ClearPass Integration Guide For The Splunk Clearpass APP + HEC Extension
ClearPass Integration Guide For The Splunk Clearpass APP + HEC Extension
Change Log
Ver s ion Da te M o d i f ied B y Com m en t s
0.1 & 0.2 May/July 2014 Premraj Lourdraj/ Sohag Desai Initial Revision, Updates and Review
v2018-01 August 2018 Danny Jump First Published Version
v2020-01 September 2020 Chris Lembo Updated for Splunk 8 and Splunk Cloud and support of
Splunk HEC via ClearPass Extension
V2020-01 September 2020 Danny Jump Review of updated
V2020-02 October 2020 Chris Lembo Minor non-technical revisions
Copyright
© Copyright 2020 Hewlett Packard Enterprise Development LP.
Contents
Introduction and Overview .......................................................................................................................................................... 1
Software Requirements ............................................................................................................................................................... 1
ClearPass Installation and Deployment Guide......................................................................................................................... 1
Splunk Installation and Deployment Guide ............................................................................................................................. 1
Pre-Requisites for the Integration ............................................................................................................................................... 2
ClearPass Extensions ............................................................................................................................................................... 2
ClearPass Extension Help ..................................................................................................................................................... 2
Access to the Extension Store.............................................................................................................................................. 3
Extensions and web proxy support ..................................................................................................................................... 3
Extensions and IP address configuration support ............................................................................................................... 3
ClearPass, Splunk and the ClearPass for Splunk App ................................................................................................................... 5
Types of Syslog ........................................................................................................................................................................ 5
Syslogs Based on ClearPass Internal Modules, RADIUS or Auth Services ................................................................................ 5
Syslogs Based on Session Logs, Audit Records and Event Records .......................................................................................... 6
Pictorial View of the Integration .............................................................................................................................................. 7
Install Splunk HEC Connector Extension ...................................................................................................................................... 8
Cluster Considerations ............................................................................................................................................................. 8
Installation ............................................................................................................................................................................... 8
Configuration ......................................................................................................................................................................... 10
Custom Endpoint Filter .......................................................................................................................................................... 11
endpointFilter – Compliance Equals NotAvailable ............................................................................................................ 13
endpointFilter – Source Exists ........................................................................................................................................... 14
Scheduling ............................................................................................................................................................................. 15
Configure ClearPass Policy Manager to Send Syslog Messages to Splunk ................................................................................ 16
Adding Splunk as a Syslog Target........................................................................................................................................... 16
Importing ClearPass Syslog Filters ......................................................................................................................................... 17
Configure Splunk to Receive Messages from ClearPass ............................................................................................................ 19
Create TCP/UDP Data Input ................................................................................................................................................... 19
HTTP Event Collector ............................................................................................................................................................. 21
Install Aruba ClearPass App for Splunk ...................................................................................................................................... 23
Configure Error Code to Error String Lookups ....................................................................................................................... 24
ClearPass Splunk App – Dashboard Elements ........................................................................................................................... 27
Overview ................................................................................................................................................................................ 27
Authentications ..................................................................................................................................................................... 28
Authentication Overview ................................................................................................................................................... 28
Authentication Trends ....................................................................................................................................................... 30
Failure by Error Types ........................................................................................................................................................ 32
Failure Distribution ............................................................................................................................................................ 35
Policy Enforcement ............................................................................................................................................................ 37
Endpoints ............................................................................................................................................................................... 39
Endpoint Categories .......................................................................................................................................................... 39
Endpoint Profiles ............................................................................................................................................................... 41
Endpoint Information ........................................................................................................................................................ 43
Sessions ................................................................................................................................................................................. 44
BandWidth Usage .............................................................................................................................................................. 44
Session Details ................................................................................................................................................................... 45
Comparison............................................................................................................................................................................ 48
Compare NAS Devices ....................................................................................................................................................... 48
Software Requirements
To support this integration, the minimum software version for ClearPass Policy Manager is 6.7.2. At the time of
writing, ClearPass Policy Manager 6.9.2 is the latest available and recommended release; and the release by which
the procedures and screenshots shown within this document are taken from. Version 3.1 of the ClearPass App for
Splunk was also used throughout this Integration Guide.
