ClearPass in Tech Brief - Deep Dive
ClearPass in Tech Brief - Deep Dive
ClearPass in Tech Brief - Deep Dive
Derin Mellor
derin.mellor@hpe.com
+44 7786 114030
Agenda
• Visibility
• Active Scanning • Lockdown
• Stakeholder Report • Wired DUR v VSA
• Correcting/Creating Fingerprints • Colorless Ports
• CPDI • MPSK
• Advanced 802.1X Wireless • Email notification
• Endpoint Repository • TACACS
• Time Source
•
• IPv6
Isolation role
• Machine only + OnGuard • AOB
• CPG Operator Login
• Wired Monitor Mode
Visibility
Particularly on wired
Passive Profiling
• Relayed DHCP profiling • External device db
• HTTP profiling – redir-web traffic to CPG portal page • MDM
• Easily spoofed • Infoblox
• Useful for more granular differentiation of device type • Audit
• eg iPhone v iPad • IDS/IPS
• Infrastructure Information
• Aruba Controller Sensor – uses IFMAP
• Aruba Switch Device Fingerprinting – uses HTTPS
• Needs an local account on ClearPass with API write access
• Cisco Device Sensor – uses RADIUS Accounting
• Flows (netflows, ipfix, sflows)
• How well does this scale?
Active Profiling
ARP ICMP
ClearPass Actions table
Probes ICMP responsive IPs using NMAP, SNMP, WMI and SSH
Record first positive response as fingerprint
Repeat above on found routers – down to specified hop depth
If subsequent fingerprint changes: Potential spoof attack. Set “Conflict” attribute
Define the scan
techniques criteria
WARNING
Changing the
details will not be
applied to existing
scans!!!
Have to update
each scan
Subnet
Scan
NMAP Scan Setup
With NMAP
disabled it will still
scan these ports
Use Accounting
tab Status field
Profiling Issues
• Device has to respond to ICMP ping before probing
• Subnet scanning large empty subnets very slow
• Reliant on timeouts
• Class-B takes 4-12 hours!!!
• If credentials (SNMP, SSH, WMI) are incorrect: Records a null
fingerprint!
• If profiled and device’s subsequent probes fail: Does NOT raise
Conflict
• ie SNMP fingerprinted as printer, hacker attaches spoofed device with SNMP
disabled…
• Editing underlying scan technique criteria (ie SNMP, SSH, WMI) is
not automatically applied to the scanning mechanism
(Discovery/Subnet)
• Each scanning mechanism has to be updated
• Connected port very inaccurate
• Needs full authentication
Debug
Choosing the
cat/family/name
shows the matching
devices
ClearPass Operator Experience: Endpoints
Effectively becomes an
effective audit of These can all be
everything on the network exported to XML
and updated
accordingly
See Stakeholder
report
Discovered NAS
Two Reports
• Devices observed during report/poll period/schedule
• Authenticated or profiled
• All devices seen typically in the last month or week
• Devices not see during report/poll period/schedule
• Missing?
• All devices not seen typically in the last month or week
PDF
Stakeholder
Report
All devices assumed Static IP: Is this
to be static IP until excessive? Missing
DHCP request seen DHCP relaying?
Indication SNMP/SSH/WMI
Why No matching No matching credentials incorrect or
Unprofiled? fingerprint fingerprint! intervening router response
ICMP Destination Host
Unavailable
Accuracy of location
unreliable until true Detailed Endpoint Report
authentication
Set to handle
longer duration
Primarily for
“unseen” devices
Create Stakeholder Reports 6.8.x
Report1
Active Endpoints
Report2
Inactive Endpoints
Adhoc or
scheduled report
Fingerprints
No Fingerprint – Manually one time correct
WARNING on Testing
If you delete an
endpoint leave for
5mins before re-test
My webcam is
reported as a Generic:
Correct fingerprint
But if I added a similar
device it would still be
mis-profiled
WARNING
Prior to 6.8.3 this was unreliable
Correct Webcam Profiled Add fingerprint would override the
existing fingerprint!
