.170 RADIUS.Auth-Source=AD:10.17.4.130 RADIUS.Acct-Timestamp=2014-12-02

15:32:47+05:30 RADIUS.Auth-Method=PAP RADIUS.Acct-Service-Name=Authenticate-Only RADIUS.Acct-

Session-Time=565 TimestampFormat=MMM dd yyyy HH:mm:ss.SSS z RADIUS.Acct-NAS-Port=0

RADIUS.Acct-Session-Id=R000a5038-01-547d8e47 RADIUS.Acct-NAS-Port-Type=Wireless-802.11

RADIUS.Acct-Output-Octets=412895267 RADIUS.Acct-Username=A_user706 RADIUS.Acct-NAS-IP-

Address=10.17.6.124 RADIUS.Acct-Input-Octets=665942581

Filter and Columns Tab

This section describes the parameters in the Filter and Columns tab of the Administration > External

Servers > Syslog Export Filters > Add page. This tab provides two methods for configuring data filters and is only visible if you select Insight Logs or Session Logs as the export template in the General tab.

Insight Logs

This section describes the options if you select Insight Logs as the export template in the General tab.

The Insight Logs option is enabled only if the Enable Insight check box is selected from the Administration >

Server Manager > Server Configuration > System tab.

The following figure displays the Syslog Export Filters - Filter and Columns (Insight Logs) tab.

Figure 461: Syslog Export Filters - Filter and Columns (Insight Logs) Tab

The data collection interval for Insight logs is -4 to -2 minutes from the current time.

484 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following table describes the Syslog Export Filters - Filter and Columns (Insight Logs) tab parameters:

Table 278: Syslog Export Filters - Filter and Columns (Insight Logs) Tab Parameters

Parameter Description

Columns

Selection

Determine the group of reports that you want to include in the syslog filters. The column selection limits the type of records sent to the syslog filters.

NOTE: You can add only the Insight reports that are already created in Insight. You cannot create a new data filter for Insight logs.

Predefined

Field

Groups

Available

Columns

Type

Select the predefined Insight reports that are grouped for a quick addition.

Displays the reports specific to the group selected in the Columns Selection field.

Selected

Columns

Select the type of records from the drop-down list to filter the records. This provides additional filtering option based on the type of records.

After you select an entry from the Available Columns list, click >> to add the selected entry to the

Selected Columns list. Click << to remove an entry from the Selected Columns list.

Session Logs

This section describes the options if you select Session Logs as the export template in the General tab. On selecting Session Logs, the following options are available: l l

Option 1 allows you to choose from pre-defined field groups and to select columns based on the Type.

Option 2 allows you to create a custom SQL query. You can view a sample template for the custom SQL by clicking the link below the text entry field.

It is recommended to contact support if you choose the option 2. Support can assist you with entering the correct information in this template.

ClearPass Policy Manager 6.5 | User Guide Administration | 485

The following figure displays the Syslog Export Filters - Filter and Columns (Session Logs) tab.

Figure 462: Syslog Export Filters - Filter and Columns (Session Logs) Tab

The following table describes the Syslog Export Filters - Filter and Columns (Session Logs) tab parameters:

Table 279: Syslog Export Filters - Filter and Columns (Insight Logs) Tab Parameters

Parameter Description

Data Filter Specify the data filter. The data filter limits the type of records sent to the syslog target.

Modify/ Add new Data filter

Modify the selected data filter, or add a new one. Specifying a data filter filters the rows that are sent to the syslog target. You may also select the columns that are sent to the syslog target. For more information on adding a data filer, see

Adding a Filter on page 66 .

Columns

Selection

The column selection limits the type of columns sent to the syslog target.

There are predefined field groups, which are column names grouped together for quick addition to the report. For example, Logged in users field group has seven predefined columns. When you click

Logged in users the seven columns automatically appear in the Selected Columns list.

Additional fields are available to add to the reports. You can select the type of attributes (which are the different table columns available in the session database) from the Available Columns Type drop down list. Policy Manager populates these column names by extracting the column names from existing sessions in the session database. After you select an entry from the Available

Columns list, click >> to add the selected entry to the Selected Columns list. Click << to remove an entry from the Selected Columns list.

Custom SQL Specify custom SQL query for export. This option is for advanced use cases.

NOTE: It is recommended to contact support if you choose this option. Support can assist you with entering the correct information in this template.

486 | Administration ClearPass Policy Manager 6.5 |  User Guide

Summary Tab

This section describes the parameters in the Summary tab of the Administration > External Servers >

Syslog Export Filters > Add page. The following figure displays the Syslog Export Filters - Summary tab.

Figure 463: Syslog Export Filters - Summary Tab

The following table describes the Syslog Export Filters - Summary tab parameters:

Table 280: Syslog Export Filters - Summary Tab Parameters

Parameter Description

General

Name

Description

Displays the name of the syslog export filter.

Displays the description that provides additional information about the syslog export filter.

Displays the template selected as the export template.

Export

Template

Syslog Servers Displays the IP address of the syslog server selected during configuration.

ClearPass

Servers

Displays the IP address of the ClearPass servers selected during configuration.

Filter and Columns

Data Filter

Columns

Selection

Custom SQL

Displays the data filter selected when configuring option 1 in the Filter and Columns tab.

Displays the predefined field groups and available columns type selected when configuring option 1 in the Filter and Columns tab.

Displays the SQL query selected when configuring option 2 in the Filter and Columns tab.

Importing a Syslog Filter

To import a syslog target:

ClearPass Policy Manager 6.5 | User Guide Administration | 487

1. Navigate to Administration > External Servers > Syslog Export Filters.

2. Click the Import link on the top right section of the page. Enter the details based on

Table 281 .

3. Click Import.

The following figure displays the Import from file pop-up:

Figure 464: Import from file Pop-up

The following table describes the Import from file parameters:

Table 281: Import from file Parameters

Parameter Description

Select File Browse to the Syslog Filter configuration file to be imported.

Enter secret for the file (if any) If the file was exported with a secret key for encryption, enter the same key here.

Exporting All Syslog Filter

To export all syslog filters:

1. Navigate to Administration > External Servers > Syslog Export Filters.

2. Click the Export All link on the top right section of the page. Enter the details based on

Table 282

.

3. Click Export.

4. Enter the XML file name in the Save As dialog box.

5. Click Save.

488 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Export to file pop-up:

Figure 465: Export to file Pop-up

The following table describes the Export to file parameters:

Table 282: Export to file Parameters

Parameter Description

Export file with password protection

Choose Yes to export the file with password protection.

Secret Key

Verify Secret

Enter the secret key.

Re-enter the secret key.

Exporting a Syslog Filter

To export a syslog filter:

1. Navigate to Administration > External Servers > Syslog Export Filters.

2. Select the Host Address from the list of check boxes and click Export. Enter the details based on

Table

283 .

3. Enter the name of the XML file in the Save As dialog.

4. Click Save.

The following figure displays the Export to file pop-up:

Figure 466: Export to file Pop-up

ClearPass Policy Manager 6.5 | User Guide Administration | 489

The following table describes the Export to file parameters:

Table 283: Export to file Parameters

Parameter Description

Export file with password protection

Choose Yes to export the file with password protection.

Secret Key

Verify Secret

Enter the secret key.

Re-enter the secret key.

Deleting a Syslog Filter

To delete a syslog filter:

1. Navigate to Administration > External Servers > Syslog Export Filters.

2. Click the check box next to the syslog filter entry and click Delete.

3. Click Yes.

Messaging Setup

The messaging setup provides an interface to configure the Simple Mail Transfer Protocol (SMTP) server for email and SMS notifications. To configure messaging, navigate to Administration > External Servers >

Messaging Setup. Click the Configure SMS Gateway link at the top right section of the page to configure a new SMS gateway using the ClearPass Guest portal.

The following figure displays the Messaging - SMTP Server tab:

Figure 467: Messaging - SMTP Server Tab

490 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following table describes the Messaging - SMTP Server tab parameters:

Table 284: Messaging - SMTP Server Tab Parameters

Parameter Description

Server name Enter the Fully Qualified Domain Name (FQDN) or the IP address of the SMTP server.

User Name

Password

Verify Password

Default From address

Enter the username if your email server requires authentication for sending email messages.

Enter the password for the specified username.

Re-enter the password.

Enter the email address that must to be displayed as sender’s address in the message.

Connection Security To establish the communication with the server, select from one of the following options: l None - Select this option to disable secure communication with the server.

l l

SSL - Select this option to have a Secured Socket Layer communication with the server.

Start TLS - Select this option to have a Transport Layer Security communication with the server.

Port Enter the TCP port number that the SNMP server listens on. The default value of the port is

25.

Connection timeout Enter the timeout value for connection to the server (in seconds). The default value is 30 seconds.

Click Send Test Email to send a test mail to the preferred email address. The following figure displays the

Send Test Email pop-up:

Figure 468: Send Test Email Pop-up

Click Send Test SMS to send a test SMS message to the preferred mobile phone number. The following figure displays the Send Test SMS pop-up:

ClearPass Policy Manager 6.5 | User Guide Administration | 491

Figure 469: Send Test SMS Pop-up

The recipient's mobile number must be entered in the international format consisting of a + sign, followed by the country code and the mobile phone number (without the first ‘0′ of the number). Number must be entered without spaces and only numbers (with an exception of the + sign) are allowed. For example, the US number

(248) 123-7654 is entered as +12481237654. The number 1 is the country code for the US.

Endpoint Context Servers

This section describes the following topics: l l l l l l l l

Introduction

Endpoint Context Servers Page on page 492

Adding an Endpoint Context Server on page 493

Importing an Endpoint Context Server on page 494

Exporting All Endpoint Context Servers on page 495

Importing an Endpoint Context Server on page 494

Polling an Endpoint Context Server on page 501

Deleting an Endpoint Context Server on page 501

Introduction

ClearPass Policy Manager provides the ability to collect endpoint profile information from different types of

Aruba IAPs and RAPs via Aruba Activate.

The mobile device management (MDM) platforms run on MDM servers. These servers provision mobile devices to configure connectivity settings, enforce security policies, restore lost data, and other administrative services.

Information gathered from mobile devices can include policy breaches, data consumption, and existing configuration settings.

Endpoint Context Servers Page

1. To access the Endpoint Context Servers page, navigate to Administration > External Servers >

Endpoint Context Servers.

The Endpoint Context Servers page appears:

492 | Administration ClearPass Policy Manager 6.5 |  User Guide

Figure 470: Endpoint Context Servers Page

The following table describes the Endpoint Context Servers parameters:

Table 285: Endpoint Context Servers Parameters

Parameter Description

Server Name

Server Type

Displays the name of the endpoint context server.

Displays the type of the endpoint context server.

Status

Trigger Poll

Displays the status of the endpoint context server: Enabled or Disabled. For non-MDM servers, the status is always displayed as Disabled.

Click this button to poll an endpoint context server.

Adding an Endpoint Context Server

To add an endpoint context server:

1. Navigate to Administration > External Servers > Endpoint Context Servers.

2. Click the Add link at the top right section of the page.

The Add Endpoint Context Server dialog appears.

The fields and parameters that are displayed in the Add Endpoint Context Server dialog vary depending on which Server Type you select (see

Figure 471

).

ClearPass Policy Manager 6.5 | User Guide Administration | 493

Figure 471: Adding an Endpoint Context Server

3. In the Add Endpoint Context Server dialog, enter the details based on

Table 286

.

4. Click Save.

Table 286

describes the Add Endpoint Context Servers parameters:

Table 286: Add Endpoint Context Servers Parameters

Parameter Description

Select Server

Type

Choose one of the server types from the following options. The server type you select determines the configuration parameters. For example, if you select the airwatch server type, you must enter an API Key parameter. Click each server type link below for more information on configuration parameters.

l l

AirWatch

Aruba Activate

l l l l l l l l

AirWave

Google Admin Console

Generic HTTP

JAMF

MaaS360

MobileIron

Palo Alto Networks Firewall

Palo Alto Networks Panorama

l l

SAP Afaria

SOTI

l

XenMobile

NOTE: You can add more than one endpoint context server of the same type.

Importing an Endpoint Context Server

To import an endpoint context server:

1. Navigate to Administration > External Servers > Endpoint Context Servers.

494 | Administration ClearPass Policy Manager 6.5 |  User Guide

2. Click the Import link on the top right section of the page.

3. Enter the parmeters based on

Table 287 .

4. Click Import.

Figure 472

displays the Import from File dialog:

Figure 472: Import from File Dialog

The following table describes the Import from file parameters:

Table 287: Import from File Dialog Parameters

Parameter Description

Select File Browse to the Endpoint Context Server configuration file to be imported.

Enter secret for the file (if any) If the file was exported with a secret key for encryption, enter the same key here.

Exporting All Endpoint Context Servers

To export all endpoint context servers:

1. Navigate to Administration > External Servers > Endpoint Context Servers.

2. Click the Export All link on the top right section of the page. Enter the details based on .

3. Click Export.

4. Enter the XML file name in the Save As dialog box.

5. Click Save.

The following figure displays the Export to file dialog:

Figure 473: Export to file Dialog

ClearPass Policy Manager 6.5 | User Guide Administration | 495

The following table describes the Export to file parameters:

Table 288: Export to File Dialog Parameters

Parameter Description

Export file with password protection

Choose Yes to export the file with password protection.

Secret Key

Verify Secret

Enter the secret key.

Re-enter the secret key.

Modifying an Endpoint Context Server

To modify an endpoint context server:

1. Navigate to Administration > External Servers > Endpoint Context Servers.

2. In the Endpoint Context Servers main page, click the desired server name entry.

3. In the Modify Endpoint Context Server dialog, enter the details based on

Table 286 .

4. Click Update.

The tabs appear when you add or modify an endpoint context server will vary depends on the endpoint context server selected.

Server Tab

Use the Server tab to modify the server name, Server base URL, and API key. You can also use this tab to validate the server certificate and to bypass proxy servers. The following figure displays the Modify Endpoint

Context Server dialog:

Figure 474: Modify Endpoint Context - Server Dialog

496 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following table describes the Modify Endpoint Context - Server parameters:

Table 289: Modify Endpoint Context - Server Parameters

Parameter Description

Server Type Select the type of the endpoint context server.

Server Name

Server Base URL

Username

Password

API Key

Validate Server

Enable Server

Bypass Proxy

Enter the name of the server or host.

Enter the full URL for the server. The default is the name you entered above with

"https://" prepended. You can append a custom port, such as for an MDM server: https://yourserver.yourcompany.com:customerportnumber .

Enter the username.

Enter the password.

Enter the API key that was provided by the vendor. This field is not displayed for all endpoint context servers.

Select the Enable to validate the server certificate check box to validate. By default, this field is disabled.

Checking this option enables the Certificate tab.

Select the Enable to fetch endpoints from the server check box to enable the endpoint context server. By default, this field is disabled. The Bypass Proxy field is enabled only if you enable this field.

Checking this option enables the Poll Status tab.

Select the Enable to bypass proxy server check box to bypass the proxy server.

An administrator can select this option to specify that the endpoint context server should not use the configured proxy settings (if a proxy is used). ClearPass then bypass the proxy for functions such MDM API, Endpoint Context Server Actions, or Generic HTTP outbound enforcement. When this field is enabled, the proxy servers configured in the Administration > Server Manager > Server

Configuration > Service Parameters tab > ClearPass system services service page will be bypassed. The server discovery occurs without any issues even when the proxy servers are bypassed. By default, this field is disabled. You must enable the Enable Server field to enable this field.

Poll Status Tab

Use the Poll Status tab to view the status of the polling: Success or Failure.

Selecting the Enable Server option on the Server dialog enables the Poll Status tab.

The parameters that appear in the Poll Status tab varies depending on whether the polling status is success or

failure. A minimum of one successful polling should have occurred to view the Success polling status from the

Poll Status tab.

The following figure displays the successful poll status in the Poll Status tab:

ClearPass Policy Manager 6.5 | User Guide Administration | 497

Figure 475: Modify Endpoint Context - Poll Status Tab with Success Status

The following table describes the Modify Endpoint Context - Poll Status parameters with the 'Success' polling status:

Table 290: Poll Status Parameters with Success Status

Parameter Description

Last Poll Status Displays the last polling status: Success or Failure. In this case, Success.

Last Successful Poll At

Poll time

Total Endpoints

Invalid Endpoints

Endpoints Updated

Incomplete Device Profiles

Device Profiles Updated

Displays the date and time at which the polling was triggered.

Specifies the time duration in seconds to complete the polling.

Specifies the total number of endpoints triggered for polling.

Specifies the number of invalid endpoints triggered for polling.

Specifies the number of endpoints updated after polling.

Displays the incomplete device profiles after polling.

Specifies the number of device profiles updated after polling.

498 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following figure displays a failed poll status in the Poll Status tab:

Figure 476: Poll Status Tab with Failure Status

The following table describes the Modify Endpoint Context - Poll Status parameters with the 'Failure' polling status:

Table 291: Poll Status with Failure Status

Parameter Description

Last Poll Status Displays the last polling status: Success or Failure. In this case, Failure.

Last Successful Poll At

Failure URL

Status

Reason

Displays the date and time at which the polling was triggered.

Specifies the URL in which the failure occurred.

Displays the error code for the failure.

Displays the reason for the failure.

Actions Tab

Use the Actions tab to view the server action that is performed on endpoints and its description. The fields and parameters that are displayed in the Actions dialog vary depending on which Server Type you select (see

Figure 471

).

For more information about endpoint context server actions configuration, see

Configuring Endpoint Context

Server Actions on page 501 .

The following figure displays an example of the Modify Endpoint Context - Actions tab:

ClearPass Policy Manager 6.5 | User Guide Administration | 499

Figure 477: Modify Endpoint Context - Actions Tab Example

Certificates Tab

The Certificates tab displays the server certificates added and enabled in the Certificate Trust List page.

Enabling the Validate Server option in the Server tab enables the Certificate tab.

The following figure displays the Modify Endpoint Context - Certificates tab:

Figure 478: Modify Endpoint Context - Certificates Tab

500 | Administration ClearPass Policy Manager 6.5 |  User Guide

Polling an Endpoint Context Server

To poll an endpoint context server:

You can poll only one server at a time. You cannot poll multiple server name entries.

1. Navigate to Administration > External Servers > Endpoint Context Servers.

2. In the Endpoint Context Servers main page, click the check box next to the server name entry.

3. Click Trigger Poll.

Deleting an Endpoint Context Server

Deleting an endpoint context server removes the configuration information from the Policy Manager server.

To add this endpoint context server after it's been removed:

1. Before you delete the endpoint context server, export the server.

2. Save the configuration so that you can import it in future as necessary.

To delete an endpoint context server:

1. Navigate to Administration > External Servers > Endpoint Context Servers.

2. Select the check box next to the server name entry and click Delete.

3. To confirm the delete operation, click Yes.

Configuring Endpoint Context Server Actions

This section contains the following information: l l l

Filtering an Endpoint Context Server Action Report

Configuring Endpoint Context Server Actions

Adding machine-os and host-type Endpoint Attributes

Filtering an Endpoint Context Server Action Report

Use the Filter controls to configure a search for a subset of Endpoint Context Server Action items.

To filter an endpoint context server action report:

1. Navigate to Administration > Dictionaries > Context Server Actions.

The Endpoint Context Server Actions page appears (see

Figure 479

).

2. From the Filter drop-down, select a filter: ServerType, Action Name, or HTTP method.

3. To add up to four new search fields, click the Plus icon .

4. Select a search argument.

The search arguments are limited to contains or equals.

5. Click Go.

Configuring Endpoint Context Server Actions

Use the Endpoint Context Server Actions page to configure actions that are performed on endpoints, such as locking a device, triggering a remote, or enterprise wipe, and so on.

The Context Server Actions page displays the report that shows information about all configured Endpoint

Context Server Actions.

ClearPass Policy Manager 6.5 | User Guide Administration | 501

To configure endpoint context server actions:

1. Navigate to Administration > Dictionaries > Context Server Actions > Endpoint Context Server

Actions page.

Figure 479

displays an example of the Endpoint Context Server Actions page:

Figure 479: Endpoint Context Server Actions Page

Table 292

describes the Endpoint Context Server Actions settings:

Table 292: Endpoint Context Server Actions Page Settings

Settings Description

Server Type Indicates the server type configured when the server action was configured.

Action Name Indicates the name of the context server action. The available server actions vary depending on what Server Type is specified.

HTTP Method Specifies the HTTP method selected when the server action was configured.

Description Provides the description of the server action.

2. From the Endpoint Context Server Actions page, click a row in the report.

The Endpoint Content Server Details dialog appears.

502 | Administration ClearPass Policy Manager 6.5 |  User Guide

Figure 480: Endpoint Context Server Details Dialog

3. Click a tab to view details about the selected Endpoint Context Server action.

4. Make any changes required, then click Save.

Action Tab Parameters

Use the Action tab to specify the server type, action name, HTTP method, and URL for the specified HTTP method.

Table 293

describes the the Action tab parameters.

Table 293: Action Parameters—Endpoint Context Server Details

Parameter Description

Server Type Specifies the server type configured when the server action was configured. You can select the server type from the drop-down list.

Server

Name

Action

Name

Lists the context servers specific to the server type selected in the Server Type field. This field is visible only if you selected the service type Generic HTTP.

Specifies the name of the action configured.

Description Provides additional information about the action specified.

HTTP

Method

Specifies the HTTP method selected when the server action was configured.

Skip

HTTP Auth

URL

Select this check box to disable the HTTP basic authentication for endpoint context server actions.

This exposes the context server attributes to be used in context server actions.

Indicates the URL for the selected HTTP method.

ClearPass Policy Manager 6.5 | User Guide Administration | 503

Header Tab Parameters

Use the Header tab to specify the key-value pairs to be included in the HTTP header.

Figure 481: Header Tab—Endpoint Context Server Details

Table 294

describes the Endpoint Context Server Details—Header parameters:

Table 294: Header Parameters—Endpoint Context Server Details

Parameter Description

Header Name Specify the name of the header to be included in the HTTP header.

Header Value Specify the value of the header specific to the name to be included in the HTTP header.

Content Tab

Use the Content tab to specify a content type and add non-default context server attributes (see

Figure 482

).

Figure 482: Content Tab—Endpoint Context Server Details

504 | Administration ClearPass Policy Manager 6.5 |  User Guide

Table 295

describes the Endpoint Context Server Details—Content parameters:

Table 295: Content Parameters—Endpoint Context Server Details

Parameter Description

Content-Type Specify the type of the content. Select from the following options: l

CUSTOM l l l l

HTML

JSON

PLAIN

XML

Content Specify the content. For example, { "mac": "%{Connection:Client-Mac-Address-NoDelim}

","nmap": {"device": "%{DEVICECATEGORY}"}}.

For related information, see

Adding machine-os and host-type Endpoint Attributes on page 505

).

Attributes Tab Parameters

Use the Attributes tab to specify the mapping for attributes used in the content to parameterized values from the request.

Figure 483: Attributes Tab—Endpoint Context Server Details

Table 296

describes the Endpoint Context Server Details—Attributes parameters:

Table 296: Attributes Parameters—Endpoint Context Server Details

Parameter Description

Attribute Name

Attribute Value

Enter attribute names and assign values to those names. These name/value pairs are included in context server actions.

Enter the value for the selected name in the Attribute Name field.

Adding machine-os and host-type Endpoint Attributes

To be able to indicate the entire OS family (Android, Windows, Linux, etc.) and the type of device (iPad, iPhone, etc.), you can add the machine-os Device Family attribute and the host-type Device Type attribute to the

ClearPass Policy Manager 6.5 | User Guide Administration | 505

default set of endpoint context attributes provided in the Content window:

To add the machine-os and host-type endpoint context attributes:

1. Navigate to Administration > Dictionaries > Context Server Actions.

The Endpoint Context Server Actions page appears.

2. Scroll to and select the Generic HTTP/Check Point Login server action.

Figure 484: Selecting the Check Point Login Server Action

The Endpoint Context Server Details dialog appears.

3. Select the Content tab (see

Figure 485 ).

4. In the Content field, add the following attributes (see

Figure 485

): n n

"machine-os":" %{device_family}"

"host-type":"%{device_type}"

Figure 485: Adding Endpoint Context Server Attributes

5. Click Save.

You receive the following message:

Context Server Action "Check Point Login (Generic HTTP)" updated successfully

506 | Administration ClearPass Policy Manager 6.5 |  User Guide

Adding Vendor-Specific Endpoint Context Servers

This section provides information on the following topics: l l l l l l l l l l l l l l

Adding an AirWatch Endpoint Context Server

Adding an AirWave Endpoint Context Server

Adding an Aruba Activate Endpoint Context Server

Adding a ClearPass Cloud Proxy Endpoint Context Server

Adding a Generic HTTP Endpoint Context Server

Adding a Google Admin Console Endpoint Context Server

Adding a JAMF Endpoint Context Server

Adding a MaaS360 Endpoint Context Server

Adding a MobileIron Endpoint Context Server

Adding a Palo Alto Networks Firewall Endpoint Context Server

Adding a Palo Alto Networks Panorama Endpoint Context Server

Adding an SAP Afaria Endpoint Context Server

Adding an SOTI Endpoint Context Server

Adding a XenMobile Endpoint Context Server

Adding an AirWatch Endpoint Context Server

Consult Airwatch's documentation for information about the parameters that you must enter to configure this endpoint.

To add an Airwatch Endpoint Context Server:

1. Navigate to Administration > External Servers > Endpoint Context Servers.

The Endpoint Context Servers page appears.

2. Click Add.

The Add Endpoint Context Server dialog appears. This dialog opens in the Server tab.

3. From the Select Server Type drop-down, select airwatch.

ClearPass Policy Manager 6.5 | User Guide Administration | 507

Server Tab

The following figure displays the Airwatch Add Endpoint Context Server - Server dialog:

Figure 486: Adding an Airwatch Endpoint Context Server - Server Dialog

You can add more than one endpoint context server of the same type.

The following table displays the Add Endpoint Context Server - Server (AirWatch) tab parameters:

Table 297: Adding an Airwatch Endpoint Context Server - Server Tab Parameters

Parameter Description

Select Server Type Choose AirWatch from the drop-down list.

Server Name

Server Base URL

Username

Password

Verify Password

API Key

Enter a valid server name. You can enter an IP address or a hostname.

Enter the full URL for the server. You can append a custom port, such as for an MDM server: https://yourserver.yourcompany.com:customerportnumber

Enter the user name.

Enter and verify the password.

Enter the API key that is provided by the vendor.

508 | Administration ClearPass Policy Manager 6.5 |  User Guide

Table 297: Adding an Airwatch Endpoint Context Server - Server Tab Parameters (Continued)

Parameter Description

Validate Server

Enable Server

Enable to validate the server certificate. Checking this option activates the Certificate tab.

Select the Enable to fetch endpoints from the server check box to enable the endpoint context server. By default, this field is disabled. The Bypass Proxy field will be enabled only if you enable this field.

Bypass Proxy Select the Enable to bypass proxy server check box to bypass the proxy server. When this field is enabled, the proxy servers configured in the Administration > Server

Manager > Server Configuration > Service Parameters tab > ClearPass system

services service page will be bypassed. The server discovery occurs without any issues even when the proxy servers are bypassed. By default, this field is disabled. You must enable the Enable Server field to enable this field.

Actions Tab

The following table displays the Airwatch Add Endpoint Context Server - Server dialog parameters:

Figure 487: Adding an Airwatch Endpoint Context Server - Actions Dialog

ClearPass Policy Manager 6.5 | User Guide Administration | 509

The following table describes the Airwatch Add Endpoint Context Server - Actions dialog parameters:

Table 298: Adding an Airwatch Endpoint Context Server - Actions Tab Parameters

Parameter Description

Clear Passcode Reset passcode on the device.

Enterprise Wipe

Get Apps

Lock Device

Remote Wipe

Delete only stored corporate information.

Get application information for the device.

Lock the associated device.

Delete all stored information.

Send Message Send message to the device.

Send Message (Parameterized) Send message with parameters to the device.

Adding an AirWave Endpoint Context Server

Consult the endpoint manufacturer's documentation for information about the parameters that you must enter to configure this endpoint. The following figure displays the Add Endpoint Context Server - Server

(AirWave) tab:

Figure 488: Add Endpoint Context Server - Server (AirWave) Tab

You can add more than one endpoint context server of the same type. For example, you can add more than one

AirWatch endpoint context server.

The following table describes the Add Endpoint Context Server - Server (AirWave) tab parameters:

510 | Administration ClearPass Policy Manager 6.5 |  User Guide

Table 299: Add Endpoint Context Server - Server (AirWave) Tab Parameters

Parameter Description

Select Server Type

Server Name

Choose AirWave from the drop-down list.

Enter a valid server name. You can enter an IP address or hostname.

Server Base URL

Username

Password

Verify Password

Validate Server

Bypass Proxy

Enter the full URL for the server. You can append a custom port, such as for an MDM server: https://yourserver.yourcompany.com:customerportnumber.

Enter the username.

Enter and verify the password.

Enable to validate the server certificate. Checking this option enables the Certificate tab.

Enable to bypass proxy server.

Adding an Aruba Activate Endpoint Context Server

Consult the endpoint manufacturer's documentation for information about the parameters that you must enter to configure this endpoint.

Server Tab

The following figure displays the Add Endpoint Context Server - Server (Aruba Activate) tab:

Figure 489: Add Endpoint Context Server - Server (Aruba Activate) Tab

ClearPass Policy Manager 6.5 | User Guide Administration | 511

The following table describes the Add Endpoint Context Server - Server (Aruba Activate) tab parameters:

Table 300: Add Endpoint Context Server - Server (Aruba Activate) Tab Parameter

Parameter Description

Select Server

Type

Choose Aruba Activate from the drop-down list.

Server Name

Server Base

URL

Enter a valid server name. You can enter an IP address or hostname.

Enter the full URL for the server. You can append a custom port, such as for an MDM server: https://yourserver.yourcompany.com:customerportnumber .

Username

Password

Verify

Password

Device Filter

Enter the username.

Enter and verify the password.

Folder Filter

Validate

Server

This field is populated with a default regex to retrieve only the information of RAP and IAP information.

This field is set to "*" by default.

Enable to validate the server certificate. Checking this option enables the Certificate tab. For more information on certificate, see

Certificates Tab on page 513 .

Enable Server Enable to fetch endpoints from the server.

Bypass Proxy Enable to bypass proxy server.

512 | Administration ClearPass Policy Manager 6.5 |  User Guide

Certificates Tab

The following figure displays the Add Endpoint Context Server - Certificates (Aruba Activate) tab:

Figure 490: Add Endpoint Context Server - Certificates (Aruba Activate) Tab

Adding a ClearPass Cloud Proxy Endpoint Context Server

The Cloud Proxy is a virtual instance configured in the cloud. This multi-tenant and single instance serves multiple customers having many CPPM nodes. Once configured, the CPPM server establishes a Cloud Tunnel to the Cloud Proxy instance given the credentials and Domain. The Domain is required as an identifier to indicate which Cloud Tunnel is applicable for which customer. Individual CPPM nodes in the cluster can be selected to establish the Cloud Tunnel, rather than all nodes in the CPPM cluster.

