AP Whitelist with CPPM

by ‎07-20-2015 06:57 AM - edited ‎08-04-2015 07:07 PM
Requirement:

This feature allows to externally maintain AP (RAP, CAP and IAP) whitelist in a ClearPass Policy Manager (CPPM) server.

The controller, if configured to use an external server, can send a RADIUS access request to a CPPM server. 

The MAC address of the AP is used as a username and password to construct the access request packet. The CPPM server validates the RADIUS message and returns the relevant parameters for the authorized APs.



Solution:

CPPM server sends the following attributes in RADIUS access accept packet to the requested controller.

  1. ap-group: <Aruba-AP-Group>
  2. ap-name: <Aruba-Location-ID>

 

The above attributes need to be configured in CPPM with the help of enforcement profile.

The following defaults are used by the Controller when any of the supported parameters are not provided by the CPPM server in the RADIUS access accept response:

 

  1. ap-group: The default ap-group is assigned to the AP.
  2. ap-name: The MAC address of the AP is used as the AP name.

 

Note : The role returned by the CPPM will not have any significance, Controller will map Default-RAP role.



Configuration:

Controller Configuration:

 

1. Create a server group that contains the CPPM server.

2. Navigate to Configuration > All Profile Management > Wireless LAN > VPN Authentication >

default-rap > Server Group.

3. Select the CPPM server from the Server Group drop-down list.

4. Click Apply.

 

Note : When  we are converting an IAP (RAP-3, RAP-155 etc) to RAP or CAP, we need to configure the Server group under default-IAP instead of default-RAP.

 

CPPM configuration :

Configure a service Ex : Aruba 802.1X Wireless, with the following components and Enforcement enabled

  1. Authentication type : EAP-PEAP, EAP-MSCHAPV2 and MAC Auth
  2. Authentication source : Local or external where the RAP MAC address is configured
  3. Enforcement Policy : An enforcement policy which will return “Aruba-AP-Group” and “Aruba-AP-Location-ID” on successful authentication.


Verification

How it works :

 

  1. When AP contacts Controller with it’s MAC address, Controller will send the MAC address to the server (CPPM) which is configured in the server group mapped to the respective AP default profile (Default-AP/Default-IAP/Default-RAP)  for authentication ( Whitelist )

 

 

  1. CPPM will convert the received MAC address into all cap without delimiter format ( EX : 010A123456) and lookup in the user database as per the Authentication source selected in the service.

 

  1. When the MAC address is found in the user DB, CPPM will send RADIUS accept message along with the AP-Group and AP-Location-ID attributes if configured through enforcement policy.

 

 

Search Airheads
Showing results for 
Search instead for 
Did you mean: 
Is this a frequent problem?

Request an official Aruba knowledge base article to be written by our experts.