Upcoming community maintenance Oct. 27th through Oct. 29th
For more info click here

Aerohive Integration with ClearPass - corp and guest - Mar 2014

Not applicable

The tutorial was by:Michael_Clarke

Integration of ClearPass with Aerohive Introduction


Much as we’d like all our customers to choose, or already have Aruba wireless, that is not always the case.   A key vendor in the marketplace is that of Aerohive, which consists of essentially fat Aps managed by a platform called HiveManager.  This tutorial outlines how to integrate ClearPass into an Aerohive wireless deployment for the purposes of corporate 802.1X and guest users.




The following was used for this testing and demonstration.


Aerohive – AP330 firmware 6.1r3

HiveManager – Hive Manager Online 6.1r3

ClearPass –


Assumptions – ClearPass is joined to domain and Active Directory is being used for authentication.




Add the Aerohive device to ClearPass as a radius client.  You will need to add each individual AP as a client or add them by subnet.


1 - clearpass - add device.jpg


1.1       Corporate 802.1X SSID


Setup your SSID with the appropriate parameters on HiveManager.


 2 - ssid-aerohive.jpg



Add this ssid to your network profile, and create the ClearPass radius configuration.  Create and assign an appropriate User Profile.  In the case of this demo, we are using the same VLAN as the AP for simplicity.


 3 - aerohive-dot1x policy.jpg



The radius settings for ClearPass should be setup as below.


 3 - radius-clearpass.jpg


Using the ‘802.1X Wireless’ template in ClearPass, create the service by entering the ssid and choosing the Aerohive device that was added during the setup.


 clearpass-corp service.jpg


Add the attribute ‘Connection: SSID EQUALS <ssid>’ as above.  Optionally, you can set a ‘NAS-Identifier’ on the Aerohive AP and filter on that.


1.1.1     Using Radius attributes to assign User Profiles.


Similar to the Aruba concept of user-roles, Aerohive uses user-profiles to define different types of user rights.  Within the user-profile an attribute number is given and the RADIUS response can be configured to return particular attributes so the user is placed into this user-profile.


These attributes can be returned by adding an Enforcement Policy to your Profile as below.


 4 - clearpass user profile attributes.jpg


Note:  The Tunnel-Private-Group-Id value must match the attribute-no of the user-profile on Aerohive.


1.2       Guest SSID


Aerohive can also be configured to use ClearPass for guest SSIDs.  There are two ways of doing this and both will be considered here.


1.2.1     Using Aerohive portal and ClearPass as RADIUS and Guest management.


The Aerohive guest ssid can be set so that the internal portal on the Aerohive is served and the RADIUS request is sent to ClearPass.  ClearPass has already been setup for guest account creation etc.


Create the Aerohive SSID with the following parameters.


 5 - Aerohive - guest ssid.jpg


Within the Network profile, add this SSID and create the captive portal profile and assign the ClearPass as the RADIUS server.


 6 - aerohive network policy with guest.jpg


The captive portal profile on Aerohive will need to be configured as such with the following


  • Registration Type – User
  • Captive Web Portal Auth Method – MSCHAPv2
  • Show success page after successful authentication.
  • Show failure page after unsuccessful login.


 7 - aerohive-cp using interal AP.jpg


Using the ClearPass service template ‘Guest MAC Authentication’, create the guest service using the appropriate SSID and Aerohive as the NAS device.


Note:  Guest MAC caching does not work with Aerohive, or at least I was unable to make it work.  The user will always be presented with the portal page, even if they have passed mac authentication.  If anyone knows how to make this work, please advise.  We will still use the MAC caching template though so that the mac is registered on ClearPass.



 8 - clearpass-guest service.jpg




When the user connects, they are presented with the captive portal from the Aerohive AP.


 9 - aerohive portal internal.jpg


The RADIUS request is sent to ClearPass for authentication as shown in access tracker below.


 10 - clearpass access tracker with aerohive CP.jpg


And the user is presented the success page.


11 - aerohive-cp success page using internal AP.jpg


1.2.2     Using ClearPass portal and ClearPass as RADIUS and guest management


The following outlines how to use ClearPass for the guest registration page and subsequent authentication.


Configure the guest registration page in ClearPass Guest as below, with the following NAS-login settings.


  • Secure login – use https
  • IP address –
  • Password Encryption – No encryption (Note, we are still using https for the registration, so this is not a security concern)

 12 - clearpass-guest page using CP portal.jpg


Configure the Aerohive captive portal settings as shown below.


  • Registration type – External authentication
  • Authentication method – CHAP
  • Login URL – address of your defined guest registration page.
  • Password Encryption – No Encryption. 
  • Enable https

13 - aerohive-cp using CP portal.jpg 


After registering using the ClearPass portal, the user is presented with the success page served from the Aerohive AP.



 11 - aerohive-cp success page using internal AP.jpg



Version history
Revision #:
2 of 2
Last update:
‎10-25-2017 08:47 AM
Updated by:
Labels (1)
Search Airheads
Showing results for 
Search instead for 
Did you mean: