Tellabs Interfacing With Aruba Clearpass
Tellabs Interfacing With Aruba Clearpass
Tellabs® Information
Copyright
Copyright © 2023 Tellabs Enterprise, Inc. All rights reserved.
No part of this publication may be used, disclosed, reproduced, adapted, translated, stored in a retrieval system,
or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the written
permission of Tellabs Enterprise, Inc. Although every precaution has been taken in the preparation of this
publication, Tellabs Enterprise, Inc. assumes no (i) responsibility for errors or omissions contained herein or (ii)
liability for any damages resulting from the use of information contained herein. Information in this publication is
subject to change without notice.
Trademarks
The following trademarks and service marks are owned by Tellabs Operations, Inc. or its affiliates in the United
States and/or other countries: TELLABS®, TELLABS and T symbol®, T symbol®.
Any other company or product names may be trademarks of their respective companies.
Proprietary
This document is the property of Tellabs Enterprise, Inc. and contains confidential and proprietary information
owned by Tellabs Enterprise, Inc. Any copying, use, or disclosure of the contents of this document, without the
written permission of Tellabs Enterprise, Inc., is strictly prohibited.
Table of Contents
Interfacing with Aruba ClearPass......................................................................................................................................1
Tellabs® Information..............................................................................................................................2
Copyright............................................................................................................................................................. 2
Trademarks..........................................................................................................................................................2
Proprietary...........................................................................................................................................................2
Interfacing with Aruba ClearPass......................................................................................................... 4
Introduction
Document Number
ENG-010592
Purpose
Aruba ClearPass is a software package providing policy management to control network access.
The purpose of this document is to explain how to configure and administer the Tellabs OLAN
system to interface with Aruba ClearPass.
Applies To
This document applies to all Tellabs OLAN systems running OLT SR29.2 and EMS SR30.0 or above.
Earlier releases do not fully support Aruba ClearPass and are limited to simple access via 802.1x.
Aruba Clearpass 6.7.3 or above is recommended.
Aruba ClearPass is an application that can characterize devices that are discovered on the
network and apply policies based on rule sets. This allows more consistent application of policy
across the network. It also allows application of policy based on the user login or device type
which allows for dynamic configuration and allocation of resources in real time.
The OLAN PAE or Port Authentication Entity interfaces with Aruba ClearPass for two different
protocols:
· RADIUS – Remote Authentication Dial In User Service. This interface allows a switch to
transparently forward credentials from a user to the RADIUS server for authentication. The
RADIUS Server will either grant access via an Access Accept or Access Reject. Radius also
supports a mechanism to pass back the name of the policy to apply to the port via the
FILTER-ID attribute.
· COA – Change of Authorization is an extension to the RADIUS protocol to allow additional
updates to a port. RADIUS suffers from only being triggered by authentication requests and
cannot send updates in real time to the port. COA allows updates of the port in real time.
COA which is in SR29.2 and above supports the following messages for additional control:
Additional general information on RADIUS authentication, support and configuration can be found
in the AppNote ENG-010428 Configuring Policy Via RADIUS Authentication. This document
explains the basic operation of RADIUS and how to use RADIUS to distribute policy via the RADIUS
FILTER-ID attribute.
The following table outlines the Tellabs OLAN product support for Aruba ClearPass Features:
Tellabs
Session Termination √
Session Termination with port bounce √
Session Termination with port shutdown √
Session re-authentication √
Session re-authentication with rerun -
Session re-authentication with last -
Session Policy Push CoA -
URL Redirect (Dynamic) √
802.1x/MAB √
Profiler without CoA √
Profiler with CoA √
Posture √
Guest/BYOD √
The RADIUS Dictionary and support files if needed can be downloaded here:
If the Tellabs entry is missing, then the Tellabs RADIUS Dictionary will need to be added. It can be
downloaded from the link above.
If required Click on the Import button, choose the Tellabs-RadiusDictionary.xml file that was
downloaded and add it to Aruba ClearPass. You should then see the Tellabs dictionary listed.
Under the Administration->Dictionaries->Radius CoA Templates, click on Import and then Import
the file:
· RadiusCoATemplate-Tellabs-DisableSwitchPort.zip
· RadiusCoATemplate-Tellabs-BounceSwitchPort.zip
· RadiusCoATemplate-Tellabs-ReauthenticateSession.zip
· RadiusCoATemplate-Tellabs-TerminateSession.zip
Each file, per the Clearpass standard procedures, is password protected and the password can be
found in the file RADIUSCoATemplates-Password.txt. The password is defaulted to Tellabs-1.
