ArubaOS 8.6.0.0Help Center
You are here: Home > ClearPass Policy Manager Integration > Sample Configuration

Sample Configuration

的following example shows the configuration details to integrateClearPass Policy ManagerClearPass Policy Manager is a baseline platform for policy management, AAA, profiling, network access control, and reporting. With ClearPass Policy Manager, the network administrators can configure and manage secure network access that accommodates requirements across multiple locations and multivendor networks, regardless of device ownership and connection method.server with amanaged deviceto automatically download roles.

ClearPass Policy Manager Server Configuration

This section describes the following topics:

Adding a Device

的following procedure describes how to add a device:

1.Navigate to theConfiguration > Network > Devicespage in theClearPass Policy ManagerClearPass Policy Manager is a baseline platform for policy management, AAA, profiling, network access control, and reporting. With ClearPass Policy Manager, the network administrators can configure and manage secure network access that accommodates requirements across multiple locations and multivendor networks, regardless of device ownership and connection method.server.

2.ClickAddabove theNetwork Deviceslist. TheAdd Devicepage opens.

3.Under theDevicetab, enter theName,IP or Subnet Address, andRADIUS Shared Secretfields.

Keep the rest of the fields as default.

4.ClickAdd.

The fields are described inTable 1.

Table 1:Device Tab

Parameter

Description

Name

The name or identity of the device.

IP or Subnet Address

The IP address orsubnetSubnet is the logical division of an IP network.(example 10.1.1.1/24) of the device.

RADIUS Shared Secret

Enter and confirm a Shared Secret for each of the two supported request protocols.

Adding an Enforcement Profile

的following procedure describes how to add an enforcement profile:

1.Navigate to theConfiguration > Enforcement > Profilespage.

2.ClickAddabove theEnforcement Profileslist. TheEnforcement Profilespage opens.

3.Under theProfiletab, selectAruba Downloadable Role Enforcementfrom theTemplatedrop-down list.

4.Enter theNameof the enforcement profile.

5.UnderRole Configuration Mode, selectAdvanced.

Keep the rest of the fields as default.

6.ClickNext.

其余的配置,请参阅Advanced Role Configuration Mode.

The fields are described inTable 2.

Table 2:Enforcement Profiles Page

Parameter

Description

Template

Policy Manager comes pre-packaged with several enforcement profile templates. In this example, selectAruba Downloadable Role Enforcement-RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.template that can be filled with user role definition to create roles that can be assigned to users after successful authentication.

Name

The name of the enforcement profile.

Role Configuration Mode

Standard: Configures the enforcement profile role using standard mode.

Advanced: Configures the enforcement profile role using advanced mode.

Advanced Role Configuration Mode

的following procedure describes how to enable advanced role configuration mode:

1.Under theAttributestab, selectRadius:Arubafrom theTypetable.

2.From theNamedrop-down list, selectAruba-CPPM-Role.

3.In theValuefield, enter the attribute for the downloadable-role.

4.Click theSaveicon to save the attribute.

5.ClickSaveto save the enforcement profile.

The fields are described inTable 3.

Table 3:Enforcement Profiles Attributes Tab

Parameter

Description

Type

AnyRADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.vendor dictionary that is pre-packaged with Policy Manager, or imported by the Administrator. This field is pre-populated with the dictionary names.

Name

The name of the attribute from the dictionary selected in the Type field. The attribute names are pre-populated from the dictionary.

Value

The attribute for the downloadable role. You can enter free-form text to define the role and policy.

NOTE:The maximum limit for free form text is 16,000 bytes.

Adding Enforcement Policy

的following procedure describes how to add an enforcement policy:

1.Navigate to theConfiguration > Enforcement > Policiespage.

2.ClickAddabove theEnforcement Policieslist. TheEnforcement Policiespage opens.

3.Under theEnforcementtab, enter theNameof the enforcement policy.

4.From theDefault Profiledrop-down list, select[Deny Access Profile].

Keep the rest of the fields as default.

5.ClickNext.

The fields are described inTable 4.

Table 4:Enforcement Policies Enforcement Tab

Parameter

Description

Name

The name of the enforcement policy.

Default Profile

An Enforcement Policy applies Conditions (roles, health, and time attributes) against specific values associated with those attributes to determine the Enforcement Profile. If none of the rules matches, Policy Manager applies the Default Profile.

SeeAdding an Enforcement Profileto add a new profile.

6.Under theRulestab, clickAdd Rule. TheRules Editorpage opens.

7.SelectClick to add...from theConditionssection. Select the appropriate values, and then click theSaveicon.

8.In theEnforcement Profilessection, select theRADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.enforcement profile that you created inAdding an Enforcement Profilefrom theProfile Namesdrop-down list.

9.ClickSave.

The fields are described inTable 5.