Figure 491: Add ClearPass Cloud Proxy Endpoint Context Server tab

ClearPass Policy Manager 6.5 | User Guide Administration | 513

Table 301: Add ClearPass Cloud Proxy Endpoint Context Server Parameters

Parameter

Select Server

Type

Server Name

Server Base

URL

Username

Password

Verify

Password

Domain

Description

ClearPass Cloud Proxy

The hostname of the cloud instance that will proxy all requests directed to the CPPM server in the enterprise.

Enter the full URL for the server. The default is the name you entered above with "https://" prepended.

You can append a custom port, such as for an MDM server: https://yourserver.yourcompany.com:customerportnumber.

Username/Password based authentication is used when you setup a cloud tunnel from CPPM to the Cloud Proxy instance.

Enter the username.

Enter the password.

Verify the password.

Validate

Server

An identifier used to determine the specific Cloud Tunnel to which the request must be sent by the

Cloud Proxy.

Click to enable validation of the server certificate.

514 | Administration ClearPass Policy Manager 6.5 |  User Guide

Adding a Google Admin Console Endpoint Context Server

Consult Google Developer documentation for information about the parameters that you must enter to configure this endpoint.

Server Tab

The following figure displays the Add Endpoint Context Server - Server (Google Admin Console) tab:

Figure 492: Add Endpoint Context Server - Server (Google Admin Console) Tab

You can add more than one endpoint context server of the same type. For example, you can add more than one

AirWatch endpoint context server.

The following table describes the Add Endpoint Context Server - Server (Google Admin Console) tab parameters:

Table 302: Add Endpoint Context Server - Server (Google Admin Console) Tab Parameters

Parameter Description

Select Server Type

Client Id

Choose Google Admin Console from the drop-down list.

Enter the client ID. For example,

9169879216kpl50kxuaq6q6qqwe0i.apps.googleusercontent.com.

Client Secret

Google API Access

Enter the client secret. For example, gMcfg342ePaKgx1ZlXK.

Authenticate and authorize ClearPass for access to Google Admin APIs for your domain.

ClearPass Policy Manager 6.5 | User Guide Administration | 515

Table 302: Add Endpoint Context Server - Server (Google Admin Console) Tab Parameters (Continued)

Parameter Description

Validate Server

Enable Server

Enable to validate the server certificate. Checking this option enables the Certificate tab.

For more information on certificate, see

Certificates Tab on page 516 .

Enable this field to fetch endpoints from the server.

Bypass Proxy Select the Enable to bypass proxy server check box to bypass the proxy server. When this field is enabled, the proxy servers configured in the Administration > Server

Manager > Server Configuration > Service Parameters tab > ClearPass system

services service page will be bypassed. The server discovery occurs without any issues even when the proxy servers are bypassed. By default, this field is disabled.

Certificates Tab

The following figure displays the Add Endpoint Context Server - Certificates (Google Admin Console) tab:

Figure 493: Add Endpoint Context Server - Certificates (Google Admin Console) Tab

516 | Administration ClearPass Policy Manager 6.5 |  User Guide

Adding a Generic HTTP Endpoint Context Server

Consult the endpoint manufacturer's documentation for information about the parameters that you must enter to configure this endpoint. The following figure displays the Add Endpoint Context Server - Server

(Generic HTTP) tab:

Figure 494: Add Endpoint Context Server - Server (Generic HTTP) Tab

You can add more than one endpoint context server of the same type. For example, you can add more than one

AirWatch endpoint context server.

The following table describes the Add Endpoint Context Server - Server (Generic HTTP) tab parameters:

Table 303: Add Endpoint Context Server - Server (Generic HTTP) Tab Parameters

Parameter Description

Select Server Type Choose Generic HTTP from the drop-down list.

Server Name

Server Base URL

Username

Password

Verify Password

Validate Server

Bypass Proxy

Enter a valid server name. You can enter an IP address or hostname.

Enter the full URL for the server. You can append a custom port, such as for an MDM server: https://yourserver.yourcompany.com:customerportnumber.

Enter the username.

Enter and verify the password.

Enable to validate the server certificate. Checking this option enables the Certificate tab.

Enable to bypass proxy server.

ClearPass Policy Manager 6.5 | User Guide Administration | 517

Adding a JAMF Endpoint Context Server

Consult the endpoint manufacturer's documentation for information about the parameters that you must enter to configure this endpoint. The following figure displays the Add Endpoint Context Server - Server

(JAMF) tab:

Figure 495: Add Endpoint Context Server - Server (JAMF) Tab

You can add more than one endpoint context server of the same type. For example, you can add more than one

AirWatch endpoint context server.

The following table describes the Add Endpoint Context Server - Server (JAMF) tab parameters:

Table 304: Add Endpoint Context Server - Server (JAMF) Tab Parameters

Parameter Description

Select Server

Type

Choose JAMF from the drop-down list.

Server Name

Server Base URL

Username

Password

Verify Password

Fetch Computer

Records

Enter a valid server name. You can enter an IP address or hostname.

Enter the full URL for the server. You can append a custom port, such as for an MDM server: https://yourserver.yourcompany.com:customerportnumber.

Enter the username.

Enter and verify the password.

Enable to fetch computer records.

518 | Administration ClearPass Policy Manager 6.5 |  User Guide

Table 304: Add Endpoint Context Server - Server (JAMF) Tab Parameters (Continued)

Parameter Description

Validate Server

Enable to validate the server certificate. Checking this option enables the Certificate tab.

Enable Server

Enable to fetch endpoints from the server.

Bypass Proxy

Enable to bypass proxy server.

Adding a MaaS360 Endpoint Context Server

Consult the endpoint manufacturer's documentation for information about the parameters that you must enter to configure this endpoint.

Server Tab

The following figure displays the Add Endpoint Context Server - Server (MaaS360) tab:

Figure 496: Add Endpoint Context Server - Server (MaaS360) Tab

You can add more than one endpoint context server of the same type. For example, you can add more than one

AirWatch endpoint context server.

ClearPass Policy Manager 6.5 | User Guide Administration | 519

The following table describes the Add Endpoint Context Server - Server (MaaS360) tab parameters:

Table 305: Add Endpoint Context Server - Server (MaaS360) Tab Parameters

Parameter Description

Select Server

Type

Choose MaaS360 from the drop-down list.

Server Name Enter a valid server name. You can enter an IP address or hostname.

Server Base

URL

Enter the full URL for the server. You can append a custom port, such as for an MDM server: https://yourserver.yourcompany.com:customerportnumber.

Username

Password

Verify

Password

Application

Access Key

Enter the username.

Enter and verify the password.

Enter the application access key (API key).

Application

ID

Application

Version

Platform ID

Billing ID

Enter the application ID.

Enter the application version number.

Enter the platform version number.

Enter the billing ID.

Validate

Server

Enable

Server

Enable to validate the server certificate. Checking this option enables the Certificate tab.

Enable to fetch endpoints from the server.

Bypass Proxy Enable to bypass proxy server.

520 | Administration ClearPass Policy Manager 6.5 |  User Guide

Actions Tab

The following figure displays the Add Endpoint Context Server - Actions (MaaS360) tab:

Figure 497: Add Endpoint Context Server - Actions (MaaS360) Tab

The following table describes the Add Endpoint Context Server - Actions (MaaS360) tab parameters:

Table 306: Add Endpoint Context Server - Actions (MaaS360) Tab Parameters

Parameter Description

Approve Device in Messaging System Approve the device in Messaging System.

Block Device in Messaging System

Cancel Pending Wipe

Change Device Policy

Check Action Status

Locate Device

Lock Device

Refresh Device

Remove Device

Reset Device Passcode

Block the device in Messaging System.

Cancel outstanding Remote Wipe sent to the device.

Assign a given policy to a device.

Check the status of a prior executed action.

Get current or last know location of the device.

Lock the device.

Create a request to refresh the device information.

Mark the device as inactive.

Reset the pass code on the device.

ClearPass Policy Manager 6.5 | User Guide Administration | 521

Table 306: Add Endpoint Context Server - Actions (MaaS360) Tab Parameters (Continued)

Parameter Description

Revoke Selective Wipe Cancel Selective Wipe executed on the device.

Search Action History

Selective Wipe Device

Wipe Device

Search action history by Device ID.

Execute a Selective Wipe on a device.

Delete all information stored on a device.

Adding a MobileIron Endpoint Context Server

Consult the endpoint manufacturer's documentation for information about the parameters that you must enter to configure this endpoint.

Server Tab

The following figure displays the Add Endpoint Context Server - Server (MobileIron) tab:

Figure 498: Add Endpoint Context Server - Server (MobileIron) Tab

You can add more than one endpoint context server of the same type. For example, you can add more than one

AirWatch endpoint context server.

522 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following table describes the Add Endpoint Context Server - Server (MobileIron) tab parameters:

Table 307: Add Endpoint Context Server - Server (MobileIron) Tab Parameters

Parameter Description

Select Server Type Choose MobileIron from the drop-down list.

Server Name

Server Base URL

Username

Password

Verify Password

Validate Server

Enter a valid server name. You can enter an IP address or hostname.

Enter the full URL for the server. You can append a custom port, such as for an MDM server: https://yourserver.yourcompany.com:customerportnumber.

Enter the username.

Enter and verify the password.

Enable Server

Bypass Proxy

Enable to validate the server certificate. Checking this option enables the Certificate tab.

Enable to fetch endpoints from the server.

Enable to bypass proxy server.

Actions Tab

The following figure displays the Add Endpoint Context Server - Actions (MobileIron) tab:

Figure 499: Add Endpoint Context Server - Actions (MobileIron) Tab

ClearPass Policy Manager 6.5 | User Guide Administration | 523

The following table describes the Add Endpoint Context Server - Actions (MobileIron) tab parameters:

Table 308: Add Endpoint Context Server - Actions (MobileIron) Tab Parameters

Parameter Description

Get Labels Get label information of the device.

Lock Device

Remote Wipe

Send Message

Unlock Device

Lock the device.

Delete all information stored on the device.

Send message to the device.

Unlock the device.

Adding a Palo Alto Networks Firewall Endpoint Context Server

Consult the endpoint manufacturer's documentation for information about the parameters that you must enter to configure this endpoint.

The following figure displays the Add Endpoint Context Server: Palo Alto Networks Firewall dialog:

Figure 500: Add Endpoint Context Server: Palo Alto Networks Firewall Dialog

You can add more than one endpoint context server of the same type. For example, you can add more than one

AirWatch endpoint context server.

524 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following table describes the Add Endpoint Context Server: Palo Alto Networks Firewall tab parameters:

Table 309: Add Endpoint Context Server: Palo Alto Networks Firewall Parameters

Parameter Description

Select Server Type

Server Name

Choose Palo Alto Networks Firewall from the drop-down list.

Enter a valid server name. You can enter an IP address or a hostname.

Server Base URL

Username

Password

Verify Password

Enter the server base URL in the following format: https://{server_ip}/api/?type=keygen&user={username}&password={password}

Enter the username.

Enter and verify the password.

Username Transformation Choose one of the following options: l

None: Do not use any username transformation.

l

Prefix NETBIOS name: Prefix NETBIOS name in UID updates.

l Use Full Username: Use full username in UID updates.

GlobalProtect Enable this option to send an HIP report to the firewall. GlobalProtect license must be enabled on the firewall for this to work.

Send Posture Data

UserID Post URL

Enable to send posture data on Palo Alto Networks firewall after authentication. This option can be resource-intensive, the eager handler-polling interval must be two minutes or more. Enabling this field verifies whether the polling frequency is set to 2 minutes and then send the posture data to Palo Alto Networks firewall. These posture data can be verified in Access Tracker page.

Enter the user ID post URL in the following format: https://{server_ip}

/api/?type=user-id&action=set&key={key}&cmd={cmd}

Validate Server

Bypass Proxy

Enable to validate the server certificate. Checking this option enables the

Certificate tab.

Enable to bypass proxy server.

Adding a Palo Alto Networks Panorama Endpoint Context Server

Consult the endpoint manufacturer's documentation for information about the parameters that you must enter to configure this endpoint. The following figure displays the Add Endpoint Context Server - Server

(Palo Alto Networks Panorama) tab:

ClearPass Policy Manager 6.5 | User Guide Administration | 525

Figure 501: Add Endpoint Context Server - Server (Palo Alto Networks Panorama) Tab

You can add more than one endpoint context server of the same type. For example, you can add more than one

AirWatch endpoint context server.

The following table describes the Add Endpoint Context Server - Server (Palo Alto Networks Panorama) tab parameters:

Table 310: Add Endpoint Context Server - Server (Palo Alto Networks Panorama) Tab Parameters

Parameter Description

Select Server Type Choose Palo Alto Networks Panorama from the drop-down list.

Server Name

Server Base URL

Username

Password

Verify Password

Username Transformation

Enter a valid server name. You can enter an IP address or hostname.

Enter the server base URL in the following format: https://{server_ip}

/api/?type=keygen&user={username}&password={password}

Enter the username.

Enter and verify the password.

GlobalProtect

Choose one of the following options: l l l

None - Do not use any username transformation.

Prefix NETBIOS name - Prefix NETBIOS name in UID updates.

Use Full Username - Use full username in UID updates.

Enable to send HIP report to firewall. GlobalProtect license should be enabled on firewall for this to work.

526 | Administration ClearPass Policy Manager 6.5 |  User Guide

Table 310: Add Endpoint Context Server - Server (Palo Alto Networks Panorama) Tab Parameters (Continued)

Parameter Description

Send Posture Data

Palo Alto Firewall Serial Numbers

Enable to send posture data on Palo Alto Networks firewall after authentication. This option can be resource-intensive, the eager handlerpolling interval must be two minutes or more. Enabling this field verifies whether the polling frequency is set to 2 minutes and then send the posture data to Palo Alto Networks firewall. These posture data can be verified in

Access Tracker page.

Enter the Palo Alto firewall serial numbers.

UserID Post URL

Validate Server

Bypass Proxy

Enter the user ID post URL in the following format: https://{server_ip}

/api/?type=user-id&action=set&key={key}&cmd={cmd}

Enable to validate the server certificate. Checking this option enables the

Certificate tab.

Enable to bypass proxy server.

Adding an SAP Afaria Endpoint Context Server

Consult the endpoint manufacturer's documentation for information about the parameters that you must enter to configure this endpoint.

Server Tab

The following figure displays the Add Endpoint Context Server - Server (SAP Afaria) tab:

Figure 502: Add Endpoint Context Server - Server (SAP Afaria) Tab

You can add more than one endpoint context server of the same type. For example, you can add more than one

AirWatch endpoint context server.

ClearPass Policy Manager 6.5 | User Guide Administration | 527

The following table describes the Add Endpoint Context Server - Server (SAP Afaria) tab parameters:

Table 311: Add Endpoint Context Server - Server (SAP Afaria) Tab Parameters

Parameter Description

Select Server Type Choose SAP Afaria from the drop-down list.

Server Name

Server Base URL

Enter a valid server name. You can enter an IP address or a hostname.

Enter the full URL for the server. You can append a custom port, such as for an MDM server: https://yourserver.yourcompany.com:customerportnumber.

Enter the username.

Enter and verify the password.

Username

Password

Verify Password

Validate Server

Enable Server

Bypass Proxy

Enable to validate the server certificate. Checking this option enables the Certificate tab.

Enable to fetch endpoints from the server.

Enable to bypass proxy server.

Actions Tab

The following figure displays the Add Endpoint Context Server - Actions (SAP Afaria) tab:

Figure 503: Add Endpoint Context Server - Actions (SAP Afaria) Tab

528 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following table describes the Add Endpoint Context Server - Actions (SAP Afaria) tab parameters:

Table 312: Add Endpoint Context Server - Actions (SAP Afaria) Tab Parameters

Parameter Description

Enterprise Wipe Delete corporate information related data.

Lock Device Lock the associated device.

Remote Wipe

Send Message

Delete all stored information.

Send message to the device.

Adding an SOTI Endpoint Context Server

Consult the endpoint manufacturer's documentation for information about the parameters that you must enter to configure this endpoint. The following figure displays the Add Endpoint Context Server - Server

(SOTI) tab:

Figure 504: Add Endpoint Context Server - Server (SOTI) Tab

You can add more than one endpoint context server of the same type. For example, you can add more than one

AirWatch endpoint context server.

ClearPass Policy Manager 6.5 | User Guide Administration | 529

The following table describes the Add Endpoint Context Server - Server (SOTI) tab parameters:

Table 313: Add Endpoint Context Server - Server (SOTI) Tab Parameters

Parameter Description

Select Server Type Choose SOTI from the drop-down list.

Server Name

Server Base URL

Enter a valid server name. You can enter an IP address or hostname.

Enter the server base URL in the following format: https://{server_ip}

/api/?type=keygen&user={username}&password={password}

Enter the username.

Enter and verify the password.

Username

Password

Verify Password

Group ID

Validate Server

Enable Server

Bypass Proxy

Enter the group ID. This parameter is optional.

Enable to validate the server certificate. Checking this option enables the Certificate tab.

Enable to fetch endpoints from the server.

Enable to bypass proxy server.

Adding a XenMobile Endpoint Context Server

Consult the endpoint manufacturer's documentation for information about the parameters that you must enter to configure this endpoint. The following figure displays the Add Endpoint Context Server - Server

(XenMobile) tab:

530 | Administration ClearPass Policy Manager 6.5 |  User Guide

Figure 505: Add Endpoint Context Server - Server (XenMobile) Tab

You can add more than one endpoint context server of the same type. For example, you can add more than one

AirWatch endpoint context server.

The following table describes the Add Endpoint Context Server - Server (XenMobile) tab parameters:

Table 314: Add Endpoint Context Server - Server (XenMobile) Tab Parameters

Parameter Description

Select Server Type

Server Name

Choose XenMobile from the drop-down list.

Enter a valid server name. You can enter an IP address or hostname.

Server Base URL

Username

Password

Verify Password

Validate Server

Enter the server base URL in the following format: https://{server_ip}

/api/?type=keygen&user={username}&password={password}

Enter the username.

Enter and verify the password.

Enable Server

Bypass Proxy

Enable to validate the server certificate. Checking this option enables the Certificate tab.

Enable to fetch endpoints from the server.

Enable to bypass proxy server.

ClearPass Policy Manager 6.5 | User Guide Administration | 531

File Backup Servers

ClearPass Policy Manager provides the ability to push scheduled data securely to an external server. You can push the data using the SFTP and SCP protocols. Navigate to the Administration > External Servers > File

Backup Servers page and click the Add link at the top-right corner. The Add File Backup Server page opens.

The following figure displays the Add File Backup Server page:

Figure 506: File Backup Servers - Add File Backup Server Page

The following table describes the Add File Backup Server page parameters:

Table 315: Add File Backup Server Page Parameters

Parameter Description

Host Enter the name or IP address of the host.

Description

Protocol

Enter the description that provides additional information about the File Backup server.

Specify the protocol to be used to upload the generated reports to an external server. You can select from the following protocols: l l

SFTP  (SSH File Transfer Protocol)

SCP (Session Control Protocol)

532 | Administration ClearPass Policy Manager 6.5 |  User Guide

Table 315: Add File Backup Server Page Parameters (Continued)

Parameter Description

Port

Username

Specify the port number. The default port is 22.

Enter the user name and password of the host server.

Password

Timeout

Enter the user name of the host server.

Verify Password

Enter the password of the host server.

Specify the timeout value in seconds. The default value is 30 seconds.

Remote

Directory

ClearPass

Servers

Specify the location in this field to which the files to be copied. A folder will be automatically created in the file path that you specify based on the selected ClearPass servers in the

ClearPass Servers field.

Specify the ClearPass servers. If a servers are specified, files will only be backed up from the selected ClearPass servers. Otherwise, it will be backed up from all ClearPass servers in the cluster. You can select the servers from the Select to Add drop-down list.

Server Certificate

The Server Certificate page depends if the RADIUS Server Certificate type or the HTTPS Service Certificate type is assigned to the selected server. To configure the server certificate, navigate to Administration

> Certificates > Server Certificate.

This section describes the following topics: l l

Server Certificate Main Page on page 533

Server Certificate Type on page 534

Server Certificate Main Page

The following figure displays the Server Certificate page:

Figure 507: Server Certificate Page

ClearPass Policy Manager 6.5 | User Guide Administration | 533

The following table describes the Server Certificate parameters:

Table 316: Server Certificate Parameters

Parameter Description

Create Self-

Signed

Certificate

Opens the Create Self-Signed Certificate page where you can create and install a

Self-Signed Certificate. For more information, see

Creating a Self-Signed Certificate on page 539 .

Create

Certificate

Signing

Request

Import

Server

Certificate

Opens the Create Certificate Signing Request page where you can create and install a Certificate Signing Request. For more information, see

Request on page 536 .

Creating a Certificate Signing

Opens the Import Server Certificate page where you can import a certificate that has been exported previously. For more information, see

Importing a Server Certificate on page 544 .

On clicking this link, the self-signed certificate is downloaded. For more information, see

Exporting a Server Certificate on page 544 .

Export

Server

Certificate

Select

Server

Select a server in the cluster for server certificate operations.

Select Type Select a certificate type. The options are RADIUS Server Certificate or HTTPS Server

Certificate. The availability of two certificate types (internally signed and publicly signed) can provide deployment flexibility.

View Details Click to view the certificate details.

Server Certificate Type

ClearPass Policy Manager provides two types of server certificates.

RADIUS Server Certificate

This page displays the parameters configured when a self-signed certificate with a RADIUS Server Certificate is created and installed. The following figure displays the RADIUS Server Certificate page:

Figure 508: RADIUS Server Certificate Page

534 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following table describes the RADIUS Server Certificate parameters:

Table 317: RADIUS Server Certificate Parameters

Parameter Description

Subject Displays Organization and Common Name.

Issued by

Issue Date

Expiry Date

Validity

Status

Details

Displays Organization and Common Name.

Displays the date the self-signed certificate is installed.

Displays the date (in days) when the self-signed certificate expires.

Displays the validity status of the self-signed certificate.

Click the View Details button to view details about the certificate, such as Signature

Algorithm, Subject Public Key Info, and more.

HTTPS Server Certificate

The page displays the parameters configured after a self-signed certificate with an HTTPS Server Certificate is created and installed. The page contains data about the Server Certificate, Intermediate CA Certificate and Root

CA Certificate. Click the View Details button for each section to see details about Signature Algorithm, Public

Key Info, and more. The following figure displays the HTTPS Server Certificate page:

Figure 509: HTTPS Server Certificate Page

The following table describes the HTTPS Server Certificate parameters:

Table 318: HTTPS Server Certificate Parameters

Parameter Description

Subject Displays Organization and Common Name.

Issued by

Issue Date

Displays Organization and Common Name.

Displays the date the self-signed certificate is installed.

ClearPass Policy Manager 6.5 | User Guide Administration | 535

Table 318: HTTPS Server Certificate Parameters (Continued)

Parameter Description

Expiry Date Displays the date (in days) when the self-signed certificate expires.

Displays the validity status of the self-signed certificate.

Validity

Status

Details Click the View Details button to view details about the certificate, such as Signature

Algorithm, Subject Public Key Info, and more.

Creating a Certificate Signing Request

After you select a server and a certificate type, you can create a certificate signing request. This task creates a self-signed certificate to be signed by a CA. To create a certificate signing request:

1. Navigate to Administration > Certificates > Server Certificate.

2. Select a server, for example, localhost.

3. Click the Create Certificate Signing Request link. Configure the parameters based on

Table 319

.

4. Click Submit.

The following figure displays the Create Certificate Signing Request pop-up:

Figure 510: Create Certificate Signing Request Pop-up

536 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Create Certificate Signing Request page in the FIPS mode pop-up:

Figure 511: Create Certificate Signing Request - FIPS Mode Pop-up

The following table describes the Create Certificate Signing Request parameters:

Table 319: Create Certificate Signing Request Parameters

Parameter Description

Common

Name (CN)

Enter the name associated with this entity. This can be a host name, IP address, or other name. The default is the fully-qualified domain name (FQDN). This field is mandatory.

Organization

(O)

Location (L)

State (ST)

Enter the name of the organization. This field is optional.

Organizational

Unit (OU)

Enter the name of the department, division, section, or other meaningful name. This field is optional.

Enter the name of the location, state, country, and/or other meaningful name. These fields are optional.

Country (C)

Subject

Alternate

Enter the alternative names for the specified Common Name.

NOTE: Enter the SAN in the following formats:

ClearPass Policy Manager 6.5 | User Guide Administration | 537

Table 319: Create Certificate Signing Request Parameters (Continued)

Parameter Description

Name (SAN) l l l l email: email_address

URI: uri

IP: ip_address dns: dns_name l rid: id

This field is optional.

Private Key

Password

Verify Private

Key Password

Enter and re-enter the Private Key password.

Private Key

Type

Digest

Algorithm

Select the length for the generated private key types from the following options: l 1024-bit RSA l l

2048-bit RSA

4096-bit RSA l l

X9.62/SECG curve over a 256 bit prime field

NIST/SECG curve over a 384 bit prime field

The default private key type is 2048-bit RSA.

Select the message digest algorithm from the following options: l MD5 l l

SHA-1

SHA-224 l l

SHA-256

SHA-384 l SHA-512

NOTE: The MD5 algorithm is not available in the FIPS mode.

After you create a Certificate Signing Request form and click Submit, the generated certificate signing request is displayed. Copy the certificate and paste it into the Web form as part of the enrollment process. You can click Download CSR and Private Key Files to save the Certificate Signing Request file and the private key password file. The following figure displays the Create Certificate Signing Request pop-up:

538 | Administration ClearPass Policy Manager 6.5 |  User Guide

Figure 512: Create Certificate Signing Request Pop-up

Creating a Self-Signed Certificate

After you select a server and a certificate type, you can create and install a self-signed certificate. To create a self-signed certificate:

1. Navigate to Administration > Certificates > Server Certificate.

2. Select a server, for example, localhost.

3. Click the Create Self-Signed Certificate link. Configure the parameters based on

Table 320 .

4. Click Submit.

5. To install a self-signed certificate, see

Installing a Self-Signed Certificate on page 542 .

ClearPass Policy Manager 6.5 | User Guide Administration | 539

The following figure displays the Create Self-Signed Certificate pop-up:

Figure 513: Create Self-Signed Certificate Pop-up

540 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Create Self-Signed Certificate page in the FIPS mode pop-up:

Figure 514: Create Self-Signed Certificate Page - FIPS Mode Pop-up

The following table describes the Create Self-Signed Certificate parameters:

Table 320: Create Self-Signed Certificate Parameters

Parameter Description

Selected Server Displays the name of the selected server on the Server Certificate page.

Selected Type Displays the selected certificate type for the server on the Server

Certificate page.

Common Name (CN) Enter the name associated with this entity. This can be a host name, IP address, or other meaningful name. This field is mandatory.

Organization (O)

Organizational Unit

(OU)

Enter the name of the organization. This field is optional.

Enter the name of the department, division, section, or other meaningful name. This field is optional.

ClearPass Policy Manager 6.5 | User Guide Administration | 541

Table 320: Create Self-Signed Certificate Parameters (Continued)

Parameter Description

Location (L)

State (ST)

Enter the name of the location, state, country, and/or other meaningful name. These fields are optional.

Country (C)

Subject Alternate

Name (SAN)

Enter the alternative names for the specified Common Name.

NOTE: Enter the SAN in the following formats: l l l email: email_address

URI: uri

IP: ip_address l l dns: dns_name rid: id

This field is optional.

Enter and re-enter the Private Key password.

Private Key Password

Verify Private Key

Password

Private Key Type

Digest Algorithm

Valid for

Select the length for the generated private key types from the following options: l l l

1024-bit RSA

2048-bit RSA

4096-bit RSA l l

X9.62/SECG curve over a 256 bit prime field

NIST/SECG curve over a 384 bit prime field

The default private key type is 2048-bit RSA.

Select the message digest algorithm from the following options: l MD5 l l

SHA-1

SHA-224 l l

SHA-256

SHA-384 l

SHA-512

NOTE: The MD5 algorithm is not available in the FIPS mode.

Enter the duration in number of days.

Installing a Self-Signed Certificate

Once you click Submit, you are prompted to install the self-signed certificate. This page displays a summary of the values selected in the Create Self-Signed Certificate page. Click Install to install the self-signed certificate.

542 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Create Self-Signed Certificate pop-up.

Figure 515: Create Self-Signed Certificate Pop-up

The following table describes the Create Self-Signed Certificate parameters configured:

Table 321: Self-Signed Certificate Parameters

Parameter Description

Selected Server Displays the name of the server selected on the Server Certificate page.

Selected Type

Subject DN

Displays the selected certificate type for the server.

Displays information about the organization, common name, and location of the Subject DN.

Issuer DN Displays information about the organization, common name, and location of the Subject DN.

Subject Alternate Name

(SAN)

Displays the SAN defined during certificate creation.

Issue Date/Time

Expire Date/Time

Displays the certificate issue date and time.

Displays the certificate expiration date and time.

ClearPass Policy Manager 6.5 | User Guide Administration | 543

Table 321: Self-Signed Certificate Parameters (Continued)

Parameter Description

Validity Status

Signature Algorithm

Displays the validity status of the certificate.

Displays the Digest Algorithm and Private Key Type selected during certificate configuration.

Public Key Format Displays the public key format in use for the self-signed server certificate.

Exporting a Server Certificate

Navigate to Administration > Certificates > Server Certificates, and click the Export Server Certificate link. The default location for an exported certificate is C:/

<user>/Downloads/<HTTPSServerCertificate.zip> or <RADIUSServerCertificate.zip>. The zip file has the server certificate (.crt file) and the private key (.pvk file).

Importing a Server Certificate

Navigate to Administration > Certificates > Server Certificates, and select the Import Server

Certificate link. The following figure displays the Import Server Certificate pop-up:

Figure 516: Import Server Certificate Pop-up

For security reasons, certificate signed using SHA1RSA is not recommended. It is recommended to import certificates signed with stronger keys such as RSA with length more than 1024 bits.

The following table describes the Import Server Certificate parameters:

Table 322: Import Server Certificate Parameters

Parameter Description

Selected Server Displays the name of the selected server on the Server Certificate page.

Selected Type Displays the selected certificate type for the server on the Server Certificate page.

Certificate File Browse to the certificate file to be imported.

544 | Administration ClearPass Policy Manager 6.5 |  User Guide

Table 322: Import Server Certificate Parameters (Continued)

Parameter Description

Private Key File

Private Key

Password

Browse to the private key file to be imported.

Specify the private key password that was entered when the server certificate was configured.

Certificate Trust List

The Certificate Trust List page displays a list of trusted Certificate Authorities (CA). On this page, you can add, view, or delete a certificate.

This section describes the following topics: l l l l

Certificate Trust List Main Page on page 545

Adding a Certificate on page 546

Viewing a Certificate Detail on page 546

Deleting a Certificate on page 546

You cannot import the certificates that are created with the MD5 digest algorithm to the Certificate Trust List in the

FIPS mode.

Certificate Trust List Main Page

To display a list of trusted Certificate Authorities (CA), navigate to Administration > Certificates > Trust

List.

The following figure displays the Certificate Trust List page:

Figure 517: Certificate Trust List Main Page

The Certificate Trust List (Administration > Certificates > Trust List) page can include the following certificates: l l

DoD (Department of Defense) certificates - These are disabled by default. To enable this certificate, select a

DoD certificate and click Enable in the View Certificate Details pop-up. A DoD certificate allows a browser to trust Web sites whose secure communications are authenticated by a DoD agency.

