ClearPass Profiling TechNote V1.2 PDF
ClearPass Profiling TechNote V1.2 PDF
Tech Note:
ClearPass Profiling
Version 1.2 July 2015
1.1
October
2014
Danny
Jump
Updated
details
for
ActiveSync
to
add
details
of
Exchange
2013
support.
1.2
July
2015
Danny
Jump
Added
details
CPPM
6.5
profiling
and
Custom
Device
Classification
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Setup .................................................................................................................................................................... 6
Collectors ................................................................................................................................................................ 8
DHCP .................................................................................................................................................................... 8
ActiveSync plugin support for Exchange 2010 & 2013 ............................................................... 12
Aruba
Networks
2
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Figure 3 -‐ Configure Local Span port on older Cisco 2900/3500XL .................................................. 9
Figure 4 -‐ Configuring Local SPAN port IOS 12.2(33) and later (not ALL Cisco switches) ...... 9
Figure 5 -‐ Configuring the RSPAN on ‘Local’ & ‘Remote’ Cisco switches ....................................... 10
Figure 6 -‐ Configuring the RSPAN monitor session on the ‘Remote’ switch ................................ 10
Figure 7 -‐ Configuring the RSPAN monitor session on the ‘Local’ switch ..................................... 11
Aruba
Networks
3
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Figure 9 -‐ Error message to install .NET on Exchange 2013 ............................................................... 13
Figure 12 -‐ Activesync Plugin attributes in Endpoint ............................................................................ 17
Figure 15 -‐ Setting community string and enabling ARP-‐read ........................................................... 21
Figure 16 -‐ Assigning IP SUBNETS in Profiler to zones ......................................................................... 22
Figure 19 -‐ On-‐Demand Subnet scan messages in Event Viewer ...................................................... 23
Figure 20 -‐ Enabling Aruba Ctrl to send IF-‐MAP info to CPPM (GUI) .............................................. 24
Figure 21 -‐ Enabling Aruba Ctrl to send IF-‐MAP info to CPPM (CLI) ............................................... 24
Figure 22 -‐ Enabling device sensor on Cisco switch ............................................................................... 25
Figure 23 -‐ Configuring device sensor on Cisco switch ......................................................................... 25
Figure 24 -‐ Enabling device sensor LLDP TLV attributes ..................................................................... 26
Figure 25 -‐ Enabling device sensor CDP TLV attributes ....................................................................... 26
Figure 26 -‐ Enabling device sensor filter for DHCP, LLDP & CDP ..................................................... 26
Figure 30 -‐ Example of EMM attributes #1... .............................................................................................. 28
Figure 31 -‐ Example of EMM attributes #2... .............................................................................................. 28
Figure 32 -‐ Example of EMM attributes #3... .............................................................................................. 28
Figure 33 -‐ Adding an MDM context server ................................................................................................ 29
Aruba
Networks
4
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Figure 36 -‐ Enabling 'SPAN Port on CPPM .................................................................................................. 30
Figure 41 – Using [Endpoints Repository] as Authorization Source ............................................... 34
Figure 42 -‐ Send CoA based upon endpoint classification ................................................................... 35
Figure 43 -‐ Example of using Profiled info in role-‐mapping ............................................................... 35
Figure 44 -‐ Example set of Device Fingerprint Dictionaries in CPPM ............................................. 36
Figure 49 -‐ Complex search of endpoint DB based upon Profiler attributes ............................... 40
Figure 50 – Checking the definition was created in the SmartDevice category .......................... 44
Figure 51 – Checking the device is classified as required .................................................................... 50
Aruba
Networks
5
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Overview
The
following
guide
has
been
produced
to
help
educate
our
customers
and
partners
in
understanding
ClearPass
endpoint
profiling.
Note:
Where
you
see
a
red-‐chili
this
is
to
signify
a
‘hot’
important
point
and
highlights
that
this
point
is
to
be
taken
as
a
best-‐practice
recommendation.
ClearPass
Profile
Profile
is
a
ClearPass
module
that
automatically
classifies
endpoints
using
attributes
obtained
from
software
components
called
Collectors.
As
an
example
it
can
be
used
to
implement
BYOD
flows
where
access
has
to
be
controlled
based
on
the
type
of
the
device
and
the
identity
of
the
user.
Profile
can
be
set
up
in
a
network
with
minimal
amount
of
configuration.
Setup
To
classify
devices
using
Profile,
you
need
to
set
up
the
following:
Select
one
of
the
CPPM
nodes
in
the
Zone
as
profiler.
Navigate
to
Administration
»
Server
Manager
»
Server
Configuration
as
shown
below
in
Figure1.
Figure
1
-‐
Enabling
'Profiler'
on
a
CPPM
node
Aruba
Networks
6
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Once
devices
are
classified,
you
can
use
them
in
policies
to
control
access
in
your
network.
You
can
use
the
Authorization:[Endpoints
Repository]
attributes
in
the
CPPM
Role
OUI
Mapping
Policy.
See
section
titled
“Endpoint
Profile
Store
as
Authorization
Source”
for
more
information.
Device
Profile
A
device
profile
is
a
hierarchical
model
consisting
of
3
elements
-‐
DeviceCategory,
DeviceFamily,
and
DeviceName
derived
by
Profile
from
endpoint
attributes.
• DeviceCategory
–
This
is
the
broadest
classification
of
a
device.
It
denotes
the
type
of
the
device.
Example:
Computer,
Smartdevice,
Printer,
Access
Point,
etc.
• DeviceFamily
–
This
element
classifies
devices
into
a
category;
this
is
organized
based
on
the
type
of
OS
or
type
of
vendor.
Example:
Windows,
Linux,
Mac
OS
X
are
some
of
the
families
when
DeviceCategory
is
Computer.
