04-18-2015 11:01 AM
I have a small request,
I want to test onguard in my lab, can someone give me some suggestion or some document to do it from scratch. I am a newbie in clearpass, so I need a doc which describe the process from scratch.
Laptop user will connect to 802.1x or captive portal enabled wired port,
Clearpass will check if the windows firewall is enabled or not.
If enabled then the user will get full access if not then user will move to a quaruntine VLAN.
Solved! Go to Solution.
04-18-2015 01:17 PM
Thanks Tim for your respose.
As I said I want to test in my LAB environment with minimal requirement. Like windows firewall is on/off device is windows 7 or not.
I just want to clear my concept on this.
04-20-2015 04:54 PM
Here is a quick and dirty procedure to get you up and running. Hope this helps:
- Define Health Posture Policy
- Under Configuration -> Posture -> Posture Policy, click Add. Name the policy, select the Onguard agent, and select your Operating System. Under the Posture Plugins tab, select the checkbox for the “ClearPass Windows Universal System Health Validator”. Click Configure.
- Select Windows 7 on the left, and then determine what you want to check for. In your example, select Firewall and check the for Enable checks for Windows and “A firewall application is on”. Save the configuration.
- Under the Rules tab, select the conditions to match for. Generally, it is best practices to use two states: Healthy and Quarantine. Define Healthy as “Passes all SHV checks” and use the Health Validator plugin. Define Quarantine as “Fails one or more SHV checks”.
- Save the policy.
- Define Posture Enforcement Policy
- Under Configuration -> Enforcement -> Policies, click Add. Name the policy and select the WEBAUTH enforcement type. Select [RADIUS_CoA][Aruba Terminate Session] as the Default Profile.
- Under the Rules tab, define three condition rules, selecting the first match:
- If Tips:Posture EQUALS HEALTHY, Actions: [Aruba Terminate Session], [Cisco – Terminate Session]
- If Tips:Posture EQUALS QUARANTINE, Actions: [Aruba Terminate Session], [Cisco – Terminate Session]
- If Tips:Posture NOT_EQUALS HEALTHY, Actions: [Aruba Terminate Session], [Cisco – Terminate Session]
- Save the policy.
- Define Health Authentication Service
- Under Configuration -> Services, click Add. Select the type as “Web-based Health Check Only”. Select the Posture Compliance check box. Under Posture, select the Posture policy previously defined. The default posture token should be “Unknown.” Under the Enforcement tab, select the previously-define enforcement policy.
- Save the service.
- In your Dot1X service, under the Enforcement tab, ensure that the “Use Cached Results” checkbox is checked.
- Download the Onguard agent. The installer file can be found under Administration -> Agents and Software Updates -> Onguard Settings.
- Once the agent is installed, health check authentications should now use the newly-define service.
- You may now use the posture status in the Dot1X enforcement policy. When the Health auth terminates the session, the results will be cached and can be used in enforcement to assign new user role, VLAN, etc.
04-23-2015 10:36 AM
Thanks a ton for the response.
I tried the same you mentioned, but getting error when doing WEB_Auth.
My system is sending credential while in CPPM web-auth no auth source configured..
04-23-2015 11:20 AM
Are you sure you selected Web-Based Health Check only service template? There should be only one condition: Type=Host, Name=CheckType, Operator=MATCHES_ALL, Value = Health
This template should not require any authentication source configured. In addition, the username that you should see in the access tracker should be the mac address of the endpoint with the agent installed.