Table 5:Enforcement Policies Rules Editor

Parameter

Description

Type

The rules editor appears throughout the Policy Manager interface. It exposes different namespace dictionaries depending on Service type. When working with service rules, you can selectAuthenticationnamespace dictionary

Name

Drop-down list of attributes present in the selected namespace. In this example, selectSource.

Operator

Drop-down list of context-appropriate (with respect to the attribute) operators. In this example, selectEQUALS.

Value

Drop-down list of the Authentication source database. In this example, select[Local User Repository].

Profile Names

Name of theRADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources.enforcement profile.

Adding Services

的following procedure describes how to add services:

1.Navigate to theConfiguration > Servicespage.

2.ClickAddabove theServiceslist.

3.Under theServicetab, select802.1X Wiredfrom theTypedrop-down-list.

4.In theNamefield, enter the name of the service.

Keep the rest of the fields as default.

5.ClickNext.

The fields are described inTable 6.

Table 6:Service Tab

Parameter

Description

Type

服务类型。在本例中,选择802.1X Wired.

Name

The name of the service.

6.Under theAuthenticationtab, select[Local User Repository] [Local SQL DB]from theAuthentication Sourcesdrop-down list.

Keep the rest of the fields as default.

7.ClickNexttwice.

8.Under theEnforcementtab, select the enforcement policy that you created inAdding Enforcement Policyfrom theEnforcement Policydrop-down list.

Keep the rest of the fields as default.

9.ClickSave.

For more configuration details onClearPass Policy Manager, see theClearPass Policy Manager User Guide.

Managed DeviceConfiguration

This section describes the following topics:

Configuring ClearPass Policy Manager Server on aManaged Device

的followingCLICommand-Line Interface. A console interface with a command line shell that allows users to execute text input as commands and convert these commands to appropriate functions.commands configureClearPass Policy Managerserver on amanaged device:

(主机)md] (config) #aaa authentication-server radius cppm_server

(主机)md] (RADIUS Server "cppm_server") #host

cppm_server>

(主机)md] (RADIUS Server "cppm_server") #key

(主机)md] (RADIUS Server "cppm_server") #cppm username

password

Configuring Server Group to include ClearPass Policy Manager Server

的followingCLICommand-Line Interface. A console interface with a command line shell that allows users to execute text input as commands and convert these commands to appropriate functions.commands configure a server group to includeClearPass Policy Managerserver:

(主机)md] (config) #aaa server-group cppm_grp

(主机)md] (server group "cppm_grp") #auth-server cppm_server

Configuring 802.1X Profile

的followingCLICommand-Line Interface. A console interface with a command line shell that allows users to execute text input as commands and convert these commands to appropriate functions.command configures a802.1X802.1X is an IEEE standard for port-based network access control designed to enhance 802.11 WLAN security. 802.1X provides an authentication framework that allows a user to be authenticated by a central authority.profile:

(主机)md] (config) #aaa authentication dot1x cppm_dot1x_prof

Configuring AAA Profile

的followingCLICommand-Line Interface. A console interface with a command line shell that allows users to execute text input as commands and convert these commands to appropriate functions.commands configure aAAAAuthentication, Authorization, and Accounting. AAA is a security framework to authenticate users, authorize the type of access based on user credentials, and record authentication events and information about the network access and network resource consumption.profile:

(主机)md] (config) #aaa profile cppm_aaa_prof

(主机)md] (AAA Profile "cppm_aaa_prof") #authentication-dot1x cppm_

dot1x_prof

(主机)md] (AAA Profile "cppm_aaa_prof") #dot1x-server-group cppm_gr

(AAA Profile "cppm_aaa_prof") #download-role

Show AAA Profile

的followingCLICommand-Line Interface. A console interface with a command line shell that allows users to execute text input as commands and convert these commands to appropriate functions.command displays anAAAAuthentication, Authorization, and Accounting. AAA is a security framework to authenticate users, authorize the type of access based on user credentials, and record authentication events and information about the network access and network resource consumption.profile:

(主机)md] #show aaa profile cppm_aaa_prof

AAA Profile "cppm_aaa_prof"

---------------------

Parameter Value Set

--------- ----- ---

Initial role logon

MAC Authentication Profile N/A

MAC Authentication Default Role guest

MAC Authentication Server Group default

802.1X Authentication Profile N/A

802.1X Authentication Default Role guest

802.1X Authentication Server Group N/A

Download Role from CPPM Disabled

Set username from dhcp option 12 Disabled

L2 Authentication Fail Through Disabled

Multiple Server Accounting Disabled

User idle timeout N/A

Max IPv4 for wireless user 2

RADIUS Accounting Server Group N/A

RADIUS Interim Accounting Disabled

XML API server N/A

RFC 3576 server N/A

User derivation rules N/A

Wired to Wireless Roaming Enabled

Device Type Classification Enabled

Enforce DHCP Disabled

PAN Firewall Integration Disabled

Open SSID radius accounting Disabled

For additional command parameters, see theArubaOSCLI Reference Guide.

/*]]>*/
Baidu