Apple,
Android
are
examples
of
DeviceFamily
when
DeviceCategory
is
SmartDevice.
• DeviceName
-‐
Devices
in
a
family
are
further
organized
based
on
more
granular
details
such
as
version.
Example:
Windows
7,
Windows
2008
server
are
device
names
under
Windows
family
(DeviceFamily).
This
hierarchical
model
provides
a
structured
view
of
all
endpoints
accessing
the
network.
• IP
Address
• Hostname
• MAC
Vendor
• Timestamp
when
device
was
first
discovered
• Timestamp
when
device
was
last
seen
Aruba
Networks
7
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Collectors
Collectors
are
network
elements
that
provide
data
to
profile
endpoints.
The
following
collectors
send
endpoint
attributes
to
Profile:
• DHCP
o DHCP
snooping
o Span
ports
• ClearPass
Onboard
• HTTP
User-‐Agent
• MAC
OUI
–
Acquired
via
various
auth
mechanisms
such
as
802.1X,
MAC
auth,
etc.
• ActiveSync
plugin
(Exchange
2010
&
2013)
• CPPM
OnGuard
• SNMP
• Subnet
Scanner
• IF-‐MAP
• Cisco
Device
Sensor
(Radius
Accounting)
• MDM
• TCP
Fingerprinting
DHCP
DHCP
attributes
such
as
option55
(parameter
request
list),
option60
(vendor
class)
and
options
list
from
DISCOVER
and
REQUEST
packets
can
uniquely
fingerprint
most
devices
that
use
the
DHCP
mechanism
to
acquire
an
IP
address
on
the
network.
Switches
and
controllers
can
be
configured
to
forward
DHCP
packets
such
as
DISCOVER,
REQUEST
and
INFORM
to
CPPM
(DHCP
Relay/
IP-‐Helper).
These
DHCP
packets
are
decoded
by
CPPM
to
arrive
at
the
device
category,
family,
and
name.
Apart
from
fingerprints,
DHCP
also
provides
hostname
and
IP
address.
interface <VLAN_NAME>
ip address <IP_ADDR> <NETMASK>
ip helper-address <DHCP SERVER IP>
ip helper-address <CPPM IP>
Notice
how
multiple
‘ip
helper-‐address’
can
be
configured
to
send
DHCP
packets
to
servers
other
than
the
DHCP
server,
i.e.
a
CPPM
node.
Aruba
Networks
8
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
DHCP
SPAN
Certain
networks
precipitate
the
need
to
receive
DHCP
packets
off
a
mirrored
port,
instead
of
relying
on
DHCP
relays,
which
is
used
by
CPPM
for
device
profiling.
In
earlier
release
we
support
only
dhcp
relays.
Starting
in
the
CPPM
6.3
release
we
support
SPAN
for
receiving
DHCP
packets.
Currently
only
the
25K
HW
appliances
has
additional
ports
beyond
the
two
MGMT/DATA
interfaces
where
this
can
be
utilized
as
a
dedicated
interface.
SPAN
Configuration:
SPAN
Port
Configuration
has
to
be
done
on
switches
where
DHCP
Servers
(Source)
and
CPPM
Servers
(Destination)
are
connected.
Configuring
for
Local
SPAN:
Local
SPAN
configures
using
“monitor
session”
command
specifying
source
and
destination
on
the
same
switch.
Figure 3 -‐ Configure Local Span port on older Cisco 2900/3500XL
Local
SPAN
configuration
syntax
on
Cisco
IOS
release
12.2(33)SXH
and
beyond
as
shown
below.
Figure 4 -‐ Configuring Local SPAN port IOS 12.2(33) and later (not ALL Cisco switches)
A
good
link
for
port
mirroring
example
across
different
networking
vendors….
http://www.securitywizardry.com/index.php/tools/switch-‐port-‐mirroring.html
Remote
SPAN
(RSPAN):
An
extension
of
SPAN
called
remote
SPAN
or
RSPAN.
RSPAN
allows
you
to
monitor
traffic
from
source
ports
distributed
over
multiple
switches,
which
means
that
you
can
centralize
your
network
capture
devices.
RSPAN
works
by
mirroring
the
traffic
from
the
source
ports
of
an
RSPAN
session
onto
a
VLAN
that
is
dedicated
for
the
RSPAN
session.
This
VLAN
is
then
trunked
to
other
switches,
allowing
the
RSPAN
session
traffic
to
be
transported
across
multiple
switches.
On
the
switch
that
contains
the
destination
port
for
the
session,
traffic
from
the
RSPAN
session
VLAN
is
simply
mirrored
out
the
destination
port.
Not
all
switches
support
remote
SPAN.
Aruba
Networks
9
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Configuring
RSPAN:
Step1:
In
order
to
configure
RSPAN
you
need
to
have
a
RSPAN
VLAN,
those
VLANs
have
special
properties
and
can’t
be
assigned
to
any
access
ports.
To
create
a
VLAN
for
RSPAN
on
Cisco
IOS,
you
must
create
the
VLAN
via
the
config-‐vlan
configuration
mode,
as
opposed
to
using
the
older
VLAN
database
configuration
mode.
During
the
process
of
defining
VLAN
parameters,
you
must
specify
that
the
new
VLAN
is
an
RSPAN
VLAN
by
configuring
the
remote-‐span
VLAN
configuration
command.
Figure 5 -‐ Configuring the RSPAN on ‘Local’ & ‘Remote’ Cisco switches
Step2:
Next
configure
the
RSPAN
on
Source
switch:
Unlike
SPAN,
where
the
source
and
destination
ports
exist
on
the
same
switch,
the
source
and
destination
ports
for
an
RSPAN
session
reside
on
different
switches.