Configuration->Authentication->Sources->Add
· TACACS+: Tellabs does not currently support TACACS+ and so this should be left blank.
· Vendor Name: Select Tellabs from the dropdown. If it does not appear, ensure you have
imported the Tellabs RADIUS Dictionary files as shown above.
· Enable RADIUS CoA: Click this to enable CoA.
· RADIUS CoA Port: Use the default port of 3799
· No Custom Attributes are needed.
· Allow SNMP Read: Click to enable reading of SNMP Data from the OLT.
· SNMP Read Setting: Set for SNMPv2 with Community Strings, or SNMPv3 with SHA and
Privacy. Tellabs supports both V2 and V3.
· Community String: Enter the community string that you will use to configure SNMP on the
OLT.
· Force Read: Check to always Read information from this device.
· Read ARP Table Info: Leave this unchecked as the OLT currently does not support this
table.
· Allow SNMP Write: Check to Enable Policy Manager to Perform SNMP Write operations.
· Default VLAN: Add the Management VLAN
· SNMP Write Setting: Set for SNMPv2 with Community Strings, or SNMPv3 with SHA and
Privacy. Tellabs supports both V2 and V3.
· Community String: Set the Community String that you will set in the OLT on the SNMP
settings. Ensure they agree to allow SNMP access.
Press the Save button to Save the device and repeat for any other OLTs you wish to add.
The Profile above gives an example for a Data Service which sets the NAC profile for the data
service and also assigns an ACL List to the port.
Click Add to add a new Profile and add the following Attributes:
· Session-Timeout: This configures the RADIUS re-authentication timeout for this port.
The following example shows how to set up and Enforcement Profile for a Phone:
Click Add to add a new Profile and add the following Attributes:
· Session-Timeout: This configures the RADIUS re-authentication timeout for this port.
· Termination Action: Set to RADIUS-Request
· Filter-ID: You can typically set the NAC profile via one of two methods. You can set it
explicitly, or you can use profile MATCH to do a search within the list of service profiles for a
NAC profile associated with the port for a partial match. In this example, it will search the
port for a default vlan service profile which starts with the text “VOICE”.
· Filter-Id: This example also sets an ACL list on the port via the PROFILE-ACL qualifier. This
allows setting ACLs on the port based on current state. In this example, it is permitting all
traffic.
The following example shows how to set up and Enforcement Profile for a Printer:
Click Add to add a new Profile and add the following Attributes:
· Session-Timeout: This configures the RADIUS re-authentication timeout for this port.
· Termination Action: Set to RADIUS-Request
· Filter-ID: You can typically set the NAC profile via one of two methods. You can set it
explicitly, or you can use profile MATCH to do a search within the list of service profiles for a
NAC profile associated with the port for a partial match. In this example, it will search the
port for a default vlan service profile which starts with the text “PRINTER”.
· Filter-Id: This example also sets an ACL list on the port via the PROFILE-ACL qualifier. This
allows setting ACLs on the port based on current state. In this example, it is permitting all
traffic.
The following section defines how to configure an Enforcement Profile for CoA Reauthenticate:
This defines the Tellabs attribute values that are needed to force the Tellabs RADIUS client to re-
authenticate the user. This is used in Enforcement policies to force re-authentication. Re-
authenticate does not bounce the port but just forces user re-authentication.
The following section defines how to configure an Enforcement Profile for CoA Port Bounce:
This defines the Tellabs Attribute values to force a Port Bounce. Port Bounce will cause the
Ethernet port to go link down, then attempt to re-link. As a consequence, the user will also be re-
authenticated.
The following Enforcement Profile defines how to perform a CoA Port Disable:
The CoA Port Disable will shut down the port and the port will remain down unless the
AdminState is re-enabled on the EMS. This is often used to deny access to a port where a security
violation has been detected.
The following Enforcement Profile defines how to perform a CoA Terminate-Session action:
The CoA Disconnect will terminate the session and return the port to an initial state. This is used
to terminate a user’s access and force them to re-authenticate to gain access to the network.
One example of a common policy might be to detect the vendor of a particular type of phone via
the MAC address OUI and perform an action on it, in this case to assign an Enforcement Profile
which assigned the VLAN and ACL list.
Services in Clearpass define a set of conditions which when fully satisfied, associate an
Enforcement Policy to the device.