ClearPass runs on either hardware appliances with pre-installed software, or as a Virtual Machine under the
following hypervisors. Hypervisors that run on a client computer such as VMware Player are not supported.
The minimum software version supported is Splunk Enterprise 8 and Splunk Cloud; however, this document is
based upon Splunk 8.0.5.
The sharing of licensing information from ClearPass to Splunk requires ClearPass Policy Manager 6.9.2 or greater (which
includes the License Summary API).
https://www.arubanetworks.com/techdocs/ClearPass/6.9/Guest/Content/AdministrationTasks1/Exten-
sions_top.htm
Extensions are downloaded and installed to ClearPass through the Extensions Store. The Extension Store is
accessed utilizing the same HPE Passport account credentials used to validate support entitlement in the Software
Updates Portal. This is configured under Administration → Agents and Software Updates → Software Updates as
shown below. Ensure that a valid HPE Passport credential set has been entered in these fields to enable Extension
download capabilities.
Extensions support the use of 3rd party web proxies. If a proxy is defined in ClearPass Policy Manager, then an
extension will use that configuration.
The Policy Manger web proxy configuration is ONLY read by the extension at installation time. If the web proxy configuration is
changed in Policy Manager, the extension must be re-installed so the new settings are activated in the Extension
ClearPass uses an RFC1918 non-routable IP address range to communicate with the Extension. The default is
172.17.0.0/16. You may configure a different range, if desired. This is especially useful when deploying extensions
across nodes within a cluster where there is the requirement for a fixed consistent IP address for the extension
across the cluster.
Changing the “Extensions Network Address” range is only necessary if either the ClearPass MGMT or DATA
interface are using an IP address in the extension default range of 172.17.x.x/16, or if ClearPass needs to
communicate with some external device in that range.
To Configure the base Extension IP subnet within Policy Manager, navigate to Administration → Server Manager
→ Server Configuration [SERVER] → Service Parameters → [ClearPass system service] dropdown.
The subnet defined here for the extension framework must fall within the following subnet range 10.0.0.0/8, 172.16.0.0/12,
192.168.0.0/16 as defined by RFC1918.
Changing the extension base IP address will require the extension service to be restarted.
For best results, set the network address range to a subnet that does not exist in your enterprise, and restart the
extension service for this change to take effect.
Never set the DATA or MGMT IP address to use an address that matches the Extension Network
Splunk is a log management/SIEM (Security Information and Event Management) system solution that can receive
Syslog messages from multiple sources. These messages are stored within Splunk and then can be correlated,
searched, analyzed and displayed using its graphical user interface.
Splunk is also a platform that runs mini-applications (Apps) as add-ons to Splunk, which are customized for specific
external applications or products which send Syslog messages. The App provides visualization of the received data
without requiring the user to run complex custom searches within Splunk.
These apps typically consist of a number of dashboard elements like charts, tables and graphs that are accessible
via a menu structure contained within the app, which are based on pre-defined searches. The ClearPass Splunk
App is such an App and was developed by Aruba for visualizing a Syslog feed from ClearPass Policy Manager.
Types of Syslog
ClearPass can generate two different types of Syslog feeds:
Mar 27 12:01:40 10.17.6.54 2014-03-27 12:00:15,315 [main] DEBUG RadiusServer.Radius - Module: Loaded SQL
Mar 27 12:01:40 10.17.6.54 2014-03-27 12:00:15,316 [main] DEBUG RadiusServer.Radius - sql: sql_driver = "Post-
greSQL"
Mar 27 12:01:40 10.17.6.54 2014-03-27 12:00:15,316 [main] DEBUG RadiusServer.Radius - sql: login = "appuser"
Mar 27 12:01:40 10.17.6.54 2014-03-27 12:00:15,316 [main] DEBUG RadiusServer.Radius - sql: password =
"(encstring)"
Mar 27 14:59:57 10.17.6.54 2014-03-27 14:58:32,502 [RequestHandler-1-0x7f3899d6d700 r=psauto-1395827722-82 h=57
r=W0000001e-01-5333ef40] WARN Common.MacAddrAttrProvider - HostMac missing, not populating different mac rep-
resentations
Mar 27 14:59:57 10.17.6.54 2014-03-27 14:58:32,502 [RequestHandler-1-0x7f3899d6d700 r=psauto-1395827722-82 h=57
r=W0000001e-01-5333ef40] WARN Common.TagDefinitionCacheTable - Failed to build TagDefinitionMap. Unknown Nad-
Client for Id=0
Mar 27 14:59:57 10.17.6.54 2014-03-27 14:58:32,510 [R:W0000001e-01-5333ef40] ERROR
com.avenda.tips.webauthservice.WebAuthHandler - Failed to perform chained policy-evaluation and enfProfiles
Mar 27 14:59:57 10.17.6.54 com.avenda.tips.webauthservice.WebAuthOpException: Applied Reject profile
Shown below examples of these three log types. Note that the Syslog payload is sent as name/value pairs.