This
requires
a
separate
RSPAN
source
session
to
be
configured,
as
well
as
a
separate
RSPAN
destination
session
to
be
configured.
Figure 6 -‐ Configuring the RSPAN monitor session on the ‘Remote’ switch
Aruba
Networks
10
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Figure 7 -‐ Configuring the RSPAN monitor session on the ‘Local’ switch
Note:
The
RSPAN
VLAN
should
be
allowed
in
ALL
trunks
between
the
involved
switches
(Source
and
Destination
switches
in
this
case);
if
you
have
enabled
"pruning"
in
your
network,
remove
the
RSPAN
VLAN
from
the
pruning,
with
the
command:
“switchport
trunk
pruning
vlan
remove
<RSPAN
VLAN
ID>”
under
the
interface
configure
as
trunk.
Encapsulated
remote
SPAN
(ERSPAN):
Encapsulated
Remote
SPAN
(ERSPAN),
as
the
name
says,
brings
generic
routing
encapsulation
(GRE)
for
all
captured
traffic
and
allows
it
to
be
extended
across
Layer
3
domains,
i.e.
cross
a
WAN.
CPPM
Log
to
debug
:
• Enable log level to DEBUG for Async-‐Netd service in CPPM.
Aruba
Networks
11
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
ClearPass
Onboard
ClearPass
Onboard
collects
rich
and
authentic
device
information
from
all
devices
during
the
onboarding
process.
Onboard
then
posts
this
information
to
Profile
via
the
Profile
API.
Since
the
information
collected
is
definitive,
Profile
directly
classifies
these
devices
into
their
Category,
Family
and
Name,
without
having
to
rely
on
any
other
fingerprinting
information.
HTTP
User-‐Agent
In
some
cases,
DHCP
fingerprints
alone
cannot
fully
classify
a
device.
A
common
example
is
the
Apple
family
of
smart
devices;
DHCP
fingerprints
cannot
distinguish
between
an
Apple
iPad
and
an
iPhone.
In
these
scenarios,
User-‐Agent
strings
sent
by
browsers
in
the
HTTP
protocol
are
useful
to
further
refine
classification
results.
• ClearPass
Guest
• ClearPass
Onboard
• Aruba
controller
through
IF-‐MAP
interface
MAC
OUI
Mac
OUI
can
be
useful
in
some
cases
to
better
classify
endpoints.
An
example
is
Android
devices,
where
DHCP
fingerprints
can
only
classify
a
device
as
a
generic
Android
device,
but
it
cannot
provide
more
detail
about
vendor.
Combining
this
information
with
MAC
OUI,
Profile
can
classify
a
device
as
HTC
Android,
Samsung
Android,
Motorola
Android,
etc.
MAC
OUI
is
also
useful
to
profile
devices
such
as
printers
which
may
be
configured
with
static
IP
addresses.
Aruba
Networks
12
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Figure
9
-‐
Error
message
to
install
.NET
on
Exchange
2013
The
issue
occurs
as
the
plugin
needs
the
MSFT
.NET
framework
2.0
to
be
present
in
the
Exchange
server
2013.
But
Exchange
2013,
ships
with
the
4.5
.NET
framework.
In
order
to
overcome
this
issue,
we
need
to
install
.NET
framework
2.0
on
Exchange
2013,
before
installing
the
Aruba
ActiveSync
Plugin.
Below are the steps required to install .NET 2.0 on the Exchange server.
1. Navigate
to
Server
Manager
-‐
-‐>
Add
Roles
and
Features.
2. Navigate
to
Features
and
select
.NET
Framework
3.5
Features,
as
shown
in
the
below
Screenshot.
(.NET
3.5
includes
.NET
2.0).
Aruba
Networks
13
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Figure
10
-‐
Installing
.NET
on
server
3. While
trying
to
install.
NET
3.5
you
are
required
to
use
the
“Specify
source
…”
option
in
the
summary
of
the
Add/Remove
Page
and
point
to
the
directory
[DVD]\Source\SXS
(or
local
copy),
because
the
DLLs.
NET
3.5/2.0
are
not
copied
for
the
winsxs
directory
where
Windows
keeps
the
DLLs
in
general.
4. After
installation
you
are
required
to
enable
the
ASP.NET
2.0.
Open
the
wizard
again
and
enable
ASP.NET
3.5
in
IIS.
Figure
11
-‐
Enabling
.NET
after
installation
Aruba
Networks
14
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
1. The
plugin
is
packaged
as
ArubaMSExchangePlugin.zip.
This
containes
two
files:
a. setup.exe
b. MSExchangePlugin.msi
2. Extract
and
copy
both
files
on
Microsoft
Exchange
Server
3. Double
click
on
"setup.exe"
and
install
the
Aruba
MSExchange
Plugin
Installation
Folders
The
plugin
gets
installed
under
"C:\Program
Files\ArubaNetworks\"
on
32-‐bit
systems,
and
under
"C:\Program
Files
(x86)\ArubaNetworks\"
on
64-‐bit
systems.