An example of how to configure a wired MAB Service is shown below. MAB or MAC Authentication
Bypass is used to authenticate devices using the MAC address as the authentication credentials.
RADIUS will then either authorize or deny the port based on whether that MAC address is known.
When it is a MAB authentication, NAS-Port-Type is set to Ethernet, and Service Type is set to Call-
Check. The RADIUS attribute User-Name is being used to get the client-mac-address for use by
Clearpass.
The following example shows how to construct a service for authenticating a user on the network
in the Tellabs Domain using Active directory:
The RADIUS attribute Ethernet defines that it is a wired port, and the Framed-User attribute the
user to be authenticated. The authentication method and source tell where to authenticate the
user. The Enforcement Policy “Tellabs compliant user” is assigned if authentication is successful.
Creation of Roles
Once a device has been profiled, it is assigned a Role. In this example we will be using three Roles,
DHCP to be used during profiling, IP Phone and Printer will be used as the Roles once the type of
device is recognized and it’s role assigned.
Once the Roles are created, the Roles need to be mapped using a Role Mapping Policy. Use the
screen below to create the proper conditions and Role Assignments.
· IsProfiled: If an endpoint does not exist in the database, assign the Tellabs DHCP role.
· Category equals VoIP Phone: Once a device has been categorized as a VoIP Phone, then
assign the Role of Tellabs IP Phone.
· Category equals Printer: Once a device has been categorized as a Printer, then assign the
Role of Printers.
Creation of Enforcement Profiles
When a device comes on the network and is unknown due to not being in the Endpoints
repository, it will be assigned the role of DHCP. The device is placed onto a VLAN and allowed to
DHCP so that ClearPass can Profile based on the Attributes that are sent in the DHCP request
along with the MAC Address. The following example shows how to set up a DHCP Profile:
· Session Timeout: The Session timeout along with the termination action define what to do
after the session times out, and in this case to Re-authenticate.
· Termination Action: Set to RADIUS-Request
· Filter-ID: The PROFILE-MATCH DHCP will select the DHCP Service profile from the matching
NAC profile and assign that VLAN to be used for the device to DHCP on the network. This
VLAN is usually temporary and used just for the profiling action.
· Filter-Id: The ACL-LIMITED-ACCESS Filter-ID will limit the device's access on the network to
just the DHCP server.
· Filter-Id: The IFALIAS being set to DHCP will set the User Label of the Port so that in the
EMS, you can see the devices that are currently attempting to DHCP during the profiling
process.
The following example shows how to set up and Enforcement Profile for a Phone, this will be used
in a later step after the device is profiled:
The following example shows how to set up an Enforcement Profile for a Printer, this will be used
in a later step after the device is profiled:
Click Add to add a new Profile and add the following Attributes:
· Session-Timeout: This configures the RADIUS re-authentication timeout for this port.
· Termination Action: Set to RADIUS-Request
· Filter-ID: You can typically set the NAC profile via one of two methods. You can set it
explicitly, or you can use profile MATCH to do a search within the list of service profiles for a
NAC profile associated with the port for a partial match. In this example, it will search the
port for a default vlan service profile which starts with the text “PRINTER”.
· Filter-Id: This example also sets an ACL list on the port via the PROFILE-ACL qualifier. This
allows setting ACLs on the port based on current state. In this example, it is permitting all
traffic.
Creation of Service
The Service is used to match for endpoints of a certain type and assign Policy.
The following Service defines the service to be use for MAC Authenticated Devices.
On the Authentication Tab select Allow all MAC Auth in the Select to Add Pulldown.
Under the Roles Tab, create a role mapping policy by selecting Profiling in the Role Mapping Policy
Dropdown. Also set the default role to Tellabs MAB which will catch any devices that are not
profiled as phone or printer.
The default profile will be Deny Access Profile which if the device can’t be profiled, or
authenticated will deny access to the device.
In the Profiler tab, select the VoIP Phone and Printer as endpoint classifications.
Then select a RADIUS CoA action of Bounce Host Port. This will after profiling cause the port to be
bounced and force reauthentication and assignment to the proper working VLAN.
This Access Tracker output shows the Tellabs Wired MAB Services Profiling for Phones and
Printers be used taking the Endpoint from the initial state for an unknown endpoint which is
DHCP to the final Profile selected (in this case Printer) based on the Profile data learned.
This screen shows the OnGuard settings that were used for this example:
Installation of the OnGuard Agent onto the computer is out of scope for this document and can be
done in many ways such as manual install, or Windows Group Policy Object (GPO) Push. When
manually installing, the link for the OnGuard agent can be find within ClearPass.