Missing
42
The Fingerprint
Database shows
custom match rules
can be deleted
The existing
fingerprint already
has this
My Amazon Echo Dot Fingerprinted as Kindle!
Not clear why this
is matched!
Echo fingerprint
missing this MAC
address
OUI is missing
This can only be corrected by reporting to TAC
WARNING On Custom Fingerprint
WARNING
Do not associate a blank
You can then associate this as fingerprint with a device
done in the previous slides This will likely match a
raft of things!!!
ClearPass
Device Insight
@ArubaEMEA | #ATM17EMEA 30
Collector Placement
NOTE
If asymmetric communications
mirror both on to different CPDI
SPAN ports and CPDI will
rationalize
Active Scanning Passive Monitoring
Auto-Classified
Classified
Grouping
Use button
to load more
groups
New devices appearing Devices seen
in last month
Devices seen
in last day
Find particular device
Status
Number Online
of Cisco Category Idle
switches filters Offline
Cisco
switch
group size
Drill down in
to the details
Find all switches with Telnet enabled - 1
Number of Cisco
switches with Telnet
enabled
Look at details
for this switch
Generate report of devices in this cluster - 1
Generate report of devices in this cluster - 2
Create a Tag
Common fields
in”grey”
Look at the
User
Classified
Devices
Devices with
TCP 7860 open
CPDI/ClearPass
Integration
50
ClearPass & CPDI Integration
WARNING
Enabling this
disables ClearPass’
native scanning
ClearPass & CPDI Integration
Better CDPI Visibility
ClearPass & CPDI Integration
Better Visibility in ClearPass
Attributes from
CDI
Policy can be
built on these
Review Operation
Example 802.1X Wireless
with Windows PC doing machine and user
and TLS certificates
NOTE
The service is matched on
the first packet received.
TLS v PEAP/MSCHAP/etc
are negotiated later is
RADIUS exchange
Service
Disabled
Service in
Monitor mode:
Only sends
Accept/Reject
NOTE
The service is matched on
the first packet received
TLS v PEAP/MSCHAP/etc
are negotiated later is
RADIUS exchange
Using groups is an
effective mechanism
A matched to get granular policies
authentication source
will automatically be
authorization source WARNING
The others will not!
Because of this you may
have to explicitly add
them as authorization
source
Copy and Connection SSID supports
adapt Will use
all manufacturers
certificiates OCSP
URLUsing
to realgroups
time is an
Can’t edit things in [ ] validate mechanism
effective
One exception A matched to get granular policies
[Role Mappings]!!! authentication source
will automatically be
authorization source WARNING NOTE If CRL file expires –
This validates based on The others will not!
ClearPass will Reject all
certificate is not expired Because of this you may
associated request!!!
have to explicitly add appears in Events:
Alert event
them as authorization
CRL for the CA %s has
source expired. Certificate
verifications against this CA
will fail till the CRL is…
Passing roles to
Enforcement Evaluate All: I want to
make for better pass roles that explain
Operator to the operator why
understanding the enforcement policy
is assigned
Default is match first!!!
Time at midnight
this morning
Returns the DN if
the account is
disabled
Simplify Role Only use attributes that
Mapping logic by have clear names –
passing some Pass Status
IsProfiled is a bad
attributes directly (Disabled, Unknown,
example True/False
Known) directly into
Enforcement Policy
Pass profiled
Make sure this is Category directly
set to 0 into Enforcement
Used to be set to Policy
300
Microsoft time is based on
WARNING
Pope Gregory VIII and
Editing/updating existing
based on 100 ms steps
filters may to be over-
from 00:00:00 Jan 1st 1601
written during upgrade
SQL to get specific
filter
Name of attribute
within ClearPass
First-applicable is
AccessTracker’s
deterministic – far
Username will
easier to understand
report !!!Guest!!! Fred
Default is match all!!!