[iis-log-config]
logDir=C:/inetpub/logs/LogFiles/W3SVC1
####################################################
# If advanced logging is enabled then make sure you
# specify the path for advanced logging files
# in the logDir variable
###################################################
advancedLogging=0
####################################################
# Read interval in seconds
####################################################
readInterval=300
####################################################
# Refresh interval for active sync records
####################################################
refreshInterval=14400
Aruba
Networks
15
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
########################################################
# This is the Profile URL and login credentials
########################################################
url=http://<profile-ipaddress>/async_netd/deviceprofiler/endpoints
username=<XXXXXXXXX>
password=<YYYYYYYYY>
3. MSExchange
Plugin
configuration
file
Location
:
$install_root\etc\msexchange-‐
plugin.conf
Contents
of
the
configuration
file
are
pasted
below:
[domain-controller-info]
########################################################
# AD domain controller name
########################################################
serverName=WIN2008R2DEV-AD.dev.avendasys.com
########################################################
# AD domain controller base dn
########################################################
baseDn=dc=dev,dc=avendasys,dc=com
########################################################
# AD domain authentication source name
########################################################
authSourceName=
########################################################
# AD domain bind dn
########################################################
Aruba
Networks
16
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
bindDn=cn=Administrator,cn=Users,dc=dev,dc=avendasys,dc=com
########################################################
# AD domain bind password
########################################################
bindPassword=password
########################################################
# Filter configuration
########################################################
userFilter=(&(objectClass=user)(sAMAccountName=%s))
groupFilter=(&(objectClass=group)(member=%s))
deviceFilter=(&(objectClass=top)(objectClass=msExchActiveSyncDevice))
########################################################
# Attributes to fetch
########################################################
attributes=distinguishedName,msExchDeviceID,msExchDeviceModel,msExchDev
iceType,msExchDeviceUserAgent
Any configuration file changes above require the restart of Aruba MSExchange Plugin service.
The below provides an insight into the data attributes we obtain from the Plugin.
Figure
12
-‐
Activesync
Plugin
attributes
in
Endpoint
Aruba
Networks
17
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
CPPM
OnGuard
ClearPass
OnGuard
agents
perform
advanced
endpoint
posture
assessment.
It
collects
and
sends
OS
details
from
endpoints
during
authentication.
Profile
uses
os_type
attribute
from
Onguard
to
derive
a
profile.
For
example,
a
Device
Name
of
Windows
XP
can
be
further
classified
as
Windows
XP
Service
Pack
3.
SNMP
Endpoint
information
obtained
by
reading
SNMP
MIBs
of
network
devices
is
used
to
discover
and
profile
static
IP
devices
in
the
network.
The
following
information
read
via
SNMP
is
used:
• sysDescr
information
from
RFC1213
MIB
is
used
to
profile
the
device.
This
is
used
both
for
profiling
switches/controllers/routers
configured
in
CPPM,
and
for
profiling
printers
and
other
static
IP
devices
discovered
through
SNMP
or
subnet
scans.
• cdpCacheTable
information
read
from
CDP
(Cisco
Discovery
Protocol)
capable
devices
is
used
to
discover
neighbour
devices
connected
to
switch/controller
configured
in
CPPM
• lldpRemTable
information
read
from
LLDP
(Link
Layer
Discovery
Protocol)
capable
devices
is
used
to
discover
and
profile
neighbour
devices
connected
to
switch/controller
configured
in
CPPM
•
Note:
The
SNMP
based
mechanism
is
only
capable
of
profiling
devices
if
they
respond
to
SNMP,
or
if
the
device
advertises
its
capability
via
Link
Layer
Discovery
Protocol
(LLDP).
Prior
to
CPPM
6.5
when
performing
SNMP
reads
for
a
device,
CPPM
uses
SNMP
Read
credentials
configured
in
Network
Devices,
would
default
to
using
SNMP
v2c
with
the
“public”
community
string.
Starting
in
CPPM
6.5,
we
enhanced
the
ability
to
allow
multiple
SNMP
community
strings
to
be
defined
and
used
to
query
static
IP
devices
discovered
by
the
profiler.
In
addition
the
ability
to
define
SNMP
community
strings
that
support
the
following
Versions…….
Aruba
Networks
18
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Figure
13
-‐
Setting
SNMP
community
attributes
Aruba
Networks
19
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Network
Devices
configured
with
SNMP
Read
enabled
are
polled
periodically
for
updates
based
on
the
time
interval
configured
in
Administration
-‐>
Server
Configuration
-‐>
Service
Parameters
-‐>
ClearPass
network
services
-‐>
Device
Info
Poll
Interval
Figure
14
–
Setting
ARP
read
frequency
The
following
additional
settings
have
been
introduced
for
the
ARP
table
read:
1. Read
ARP
Table
Info
–
Enable
this
setting
if
this
is
a
L3
device
and
you
want
to
use
the
ARP
table
on
this
device
as
a
way
to
discover
endpoints
in
the
network.
Static
IP
endpoints
discovered
this
way
are
further
probed
via
SNMP
to
profile
the
device.
2. Force
Read
–
Enable
this
to
ensure
all
CPPM
nodes
in
the
cluster
read
SNMP
information
from
this
device
irrespective
of
trap
configuration
on
the
device.
This
option
is
especially
useful
when
demonstrating
static
IP
based
device
profiling,
since
this
does
not
require
any
trap
configuration
on
the
network
device.
3. In
large
or
geographically
spread
cluster
deployments
you
do
not
want
all
CPPM
nodes
to
probe
all
SNMP
configured
devices.
The
default
behavior
is
for
a
CPPM
node
in
the
cluster
to
read
network
device
information
only
for
devices
configured
to
send
traps
to
that
CPPM
node.
Aruba
Networks
20
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Note:
If
no
match
if
found
then
we
will
probe
devices
using
the
default
community
string
public
and
type
V2c.
When
defining
the
device,
the
option
to
select
‘Force
Read’
and
‘Read
ARP
Table
Info’
is
allowed.
This
ONLY
applies
to
devices
configured
with
a
HOST
IP
address,
not
a
SUBNET.
Note
that
if
a
cluster
of
CPPM
nodes
exists,
the
‘Force
Read’
option
results
in
all
nodes
in
the
cluster
probing
the
ARP
table
of
the
device
which
is
not
desired.
If
the
‘Force
Read’
option
is
not
enabled,
device
ARP
table
is
read
only
by
the
CPPM
nodes
that
are
configured
as
SNMP
trap
targets
in
the
network
device
(for
Cold
Start/Warm
Start/Link
traps).
