Mobility Hero Tutorials

 View Only
last person joined: 2 years ago 

Aerohive Integration with ClearPass - corp and guest - Mar 2014 

Apr 14, 2014 04:21 PM

The tutorial was by:Michael_Clarke

Integration of ClearPass with Aerohive Introduction

 

Much as we’d like all our customers to choose, or already have Aruba wireless, that is not always the case.   A key vendor in the marketplace is that of Aerohive, which consists of essentially fat Aps managed by a platform called HiveManager.  This tutorial outlines how to integrate ClearPass into an Aerohive wireless deployment for the purposes of corporate 802.1X and guest users.

 

Solution

 

The following was used for this testing and demonstration.

 

Aerohive – AP330 firmware 6.1r3

HiveManager – Hive Manager Online 6.1r3

ClearPass – 6.3.0.6172

 

Assumptions – ClearPass is joined to domain and Active Directory is being used for authentication.

 

Setup

 

Add the Aerohive device to ClearPass as a radius client.  You will need to add each individual AP as a client or add them by subnet.

 

1 - clearpass - add device.jpg

 

1.1       Corporate 802.1X SSID

 

Setup your SSID with the appropriate parameters on HiveManager.

 

 2 - ssid-aerohive.jpg

 

 

Add this ssid to your network profile, and create the ClearPass radius configuration.  Create and assign an appropriate User Profile.  In the case of this demo, we are using the same VLAN as the AP for simplicity.

 

 3 - aerohive-dot1x policy.jpg

 

 

The radius settings for ClearPass should be setup as below.

 

 3 - radius-clearpass.jpg

 

Using the ‘802.1X Wireless’ template in ClearPass, create the service by entering the ssid and choosing the Aerohive device that was added during the setup.

 

 clearpass-corp service.jpg

 

Add the attribute ‘Connection: SSID EQUALS <ssid>’ as above.  Optionally, you can set a ‘NAS-Identifier’ on the Aerohive AP and filter on that.

 

1.1.1     Using Radius attributes to assign User Profiles.

 

Similar to the Aruba concept of user-roles, Aerohive uses user-profiles to define different types of user rights.  Within the user-profile an attribute number is given and the RADIUS response can be configured to return particular attributes so the user is placed into this user-profile.

 

These attributes can be returned by adding an Enforcement Policy to your Profile as below.

 

 4 - clearpass user profile attributes.jpg

 

Note:  The Tunnel-Private-Group-Id value must match the attribute-no of the user-profile on Aerohive.

 

1.2       Guest SSID

 

Aerohive can also be configured to use ClearPass for guest SSIDs.  There are two ways of doing this and both will be considered here.

 

1.2.1     Using Aerohive portal and ClearPass as RADIUS and Guest management.

 

The Aerohive guest ssid can be set so that the internal portal on the Aerohive is served and the RADIUS request is sent to ClearPass.  ClearPass has already been setup for guest account creation etc.

 

Create the Aerohive SSID with the following parameters.

 

 5 - Aerohive - guest ssid.jpg

 

Within the Network profile, add this SSID and create the captive portal profile and assign the ClearPass as the RADIUS server.

 

 6 - aerohive network policy with guest.jpg

 

The captive portal profile on Aerohive will need to be configured as such with the following

 

  • Registration Type – User
  • Captive Web Portal Auth Method – MSCHAPv2
  • Show success page after successful authentication.
  • Show failure page after unsuccessful login.

 

 7 - aerohive-cp using interal AP.jpg

 

Using the ClearPass service template ‘Guest MAC Authentication’, create the guest service using the appropriate SSID and Aerohive as the NAS device.

 

Note:  Guest MAC caching does not work with Aerohive, or at least I was unable to make it work.  The user will always be presented with the portal page, even if they have passed mac authentication.  If anyone knows how to make this work, please advise.  We will still use the MAC caching template though so that the mac is registered on ClearPass.

 

 

 8 - clearpass-guest service.jpg

 

 

 

When the user connects, they are presented with the captive portal from the Aerohive AP.

 

 9 - aerohive portal internal.jpg

 

The RADIUS request is sent to ClearPass for authentication as shown in access tracker below.

 

 10 - clearpass access tracker with aerohive CP.jpg

 

And the user is presented the success page.

 

11 - aerohive-cp success page using internal AP.jpg

 

1.2.2     Using ClearPass portal and ClearPass as RADIUS and guest management

 

The following outlines how to use ClearPass for the guest registration page and subsequent authentication.

 

Configure the guest registration page in ClearPass Guest as below, with the following NAS-login settings.

 

  • Secure login – use https
  • IP address – 1.1.1.1
  • Password Encryption – No encryption (Note, we are still using https for the registration, so this is not a security concern)

 12 - clearpass-guest page using CP portal.jpg

 

Configure the Aerohive captive portal settings as shown below.

 

  • Registration type – External authentication
  • Authentication method – CHAP
  • Login URL – address of your defined guest registration page.
  • Password Encryption – No Encryption. 
  • Enable https

13 - aerohive-cp using CP portal.jpg 

 

After registering using the ClearPass portal, the user is presented with the success page served from the Aerohive AP.

 

 

 11 - aerohive-cp success page using internal AP.jpg

 

 

Statistics
0 Favorited
5 Views
0 Files
0 Shares
0 Downloads

Related Entries and Links

No Related Resource entered.