Blogs
WARNING
Depending on NAS this
might not work!!!
Might be easier to apply
the correct role – but this
Keep the logic simple usually needs more logic
for easier understanding
Records
exactly when
it happened
Only report to
operator once a day
Only applied if
NAS in the IAP
group
WARNING
If no UPS on appliance
set this to normal or full to NOTE
minimise db corruption on When using newer
power outage Context Server
This does directly affect enable Post-Auth v2
appliance performance
Web-redirect to
isolation page
<link href="external/font-awesome/css/font-awesome.min.css" rel="stylesheet"
{assign var=MDM_State value='MDM Enabled'}
type="text/css">
{if $_endpoint.$MDM_State == 'false'}
<div style="width: 300px; margin: 0 auto; text-align: center;">
MDM Enabled = False<BR>
<p><span class="fa fa-user-times" style="font-size: 200px; color: #0885bf;"></span>
{/if}
<h1 style="margin: 20px 5px;">Isolation!</h1>
{/if}
<p>There is a problem with your client.</p>
</p>
<p>Click <a href=\"https:/clearpass.hpearubademo.com/guest/mac_create.php?
<p>Network Details<BR>
mac={$_endpoint.mac_address}&device_name={$_endpoint.profile_device_name}\">here</a>
{if $extra_fields.essid}
to register this device for the MPSK SSID</p></br>
NAS
<p>Please contact IT admin - tell them the following information</p>
name {$extra_fields.vcname} ({$extra_fie
<p>MAC address {$_endpoint.mac_address}<BR>
lds.ip})<BR>
ClearPass status {$_endpoint.status}<BR>
Wireless SSID {$extra_fields.essid}<BR>
IP address {$_endpoint.profile_ip}<BR>
Hostname {$_endpoint.profile_hostname}<BR> URL to CPG AP {$extra_fields.apname}<BR>
{/if}
Category {$_endpoint.profile_device_category}<BR>
Family {$_endpoint.profile_device_family}<BR> login to enrol </p>
</div>
Type {$_endpoint.profile_device_name}<BR> this device <!--
Posture
{dump var=$action export=html}
{if $_endpoint.Posture_Status}
{dump var=$source export=html}
 {$_endpoint.Posture_Status} at {$_endpoint.Last_Posture}
{dump var=$result.error export=html}
{else}  Unknown
{dump var=$result.message export=html}
{/if}
{dump var=$timestamp export=html}
</p>
{dump var=$site_ssid export=html}
{if $_endpoint.Source == 'airwatch'}
{dump var=$site_wpa_key export=html}
<p>
{dump var=$u export=html}
Airwatch managed device<BR>
Expires {$_endpoint.Expire}<BR>
{dump var=$c export=html} Shows available
Username {$_endpoint.Username}<BR> Endpoint attributes {dump var=$_wpl export=html}
variables
{dump var=$_endpoint export=html}
{if $_endpoint.Blacklist == 'true'}
Blacklist = True<BR>{/if}
accessibly using {dump var=$_user export=html}
{dump var=$_param export=html}
{if $_endpoint.Compliance != 'Compliant'} _endpoint variables {dump var=$_login_args export=html}
Compiance = {$_endpoint.Compliance}<BR>{/if}
{dump var=$_url export=html}
{if $_endpoint.Compromised == 'true'}
{dump var=$extra_fields export=html}
Compromised = True<BR>{/if}
-->
Shows what
New 6.8 Profiles are
NAS Name – reliant New 6.8 applied
on RADIUS NAS-Id
attribute
1) Select condition
3) Creates identical
condition below…
2) Copy condition
Wireless 802.1X TLS Authentication
6) ClearPass determines
OCS role to assign
P chec AD
Db
k
Corporate Corp
CorpNetwork
Network
CRL NAC
7) RADIUS Rsp
Accept
4) Converts EAPoL into
5) ClearPass verifies Corp cert, Access RADIUS Req TLS
not expired and not in CRL router 8) AOS applies
or OSCP is good VLAN to port
NAS
2) AOS initiates
EAPoL to device
3) Device responds
1) Device Device with certificate
connects
ClearPass Processing of 802.1X TLS Auth
ClearPass Match service
Service
Service1519
Service
Policy Manager Login Service
Aruba Wifi
Wireless Infrastructure Access Service
Authenticate Good Authorization
Cert expired? Cert
802.1X Auth OCSP or CRL
Role Enforcement
are good?