Figure
15
-‐
Setting
community
string
and
enabling
ARP-‐read
Subnets
to
scan
are
configured
per
CPPM
Zone.
This
is
particularly
useful
in
deployments
that
are
geographically
distributed.
In
such
deployments,
it
is
recommended
that
you
assign
the
CPPM
nodes
in
a
cluster
to
multiple
“Zones”,
based
on
the
geographical
area
served
by
that
node,
and
enable
Profile
on
at
least
one
node
per
zone.
Below
we
have
created
an
additional
zone
‘California’
to
that
of
‘default’
and
then
assigned
the
IP
Subnets
specific
to
that
new
zone
as
can
be
seen
below.
Aruba
Networks
21
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Figure
16
-‐
Assigning
IP
SUBNETS
in
Profiler
to
zones
The
frequency
of
the
SUBNET
scan
is
controlled
from
cluster-‐wide
settings
and
by
default
this
occurs
ONCE
every
24-‐hours.
However,
in
CPPM
6.5
we
added
the
ability
to
perform
“one-‐time”
subnet
scans.
See
below
for
more
detail.
Figure
17
-‐
Configuring
SUBNET
scan
frequency
Aruba
Networks
22
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Figure
18
-‐
Defining
On-‐Demand
Subnet
Scan
Figure
19
-‐
On-‐Demand
Subnet
scan
messages
in
Event
Viewer
IF-‐MAP
If
configured,
Aruba
Controller
(AOS
6.3
and
higher)
can
send
HTTP
user-‐agent
and
DHCP
packets
through
IF-‐MAP
interface.
IF-‐MAP
info
sent
by
a
wireless
client
has
mac,
ip
and
user-‐agent.
But
wired
clients
can
only
provide
ip
and
user-‐agent,
hence
dhcp
relay
has
to
be
properly
configured
to
populate
IP-‐MAC
table
to
fetch
the
mac
address
for
given
IP.
Go
to:
Configuration
-‐>
Advanced
Services
>
All
Profile
Management
>
Other
Profiles-‐
>
CPPM
IF-‐MAP
Aruba
Networks
23
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Click
Enable:
CPPM
IF-‐MAP
Interface
and
ADD
CPPM
details,
this
will
add
the
CPPM
node.
Configure
the
username
with
an
admin
user
who
has
limited
privilege
level,
API
Administrator
or
Read
only
access
works
fine.
Figure
20
-‐
Enabling
Aruba
Ctrl
to
send
IF-‐MAP
info
to
CPPM
(GUI)
CLI:
Figure
21
-‐
Enabling
Aruba
Ctrl
to
send
IF-‐MAP
info
to
CPPM
(CLI)
Aruba
Networks
24
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Note: Currently this works only with Cisco devices, as specific IOS s/w is required.
Tested Versions
1. CPPM
should
be
configured
with
interim
accounting
packets
update
enabled.
2. Accounting
configuration
on
NAD.
3. Enable
IOS
sensor
on
NAD.
Cisco
switch
configuration.
device-sensor accounting
device-sensor notify all-changes
Device sensor filter configuration to add what DHCP info in accounting packets.
Aruba
Networks
25
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Device sensor filter configuration to set what LLDP TLV info is in accounting packets.
Device sensor filter configuration to set what CDP info is in accounting packets.
Configurations to enable DHCP, LLDP and CDP filter in accounting packets
Figure 26 -‐ Enabling device sensor filter for DHCP, LLDP & CDP
Aruba
Networks
26
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
For
example,
if
the
EMM
platform
detects
that
a
device
is
jailbroken,
the
EMM
platform
only
has
the
option
to
attempt
to
enforce
the
business
policy
at
the
device
level.
By
extending
this
policy
state
to
ClearPass
as
the
network
policy
definition
point,
the
jailbreak
status
of
a
device
can
be
used
to
deny
access
or
quarantine
this
device
the
next
time
it
attempts
to
connect
to
the
secure
network.
TechNote:
Please
review
the
ClearPass
EMM/MDM
TechNote
for
more
indepth
information
about
our
CPPM
and
EMM
Integration,
click
here
to
access
this
document
folder
on
the
support
site.
How
it
works:
A
service
running
in
CPPM
periodically
polls
EMM
servers
using
their
exposed
APIs.
Device
attributes
obtained
from
EMM
are
added
as
endpoint
tags.
Profiler
related
attributes
are
send
to
profiler
which
uses
these
attributes
to
derive
final
profile
Below
we
show
an
example
of
the
additional
attributes
that
can
be
integrated
into
the
ClearPass
Endpoint
profiler
database
that
could
be
received
from
an
EMM
vendor.
Not
all
EMM
vendors
expose
the
same
level
of
data,
but
we
normalize
the
information
received
and
present
it
in
a
standard
attribute
template
in
the
endpoint
database.
Aruba
Networks
27
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Figure
30
-‐
Example
of
EMM
attributes
#1...
Figure
31
-‐
Example
of
EMM
attributes
#2...
Figure
32
-‐
Example
of
EMM
attributes
#3...
Aruba
Networks
28
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
From
the
Administration
menu
of
ClearPass
Policy
Manager,
the
menu
option
called
Endpoint
Context
Servers
is
used
to
add
and
configure
the
EMM
Servers.
Use
“Add”
option
to
add
a
specific
type
of
EMM
Server,
the
following
figure
shows
various
EMM
Servers
that
are
supported
by
CPPM.
Some
minor
differences
exist
in
various
types
of
EMM
vendors
with
respect
to
some
parameters
for
polling
and
fetching
the
details.
