Integration of Clearpass with Aerohive Introduction
Much as we’d like all our customers to choose, or already have Aruba wireless, that is not always the case. A key vendor in the marketplace is that of Aerohive, which consists of essentially fat Aps managed by a platform called HiveManager. This tutorial outlines how to integrate Clearpass into an Aerohive wireless deployment for the purposes of corporate dot1x and guest users.
The following was used for this testing and demonstration.
Aerohive – AP330 firmware 6.1r3
HiveManager – Hive Manager Online 6.1r3
Clearpass – 126.96.36.19972
Assumptions – Clearpass is joined to domain and Active Directory is being used for authentication.
Add the Aerohive device to Clearpass as a radius client. You will need to add each individual AP as a client or add them by subnet.
1.1 Corporate dot1x ssid
Setup your ssid with the appropriate parameters on HiveManager.
Add this ssid to your network profile, and create the Clearpass radius configuration. Create and assign an appropriate User Profile. In the case of this demo, we are using the same vlan as the AP for simplicity.
The radius settings for Clearpass should be setup as below.
Using the ‘802.1X Wireless’ template in Clearpass, create the service by entering the ssid and choosing the Aerohive device that was added during the setup.
Add the attribute ‘Connection: SSID EQUALS <ssid>’ as above. Optionally, you can set a ‘NAS-Identifier’ on the Aerohive AP and filter on that.
1.1.1 Using Radius attributes to assign User Profiles.
Similar to the Aruba concept of user-roles, Aerohive uses user-profiles to define different types of user rights. Within the user-profile an attribute number is given and the radius response can be configured to return particular attributes so the user is placed into this user-profile.
These attributes can be returned by adding an Enforcement Policy to your Profile as below.
Note: The Tunnel-Private-Group-Id value must match the attribute-no of the user-profile on Aerohive.
1.2 Guest ssid
Aerohive can also be configured to use Clearpass for guest ssids. There are two ways of doing this and both will be considered here.
1.2.1 Using Aerohive portal and Clearpass as radius and Guest management.
The Aerohive guest ssid can be set so that the internal portal on the Aerohive is served and the radius request is sent to Clearpass. Clearpass has already been setup for guest account creation etc.
Create the Aerohive ssid with the following parameters.
Within the Network profile, add this ssid and create the captive portal profile and assign the Clearpass as the radius server.
The captive portal profile on Aerohive will need to be configured as such with the following
Using the Clearpass service template ‘Guest MAC Authentication’, create the guest service using the appropriate ssid and Aerohive as the NAS device.
Note: Guest MAC caching does not work with Aerohive, or at least I was unable to make it work. The user will always be presented with the portal page, even if they have passed mac authentication. If anyone knows how to make this work, please advise. We will still use the MAC caching template though so that the mac is registered on Clearpass.
When the user connects, they are presented with the captive portal from the Aerohive AP.
The radius request is sent to Clearpass for authentication as shown in access tracker below.
And the user is presented the success page.
1.2.2 Using Clearpass portal and Clearpass as radius and guest management
The following outlines how to use Clearpass for the guest registration page and subsequent authentication.
Configure the guest registration page in Clearpass Guest as below, with the following NAS-login settings.
Configure the Aerohive captive portal settings as shown below.
After registering using the Clearpass portal, the user is presented with the success page served from the Aerohive AP.
Spot on tutorial - Kudos yet again for an excellent summary! Rockon!
Clearpass is used in many multi vendor environments. Great Tutorial!
Do you know if you can tie captive portals to user profiles with the Hive? i'm trying to get fancy and do redirects to onboard non-TLS devices. This is so much easier with just Aruba gear....
Unfortunately I don't think so.
The captive portal is tied to the ssid, which makes things like that difficult. It's the same with the mac caching on CPPM....I couldn't get that to work either.
Thanks for the reply... I've reach out to a few hive guys. If they come up with anything I'll post back here.
Aerohive seem to have added an enhancement that avoids Captive Portal redirect after successfull MAC authentication. See here: https://community.aerohive.com/aerohive/topics/avoid-device-going-through-captive-portal
Seems CLI only option. In combination with external Captive Portal, the command is:
security-object <string> security additional-auth-method mac-based-auth fallback-to-ecwp
Thanks but I've tested and this doesn't work either :-(
188.8.131.52 as the IP address for login doesn't work for me. I used 198.18.34.1 instead and that works to POST to /reg.php.
Has anyone tried to do this using AeroHive Classic? I know Clearpass, but not Aerohive..
Anyways it's slightly different from the screens in this post, and ofc. I can't get that to work. I was hoping to do mac-auth with CoA instead of the old method of doing Guest redirection, but seems that's not supported.
Here is a PDF walk-through on how to configure Extreme IQ (Formerly Hivemanager NG) Guest with MAC-Caching.
Tested with EIQ 8.4.r7 on an AP130 with CPPM 6.8.4. *NOTE: Earlier versions of firmware seem to be hit and miss on which ones support MAC-Auth w/ Captive Portal fallback. See here
At Aruba, we believe that the most dynamic customer experiences happen at the Edge. Our mission is to deliver innovative solutions that harness data at the Edge to drive powerful business outcomes.
© Copyright 2021 Hewlett Packard Enterprise Development LPAll Rights Reserved.