This document will explain how to configure ClearPass to send each of these types of log messages to Splunk.
SYSLOG MESSAGES
HTTP EVENTS
SYSLOG MESSAGES
Proxy
SERVER IDS ROUTER
To integrate ClearPass with Splunk, four major tasks which are covered in the next four sections must be
performed:
Installation
To access the extension GUI, from the ClearPass Guest System, under Administration navigate to the Extension
User Interface as shown below.
From here, click on ‘Install Extension’, and the search box appears. Enter “Splunk” and click on ‘Search’; see the
example below.
In the “Install Extension” dialog box, set the IP address if necessary, as described earlier. Do not check the box to
start the extension at this time. Click the “Install” button.
The extension will download and appear in a “Stopped” state. Take note of the options to Show Details, Start,
Delete, Reinstall, Show Logs, and Configuration. These will be used throughout the configuration and in any
troubleshooting measures of the Extension.
The Reinstall option will maintain the configuration and extension data on the system. Alternatively, Deleting and then
searching/installing the extension again will wipe the configuration data and function like a new install.
.
Password and sensitive configuration items are obfuscated when presented in both the Extension GUI or in the Explorer
configuration; that includes the hecToken in this extension.
Some of these default settings will need to be modified for your deployment requirements. Use the table below
for guidance on the configuration values and options.
Extension Configuration
Configuration Attribute Description Default Value
logLevel The logging level – DEBUG, INFO, WARN, ERROR INFO
verifySSLCerts Should Splunk SSL Certificates be validated – true/false false
splunkHost The host or IP address of the Splunk server that HEC configured
splunkPort The port used by the Splunk HEC 8088
0e33db65-4239-4ac9-
hecToken The Splunk HEC access token
8fe1-7fb0935871fb
sendLicensing* Should licensing information be sent to Splunk – true/false true
The Cron schedule to be used to send licensing information. Infor-
* /15 * * * * (every 15
licenseSendSchedule mation is only updated in 15-minute intervals, so using the default
minutes)
schedule is recommended.
sendEndpoints Should endpoint information be sent to Splunk? – true/false True
0 */2 * * * (every 2
endpointSendSchedule The Cron schedule used to send endpoints to Splunk.
hours)
endpointSendLimit The number of endpoints to send in each batch. 50
If you wish to only send a subset of endpoints, you can filter them
using a standard endpoint filter. These filters are the same as used
endpointFilter {} (no filter)
by the endpoint API. An example is to use the Source endpoint at-
tribute in the following example: { “Source”: { “$eq”: “Sophos” } }
endpointSendOnStart Should endpoints be sent when the extension starts – true/false true
If a proxy is configured in ClearPass, should it be bypassed by the ex-
bypassProxy false
tension – true/false
enableStats Enable or disable extension statistics tracking – true/false false
The filtering options are only limited by the available attributes that are stored within the Endpoint database. A
listing of the available filters on your instance of ClearPass can be found in the Dictionary Attributes. These can be
found in ClearPass WebUI; Administration → Dictionaries → Dictionary Attributes. Filtering on Entity equals
Endpoint will display available attributes within the Endpoint database within your cluster.