Alcatel root certificate - These are disabled by default. To enable this certificate, select a DoD certificate and click Enable in the View Certificate Details pop-up. An Alcatel root certificate allows Alcatel Lucent IP phones to authenticate using EAP-TLS.

ClearPass Policy Manager 6.5 | User Guide Administration | 545

The following table describes the Certificate Trust List parameters:

Table 323: Certificate Trust List Parameters

Parameter Description

Subject Displays the Distinguished Name (DN) of the subject field in the certificate.

Validity

Enabled

Indicates whether the CA certificate is valid or expired.

Indicates whether the CA certificate is enabled or disabled.

Adding a Certificate

1. Navigate to Administration > Certificates > Trust List.

2. Click the Add link on the top right section of the page.

3. On the Add Certificate pop-up, click Choose File to browse the certificate file.

4. Click Add Certificate.

The following figure displays the Add Certificate pop-up:

Figure 518: Add Certificate Pop-up

The following table describes the Add Certificate parameters:

Table 324: Add Certificate Parameters

Parameter Description

Certificate File Click Choose File to browse the certificate file.

Viewing a Certificate Detail

To view the details of a certificate, click any one of the entries from the certificate trust list. From the View

Certificate Details pop-up, clicking the Enable button enables the CA certificate. When you enable a CA certificate, Policy Manager considers the entity whose certificate is signed by this CA to be trusted.

Deleting a Certificate

To delete a certificate:

1. Navigate to Administration > Certificates > Trust List.

2. Select the check box to the left of the certificate.

3. Click Delete.

546 | Administration ClearPass Policy Manager 6.5 |  User Guide

Certificate Revocation Lists

To add a revocation list, click Add Revocation List. To delete a revocation list, select the check box to the left of the list and then click Delete.

This section describes the following topics: l l l

Certificate Revocation Lists Main Page on page 547

Adding a Certificate Revocation List on page 547

Adding a Certificate Revocation List on page 547

Certificate Revocation Lists Main Page

To display available Revocation Lists, navigate to Administration > Certificates > Revocation Lists. The following figure displays the Certificate Revocation Lists page:

Figure 519: Certificate Revocation Lists Page

Adding a Certificate Revocation List

To add a certificate revocation list:

1. Navigate to Administration > Certificates > Revocation Lists.

2. Click the Add link on the top right section of the page. Configure the parameters based on

Table 325

.

3. Click Save.

The following figure displays the Add Certificate Revocation List pop-up:

Figure 520: Add Certificate Revocation List Pop-up

ClearPass Policy Manager 6.5 | User Guide Administration | 547

The following table describes the Add Certificate Revocation List parameters:

Table 325: Add Certificate Revocation List Parameters

Parameter Description

File File enables the Distribution File option.

Distribution File

URL

Distribution URL

Auto Update

Specify the distribution file (e.g.,

C:/distribution/crl.verisign.com/Class3InternationalServer.crl) to fetch the certificate revocation list.

URL enables the Distribution URL option.

Specify the distribution URL (e.g.,

http://crl.verisign.com/Class3InternationalServer.crl) to fetch the certificate revocation list.

Select Update whenever CRL is updated to update the CRL at intervals specified in the list. Or select Periodically update every _______ hour(s) to check periodically and at the specified frequency (in hours).

Deleting a Certificate Revocation List

To delete a certificate revocation list:

1. Navigate to Administration > Certificates > Revocation Lists.

2. Select the check box to the left of the certificate revocation list.

3. Click Delete.

Using ClearPass Dictionaries

This section describes the following topics: l l l l l l l

RADIUS Dictionary on page 549

Posture Dictionary on page 550

TACACS+ Services Dictionary on page 552

Fingerprints Dictionary on page 553

Dictionary Attributes on page 554

Applications Dictionaries on page 558

Configuring Endpoint Context Server Actions on page 501

548 | Administration ClearPass Policy Manager 6.5 |  User Guide

RADIUS Dictionary

This page includes the list of available vendor dictionaries. To configure RADIUS dictionaries, navigate to

Administration > Dictionaries > RADIUS.

The following figure displays the RADIUS Dictionaries page:

Figure 521: RADIUS Dictionaries

Click on a row view the dictionary attributes, to enable or disable the dictionary, and to export the dictionary.

For example, click on vendor IETF to see all IETF attributes and their data type. The following figure displays the

RADIUS IETF dictionary attributes pop-up:

Figure 522: RADIUS Attributes Pop-up

ClearPass Policy Manager 6.5 | User Guide Administration | 549

The following table describes the RADIUS Attributes parameters:

Table 326: RADIUS Dictionary Attributes Parameters

Parameter Description

Export Click to save the dictionary file in XML format. You can make modifications to the dictionary and import the file back into Policy Manager.

Enable/Disable Enable or disable this dictionary. Enabling a dictionary makes it appear in the Policy

Manager rules editors (Service rules, Role mapping rules, etc.).

Import RADIUS Dictionary

You can add additional dictionaries using the Import too. To add a new vendor dictionary, navigate to

Administration > Dictionaries > RADIUS, and click the Import link. To edit an existing dictionary, export an existing dictionary, edit the exported XML file, and then import the dictionary. To view the contents of the

RADIUS dictionary, sorted by Vendor Name, Vendor ID, or Vendor Prefix, navigate to Administration >

Dictionaries > RADIUS.

The following figure displays the Import from file pop-up:

Figure 523: Import RADIUS Dictionary Pop-up

The following table describes the Import from file parameters:

Table 327: Import from file Parameters

Parameter Description

Select File Browse to select the file that you want to import.

Enter secret for the file (if any)

If the file that you want to import is password protected, enter the secret here.

Posture Dictionary

To add a vendor posture dictionary, click on Import. To edit an existing dictionary, export an existing dictionary, edit the exported XML file, and then import the dictionary. To view the contents of the Posture

550 | Administration ClearPass Policy Manager 6.5 |  User Guide

dictionary, navigate to Administration > Dictionaries > Posture and sort by Vendor Name, Vendor ID,

Application Name, or Application ID.

The following figure displays the Posture Dictionaries page:

Figure 524: Posture Dictionaries

The following table describes the Posture Dictionaries parameters:

Table 328: Posture

Parameter Description

Import Click to open the Import Dictionary pop up.

Click a vendor row to see all the attributes and their data type. For example, click on vendor Microsoft/System

SHV to see all the associated posture attributes and their data type. The following figure displays the Posture

Attributes pop-up.

Figure 525: Posture Attributes Pop-up

The following table describes the Posture Attributes parameters:

Table 329: Posture Attributes Parameters

Parameter Description

Export Click to save the posture dictionary file in XML format. You can make modifications to the dictionary and import the file back into Policy Manager.

ClearPass Policy Manager 6.5 | User Guide Administration | 551

TACACS+ Services Dictionary

To view the contents of the TACACS+ service dictionary, navigate to Administration > Dictionaries >

TACACS+ Services and sort by Name or Display Name. To add a new TACACS+ service dictionary, click the

Import link. To add or modify attributes in an existing service dictionary, select the dictionary, export it, make edits to the XML file, and import it back into Policy Manager.

The following figure displays the TACACS+ Services Dictionaries page:

Figure 526: TACACS+ Services Dictionaries Page

The following table describes the TACACS+ Services Dictionaries parameters:

Table 330: TACACS+ Services Dictionaries Parameters

Parameter Description

Import Click to open the Import Dictionary pop up. Import the dictionary (XML file).

Export All Export all TACACS+ services into one XML file containing multiple dictionaries.

To export a specific service dictionary, select a service and click Export. To see all the attributes and their data types, click a service row. For example, click shell service to see all shell service attributes and their data type.

552 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the TACACS+ Service Dictionary Attributes pop-up:

Figure 527: TACACS+ Service Dictionary Attributes Pop-up

Fingerprints Dictionary

The Device Fingerprints page shows a listing of all the device fingerprints recognized by the Profile module.

These fingerprints are updated from the Aruba ClearPass Update Portal (see

Updating Policy Manager

Software on page 566

for more information). To view the contents of the fingerprints dictionary, navigate to

Administration > Dictionaries > Fingerprints. The following figure displays the Device Fingerprints page.

Figure 528: Device Fingerprints Page

ClearPass Policy Manager 6.5 | User Guide Administration | 553

You can click on a line in the Device Fingerprints list to drill down and view additional details about the category. The following figure displays the Device Fingerprint Dictionary Attributes pop-up.

Figure 529: Device Fingerprint Dictionary Attributes Pop-up

Dictionary Attributes

This section contains the following information: l l l l l l

Introduction

Adding a Dictionary Attribute

Modifying Dictionary Attributes

Importing Dictionary Attributes

Exporting All Dictionary Attributes

Exporting Selected Dictionary Attributes

Introduction

The Attributes dictionary page allows you to specify unique sets of criteria for local users, guest users, endpoints, and devices. This information can then be used with role-based device policies for enabling appropriate network access.

To view the contents of the attributes dictionary, navigate to Administration > Dictionaries > Attributes.

554 | Administration ClearPass Policy Manager 6.5 |  User Guide

The dictionary Attributes page appears:

Figure 530: Dictionary Attributes Page

Table 331

describes the dictionary Attributes parameters:

Table 331: Dictionary Attributes Parameters

Parameter Description

Filter

Name

Use the Filter drop-down list to create a search based on the available Name, Entity, Data Type, Is

Mandatory, or Allow Multiple settings.

The name of the attribute.

Entity

Data Type

Indicates whether the attribute applies to a Local User, Guest User, Device, or Endpoint.

Indicates whether the data type is string, integer, boolean, list, text, date, MAC address, or IPv4 address.

Indicates whether the attribute is required for a specific entity.

Is

Mandatory

Allow

Multiple

Indicates whether multiple attributes are allowed for an entity.

Adding a Dictionary Attribute

To add a dictionary attribute:

1. From the menu on the upper right of the page, click Add.

The Add Attribute dialog appears.

ClearPass Policy Manager 6.5 | User Guide Administration | 555

Figure 531: Add Attribute Dialog

2. Enter the information in the fields described in the following table.

The following table describes the Add Attribute parameters:

Table 332: Attribute Setting Parameters

Parameter Description

Entity

Name

Specify whether the attribute applies to a Device, Endpoint, Guest User, Local User, or

Onboard.

Enter a unique ID for this dictionary attribute.

Data Type

Is Mandatory

From the drop-down, specify the data type.

Specify whether the attribute is required for a specific entity.

Allow Multiple Specify whether multiple attributes are allowed for an entity.

NOTE: Multiple attributes are not permitted if Is Mandatory is specified as Yes.

Default Value (optional) Specify whether the default value is True or False. This field is optional.

3. When you are done, click Add.

Modifying Dictionary Attributes

To modify dictionary attributes in a service dictionary:

1. Select the dictionary attribute.

2. Make any necessary changes, then click Save.

Importing Dictionary Attributes

To import attributes:

1. From the menu at the top right section of the page, click Import.

The Import from File dialog appears.

556 | Administration ClearPass Policy Manager 6.5 |  User Guide

Figure 532: Importing Dictionary Attributes

2. Enter the Import from File parameters as described in

Table 333

.

Table 333: Import From File Parameters

Parameter Description

Select File Browse to select the file that you want to import.

Enter secret for the file

(if any)

If the file that you want to import is password protected, enter the secret here.

3. When finished, click Import.

The imported file is in XML format. To view a sample of this XML format, export a dictionary file and open it in an

XML viewer.

Exporting All Dictionary Attributes

To export all the dictionary attributes at once:

1. From the menu on the upper right of the pager, select Export All.

The Export to File dialog appears.

Figure 533: Exporting Dictionary Attributes

2. Specify the Export to File parameters as described in

Table 334

.

ClearPass Policy Manager 6.5 | User Guide Administration | 557

Table 334: Export to File Parameters

Parameter Description

Export file with password protection

The Yes option is enabled by default.

If you wish to disable password protection when exporting a file, select No.

Secret Key If the file that you want to import is password protected, enter the secret here. Then verify the secret key.

3. When finished, click Export.

The TagDictionary.xml file is created.

4. Download the file.

Exporting Selected Dictionary Attributes

To export selected dictionary attributes:

1. On the Attributes dictionary page, select one or more attribute entries.

The Export and Delete buttons on the lower right are now enabled.

2. Click Export.

The Export to File dialog appears.

3. Specify the Export to File parameters as described in

Table 334

.

4. When finished, click Export.

The TagDictionary.xml file is created.

5. Download the file.

Applications Dictionaries

Application dictionaries define the attributes of the Onboard Policy Manager application and the type of each attribute.

When Policy Manager is used as the Policy Definition Point (PDP), it uses the information in these dictionaries to validate the attributes and data types sent in a WEB-AUTH request.

Viewing an Application Dictionary

To view the contents of the application dictionary:

1. Navigate to Administration > Dictionaries > Applications.

The Applications Dictionaries page appears.

Figure 534: Applications Dictionaries Page

558 | Administration ClearPass Policy Manager 6.5 |  User Guide

2. To see the application attributes, click the name of an application.

The Application Attributes dialog box appears.

Figure 535: Application Attributes Dialog

Deleting an Application Dictionary

In general, there is no need to delete an application dictionary. They have no effect on Policy Manager performance.

To delete an application dictionary:

1. Navigate to Administration > Dictionaries > Applications.

2. Click the check box next to an application name.

3. Click Delete.

OnGuard Settings

Use the OnGuard Settings page to configure the agent deployment packages. Once the configuration is saved, agent deployment packages are created for Windows and Mac OS X operating systems and provided at a fixed URL on the ClearPass Policy Manager appliance. This URL can then be published to the user community.

The agent deployment packages can also be downloaded to another location.

ClearPass Policy Manager 6.5 | User Guide Administration | 559

OnGuard Settings Main Page

Navigate to Administration > Agents and Software Updates > OnGuard Settings. The following figure displays the OnGuard Settings page:

Figure 536: OnGuard Settings

The following table describes the OnGuard Settings parameters:

Table 335: OnGuard Settings Parameters

Parameter Description

Global Agent Settings Configure the global parameters for OnGuard agents. For more information on configuring global agent settings, see Global Agent Settings on page 1 .

Policy Manager

Zones

Configure the network (subnet) for a Policy Manager Zone. For more information on configuring Policy Manager zones, see Policy Manager Zones on page 1 .

Specifies the current agent version.

Agent Version

Agent Installers

Installer Mode

Windows

Mac OS X

Specify the action to be taken from the following options when the Aruba VIA component is used to provide VPN-based access: l l

Do not install/enable VIA component

Install and enable VIA Component

Use the download link to download OnGuard Agent for Windows.This binary file is in .exe

and .msi formats.

Use the download link to download OnGuard Agent for Mac OS X. This binary file is in

.DMG format.

560 | Administration ClearPass Policy Manager 6.5 |  User Guide

Table 335: OnGuard Settings Parameters (Continued)

Parameter Description

Ubuntu Use the download link to download Ubuntu Agent for Linux. This binary file is in .tar.gz

format.

Native Dissolvable Agent Apps

Windows

Mac OS X

Click the URL to download Native Dissolvable Agent for Windows.

Click the URL to download Native Dissolvable Agent for Mac OS X.

Ubuntu Click the URL to download Native Dissolvable Agent for Ubuntu. You can download the

.tar.gz files specific to 32-bit and 64-bit systems.

Agent Customization

Managed Interfaces

Mode

Select the type(s) of interfaces that OnGuard will manage on the endpoint. Select from the following options: l l

Wired

Wireless l l

VPN

Other

Select one of the following options: l l

Authenticate - no health checks - OnGuard collects username/password but does not perform health checks on the endpoint.

Check health - no authentication - OnGuard does not collect username/password.

l Authenticate with health checks - OnGuard collects username/password and also performs health checks on the endpoint.

Username/Password Text:

The label for the username/password field on the OnGuard agent. This setting is not valid for the Check health - no authentication mode.

Username text The label for the username field on the OnGuard agent. This setting is not valid for the

Check health - no authentication mode.

Password text Enter the password field on the OnGuard agent. This setting is not valid for the Check

health - no authentication mode.

Agent action when an update is available

Determines what the agent does when an update is available. Select one of the following options: l

Ignore - ClearPass Policy Manager ignores the available update.

l l

Notify User - ClearPass Policy Manager notifies the user that an update is available.

Download and Install - ClearPass Policy Manager automatically downloads and installs an update is available.

ClearPass Policy Manager 6.5 | User Guide Administration | 561

Updating Policy Manager Software

This section describes the ClearPass Policy Manager server software update process.

Use the Software Updates page to register for and to receive live updates for: l l l

Posture updates, including Antivirus, Antispyware, and Windows Updates

Profile data updates, including Fingerprint

Software upgrades for the ClearPass family of products n

Patch binaries, including Onboard, Guest Plugins, and Skins

You can also: l l

Reinstall a patch in the event the previous installation attempt fails.

Uninstall a skin, translation, or plug-in.

The ClearPass Policy Manager checks for available updates to the ClearPass webservice server. The administrator can download and install these updates directly from the Software Updates page. The first time the Subscription ID is saved, ClearPass Policy Manager performs the following: l l

Contacts the webservice to download the latest Posture & Profile Data updates.

Checks for any available firmware and patch updates.

This section describes the following topics: l l l l l

Software Updates Main Page on page 563

Install Update Dialog Box on page 564

Reinstalling a Patch on page 566

Uninstalling a Skin, Translation, or Plugin on page 566

Updating the Software on page 1

562 | Administration ClearPass Policy Manager 6.5 |  User Guide

Software Updates Main Page

Navigate to Administration > Agents and Software Updates > Software Updates. The following figure displays the Software Updates main page:

Figure 537: Software Updates Page

The following table describes the Software Updates parameters:

Table 336: Software Updates Parameters

Parameter Description

Subscription ID

Subscription

ID

Enter the Subscription ID provided to you. This text box is enabled only on a Publisher node. You can opt out of automatic downloads at any time by saving an empty

Subscription ID.

Posture & Profile Data Updates

Import

Updates

If this ClearPass Policy Manager server is not able to reach the webservice server, use

Import Updates to import (upload) the Posture and Profile Data into this server. You can download the data from the webservice server by accessing the following URL: https://clearpass.arubanetworks.com/cppm/appupdate/cppm_apps_updates.zip

When prompted, enter the provided Subscription ID for the username and the password.

NOTE: In a cluster, the Import Updates option is available on the Publisher node only.

ClearPass Policy Manager 6.5 | User Guide Administration | 563

Table 336: Software Updates Parameters (Continued)

Parameter Description

Firmware & Patch Updates

Import

Updates

If the server is not able to reach the webservice server, click Import Updates to import the latest signed Firmware and Update patch binaries (obtained via support or other means) into this server. These patch binaries will appear in the table and can be installed by clicking on the Install button. When logged in as appadmin, you can manually install the Upgrade and Patch binaries imported via the CLI using the following commands: l l

system update (for patches)

system upgrade (for upgrades)

If a patch requires a prerequisite patch, that patchs' Install button will not be enabled until the prerequisite patch is installed.

Install

Re-Install

The Install button appears after the update has been downloaded. When you click

Install, the installation of the update starts and the Install Update dialog box displays, showing the log messages being generated.

Click Re-Install to reinstall a patch in the event the previous attempt to install fails.

Reinstalling a patch is available only for the last installed patch.

Uninstall

Needs

Restart

Click Uninstall to uninstall a skin, translation, or plugin.

The Needs Restart link appears when an update needs a reboot of the server in order to complete the installation. Clicking this link displays the Install Update dialog box, which shows the log messages generated during the installation.

Installed

Install Error

The Installed link appears when an update has been successfully installed. Clicking this link displays the Install Update dialog box, which shows the log messages generated during the installation.

This link appears when an update install encounters an error. Clicking this link displays the Install Update dialog box, which shows the log messages generated during the install.

Other

Check

Status Now

Click this button to perform an on-demand check for available updates. Check Status

Now applies to updates only on a publisher node, as well as Firmware & Patch Updates.

Delete Use this option to delete a downloaded update.

The Firmware & Patch Updates table shows only the data that is known to webservice or imported using the

Import Updates button.

Install Update Dialog Box

The Install Update dialog box shows the log messages generated during the installation of an update. This popup appears when you click the Install button.

564 | Administration ClearPass Policy Manager 6.5 |  User Guide

If the popup is closed, you can bring it up again by clicking the Install in progress… link while the installation is in progress, or by clicking the Installed, Install Error, or Needs Restart link when the installation is completed.

The following figure displays the Install Update pop-up:

Figure 538: Install Update Pop-up

The following table describes the Install Update parameters:

Table 337: Install Update Parameters

Parameter Description

Reboot The Reboot button appears only for updates that require a reboot to complete the installation. To initiate a reboot of the server, click Reboot.

Clear &

Close

Click this button to delete the log messages and close the popup. Clear & Close also removes the corresponding row from the Firmware & Patch Updates table.

Close Click this button to close the dialog box.

To delete the log messages from a failed installation, use the Clear & Close button on the Install Update dialog box. After the log messages are cleared, attempt the installation again.

System Events (as seen on the Monitoring > Event Viewer page) show records for events, such as communication failures with webservice, successful or failed download of updates, and successful or failed installation of updates.

The ClearPass Policy Manager server contacts the webservice server every hour in the background to download any newly available Posture & Profile Data updates. The current list of firmware and patch updates is queried from webservice every day at a random minute between 4:00 a.m and 5:00 a.m.

Any new list of firmware and update patches that are available are noted by the Policy Manager server automatically and shown in the UK that they are available for download and installation. The webservice itself

ClearPass Policy Manager 6.5 | User Guide Administration | 565

is refreshed with the Antivirus and Antispyware data hourly, with Windows Updates daily. Fingerprint data and

Firmware & Patches are refreshed as and when new ones are available.

An event is generated and displayed in the Event Viewer with the list of new updates that are available. If the event affects an SMTP server, Alert Notification email addresses are configured, and an email from the

Publisher is sent with the list of downloaded images.

Reinstalling a Patch

The Reinstall Patch feature allows the administrator to reinstall a patch in the event the previous attempt to install fails. You can only reinstall the last installed patch, which is indicated by a “!” symbol next to it in the

Firmware & Patch Updates table on the Administration > Agents and Software Updates > Software

Updates page.

To reinstall a patch or software update:

1. Navigate to Administration > Agents and Software Updates > Software Updates.

2. In the Firmware & Patch Updates section, observe the Status column.

3. To bring up the dialog that shows the logs, click the Installed, Install Error, or Needs Restart link.

4. To reinstall the patch or software update, click Re-Install.

The Install Update screen closes and the re-installation process begins. A pop-up displays, showing the installation progress via log messages.

Uninstalling a Skin, Translation, or Plugin

The administrator can uninstall a Skin, Translation, or Plugin.

To uninstall one of these elements:

1. Navigate to Administration > Agents and Software Updates > Software Updates.

2. In the Firmware & Patch Updates section, observe the Status column.

3. To bring up the dialog that shows the logs, click the Installed link.

4. To uninstall the patch or software update, click Uninstall.

The Install Update screen closes and the software is uninstalled.

Updating Policy Manager Software

This section describes the ClearPass Policy Manager server software update process.

Use the Software Updates page to register for and to receive live updates for: l l l

Posture updates, including Antivirus, Antispyware, and Windows Updates

Profile data updates, including Fingerprint

Software upgrades for the ClearPass family of products n

Patch binaries, including Onboard, Guest Plugins, and Skins

You can also: l l

Reinstall a patch in the event the previous installation attempt fails.

Uninstall a skin, translation, or plug-in.

The ClearPass Policy Manager checks for available updates to the ClearPass webservice server. The administrator can download and install these updates directly from the Software Updates page. The first time the Subscription ID is saved, ClearPass Policy Manager performs the following: l

Contacts the webservice to download the latest Posture & Profile Data updates.

566 | Administration ClearPass Policy Manager 6.5 |  User Guide

l

Checks for any available firmware and patch updates.

This section describes the following topics: l l l l l

Software Updates Main Page on page 567

Install Update Dialog Box on page 569

Reinstalling a Patch on page 570

Uninstalling a Skin, Translation, or Plugin on page 570

Updating the Software on page 1

Software Updates Main Page

Navigate to Administration > Agents and Software Updates > Software Updates. The following figure displays the Software Updates main page:

Figure 539: Software Updates Page

ClearPass Policy Manager 6.5 | User Guide Administration | 567

The following table describes the Software Updates parameters:

Table 338: Software Updates Parameters

Parameter Description

Subscription ID

Subscription

ID

Enter the Subscription ID provided to you. This text box is enabled only on a Publisher node. You can opt out of automatic downloads at any time by saving an empty

Subscription ID.

Posture & Profile Data Updates

Import

Updates

If this ClearPass Policy Manager server is not able to reach the webservice server, use

Import Updates to import (upload) the Posture and Profile Data into this server. You can download the data from the webservice server by accessing the following URL: https://clearpass.arubanetworks.com/cppm/appupdate/cppm_apps_updates.zip

When prompted, enter the provided Subscription ID for the username and the password.

NOTE: In a cluster, the Import Updates option is available on the Publisher node only.

Firmware & Patch Updates

Import

Updates

If the server is not able to reach the webservice server, click Import Updates to import the latest signed Firmware and Update patch binaries (obtained via support or other means) into this server. These patch binaries will appear in the table and can be installed by clicking on the Install button. When logged in as appadmin, you can manually install the Upgrade and Patch binaries imported via the CLI using the following commands: l l

system update (for patches)

system upgrade (for upgrades)

If a patch requires a prerequisite patch, that patchs' Install button will not be enabled until the prerequisite patch is installed.

Install

Re-Install

The Install button appears after the update has been downloaded. When you click

Install, the installation of the update starts and the Install Update dialog box displays, showing the log messages being generated.

Click Re-Install to reinstall a patch in the event the previous attempt to install fails.

Reinstalling a patch is available only for the last installed patch.

Uninstall

Needs

Restart

Installed

Click Uninstall to uninstall a skin, translation, or plugin.

The Needs Restart link appears when an update needs a reboot of the server in order to complete the installation. Clicking this link displays the Install Update dialog box, which shows the log messages generated during the installation.

The Installed link appears when an update has been successfully installed. Clicking this link displays the Install Update dialog box, which shows the log messages generated during the installation.

568 | Administration ClearPass Policy Manager 6.5 |  User Guide

Table 338: Software Updates Parameters (Continued)

Parameter Description

Install Error

This link appears when an update install encounters an error. Clicking this link displays the Install Update dialog box, which shows the log messages generated during the install.

Other

Check

Status Now

Click this button to perform an on-demand check for available updates. Check Status

Now applies to updates only on a publisher node, as well as Firmware & Patch Updates.

Delete Use this option to delete a downloaded update.

The Firmware & Patch Updates table shows only the data that is known to webservice or imported using the

Import Updates button.

Install Update Dialog Box

The Install Update dialog box shows the log messages generated during the installation of an update. This popup appears when you click the Install button.

If the popup is closed, you can bring it up again by clicking the Install in progress… link while the installation is in progress, or by clicking the Installed, Install Error, or Needs Restart link when the installation is completed.

The following figure displays the Install Update pop-up:

Figure 540: Install Update Pop-up

ClearPass Policy Manager 6.5 | User Guide Administration | 569

The following table describes the Install Update parameters:

Table 339: Install Update Parameters

Parameter Description

Reboot The Reboot button appears only for updates that require a reboot to complete the installation. To initiate a reboot of the server, click Reboot.

Clear &

Close

Click this button to delete the log messages and close the popup. Clear & Close also removes the corresponding row from the Firmware & Patch Updates table.

Close Click this button to close the dialog box.

To delete the log messages from a failed installation, use the Clear & Close button on the Install Update dialog box. After the log messages are cleared, attempt the installation again.

System Events (as seen on the Monitoring > Event Viewer page) show records for events, such as communication failures with webservice, successful or failed download of updates, and successful or failed installation of updates.

The ClearPass Policy Manager server contacts the webservice server every hour in the background to download any newly available Posture & Profile Data updates. The current list of firmware and patch updates is queried from webservice every day at a random minute between 4:00 a.m and 5:00 a.m.

Any new list of firmware and update patches that are available are noted by the Policy Manager server automatically and shown in the UK that they are available for download and installation. The webservice itself is refreshed with the Antivirus and Antispyware data hourly, with Windows Updates daily. Fingerprint data and

Firmware & Patches are refreshed as and when new ones are available.

An event is generated and displayed in the Event Viewer with the list of new updates that are available. If the event affects an SMTP server, Alert Notification email addresses are configured, and an email from the

Publisher is sent with the list of downloaded images.

Reinstalling a Patch

The Reinstall Patch feature allows the administrator to reinstall a patch in the event the previous attempt to install fails. You can only reinstall the last installed patch, which is indicated by a “!” symbol next to it in the

Firmware & Patch Updates table on the Administration > Agents and Software Updates > Software

Updates page.

To reinstall a patch or software update:

1. Navigate to Administration > Agents and Software Updates > Software Updates.

2. In the Firmware & Patch Updates section, observe the Status column.

3. To bring up the dialog that shows the logs, click the Installed, Install Error, or Needs Restart link.

4. To reinstall the patch or software update, click Re-Install.

The Install Update screen closes and the re-installation process begins. A pop-up displays, showing the installation progress via log messages.

Uninstalling a Skin, Translation, or Plugin

The administrator can uninstall a Skin, Translation, or Plugin.

To uninstall one of these elements:

1. Navigate to Administration > Agents and Software Updates > Software Updates.

570 | Administration ClearPass Policy Manager 6.5 |  User Guide

2. In the Firmware & Patch Updates section, observe the Status column.

3. To bring up the dialog that shows the logs, click the Installed link.

4. To uninstall the patch or software update, click Uninstall.

The Install Update screen closes and the software is uninstalled.

Contact Support

The Administration > Support > Contact Support page provides you with information on how to contact

ArubaCare.

The following figure displays the Contact Support page:

Figure 541: Contact Support Page

Remote Assistance

The Remote Assistance feature enables the ClearPass Policy Manager administrator to allow an Aruba

Networks support engineer to remotely log in using Secured Shell (SSH) to the ClearPass Policy Manager server and also view the ClearPass Policy Manager UI to debug any issues customer is facing or to perform pro-active monitoring of the server.

This section describes the following topics: l l

Remote Assistance Process Flow on page 571

Adding a Remote Assistance Session on page 572

Remote Assistance Process Flow

This topic describes the Remote Assistance process flow.

1. Administrator schedules a Remote Assistance session for a specific duration.

2. The Aruba Networks support contact receives an email with instructions and credentials to login to the remote system.

3. The session is terminated at the end of the specified duration.

4. The administrator can terminate a session before its stipulated duration from ClearPass Policy Manager UI.

ClearPass Policy Manager 6.5 | User Guide Administration | 571

5. The support contact can terminate the session before the time expires.

Configuring a Remote Assistance session through a CLI can be used if the ClearPass Policy Manager UI at the customer site is inaccessible.

The following figure displays the Remote Assistance session page:

Figure 542: Remote Assistance Session Page

The following table describes the Remote Assistance session parameters:

Table 340: Remote Assistance Session Parameters

Parameter Description

Name Name of the session.

Type Indicates if the session is a one-time session or a periodic session. Move the cursor over the entry to view the schedule of the session.

The email address of the support contact.

Support

Contact

Status Provides the session state. Available states are: l Saving l l

Scheduled

Initiated l l

Running

Terminated l

Failed

NOTE: A session in any of Scheduled, Terminated, and Failed states can be edited and saved. Only a session in Running state can be terminated by selecting that session and clicking Terminate. A session in any of Scheduled, Terminated and Failed states can be deleted by selecting that session and clicking Delete. If a session fails, the Event Viewer indicates the cause of the failure.

