Security

last person joined: yesterday 

Forum to discuss Enterprise security using HPE Aruba Networking NAC solutions (ClearPass), Introspect, VIA, 360 Security Exchange, Extensions, and Policy Enforcement Firewall (PEF).
Expand all | Collapse all

ArubaOS 8 - Cluster Dynamic Authorization - Checklist

This thread has been viewed 16 times
  • 1.  ArubaOS 8 - Cluster Dynamic Authorization - Checklist

    EMPLOYEE
    Posted Nov 15, 2018 06:40 AM

    This post is actually a checklist to keep in mind, in order to get the RADIUS Dynamic Authorization in Clustering working.

     

    To understand "How it works”,

    Read "Change of Authorization" under "Clustering" in “ArubaOS 8 Fundamentals" guide.

     

    To Configure Clustering and Dynamic Authorization,

    Please refer https://ase.arubanetworks.com/

     

    My Setup:CoA in Cluster.jpg

     

     Cluster Dynamic Authorization Support:

    The above setup shows a 3-nodes cluster where 3 VRRP instance will be dynamically created with 3 VIPs.

    The VRRP IDs will be 220, 221 and 222.

    The priorities are dynamically assigned where the master of an instance (MC1) with ID 220 gets 255, the first backup within that instance gets 255-20=235 and the second backup gets 235-20=215

    The same is true for the second vrrp instance (MC2) with ID-221 where MC2 gets the highest priority 255 followed by MC1 as backup1 with 235 and MC3 as backup2 with 215.

    The third instance follows the same pattern.CoA in Cluster1.jpg

     

    CHECKLIST:

    1) Verify that you have linked the "RFC 3576 server" to the aaa profile.RFC3576 Server.jpg

     

     

    2) Ensure that you have configured the VRRP-IP and VRRP-VLAN in the cluster group-profile.

    Command:  show lc-cluster group-profile Campus-A-ClusterVRRP-IP and VRRP-VLAN.jpg

     

    3) Check whether the cluster is L2 Connected.

    Command: show lc-cluster group-membershipL2-Connected.jpg

     

     

    4) Verify the System created VRRP instance

    Command: show vrrpVerify VRRP.jpg

     

     

    5) Dynamic Authorization request messages are usually sent by a RADIUS server to a network access server (NAS) device.

    If the NAS device is able to successfully implement the requested authorization changes for the user session, it will respond with a DM-ACK or CoA-ACK, otherwise a DM-NAK or CoA-NAK is sent.

    Since the DA request is initiated from the Server to Client, be careful about NAT in the Gateway or Controller.NAT.jpg

     

    6) Verify in Clearpass Access Tracker record, NAD-IP-Address is the Cluster VRRP IP address (In this Eg: VIP2) and Src-IP-Address is the controller IP / Managed Device IP (In this Eg: MC2)NAD and Src IP Address.jpg

     

     

    7) In Clearpass, under “Configuration » Network » Devices”, add

    Cluster VRRP IPs as NAD.

    Controller IPs as NAD.

    Don’t forget to check “Enable RADIUS CoA”Clearpass Side Verify.jpg

     

     

    Successful Disconnect.CoA initaited.jpg

    User Table:user-table.jpg

     

     

    If there are any other points that needs to be added to this checklist, please post your comments here. This will help others who are troubleshooting this issue.

    Hope you find this post useful. Please let me know your feedback!

     

    Regards,

    Kapil

     

     



  • 2.  RE: ArubaOS 8 - Cluster Dynamic Authorization - Checklist

    Posted Feb 07, 2019 10:21 AM

    Thank you for this usefull post. If user change the controller how affect DA and how we check this with Show and Debug commands?



  • 3.  RE: ArubaOS 8 - Cluster Dynamic Authorization - Checklist

    EMPLOYEE
    Posted Feb 08, 2019 06:02 PM

    Dynamic Authorization request messages are usually sent by a RADIUS server to a network access server (NAS) device.
    NAS-IP-Address will be the Cluster VRRP IP.
    When the user moves to a new controller, the AAA server contacts the VRRP IP address and the Dynamic Authorization is redirected to the client's new A-UAC according to the bucket map.

     

    Show Commands:
    show aaa cluster members
    show aaa state user <user-ip> | include nas

     

    Debugging Command:
    logging security process authmgr subcat cluster level debugging
    logging security process authmgr level debugging
    logging security subcat aaa level debugging
    show log security 60