Role Mapping
Policy
Blocked Condition#1
Condition#2
Condition#3
Bad Cert Blocked
Spoof
Machine Auth Only
Spoof
Corp VLAN
Machine
Yes Internal dACL
Accept
User
Assign User
machine Inject User Assign login
only role & IP details machine &
into firewall user role
If attribute not
in Input field
can’t be used
OnGuard Persistent Agent
must be installed
Does not use any license
Could do
How can the via
username inject syslog???
into upper-layer???
Purge
How long do I unknown
need to hold endpoints!
an expired
guest?
Optimised CPG
Operator Login
Customizable
Operator pages
@ArubaEMEA | #ATM17EMEA 79
Allows staff to create guest accounts
and enrol device
Flexible
device
enrolment
Home page
Only show
devices register
to this user
Guest
management
Allows students to you to enrol their devices
Guest account is their unique password
Enrol devices
Home page
Only show
devices register
Create Guest to this user
account
Isolation page has link to enrol this device
https://cppm.hpearubademo.com/guest/mac_create.php
?mac=000011112222&device_name=Test
admin_privileges=D
evice Registration
admin_privileges=MPSK
Student Device Registration
AccessTracker
CPG Logs
Staff
Student
Page look
Initial Value = 5
Initial Value = 1
Initial Value = sponsor_email
Page look
Initial Value = 1y
Initial Value= 1
Page look
Nothing special
Could remove the mpsk and
mpsk_enable fields
Page look
Page look
Adds more flexibility
to URL processing
By default
passwords
are disabled
CPG Operator
Login with SAML
WARNING
Struggling to get this
working on 6.8.x!
@ArubaEMEA | #ATM17EMEA 95
SAML: Customizable CPG Operator Login Page
Could be
Azure
SAML IdP: Create Identity Provider
SAML IdP: Login Service
SAML SP: Set GuestOperators as a Service
Any browse to a
page/form controlled
via Guest will be forced
to authenticate
SAML SP: CPG Login Service
mail=
%{Authorization:AD:Email}
Refers to CPG
Operator Profiles
Enable New
Portal Pages Use
shortcut
New skins
Wired Monitor
Mode
Safely Develop Policy
Role Mapping
Policy
Blocked Condition#1
Condition#2
Condition#3
All devices Blocked
Spoof
Known WebCam
Spoof
Web VLAN
Yes Web dACL
Known
Yes Accept
WebCam
RADIUS RADIUS
Request Accept
Allow all
connecting Control
devices within
Policy Enforcement is Enforcement
processed and reported in Policy
AccessTracker but not
enforced
ClearPass Access Tracker
• Status, MAC
• Connected at, Connection status, Disconnected at
• Location: Media, NAS, Port/SSID
• IP, Hostname
• Fingerprint detail
• Spoof detected
• Volume usage
Debug
Nothing Coming Into AccessTracker?