Timestamp The server time when the status was last updated.

Adding a Remote Assistance Session

The administrator can click the Add Session link to create a session on a ClearPass Policy Manager server in the cluster. Sessions can only be saved and deleted from the Publisher in a cluster. Sessions can be terminated from a Publisher or from Subscribers in a cluster.

572 | Administration ClearPass Policy Manager 6.5 |  User Guide

To set up a session, click Add Session. The following figure displays the Add Session pop-up:

Table 341: Add Session Pop-up

The following table describes the Add Session parameters:

Table 342: Add Session Parameters

Parameter Description

Session

Name

Text name of session.

Session

Type

Duration

Aruba

Support

Contact l l l

One Time Future (Initiates a session in future, on a selected date and time)

Weekly (Initiates a session on a selected weekday at the selected time)

Monthly (Initiates a session on a selected day of every month at the selected time)

The duration of a session is specified in Hours and Minutes. The "session begin" time saved is the time relative to server’s time, and is specified in a 24-hour clock format.

The Aruba Support Contact is just the email-id of the support contact

(‘@arubanetworks.com’ is appended to the ID).

ClearPass Policy Manager 6.5 | User Guide Administration | 573

The figure below is an example of an email that a support technician may receive after a Remote Assistance session is scheduled.

Figure 543: Example of a Remote Assistance Session Notification Email

Documentation

The Administration > Support > Documentation page includes links to various sections of the ClearPass

Policy Manager Online Help system. For example, to view documentation for the CLI, click the Command Line

Interface button. This page also provides links to PDF versions of the ClearPass Policy Manager 6.5 User Guide and the ClearPass Policy Manager 6.5 Getting Started Guide.

574 | Administration ClearPass Policy Manager 6.5 |  User Guide

The following figure displays the Documentation page:

Figure 544: Documentation Page

ClearPass Policy Manager 6.5 | User Guide Administration | 575

576 | Administration ClearPass Policy Manager 6.5 |  User Guide

Appendix A

Command Line Interface

Refer to the following sections to perform various tasks using the Command Line Interface (CLI): l l l l l l l l

Available Commands

Cluster Commands on page 577

Configure Commands on page 580

Network Commands on page 585

Service Commands on page 591

Show Commands on page 593

System Commands on page 597

Miscellaneous Commands on page 605

l l l l l l l

Cluster Commands

The Policy Manager command line interface includes the following cluster commands:

cluster drop-subscriber

cluster list cluster make-publisher cluster make-subscriber

cluster reset-database cluster set-cluster-passwd

cluster sync-local-passwd

cluster drop-subscriber

Use the drop-subscriber command to remove a specific subscriber node from the cluster.

Syntax cluster drop-subscriber [-f] [-i <IP address>] -s

Table 343

describes the required and optional parameters for the drop-subscriber command:

Table 343: Drop-Subscriber Command Parameters

Parameter/Flag Description

-f Forces to drop even the nodes that are down.

-i <IP Address>

-s

Specifies the Management IP address of the node. If this IP address is not specified and the current node is a subscriber, then Policy Manager drops the current node.

Restricts resetting the database on the dropped node.

By default, Policy Manager drops the current node—if it's a subscriber—from the cluster.

Example

The following example removes the IP address 192.xxx.1.1 from the cluster:

ClearPass Policy Manager 6.5 | User Guide Command Line Interface | 577

[appadmin]# cluster drop-subscriber -f -i 192.xxx.1.1 -s

cluster list

Use the cluster list command to list all the nodes in the cluster.

Syntax cluster list

Example

The following example lists all the nodes in a cluster:

[appadmin]# cluster list

cluster make-publisher

Use the cluster make-publisher command to promote a specific subscriber node to be the publisher node in the same cluster.

When running this command, do not close the shell or interrupt the command execution.

Example

The following example promotes a subscriber node to publisher node status:

[appadmin]# cluster make-publisher

********************************************************

* WARNING: Executing this command will promote the *

* current machine (which must be a subscriber in the *

* cluster) to the cluster publisher. Do not close the *

* shell or interrupt this command execution.

*

********************************************************

Continue? [y|Y]: y

To continue the make-publisher operation, enter y.

cluster make-subscriber

Run the cluster make-subscriber command on a standalone publisher to make the standalone node a subscriber and add it to the cluster.

Syntax cluster make-subscriber -b -i <IP address> [-l]

Table 344

describes the required and optional parameters for the make-subscriber command:

Table 344: Cluster Make-Subscriber Command Parameters

Parameter/Flag Description

-b Generates a backup of the publisher before you make it a subscriber in the event the

make-subscriber process fails and you need to restore the publisher.

-i <IP address>

-l

Specifies the publisher's IP address. This field is mandatory.

Restores the local log database after this operation. This field is optional.

578 | Command Line Interface ClearPass Policy Manager 6.5 |  User Guide

Example

The following example converts the node with IP address 192.xxx.1.1 to a subscriber node:

[appadmin]# cluster make-subscriber –i 192.xxx.1.1 –p !alore -l

cluster reset-database

Use the reset-database command to reset the local database and erase its configuration.

Running this command erases the Policy Manager configuration and resets the database to its default configuration—all the configured data will be lost.

When running this command, do not close the shell or interrupt the command execution.

Syntax cluster reset-database

Example

The following example reset the database:

[appadmin]# cluster reset-database

**********************************************************

* WARNING: Running this command will erase the Policy Manager *

* configuration and leave the database with default *

* configuration. You will lose all the configured data. *

* Do not close the shell or interrupt this command

* execution.

*

*

*********************************************************

Continue? [y|Y]: y

To continue the reset-database operation, enter y.

cluster set-cluster-passwd

Use the cluster set-cluster-passwd command to change the cluster password on all nodes in the cluster.

You may only issue this command from the publisher node.

Setting the cluster password changes the appadmin password for all the nodes in the cluster

Syntax cluster set-cluster-passwd

Example

The following example changes the cluster password on publisher nodes:

[appadmin]# cluster set-cluster-passwd cluster set-cluster-passwd

Enter Cluster Passwd: college.162

Re-enter Cluster Passwd: college.162

INFO - Password changed on local (publisher) node

Cluster password changed

ClearPass Policy Manager 6.5 | User Guide Command Line Interface | 579

cluster sync-local-passwd

Use the cluster sync-cluster-passwd command to synchronize the cluster (appadmin) password currently set on the publisher with all the subscriber nodes in the cluster.

Synchronizing the cluster password changes the appadmin password for all the nodes in the cluster

Syntax cluster sync-local-password

Example

The following example changes the local password:

[appadmin]# cluster set-local-password cluster sync-local-passwd

Enter Password: college.205

Re-enter Password: college.205

l l l l l l l l

Configure Commands

The Policy Manager command line interface includes the following configuration commands:

date on page 580

dns on page 581 fips-mode

hostname on page 582 ip on page 582

ip6 mtu

timezone on page 585

date

Use the date command to set System Date, Time, and Time Zone.

Syntax configure date -d <date> [-t <time> ] [-z <timezone>] or configure date -s <ntpserver> [-z <timezone>]

The following table describes the required and optional parameters for the date command:

580 | Command Line Interface ClearPass Policy Manager 6.5 |  User Guide

Table 345: Date Command Parameters

Flag/Parameter Description

-s <ntpserver> Synchronizes time with the specified NTP server. This field is optional.

NOTE: You can specify a destination node with the IPv6 address enabled.

-d <date>

-t <time>

-z <timezone>

Specifies the syntax: yyyy-mm-dd. This field is mandatory.

Specifies the syntax: hh:mm:ss. This field is optional.

Specifies the syntax. To view the list of supported timezone values, enter show alltimezones . This field is optional.

Example 1

The following example configures date, time, or timezone:

[appadmin]# configure date –d 2007-06-22 –t 12:00:31 –z America/Los_Angeles

Example 2

The following example synchronizes with a specified NTP server:

[appadmin]# -s <ntpserver>

dns

Use the dns command to configure DNS servers. Specify minimum of one DNS server and you can specify a maximum of three DNS servers.

Syntax configure dns <primary> [secondary] [tertiary]

Example 1

The following example configures a DNS server:

[appadmin]# configure dns 192.168.xx.1

Example 2

The following example configures primary and secondary DNS servers:

[appadmin]# configure dns 192.168.xx.1 2001:4860:4860::8888

You can configure IPv6 address as described in this example.

Example 3

The following example configures primary, secondary, and tertiary DNS servers:

[appadmin]# configure dns 192.168.xx.1 2001:4860:4860::8888 192.168.xx.2

fips-mode

Use the fips-mode command to enable or disable the FIPS mode.

Syntax configure fip-smode [0|1]

ClearPass Policy Manager 6.5 | User Guide Command Line Interface | 581

The following table describes the required and optional parameters for the fips-mode command:

Table 346: fips-mode Command Parameters

Flag/Parameter Description

0 Enter 0 to disable the FIPS mode.

Read the warning message carefully before enabling or disabling the FIPS mode.

1 Enter 1 to enable the FIPS mode.

Example 1

The following example disables the FIPS mode:

[appadmin]# configure fips-mode 0

******************************************************************

* *

* WARNING: Running this command will erase the Policy Manager *

* configuration and leave the database with default

* configuration. You will lose all the configured data.

*

*

* *

* This command will also shutdown all applications and reboot *

* the system.

* *

*

* Do not close the shell or interrupt this command execution. *

* *

******************************************************************

Continue? [y|n]: y

Click y to disable the FIPS mode.

hostname

Use the hostname command to configure the hostname.

Syntax configure hostname <hostname>

Example

The following example configures a hostname:

[appadmin]# configure hostname sun.us.arubanetworks.com

ip

Use the ip command to configure IP address, netmask, and gateway.

Syntax

[appadmin]# configure ip <mgmt|data> <ipaddress> netmask <netmask address> gateway <gateway address>

The following table describes the parameters used in the ip command:

582 | Command Line Interface ClearPass Policy Manager 6.5 |  User Guide

Table 347: ip Command Parameters

Flag/Parameter ip <mgmt|data> <ip address> netmask <netmask address> gateway <gateway address>

Description

Specifies the network interface type: management or data.

<ip address> specifies the IPv4 address of the host.

Specifies the netmask address.

Specifies the gateway address.

Example

The following example configures the IP, netmask, and gateway addresses:

[appadmin]# configure ip data 192.168.xx.12 netmask 255.255.255.0 gateway 192.168.xx.1

ip6

Use the ip6 command to configure the IPv6 address, netmask, and gateway.

Syntax configure ip6 <mgmt|data> <IPv6Address/PrefixLen> gateway <gateway address> configure ip6 <mgmt|data> <IPv6Address> netmask <netmask address> gateway <gateway address>

The following table describes the parameters used in the ip6 command:

Table 348: ip6 Command Parameters

Flag/Parameter Description ip6 <mgmt|data> <ip address> Specifies the Network interface type: management or data.

NOTE: <ip6 address> specifies the IPv6 address of the host.

netmask <netmask address> gateway <gateway address>

Specifies the netmask address. For example, ffff:ffff:ffff:ffff:0000:0000:0000:0000.

Specifies the gateway address. For example, fe90:0000:0000:0000:020c:29ff:fe7e:d3a2.

Example

The following example configures the IPv6 management, netmask, and gateway:

[appadmin]# configure ip6 mgmt fe90:0000:0000:0000:020c:29ff:fe7e:d3e1 netmask ffff:ffff:ffff:ffff:0000:0000:0000:0000 gateway fe90:0000:0000:0000:020c:29ff:fe7e:d3a1

mtu

Use the mtu command to set the Maximum Transmission Unit (MTU) for the management and data port interfaces.

Syntax configure mtu <mgmt|data> <mtu-value>

The following table describes the parameters used in the mtu command:

ClearPass Policy Manager 6.5 | User Guide Command Line Interface | 583

Table 349: mtu Command Parameters

Flag/Parameter Description mtu <mgmt|data> Specifies the Network interface types: management or data port.

mtu-value Specify the MTU value in bytes. The default value is 1500 bytes.

Example 1

The following example configures the mtu management interface:

[appadmin] # configure mtu mgmt 1498

********************************************************

* *

* WARNING: Running this command might cause system *

* to lose network connectivity and may require relogin.*

* *

********************************************************

Continue? [y|Y]: y

INFO: Restarting network services

INFO: Successfully applied MTU settings

Example 2

The following example configures the mtu data port value:

[appadmin]# configure mtu data 1498

********************************************************

* *

* WARNING: Running this command might cause system *

* to lose network connectivity and may require relogin.*

* *

********************************************************

Continue? [y|Y]: y

INFO: Restarting network services

INFO: Successfully applied MTU settings

Example 3

The following example displays the settings of the mtu management and data port interfaces:

[appadmin] # show ip

===========================================

Device Type : Management Port

-------------------------------------------

IPv4 Address : 10.2.xx.86

Subnet Mask : 255.255.255.0

Gateway : 10.2.xx.1

IPv6 Address : 2607:f0d0:1002:0011:0000:0000:0000:0002

Subnet Mask : ffff:ffff:ffff:ffff:0000:0000:0000:0000

Gateway : 2607:f0d0:1002:0011:0000:0000:0000:0001

Hardware Address : 00:0C:29:70:27:40

MTU : 1499

===========================================

Device Type : Data Port

-------------------------------------------

IPv4 Address : <not configured>

Subnet Mask : <not configured>

Gateway : <not configured>

IPv6 Address : fe80:0000:0000:0000:020c:29ff:fe70:274a

Subnet Mask : ffff:ffff:ffff:ffff:0000:0000:0000:0000

Gateway : fe80:0000:0000:0000:020c:29ff:fe70:2741

584 | Command Line Interface ClearPass Policy Manager 6.5 |  User Guide

Hardware Address : 00:0C:29:70:27:4A

MTU : 1498

===========================================

DNS Information

-------------------------------------------

Primary DNS : 10.2.xx.3

Secondary DNS : 10.1.xx.50

Tertiary DNS : 10.1.xx.200

===========================================

timezone

Use the timezone command to configure time zone interactively.

Syntax configure timezone

Example

The following example configures the timezone interactively:

[appadmin]# configure timezone configure timezone

******************************************************** *

* WARNING: When the command is completed Policy Manager services *

* are restarted to reflect the changes.

*

*********************************************************

Continue? [y|Y]: y

Network Commands

The Policy Manager command line interface includes the following network commands: l l l l l l l l

ip on page 585

ip6

nslookup on page 588

ping ping6

reset on page 590 traceroute on page 590 traceroute6

ip

Use the ip command to add, delete, or list custom routes to the data or management interface routing table.

Syntax network ip add <mgmt|data|greN> [-i <id>] <[-s <SrcAddr>] [-d <DestAddr>]> [-g <ViaAddr>]

The following table describes the required and optional parameters for the ip command:

ClearPass Policy Manager 6.5 | User Guide Command Line Interface | 585

Table 350: IP Command Parameters

Flag/Parameter Description

<mgmt | data| greN> Specifies management interface, data interface or the name of the GRE tunnel.

In <greN>, N specifies the GRE tunnel number ranging from 1,2,3...N.

-i <id>

-s <SrcAddr>

-d <DestAddr>

Specifies the ID of the network IP rule. If this ID is not specified, the system generates an ID automatically.

NOTE: This ID determines the priority in the ordered list of rules in the routing table.

Specifies the IP address or network. For example, 192.168.xx.0/24 or 0/0 (for all traffic) of traffic originator. You must specify only one SrcAddr or DstAddr. This parameter is optional.

Specifies the destination IP address or network. For example, 192.168.xx.0/24 or 0/0

(for all traffic). You must specify only one SrcAddr or DstAddr. This parameter is optional.

Syntax network ip del <-i <id>>

The following table describes the required and optional parameters for the ip del <-i <id>> command:

Table 351: Network IP Delete Command Parameters

Flag/Parameter

-i <id>

Description

Specifies the ID of the rule to delete.

Syntax network ip list

This command lists all routing rules.

Syntax network ip reset

This command reset routing table to factory default setting. All custom routes are removed. The following examples add and list the custom routes:

Example 1

The following example adds a custom route:

[appadmin]# network ip add data -s 192.168.xx.0/24

Example 2

The following example lists all custom routes:

586 | Command Line Interface ClearPass Policy Manager 6.5 |  User Guide

[appadmin]# network ip list

===============================================

IP Rule Information

-----------------------------------------------

0: from all lookup local

10020: from all to 10.xx.4.0/24 lookup mgmt

10040: from 10.xx.4.200 lookup mgmt

10060: from 10.xx.5.200 lookup data

32766: from all lookup main

32767: from all lookup default

===============================================

ip6

Use the ip6 command to add, delete, or list custom routes to the data or management interface routing table.

Syntax network ip6 add <mgmt|data> [-i <id>] <[-s <SrcAddr>] [-d <DestAddr>]>

The following table describes the required and optional parameters for the ip6 command:

Table 352: IP Command Parameters

Flag/Parameter Description

<mgmt|data> Specifies management or data interface

-i <id>

-s <SrcAddr>

-d <DestAddr>

-g <ViaAddr>

Specifies the ID of the network ip rule. If this ID is not specified, the system generates an ID automatically.

NOTE: This ID determines the priority in the ordered list of rules in the routing table.

Specifies the source interface IPv6 address or netmask from where the network

IPv6 rule is specified. For example, fe82::20c:29ff:fe7e:d3e1. The valid IPv6 address or netmask or 0/0 values are allowed. This parameter is optional.

Specifies the destination interface IPv6 address or netmask where the network IPv6 rule is specified. For example, fe82::20c:29ff:fe7e:d3e9. The valid IPv6 address or netmask or 0/0 values are allowed. This parameter is optional.

Specifies the via or gateway IPv6 address through which the network traffic should flow. The valid IPv6 address is allowed. This parameter is optional.

Syntax network ip6 del <-i <id>>

This command deletes a custom route.

Syntax network ip6 list

This command lists all custom routing rules.

Syntax network ip6 reset

This command reset routing table to factory default setting and all custom routes are removed. The following examples add and list the custom routes:

ClearPass Policy Manager 6.5 | User Guide Command Line Interface | 587

Example 1

The following example adds a custom route:

[appadmin]# network ip6 add data -s fe82::20c:29ff:fe7e:d3e1/d3e24

You can use IPv6 address when adding a custom route.

Example 2

The following example lists all custom routing rules:

[appadmin]# network ip6 list

===============================================

IP Rule Information

-----------------------------------------------

0: from all lookup local

13000: from all to fe82::20c:99ff:fe7e:d3e1 lookup mgmt

13001: from all to fe82::20c:99ff:fe7e:d3e4 lookup mgmt

13002: from all to fe82::20c:99ff:fe7e:d3e7 lookup mgmt

13003: from all to fe82::20c:99ff:fe7e:d3e8 lookup mgmt

13004: from all to fe82::20c:99ff:fe7e:d3e9 lookup mgmt

13005: from all to fe82::20c:99ff:fe7e:d3ea lookup static

32766: from all lookup main

===============================================

nslookup

Use the nslookup command to get the IP address of host using DNS.

Syntax nslookup -q <record-type> <host>

The following table describes the required and optional parameters for the nslookup command:

Table 353: nslookup Command Parameters

Flag/Parameter Description

<record-type> Specifies the type of DNS record. For example, A, CNAME, and PTR records.

<host> Specifies the host or domain name to be queried.

Example 1

The following examples obtain the IPv4 and IPv6 addresses of the host or domain using DNS:

[appadmin]# nslookup sun.us.arubanetworks.com

[appadmin]# network nslookup 2001:4860:4860::8888

Example 2

The following example queries a host or domain for SRV records:

[appadmin]# nslookup -q SRV arubanetworks.com

Use the AAAA flag with the -q option to perform network nslookup with IPv6 destinations.

Syntax nslookup -q AAAA <IPv6_addr>

The following example performs network nslookup for the destination with IPv6 address:

588 | Command Line Interface ClearPass Policy Manager 6.5 |  User Guide

Example

[appadmin]# network nslookup 2001::93

Server: 2001::94

Address: 2001::94#53

3.9.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.1.0.0.2.ip6.arpa

[appadmin]# network nslookup -q AAAA ipv6test-n1.cppmipv6.com

Server:

Address:

2001::94

2001::94#53 ipv6test-n1.cppmipv6.com

has AAAA address 2001::93 name = ipv6test-n1.cppmipv6.com.

ping

Use the ping command to test the reachability of the network host.

Syntax network ping [-i <SrcIpAddr>] [-t] <host>

The following table describes the required and optional parameters for the ping command:

Table 354: Ping Command Parameters

Flag/Parameter

-i <SrcIpAddr>

Description

Specifies the originating IP address for ping. This field is optional.

-t

<host>

Use this parameter to ping indefinitely. This field is optional.

Specifies the host to be pinged.

Example

The following example pings a network host to test the reachability:

[appadmin]# network ping –i 192.168.xx.10 –t sun.us.arubanetworks.com

ping6

Use the ping6 command to test the reachability of the network host.

Syntax network ping6 [-i <SrcIPv6Addr>] [-t] <host>

The following table describes the required and optional parameters for the ping command:

Table 355: Ping6 Command Parameters

Flag/Parameter Description

-i <SrcIPv6Addr> Specifies the originating IPv6 address for ping. This field is optional.

-t

<host>

Use this parameter to ping indefinitely. This field is optional.

Specifies the host to be pinged.

Example

The following example pings a network host to test the reachability:

[appadmin]# network ping6 –i fe82::20c:29ff:fe7e:d3e1 –t sun.us.arubanetworks.com

ClearPass Policy Manager 6.5 | User Guide Command Line Interface | 589

reset

Use the reset command to reset the network data and management port.

Syntax network reset <data/mgmt>

The following table describes the required and optional parameters for the reset command:

Table 356: Reset Command Parameters

Flag/Parameter Description data Specifies the name of network data port to reset. This parameter is mandatory.

mgmt Specifies the name of network management port to reset.

NOTE: You can use this command to reset the IPv4 and IPv6 addresses.

Example

The following example reset the network data port:

[appadmin]# network reset data

traceroute

Use the traceroute command to print the route taken to reach the network host.

Syntax network traceroute <host>

The following table describes the required and optional parameters for the traceroute command:

Table 357: Traceroute Command Parameters

Flag/Parameter Description

<host> Specifies the name of network host.

Example

The following example prints the route taken to reach the network host:

[appadmin]# network traceroute sun.us.arubanetworks.com

traceroute6

Use the traceroute6 command to print the route taken to reach the network host.

Syntax network traceroute6 <host>

The following table describes the required and optional parameters for the traceroute command:

Table 358: Traceroute Command Parameters

Flag/Parameter Description

<host> Specifies the name of network host. You can specify the host with IPv6 address.

590 | Command Line Interface ClearPass Policy Manager 6.5 |  User Guide

Example

The following example prints the route taken to reach the network host:

[appadmin]# network traceroute6 sun.us.

arubanetworks.com

Service Commands

The Policy Manager CLI includes the following service commands: l l l l l list restart start status stop

service <action> <service-name>

Use the service <action> <service-name> command to run the specified Policy Manager service.

Syntax service <action> <service-name>

ClearPass Policy Manager 6.5 | User Guide Command Line Interface | 591

Table 359: Service Action Command Parameters

Service Parameter Description action Choose an action: l list l l l restart start status l stop service-name Choose a service: l cpass-policy-server l l cpass-tacacs-server cpass-radius-server l l l l cpass-admin-server cpass-dbwrite-server cpass-dbcn-server cpass-repl-server l l l l l l l l cpass-system-auxiliary-server cpass-sysmon-server cpass-domain-server_<NetBIOS_name> airgroup-notify fias_server cpass-ipsec-service cpass-vip-service cpass-async-netd l l l l l l cpass-statsd-server cpass-igssyslog-server cpass-igslogger-server cpass-igslogrepo-server cpass-carbon-server cpass-multi-master-cache-server

Example

[appadmin]# service list all

Policy server [ cpass-policy-server ]

Admin UI service [ cpass-admin-server ]

System auxiliary services [ cpass-system-auxiliary-server ]

Radius server [ cpass-radius-server ]

Tacacs server [ cpass-tacacs-server ]

Async DB write service [ cpass-dbwrite-server ]

DB change notification server [ cpass-dbcn-server ]

DB replication service [ cpass-repl-server ]

System monitor service [ cpass-sysmon-server ]

Async network services [ cpass-async-netd ]

Multi-master cache [ cpass-multi-master-cache-server ]

Virtual IP service [ cpass-vip-service ]

Stats collection service [ cpass-statsd-server ]

Stats aggregation service [ cpass-carbon-server ]

ClearPass IPsec service [ cpass-ipsec-service ]

AirGroup notification service [ airgroup-notify ]

Micros Fidelio FIAS [ fias_server ]

Ingress logger service [ cpass-igslogger-server ]

592 | Command Line Interface ClearPass Policy Manager 6.5 |  User Guide

Ingress syslog service [ cpass-igssyslog-server ] l l l l l l l l l l l

Show Commands

The Policy Manager command line interface includes the following show commands:

all-timezones on page 593 date on page 593 dns on page 593

domain on page 594 fipsmode hostname on page 594 ip on page 594

license on page 595

sysinfo timezone on page 596 version on page 596

all-timezones

Use the all-timezones command to view all available timezones.

Syntax show all-timezones

Example

The following example displays all available timezones:

[appadmin]# show all-timezones

Africa/Abidjan

Africa/Accra

.....

WET

Zulu

date

Use the date command to view the System Date, Time, and Time Zone information.

Syntax show date

Example

The following example displays the System Date, Time, and Time Zone information:

[appadmin]# show date

Wed Oct 31 14:33:39 UTC 2012

dns

Use the dns command to view DNS servers.

Syntax show dns

ClearPass Policy Manager 6.5 | User Guide Command Line Interface | 593

Example

The following example displays DNS servers:

[appadmin]# show dns show dns

===========================================

DNS Information

-------------------------------------------

Primary DNS : 192.xxx.5.3

Secondary DNS : <not configured>

Tertiary DNS : <not configured>

===========================================

domain

Use the domain command to view the Domain Name, IP Address, and Name Server information.

Syntax show domain

Example

The following example displays the domain name:

[appadmin]# show domain

fipsmode

Use the fipsmode command to find whether the FIPS mode is enabled or disabled.

Example

The following example displays that the FIPS mode is enabled:

[appadmin]# show fipsmode

FIPS Mode: Enabled

hostname

Use the hostname command to view hostname.

Syntax show hostname

Example

The following example displays the hostname:

[appadmin]# show hostname show hostname wolf

ip

Use the ip command to view the IPv4, IPv6, and DNS information of the host.

Syntax show ip

594 | Command Line Interface ClearPass Policy Manager 6.5 |  User Guide

Example

The following example displays the IPv4, IPv6, and DNS information of the host:

[appadmin]# show ip

===========================================

Device Type : Management Port

-------------------------------------------

IPv4 Address : 10.2.xx.86

Subnet Mask : 255.255.255.0

Gateway : 10.2.xx.1

IPv6 Address : 2607:f0d0:1002:0011:0000:0000:0000:0002

Subnet Mask : ffff:ffff:ffff:ffff:0000:0000:0000:0000

Gateway : 2607:f0d0:1002:0011:0000:0000:0000:0001

Hardware Address : 00:0C:29:70:57:40

MTU : 1499

===========================================

Device Type : Data Port

-------------------------------------------

IPv4 Address : <not configured>

Subnet Mask : <not configured>

Gateway : <not configured>

IPv6 Address : fe80:0000:0000:0000:020c:29ff:fe70:274a

Subnet Mask : ffff:ffff:ffff:ffff:0000:0000:0000:0000

Gateway : fe80:0000:0000:0000:020c:29ff:fe70:2741

Hardware Address : 00:0C:29:70:27:4A

MTU : 1498

===========================================

DNS Information

-------------------------------------------

Primary DNS : 10.2.xx.3

Secondary DNS : 10.1.xx.50

Tertiary DNS : 10.1.xx.200

===========================================

license

Use the license command to view the license key.

Syntax show license

Example

The following example displays the license information:

[appadmin]# show license

-------------------------------------------------------

Application

License key

: PolicyManager

: VWQO-MW62UO-VMVF-B7GNJT-OHUAZY-IAAM-RTQUPQ-WODIFNJI-CD7N-I5565A

License key type

License added on

Validity

Issued for

: Permanent

: 2014-06-20 10:16:38

: <not applicable>

: 5000 users

Customer id

Licensed features

: JRC

: <not applicable>

ClearPass Policy Manager 6.5 | User Guide Command Line Interface | 595

-------------------------------------------------------

Application : PolicyManager

License key

License key type

: VWQO-MW62UO-VMVF-B7GNJT-OHUAZY-IAAM-RTQUPQ-WODIFNJI-CD7N-I5565A

: Permanent

License added on

Validity

Issued for

: 2014-06-20 10:16:38

: <not applicable>

: 5000 users

Customer id

Licensed features

: JRC

: <not applicable>

=======================================================

sysinfo

Use the sysinfo command to view the disk and memory utilization:

Syntax show sysinfo

Example

The following example displays the disk and memory utilization:

[appadmin]# show sysinfo

System Uptime : 1 day, 23:29:15.510000

===========================================

Disk Utilization

-------------------------------------------

Total

Free

: 115.48 GB

: 5.42 GB (6%)

===========================================

Memory Utilization

-------------------------------------------

Total : 4.00 GB

Free : 1.36 GB (36%)

timezone

Use the timezone command to view the current system timezone.

Syntax show timezone

Example

The following example displays the system timezone:

[appadmin]# show timezone show timezone

Timezone is set to 'Asia/Kolkata'

version

Use the

Version command to view the Policy Manager software version and the hardware model.

Syntax show version

Example

The following example displays the Policy Manager software version and the hardware model:

596 | Command Line Interface ClearPass Policy Manager 6.5 |  User Guide

[appadmin]# show version

=======================================

Policy Manager software version : 2.0(1).6649

Policy Manager model number : ET-5010

=======================================

System Commands

The Policy Manager command line interface (CLI) includes the following system commands: l l l l l l l l l l l l l l l l

apps-access-reset boot-image on page 597

System Commands

cleanup

gen-support-key on page 599 install-license on page 599 morph-vm

refresh-license reset-server-certificate

restart on page 601 shutdown on page 601 sso-reset

start-rasession status-rasession update on page 602

upgrade on page 603

apps-access-reset

Use the apps-access-reset command to reset the access control restrictions for Policy Manager.

Syntax system apps-access-reset

Example

The following example reset the access control restrictions for Policy Manager:

[appadmin]# system apps-access-reset

Policy Manager application access is restored

boot-image

Use the boot-image to set system boot image control options.

Syntax system boot-image [-l] [-a <version>]

The following table describes the required and optional parameters for the boot-image command:

ClearPass Policy Manager 6.5 | User Guide Command Line Interface | 597

Table 360: Boot-Image Command Parameters

Flag/Parameter Description

-l Lists the boot images installed on the system.

-a <version> Sets the active boot image version in A.B.C.D syntax. This field is optional.