The following section will create the two services used to accomplish posturing:
The Enforcement Policy Tellabs Posture is going to be used when an Endpoint is unknown to
ClearPass. This is the Policy that helps ClearPass to begin the Posture Checks to find out whether
the Endpoint is Healthy or Not Healthy.
· Session-Timeout: This configures the RADIUS re-authentication timeout for this port.
· Termination Action: Set to RADIUS-Request
· Profile-Match=DATA: Defines this to match the data profile which is typically used for PCs
on the network.
· Profile-ACL=CPPM-POSTURE: Defines an Authorized MAC ACL that will be used during the
posturing sequence.
· TLAB:IFALIAS=POSTURE-UNKNOWN: This will mark the port in the EMS with an UserLabel
of POSTURE-UNKNOWN so that ports in this state can be seen.
The following Enforcement Profile is used when an Endpoint is found to be NONCOMPLIANT and
should only have limited access to the network.
· Session-Timeout: This configures the RADIUS re-authentication timeout for this port.
· Termination Action: Set to RADIUS-Request
· Profile-Match=DATA: Defines this to match the data profile which is typically used for PCs
on the network.
· Profile-ACL=LIMITED-ACCESS: Defines an ACL that limits access a very few addresses in the
network until the device reaches a Compliant state.
· TLAB:IFALIAS=POSTURE-UNKNOWN: This will mark the port in the EMS with an UserLabel
of POSTURE-NONCOMPLIANT so that ports in this state can be seen.
This Enforcement Profile will be used when a device is found compliant with all health checks by
the OnGuard Endpoint Agent Posture Check.
· Session-Timeout: This configures the RADIUS re-authentication timeout for this port.
· Termination Action: Set to RADIUS-Request
· Profile-Match=DATA: Defines this to match the data profile which is typically used for PCs
on the network.
· Profile-ACL=PERMIT-ALL-TRAFFIC: Defines an ACL that permits access to all the resources
on the network.
· TLAB:IFALIAS=DATA: This will mark the port in the EMS with an UserLabel of DATA
indicating the user is on the DATA VLAN and is Compliant.
Creation of Enforcement Policies
The Enforcement Policy has three states where the Posture is either Unknown, UnHealthy, or
Healthy. Based on those conditions, the appropriate action or Enforcement Profile is applied to
the port. The example below shows these conditions:
Creation of Service
The Service is used to match for endpoints of a certain type and assign Policy based on the result
of health checks.
The default Authentication methods are typically fine, select from the list those used in your
organization.
· Use Cached Results: Select Use cached Roles and Posture attributes from previous
sessions.
· Enforcement Policy: Select the Tellabs – 802.1X Wired Enforcement Policy created in the
setps above.
· Default Profile: Select Deny Access Profile so that devices failing authentication will be
denied access.
· Rules Evaluation Algorithm: select first-applicable.
Posture Policies should be created based on local network policies. This particular example uses
OnGuard as the Posture agent and applies to Windows Machines.
This example has two Rules, one for Healthy, one for Quarantine. Roles should be defined per
Network Policy.
· Message: Give the message to be given to the user when OnGuard agent prompts the user
when the computer is in the Healthy state.
Create an Enforcement Profile to be used when the client’s computer is not healthy.
· Message: Give the message to be given to the user when OnGuard agent prompts the user
when the user is in the UnHealthy or Quarantined State.
Creation of Enforcement Policies
The 802.1x Wired OnGuard Agent Enforcement Policy that will utilize the profiles for Healthy or
Not Healthy. This sends a message to the user to indicate the user the current state of their
machine and apply the new enforcement profile.
The Service Tellabs 802.1x Wired Posture Check is a Web Based Health Check through posturing
with OnGuard.
· Type: Select Web-based health Check Only when creating the service.
o Create a Host Rule, named CheckType with Operator Matches all and Value equal to
Health.
o Create a Host rule, named InterfaceType, with Operator Equals WIRED.
· Posture Policies: Select the Posture Policy Tellabs – 802.1X Wired Windows Posture Checks
created previously.
· Default Posture Token: Select Quarantine
· Remediate End-Hosts: Select Enable auto-remediation of non-compliant end-hosts.