Some
of
them
are
shown
below,
more
are
detailed
in
the
EMM
TechNote.
Figure
34
-‐
Setting
Cluster
Wide
Parameters
Aruba
Networks
29
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Figure
35
-‐
Setting
EMM
polling
frequency
TCP
Fingerprinting
Starting
in
CPPM
6.5
we
added
an
additional
source
of
Profile
context,
TCP
Fingerprinting.
To
enable
this
feature
you
must
enable
not
be
using
the
Data
Port
(it
must
not
have
an
IP
address)
on
a
500
or
5K
appliance.
On
a
25K
appliance
you
can
utilize
one
of
the
other
spare
interface,
thus
the
Data
Port
can
be
utilized.
Within
a
VM
environment
if
the
DATA
Port
is
being
used
then
the
ability
to
use
TCP
Fingerprinting
is
not
an
option.
Enabling
the
SPAN
port
on
a
Hyper-‐V
require
special
consideration.
Refer
to
the
TechNote
on
Installing
and
Upgrading
a
VM
here
https://support.arubanetworks.com/Documentation/tabid/77/DMXModule/512/Default.
aspx?EntryId=16489
Figure
36
-‐
Enabling
'SPAN
Port
on
CPPM
Aruba
Networks
30
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Following
the
configuration
of
the
SPAN
port,
ensure
that
the
switch
port
is
actually
‘spanning’
data
from
the
network.
CPPM
will
then
analysis
the
SYN,
SYN-‐ACK
handshakes
utilizing
industry
recognized
databases,
pf0.fp
=
SYN
DB
and
pf0fa.fp
=SYN
&
ACK
DB.
This
allows
CPPM
to
work
out
who
(the
client)
is
connecting
to
a
server
(the
SYN),
then
looking
at
the
SYN-‐ACK
allows
CPPM
to
derive
what
the
actual
server
(target)
is.
This
is
passive
analysis
of
the
data
flows
on
the
network,
but
please
do
remember
that
TCP
Fingerprinting
is
a
resource
intensive
process
and
enabling
this
within
the
CPPM
network
needs
carful
consideration.
If
your
in
doubt
consult
with
a
specialist
before
enabling
this.
Figure
37
-‐
Enabling
TCP
Fingerprinting
'Warning'
An example of a TCP Fingerprint, this is used to identify the host in more details.
Figure
38
-‐
Example
of
a
TCP
Fingerprint
Aruba
Networks
31
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Profiling
Profile
uses
a
two-‐stage
approach
to
classifying
endpoints
using
input
attributes.
Stage
1
Stage
1
tries
to
derive
device
profiles
using
static
dictionary
lookups.
Based
on
the
attributes
available,
CPPM
looks
up
DHCP,
HTTP,
ActiveSync
and
MAC
OUI
dictionaries,
and
derives
multiple
matching
profiles.
Each
attribute
from
a
source
(eg
DHCP,
SNMP
etc)
is
assigned
2
weights
–
reliability
and
a
score.
If
profiling
results
in
multiple
matches,
these
weights
are
used
to
find
best
match.
All
matches
are
sorted
on
(reliability,
score)
tuple
and
one
with
highest
value
is
chosen.
dhcp:options 98 95
dhcp:option55 98 95
dhcp:option60 99 96
snmp:sys_descr 100 97
snmp:cdp_cache_platform 100 97
snmp:device_type 98 1
snmp:name 98 2
host:user_agent 10 99
active_sync:device_type 100 99
active_sync:user_agent 100 99
Figure
39
-‐
Profiling
Reliability/Score
In
addition
to
these
attributes,
mac_vendor
and
hostname
are
also
used
in
Stage-‐2
rule
evaluation.
Aruba
Networks
32
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Example:
In
this
example
an
Aruba
controller
proxied
HTTP
requests
from
an
Apple
iPad.
HTTP
User-‐Agent
classifies
the
device
as
an
Apple
iPad.
SNMP
collector
provides
sys_descr
which
classifies
the
device
as
Aruba
controller.
As
the
device_category
of
profile
derived
from
these
2
inputs
are
different
(Computer,
Controller),
CPPM’s
profiles
picks
the
one
with
highest
reliability
and
finally
classifies
this
device
as
Aruba
Controller.
curl -X POST http://localhost:6180/async_netd/deviceprofiler/endpoints \
-H "Content-Type: application/json" -d \
'[{"mac" : "000b86625750",
"host": {
"user_agent" : "iPad;"
},
"snmp": {
"sys_descr" : "ArubaOS (MODEL: Aruba620), Version"
}
Stage
2
CPPM
comes
pre-‐built
with
a
set
of
rules
that
evaluates
a
device
profile.
CPPM
uses
all
input
attributes
and
device
profiles
from
Stage
1.
The
resulting
rule
evaluation
may
or
may
not
result
in
a
profile.
Stage
2
is
intended
to
refine
the
results
of
profiling.
Example:
DHCP
option55
classifies
device
as
Android.
Stage
2
rules
reclassifies
the
device
as
HTC
Android
by
combining
mac-‐vendor
information.
-X POST http://localhost:6180/async_netd/deviceprofiler/endpoints \
curl
-H "Content-Type: application/json" -d \
'{"mac" : "00092d112233",
"hostname" : "myandroid.domain.com",
Post
"dhcp" :P{ rofile
Actions
"options" : ["53,55,57,61,51"],
After
profiling
an
endpoint,
Profile
can
be
configured
to
perform
RADIUS
Change
of
Authorization
(CoA)
on
the
NAD
to
which
an
e""]
"option55" : ["1,121,33,3,6,12,15,28,51,58,59,119", ndpoint
is
connected.
Post
profile
rules
are
configured
in
the
CPPM
Service
configuration
wizard.