• Look in
Password
mismatch
reported here
Still Nothing Coming In?
tcpdump of all
the interfaces
Only up to 10
minutes
Provides
filtering
RADIUS Erroring
AccessTracker event will typically have a Alert tab If Alert tab but
LoginStatus=Accept –
Only minor issue(s)
AccessTracker
Event will have
much more detail
Benefit: Quick
response If Role/ Yes
MAC-Auth Yes RADIUS Accept Apply Role/ACL/
Weakness: ACL/VLAN/
Increased RADIUS response Success? VLAN/FilterID
FilterID
load and logs in
ClearPass Reject No
Apply MAC-Auth
Apply MAC-Auth auth-vid
unauth-vid
Process
Typical Aruba switch handling
Auth
authentications DUR - 3
Yes
Yes Accept If Role/
802.1X RADIUS Apply Role/ACL/
ACL/VLAN/
response? Success? VLAN/FilterID
FilterID
Assuming Priority
No Reject No
802.1XMAC-Auth:
Apply 802.1X
Timeout controlled
auth-vid
by port’s 802.1X
wait period
= tx-period*retrains Accept If Role/ Yes
MAC-Auth Yes RADIUS Apply Role/ACL/
ACL/VLAN/
response Success? VLAN/FilterID
Default 30*4=120s FilterID
Reject No
Set tx-period =5s Apply MAC-Auth
Apply MAC-Auth auth-vid
DUR initial role
Typical Aruba Switch
dhcp-snooping
dhcp-snooping authorized-server <CPPM-IP>
dhcp-snooping vlan 10-20 30 40 50 60
interface 8
RADIUS Configuration
dhcp-snooping trust uplink Helps capture IP of static
exit
IP devices
ip client-tracker
ip client-tracker probe-delay 15
Adds IP address into RADIUS Accounting
radius-server host <CPPM-IP> key <pass>
aaa server-group radius "CPPM" host <CPPM-IP> Define ClearPass RADIUS host
radius-server host <CPPM-IP> dyn-authorization
radius-server host <CPPM-IP> time-window plus-or-minus-time-window
Switch must be within
radius-server host <CPPM-IP> time-window 30 5min of ClearPass for
CoA to work
radius-server tracking enabled
radius-server tracking user-name <user> password <pass>
Validate ClearPass is working
Need CPPM Service using PAP
Defaults to probes every 300s, 3 retries NAS-Port-Type=5 (Virtual)
Service-Type=7 (NAS-Prompt-User)
User-Name=<username>
If using AD account effectively
probes backend system
RADIUS Accounting to ClearPass
aaa account net start-stop radius server-gr "CPPM"
aaa accounting update periodic 5 RADIUS Accounting Interim period
aaa port-access 1-5 controlled-direction in
Force auth on ingress traffic
Typical Aruba Switch Traditional
MAC-Auth RADIUS Configuration
aaa authentication mac-based chap-radius server-group "CPPM-IP" Enable MAC-Auth to ClearPass
aaa port-access authenticator 1-5 tx-period 5 tx-period (30s) * retrans (3) - default 120s
Set tx-period=5s: timeout after 20s
aaa port-access authenticator 1-5 server-timeout 10
default 300s timeout
aaa port-access authenticator 1-5 auth-vid 10
default auth VLAN
aaa port-access authenticator 1-5 client-limit 2
Port’s MAC address limit
Enable Downloadable User Roles
radius-server cppm identity "<username>" password "xyz"
Define account used by DUR to HTTPS
into ClearPass to pull down role
policy user "PERMIT_ALL"
10 class ipv4 "ALLOW_ALL" action permit Generic allow all ACL
exit
aaa authorization user-role name "Default"
policy "PERMIT_ALL"
reauth-period 3600
vlan-id 10
Role with the generic allow all ACL
vlan-id-tagged 20 with tagged and untagged VLANs
exit
aaa port-access 1-5 auth-order authenticator mac-based Default sends both 802.1X and MAC Auth at similar time
aaa port-access 1-5 auth-priority authenticator mac-based
Prefers Accept over Reject & 802.1X over MAC-Auth
aaa port-access 1-5 critical-auth user-role “PERMIT_ALL“ Local-role applied if REJECT or no CPPM response
aaa port-access 1-5 initial-role “PERMIT_ALL"
Default local-role for port
Debugging Aruba Switch
This will give a raft of events including the EAPoL
debug security port-access authenticator
debug event Debug messages
debug destination session appear on switch CLI
debug security radius-server
Remove above commands
undo debug security port-access authenticator
undo debug event
undo debug destination session
undo debug security radius-server
Mirror all traffic from port 1 to port 6
Bounce port