The filtering capabilities are the same as used in the Endpoint API, allowing complete control over which endpoints
are shared with Splunk. The filter query options available for use can be found in the ClearPass API
documentation. This is available from your ClearPass servers and can be accessed by browsing to /api-docs URL
on your ClearPass Server: (https://cppm.domain.name/api-docs).
The attributes used are for demonstration purposes, refer to the attributes dictionary in your cluster for available filters.
The following filter will only send endpoints that have a Compliance value of NotAvailable. The query is based off
of the “Field is not equal to “value” filter.
"endpointFilter": {
"Compliance": {
"$eq": "NotAvailable"
}
}
In this example, this particular filter yields a total of 143 endpoints, all of which have NotAvailable as the value for
the Compliance attribute. The total endpoints sent can be seen in the Splunk HEC Connector logs as well as on the
Endpoint Information dashboard within the ClearPass App for Splunk.
Figure 17: Splunk HEC Connector > Endpoint Count Sent to Splunk
The following filter will only send endpoints that have a Source value applied to it within the Endpoint database.
The Source attribute is often populated by 3rd party products that may be integrated with ClearPass. The use of
this query may prove useful to identify and report details on and to share with Splunk for additional information.
The query is based off of the “Field is not equal to “value” filter.
"endpointFilter": {
"Source": {
"$ne": ""
}
}
In this example, the filter yields a total of 27,868 endpoints, all of which have some value in the Source attribute.
The total endpoints sent can be seen in the Splunk HEC Connector logs as well as on the Endpoint Information
dashboard within the ClearPass App for Splunk.
Figure 19: Splunk HEC Connector > Endpoint Count Sent to Splunk
• licenseSendSchedule: */15 * * * * (every 15 minutes; starting at :00 second after the minute)
• endpointSendSchedule: 0 */2 * * * (every 2 hours; starting at 00am)
A ‘cron’ is a job scheduler. Any scheduled task is called a ‘cron job’. The syntax for a cron job schedule is as follows:
In our use of the cron scheduler, we’ve dropped the use of the last instruction ≤command to execute> and use
only the time/date functions, see below for a number of examples of scheduling a sync process.
After the extension has been installed, proceed to configure Splunk and ClearPass.
You can see from the above that the scheduling process is extremely flexible, alternatively htttps://cron.help and
https://crontab.guru/ are great pages for learning more about CRON scheduling and visualizing your required
scheduling needs.
The Host Address can be defined a hostname (if resolvable through DNS) or an IP Address. The Protocol and
Server Port are customizable; but the default UDP/514 combination is used with Splunk Enterprise in this example.
When adding Splunk Cloud as a Syslog Target, you must specify TCP as the protocol.
Figure 23: Download Syslog Target and Export Filter from Aruba Solution Exchange
Once you have downloaded the file (ClearPass Syslog Target and Export Filters.xml), it necessary to edit the file
using a text editor as described below.
The name and version of the ClearPass Syslog Target and Export Filters.xml file may vary; always download and install the latest
available at the time of configuration
Search the file for references of %splunk_ip%. It is located in two main sections.
• SyslogTarget - this portion of the XML file will create the Syslog Target during the import process. If the
Syslog Target is already defined (as shown above), then the <SyslogTargets> section can be omitted from
the XML import. If necessary, modify the protocol and port requirements to meet the Splunk deployment
• SyslogServerNameList – seen multiple times within the XML file, this section outlines which Syslog Targets
this export filter will be sent to. This field should be entered as the hostname (if resolvable by DNS) or
the IP Address.
Click the Import button and verify that the following Syslog filters have been imported correctly:
Splunk requires specific configurations to accept and process messages from ClearPass, two Data Inputs are
required:
The Data Inputs screen will display all the Local Inputs defined within Splunk. At this time, we’ll be adding a new
UDP Data Input to match the Syslog Target configuration on ClearPass. Click Add new under the UDP Local Input.
Add the appropriate input protocol (UDP/TCP) for your installation requirements
On the Input Settings step, provide the following and click Review.
• Source Type: Aruba:CPPM:Syslog
• Source Type Category: Custom
• Source Type Description (optional): Aruba ClearPass Syslog
Ensure the settings you’ve established are correct. If so, click Submit; if not click Back and correct the values.
