CPPM
CPPM
6.1
Legal Notice
The use of Aruba Networks, Inc. switching platforms and software, by all individuals or corporations, to terminate other
vendors’ VPN client devices constitutes complete acceptance of liability by that individual or corporation for this action and
indemnifies, in full, Aruba Networks, Inc. from any and all legal actions that might be taken against it with respect to infringe-
ment of copyright on behalf of those vendors.
Warranty
This hardware product is protected by the standard Aruba warranty of one year parts/labor. For more information, refer to
the ARUBACARE SERVICE AND SUPPORT TERMS AND CONDITIONS.
Altering this device (such as painting it) voids the warranty.
This Quick Start Guide for the ClearPass Policy Manager System (Policy Manager) describes the steps for installing the
appliance using the Command Line Interface (CLI) and using the User Interface (UI) to ensure that the required
services are running.
Management Port IP
Address
Data Port IP Address Data Port IP Address must not be in the same
(optional) subnet as the Management Port IP Address
Primary DNS
Secondary DNS
netmask <netmask
Netmask address.
address>
gateway <gateway
Gateway address.
address>
Flag/Parameter Description
<domain-controller. Required.
domain-name> Host to be joined to the domain.
Optional.
[domain NETBIOS name]
Use Firefox 3.0 (or higher) or Internet Explorer 7.0.5 (or higher) to perform the following steps:
1. Open the administrative interface.
Navigate to https://<hostname>/tips (where <hostname> is the hostname you configured during the initial
configuration).
2. Enter License Key.
3. Click on the Activate Now link.
Accessing Help
The Policy Manager User Guide (in PDF format) is built within the help system here:
https://<hostname>/tipshelp/html/en/
(where <hostname> is the hostname you configured during the initial configuration.)
All Policy Manager user interface screens have context-sensitive help. To access context-sensitive help, click on the
Help link at the top right hand corner of any screen.
To check the status of service, navigate to Administration > Server Manager > Server Configuration, then click on
a row to select a server:
l The System tab displays server identity and connection parameters.
l The Service Control tab displays all services and their current status. If a service is stopped, you can use its
Start/Stop button (toggle) to restart it.
You can also start an individual service from the command line,
service start <service-name>
or all services from the command line,
service start all
l The Service Parameters tab allows you to change system parameters for all services.
l The System Monitoring tab allows you to configure SNMP parameters, ensuring that external MIB browsers can
browse the system-level MIB objects exposed by the Policy Manager appliance.
l The Network tab allows you to view and create GRE tunnels and VLANs.
The following three use cases illustrate the process of configuring Policy Manager for basic 802.1x, WebAuth, and
MAC Bypass Services:
l 802.1x Wireless Use Case on page 13
l Aruba Web Based Authentication Use Case on page 19
l MAC Authentication Use Case on page 25
The basic Policy Manager Use Case configures a Policy Manager Service to identify and evaluate an 802.1X request
from a user logging into a Wireless Access Device. The following image illustrates the flow of control for this Service.
Navigation Settings
Policy Manager fetches attributes used for role mapping from the Authorization Sources (that are associated with the
authentication source). In this example, the authentication and authorization source are one and the same.
Navigation Settings
To view detailed setting information for any preconfigured policy component, select the item and click View Details.
3. Configure Authorization.
Policy Manager fetches attributes for role mapping policy evaluation from the Authorization Sources. In this use
case, the Authentication Source and Authorization Source are one and the same.
Table 3: 802.1X - Configure Authorization Navigation and Settings
Navigation Settings
Navigation Settings
For purposes of posture evaluation, you can configure a Posture Policy (internal to Policy Manager), a Posture Server
(external), or an Audit Server (internal or external). Each of the first three use cases demonstrates one of these options;
here, the Posture Server
Policy Manager can be configured for a third-party posture server, to evaluate client health based on vendor-specific
credentials, typically credentials that cannot be evaluated internally by Policy Manager (that is, not in the form of
internal posture policies). Currently, Policy Manager supports the following posture server interface: Microsoft NPS
(RADIUS).
Refer to the following table to add the external posture server of type Micrsoft NPS to the 802.1X service:
Table 5: Posture Navigation and Settings
Navigation Setting
Navigation Setting
For instructions about how to build such an Enforcement Policy, refer to "Configuring Enforcement Policies" in the
ClearPass Policy Manager User Guide.
7. Save the Service.
Click Save. The Service now appears at the bottom of the Services list.
This Service supports known Guests with inadequate 802.1X supplicants or posture agents. The following figure
illustrates the overall flow of control for this Policy Manager Service.
Navigation Settings
For purposes of posture evaluation, you can configure a Posture Policy (internal to Policy Manager), a Posture Server
(external), or an Audit Server (internal or external). Each of the first three use cases demonstrates one of these options.
This use case demonstrates the Posture Policy.
As of the current version, Policy Manager ships with five pre-configured posture plugins that evaluate the health of
the client and return a corresponding posture token.
To add the internal posture policy IPP_UNIVERSAL_XP, which (as you will configure it in this Use Case, checks
any Windows XP clients to verify the most current Service Pack).
Table 8: Local Policy Manager Database Navigation and Settings
Navigation Settings
Navigation Setting
Create a Posture
Policy:
l Posture (tab) >
l Enable Validation
Check (check
box) >
l Add new Internal
Policy (link) >
Select a Validator:
l Posture Plugins
(tab) >
l Enable Windows
Health System
Validator >
l Configure
(button) >
Configure the
Validator:
l Windows System
Health Validator
(popup) >
l Enable all
Windows
operating
systems (check
box) >
l Enable Service
Pack levels for
Windows 7, Vista,
XP Server 2008,
Server 2008 R2,
and Server 2003
(check boxes) >
l Save (button) >
l When finished
working in the
Posture Plugin
tab click Next to
move to the Rules
tab)
The SNMP_POLICY selected in this step provides full guest access to a Role of [Guest] with a Posture of Healthy, and
limited guest access.
Navigation Setting
This Service supports Network Devices, such as printers or handhelds. The following image illustrates the overall flow
of control for this Policy Manager Service. In this service, an audit is initiated on receiving the first MAC
Authentication request. A subsequent MAC Authentication request (forcefully triggered after the audit, or triggered
after a short session timeout) uses the cached results from the audit to determine posture and role(s) for the device
Navigation Settings
2. Set up Authentication
Note that you can select any type of authentication/authorization source for a MAC Authentication service. Only a
Static Host list of type MAC Address List or MAC Address Regular Expression shows up in the list of
authentication sources (of type Static Host List). Refer to "Adding and Modifying Static Host Lists" in the
ClearPass Policy Manager User Guide for more information. You can also select any other supported type of
authentication source.
Table 12: Authentication Method Navigation and Settings
Navigation Settings
Navigation Settings
Upon completion of the audit, Policy Manager caches Role (NMAP and NESSUS) and Posture (NESSUS), then
resets the connection (or the switch reauthenticates after a short session timeout), triggering a new request, which
follows the same path until it reaches Role Mapping/Posture/Audit; this appends cached information for this client
to the request for passing to Enforcement. Select an Enforcement Policy.
4. Select the Enforcement Policy Sample_Allow_Access_Policy:
Table 14: Enforcement Policy Navigation and Settings
Navigation Setting
Unlike the 802.1X Service, which uses the same Enforcement Policy (but uses an explicit Role Mapping Policy to
assess Role), in this use case Policy Manager applies post-audit rules against attributes captured by the Audit Server
to infer Role(s).
5. Save the Service.
Click Save. The Service now appears at the bottom of the Services list.