int 16 dis
mirror 1 port 6
int 16 en
interface 2
Show interface 16 status
monitor all both mirror 1
show run int 16
exit
DUR v Local Roles via ZTP
Includes web-
Assigns redirect for HTTP/S
to ClearPass
Profile
role
Step2: ClearPass receives device’s DHCP Request
- Profiles device
Device
category
profiled
DHCP
fingerprint
HTTP/HTTPS
fingerprint
Step3: Device category change
- ClearPass Forces Re-Authentication
Forces port
bounce
Port Device
disconnects forgets IP
for 12s address
Step4: Unknown & Profiled Device Connects
- ClearPass assigns Blocked Role
Includes web-
Assigns redirect for HTTP/S
Unknown role to ClearPass
Step5a:User Experience
class ipv4 DHCP
match udp any any eq 67
exit
class ipv4 DNS
match udp any host 192.168.137.10 eq 53
exit
class ipv4 ClearPass
If the device had match tcp any host 192.168.137.20
exit
a browser this is class ipv4 HTTP
match tcp any any eq 80
the page they exit
aaa authentication captive-portal profile
would get "Isol_Page" url
http://cppm.hpearubademo.com/guest/isolation
.php
policy user ISOLATION
class ipv4 DHCP action permit
Associated ACL class ipv4 DNS action permit
class ipv4 ClearPass action permit
loaded on to NAS class ipv4 HTTP action redirect captive-
portal
exit
aaa authorization user-role name Isolation
captive-portal-profile "Isol_Page"
policy ISOLATION
reauth-period 3600
vlan-name Isolation
exit
Step5b: Operator Pre-filled
Select role
to apply
Register
the device Form
flexibility Force re-
connect
Step6: Known & Profiled Device Connects
Different
VLAN & IP
Assigns
Headless
IoT role
Configuration
Services Used
Aruba Switch: Enable Down Loadable User Roles
WARINING
Enables downloadable user roles Disables native VLAN
assignment
aaa authorization user-role enable download
radius-server cppm identity <CPPM DUR local account> key <pass>
Aruba Switch: Role of last resort
NOTE
Default user-role = Denyall
class ipv4 ALLOW_ALL
10 match ip 0.0.0.0 255.255.255.255 0.0.0.0 255.255.255.255
exit
policy user PERMIT_ALL Define the ACL you want
10 class ipv4 ALLOW_ALL action permit
exit
aaa authorization user-role name DR-ACL
policy PERMIT_ALL Don’t use spaces!
reauth-period 3600
vlan-name Corp Can’t vlan-named-tagged
vlan-id-tagged 20 16.08.xxxx, works on
exit 16.09.0004
aaa port-access 1-5 critical-auth user-role DR-ACL Apply if rx no rsp from CPPM
aaa port-access 1-5 initial-role DR-ACL
Apply if no response
DUR MAC Auth
Policy
NOTE
In my environment roles
are also passed from
the Endpoint Repository
DUR MAC
Auth Policy
To make a specific
scan delete
appropriately
MPSK
Handling headless devices
DUR MAC Auth Policy
• 1 MPSK SSID – Aruba only
• Each device with unique PSK
• Or/& many devices with common password
• Assumes the users exist in a AD database with email field
• Assumes AP tied to specific user
• Requires ClearPass V6.8 and above
• Requires AOS/IAP 8.4 and above
• Does not support RadSec (AOS 6.8.0 and 8.4.0)
Traditional Workflow
• User enrols IoT at ClearPass
• Name and MAC address
• Each gets 8 digit unique password
• Connection
• User connects device to MPSK SSID
• Using unique password
• AOS sends RADIUS Request to ClearPass
• ClearPass sends user’s password to AOS
• AOS validates password matches
• If password does not match gets ~8 RADIUS Requests
• All rejected
MPSK Student BYOD
IoT
Key requirements
A user password for many devices
Simple mechanism to enrol an IoT device
User creates his/her MPSK passcode
1) Student login to
CPG as an
operator
2) Student
This can be a URL
creates his/her
passcode Once created
the passcode is
emailed to this
student
3) Student can
subsequently
login and
see/change
his/her
passcode
Student Experience - 1
2) Student follows
link to register the
device 3) Student login
as ClearPass
operator service
Student Experience - 2
Fields are
pre-filled
5) Student re-
connects device
to MPSK SSID
4) Student using their
creates the unique passcode
device
Operator Perspective
5) User connects the
AppleTV with his/her unique
passcode (because my
remote is rubbish!!!)