Upon completion, confirm that the new Data Input is Enabled by clicking Data Input; or proceed to download the
ClearPass for Splunk app by clicking on Download Apps.
Data Input confirmation: Click UDP on the Data Inputs page and confirm that the new input is Enabled; if not, click
the Enable link:
Tip: Allow the ClearPass App for Splunk to automatically create the HTTP Event Collector during its installation
You can verify its configuration (including Token Value) and Status state after the installation of the App is
completed. The Data Inputs are located under the Settings menu on the main Splunk WebUI dashboard.
The Data Inputs screen will display all the Local Inputs defined within Splunk. After the completion of the
ClearPass for Splunk App, the configuration and state of the HTTP Event Collector can be verified.
Figure 36: Adding a new Splunk HTTP Event Collector Data Input
Figure 37: Splunk HEC > Verify Token Value and Status
Type ClearPass in the search field and search the App Splunk database. Ensure you install the Aruba ClearPass App
for Splunk and not any other apps that may include Aruba or ClearPass in their names (see below).
Figure 39: Searching and selecting the Aruba ClearPass App for Splunk
Login with your Splunk username and password in order to complete the download of the App.
Figure 40: Install Aruba ClearPass App for Splunk > Credentials
Figure 41: Install Aruba ClearPass App for Splunk > Installation Progress
To configure the lookups, navigate to Settings → Knowledge → Lookups from the main dashboard.
Select Splunk for ClearPass (ClearPassOnSplunk) from the App selection dropdown and then click New Automatic
Lookup.
Figure 44: Splunk Lookups > Automatic Lookups > New Automatic Lookup
Fill out the Add new Lookup as follows and click Save:
• Name (arbitrary): ClearPass Error Code Lookups
• Lookup table: error_code_lookup
• Apply to: sourcetype | named: Aruba:CPPM:Syslog
• Lookup input fields: error_code = error_code
• Lookup output fields: error_code_str = error_code_str
Figure 45: Splunk Lookups > Automatic Lookups > New Automatic Lookup Configuration
Figure 46: Splunk Lookups > Automatic Lookups > Verify Status
Confirm the error_codes are translated per the lookup. The following is now shown on the Last 10 Auth Failure
dashboard table:
Overview
Figure 48: Overview Dashboard
All data points shown pertain to the selected time period in the upper left area of the dashboard as well as the ClearPass server
selection (i.e. “All” or a specific ClearPass server).
Last 10 Auth Requests Service details on ten most recent authentication requests
Last 10 Auth Failures Error details on ten most recent authentication failures
Last 10 Auth Alerts Alert details on ten most recent authentication alerts
Authentications
Authentication Overview
All data points shown pertain to the selected time period in the upper left area of the dashboard as well as the ClearPass server
selection (i.e. “All” or a specific ClearPass server).
Total Users: Number of unique users (duplicates removed across all ClearPass servers selected)
Total Endpoints: Number of unique endpoints (duplicates removed across all ClearPass servers selected)
Total Services: Number of unique services matched for successful auths
Number of NAS devices configured to use ClearPass Servers (integrated with Splunk and
NAS Used:
sending Syslogs) as AAA servers
Incoming Auth Requests: Line chart of incoming authentication requests over time
Auth Failures: Chart of incoming authentication failures over time
Pie chart breakdown of matched services for successful
Service Categorization:
authentications
Top 10 User Auths: Table displaying top ten most frequent user auths
Table displaying top ten most frequent services hit for
Top 10 Services Used:
authentication
Top 10 Alerts Raised: Table displaying top ten most frequent alerts raised
Top 10 Incoming Client MAC: Table displaying top ten most frequent unique client MAC addresses authenticated
Top 10 IP Used: Details of top ten most frequent IP addresses seen for authentications
Authentication Trends
All the information displayed on this dashboard is based on the time period selected (Week to Date shown) as well as the
ClearPass server(s) and NAS device(s) selected. Additionally, you can filter the data by Authentication Status and Syslog field
(e.g. req_source, user_name, error_code, mac_address, service_name, session_id).