Example

The following example sets the system boot image control options:

[appadmin]# system boot-image -l

cleanup

Use the cleanup command to perform a system cleanup operation that results the purging of the records including the following: l l l l l l

System and application log files

Past authentication records

Audit records

Expired guest accounts

Past auto and manual backups

Stored reports

Syntax system cleanup

Example

The following example performs cleanup operation for the system:

[appadmin]# system cleanup

ERROR - Insufficient arguments to proceed

System Cleanup (CLI) Usage: system cleanup <num days>

Where, <num days> -- Cleanup interval specifying the number of days to retain the data

[appadmin]# system cleanup 4

********************************************************

* *

* WARNING: This command will perform system cleanup *

* operation that will result in purging of:

* [*] system and application log files *

*

* * [*] past authentication records

* [*] audit records

* [*] expired guest accounts

* [*] past auto and manual backups

*

*

*

* [*] stored reports etc...

* *

*

********************************************************

Are you sure you want to continue? [y|n]: y

INFO - Starting system cleanup

INFO - Purging diagnostic dumps

INFO - Detected empty core directory

INFO - Performing system cleanup tasks

INFO - Purging platform logs

INFO - Purging application logs

598 | Command Line Interface ClearPass Policy Manager 6.5 |  User Guide

INFO - Performing database cleanup tasks

INFO - Completed system cleanup

gen-recovery-key

Use the gen-recovery-key command to generate the recovery key for the system.

Example

The following example generates the recovery key for the system:

[appadmin]# system gen-recovery-key

Recovery key='04U2FsdGVkX18To8NDWayziQ17LzKA17DW5y+AZvGj41c='

gen-support-key

Use the gen-support-key command to generate the support key for the system.

Syntax system gen-support-key

Example

The following example generates the support key for the system:

[appadmin]# system gen-support-key system gen-support-key

Support key='01U2FsdGVkX1+/WS9jZKQajERyzXhM8mF6zAKrzxrHvaM='

install-license

Use the install-license command to replace the current license key with a new one.

Syntax system install-license <license-key>

The following table describes the required and optional parameters for the install-license command:

Table 361: Install-License Command Parameters

Flag/Parameter Description

<license-key> Specifies the newly issued license key. This field is mandatory.

Example

The following example replaces the current license key with a new one:

[appadmin]# system install-license

morph-vm

Use the morph-vm command to convert an evaluation virtual machine (VM) to a production VM. With this command, licenses are still required to be installed after the morph operation is completed. Use the following steps to convert an evaluation VM to a production VM:

1. Determine the type of the appliance to which you want to morph your evaluation VM.

2. Procure license for the target VM appliance.

3. Shut down the VM.

4. Determine the required capacity of an additional hard disk and attach to the target VM appliance.

ClearPass Policy Manager 6.5 | User Guide Command Line Interface | 599

5. Adjust the CPU and Memory settings for the evaluation VM to match the target VM appliance.

6. Boot the VM.

7. Execute the morph-vm command. The configuration data from the evaluation VM will be migrated to the new disk attached. The node will reboot as a VM of the selected appliance model.

8. Login to the UI and enter the permanent license obtained. Now, the evaluation VM is morphed into a production VM.

Syntax system morph-vm <vm-version: CP-VA-500 | CP-VA-5K | CP-VA-25K>

The following table describes the required and optional parameters for the morph-vm command:

Table 362: Morph-VM Commands

Flag/Parameter Description

<vm-version> This is the updated ClearPass version. The following three options are available: l CP-VA-500 l l

CP-VA-5K

CP-VA-25K

This field is mandatory.

Example

The following example converts an evaluation virtual machine (VM) to a production VM for CP-25K version:

[appadmin]# system morph-vm CP-25K

refresh-license

Use the refresh-license command to refresh the license count information

.

Syntax system refresh-license

Example

The following example refreshes the license count information:

[appadmin]# system refresh-license

INFO: Refreshing license count information

INFO: Successfully refreshed license count information

reset-server-certificate

Use the reset-server-certificate command to reset the HTTP server certificate or RADIUS server certificate or both. After executing the command, the Policy Manager services are restarted to reflect the changes.

Syntax system reset-server-certificate

Example

The following example resets both HTTP and RADIUS server certificates:

600 | Command Line Interface ClearPass Policy Manager 6.5 |  User Guide

[appadmin]# system reset-server-certificate

******************************************************************

* *

* WARNING: When the command is completed Policy Manager services *

* are restarted to reflect the changes.

*

* *

******************************************************************

Continue? [y|n]: y

0: Reset Http and Radius Server Certificates

1: Reset Radius Server Certificate

2: Reset Http Server Certificate

3: Quit

2

Updating the server certificate...

Updation of server certificate complete

restart

Use the restart command to restart the system.

Syntax system restart

Example

The following example restarts the system with a confirmation:

[appadmin]# system restart system restart

*********************************************************

* WARNING: This command will shut down all applications *

* and reboot the system *

********************************************************

Are you sure you want to continue? [y|Y]: y

shutdown

Use the shutdown command to shut down the system.

Syntax system shutdown

Example

The following example shuts down the system with a confirmation:

[appadmin]# system shutdown

********************************************************

* WARNING: This command will shut down all applications *

* and power off the system *

********************************************************

Are you sure you want to continue? [y|Y]: y

sso-reset

Use the sso-reset command to reset the Single Sign-On (SSO) configuration.

ClearPass Policy Manager 6.5 | User Guide Command Line Interface | 601

Syntax system sso-reset

start-rasession

Use the start-rasession command to start a RemoteAssist (RA) session.

Syntax system start-rasession [duration_hours | duration_mins | contact_id | cppm_server_ip]

The following table describes the required and optional parameters for the start-rasession command:

Table 363: Start RemoteAssist Session Command Parameters

Flag/Parameter Description duration_hours Specify session duration in hours. You can specify values between 0 to 12.

duration_mins contact_id cppm_server_ip

Specify session duration in minutes. You can specify values between 0 to 59.

The username ID part of the Aruba TAC or Engineering contact. For example "bjones".

The ClearPass Policy Manager server IP address.

status-rasession

Use the status-rasession command to view the status of a RemoteAssist session.

Syntax system status-rasession <session_id>

Example

The following example displays the status of a RemoteAssist session:

[appadmin]# system status-rasession 3001

terminate-rasession

Use the terminate-rasession command to terminate a running RemoteAssist session.

Syntax system terminate-rasession <session_id>

Example

The following example terminates a running RemoteAssist session:

[appadmin]# system terminate-rasession 3001

update

The update command provides options to manage system patch updates.

Syntax system update [-i [-f] <user@hostname:/<filename> | http://hostname/<filename>>] system update [-f] system update [-l]

602 | Command Line Interface ClearPass Policy Manager 6.5 |  User Guide

The following table describes the required and optional parameters for the update command:

Table 364: Update Commands

Flag/Parameter

-i user@hostname:/<filename>

| http://hostname/<filename>

-f

Description

Installs the specified patch on the system. This field is optional.

-l

Re-installs the patch in the event of a problem with the initial installation attempt.

This field is optional.

Lists the patches installed on the system. This field is optional.

This command supports Secure Copy (SCP), HTTP, and local uploads.

Example

The following example provides options to manage system patch updates:

[appadmin]# system update

upgrade

The upgrade command upgrades the system. This command provides command syntax to upgrade from a

Linux server, upgrading from a Web server, and upgrading by performing an offline upgrade.

l l

Syntax l l

Upgrade from a Linux server: system upgrade user@hostname:/<filepath> [-w] [-l] [-L]

See

Example 1: Upgrading from a Linux server

.

Upgrade from a Web server: system upgrade http://hostname/<filepath> [-w] [-l] [-L]

See

Example 2: Upgrading from a Web server

.

Upgrade by performing an offline upgrade: system upgrade <filepath> [-w] [-l] [-L]

See

Example 3: Performing an offline upgrade .

Table 365: Upgrade Commands

Flag/Parameter

-w

Description

Restores last (one) week of access tracker records after the upgrade.

-l

-L

<filepath>

Restores all access tracker records from this version.

Does not backup or restore access tracker records from this version.

Enter the filepath using the syntax provided in the two examples below. This field is mandatory.

ClearPass Policy Manager 6.5 | User Guide Command Line Interface | 603

This command supports Secure Copy (SCP), HTTP, and local uploads.

If none of these Upgrade command options are provided, access tracker records are backed up, but they are not restored by default.

Example 1: Upgrading from a Linux server

To upgrade the Policy Manager image from a Linux server:

1. Upload the upgrade image to a Linux server.

2. Use the following syntax to upload the upgrade image: system upgrade user@hostname:/<filepath> [-w] [-l] [-L]

For example:

[appadmin]# system upgrade [email protected]:/tmp/PolicyManager-x86-64-upgrade-

71.tgz

Example 2: Upgrading from a Web server

To upgrade the Policy Manager image from a Web server:

1. Upload the upgrade image to a Web server.

2. Use the following syntax to upload the upgrade image: system upgrade http://hostname/<filepath> [-w] [-l] [-L]

For example:

[appadmin]# system upgrade http://sun.us.arubanetworks.com/downloads/PolicyManager-x86-64upgrade-71.tgz

Example 3: Performing an offline upgrade

To perform an offline upgrade:

1. Log in to the Aruba Support Center and select the Download Software tab.

2. Navigate to the ClearPass > Policy Manager > Current Release > Upgrade folder.

3. In the Description Remarks section, click the link for the appropriate upgrade. The upgrade file is uploaded to your local system.

4. Navigate to the ClearPass Policy Manager Software Updates page at Administration > Agents and

Software Updates > Software Updates.

5. In the Firmware & Patch Updates section of the Software Updates page, click the Import Updates button.

The Import from File dialog appears.

6. Browse to the location of the upgrade file on your system, then click Import.

The selected upgrade file is uploaded to the ClearPass Policy Manager.

7. Log in to the Policy Manager command line interface (CLI) with the following user name: appadmin.

8. Initiate the upgrade process by entering the following command: system upgrade <filepath> [-w] [-l] [-L]

For example:

[appadmin]# system upgrade CPPM-upgradeimage.bin

9. After the upgrade process is complete, restart the machine by issuing the following command in the CLI: system restart

604 | Command Line Interface ClearPass Policy Manager 6.5 |  User Guide

The Policy Manager restarts and boots up to the most recent version of ClearPass Policy Manager.

Miscellaneous Commands

The Policy Manager command line interface includes the following miscellaneous commands: l l l l l l l l l l l l l l l l l l l

ad auth on page 605 ad netjoin on page 605

ad netleave on page 606 ad testjoin on page 606 alias on page 606

backup on page 607 dump certchain on page 607

dump logs on page 608 dump servercert on page 608

exit on page 609 help on page 609 krb auth on page 609

krb list on page 610 ldapsearch on page 610 quit on page 610

restore on page 611 system start-rasession

system terminate-rasession system status-rasession

ad auth

Use the ad auth command to authenticate the user against Active Directory.

Syntax ad auth --username=<username>

The following table describes the required and optional parameters for the ad auth command:

Table 366: Ad Auth Command Parameters

Flag/Parameter Description

<username> Specifies the username of the authenticating user. This is a mandatory field.

Example

The following example authenticates the user against Active Directory:

[appadmin]# ad auth --username=mike

ad netjoin

Use the ad netjoin command to join host to the domain.

ClearPass Policy Manager 6.5 | User Guide Command Line Interface | 605

Syntax ad netjoin <domain-controller.domain-name> [domain NETBIOS name]

The following table describes the required and optional parameters for the ad netjoin command:

Table 367: Ad Netjoin Command Parameters

Flag/Parameter Description

<domain-controller. domainname>

Specifies the host to be joined to the domain. This field is mandatory.

[domain NETBIOS name] Specifies the domain name. This field is optional.

Example

The following example joins host to the domain:

[appadmin]# ad netjoin atlas.us.arubanetworks.com

ad netleave

Use the ad netleave to remove host from the domain.

Syntax ad netleave

Example

The following example removes host from the domain:

[appadmin]# ad netleave

ad testjoin

Use the ad testjoin to test if the netjoin command succeeded. This command also test if Policy Manager is a member of the AD domain.

Syntax ad testjoin

Example

The following example tests if the netjoin command is succeeded:

[appadmin]# ad testjoin

alias

Use the alias command to create or remove aliases.

Syntax alias <name>=<command>

The following table describes the required and optional parameters for the alias command:

606 | Command Line Interface ClearPass Policy Manager 6.5 |  User Guide

Table 368: Alias Commands

Flag/Parameter Description

<name>=<command> Sets <name> as the alias for <command>.

<name>= Removes the association.

Example 1

[appadmin]# alias sh=show

Example 2

[appadmin]# alias sh=

backup

Use the backup command to create backup of Policy Manager configuration data. If no arguments are entered, the system auto-generates a filename and backs up the configuration to this file.

Syntax backup [-f <filename>] [-L] [-P]

The following table describes the required and optional parameters for the backup command:

Table 369: Backup Command Parameters

Flag/Parameter

-f <filename>

Description

Specifies the backup target. If not specified, Policy Manager autogenerates a filename. This field is optional.

-L

-P

Do not backup the log database configuration. This field is optional.

Do not backup password fields from the configuration database. This field is optional.

Example

[appadmin]# backup -f PolicyManager-data.tar.gz

Continue? [y|Y]: y

dump certchain

Use the dump certchain command to dump certificate chain of any SSL secured server.

Syntax dump certchain <hostname:port-number>

The following table describes the required and optional parameters for the dump certchain command:

Table 370: Dump Certchain Command Parameters

Flag/Parameter

<hostname:port-number>

Description

Specifies the hostname and SSL port number.

ClearPass Policy Manager 6.5 | User Guide Command Line Interface | 607

Example 1

The following example dumps certificate chain of a SSL secured server:

[appadmin]# dump certchain ldap.acme.com:636 dump certchain

dump logs

Use the dump logs command to dump Policy Manager application log files.

Syntax dump logs -f <output-file-name> [-s yyyy-mm-dd] [-e yyyy-mm-dd] [-n <days>] [-t <log-type>] [-h]

The following table describes the required and optional parameters for the dump logs command:

Table 371: Dump Logs Command Parameters

Flag/Parameter Description

-f <output-file-name> Specifies target for concatenated logs.

-s yyyy-mm-dd

-e yyyy-mm-dd

-n <days>

-t <log-type>

-h

Specifies the start date range. The default value is today. This field is optional.

Specifies the end date range. The default value is today. This field is optional.

Specifies the duration in days (from today). This field is optional.

Specifies the type of log to collect. This field is optional.

Specifies the print help for available log types.

Example 1

The following example dumps Policy Manager application log files:

[appadmin]# dump logs –f tips-system-logs.tgz -s 2007-10-06 –e 2007-10-17 –t SystemLogs

Example 2

The following example prints help for available log types:

[appadmin]# dump logs -h

dump servercert

Use the dump servercert command to dump server certificate of SSL secured server.

Syntax dump servercert <hostname:port-number>

The following table describes the required and optional parameters for the dump servercert command:

Table 372: Dump Servercert Command Parameters

Flag/Parameter

<hostname:port-number>

Description

Specifies the hostname and SSL port number.

608 | Command Line Interface ClearPass Policy Manager 6.5 |  User Guide

Example

The following example dumps server certificate of SSL secured server:

[appadmin]# dump servercert ldap.acme.com:636

exit

Use the exit command to exit shell.

Syntax exit

Example

The following example exits the shell:

[appadmin]# exit

help

Use the help command to display the list of supported commands:

Syntax help <command>

Example

The following example displays the list of supported commands:

[appadmin]# help help alias backup

Create aliases

Backup Policy Manager data cluster configure dump exit help netjoin

Policy Manager cluster related commands

Configure the system parameters

Dump Policy Manager information

Exit the shell

Display the list of supported commands

Join host to the domain netleave network quit restore service show system

Remove host from the domain

Network troubleshooting commands

Exit the shell

Restore Policy Manager database

Control Policy Manager services

Show configuration details

System commands

krb auth

User the krb auth command to perform a kerberos authentication against a kerberos server (such as

Microsoft AD).

Syntax krb auth <user@domain>

The following table describes the required and optional parameters for the krb auth command:

ClearPass Policy Manager 6.5 | User Guide Command Line Interface | 609

Table 373: Kerberos Authentication Command Parameters

Flag/Parameter Description

<user@domain> Specifies the username and domain.

Example

The following example performs a kerberos authentication against a kerberos server:

[appadmin]# krb auth [email protected]

krb list

Use the krb list command to list the cached kerberos tickets.

Syntax krb list

Example

The following example lists the cached kerberos tickets:

[appadmin]# krb list

ldapsearch

Use the Linux ldapsearch command to find objects in an LDAP directory. Note that only the Policy Manager specific command line arguments are listed. For other command line arguments, refer to ldapsearch man pages on the Internet.

Syntax ldapsearch -B <user@hostname>

The following table describes the required and optional parameters for the ldapsearch command:

Table 374: LDAP Search Command Parameters

Flag/Parameter Description

<user@hostname> Specifies the username and the full qualified domain name of the host. The -B command finds the bind DN of the LDAP directory.

Example

The following example finds objects in an LDAP directory:

[appadmin]# ldapsearch -B [email protected]

quit

Use the quit command to exit shell.

Syntax quit

Example

The following command quits the shell:

610 | Command Line Interface ClearPass Policy Manager 6.5 |  User Guide

[appadmin]# quit

restore

Use the restore command to restore Policy Manager configuration data from the backup file.

Syntax restore user@hostname:/<backup-filename> [-l] [-i] [-c|-C] [-p] [-s]

The following table describes the required and optional parameters for the restore command:

-l

-i

-c

-C

-p

Table 375: Restore Command Parameters

Flag/Parameter Description user@hostname:/<backupfilename>

Specify filepath of restore source.

-s

Restores configuration database (default).

Does not restore configuration database.

If it exists in the backup, restores log database. This field is optional.

Ignores version mismatch errors and proceeds. This field is optional.

Forces restore from a backup file that does not have password fields present. This field is optional.

Restores cluster server/node entries from the backup. Node entries are disabled on restore. This field is optional.

Example

The following example restores Policy Manager configuration data from the backup file:

[appadmin]# restore user@hostname:/tmp/tips-backup.tgz -l -i -c -s

system start-rasession

The system start-rasession command allows administrators to configure and start a Remote Assistance session through the ClearPass Policy Manager CLI. Configuring a Remote Assistance session through a CLI can be used if the ClearPass Policy Manager UI at the customer site is inaccessible.

Syntax system start-rasession <duration_hours> <duration_mins> <contact> <server_ip>

The following table describes the required and optional parameters for the system start-rasession command:

ClearPass Policy Manager 6.5 | User Guide Command Line Interface | 611

Table 376: Start Remote Session Command Parameters

Flag/Parameter Description

<duration_hours> Defines the duration in hours of the Remote Assistance Session.

<duration_mins>

<contact>

<server_ip>

Defines the duration in minutes of the Remote Assistance Session.

Specifies the name of the TAC engineer.

Specifies the IP address of a ClearPass Policy Manager in the cluster.

system terminate-rasession

The system terminate-rasession allows administrators to terminate the session on the ClearPass Policy

Manager where the Remote Assistance session is running.

Syntax system terminate-rasession <sessionid>

The following table describes the required and optional parameters for the system terminate-rasession command:

Table 377: Terminate Remote Session Command Parameters

Flag/Parameter

<sessionid>

Description

Provides the sessionid that can be used to terminate-session.

system status-rasession

The system status-rasession command allows administrators to acquire the status on the ClearPass Policy

Manager in the cluster where the remote session is running.

Syntax system status-rasession <sessionid>

The following table describes the required and optional parameters for the system status-rasession command:

Table 378: Terminate Remote Session Command Parameters

Flag/Parameter

<sessionid>

Description

Specifies the id returned when system status-rasession command is executed.

612 | Command Line Interface ClearPass Policy Manager 6.5 |  User Guide

Appendix B

Rules Editing and Namespaces

The Policy Manager administration User Interface allows you to create different types of objects: l l l l l l l l l

Service rules

Role mapping policies

Internal user policies

Enforcement policies

Enforcement profiles

Post-audit rules

Proxy attribute pruning rules

Filters for Access Tracker and activity reports

Attributes editing for policy simulation

When editing all these elements, you are presented with a tabular interface with the same column headers: l l l l

Type - Type is the namespace from which these attributes are defined. This is a drop-down list that contains namespaces defined in the system for the current editing context.

Name - Name is the name of the attribute. This is a drop-down list with the names of the attributes present in the namespace.

Operator - Operator is a list of operators appropriate for the data type of the attribute. The drop-down list shows the operators appropriate for data type on the left (that is, the attribute).

Value - The value is the value of the attribute. Again, depending on the data type of the attribute, the value field can be a free-form one-line edit box, a free-form multi-line edit box, a drop-down list containing predefined values (enumerated types), or a time or date widget.

In some editing interfaces (for example, enforcement profile and policy simulation attribute editing interfaces) the operator does not change; it is always the EQUALS operator.

Providing a uniform tabular interface to edit all these elements enables you to use the same steps while configuring these elements. Also, providing a context-sensitive editing experience (for names, operators and values) takes the guess-work out of configuring these elements.

The following sections describe namespaces, variables, and operators: l l l

Namespaces on page 613

Variables on page 623

Operators on page 624

Namespaces

Multiple namespaces are displayed in the rules editing interfaces, depending upon what you are editing. For example, multiple namespaces are displayed when you are editing posture policies you work with the posture namespace; when you are editing service rules you work with, among other namespaces, the RADIUS namespace, but not the posture namespace.

For detailed information about the available namespaces, see the following topics: l l

Application Namespace on page 614

Audit Namespaces on page 615

ClearPass Policy Manager 6.5 | User Guide Rules Editing and Namespaces | 613

l l l l l l l l l l l l l l

Authentication Namespaces on page 615

Authorization Namespaces on page 617

Certificate Namespaces on page 618

Connection Namespaces on page 619

Date Namespaces on page 620

Device Namespaces on page 620

Endpoint Namespaces on page 621

Guest User Namespaces on page 621

Host Namespaces on page 621

Local User Namespaces on page 621

Posture Namespaces on page 622

RADIUS Namespaces on page 622

Tacacs Namespaces on page 623

Tips Namespaces on page 623

Application Namespace

The Application namespace has one name attribute. This attribute is an enumerated type currently containing the following string values: l l l l l

Guest

Insight

PolicyManager

Onboard

ClearPass

The Application:ClearPass namespace has the following string values available for the Name field: l l l l l l l l l l l l l l l l l l

AssertionConsumerUrl

Configuration-Profile-ID

Device-Compromised

Device-ICCID

Device-IMEI

Device-MAC

Device-MDM-Managed

Device-NAME

Device-OS

Device-PRODUCT

Device-SERIAL

Device-UDID

Device-VERSION

IDDP-COOKIE-TIMEOUT-MINS

IDPURL

MDM-Data-Roaming

MDM-Voice-Roaming

Onboard-Max-Devices

614 | Rules Editing and Namespaces ClearPass Policy Manager 6.5 |  User Guide

l l l l l l

Page-Name

Provisioning-Settings-ID

SAMLRequest

SAMLResponse

Session-Timeout

User-Email-Address

Audit Namespaces

The dictionaries in the audit namespace come pre-packaged with the product. The Audit namespace has the notation Vendor:Audit, where Vendor is the name of the company that has defined attributes in the dictionary.

Examples of dictionaries in the audit namespace are AvendaSystems:Audit or Qualys:Audit.

The Audit namespace appears when editing post-audit rules. See

Audit Servers

for more information.

The Avenda Systems:Audit namespace appears when editing post-audit rules for NESSUS and NMAP audit servers.

The following figure displays the Audit Namespace attributes:

Table 379: Audit Namespace Attributes

Attribute Name Values

Audit-Status l l l

AUDIT_ERROR

AUDIT_INPROGRESS

AUDIT_SUCCESS

Device-Type

Output-Msgs

Network-Apps

Mac-Vendor

OS-Info

Open-Ports

Type of device returned by an NMAP port scan.

The output message returned by Nessus plugin after a vulnerability scan.

String representation of the open network ports (http, telnet, etc.).

Vendor associated with MAC address of the host.

OS information string returned by NMAP.

The port numbers of open applications on the host.

Authentication Namespaces

The authentication namespace can be used in role mapping policies to define roles based on the type of authentication method used or the status of the authentication.

ClearPass Policy Manager 6.5 | User Guide Rules Editing and Namespaces | 615

Authentication Namespace Editing Context

The following table describes the Authentication Namespace Attributes parameters:

Table 380: Authentication Namespace Attributes

Attribute

Name

Values

InnerMethod l

CHAP l l l l

EAP-GTC

EAP-MD5

EAP-MSCHAPv2

EAP-TLS l l

MSCHAP

PAP

NOTE: The EAP-MD5 authentication type is not supported if you use the ClearPass Policy

Manager in the FIPS mode.

OuterMethod l CHAP l EAP-FAST l l

EAP-MD5

EAP-PEAP l l l l

EAP-TLS

EAP-TTLS

MSCHAP

PAP

NOTE: The EAP-MD5 authentication type is not supported if you use the ClearPass Policy

Manager in the FIPS mode.

Phase1PAC l l l

None - No PAC was used to establish the outer tunnel in the EAP-FAST authentication method

Tunnel - A tunnel PAC was used to establish the outer tunnel in the EAP-FAST authentication method

Machine - A machine PAC was used to establish the outer tunnel in the EAP-FAST authentication method; machine PAC is used for machine authentication (See EAP-FAST in

Adding and Modifying Authentication Methods on page 137

).

Phase2PAC

Posture l l l

None - No PAC was used instead of an inner method handshake in the EAP-FAST authentication method

UserAuthPAC - A user authentication PAC was used instead of the user authentication inner method handshake in the EAP-FAST authentication method

PosturePAC - A posture PAC was used instead of the posture credential handshake in the EAP-

FAST authentication method l l l l

Capable - The client is capable of providing posture credentials

Collected - Posture credentials were collected from the client

Not-Capable - The client is not capable of providing posture credentials

Unknown - It is not known whether the client is capable of providing credentials

Status l l l l

None - No authentication took place

User - The user was authenticated

Machine - The machine was authenticated

Failed - Authentication failed

616 | Rules Editing and Namespaces ClearPass Policy Manager 6.5 |  User Guide

Table 380: Authentication Namespace Attributes (Continued)

Attribute

Name

Values l AuthSource-Unreachable - The authentication source was unreachable

MacAuth

Username

Full-

Username

Source l l l

NotApplicable - Not a MAC Auth request

Known Client - Client MAC address was found in an authentication source

Unknown Client - Client MAC address was not found in an authentication source

The username as received from the client (after the strip user name rules are applied).

The username as received from the client (before the strip user name rules are applied).

The name of the authentication source used to authenticate the user.

Authorization Namespaces

Policy Manager supports multiple types of authorization sources. Authorization sources from which values of attributes can be retrieved to create role mapping rules have their own separate namespaces (prefixed with

Authorization).

Authorization editing context

Role mapping policies

AD Instance Namespace

For each instance of an Active Directory authentication source, there is an AD instance namespace that appears in the rules editing interface. The AD instance namespace consists of all the attributes that were defined when the authentication source was created. These attribute names are pre-populated. For Policy Manager to fetch the values of attributes from Active Directory, you need to define filters for that authentication source (see

Adding and Modifying Authentication Sources on page 161

for more information).

Authorization

The authorization namespace has one attribute: sources. The values are pre-populated with the authorization sources defined in Policy Manager. Use this to check for the authorization source(s) from which attributes were extracted for the authenticating entity.

LDAP Instance Namespace

For each instance of an LDAP authentication source, there is an LDAP instance namespace that appears in the rules editing interface. The LDAP instance namespace consists of all the attributes that were defined when the authentication source was created. These attribute names are pre-populated. For Policy Manager to fetch the values of attributes from an LDAP-compliant directory, you need to define filters for that authentication source (see

Adding and Modifying Authentication Sources on page 161

).

RSAToken Instance Namespace

For each instance of an RSA Token Server authentication source, there is an RSA Token Server instance namespace that appears in the rules editing interface. The RSA Token Server instance namespace consists of

ClearPass Policy Manager 6.5 | User Guide Rules Editing and Namespaces | 617

attributes names defined when you created an instance of this authentication source. The attribute names are pre-populated for administrative convenience.

Sources

This is the list of the authorization sources from which attributes were fetched for role mapping. Authorization namespaces appear in Role mapping policies.

SQL Instance Namespace

For each instance of an SQL authentication source, there is an SQL instance namespace that appears in the rules editing interface. The SQL instance namespace consists of attributes names defined when you created an instance of this authentication source. The attribute names are pre-populated for administrative convenience.

For Policy Manager to fetch the values of attributes from a SQL-compliant database, you need to define filters for that authentication source.

Certificate Namespaces

The certificate namespace can be used in role mapping policies to define roles based on attributes in the client certificate presented by the end host. Client certificates are presented in mutually authenticated 802.1X EAP methods (EAP-TLS, PEAP/TLS, EAP-FAST/TLS).

Certificate Namespace Editing Context

Role mapping policies

Table 381: Certificate Namespace Attributes

Attribute Name Values

Version Certificate version

Certificate serial number

Attributes associated with the subject (user or machine, in this case). Not all of these fields are populated in a certificate.

Serial-Number l l l l l l l l l l l l

Subject-C

Subject-CN

Subject-DC

Subject-DN

Subject-emailAddress

Subject-GN

Subject-L

Subject-O

Subject-OU

Subject-SN

Subject-ST

Subject-UID l l l l l l l

Issuer-C

Issuer-CN

Issuer-DC

Issuer-DN

Issuer-emailAddress

Issuer-GN

Issuer-L

Attributes associated with the issuer (Certificate Authorities or the enterprise CA).

Not all of these fields are populated in a certificate.

618 | Rules Editing and Namespaces ClearPass Policy Manager 6.5 |  User Guide

Table 381: Certificate Namespace Attributes (Continued)

Attribute Name Values l l l l l

Issuer-O

Issuer-OU

Issuer-SN

Issuer-ST

Issuer-UID l l l l l l l

Subject-AltName-

DirName

Subject-AltName-DNS

Subject-AltName-

EmailAddress

Subject-AltName-

IPAddress

Subject-AltName-msUPN

Subject-AltName-

RegisterdID

Subject-AltName-URI

Attributes associated with the subject (user or machine, in this case) alternate name. Not all of these fields are populated in a certificate.

Connection Namespaces

The connection namespace can be used in role mapping policies to define roles based on where the protocol request originated from and where it terminated.

Connection Namespace Editing Contexts l l

Role mapping policies

Service rules

The following table describes the Connection Namespace Pre-defined Attributes parameters:

Table 382: Connection Namespace Pre-defined Attributes

Attribute Description

Src-IP-Address Src-IP-Address and Src-Port are the IP address and port from which the request (RADIUS, TACACS+, etc.) originated.

Src-Port

Dst-IP-Address and Dst-Port are the IP address and port at which Policy

Manager received the request (RADIUS, TACACS+, etc.).

Dest-IP-Address

Dest-Port

Protocol

NAD-IP-Address

Request protocol: RADIUS, TACACS+, WebAuth.

IP address of the network device from which the request originated.

ClearPass Policy Manager 6.5 | User Guide Rules Editing and Namespaces | 619

Table 382: Connection Namespace Pre-defined Attributes (Continued)

Attribute Description

Client-Mac-Address l l l l

Client-Mac-Address-Colon

Client-Mac-Address-Dot

Client-Mac-Address-Hyphen

Client-Mac-Address-Nodelim

MAC address of the client.

Client MAC address in different formats.

Client-IP-Address IP address of the client (if known).

