How about a basic pseudocode? I'd love to hear your thoughts on making this more robust.. Thank you Sir.
Corporate SSID
IF
Mac Address is in Endpoints repository , status known and profiled less than 7 days ago
THEN Allow access to network
ELSE IF
OS is Windows 10 or Windows 11
AND the device is joined to domain: company.com
AND user is authenticated by Active Directory
OR
OS is Android OR OS is IOS
AND the device is managed by Workspace One
AND user is authenticated by Active Directory
THEN Allow access to network
ELSE Deny access
END
======================
Captive Portal
IF
Mac Address is in Endpoints repository , status known and profiled less than 24 hours ago.
THEN Allow access to network for 24 hours
ELSE User is redirected to the captive portal with company skin
User checks the Terms of Use box and connects
THEN Allow access to network for 24 hours
ELSE IF Mac Address is in Static Host lists "IOT"
THEN Allow access to network
ELSE Deny access
END
Original Message:
Sent: Feb 03, 2025 01:17 PM
From: chulcher
Subject: arubaos wireless terminate session profile vs dhcp only profile
I have little idea what you are trying to accomplish with this setup, nor do I have a setup that would be applicable to whatever you are trying to do.
If you provide some clarity around what is bein attempted, might be able to provide some guidance.
------------------------------
Carson Hulcher, ACEX#110
Original Message:
Sent: Feb 03, 2025 01:10 PM
From: clearpassnoob2024
Subject: arubaos wireless terminate session profile vs dhcp only profile
Hi Sir,
Can I copy the policy you used over [Machine Authenticated]? and an example for replacing [User Authenticated]?
Thanks
Original Message:
Sent: Jan 31, 2025 03:28 PM
From: chulcher
Subject: arubaos wireless terminate session profile vs dhcp only profile
Assuming this is two separate potential setups and the actions taken match the descriptions given, the first option is going to result in a device that hasn't been profiled being immediately kicked off the network. And since the device gets kicked off immediately, the device never gets profiled.
What you would normally want is for an unprofiled device to be allowed on, potentially in a restricted way, so that profiling by at least DHCP fingerprint can occur. Then the profiled device action can fire and force the device to reauthenticate and proper policy to be applied.
Also, don't write policy around [Machine Authenticated] unless you just really like counting on the MAC address to no be spoofed. If you want computer and user authentication, use TEAP. If you want to validate the device as an allowed device on the network, use the management platform (Intune/JAMF/etc.) to do so and then take action based on that. Your role mapping should be looking at the interesting points of who/what/why/where/when/how for the authentication session and then setting roles based on that. You definitely want something more interesting than just "authentication was good". Testing [User Authenticated] is redundant, if [User Authenticated] isn't present then you'd never get to the authorization state in the first place.
------------------------------
Carson Hulcher, ACEX#110
Original Message:
Sent: Jan 31, 2025 11:27 AM
From: clearpassnoob2024
Subject: arubaos wireless terminate session profile vs dhcp only profile
hi, What is the difference between these two conditions in terms of evaluating succeeding conditions and enforcement? (rules evaluation is first-applicable)
(Tips:Role EQUALS PROFILE-ME_ROLE) | Aruba Wireless -Terminate Session |
3. | (Tips:Role MATCHES_ALL AUTH_PEAP_ROLE OS_iOS_ROLE MDM_ENPT-WS1-ROLE) AND (Tips:Role EQUALS [User Authenticated]) | [Allow Access Profile], [Update Endpoint Known] |
4. | (Tips:Role MATCHES_ALL AUTH_PEAP_ROLE DEVICE_COMPUTER_ROLE) AND (Tips:Role MATCHES_ALL [Machine Authenticated] [User Authenticated]) | [Update Endpoint Known], [Allow Access Profile] |
5. | (Tips:Role MATCHES_ALL AUTH_PEAP_ROLE DEVICE_COMPUTER_ROLE) AND (Tips:Role EQUALS [Machine Authenticated]) | [Update Endpoint Known], [Allow Access Profile] |
VS
(Tips:Role EQUALS PROFILE-ME_ROLE) | Profile DHCP Role |
3. | (Tips:Role MATCHES_ALL AUTH_PEAP_ROLE OS_iOS_ROLE MDM_ENPT-WS1-ROLE) AND (Tips:Role EQUALS [User Authenticated]) | [Allow Access Profile], [Update Endpoint Known] |
4. | (Tips:Role MATCHES_ALL AUTH_PEAP_ROLE DEVICE_COMPUTER_ROLE) AND (Tips:Role MATCHES_ALL [Machine Authenticated] [User Authenticated]) | [Update Endpoint Known], [Allow Access Profile] |
5. | (Tips:Role MATCHES_ALL AUTH_PEAP_ROLE DEVICE_COMPUTER_ROLE) AND (Tips:Role EQUALS [Machine Authenticated]) | [Update Endpoint Known], [Allow Access Profile] |