Login Compare - Today vs. Yester- Comparison of total logins per hour for current day versus previous
day day
Login Compare - Today vs. 7 Days Comparison of total logins per hour for current day versus seven
Ago days prior
Comparison of total logins per hour for current day versus logins
Login Trend: Last Week
per hour averaged over last week
Comparison of total logins per hour for current day versus logins
Login Trend: Last Week
per hour averaged over last week
All data points shown pertain to the selected time period in the upper left area of the dashboard as well as the ClearPass server
selection (i.e. “All” or a specific ClearPass server).
Failed Requests by Error Type Top ten most frequent failed requests by error type (bar)
Failed Requests by Error type Top ten most frequent failed requests by error type (pie)
Successful vs Failed Requests Number of successful and failed requests per hour (line)
Successful vs Failed Requests Proportion of accepted, rejected, and timed out request (pie)
Failure Distribution
All data points shown pertain to the selected time period in the upper left area of the dashboard as well as the ClearPass server
selection (i.e. “All” or a specific ClearPass server) and Failure Type.
Authentication Failure by Network Device Breakdown of failed authentications by controller / NAS device
Top 10 Failed Attempts by Users Breakdown of failed authentications by user
Top 10 Failed Attempts by Endpoints Breakdown of failed authentications by endpoint
Authentication Failure by NAS Device Table displaying failed authentications by NAS device
Top 10 Failed Attempts by Users Table displaying Top 10 failed authentications by user
Top 10 Failed Attempts by Endpoints Table displaying Top 10 failed authentications by endpoint
Policy Enforcement
All data points shown pertain to the selected time period in the upper left area of the dashboard as well as the ClearPass server
selection (i.e. “All” or a specific ClearPass server).
Top 10 Roles Assigned Top ten most frequent roles assigned (TIPS Role)
Top 10 Enforcement Profiles Top ten most frequent enforcement profiles applied
Health Status Breakdown of posture / health by type: HEALTHY, UNKNOWN and QUARANTINE
Endpoints
The dashboards in this section are the result of data received from ClearPass through the HEC extension. The
endpoints shown are a result of the endpointFilter defined in the extension configuration.
Endpoint Categories
All data points shown pertain to the selected time period in the upper left area of the dashboard as well as the ClearPass server
selection (i.e. “All” or a specific ClearPass server), Category, Family, and User Agent.
The Endpoint Categories dashboard can be customized to display the desired endpoint information by filtering by
ClearPass Server, Category, Family, or User Agent as shown below.
Endpoints Matching the selected Table displaying endpoint details including hostname, device
Category/Family/UserAgent Filters name, device family, device category, IP address and MAC vendor
Endpoint Profiles
All data points shown pertain to the selected time period in the upper left area of the dashboard as well as the ClearPass server
selection (i.e. “All” or a specific ClearPass server), Hostname, and Search String lookup.
Table displaying endpoint details including hostname, device name, device family,
Endpoint Profiles
device category, IP address type and DHCP fingerprint
The Endpoint Information dashboard contains relevant information that has been shared to Splunk through the
Splunk HEC Connector Extension. This data can be filtered using the endpointFilter option within the extension
configuration.
All data points shown pertain to the selected time period in the upper left area of the dashboard.
Endpoint Records by Day Total number of Endpoint record seen per day
Endpoint Record Sources by Day Total number of Endpoint record sources seen per day
Sessions
BandWidth Usage
All data points shown pertain to the selected time period in the upper left area of the dashboard as well as the ClearPass server
selection (i.e. “All” or a specific ClearPass server).
RADIUS Accounting is required from the NAS in order to capture bandwidth details.
Rate of data throughput (input octets and output octets) in kilobytes per
KBPS
second for the selected time period
Volume of input octets received from the endpoint during all completed
Input in MB
RADIUS sessions in MBs
Volume of output octets received from the endpoint during all completed
Output in MB
RADIUS sessions in MBs
Top Bandwidth Users MB Top ten endpoints with highest total volume of data throughput in MBs
Bandwidth Usage by Users MB Chart of data volume throughput over time for top ten endpoints
Session Details
All data points shown pertain to the selected time period in the upper left area of the dashboard as well as the ClearPass server
selection (i.e. “All” or a specific ClearPass server) and Username.