Date Namespaces

The date namespace has three pre-defined attributes: l l l

Day-of-Week

Date-of-Year

Time-of-Day

For Day-of-Week, the supported operators are BELONG_TO and NOT_BELONGS_TO, and the value field shows a multi-select list box with days from Monday through Sunday.

The Time-of-Day attribute shows a time icon in the value field.

The Date-of-Year attribute shows a date, month and year icon in the value field.

The operators supported for Date-of-Year and Time-of-Day attributes are the similar to the ones supported for the integer data type.

Date Namespace Editing Contexts l l l l

Enforcement policies

Filter rules for Access Tracker and Activity Reports

Role mapping policies

Service rules

Device Namespaces

The Device namespace has four pre-defined attributes: l l l l

Location

OS-Version

Device-Type

Device-Vendor

Custom attributes also appear in the attribute list if they are defined as custom tags for the device.

These attributes can be used only if you have pre-populated the values for these attributes when a network device is configured.

620 | Rules Editing and Namespaces ClearPass Policy Manager 6.5 |  User Guide

Endpoint Namespaces

Use these attributes to look for attributes of authenticating endpoints, which are present in the Policy Manager endpoints list. The Endpoint namespace has the following attributes: l l l l l

Disabled By

Disabled Reason

Enabled By

Enabled Reason

Info URL

Guest User Namespaces

The GuestUser namespace has the attributes associated with the guest user (resident in the Policy Manager guest user database) who authenticated in this session. This namespace is only applicable if a guest user is authenticated. The GuestUser namespace has six pre-defined attributes: l l l l l l

Company-Name

Designation

Email

Location

Phone

Sponsor

Custom attributes also appear in the attribute list if they are defined as custom tags for the guest user.

These attributes can be used only if you have pre-populated the values for these attributes when a guest user is configured in Policy Manager.

Host Namespaces

The Host namespace has the following predefined attributes: l l l l l l l l

Name*

OSType*

FQDN*

UserAgent**

CheckType**

UniqueID

AgentType*

InstalledSHAs*

* Only populated when request is originated by a Microsoft NAP-compatible agent.

** Only present if Policy Manager acts as a Web authentication portal.

Local User Namespaces

The LocalUser namespace has the attributes associated with the local user (resident in the Policy Manager local user database) who authenticated in this session. This namespace is only applicable if a local user is authenticated.

The LocalUser namespace has four pre-defined attributes: l

Designation

ClearPass Policy Manager 6.5 | User Guide Rules Editing and Namespaces | 621

l l l

Email

Phone

Sponsor

Custom attributes also appear in the attribute list if they are defined as custom tags for the local user.

These attributes can be used only if you have pre-populated the values for these attributes when a local user is configured in Policy Manager.

Posture Namespaces

The dictionaries in the posture namespace are pre-packaged with the product. The administration interface provides a way to add dictionaries into the system (see

Posture Dictionary on page 550

) Posture namespace has the notation Vendor:Application, where Vendor is the name of the Company that has defined attributes in the dictionary, and Application is the name of the application for which the attributes have been defined. The same vendor typically has different dictionaries for different applications.

Some examples of dictionaries in the posture namespace are: l l l l

ClearPass:LinuxSHV

Microsoft:SystemSHV

Microsoft:WindowsSHV

Trend:AV

Posture Namespace Editing Context l l l l

Filter rules for Access Tracker and Activity Reports

Internal posture policies actions - Attributes marked with the OUT qualifier

Internal posture policies conditions - Attributes marked with the IN qualifier

Policy simulation attributes

RADIUS Namespaces

Dictionaries in the RADIUS namespace come pre-packaged with the product. The administration interface does provide a way to add dictionaries into the system (See

RADIUS Dictionary on page 549

for more information).

RADIUS namespace has the notation RADIUS:Vendor, where Vendor is the name of the Company that has defined attributes in the dictionary. Sometimes, the same vendor has multiple dictionaries, in which case the

"Vendor" portion has the name suffixed by the name of device or some other unique string.

IETF is a special vendor for the dictionary that holds the attributes defined in the RFC 2865 and other associated RFCs. Policy Manager comes pre-packaged with a number of vendor dictionaries.

Some examples of dictionaries in the RADIUS namespace are: l l l l

RADIUS:Aruba

RADIUS:IETF

RADIUS:Juniper

RADIUS:Microsoft

RADIUS Namespace Editing Contexts l l l

Filter rules for Access Tracker and Activity Reports

Policy simulation attributes

Post-proxy attribute pruning rules

622 | Rules Editing and Namespaces ClearPass Policy Manager 6.5 |  User Guide

l l l

RADIUS Enforcement profiles: All RADIUS namespace attributes that can be sent back to a RADIUS client

(the ones marked with the OUT or INOUT qualifier)

Role mapping policies

Service rules: All RADIUS namespace attributes that can appear in a request (the ones marked with the IN or

INOUT qualifier)

Tacacs Namespaces

The Tacacs namespace has the attributes associated with attributes available in a TACACS+ request. Available attributes are: l l l

AuthSource

AvendaAVPair

UserName

Tips Namespaces

The pre-defined attributes for the Tips namespace are Role and Posture. Values are assigned to these attributes at run-time after Policy Manager evaluates role mapping and posture related policies.

Role

The value for the Role attribute is a set of roles assigned by either the role mapping policy or the post-audit policy. The value of the Role attribute can also be a dynamically fetched “Enable as role” attribute from the authorization source. The posture value is computed after Policy Manager evaluates internal posture policies, and gets posture status from posture servers or audit servers.

Posture

The value for the Posture attribute is one of the following: l l l l l l

CHECKUP

HEALTHY

INFECTED

QUARANTINE

TRANSITION

UNKNOWN

Tips Namespace Editing Context

Enforcement policies

Variables

Variables are populated with the connection-specific values. Variable names (prefixed with % and enclosed in curly braces; for example, %{Username}”) can be used in filters, role mapping, enforcement rules, and enforcement profiles. Policy Manager does in-place substitution of the value of the variable during runtime rule evaluation.

ClearPass Policy Manager 6.5 | User Guide Rules Editing and Namespaces | 623

The following built-in variables are supported in Policy Manager:

Table 383: Policy Manager Variables

Variable Description

%{attribute- name } attribute-name is the alias name for an attribute that you have configured to be retrieved from an authentication source. See

Adding and Modifying Authentication Sources on page

161 .

%

{RADIUS:IETF:MAC-

Address-Colon}

MAC address of client in aa:bb:cc:dd:ee:ff format

%

{RADIUS:IETF:MAC-

Address-Hyphen}

MAC address of client in aa-bb-cc-dd-ee-ff format

%

{RADIUS:IETF:MAC-

Address-Dot}

MAC address of client in aabb.ccdd.eeff format

%

{RADIUS:IETF:MAC-

Address-NoDelim}

MAC address of client in aabbccddeeff format

You can also use any other dictionary-based attributes (or namespace attributes) as variables in role mapping rules, enforcement rules, enforcement profiles, and LDAP or SQL filters. For example, you can use %{RADIUS:IETF:Calling-

Station-ID}or %{RADIUS:Airespace:Airespace-Wlan-Id} in rules or filters.

Operators

The rules editing interface in Policy Manager supports a rich set of operators. The type of operators presented are based on the data type of the attribute for which the operator is being used. Where the data type of the attribute is not known, the attribute is treated as a string type.

624 | Rules Editing and Namespaces ClearPass Policy Manager 6.5 |  User Guide

The following table lists the operators presented for common attribute data types:

Table 384: Attribute Operators

Attribute Type Operators

String l l

BELONGS_TO

NOT_BELONGS_TO l l

BEGINS_WITH

NOT_BEGINS_WITH l l

CONTAINS

NOT_CONTAINS l l

ENDS_WITH

NOT_ENDS_WITH l l

EQUALS

NOT_EQUALS l l

EQUALS_IGNORE_CASE

NOT_EQUALS_IGNORE_CASE l l l l

EXISTS

NOT_EXISTS

MATCHES_REGEX

NOT_MATCHES_REGEX

Integer

Time or Date l l

BELONGS_TO

NOT_BELONGS_TO l l

EQUALS

NOT_EQUALS l l

EXISTS

NOT_EXISTS l l

GREATER_THAN

GREATER_THAN_OR_EQUALS l l

LESS_THAN

LESS_THAN_OR_EQUALS l EQUALS

NOT_EQUALS l l

GREATER_THAN

GREATER_THAN_OR_EQUALS

ClearPass Policy Manager 6.5 | User Guide Rules Editing and Namespaces | 625

Table 384: Attribute Operators (Continued)

Attribute Type Operators l l

LESS_THAN

LESS_THAN_OR_EQUALS l IN_RANGE

Day

List (Example: Role) l l

BELONGS_TO

NOT_BELONGS_TO l l

EQUALS

NOT_EQUALS l l

MATCHES_ALL

NOT_MATCHES_ALL l l

MATCHES_ANY

NOT_MATCHES_ANY l l

MATCHES_EXACT

NOT_MATCHES_EXACT

Group (Example: Calling-Station-Id, NAS-IP-Address) l l

BELONGS_TO_GROUP

NOT_BELONGS_TO_GROUP and all string data types

626 | Rules Editing and Namespaces ClearPass Policy Manager 6.5 |  User Guide

The following table describes all operator types:

Table 385: Operator Types

Operator

BEGINS_WITH

BELONGS_TO

BELONGS_TO_GROUP

CONTAINS

Description

For string data type, true if the run-time value of the attribute begins with the configured value.

Example: RADIUS:IETF:NAS-Identifier BEGINS_WITH "SJ-"

For string data type, true if the run-time value of the attribute matches a set of configured string values.

Example: RADIUS:IETF:Service-Type BELONGS_TO Login-User,Framed-

User,Authenticate-Only

For integer data type, true if the run-time value of the attribute matches a set of configured integer values.

Example: RADIUS:IETF:NAS-Port BELONGS_TO 1,2,3

For day data type, true if run-time value of the attribute matches a set of configured days of the week.

Example: Date:Day-of-Week BELONGS_TO MONDAY,TUESDAY,WEDNESDAY

When Policy Manager is aware of the values that can be assigned to

BELONGS_TO operator, it populates the value field with those values in a multi-select list box; you can select the appropriate values from the presented list. Otherwise, you must enter a comma separated list of values.

For group data types, true if the run-time value of the attribute belongs to the configured group (either a static host list or a network device group, depending on the attribute).

Example: RADIUS:IETF:Calling-Station-Id BELONGS_TO_GROUP

Printers .

For string data type, true if the run-time value of the attribute is a substring of the configured value.

Example: RADIUS:IETF:NAS-Identifier CONTAINS "VPN"

ENDS_WITH For string data type, true if the run-time value of the attribute ends with the configured value.

Example: RADIUS:IETF:NAS-Identifier ENDS_WITH "DEVICE"

EQUALS

EQUALS_IGNORE_CASE

True if the run-time value of the attribute matches the configured value. For string data type, this is a case-sensitive comparison.

Example: RADIUS:IETF:NAS-Identifier EQUALS "SJ-VPN-DEVICE"

For string data type, true if the run-time value of the attribute matches the configured value, regardless of whether the string is upper case or lower case.

Example: RADIUS:IETF:NAS-Identifier EQUALS_IGNORE_CASE "sjvpn-device"

EXISTS For string data type, true if the run-time value of the attribute exists. This is a unary operator.

Example: RADIUS:IETF:NAS-Identifier EXISTS

ClearPass Policy Manager 6.5 | User Guide Rules Editing and Namespaces | 627

Operator

GREATER_THAN

GREATER_THAN_OR_EQUALS

IN_RANGE

LESS_THAN

LESS_THAN_OR_EQUALS

MATCHES_ALL

MATCHES_ANY

MATCHES_EXACT

MATCHES_REGEX

Description

For integer, time and date data types, true if the run-time value of the attribute is greater than the configured value.

Example: RADIUS:IETF:NAS-Port GREATER_THAN 10

For integer, time and date data types, true if the run-time value of the attribute is greater than or equal to the configured value.

Example: RADIUS:IETF:NAS-Port GREATER_THAN_OR_EQUALS 10

For time and date data types, true if the run-time value of the attribute is less than or equal to the first configured value and less than equal to the second configured value.

Example: Date:Date-of-Year IN_RANGE 2007-06-06,2007-06-12

For integer, time and date data types, true if the run-time value of the attribute is less than the configured value.

Example: RADIUS:IETF:NAS-Port LESS_THAN 10

For integer, time and date data types, true if the run-time value of the attribute is less than or equal to the configured value.

Example: RADIUS:IETF:NAS-Port LESS_THAN_OR_EQUALS 10

For list data types, true if all of the run-time values in the list are found in the configured values.

Example: Tips:Role MATCHES_ALL HR,ENG,FINANCE. In this example, if the run-time values of Tips:Role are HR,ENG,FINANCE,MGR,ACCT the condition evaluates to true.

For list data types, true if any of the run-time values in the list match one of the configured values.

Example: Tips:Role MATCHES_ANY HR,ENG,FINANCE

For list data types, true if all of the run-time values of the attribute match all of the configured values.

Example: Tips:Role MATCHES_ALL HR,ENG,FINANCE. In this example, if the run-time values of Tips:Role are HR,ENG,FINANCE,MGR,ACCT the condition evaluates to false, because there are some values in the configured values that are not present in the run-time values.

For string data type, true if the run-time value of the attribute matches the regular expression in the configured value.

Example: RADIUS:IETF:NAS-Identifier MATCHES_REGEX sj-device[1-

9]-dev*

628 | Rules Editing and Namespaces ClearPass Policy Manager 6.5 |  User Guide

Appendix C

SNMP Private MIB, SNMP Traps,

System Events, Error Codes

This appendix contains the following information: l l l l

ClearPass SNMP Private MIB

SNMP Trap Details

Important System Events

Error Codes

l l l l l l l

ClearPass SNMP Private MIB

This section contains the following information:

Introduction

System MIB Entries

RADIUS Server MIB Entries

Policy Server MIB Entries

Web Authentication Server MIB Entries

TACACS+ Server MIB Entries

Network Traffic MIB Entries

Introduction

A MIB (Management Information Base) is a collection of definitions that define the properties of the managed object within the device to be managed. he various pieces of information are accessed by a protocol such as

SNMP.

This section describes the MIB objects exposed and traps sent through the ClearPass Policy Manager Private

SNMP MIB.

System MIB Entries

Table 386

describes the CPPMSystemTableEntry MIB objects.

Table 386: CPPMSystemTableEntry System MIB Objects

MIB Object Description cppmClusterNodeType ClearPass cluster node type indicating whether the node is a Publisher or

Subscriber cppmNwDataPortIPAddress cppmNwDataPortMACAddress cppmNwMgmtPortIPAddress

ClearPass server data port IP address

ClearPass server data port MAC address

ClearPass server management port IP address

ClearPass Policy Manager 6.5 | User Guide

SNMP Private MIB, SNMP Traps, System Events, Error

Codes | 629

Table 386: CPPMSystemTableEntry System MIB Objects (Continued)

MIB Object Description cppmNwMgmtPortMACAddress cppmSystemDiskSpaceFree

ClearPass server management port MAC address

Amount of disk space free (in bytes) in the ClearPass server cppmSystemDiskSpaceTotal cppmSystemHostname cppmSystemMemoryFree cppmSystemMemoryTotal cppmSystemModel cppmSystemNumCPUs cppmSystemSerialNumber cppmSystemUptime cppmSystemVersion

Total amount of disk space available (in bytes) in the ClearPass server

ClearPass server host name

Amount of memory free (in bytes) in the ClearPass server

Total amount of memory available (in bytes) in the ClearPass server

Model of the ClearPass server

Total number of CPUs in the ClearPass server

Serial number of the ClearPass server

Amount of time the ClearPass server has been up

Product version of the ClearPass server

RADIUS Server MIB Entries

RadiusServerTableEntry

Table 387

describes the RadiusServerTableEntry objects.

Table 387: RadiusServerTableEntry Objects

MIB Object Description radAuthRequestTime radPolicyEvalTime

Total time taken for an end-to-end RADIUS request

Time taken for policy evaluation from the RADIUS server perspective radServerCounterCounts radServerCounterFailure radServerCounterSuccess

Total number of successful RADIUS authentications

Total number of failed RADIUS authentications

Total number of successful RADIUS authentications

RadiusServerAuthTableEntry

RadiusServerAuthTableEntry exposes the following counters that refer to authSourceName wherever applicable (see

Table 388 ). Counters and delays reflect details that are logged into Graphite.

630 | SNMP Private MIB, SNMP Traps, System Events,

Error Codes

ClearPass Policy Manager 6.5 |  User Guide

Table 388: RadiusServerAuthEntry MIB MIB Objects

MIB Object Description radAuthCounterCount radAuthCounterFailure

Total number of RADIUS authentications

Total number of failed RADIUS authentications radAuthCounterSuccess radAuthCounterTime radAuthSourceName

Total number of successful RADIUS authentications

Time taken to perform RADIUS authentications

Name of the RADIUS server authentication source

Policy Server MIB Entries

PolicyServerTableEntry

PolicyServerTableEntry exposes the following MIB objects (see

Table 389 ). Counters and delays reflect details

logged into Graphite.

Table 389: PolicyServerTableEntry Objects

MIB Object Description psAuditPolicyEvalCount Audit policy evaluation count psAuditPolicyEvalTime psAuthCounterFailure psAuthCounterSuccess psAuthCounterTotal psEnforcementPolicyEvalCount psEnforcementPolicyEvalTime psPosturePolicyEvalCount psRestrictionPolicyEvalCount psRolemappingPolicyEvalCount psRolemappingPolicyEvalTime psPosturePolicyEvalTime

Audit policy evaluation time

Number of failed Policy Server authentications

Number of successful Policy Server authentications

Total number of Policy Server authentications

Enforcement policy evaluation count

Enforcement policy evaluation time

Posture policy evaluation count

Authorization restriction policy evaluation count

Role mapping policy evaluation count

Role mapping policy evaluation time

Posture policy evaluation time

ClearPass Policy Manager 6.5 | User Guide

SNMP Private MIB, SNMP Traps, System Events, Error

Codes | 631

Table 389: PolicyServerTableEntry Objects (Continued)

MIB Object Description psRestrictionPolicyEvalTime psServicePolicyEvalCount

Restriction policy evaluation time

Service policy evaluation count psServicePolicyEvalTime psSessionlogTime

Service policy evaluation time

Policy Server session logging time

PolicyServerProtoTableEntry

PolicyServerProtoTableEntry exposes MIB objects for the counter values for the RADIUS, TACACS, WEBAUTH, and APPLICATION protocols.

Table 390: PolicyServerProtoTableEntry MIB Objects

MIB Object Description psPolicyEvalTime Policy evaluation time for the protocol psProtocolName Name of the protocol

PolicyServerAutzTableEntry

PolicyServerAutzTableEntry exposes MIB objects for authorization counters (see

Table 391

).

Table 391: PolicyServerAutzTableEntry MIB Objects

MIB Object Description psAutzCounterCount Total number of Policy Server authorizations psAutzCounterFailure psAutzCounterSuccess psAutzCounterTime psAutzAuthSourceName

Number of failed Policy Server authorizations

Number of successful Policy Server authorizations

Time taken to perform Policy Server authorizations

Name of the Policy Server authorization source

Web Authentication Server MIB Entries

WebAuthProtoTableEntry exposes MIB objects for the WebLogin, AppLogin, SamlIdp, and SamlSp web authentication protocols.

632 | SNMP Private MIB, SNMP Traps, System Events,

Error Codes

ClearPass Policy Manager 6.5 |  User Guide

Table 392: WebAuthProtoTableEntry MIB Objects

MIB Object Description waAuthCounterAuthTime Time taken for web authentication waAuthCounterCount pwaAuthCounterFailure waAuthCounterSuccess

Total number of web authentications

Number of failed web authentications

Number of successful web authentications waAuthCounterTime Total time taken for web login waPolicyEvalTime waProtocolName pwaServicePolicyEvalTime

Time taken to perform policy evaluation

Name of the protocol

Time taken to perform service policy evaluation

TACACS+ Server MIB Entries

TacacsAuthTableEntry

TacacsAuthTableEntry exposes MIB objects for TACACS+ authentication counters.

Table 393: TacacsAuthTableEntry Objects

MIB Object Description tacAuthCounterAuthTime Time taken for TACACS+ authentications tacAuthCounterCount tacAuthCounterFailure tacAuthCounterSuccess tacAuthCounterTime tacPolicyEvalTime tacServicePolicyEvalTime

Total number of TACACS+ server authentications

Number of failed TACACS+ server authentications

Number of successful TACACS+ server authentications

Total time taken for TACACS+ login

Time taken to perform policy evaluation

Time taken to perform service policy evaluation

TacacsAutzTableEntry

TacacsAutzTableEntry exposes MIB objects for TACACS+ authorization counters.

ClearPass Policy Manager 6.5 | User Guide

SNMP Private MIB, SNMP Traps, System Events, Error

Codes | 633

Table 394: TacacsAuthTableEntry Objects

MIB Object Description tacAutzCounterCount tacAutzCounterFailure

Total number of TACACS+ server authorizations

Number of failed TACACS+ server authorizations tacAutzCounterSuccess tacAutzCounterTime

Number of successful TACACS+ server authorizations

Total time taken for TACACS+ authorizations l l l l

Network Traffic MIB Entries

NetworkTrafficTableEntry exposes MIB objects for network protocol and applications. These MIB objects cover the following: l l l l agent_controller (6658) db (5432) http (80) https (443) ntp (123) radius (1645, 1646, 1812, 1813) ssh (22) tacacs (49)

Table 395: TacacsAuthTableEntry Objects

MIB Object Description nwAppPort Application port nwAppName nwTrafficTotal

Application name

Total network traffic in bytes

ClearPass SNMP Traps and OIDs

This section contains the following information: l l

Introduction

ClearPass SNMP Traps

634 | SNMP Private MIB, SNMP Traps, System Events,

Error Codes

ClearPass Policy Manager 6.5 |  User Guide

Introduction

This section describes the traps that ClearPass Policy Manager supports as part of the ClearPass SNMP Private

MIB.

Table 396

provides the description and OID (Object Identifier) for each ClearPass SNMP trap. OIDs uniquely identify managed objects in a MIB hierarchy.

ClearPass SNMP Traps

Table 396: SNMP Traps Supported by the SNMP Private MIB

SNMP Trap Description and OID cppmLicenseExpiry l l

Indicates that one or more licenses associated with a ClearPass application <cppmNodeApplicationName> on the ClearPass server will expire in <cppmLicenseDaysRemaining> days.

OID: .1.3.6.1.4.1.14823.1.6.1.1.200.1001

cppmActivationExpiry l l

Indicates that one or more licensing activations associated with the

<cppmNodeApplicationName> on the ClearPass Server will expire in

<cppmActivationDaysRemaining> days.

OID: .1.3.6.1.4.1.14823.1.6.1.1.200.1002

cppmNodeCertExpiry cppmLowDiskSpace cppmLowMemory cppmClusterNodeAddNotification cppmClusterNodeDelNotification cppmClusterNodePromNotification l l

Indicates that a server certificate associated with the

<cppmNodeCertApplicationName> on the ClearPass Server will expire in <cppmCertDaysRemaining> days.

OID: .1.3.6.1.4.1.14823.1.6.1.1.200.1003

l l

Indicates that the system is running low on disk space as indicated by

<cppmDiskSpaceRemaining> with the units specified in

<cppmResourceUnit>.

OID: .1.3.6.1.4.1.14823.1.6.1.1.200.1004

l l

Indicates that the system is running low on memory as indicated by

<cppmMemoryRemaining> with the units specified in

<cppmResourceUnit>.

OID: .1.3.6.1.4.1.14823.1.6.1.1.200.1005

l l

Indicates the addition of a ClearPass node to the cluster.

n

<cppmClusterServerIp> indicates the IP address of the node added to the cluster.

OID: .1.3.6.1.4.1.14823.1.6.1.1.200.1006

l l

Indicates that a ClearPass node has been deleted from the cluster.

n

<cppmClusterServerIp> indicates the IP address of the node removed from the cluster.

OID: .1.3.6.1.4.1.14823.1.6.1.1.200.1007

l l

Indicates the promotion of a ClearPass node to Publisher status.

n

<cppmClusterServerIp> indicates the IP address of the node promoted to Publisher.

OID: .1.3.6.1.4.1.14823.1.6.1.1.200.1008

ClearPass Policy Manager 6.5 | User Guide

SNMP Private MIB, SNMP Traps, System Events, Error

Codes | 635

Table 396: SNMP Traps Supported by the SNMP Private MIB (Continued)

SNMP Trap Description and OID cppmClusterNodeDbldNotification l l

Indicates that a ClearPass node in the cluster has been disabled.

n <cppmClusterServerIp> indicates the IP address of the disabled node.

OID: .1.3.6.1.4.1.14823.1.6.1.1.200.1009

cppmClusterNodeNSyncNotification cppmClusterPwdChangedNotification l l

Indicates that the cluster password has been changed.

OID: .1.3.6.1.4.1.14823.1.6.1.1.200.1011

cppmConfigReset l l

Indicates the ClearPass node in the cluster that is in the out-of-sync state.

n <cppmClusterServerIp> indicates the IP address of the out-of-sync node.

n <cppmClusterOutOfSyncMinutes> indicates the number of minutes that the node has been out-of-sync.

OID: .1.3.6.1.4.1.14823.1.6.1.1.200.1010

l l

Indicates that the ClearPass node's configuration has been reset.

OID: .1.3.6.1.4.1.14823.1.6.1.1.200.1012

cppmConfigRestore cppmUpdateNotification cppmUpgradeNotification cppmClusterLicenseUsage l l

Indicates that the ClearPass node's configuration has been restored.

OID: .1.3.6.1.4.1.14823.1.6.1.1.200.1013

l l

Indicates that the CPPM node's installation has been updated.

OID: .1.3.6.1.4.1.14823.1.6.1.1.200.1014

l l

Indicates that the CPPM node's installation has been upgraded.

OID: .1.3.6.1.4.1.14823.1.6.1.1.200.1015

l l

Indicates the ClearPass cluster license utilization details.

n

<clearpassServerApplicationName> indicates the name of the application.

n

<clearpassClusterLicenseTotalCount> indicates the application's total cluster-wide license count.

n <clearpassClusterLicenseUsageCount> indicates the count of the application's used cluster-wide licenses.

OID: .1.3.6.1.4.1.14823.1.6.1.1.200.1016

SNMP Trap Details

ClearPass Policy Manager leverages native SNMP support from the UC Davis ‘net-SNMP’ MIB package to send trap notifications for the following events.

In these trap OIDs, the value of X varies from 1 through N, depending on the number of process states that are being checked. Details about specific OIDs associated with the processes are listed in this section.

636 | SNMP Private MIB, SNMP Traps, System Events,

Error Codes

ClearPass Policy Manager 6.5 |  User Guide

For more information, see: l l l l l l l l l l

SNMP Daemon Trap Events on page 637

CPPM Processes Stop and Start Events on page 638

Network Interface up and Down Events on page 637

Disk Utilization Threshold Exceed Events on page 638

CPU Load Average Exceed Events for 1, 5, and 15 Minute Thresholds on page 646

SNMP Daemon Traps on page 637

Process Status Traps on page 638

Network Interface Status Traps on page 637

Disk Space Threshold Traps on page 638

CPU Load Average Traps on page 646

SNMP Daemon Traps

This section contains OIDs for various trap events that are sent from CPPM.

.1.3.6.1.6.3.1.1.5.1 ==> Coldstart trap indicating the reinitialization of 'netsnmp' daemon and its configuration file may have been altered.

.1.3.6.1.6.3.1.1.5.2 ==> Warmstart trap indicating the reinitialization of 'netsnmp' daemon and its configuration file is not altered.

Figure 545: SNMP daemon traps example

SNMP Daemon Trap Events

OIDs:

.1.3.6.1.6.3.1.1.5.1 ==> Cold Start

.1.3.6.1.6.3.1.1.5.2 ==> Warm Start

Network Interface up and Down Events

OIDs:

.1.3.6.1.6.3.1.1.5.3 ==> Link Down

.1.3.6.1.6.3.1.1.5.4 ==> Link Up

Network Interface Status Traps

.1.3.6.1.6.3.1.1.5.3 ==> Indicates the linkdown trap with the 'ifAdminStatus' and 'ifOperStatus' values set to

2.

.1.3.6.1.6.3.1.1.5.4 ==> Indicates the linkup trap with the 'ifAdminStatus' and 'ifOperStatus' values set to 1.

In each case, the 'ifIndex' value is set to 2 for management interface and 3 for the data port interface.

ClearPass Policy Manager 6.5 | User Guide

SNMP Private MIB, SNMP Traps, System Events, Error

Codes | 637

Figure 546: Network interface status traps example

CPPM Processes Stop and Start Events

OIDs:

.1.3.6.1.4.1.2021.8.1.2.X ==> Process Name

.1.3.6.1.4.1.2021.2.1.101.X ==> Process Status Message

Disk Space Threshold Traps

.1.3.6.1.4.1.2021.9.1.100.1 ==> Error flag indicating the disk or partition is under the minimum required space configured for it. Value of 1 indicates the system has reached the threshold and 0 indicates otherwise.

.1.3.6.1.4.1.2021.9.1.2.1 ==> Name of the partition which has met the above condition.