4) AppleTV
trying with the
old pass!!!
3) User
registers the
AppleTV
MPSK pass
No profile
hidden
information
Location
returns the
determines
user’s email
Profiled – CoA
Disconnect
The RADIUS
Request will indicate
the AP location
Returns the
associated user’s
email address
AccessTracker - 2
After profiling device
reconnects
Auto-filled from
URL
device_name
from Profile
Auto-filled from
URL mac
Create
registers the
device
Profiled – CoA
Disconnect
AccessTracker - 4
Disconnect
Update Known session –
in Endpoints essential on
AOS
AccessTracker - 5
Passcode
is visible!!!
1) User connects
to the MPSK
Could be a could
SSID using 1-to-
authentication
Many passcode Login portal page source Azure
appears
2) User login to
CPG as an
operator
User enrols the
device
Auto-
populated
from Profile’s
Device Name
Auto-
populated
from URL Receipt shows
the device’s
What is unique login
displayed can
be optimised
User accepts
details – can this
be auto-accepted?
Receipt with
password and
instructions
emailed to the
user
User follows
instructions on
receipt
MPSK Configuration
Use template
Test within the
CPGConfiguration
ReceiptEmail Receipt
Has better error messages
Tune MPSK Service
Search AD for
user with this
AP
Get users
No profile
passcode for
information
device
Force reconnect
Make known in
Endpoint Repository
Always
generates
MPSK.
mpsk_enable
Button on
field hidden
Create Device
for MPSK.
mspk_enable
field checkbox Changes
applied to
all these
Customize the fields in forms
the “Create New
Device” form – suggest
copying and edit the
copy
Password
complexity Not used!!!
Informing owner device will expire soon
Put in a suitable
operator’s account to
capture the unknown
accounts
Add
Add
Add
Add appropriate
security
requirements
MPSK Bulk Import
Create a CSV
Default
Becomes
password
the
length 8
Device
character
Name
s
ClearPass
Assigned
Profile
TACACS Authentication
TACACS Accounting & Audit
Look at
this
TACACS Issues
BUT
• When arrival of events above a couple per
minute - operation can miss important
information
• Reliant on user complaints!
Distribution
across cluster
More Detail
• To get more detail we have to connect to Insight’s database
• I use freeware pgAdmin4 to interface with this
SQL in notes
Review cluster operation
Detailed breakdown of errors
SQL in notes
Review cluster operation
Failed RADIUS Authentications
per Service
Similar reports
SQL in notes can be generated
for TACACS
Review cluster operation
Null Service
SQL in notes
Review cluster operation
Drill into specific device
Similar reports
SQL in notes can be generated
for TACACS
Review cluster operation
Top 10 Failed RADIUS
Authenticationd
These invariably
are failing too
often
Each should be
investigated
Similar reports
SQL in notes can be generated
for TACACS
Review cluster operation
Top 10 Successful RADIUS
Authentications
These invariably
are authenticating
too often
Each should be
investigated
Similar reports
SQL in notes can be generated
for TACACS
To boldly split inf