}
}';;
Aruba
Networks
33
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Aruba
Networks
34
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
You
can
select
a
set
of
categories
and
a
CoA
profile
to
be
applied
when
the
profile
matches
one
of
the
selected
categories.
CoA
is
triggered
using
the
selected
CoA
profile.
ANY
option
from
‘Endpoint
Classification’
can
be
used
to
invoke
CoA
on
a
change
of
any
one
of
the
fields
(category,
family,
and
name).
Use
profiled
endpoint
attributes
in
Role
Mapping
Rules
Figure 43 -‐ Example of using Profiled info in role-‐mapping
Aruba
Networks
35
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Fingerprint
Dictionaries
CPPM
uses
a
set
of
dictionaries
and
built-‐in
rules
to
perform
device
fingerprinting.
Listed
below
are
the
dictionaries
used
by
CPPM.
• DHCP
• HTTP
User-‐Agent
• ActiveSync
attributes
• SNMP
attributes
• MAC
OUI
Figure
44
-‐
Example
set
of
Device
Fingerprint
Dictionaries
in
CPPM
As
these
dictionaries
can
change
frequently,
CPPM
provides
a
way
to
automatically
update
fingerprints
from
an
Aruba
hosted
portal.
If
external
access
cannot
be
provided
to
CPPM,
the
fingerprints
file
can
be
downloaded
and
imported
through
CPPM
admin.
The
following
screenshots
show
the
configuration
details
for
online
and
manual
fingerprint
updates.
Aruba
Networks
36
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Figure
45
-‐
CPPM
WEB
s/w
Update
Profile
Redundancy
If
profiling
is
enabled
on
multiple
nodes
within
a
zone,
they
will
form
a
cluster
which
provides
redundancy
and
load
balancing.
The
node
with
lowest
UUID
assumes
an
active
role.
All
other
nodes
proxy
endpoint
attributes
to
active
profiler.
Active
profiler
periodically
sends
heartbeats
to
peers.
If
active
node
goes
down,
heartbeats
will
be
lost
and
next
peer
with
lowest
UUID
assumes
master
role.
When
failed
node
comes
back,
it
will
start
sending
heartbeats
and
assumes
master
role.
If
any
peer
has
assumed
master
role,
it
will
change
to
passive
role
on
receiving
heartbeats
from
original
master.
Example:
DHCP
relay
or
span
is
configured
to
a
CPPM
node
which
is
not
enabled
as
profiler.
This
node
can
perform
required
packet
processing,
extract
mac,
ip,
hostname,
option55,
option60
and
send
to
active
profiler.
Aruba
Networks
37
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Profile
UI
CPPM
provides
user
interfaces
to
search
and
view
profiled
endpoints.
It
also
provides
basic
statistics
on
the
profiled
endpoints.
Figure
46
-‐
Dashboard
Widgets
for
profiling
Aruba
Networks
38
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Figure
47
–
Summary
of
Profiler
Endpoint
Information
Aruba
Networks
39
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Figure
48
-‐
Detailed
Profiler
endpoint
information
Figure
49
-‐
Complex
search
of
endpoint
DB
based
upon
Profiler
attributes
Aruba
Networks
40
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Profile
APIs
Profile
exposes
a
set
of
REST
APIs
to
receive
endpoint
attributes
and
to
provide
results
of
profiling.
Basic
HTTP
authentication
using
CPPM
admin
user/passwords
are
required
for
the
APIs.
Third-‐party
products
can
easily
integrate
with
ClearPass
Profile
by
writing
to
these
APIs.
• URL:
https://{host}/async_netd/deviceprofiler/endpoints
• Method:
POST
• Content-‐Type:
application/json
• Input:
Single
or
list
of
endpoint
attributes
{
mac:
ip:
dhcp : {
option55:
option60:
options:
}
hostname:
active_sync : {
device_type:
user_agent:
}
host: {
os_type:
user_agent:
}
snmp: {
sys_descr:
device_type:
cdp_cache_platform:
}
device: {
category:
family:
Aruba
Networks
41
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
name:
}
}
Output:
• URL:
https://device-‐profiler/async_netd/deviceprofiler/endpoints/{mac/ip}
• Method:
GET
• Output:
• 200
OK
-‐
Success
with
json
encoded
endpoint
details
• 404
Not
Found
-‐
if
endpoint
with
given
MAC
or
IP
address
does
not
exist.
• 500
Internal
Error
-‐
on
service
internal
errors
Aruba
Networks
42
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
• hostname
• mac_vendor
• fingerprint
details
from
o "dhcp.option55"
o "dhcp.option60"
o "snmp.sys_descr"
o "host.user_agent"
o "host.os_type"
o "nmap.device"
o "tcp.device"
o "active_sync.device_type
and then re-‐profile all other device that have similar pattern.
5. Update/Delete
bad/accidental
devices
using
combination
of
Device
DELETE
&
POST
API.
6. Update/Delete
bad/accidental
rules
using
combination
of
Rules
DELETE
&
POST
API.
Note:
In
6.5
custom
device
profile
APIs
have
to
be
invoked
from
the
Publisher
node
only.
Following
is
a
break
down
and
examples
of
the
API’s,
we've
used
the
cURL
command
as
our
interface
to
drive
the
API’s
to
test
the
functionality.
You
could
achieve
the
similar
results
using
other
tolls
such
as
wget
Aruba
Networks
43
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
API’s
Device
Dictionary
API:
1.
API
to
ADD
New
Definition
to
Dictionary:
Create
a
new
definition
in
the
dictionary
if
it
is
not
already
present.
The
API
returns
an
id
of
the
device
created.
Dictionary
created
using
API
will
have
ids
starting
from
100000.