· Enforcement Policy: Select Tellabs – 802.1X Wired OnGuard Agent Enforcement Policy
The following screen shows the service transitions that occur when an unknown endpoint enters
ClearPass, it will first hit the 802.1x Wired Service, then transition to the 802.1x Wired Posture
Checks Service, then reauthenticate using 802.1x Wired Service where it will have the Healthy
Enforcement policy applied and be given full access to the network.
· Name: Enter the Name to be used for the Self Registration page, Tellabs-Guest in this
example.
· Register Page: Enter the name of the web page name for the self-registration page. This
will be a part of the page URL.
· User Database: Select ClearPass Policy Manager.
· All other selections take the defaults.
Setting the CoA Delay to 5 seconds and Login Delay to 15 seconds ensure that there is enough
time for attributes to be added to the endpoint repository before the next MAC Auth request
comes in.
The settings in the Customize Form Field should be set based on network policy. As an example
the Validator NwalsValidExpireAfter defines the number of hours the Guest Account is valid.
The Role Mappings will utilize a number of built-in roles such as Contractor, Employee, Guest, and
MAC Caching. One new role will be need the Tellabs – Captive Portal Role.
This role mapping is used to evaluate what the guest role id is and assign the correct access
policy.
The following section will create the two services used to accomplish Web Authorization with Self
Registration:
This Enforcement profile is allowing the guest to access the network with limited access rights.
· Session-Timeout: This configures the RADIUS re-authentication timeout for this port.
· Termination Action: Set to RADIUS-Request
· FilterID: PROFILE-MATCH=GUEST, this will match against the Service Profile within the NAC
profile that includes the prefix GUEST.
· FilterID: Profile-ACL=CPPM-GUEST-REDIRECT, this should be a simple Authorized MAC ACL.
· Tellabs-AVPair: This string will define the URL that the user should be re-directed to and in
this example is url-
rdirect=https://172.28.6.82/guest/Tellabsguest.php?mac=%{Connection:Client-Mac-
Address-NoDelim}. This is the URL that redirects to the self registration portal on ClearPass
and Passes the MAC address that is to be authorized. This ties the request with the
endpoint. The highlighted text needs to match what was entered on the Self Registration
Configuration page.
Creation of Enforcement Policies
This Enforcement Policy has a set of states to apply the appropriate action based on the roles
assigned.
· Rule: MATCHES_ALL [MAC Caching] This is for MAB clients whose MAC is stored in the
database. They are allowed Access via the Tellabs Allow Access Profile
· Rule: MATCHES_ANY [Guest] If the role is determined to be Guest, they will be sent to the
Captive Portal.
· Rule: EQUALS [User Authenticated] If the role is determined to be User Authenticated the
user will be sent to the Captive Portal.
Creation of Service
· Additional Authorization Sources: Add Time Source and Guest User Repository.
· Role Mapping Policy: Select Tellabs Guest Authentication Role Mapping – MAC Bypass that
was created earlier.
· Enforcement Policy: Select the Tellabs – Unknown Endpoint which will populate all the
rules.
Existing users would use the Sign In option to authenticate and gain access.
Guest users would be given a Guest Password that would expire after the configured access
interval configured in ClearPass.
This Profile provides ClearPass internal attributes to ClearPass to be used in a later step for
properly evaluating the user.
The Enforcement profile below is used to terminate the user and re-direct them in a later step to
the default configured URL.
For those users that are successfully authorized via web authentication, it will update the
endpoint to a known endpoint, Update the username, guest role and expiry time in the ClearPass
database, then terminate the session. The endpoint will be immediately re-authenticated via MAB
and given full access to the appropriate VLAN.
Creation of Service
The following service is used to set up the Web based authentication for Tellabs OLTs.
Select the ClearPass Role Mapping Guest Roles and it will populate the conditions at the bottom of
the screen.
Chose the Enforcement Policy Tellabs – WebAuth Enf Policy created above.
As noted above, you must have previously set up Authentication Sources to point to Active
Directory. See section above on Setting Up Authentication Sources for more information.
An Enforcement Policy needs to be created that performs authorization against the Active
Directory Source:
A Service needs to be created that relates the Administrative user to the Enforcement Profile.
On the OLT, you need to also set up the CLI authentication to point to the ClearPass IP address.
The menu is reached via OLT->Right Click->Properties->Security Tab:
Enter the following attributes in the top portion of the dialog(RADIUS Server for Craft User
Authentication):
Then press Apply and you should be able to login using your Active Directory credentials.
Summary
The above configuration outlines Tellabs specific configuration. Outside of those elements the
configuration should follow typical Aruba ClearPass configuration rules.