Figure 547: Disk Space Threshold Traps Example

Disk Utilization Threshold Exceed Events

OIDs:

.1.3.6.1.4.1.2021.9.1.100.1 ==> Error flag for disk partition

.1.3.6.1.4.1.2021.9.1.2.1 ==> Name of the partition

Process Status Traps

RADIUS server stop SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.2

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.5

.1.3.6.1.2.1.88.2.1.5.0: 3

.1.3.6.1.4.1.2021.8.1.2.5: cpass-radius-server

638 | SNMP Private MIB, SNMP Traps, System Events,

Error Codes

ClearPass Policy Manager 6.5 |  User Guide

.1.3.6.1.4.1.2021.8.1.101.5: Radius server [ cpass-radius-server ] is stopped

RADIUS server start SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.3

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.5

.1.3.6.1.2.1.88.2.1.5.0: 0

.1.3.6.1.4.1.2021.8.1.2.5: cpass-radius-server

.1.3.6.1.4.1.2021.8.1.101.5: Radius server [ cpass-radius-server ] is running

Admin Server stop SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.2

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.1

.1.3.6.1.2.1.88.2.1.5.0: 3

.1.3.6.1.4.1.2021.8.1.2.1: cpass-admin-server

.1.3.6.1.4.1.2021.8.1.101.1: Admin server [ cpass-admin-server ] is stopped

Admin Server start SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.3

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.1

.1.3.6.1.2.1.88.2.1.5.0: 0

.1.3.6.1.4.1.2021.8.1.2.1: cpass-admin-server

.1.3.6.1.4.1.2021.8.1.101.1: Admin server [ cpass-admin-server ] is running

System Auxiliary server stop SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.2

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.2

.1.3.6.1.2.1.88.2.1.5.0: 3

.1.3.6.1.4.1.2021.8.1.2.2: cpass-system-auxiliary-server

ClearPass Policy Manager 6.5 | User Guide

SNMP Private MIB, SNMP Traps, System Events, Error

Codes | 639

.1.3.6.1.4.1.2021.8.1.101.2: System auxiliary service [ cpass-system-auxiliary-server ] is stopped

System Auxiliary server start SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.3

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.2

.1.3.6.1.2.1.88.2.1.5.0: 0

.1.3.6.1.4.1.2021.8.1.2.2: cpass-system-auxiliary-server

.1.3.6.1.4.1.2021.8.1.101.2: System auxiliary service [ cpass-system-auxiliary-server ] is running

Policy server stop SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.2

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.3

.1.3.6.1.2.1.88.2.1.5.0: 3

.1.3.6.1.4.1.2021.8.1.2.3: cpass-policy-server

.1.3.6.1.4.1.2021.8.1.101.3: Policy server [ cpass-policy-server ] is stopped

Policy server start SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.3

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.3

.1.3.6.1.2.1.88.2.1.5.0: 0

.1.3.6.1.4.1.2021.8.1.2.3: cpass-policy-server

.1.3.6.1.4.1.2021.8.1.101.3: Policy server [ cpass-policy-server ] is running

Async DB write service stop SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.2

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.6

.1.3.6.1.2.1.88.2.1.5.0: 1

.1.3.6.1.4.1.2021.8.1.2.6: cpass-dbwrite-server

640 | SNMP Private MIB, SNMP Traps, System Events,

Error Codes

ClearPass Policy Manager 6.5 |  User Guide

.1.3.6.1.4.1.2021.8.1.101.6: Async DB write service [ cpass-dbwrite-server ] is stopped

Async DB write service start SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.3

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.6

.1.3.6.1.2.1.88.2.1.5.0: 0

.1.3.6.1.4.1.2021.8.1.2.6: cpass-dbwrite-server

.1.3.6.1.4.1.2021.8.1.101.6: Async DB write service [ cpass-dbwrite-server ] is running

DB replication service stop SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.2

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.7

.1.3.6.1.2.1.88.2.1.5.0: 1

.1.3.6.1.4.1.2021.8.1.2.7: cpass-repl-server

.1.3.6.1.4.1.2021.8.1.101.7: DB replication service [ cpass-repl-server ] is stopped

DB replication service start SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.3

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.7

.1.3.6.1.2.1.88.2.1.5.0: 0

.1.3.6.1.4.1.2021.8.1.2.7: cpass-repl-server

.1.3.6.1.4.1.2021.8.1.101.7: DB replication service [ cpass-repl-server ] is running

DB Change Notification server stop SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.2

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.8

.1.3.6.1.2.1.88.2.1.5.0: 3

.1.3.6.1.4.1.2021.8.1.2.8: cpass-dbcn-server

ClearPass Policy Manager 6.5 | User Guide

SNMP Private MIB, SNMP Traps, System Events, Error

Codes | 641

.1.3.6.1.4.1.2021.8.1.101.8: DB change notification server [ cpass-dbcn-server ] is stopped

DB Change Notification server start SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.3

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.8

.1.3.6.1.2.1.88.2.1.5.0: 0

.1.3.6.1.4.1.2021.8.1.2.8: cpass-dbcn-server

.1.3.6.1.4.1.2021.8.1.101.8: DB change notification server [ cpass-dbcn-server ] is running

Async netd service stop SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.2

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.9

.1.3.6.1.2.1.88.2.1.5.0: 3

.1.3.6.1.4.1.2021.8.1.2.9: cpass-async-netd

.1.3.6.1.4.1.2021.8.1.101.9: Async netd service [ cpass-async-netd ] is stopped

Async netd service start SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.3

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.9

.1.3.6.1.2.1.88.2.1.5.0: 0

.1.3.6.1.4.1.2021.8.1.2.9: cpass-async-netd

.1.3.6.1.4.1.2021.8.1.101.9: Async netd service [ cpass-async-netd ] is running

Multi-master Cache service stop SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.2

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.10

.1.3.6.1.2.1.88.2.1.5.0: 3

.1.3.6.1.4.1.2021.8.1.2.10: cpass-multi-master-cache-server

642 | SNMP Private MIB, SNMP Traps, System Events,

Error Codes

ClearPass Policy Manager 6.5 |  User Guide

.1.3.6.1.4.1.2021.8.1.101.10: Multi-master cache [ cpass-multi-master-cache-server ] is stopped

Multi-master Cache service start SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.3

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.10

.1.3.6.1.2.1.88.2.1.5.0: 0

.1.3.6.1.4.1.2021.8.1.2.10: cpass-multi-master-cache-server

.1.3.6.1.4.1.2021.8.1.101.10: Multi-master cache [ cpass-multi-master-cache-server ] is running

AirGroup Notification service stop SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.2

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.11

.1.3.6.1.2.1.88.2.1.5.0: 3

.1.3.6.1.4.1.2021.8.1.2.11: airgroup-notify

.1.3.6.1.4.1.2021.8.1.101.11: AirGroup notification service [ airgroup-notify ] is stopped

AirGroup Notification service start SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.3

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.11

.1.3.6.1.2.1.88.2.1.5.0: 0

.1.3.6.1.4.1.2021.8.1.2.11: airgroup-notify

.1.3.6.1.4.1.2021.8.1.101.11: AirGroup notification service [ airgroup-notify ] is running

Micros Fidelio FIAS service stop SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.2

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.12

.1.3.6.1.2.1.88.2.1.5.0: 3

.1.3.6.1.4.1.2021.8.1.2.12: fias_server

ClearPass Policy Manager 6.5 | User Guide

SNMP Private MIB, SNMP Traps, System Events, Error

Codes | 643

.1.3.6.1.4.1.2021.8.1.101.12: Micros Fidelio FIAS [ fias_server ] is stopped

Micros Fidelio FIAS service start SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.3

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.12

.1.3.6.1.2.1.88.2.1.5.0: 0

.1.3.6.1.4.1.2021.8.1.2.12: fias_server

.1.3.6.1.4.1.2021.8.1.101.12: Micros Fidelio FIAS [ fias_server ] is running

TACACS server stop SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.2

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.4

.1.3.6.1.2.1.88.2.1.5.0: 3

.1.3.6.1.4.1.2021.8.1.2.4: cpass-tacacs-server

.1.3.6.1.4.1.2021.8.1.101.4: TACACS server [ cpass-tacacs-server ] is stopped

TACACS server start SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.3

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.4

.1.3.6.1.2.1.88.2.1.5.0: 0

.1.3.6.1.4.1.2021.8.1.2.4: cpass-tacacs-server

.1.3.6.1.4.1.2021.8.1.101.4: TACACS server [ cpass-tacacs-server ] is running

Virtual IP service stop SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.2

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.13

.1.3.6.1.2.1.88.2.1.5.0: 1

.1.3.6.1.4.1.2021.8.1.2.13: cpass-vip-service

644 | SNMP Private MIB, SNMP Traps, System Events,

Error Codes

ClearPass Policy Manager 6.5 |  User Guide

.1.3.6.1.4.1.2021.8.1.101.13: ClearPass Virtual IP service [ cpass-vip-service ] is stopped

Virtual IP service start SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.3

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0:

.1.3.6.1.2.1.88.2.1.3.0:

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.13

.1.3.6.1.2.1.88.2.1.5.0: 0

.1.3.6.1.4.1.2021.8.1.2.13: cpass-vip-service

.1.3.6.1.4.1.2021.8.1.101.13: ClearPass Virtual IP service [ cpass-vip-service ] is running

Stats Collection service stop SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.2

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0

.1.3.6.1.2.1.88.2.1.3.0

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.15

.1.3.6.1.2.1.88.2.1.5.0: 3

.1.3.6.1.4.1.2021.8.1.2.15: cpass-statsd-server

.1.3.6.1.4.1.2021.8.1.101.15: Stats collection service [ cpass-statsd-server ] is stopped

Stats Collection service start SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.3

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0

.1.3.6.1.2.1.88.2.1.3.0

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.15

.1.3.6.1.2.1.88.2.1.5.0: 0

.1.3.6.1.4.1.2021.8.1.2.15: cpass-statsd-server

.1.3.6.1.4.1.2021.8.1.101.15: Stats collection service [ cpass-statsd-server ] is running

Stats Aggregation service stop SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.2

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0

.1.3.6.1.2.1.88.2.1.3.0

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.14

.1.3.6.1.2.1.88.2.1.5.0: 1

.1.3.6.1.4.1.2021.8.1.2.14: cpass-carbon-server

ClearPass Policy Manager 6.5 | User Guide

SNMP Private MIB, SNMP Traps, System Events, Error

Codes | 645

.1.3.6.1.4.1.2021.8.1.101.14: Stats aggregation service [ cpass-carbon-server ] is stopped stats Aggregation service start SNMP trap snmpTrapOID: .1.3.6.1.2.1.88.2.0.3

.1.3.6.1.2.1.88.2.1.1.0: extTable

.1.3.6.1.2.1.88.2.1.2.0

.1.3.6.1.2.1.88.2.1.3.0

.1.3.6.1.2.1.88.2.1.4.0: .1.3.6.1.4.1.2021.8.1.100.14

.1.3.6.1.2.1.88.2.1.5.0: 0

.1.3.6.1.4.1.2021.8.1.2.14: cpass-carbon-server

.1.3.6.1.4.1.2021.8.1.101.14: Stats aggregation service [ cpass-carbon-server ] is running.

CPU Load Average Exceed Events for 1, 5, and 15 Minute Thresholds

OIDs

.1.3.6.1.4.1.2021.9.1.100.1 ==> Error flag for disk partition

.1.3.6.1.4.1.2021.9.1.2.1 ==> Name of the partition

CPU Load Average Traps

OIDs

.1.3.6.1.4.1.2021.10.1.100.1 ==> Error flag on the CPU load-1 average. Value of 1 indicates the load-1 has crossed its threshold and 0 indicates otherwise.

.1.3.6.1.4.1.2021.10.1.2.1 ==> Name of CPU load-1 average

Figure 548: CPU load-1 average example

.1.3.6.1.4.1.2021.10.1.100.2 ==> Error flag on the CPU load-5 average. Value of 1 indicates the load-5 has crossed its threshold and 0 indicates otherwise.

.1.3.6.1.4.1.2021.10.1.2.2 ==> Name of CPU load-5 average

Figure 549: CPU load-5 average example

.1.3.6.1.4.1.2021.10.1.100.3 ==> Error flag on the CPU load-15 average. Value of 1 indicates the load-15 has crossed its threshold and 0 indicates otherwise.

.1.3.6.1.4.1.2021.10.1.2.3 ==> Name of CPU load-15 average.

646 | SNMP Private MIB, SNMP Traps, System Events,

Error Codes

ClearPass Policy Manager 6.5 |  User Guide

Figure 550: CPU load-15 average example

Important System Events

This topic describes the important System Events logged by ClearPass. These messages are available for consumption on the administrative interface, and in the form of a syslog stream. The events below are in the following format

<Source>, <Level>, <Category>, <Message>

Elements listed below within angular brackets (<content>) are variable, and are substituted by ClearPass as applicable (such as an IP address).

Refer to the

Service Names on page 651

section for the list of available service names.

Admin UI Events

Critical Events

“Admin UI”, “ERROR” “Email Failed”, “Sending email failed”

“Admin UI”, “ERROR” “SMS Failed”, “Sending SMS failed”

“Admin UI”, “WARN”, “Login Failed”, “User:<X>”

"Admin UI", "WARN", "Login Failed", description

Info Events

"Admin UI", "INFO", "Logged out"

"Admin UI", "INFO", "Session destroyed"

"Admin UI", "INFO", "Logged in", description

"Admin UI", "INFO", "Clear Authentication Cache", “Cache is cleared for authentication source <X>"

"Admin UI", "INFO", "Clear Blacklist User Cache", “Blacklist Users cache is cleared for authentication source <X>"

"Admin UI", "INFO", "Server Certificate", "Subject:<X>“, "Updated"

"Install Update", "INFO", "Installing Update", "File: <X>", "Success"

"Admin UI", “INFO” “Email Successful”, “Sending email succeeded”

"Admin UI", “INFO” “SMS Successful”, “Sending SMS succeeded”

Admin Server Events

Info Events

“Admin server”, “INFO”, “Performed action start on Admin server”

ClearPass Policy Manager 6.5 | User Guide

SNMP Private MIB, SNMP Traps, System Events, Error

Codes | 647

Async Service Events

Info Events

“Async DB write service”, “INFO”, “Performed action start on Async DB write service”

“Multi-master cache”, “INFO”, “Performed action start on Multi-master cache”

“Async netd service”, “INFO”, “Performed action start on Async netd service”

ClearPass/Domain Controller Events

Critical Events

“netleave”, “ERROR”, “Failed to remove <HOSTNAME> from the domain <DOMAIN_NAME>”

“netjoin”, “WARN”, “configuration”, “<HOSTNAME> failed to join the domain <DOMAIN NAME> with domain controller as <DOMAIN CONTROLLER>”

Info Events

“Netjoin”, “INFO”, "<HOSTNAME> joined the domain <REALM>"

“Netjoin”, “INFO”, “<HOSTNAME> removed from the domain <DOMAIN_NAME>“

ClearPass System Configuration Events

Critical Events

“DNS”, “ERROR”, “Failed configure DNS servers = <X>”

“datetime”, “ERROR”, “Failed to change system datetime.”

“hostname”, “ERROR”, “Setting hostname to <X> failed”

“ipaddress”, “ERROR”, “Testing cluster node connectivity failed”

“System TimeCheck “, “ WARN ,” , “Restarting CPPM services as the system detected time drift , Current system time= 2013-07-27 17:00:01, System time 5 mins back = 2013-01-25 16:55:01”

Info Events

“Cluster”, “INFO”, “Setup”, “Database initialized”

“hostname”, “INFO”, “configuration”, “Hostname set to <X>”

“ipaddress”, “INFO”, “configuration”, Management port information updated to - IpAddress = <X>, Netmask =

<X>, Gateway = <X>”

“IpAddress”, “INFO”, "Data port information updated to - IpAddress = <X>, Netmask = <Y>, Gateway = <Z>"

“DNS”, “INFO”, “configuration”, “Successfully configured DNS servers - <X>”

“Time Config”, “INFO”, “Remote Time Server”, “Old List: <X>\nNew List: <Y>”

“timezone”, “INFO”, “configuration”, “”

“datetime”, “INFO”, “configuration”, “Successfully changed system datetime.\nOld time was <X>”

ClearPass Update Events

Critical Events

“Install Update”, “ERROR”, “Installing Update”, “File: <X>”, “Failed with exit status - <Y>”

648 | SNMP Private MIB, SNMP Traps, System Events,

Error Codes

ClearPass Policy Manager 6.5 |  User Guide

“ClearPass Firmware Update Checker”, “ERROR”, “Firmware Update Checker”, “No subscription ID was supplied.

To find new plugins, you must provide your subscription ID in the application configuration”

Info Events

“ClearPass Updater”, “INFO”, “Hotfixes Updates”, “Updated Hotfixes from File”

“ClearPass Updater”, “INFO”, “Fingerprints Updates”, “Updated fingerprints from File”

“ClearPass Updater”, “INFO”, “Updated AV/AS from ClearPass Portal (Online)”

“ClearPass Updater”, “INFO”,” Updated Hotfixes from ClearPass Portal (Online)”

Cluster Events

Critical Events

“Cluster”, “ERROR”, “SetupSubscriber”, “Failed to add subscriber node with management IP=<IP>“

Info Events

"AddNode", “INFO”, "Added subscriber node with management IP=<IP>"

"DropNode", “INFO”, "Dropping node with management IP=<IP>, hostname=<Hostname>"

Command Line Events

Info Events

"Command Line”, “INFO”, “User:appadmin"

DB Replication Services Events

Info Events

"DB replication service”, “INFO”, “Performed action start on DB replication service”

"DB replication service”, “INFO”, “Performed action stop on DB replication service”

“DB change notification server”, “INFO”, “Performed action start on DB change notification server”

“DB replication service”, “INFO”, “Performed action start on DB replication service”

Licensing Events

Critical Events

“Admin UI”, “WARN”, “Activation Failed”, “Action Status: This Activation Request Token is already in use by another instance\nProduct Name: Policy Manager\nLicense Type: <X>\nUser Count: <Y>”

Info Events

“Admin UI”, “INFO”, “Add License”, “Product Name: Policy Manager\nLicense Type: <X>\nUser Count: <Y>”

Policy Server Events

Info Events

“Policy Server”, “INFO”, “Performed action start on Policy server”

“Policy Server”, “INFO”, “Performed action stop on Policy server”

ClearPass Policy Manager 6.5 | User Guide

SNMP Private MIB, SNMP Traps, System Events, Error

Codes | 649

RADIUS/TACACS+ Server Events

Critical Events

“TACACSServer”, “ERROR”, “Request”, “Nad Ip=<X> not configured”

“RADIUS”, “WARN”, “Authentication”, “Ignoring request from unknown client <IP>:<PORT>”

“RADIUS”, “ERROR”, “Authentication”, “Received packet from <IP> with invalid Message-Authenticator! (Shared secret is incorrect.)”

“RADIUS”, “ERROR”, “Received Accounting-Response packet from client <IP Address> port 1813 with invalid signature (err=2)! (Shared secret is incorrect.)”

“RADIUS”, “ERROR”, “Received Access-Accept packet from client <IP Address> port 1812 with invalid signature

(err=2)! (Shared secret is incorrect.)”

Info Events

“RADIUS”, “INFO”, “Performed action start on Radius server”

“RADIUS”, “INFO”, “Performed action restart on Radius server

“TACACS server”, “INFO”, “Performed action start on TACACS server”

“TACACS server”, “INFO”, “Performed action stop on TACACS server”

SNMP Events

Critical Events

“SNMPService”, “ERROR”, “ReadDeviceInfo”, “SNMP GET failed for device <X> with error=No response received\nReading sysObjectId failed for device=<X>\nReading switch initialization info failed for <X>”

"SNMPService","ERROR", "Error fetching table snmpTargetAddr. Request timed out. Error reading SNMP target table for NAD=10.1.1.1 Maybe SNMP target address table is not supported by device? Allow NAD update.

SNMP GET failed for device 10.1.1.1 with error=No response received Reading sysObjectId failed for device=10.1.1.1 Reading switch initialization info failed for 10.1.1.1”

Info Events

“SNMPService”, “INFO”, “Device information not read for <Ip Address> since no traps are configured to this node”

Support Shell Events

Info Events

“Support Shell” , “INFO”, “User:arubasupport”

System Auxiliary Service Events

Info Events

“System auxiliary service”, “INFO”, “Performed action start on System auxiliary service”

System Monitor Events

Critical Events

“Sysmon”, “ERROR”, “System”, “System is running with low memory. Available memory = <X>%”

650 | SNMP Private MIB, SNMP Traps, System Events,

Error Codes

ClearPass Policy Manager 6.5 |  User Guide

“Sysmon”, “ERROR”, “System”, “System is running with low disk space. Available disk space = <X>%”

“System TimeCheck”, “WARN”, “Restart Services”, “Restarting CPPM services as the system detected time drift.

Current system time= <X>, System time 5 mins back = <Y>”

Info Events

“<Service Name>”, “INFO”, “restart”, “Performed action restart on <Service Name>”

“SYSTEM”, “INFO”, “<X> restarted”, “System monitor restarted <X>, as it seemed to have stopped abruptly”

"SYSTEM", "ERROR", "Updating CRLs failed", "Could not retrieve CRL from <URL>."

“System monitor service”, “INFO”, “Performed action start on System monitor service”

"Shutdown” “INFO” system "System is shutting down" Success

Service Names

l l l l l l l l l l l l l l

AirGroup notification service

Async DB write service

Async network services

DB change notification server

DB replication service

Micros Fidelio FIAS

Multi-master cache

Policy server

RADIUS server

System auxiliary services

System monitor service

TACACS server

Virtual IP service

[YOURSERVERNAME] Domain service

Error Codes

Table 397

describes the ClearPass Policy Manager error codes:

Table 397: ClearPass Policy Manager Error Codes

Code Description

0 Success

101

102

103

104

Failed to perform service classification

Failed to perform policy evaluation

Failed to perform posture notification

Failed to query authstatus

Type

Success

Internal Error

Internal Error

Internal Error

Internal Error

ClearPass Policy Manager 6.5 | User Guide

SNMP Private MIB, SNMP Traps, System Events, Error

Codes | 651

Table 397: ClearPass Policy Manager Error Codes (Continued)

Code Description

105 Internal error in performing authentication

212

213

214

215

208

209

210

211

204

205

206

207

106

201

202

203

220

221

222

223

216

217

218

219

Internal error in RADIUS server

User not found

Password mismatch

Failed to contact Authentication Source

Failed to classify request to service

Authentication Source not configured for service

Access denied by policy

Failed to get client MAC Address in order to perform Web authentication

No response from home server

No password in request

Unknown CA in client certificate

Client certificate not valid

Client certificate has expired

Certificate comparison failed

No certificate in authentication source

TLS session error

User authentication failed

Search failed due to insufficient permissions

Authentication source timed out

Bad search filter

Search failed

Authentication source error

Password change error

Username not available in request

Type

Internal Error

Internal Error

Authentication failure

Authentication failure

Authentication failure

Authentication failure

Authentication failure

Authentication failure

Authentication failure

Authentication failure

Authentication failure

Authentication failure

Authentication failure

Authentication failure

Authentication failure

Authentication failure

Authentication failure

Authentication failure

Authentication failure

Authentication failure

Authentication failure

Authentication failure

Authentication failure

Authentication failure

Authentication failure

652 | SNMP Private MIB, SNMP Traps, System Events,

Error Codes

ClearPass Policy Manager 6.5 |  User Guide

Table 397: ClearPass Policy Manager Error Codes (Continued)

Code Description

224 CallingStationID not available in request

5007

5008

5009

6001

5003

5004

5005

5006

229

230

5001

5002

225

226

227

228

6103

6201

6202

6203

6002

6003

6101

6102

User account disabled

User account expired or not active yet

User account needs approval

User account has exceeded bandwidth limit

User account has exceeded session duration limit

User account has exceeded session count limit

Internal Error

Invalid MAC Address

Invalid request received

Insufficient parameters received

Query - No MAC address record found

Query - No supported actions

Query - Cannot fetch MAC address details

Request: MAC address not online

Request: No MAC address record found

Unsupported TACACS parameter in request

Invalid sequence number

Sequence number overflow

Not enough inputs to perform authentication

Authentication privilege level mismatch

No enforcement profiles matched to perform authentication

Authorization failed as session is not authenticated

Authorization privilege level mismatch

Command not allowed

ClearPass Policy Manager 6.5 | User Guide

SNMP Private MIB, SNMP Traps, System Events, Error

Codes | 653

Type

Authentication failure

Authentication failure

Authentication failure

Authentication failure

Authentication failure

Authentication failure

Authentication failure

Command and Control

Command and Control

Command and Control

Command and Control

Command and Control

Command and Control

Command and Control

Command and Control

Command and Control

TACACS Protocol

TACACS Protocol

TACACS Protocol

TACACS Authentication

TACACS Authentication

TACACS Authentication

TACACS Authorization

TACACS Authorization

TACACS Authorization

Table 397: ClearPass Policy Manager Error Codes (Continued)

Code Description

6204 No enforcement profiles matched to perform command authorization

9009

9010

9011

9012

9005

9006

9007

9008

9001

9002

9003

9004

6301

6302

6303

6304

9013

9014

9015

9016

9017

9018

9019

New password entered does not match

Empty password

Change password allowed only for local users

Internal error in performing change password

Wrong shared secret

Request timed out

Phase 2 PAC failure

Client rejected after PAC provisioning

Client does not support posture request

Received error TLV from client

Received failure TLV from client

Phase 2 PAC not found

Unknown Phase 2 PAC

Invalid Phase 2 PAC

PAC verification failed

PAC binding failed

Session resumption failed

Cached session data error

Client does not support configured EAP methods

Client did not send Cryptobinding TLV

Failed to contact OCSP Server

RADIUS protocol error

Client sent conflicting identities

Type

TACACS Authorization

TACACS Change Password

TACACS Change Password

TACACS Change Password

TACACS Change Password

RADIUS Protocol

RADIUS Protocol

RADIUS Protocol

RADIUS Protocol

RADIUS Protocol

RADIUS Protocol

RADIUS Protocol

RADIUS Protocol

RADIUS Protocol

RADIUS Protocol

RADIUS Protocol

RADIUS Protocol

RADIUS Protocol

RADIUS Protocol

RADIUS Protocol

RADIUS Protocol

RADIUS Protocol

RADIUS Protocol

RADIUS Protocol

654 | SNMP Private MIB, SNMP Traps, System Events,

Error Codes

ClearPass Policy Manager 6.5 |  User Guide

Appendix D

Use Cases

l l

This appendix contains several specific ClearPass Policy Manager use cases. Each one explains what it is typically used for, and then describes how to configure Policy Manager for that use case.

l l l

802.1X Wireless Use Case on page 655

Web Based Authentication Use Case on page 661

MAC Authentication Use Case on page 668

TACACS+ Use Case on page 671

Single Port Use Case on page 672

802.1X Wireless Use Case

The basic Policy Manager Use Case configures a Policy Manager Service to identify and evaluate an 802.1X

request from a user logging into a Wireless Access Device. The following image illustrates the flow of control for this service:

Figure 551: Flow of Control, Basic 802.1X Configuration Use Case

ClearPass Policy Manager 6.5 | User Guide Use Cases | 655

Policy Manager ships with fourteen preconfigured services. In this use case, you select a service that supports

802.1X wireless requests. Follow the steps below to configure this basic 802.1X service that uses [EAP FAST], one of the pre-configured Policy Manager authentication methods, and Active Directory Authentication

Source (AD), an external authentication source within your existing enterprise.

Policy Manager fetches attributes used for role mapping from the authorization sources (that are associated with the authentication source). In this example, the authentication and authorization source are one and the same.

Policy Manager tests client identity against role-mapping rules, appending any match (multiple roles acceptable) to the request for use by the enforcement policy. In the event of role-mapping failure, Policy

Manager assigns a default role. This use case create the role mapping policy RMP_DEPARTMENT that distinguishes clients by department and the corresponding roles ROLE_ENGINEERING and ROLE_FINANCE, to which it maps.

Policy Manager can be configured for a third-party posture server, to evaluate client health based on vendorspecific credentials, typically credentials that cannot be evaluated internally by Policy Manager (that is, not in the form of internal posture policies). Currently, Policy Manager supports the following posture server interface: Microsoft NPS (RADIUS).

For purposes of posture evaluation, you can configure a posture policy (internal to Policy Manager), a posture server

(external), or an audit server (internal or external). Each of the first three use cases demonstrates one of these options; here, the posture server.

Configuring a Service

1. Navigate to Configuration > Services.

2. Click the icon to add a service. The Configuration > Services > Add window opens.

3. If it is not already selected, click the Service tab and define basic service information.

a. Enter a name for the service in the Name field.

b. Click the Type drop-down list and select 802.1X Wireless.

c. (Optional) click the Monitor Mode checkbox to allow handshakes to occur (for monitoring purposes), but without enforcement.

d. Click Next to display the Authentication tab.

4. Configure authentication.

a. In the Authentication Methods field, select [EAP Fast].

b. In the Authentication Sources field, click the Select to Add drop-down list and select the following sources.

n n n n

[Local User Repository] [Local SQL DB]

[Guest User Repository] [Local SQL DB]

[Guest Device Repository] [Local SQL DB]

[Endpoints Repository] [Local SQL DB] n n

[Onboard Devices Repository] [Local SQL DB]

[Admin User Repository] [Local SQL DB] n

[Active Directory] c. (Optional) Select Strip Username Rules to pre-process the user name (to remove prefixes and suffixes) before sending it to the authentication source.

656 | Use Cases ClearPass Policy Manager 6.5 |  User Guide

Creating a New Role Mapping Policy

To create a new Role Mapping policy:

1. Click the Roles tab.

2. Click Add new Role Mapping Policy. The Role Mappings page opens.

Figure 552: Role Mapping Navigation and Settings

3. Add a new role, navigate to the Policy tab. Enter the Policy Name, For example, ROLE_ENGINEER and click

Save. Repeat the same step for ROLE_FINANCE. The following figure displays the Policy tab:

Figure 553: Policy Tab

4. Click the Next button in the Rules Editor.

5. Create rules to map client identity to a role. From the Mapping Rules tab, select the Rules Evaluation

Algorithm radio button. The following figure displays the Mapping Rules tab:

ClearPass Policy Manager 6.5 | User Guide Use Cases | 657

Figure 554: Mapping Rules Tab

6. Select the Select all matches radio button.

7. Match the conditions with the role name. Click the Add Rule button. The Rules Editor pop-up opens.

Upon completion of each rule, click the Save button in the Rules Editor.

8. Click the Save button.

9. Add the new role mapping policy to the service from the Roles tab. The following figure displays the Roles tab:

Figure 555: Roles Tab

658 | Use Cases ClearPass Policy Manager 6.5 |  User Guide

10.Select Role Mapping Policy, for example, RMP_DEPARTMENT. Click Next.

11.Add an Micrsoft NPS external posture serverto the 802.1X service. Click the Posture tab. The following figure displays the Posture tab:

Figure 556: Posture Tab

12.Click Add new Posture Server to add a new posture server.

13.Configure the following posture settings examples: l l l

Name (freeform): PS_NPS

Server Type radio button: Microsoft NPS

Default Posture Token (selector): UNKOWN

The following figure displays the Posture Server tab:

Figure 557: Posture Server Tab

14.Click Next.

15.Configure connection settings in the Primary/ Backup Server tabs by entering the connection information for the RADIUS posture server. The following figure displays the Primary Server tab:

ClearPass Policy Manager 6.5 | User Guide Use Cases | 659

Figure 558: Primary Server Tab

16.Click Next from primary server to backup server. Click Save.

17.Add the new posture server to the service. From the Posture tab, enter the Posture Servers, for example,

PS_NPS, then click the Add button. The following figure displays the Posture tab:

Figure 559: Posture Tab

18.Click the Next button. Assign an enforcement policy.

19.Enforcement policies contain dictionary-based rules for evaluation of Role, Posture Tokens, and System

Time to evaluation profiles. Policy Manager applies all matching enforcement profiles to the request. In the case of no match, Policy Manager assigns a default enforcement profile. The following figure displays the

Enforcement tab:

Table 398: Enforcement Policy Navigation and Settings

660 | Use Cases ClearPass Policy Manager 6.5 |  User Guide

20. From the Enforcement tab, select the Enforcement Policy. For instructions about how to build an enforcement policy, refer to

Configuring Enforcement Policies on page 297

.

21.Save the service.

Web Based Authentication Use Case

This Service supports known Guests with inadequate 802.1X supplicants or posture agents. The following figure illustrates the overall flow of control for this Policy Manager Service.

Figure 560: Flow-of-Control of Web-Based Authentication for Guests

Configuring a Service

Perform the following steps to configure Policy Manager for WebAuth-based Guest access.

1. Prepare the switch to pre-process WebAuth requests for the Policy Manager Aruba WebAuth service.

Refer to your Network Access Device documentation to configure the switch such that it redirects HTTP requests to the Aruba Guest Portal, which captures username and password and optionally launches an agent that returns posture data.

2. Create a WebAuth-based Service.

ClearPass Policy Manager 6.5 | User Guide Use Cases | 661

Table 399: Service Navigation and Settings

Navigation Settings

Create a new Service: l Services > l Add Service >

Name the Service and select a preconfigured Service

Type: l Service (tab) > l Type (selector):

Aruba Web-Based

Authentication > l l

Name/Descriptio

n (freeform) >

Upon completion, click Next.