Table displaying session location details (if known): City, Region, Country with session
Session Locations
ID, session time, username, host ID and errors (if any)
Table displaying session details: start time, stop time, NAS port type with session ID,
Session Start/Stop
session time, username and host IP address
Table displaying session usage details: input octets, output octets, with session ID,
Session Usage
session time, username and host IP address
Table displaying session usage details: input octets, output octets, with session ID,
Session Usage
session time, username and host IP address
Comparison
All data points shown pertain to the selected time period in the upper left area of the dashboard as well as a specific NAS.
Auth Source by NAS Device Table displaying NAS device, authentication source and count
Table displaying NAS device, authentication method (PAP, MSCHAP,
Auth Method by NAS Device
MAC_AUTH, EAP-TLS, EAP/PEAP, etc.) and count
Breakdown of type of port (Ethernet, FastEthernet, GigabitEthernet, Wireless,
NAS Port Type by NAS Device
etc.) by NAS device
Breakdown of RADIUS service type (e.g. Login, Framed, Outbound,
Service Type by NAS Device
Administrative, NAS Prompt, Call Check, etc.) by NAS device.
All data points shown pertain to the selected time period in the upper left area of the dashboard as well as the ClearPass server
selection (i.e. “All” or a specific ClearPass server).
System
Audit Records
All data points shown pertain to the selected time period in the upper left area of the dashboard as well as the ClearPass server
selection (i.e. “All” or a specific ClearPass server).
ClearPass Licensing
All data points shown pertain to the selected time period in the upper left area of the dashboard as well as the ClearPass server
selection (i.e. “All” or a specific ClearPass server).
License Count by Server Count of Access, OnBoard, and Compliance Suite (OnGuard) licenses by server
License Usage Over Time Line graph of license usage of each type (Access, OnGuard, and OnBoard) over time
All data points shown pertain to the selected time period in the upper left area of the dashboard as well as the ClearPass server
selection (i.e. “All” or a specific ClearPass server).
ClearPass Logins Details of logins to ClearPass servers: timestamp, host, description, action key
AV Updates Details of hotfix updates to ClearPass servers: host, description, action key
User Agent Updates Details of user agent updates to ClearPass servers: host, description, action key
Hotfixes Updates Details of hotfix updates to ClearPass servers: host, description, action key
System Monitor
All data points shown pertain to the selected time period in the upper left area of the dashboard.
Table displaying details of server uptime: hostname, uptime, data interface status,
Server Status
management interface status
Table displaying details of server CPU usage: hostname, CPU usage graph,
CPU Usage by Servers
percentage CPU used
Table displaying details of server CPU idle time: hostname, CPU idle time graph,
CPU Available on Servers
percentage CPU idle
Table displaying details of server memory usage by processes for each ClearPass
Memory Usage by Processes
host: memory usage graph displays MBs of memory used
Table displaying details of memory available for each ClearPass host: memory
Memory Available on Servers
usage graph displays MBs of memory available
Table displaying details of swap space used by each ClearPass host: swap usage
Swap Size Usage by Servers
graph displays KBs of swap space used
Table displaying details of swap space available for each ClearPass host: swap
Swap Size Available on Servers
usage graph displays KBs available
Note: All the information displayed on this dashboard is based on the time period selected as well as the ClearPass server(s)
selected. Additionally, you can filter the display using the following search dropdown lists: Username, Hostname, MAC Address,
IP Address, NAS Port Type and any other search string. Display using the following: search Address, NAS Port Type and any
other search string. Before any data can be displayed, you must first select your ClearPass server(s) and click the Submit button
Table displaying the following details: authentication session ID, time stamp, user
Dashboard name, service name, NAS IP address, NAS port, MAC Address, login status, request
source, connection status, error code.
Table displaying the following details: authentication session ID,time stamp, user
name, end host ID, service name, NAS IP address, authentication method, NAS port,
RADIUS Session
MAC Address, login status, request source, count of alerts present, connection status,
error code.