Method:
POST
URL:
/async_netd/deviceprofiler/devices
Values:
{
“device_category”:
“
”
“device_family“:
“
”
“device_name”:
“
”
}
Example:
CMD:
curl
-‐X
POST
http://<CPPM
IP>/async_netd/deviceprofiler/devices
-‐u
apiadmin:password
-‐H
"Content-‐Type:
application/json"
-‐k
-‐d
'{"device_category":
"SmartDevice",
"device_family":
"Future-‐iPhone",
"device_name":
"iPhone20"
}';
Output:
100000
[New
device
ID]
Figure
50
–
Checking
the
definition
was
created
in
the
SmartDevice
category
Aruba
Networks
44
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Method:
GET
URL:
/async_netd/deviceprofiler/devices/x
CMD:
curl
-‐u
apiadmin:password
-‐k
https://<CPPM
IP>/async_netd/deviceprofiler/devices/x
Output:
[
{
"device_family":
"Future-‐iPhone",
"id":
100000,
"device_category":
"SmartDevice",
"device_name":
"iPhone20"
},
{
"device_family":
"TME",
"id":
100001,
Aruba
Networks
45
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
"device_category":
"SmartDevice",
"device_name":
"Dannyj"
}
]
METHOD:
DELETE
URL:
/async_netd/deviceprofiler/devices?id={}
Example:
CMD
:
curl
-‐X
DELETE
-‐u
apiadmin:password
-‐k
https://<CPPM
IP>/async_netd/deviceprofiler/devices?id=100000
Output:
danny-‐jump:~
djump$
curl
-‐X
DELETE
-‐u
apiadmin:arubans123
-‐k
https://10.2.100.161/async_netd/deviceprofiler/devices?id=100000
<html>
<head>
<title>200
OK</title>
</head>
<body>
<h1>200
OK</h1>
<br
/><br
/>
</body>
</html>
Note:
An
admin
is
not
allowed
to
delete
devices
from
the
dictionary
that
is
associated
with
a
rule.
Aruba
Networks
46
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
RULES
API:
1.
API
to
ADD
Rules:
Given
an
unknown
endpoint,
this
API
will
automatically
create
rules
by
ANDing
rule
attributes
from
endpoint
mac_vendor,
hostname
and
fingerprints
(ex:
"dhcp.option55",
"dhcp.option60",
"snmp.sys_descr",
"host.user_agent",
"host.os_type",
"nmap.device",
"tcp.device",
"active_sync.device_type…).
Rules
created
using
API
will
have
ids
starting
from
100000.
Method:
POST
URL:
/async_netd/deviceprofiler/rules
Values:
{
mac:
rule_fields:
[..]
}
Where
rule_fields
=
mac_vendor,
hostname,
dhcp.option55,
dhcp.options,
dhcp.option60,
snmp.sys_descr,
host.user_agent
etc…
Example:
CMD:
curl
-‐X
POST
-‐u
apiadmin:password
https://<CPPM
IP>/async_netd/deviceprofiler/rules
–H
"Content-‐Type:
application/json"
-‐k
-‐d
'{"mac"
:
"6cadf8112341",
"rule_fields":
["mac_vendor",
"dhcp.option55"]
}'
Output:
100000
[New
rule
ID]
Method:
DELETE
URL:
/async_netd/deviceprofiler/rules/{id}
Example:
CMD:
curl
-‐X
DELETE
-‐u
apiadmin:password
-‐k
https://<CPPM
IP>/async_netd/deviceprofiler/rules/100000
Aruba
Networks
47
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Method:
GET
URL:
/async_netd/deviceprofiler/rules?device_name={}
Example:
CMD
:
curl
-‐u
apiadmin:password
-‐k
https://<CPPM
IP>/async_netd/deviceprofiler/rules?device_name=Test
Output:
[
{
"id":
100000,
"rule":
{
"combining_op":
"all",
"conditions":
[
[
"mac_vendor",
"contains",
"CISCO
SYSTEMS,
INC."
],
[
"dhcp.option60",
"contains",
"dhcpcd-‐6.2.10"
]
]
},
"device_id":
100000
}
]
Query
all
rules:
This
API
allows
admin
to
query
all
rules
dynamically
created.
Method:
GET
URL:
/async_netd/deviceprofiler/rules/x
Example:
Aruba
Networks
48
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Aruba
Networks
49
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Re-‐profile
API:
API
will
result
in
re-‐profiling
all
devices
with
unknown
profile.
This
could
be
a
costly
operation
if
there
are
lots
of
unknowns.
Method:
POST
URL:
/async_netd/deviceprofiler/endpoints/unknowns
Example:
CMD:
curl
-‐X
POST
-‐u
apiadmin:password
-‐k
https://<CPPM
IP>/async_netd/deviceprofiler/endpoints/unknowns
Figure
51
–
Checking
the
device
is
classified
as
required
Aruba
Networks
50
ClearPass
Tech
Note:
CPPM
6.5.x
Profiling
-‐
TechNote
Method:
POST
URL:
/async_netd/deviceprofiler/endpoints
Value
:
{"mac"
:
"
",
"device"
:
{
"category":
"
",
"family":
"
",
"name":
""
}
}
Example:
CMD:
danny-‐jump:~
djump$
curl
-‐X
POST
https://10.2.100.161/async_netd/deviceprofiler/endpoints
-‐u
apiadmin:arubans123
-‐H
"Content-‐Type:
application/json"
-‐k
-‐d
'{"mac":
"00000
0000013",
"device":
{"category":
"SmartDevice",
"family":
"Future-‐iPhone",
"name":
"iPhone20"}}'
<html>
<head>
<title>200
OK</title>
</head>
<body>
<h1>200
OK</h1>
<br
/><br
/>
</body>
</html>danny-‐jump:~
djump$
Aruba Networks 51