3. Set up the Authentication.

a. Method: The Policy Manager WebAuth service authenticates WebAuth clients internally.

b. Source: Administrators typically configure Guest Users in the local Policy Manager database.

4. Configure a Posture Policy.

For purposes of posture evaluation, you can configure a Posture Policy (internal to Policy Manager), a Posture Server

(external), or an Audit Server (internal or external). Each of the first three use cases demonstrates one of these options. This use case demonstrates the Posture Policy.

As of the current version, Policy Manager ships with five pre-configured posture plugins that evaluate the health of the client and return a corresponding posture token.

To add the internal posture policy IPP_UNIVERSAL_XP, which (as you will configure it in this Use Case, checks any Windows

®

XP clients to verify the most current Service Pack).

662 | Use Cases ClearPass Policy Manager 6.5 |  User Guide

Table 400: Local Policy Manager Database Navigation and Settings

Navigation Settings

Select the local Policy

Manager database: l Authentication (tab) > l Sources (Select drop-down list): [Local User

Repository] > l l l l

Add >

Strip Username Rules

(check box) >

Enter an example of preceding or following separators (if any), with the phrase “user” representing the username to be returned. For authentication, Policy

Manager strips the specified separators and any paths or domains beyond them.

Upon completion, click

Next (until you reach

Enforcement Policy).

ClearPass Policy Manager 6.5 | User Guide Use Cases | 663

Table 401: Posture Policy Navigation and Settings

Navigation Setting

Create a

Posture Policy: l Posture

(tab) > l Enable

Validation

Check

(check box) > l Add new

Internal

Policy (link)

>

Name the

Posture Policy and specify a general class of operating system: l l

Policy (tab)

>

Policy

Name

(freeform):

IPP_

UNIVERSAL > l l

Host

Operating

System

(radio buttons):

Windows >

When finished working in the Policy tab, click

Next to open the

Posture

Plugins tab

664 | Use Cases ClearPass Policy Manager 6.5 |  User Guide

Table 401: Posture Policy Navigation and Settings (Continued)

Navigation Setting

Select a

Validator: l Posture

Plugins (tab)

> l l

Enable

Windows

Health

System

Validator >

Configure

(button) >

Configure the

Validator: l Windows

System

Health

Validator

(popup) > l Enable all

Windows operating systems

(check box) > l l

Enable

Service Pack levels for

Windows 7,

Windows

Vista

®

,

Windows XP

Windows

Server

®

2008,

Windows

Server 2008

R2, and

Windows

Server 2003

(check boxes) >

Save

(button) >

ClearPass Policy Manager 6.5 | User Guide Use Cases | 665

Table 401: Posture Policy Navigation and Settings (Continued)

Navigation Setting l When finished working in the Posture

Plugin tab click Next to move to the

Rules tab)

Set rules to correlate validation results with posture tokens: l

Rules (tab) > l l l l l

Add Rule

(button opens popup) >

Rules Editor

(popup) >

Conditions/

Actions: match

Conditions

(Select

Plugin/

Select Plugin checks) to

Actions

(Posture

Token)>

In the Rules

Editor, upon completion of each rule, click the

Save button

>

When finished working in the Rules tab, click the

Next button.

666 | Use Cases ClearPass Policy Manager 6.5 |  User Guide

Table 401: Posture Policy Navigation and Settings (Continued)

Navigation Setting

Add the new

Posture Policy to the Service:

Back in Posture

(tab) >

Internal

Policies

(selector): IPP_

UNIVERSAL_XP, then click the

Add button

The following fields deserve special mention: n n n

Default Posture Token. Value of the posture token to use if health status is not available.

Remediate End-Hosts. When a client does not pass posture evaluation, redirect to the indicated server for remediation.

Remediation URL. URL of remediation server.

5. Create an Enforcement Policy.

Because this Use Case assumes the Guest role, and the Aruba Web Portal agent has returned a posture token, it does not require configuration of Role Mapping or Posture Evaluation.

The SNMP_POLICY selected in this step provides full guest access to a Role of [Guest] with a Posture of Healthy, and limited guest access.

Table 402: Enforcement Policy Navigation and Settings

Navigation Setting

Add a new

Enforcement Policy: l l l

Enforcement

(tab) >

Enforcement

Policy (selector):

SNMP_POLICY

Upon completion, click

Save.

6. Save the Service.

Click Save. The Service now appears at the bottom of the Services list.

ClearPass Policy Manager 6.5 | User Guide Use Cases | 667

MAC Authentication Use Case

This Service supports Network Devices, such as printers or handhelds. The following image illustrates the overall flow of control for this Policy Manager Service. In this service, an audit is initiated on receiving the first MAC

Authentication request. A subsequent MAC Authentication request (forcefully triggered after the audit, or triggered after a short session timeout) uses the cached results from the audit to determine posture and role(s) for the device.

Figure 561: Flow-of-Control of MAC Authentication for Network Devices

Configuring the Service

Follow these steps to configure Policy Manager for MAC-based Network Device access.

1. Create a MAC Authentication Service.

668 | Use Cases ClearPass Policy Manager 6.5 |  User Guide

Table 403: MAC Authentication Service Navigation and Settings

Navigation Settings

Create a new Service: l Services > l Add Service (link) >

Name the Service and select a pre-configured Service Type: l Service (tab) > l l l

Type (selector): MAC

Authentication >

Name/Description

(freeform) >

Upon completion, click

Next to configure

Authentication

2. Set up Authentication.

You can select any type of authentication/authorization source for a MAC Authentication service. Only a

Static Host list of type MAC Address List or MAC Address Regular Expression shows up in the list of authentication sources (of type Static Host List). For more information on static host list, see

Adding and

Modifying Static Host Lists on page 208

. You can also select any other supported type of authentication source.

Table 404: Authentication Method Navigation and Settings

Navigation Settings

Select an Authentication Method and two authentication sources - one of type Static Host List and the other of type Generic LDAP server (that you have already configured in Policy

Manager): l l l

Authentication (tab) >

Methods (This method is automatically selected for this type of service): [MAC AUTH] >

Add > l l

Sources (Select drop-down list):

Handhelds [Static Host List] and

Policy Manager Clients White List

[Generic LDAP] >

Add > l Upon completion, Next (to Audit)

3. Configure an Audit Server.

ClearPass Policy Manager 6.5 | User Guide Use Cases | 669

This step is optional if no Role Mapping Policy is provided, or if you want to establish health or roles using an audit. An audit server determines health by performing a detailed system and health vulnerability analysis

(NESSUS). You can also configure the audit server (NMAP or NESSUS) with post-audit rules that enable

Policy Manager to determine client identity.

Table 405: Audit Server Navigation and Settings

Navigation Settings

Configure the Audit Server: l Audit (tab) > l l l

Audit End Hosts (enable) >

Audit Server (selector):

NMAP

Trigger Conditions (radio button): For MAC authentication requests l Reauthenticate client (check box): Enable

Upon completion of the audit, Policy Manager caches Role (NMAP and NESSUS) and Posture (NESSUS), then resets the connection (or the switch reauthenticates after a short session timeout), triggering a new request, which follows the same path until it reaches Role Mapping/Posture/Audit; this appends cached information for this client to the request for passing to Enforcement. Select an Enforcement Policy.

4. Select the Enforcement Policy Sample_Allow_Access_Policy:

Table 406: Enforcement Policy Navigation and Settings

Navigation Setting

Select the Enforcement Policy: l

Enforcement (tab) > l

Use Cached Results (check box): Select Use cached Roles and Posture attributes from

previous sessions > l l

Enforcement Policy

(selector):

UnmanagedClientPolicy

When you are finished with your work in this tab, click

Save.

Unlike the 802.1X Service, which uses the same Enforcement Policy (but uses an explicit Role Mapping

Policy to assess Role), in this use case Policy Manager applies post-audit rules against attributes captured by the Audit Server to infer Role(s).

5. Save the Service.

Click Save. The Service now appears at the bottom of the Services list.

670 | Use Cases ClearPass Policy Manager 6.5 |  User Guide

TACACS+ Use Case

This Service supports Administrator connections to Network Access Devices via TACACS+. The following image illustrates the overall flow of control for this Policy Manager Service.

Figure 562: Administrator connections to Network Access Devices via TACACS+

Configuring the Service

Perform the following steps to configure Policy Manager for TACACS+-based access:

1. Navigate to Configuration > Services.

2. Click the icon to add a service. The Configuration > Services > Add window opens.

3. If it is not already selected, click the Service tab and define basic service information.

a. Enter a name for the service in the Name field.

b. Click the Type drop-down list and select the preconfigured service type that matches your Policy

Manager Admin Network Login Service.

c. Click Next to display the Authentication tab.

ClearPass Policy Manager 6.5 | User Guide Use Cases | 671

4. Define the Authentication settings for the service. Authentication methods can be left to their default values, as the Policy Manager TACACS+ service authenticates TACACS+ requests internally.

a. In the Authentication Sources section, click the Select to Add drop-down list.

b. Select AD (Active Directory). For this use case example, Network Access Device authentication data will be stored in the Active Directory.

5. Click the Enforcement tab and select an Enforcement Policy.

a. Click the Enforcement Policy drop-down list and select the Enforcement Policy [Admin Network Login

Policy] that distinguishes the two allowed roles (Net Admin Limited and Device SuperAdmin).

6. Click Save. The Service now appears at the bottom of the Services list.

Single Port Use Case

This Service supports all three types of connections on a single port.

The following figure illustrates both the overall flow of control for this hybrid service, in which complementary switch and Policy Manager configurations allow all three types of connections on a single port:

Figure 563: Flow of the Multiple Protocol Per Port Case

672 | Use Cases ClearPass Policy Manager 6.5 |  User Guide

Appendix E

OnGuard Dissolvable Agent

This appendix includes the following information: l l l l l l

Introduction

Native Agents Only Mode

Native Agents with Java Fallback Mode

Configuring Web Agent Flow - Java Only Mode

Native Dissolvable Agent - Supported Browsers

Supported Browsers and Java Versions

Introduction

ClearPass OnGuard controls compromised devices by detecting and blocking access to unsecure or unhealthy devices. The client is denied access to network resources across wired, wireless, and remote networks when it is determined as unsecure, which is accomplished by running an extensive posture assessment.

The OnGuard Agent is supported by Windows, Linux, and Mac OSX devices.

You can configure the OnGuard Dissolvable Agent flow in different modes to perform health scan on endpoints. This section provides information on configuring OnGuard Dissolvable Agent in the following modes and the end-to-end flow: l l l

Native agents only: Native Dissolvable Agent communicates with ClearPass Guest to send information about endpoints such as status, health status, remediation messages and so on. This communication is independent of the operating systems and browsers.

Native agents with Java fallback: The configuration for the Native agents with Java fallback mode is similar to the Native agents only mode. The posture assessment is performed based on the user's preference.

Java Only: The communication is dependent on the browsers and the Java Runtime Environment (JRE) versions installed. For the supported Java versions and browsers, see

Supported Browsers and Java

Versions on page 686 .

Native Agents Only Mode

A Native Dissolvable Agent communicates with ClearPass Guest portal to send information about endpoints such as status, health status, remediation messages, and so on. This communication is independent of the operating systems and browsers.

ClearPass Policy Manager 6.5 | User Guide OnGuard Dissolvable Agent | 673

Native Dissolvable Agent supports the following browsers and operating systems:

Table 407: Supported Operating Systems and Browsers

OS Browsers

Windows l l l

Internet Explorer

FireFox

Google Chrome

Mac OS X

Linux l l l

Safari

FireFox

Google Chrome l

FireFox

ClearPass Policy Manager hosts the Native Dissolvable Agent binary files with OnGuard Persistent Agent installers. You can use the links to download the binaries in the OnGuard Settings (Administration >

Agents and Software Updates > OnGuard Settings) page for Windows (.exe) and Mac OS X (.DMG).

Configuring Workflow in Native Agents Only Mode

In ClearPass Guest, the web login page is enhanced to avoid an additional web authentication service and simplifies the configuration on dissolvable agent flow with policy-initiated login method.

Use the following steps to configure the OnGuard Dissolvable Agent in Native agents only mode:

1. Select the Policy-initiated - An enforcement policy will control a change of authorization option from the drop-down list in the Login Method field. The following figure displays the policy-initiated login method in the Web Login Editor page:

Figure 564: Policy-initiated Login Method

2. Select the Require a successful OnGuard health check option in the Health Check field. If you select this field, the guest needs to pass a health check before accessing the network. Select the Native agents

only mode in the Client Agents field:

674 | OnGuard Dissolvable Agent ClearPass Policy Manager 6.5 |  User Guide

Figure 565: Native Agents Only Mode

End-to-end flow in Native Agents Only Mode

The following steps describe the end-to-end flow of the OnGuard Dissolvable Agent running on the Native

agents only mode:

1. You are redirected to the ClearPass Guest portal where you can download the native agent installer. Run the

Native Agent Installer after accepting the terms and conditions for collecting end point posture assessment scan checks and performing remediation actions.

The following figure shows an example of the Native Dissolvable Agent Login page:

Figure 566: Native Dissolvable Agent - Login Page

The Terms specified in the Login page is optional. You can configure this optionally by selecting the Require a

Terms and Conditions confirmation check box in the Terms field in ClearPass Guest Login Form.

2. The figure similar to the following OnGuard Agent download prompt appears when you login for the first time to the Native Dissolvable Agent:

Figure 567: Native Dissolvable Agent Installer Prompt

ClearPass Policy Manager 6.5 | User Guide OnGuard Dissolvable Agent | 675

The download options are available only when you login for the first time. Alternatively, you can download the

OnGuard agent by clicking the Download ClearPass OnGuard Agent link.

3. Click OK to download the OnGuard Agent. The figure shows an example of the OnGuard Windows

Health Checker binary download window:

Figure 568: Native Dissolvable Agent Binary Downloader

4. Click Save File to download the OnGuard agent. Click Run to install the OnGuard agent.

Figure 569: Native Dissolvable Agent Installation

If you are running Windows OS, Internet Explorer provides options to Run or Save. FireFox and Chrome browsers provide option to save the .exe files.

If you are running Mac OS X, FireFox provides options to open the binary with DiskImageMounter or Save the .DMG

files. Safari and Google Chrome browsers provide the option to Save only.

676 | OnGuard Dissolvable Agent ClearPass Policy Manager 6.5 |  User Guide

5. Select the ClearPass OnGuard Web Agent application in the Launch Application page. Select

Remember my choice for onguardwebagent links to register and perform auto-launch of native

OnGuard agent on successive log-ins. Click OK.

Figure 570: Native Dissolvable Agent Application Launcher

6. The following progress screen appears and shows the progress:

Figure 571: Native Dissolvable Agent Installation Progress

7. After the successful installation, the health check scanning is initiated. The following figure shows an example of the progress indicator:

ClearPass Policy Manager 6.5 | User Guide OnGuard Dissolvable Agent | 677

Figure 572: Health Check Progress

8. After the health check scanning is completed, the figure similar to the following example appears with the health check results if the client is unhealthy:

Figure 573: Health Check Results

9. Take the appropriate actions to fix the issues listed in remediation and agent enforcement messages and click Scan Again. Repeat this step till the client becomes healthy. Once the client is healthy, you can access the destination URL.

10.You can track the events with the end-to-end flow in the Access Tracker page. The following figure shows an example of the Access Tracker page with the native dissolvable agent flow:

Figure 574: Access Tracker Page

The Auto-launch feature works in the Native agents only and Java Only modes without user intervention to click pop ups and options that are described in the complete end-to-end flow above except configuring Terms in the ClearPass Guest Login page.

Auto-Login

The Native dissolvable agent supports Auto-Login method which eliminates the Require a Terms and

Conditions confirmation check box in the Guest Web Login page by avoiding the web page and submitting automatically.

678 | OnGuard Dissolvable Agent ClearPass Policy Manager 6.5 |  User Guide

Troubleshooting

In Windows, Native Dissolvable Agent flow logs are available at %appdata%Aruba Networks/

ClearPassOnguard Temp/Logs. In MAC OS X, the Native dissolvable agent flow logs are available at

~/Library/Logs/ClearPassOnGuardTemp/logs.

Native Agents with Java Fallback Mode

The configuration steps for Native agents with or Java fallback work flow is similar to the Native agents

only mode. The posture assessment is performed based on your selection.

Configuring Native Agents with Java Fallback Mode

Use the following steps to configure the OnGuard Dissolvable Agent in Native agents with Java fallback mode:

1. Select the Policy-initiated - An enforcement policy will control a change of authorization option from the drop-down list in the Login Method field. The following figure shows an example configuration of the Policy-initiated Login method:

Figure 575: Policy-initiated Login Method

2. Select the Require a successful OnGuard health check option in the Health Check field. If you select this field, the guest needs to pass a health check before accessing the network. Select the Native agents

with Java fallback mode in the Client Agents field:

Figure 576: Native Agents with Java Fallback Mode

ClearPass Policy Manager 6.5 | User Guide OnGuard Dissolvable Agent | 679

End-to-end flow in Native Agents with Java Fallback Mode

The posture assessment is performed based on your selection. If you select Java, the Java applet is downloaded and posture assessment is performed. The native agent link is provided in Java launcher to avoid the JRE files loaded into the system. The following figure shows an example of the Native agents with Java fallback options:

Figure 577: Native Dissolvable Agents with Java Fallback

Configuring Web Agent Flow - Java Only Mode

You can configure a new web agent flow in two different locations (ClearPass Policy Manager and ClearPass

Guest) to perform health scan on endpoints.

Configuring Web Agent Flow in ClearPass Policy Manager

Use the following steps to configure a new web agent flow in ClearPass Policy Manager:

1. Create a 802.1X service to perform RADIUS authentication and enforce restricted or full access based on end point posture assessments. The following figure shows an example of the Web Agent Flow - 802.1X

Service page:

Figure 578: Web Agent Flow - 802.1X Service

680 | OnGuard Dissolvable Agent ClearPass Policy Manager 6.5 |  User Guide

2. Create a service named Web-based Health Check Only on the ClearPass Policy Manager server. The following figure shows an example of the Web Agent Flow - Health Only page:

Figure 579: Web Agent Flow - Health Only

3. Create a simple Web Auth service to authenticate users against ClearPass Guest user database to accept or perform App authentication request after completing a sandwich flow. The following figure shows an example of the Web Agent Flow - Services Web Auth page:

Figure 580: Web Agent Flow - Services Web Auth

Configuring Web Agent Flow in ClearPass Guest

Use the following steps to create a web agent flow in ClearPass Guest:

1. Click Create a new web login page on the right corner of the ClearPass Guest UI. The following figure shows an example of the Web Login Editor page:

ClearPass Policy Manager 6.5 | User Guide OnGuard Dissolvable Agent | 681

Figure 581: Web Login Editor

2. Select the Anonymous - Do not require a username or password option from the drop-down.

3. Check the Enable bypassing the Apple Captive Network Assistant option in the Prevent CNA field.

4. Select the Local - match a local account option in the Pre-Auth Check field.

5. Check the Require Terms and Conditions confirmation option in the Terms field.

6. Specify the destination URL to which the client must be redirected after health checks in the Default

destination field.

Figure 582: Web Login - Login Form

682 | OnGuard Dissolvable Agent ClearPass Policy Manager 6.5 |  User Guide

7. Select the Local - match a local account option in the Post Authentication field. The following figure shows an example of the Web Login - Post-Authentication page:

Figure 583: Web Login - Post-Authentication

The following figure shows an example of the final web agent flow:

For more information, refer to ClearPass Guest Online Help.

Native Dissolvable Agent - Supported Browsers

This section provides information on supported browsers for the Native Dissolvable Agent. The versions given in the following table are tested and are up to date at the time of this release:

Table 408: Supported Browsers and Java Versions

Operating

System

Browser

Test

Results

Known Issues

Windows 7

64-bit

Chrome Passed

#24518

#24986

Firefox Passed None

Tested Versions

ClearPass Policy Manager 6.5.0.69430

and Chrome 38.X

Windows 7

32-bit

Windows 8

64-bit

Windows 8

IE

Chrome

Firefox

Chrome

Firefox

Chrome

Passed

Passed

Passed

IE 10.X 32-bit Passed

Passed

Passed

IE 10.X 32-bit Passed

Passed

None

#24986

None

None

#24986

None

None

#24986

ClearPass Policy Manager 6.5.0.69430

and Firefox 33.X

ClearPass Policy Manager 6.5.0.69430

and IE-9.X

ClearPass Policy Manager 6.5.0.69430

and Chrome 38.X

ClearPass Policy Manager 6.5.0.69430

and Firefox 33.X

ClearPass Policy Manager 6.5.0.69430

and IE-10.X

ClearPass Policy Manager 6.5.0.69430

and Chrome 38.X

ClearPass Policy Manager 6.5.0.69430

and Firefox 33.X

ClearPass Policy Manager 6.5.0.69430

and IE 10.X

ClearPass Policy Manager 6.5.0.70143

and Chrome 39.X

ClearPass Policy Manager 6.5 | User Guide OnGuard Dissolvable Agent | 683

Table 408: Supported Browsers and Java Versions (Continued)

Operating

System

Browser

Test

Results

Known Issues

32-bit

Firefox Passed None

IE 10.X

Passed None

Windows 8.1

64-bit

Chrome

Firefox

IE 32-bit

Windows

2008 64-bit

Chrome

Firefox

Passed

Passed

Passed

Passed

Passed

IE 8.X 32-bit Passed

#24986

None

None

#24986

None

#24766

Windows XP

SP3

Windows

2003 32-bit

Windows

Vista

Chrome

Firefox

IE 8.X 32-bit

Chrome

Firefox

IE

Chrome

Not supported

Not supported

Not supported

Not supported

Not supported

Not supported

Passed

Firefox Passed

None

None

#24768

#24898

#24898

#24898

#24986

None

IE 7.X 32-bit Passed None

MAC 10.9

Safari Passed None

Tested Versions

ClearPass Policy Manager 6.5.0.70143

and Firefox 34.X

ClearPass Policy Manager 6.5.0.70143

and IE 10.X

ClearPass Policy Manager 6.5.0.70143

and Chrome 39.X

ClearPass Policy Manager 6.5.0.70143

and Firefox 34.X

ClearPass Policy Manager 6.5.0.70143

and IE-11.x

ClearPass Policy Manager 6.5.0.69430

and Chrome 38.X

ClearPass Policy Manager 6.5.0.69430

and Firefox 33.X

ClearPass Policy Manager 6.5.0.69430

and IE-9.x

ClearPass Policy Manager 6.5.0.70143

and Chrome 34.X

ClearPass Policy Manager 6.5.0.70143

and Firefox 30.X

ClearPass Policy Manager 6.5.0.70143

and IE-8.X

ClearPass Policy Manager 6.5.0.70143

and Chrome 35.X

ClearPass Policy Manager 6.5.0.70143

and Firefox 30.X

ClearPass Policy Manager 6.5.0.70143

and IE-8.X

ClearPass Policy Manager 6.5.0.70143

and Chrome 39.X

ClearPass Policy Manager 6.5.0.70143

and Firefox 34.X

ClearPass Policy Manager 6.5.0.70143

and IE 7.X

ClearPass Policy Manager 6.5.0.69430

684 | OnGuard Dissolvable Agent ClearPass Policy Manager 6.5 |  User Guide

Table 408: Supported Browsers and Java Versions (Continued)

Operating

System

Browser

Test

Results

Known Issues Tested Versions

MAC 10.8

Firefox

Chrome

Safari

Firefox

Chrome

MAC 10.7.5

Safari

Firefox

Chrome

Ubuntu

12.04 32-bit

LTS

Firefox

Chromium

Ubuntu

12.04 64-bit

LTS

Firefox

Chromium

Ubuntu

14.04 32-bit

LTS

Firefox

Chromium

Ubuntu

14.04 64-bit

LTS

Firefox

Chromium

Passed

Passed

Passed

Passed

Passed

Passed

Passed

Passed

Passed

Failed

Passed

Failed

Passed

Failed

Passed

Failed

None

#24518

#24986

None

None

#24986

None

None

#24986

None

#27264

None

#27264

None

#27264

None

#27264 and Safari 7.X

ClearPass Policy Manager 6.5.0.69430

and Firefox 33.X

ClearPass Policy Manager 6.5.0.69430

and Chrome-38.X

ClearPass Policy Manager 6.5.0.69277

and Safari-6.X

ClearPass Policy Manager 6.5.0.69277

and Firefox-33.X

ClearPass Policy Manager 6.5.0.69277

and Chrome-38.X

ClearPass Policy Manager 6.5.0.70143

and Safari 6.X

ClearPass Policy Manager 6.5.0.70143

and Firefox 34.X

ClearPass Policy Manager 6.5.0.70143

and Chrome 39.X

ClearPass Policy Manager 6.5.0.69931

and Firefox-34.X

ClearPass Policy Manager 6.5.0.69931

and Chromium 39.X

ClearPass Policy Manager 6.5.0.69931

and Firefox-34.X

ClearPass Policy Manager 6.5.0.69931

and Chromium 39.X

ClearPass Policy Manager 6.5.0.69931

and Firefox-34.X

ClearPass Policy Manager 6.5.0.69931

and Chromium 39.X

ClearPass Policy Manager 6.5.0.69931

and Firefox-34.X

ClearPass Policy Manager 6.5.0.69931

and Chromium 39.X

For more information on known issues, refer to ClearPass Policy Manager 6.5 Release Notes.

ClearPass Policy Manager 6.5 | User Guide OnGuard Dissolvable Agent | 685

Supported Browsers and Java Versions

This section provides information on supported browsers and Java versions for the OnGuard Dissolvable

Agent. The versions given in the following table are tested and are up to date at the time of this release:

Table 409: Supported Browsers and Java Versions

Operating

System

Browser Java Version

Test

Results

Windows 7

64-bit

Chrome 7u65 32-bit Passed

Known Issues

#7165

Tested

Versions

ClearPass Policy

Manager

6.4.0.65762 and

Chrome 35.X

Firefox 7u65 32-bit Passed #7165

Windows 7

32-bit

Windows 8

64-bit

IE

IE 64- bit

Chrome

Firefox

IE

Chrome

Firefox

IE 32-bit

7u65

7u65 32-bit

7u65

7u65

7u65

JRE: 7u65 32-bit

JRE: 7u65 32-bit

JRE: 7u65

Passed

Failed

Passed

Passed

Passed

Passed

Passed

Passed

None

#7165

None

None

None

#7165

#7165

#7165

ClearPass Policy

Manager

6.4.0.65762 and

Firefox 11.X

ClearPass Policy

Manager

6.4.0.65762 and IE

10.X

ClearPass Policy

Manager

6.4.0.65762 and IE

10.X

ClearPass Policy

Manager

6.4.0.65658 and

Chrome 36.X

ClearPass Policy

Manager

6.4.0.65658 and

Firefox 30.X

ClearPass Policy

Manager

6.4.0.65658 and IE

11.X

ClearPass Policy

Manager

6.4.0.65762 and

Chrome 36.X

ClearPass Policy

Manager

6.4.0.65762 and

Firefox 30.X

ClearPass Policy

Manager

6.4.0.65762 and IE

10.X

686 | OnGuard Dissolvable Agent ClearPass Policy Manager 6.5 |  User Guide

Table 409: Supported Browsers and Java Versions (Continued)

Operating

System

Browser Java Version

Test

Results

Windows 8

32-bit

Chrome JRE: 7u65 Passed

Known Issues

None

Firefox

IE

Windows

8.1 64-bit

Chrome JRE: 7u65 32-bit Passed

Firefox

IE 32-bit 7U65

Windows

2008 64-bit

Chrome JRE: 7u65 32-bit Passed

Firefox

IE 32-bit JRE: 7u65

Windows

2003 32-bit

Chrome JRE: 7u65

Firefox

JRE: 7u65

JRE: 7u65

JRE: 7u65 32-bit Passed

JRE: 7u65 32-bit Passed

JRE: 7u65

Passed

Passed

Passed

Passed

None

None

#7165

None

None

#7165

#7165

#7165

Not supported None

Not supported None

Tested

Versions

ClearPass Policy

Manager

6.4.0.65762 and

Chrome 35.X

ClearPass Policy

Manager

6.4.0.65762 and

Firefox 30.X

ClearPass Policy

Manager

6.4.0.65762 and IE

10.X

ClearPass Policy

Manager

6.4.0.65658 and

Chrome 36.X

ClearPass Policy

Manager

6.4.0.65762 and

Firefox 30.X

ClearPass Policy

Manager

6.4.0.65762 and IE

11.X

ClearPass Policy

Manager

6.4.0.65658 and

Chrome 34.X

ClearPass Policy

Manager

6.4.0.65658 and

Firefox 30.X

ClearPass Policy

Manager

6.4.0.65658 and IE

9.X

ClearPass Policy

Manager

6.4.0.65658 and

Chrome 35.X

ClearPass Policy

Manager

6.4.0.65658 and

Firefox 30.X

ClearPass Policy Manager 6.5 | User Guide OnGuard Dissolvable Agent | 687

Table 409: Supported Browsers and Java Versions (Continued)

Operating

System

Browser Java Version

Test

Results

IE JRE: 7u65

Known Issues

Not supported None

Windows XP

32-bit

Chrome JRE: 7u65

Firefox

IE

MAC 10.9

Safari

Firefox

JRE: 7u65

JRE: 7u65

JRE: 7u65

JRE: 7u65

Chrome JRE: 7u65

MAC 10.8

Firefox JRE: 7u65

Chrome JRE: 7u65

Not supported None

Not supported None

Not supported None

Passed

Passed

Failed

Passed

Failed

#20191

None

#18031

#20191

#18031

Tested

Versions

ClearPass Policy

Manager

6.4.0.65658 and IE

8.X

ClearPass Policy

Manager

6.4.0.65658 and

Chrome 35.X

ClearPass Policy

Manager

6.4.0.65658 and

Firefox 30.X

ClearPass Policy

Manager

6.4.0.65658 and IE

8.X

ClearPass Policy

Manager

6.4.0.65658 and

Safari 7.X

ClearPass Policy

Manager

6.4.0.65658 and

Firefox 30.X

ClearPass Policy

Manager

6.4.0.65658 and

Chrome 35.X

ClearPass Policy

Manager

6.4.0.65658 and

Firefox 30.X

ClearPass Policy

Manager

6.4.0.65658 and

Chrome 35.X

688 | OnGuard Dissolvable Agent ClearPass Policy Manager 6.5 |  User Guide

Table 409: Supported Browsers and Java Versions (Continued)

Operating

System

Browser Java Version

Test

Results

MAC 10.7.5

Safari

Firefox

Chrome

JRE: 7u65

JRE: 7u65

JRE: 7u65

Passed

Passed

Failed

Known Issues

#20191

#23340

#18031

Tested

Versions

ClearPass Policy

Manager

6.4.0.65658 and

Safari 6.X

ClearPass Policy

Manager

6.4.0.65658 and

Firefox 30.X

ClearPass Policy

Manager

6.4.0.65658 and

Chrome 34.X

For more information on Known Issues, refer to ClearPass Policy Manager 6.4 Release Notes.

ClearPass Policy Manager 6.5 | User Guide OnGuard Dissolvable Agent | 689

690 | OnGuard Dissolvable Agent ClearPass Policy Manager 6.5 |  User Guide

advertisement

Was this manual useful for you? Yes No
Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Related manuals

advertisement

Table of contents