Table displaying the following: RADIUS authentication session ID, sequence number,
RADIUS accounting session ID, time stamp, user name, hostname, endpoint, IP
address, NAS IP address, NAS port type, called station MAC address, calling station
RADIUS Accounting
MAC address, accounting status type, accounting session time, accounting delay
time, accounting input octets, accounting input packets, accounting output octets,
accounting output packets
Table displaying the following: RADIUS authentication session ID, RADIUS accounting
RADIUS Accounting Detail session ID, type of authentication session, database row ID, RADIUS attribute name,
RADIUS attribute value
Table displaying the following: time stamp, endpoint hostname, endpoint MAC
Address, endpoint IP address, MAC vendor (based on OUI), Boolean value to indicate
Endpoint Profiles
whether the IP address is static, time when endpoint was added, time when endpoint
was updated, DHCP fingerprint, endpoint name, endpoint family, endpoint category
Table displaying the following: raw Syslog message, time stamp, ClearPass server IP
address, Syslog sender IP address, index, Number of lines in Syslog message, Syslog
Generic Query Output
source port, Splunk sourcetype, Splunk server hostname / IP address to which Syslog
was sent
The Generic Query Textbox dashboard displays the same information as the Generic Query Dropdown dashboard;
but allows more flexible filter capabilities. Instead of choosing a selection from a dropdown; search criteria can be
input into the textbox and submitted for visualization.
This next dashboard displays data that is identical to the previous dashboard (Generic Query Dropdown), except
the selection fields are textbox query fields.
Table displaying the following details: authentication session ID, time stamp, user
Dashboard name, service name, NAS IP address, NAS port, MAC Address, login status, request
source, connection status, error code.
Table displaying the following details: authentication session ID,time stamp, user
name, end host ID, service name, NAS IP address, authentication method, NAS port,
RADIUS Session
MAC Address, login status, request source, count of alerts present, connection status,
error code.
Table displaying the following: RADIUS authentication session ID, sequence number,
RADIUS accounting session ID, time stamp, user name, hostname, endpoint, IP
address, NAS IP address, NAS port type, called station MAC address, calling station
RADIUS Accounting
MAC address, accounting status type, accounting session time, accounting delay
time, accounting input octets, accounting input packets, accounting output octets,
accounting output packets
Table displaying the following: RADIUS authentication session ID, RADIUS accounting
RADIUS Accounting Detail session ID, type of authentication session, database row ID, RADIUS attribute name,
RADIUS attribute value
Table displaying the following: time stamp, endpoint hostname, endpoint MAC
Address, endpoint IP address, MAC vendor (based on OUI), Boolean value to indicate
Endpoint Profiles
whether the IP address is static, time when endpoint was added, time when endpoint
was updated, DHCP fingerprint, endpoint name, endpoint family, endpoint category
Table displaying the following: raw Syslog message, time stamp, ClearPass server IP
address, Syslog sender IP address, index, Number of lines in Syslog message, Syslog
Generic Query Output
source port, Splunk sourcetype, Splunk server hostname / IP address to which Syslog
was sent
Search
Note: Restarting this service will affect all deployed and running extensions.
To check on the state of the Extension Service, or to restart the service, go to Administration → Server Manager
→ Server Configuration → [SERVER] → Services Control. By default, this service is automatically started.
The ClearPass Extensions are supported by a system service which must be running.
Figure 89: Splunk HEC Connector > Changing the DEBUG level
Figure 93: Splunk HEC Connector > Show Extension Statistics URL
Socket Hang Up
The following error has been seen. The root cause was unknown on the Splunk or ClearPass side at the time of this
publishing; however, deletion and reinstallation of the extension was able to resolve the message.
Figure 100: Splunk HEC Connector > Extension Statistics Not Loading
• If the value of any field in the Syslog message payload sent by ClearPass contains a comma (,) then only
the value that is before the comma will be used as the value of the field.
Splunk: Common.Roles=”[Employee]”
• If the value of any field in the Syslog message payload sent by ClearPass contains an ‘=’ sign then only the
value that is after the ‘=’ sign will be used in Splunk.
Note that the description field has a string with an embedded ‘=’ sign. Splunk will only capture the value
before the ‘=’ sign as below: