All rights reserved. Specifications in this manual are subject to change without notice.
Originated in the USA. All other trademarks are the property of their respective owners.
Open Source Code
Certain Aruba products include Open Source software code developed by third parties, including software code
subject to the GNU General Public License (GPL), GNU Lesser General Public License (LGPL), or other Open
Source Licenses. Includes software from Litech Systems Design. The IF-MAP client library copyright 2011
Infoblox, Inc. All rights reserved. This product includes software developed by Lars Fenneberg, et al. The Open
Source code used can be found at this site:
http://www.arubanetworks.com/open_source
Legal Notice
The use of Aruba Networks, Inc. switching platforms and software, by all individuals or corporations, to terminate
other vendors’ VPN client devices constitutes complete acceptance of liability by that individual or corporation for
this action and indemnifies, in full, Aruba Networks, Inc. from any and all legal actions that might be taken against it
with respect to infringement of copyright on behalf of those vendors.
Changing a Device’s Expiration Date46
Disabling and Deleting Devices47
Activating a Device47
Editing a Device47
Viewing Current Sessions for a Device49
Viewing and Printing Device Details49
MAC Creation Modes49
Creating Devices Manually in ClearPass Guest50
Creating Devices During Self-Registration - MAC Only51
Creating Devices During Self-Registration - Paired Accounts52
AirGroup Device Registration53
Registering Groups of Devices or Services53
Registering Personal Devices55
Automatically Registering MAC Devices in ClearPass Policy Manager56
Importing MAC Devices57
Advanced MAC Features57
2-Factor Authentication57
MAC-Based Derivation of Role57
User Detection on Landing Pages58
Click-Through Login Pages58
Active Sessions Management59
Session States60
RFC 3576 Dynamic Authorization61
Filtering the List of Active Sessions61
Disconnecting Multiple Active Sessions62
Sending Multiple SMS Alerts63
About SMS Guest Account Receipts63
Onboard65
Accessing Onboard65
About ClearPass Onboard65
Onboard Deployment Checklist66
Onboard Feature List67
Supported Platforms68
Public Key Infrastructure for Onboard68
Certificate Hierarchy69
Certificate Configuration in a Cluster70
Revoking Unique Device Credentials70
Re-Provisioning a Device71
Network Requirements for Onboard71
Using Same SSID for Provisioning and Provisioned Networks71
Using Different SSID for Provisioning and Provisioned Networks71
Configuring Online Certificate Status Protocol72
Configuring Certificate Revocation List (CRL)72
Network Architecture for Onboard72
Network Architecture for Onboard when Using ClearPass Guest74
The ClearPass Onboard Process75
Devices Supporting Over-the-Air Provisioning75
Devices Supporting Onboard Provisioning76
Managing Provisioned Applications78
Configuring the User Interface for Device Provisioning79
Customizing the Device Provisioning Web Login Page79
Using the {nwa_mdps_config} Template Function80
Configuring the Certificate Authority81
Setting Up the Certificate Authority81
Setting Up a Root Certificate Authority82
Setting Up an Intermediate Certificate Authority84
Obtaining a Certificate for the Certificate Authority86
Using Microsoft Active Directory Certificate Services86
Installing a Certificate Authority’s Certificate88
Renewing the Certificate Authority’s Certificate90
Configuring Data Retention Policy for Certificates90
Uploading Certificates for the Certificate Authority91
Creating a Certificate93
Specifying the Identity of the Certificate Subject93
Issuing the Certificate Request95
Managing Certificates95
Searching for Certificates in the List96
Working with Certificates in the List97
Working with Certificate Signing Requests99
Importing a Code-Signing Certificate101
Importing a Trusted Certificate103
Requesting a Certificate104
Providing a Certificate Signing Request in Text Format104
Providing a Certificate Signing Request File105
Specifying Certificate Properties106
Configuring Provisioning Settings106
Configuring Basic Provisioning Settings107
Configuring Certificate Properties for Device Provisioning107
Configuring Revocation Checks and Authorization109
Configuring Provisioning Settings for iOS and OS X110
Configuring Reconnect Behavior for iOS and OS X111
Configuring Provisioning Settings for Legacy OS X Devices112
Configuring Provisioning Settings for Windows Devices113
Configuring Provisioning Settings for Android Devices114
Configuring Options for Legacy OS X, Windows, and Android Devices116
Configuring Network Settings for Device Provisioning117
Default Settings for Account Creation137
About Fields, Forms, and Views141
Business Logic for Account Creation141
Verification Properties141
Basic User Properties141
Visitor Account Activation Properties142
Visitor Account Expiration Properties142
Other Properties143
Standard Forms and Views143
Customizing Fields145
Creating a Custom Field145
Duplicating a Field147
Editing a Field147
Deleting a Field147
Displaying Forms that Use a Field147
Displaying Views that Use a Field147
Customizing AirGroup Registration Forms147
Configuring the Shared Locations and Shared Role Fields147
Editing Forms and Views151
Duplicating Forms and Views151
Editing Forms152
Form Field Editor152
Form Validation Properties162
Examples of Form field Validation163
Advanced Form Field Properties165
Form Field Validation Processing Sequence166
Editing Views169
View Field Editor169
Customizing Self-Provisioned Access171
Self-Registration Sequence Diagram171
Creating a Self-Registration Page172
Editing Self-Registration Pages173
Configuring Basic Properties for Self-Registration174
Using a Parent Page174
Paying for Access175
Requiring Operator Credentials175
Editing Registration Page Properties176
Editing the Default Self-Registration Form Settings177
Creating a Single Password for Multiple Accounts177
Editing Guest Receipt Page Properties178
Editing Receipt Actions178
Enabling Sponsor Confirmation for Role Selection179
Editing Download and Print Actions for Guest Receipt Delivery181
Editing Email Delivery of Guest Receipts181
Editing SMS Delivery of Guest Receipts182
Enabling and Editing NAS Login Properties183
Editing Login Page Properties184
Self-Service Portal Properties186
Resetting Passwords with the Self-Service Portal187
Email Receipts and SMTP Services189
About Email Receipts189
Configuring Email Receipts190
Email Receipt Options190
About Customizing SMTP Email Receipt Fields192
GuestManager Standard Fields287
Hotspot Standard Fields294
SMS Services Standard Fields295
SMTP Services Standard Fields296
Format Picture String Symbols297
Form Field Validation Functions298
Form Field Conversion Functions301
Form Field Display Formatting Functions301
View Display Expression Technical Reference303
LDAP Standard Attributes for User Class304
Regular Expressions305
Dell Networking W-ClearPass Guest provides a simple and personalized user interface through which operational
staff can quickly and securely manager visitor network access.
Audience
This deployment guide is intended for system administrators and people who are installing and configuring Dell
Networking W-ClearPass Guest as their visitor management solution. It describes the installation and configuration
process.
Conventions
The following conventions are used throughout this guide to emphasize important concepts:
Table 1:
Typographical Conventions
Type StyleDescription
Italics
System items
Commands
<
Arguments
[Optional]
{Item A |
Item B}
>
This style is used to emphasize important terms and to mark the titles of books.
This fixed-width font depicts the following:
l Sample screen output
l System prompts
l Filenames, software devices, and specific commands when mentioned in the text
In the command examples, this bold font depicts text that you must type exactly as shown.
In the command examples, italicized text within angle brackets represents items that you should
replace with information appropriate to your specific situation. For example:
# send <text message>
In this example, you would type “send” at the system prompt exactly as shown, followed by the text of
the message you wish to send. Do not type the angle brackets.
Command examples enclosed in brackets are optional. Do not type the brackets.
In the command examples, items within curled braces and separated by a vertical bar represent the
available choices. Enter only one choice. Do not type the braces or bars.
This chapter explains the terms, concepts, processes, and equipment involved in managing visitor access to a
network, and helps you understand how Dell Networking W-ClearPass Guest can be successfully integrated into your
network infrastructure. It is intended for network architects, IT administrators, and security consultants who are
planning to deploy visitor access, or who are in the early stages of deploying a visitor access solution.
This chapter includes the following sections:
l "About Dell Networking W-ClearPass Guest" on page 15
l "Visitor Access Scenarios " on page 16
l "Reference Network Diagram " on page 16
l "Key Interactions" on page 17
l "AAA Framework" on page 18
l "Key Features" on page 19
l "Visitor Management Terminology" on page 20
l "ClearPass Guest Deployment Process " on page 21
l "AirGroup Deployment Process " on page 23
l "Documentation and User Assistance " on page 24
l "Use of Cookies " on page 25
About Dell Networking W-ClearPass Guest
Dell Networking W-ClearPass Guest provides a simple and personalized user interface through which operational
staff can quickly and securely manage visitor network access. It gives your non-technical staff controlled access to a
dedicated visitor management user database. Through a customizable Web portal, your staff can easily create an
account, reset a password, or set an expiry time for visitors. Access permissions to ClearPass Guest functions are
controlled through an operator profile that can be integrated with an LDAP server or Active Directory login.
Visitors can be registered at reception and provisioned with an individual guest account that defines their visitor
profile and the duration of their visit. The visitor can be given a printed customized receipt with account details, or
the receipt can be delivered wirelessly using the integrated SMS services. Companies are also able to pre-generate
custom scratch cards, each with a defined network access time, which can then be handed out in a corporate
environment or sold in public access scenarios.
You can use the customization features to define settings that allow your visitors to self-provision their own guest
accounts. Visitors register through a branded and customized Web portal, ensuring a streamlined and professional
experience. Surveys can also be presented during the self-registration process and the data stored for later analysis and
reporting, providing additional insight to your visitors and their network usage.
ClearPass Guest integrates with all leading wireless and NAC solutions through a flexible definition point, ClearPass
Policy Manager. This ensures that IT administrators have a standard integration with the network security
framework, but gives operational staff the user interface they require.
Visitor Access Scenarios
The following figure shows a high-level representation of a typical visitor access scenario.
Figure 1: Visitor access using ClearPass Guest
In this scenario, visitors are using their own mobile devices to access a corporate wireless network. Because access to
the network is restricted, visitors must first obtain a username and password. A guest account may be provisioned by
a corporate operator such as a receptionist, who can then give the visitor a print receipt that shows their username
and password for the network.
When visitors use self-registration, as might be the case for a network offering public access, the process is broadly
similar but does not require a corporate operator to create the guest account. The username and password for a selfprovisioned guest account may be delivered directly to the visitor’s Web browser, or sent via SMS or email.
Reference Network Diagram
The following figure shows the network connections and protocols used by ClearPass Guest.
Figure 2: Reference network diagram for visitor access
The network administrator, operators, and visitors may use different network interfaces to access the visitor
management features. The exact topology of the network and the connections made to it will depend on the type of
network access offered to visitors and the geographical layout of the access points.
Key Interactions
The following figure shows the key interactions between ClearPass Guest and the people and other components
involved in providing guest access.
ClearPass Guest is part of your network’s core infrastructure and manages guest access to the network.
NAS devices, such as wireless access points and wired switches on the edge of the network, use the RADIUS
protocol to ask ClearPass Policy Manager to authenticate the username and password provided by a guest logging in
to the network. If authentication is successful, the guest is then authorized to access the network.
Roles are assigned to a guest as part of the context ClearPass Policy Manager uses to apply its policies. RADIUS
attributes that define a role’s access permissions are contained within Policy Manager’s Enforcement Profile.
Additional features such as role mapping for ClearPass Guest can be performed in ClearPass Policy Manager.
The network usage of authorized guests is monitored by the NAS and reported in summary form to ClearPass Policy
Manager using RADIUS accounting, which allows administrators to generate network reports in ClearPass Insight.
AAA Framework
ClearPass Guest is built on the industry standard AAA framework, which consists of authentication, authorization,
and accounting components.
The following figure shows how the different components of this framework are employed in a guest access scenario.
Figure 4: Sequence diagram for network access using AAA
In the standard AAA framework, network access is provided to a user according to the following process:
l The user connects to the network by associating with a local access point [1].
To ensure that your network remains secure, decisions have to be made regarding guest access:
l Do you wish to segregate guest access? Do you want a different VLAN, or different physical network
infrastructure to be used by your guests?
l What resources are you going to make available to guests (for example, type of network access; permitted times
of day; bandwidth allocation)?
l Will guest access be separated into different roles? If so, what roles are needed?
l How will you prioritize traffic on the network to differentiate quality of service for guest accounts and non-guest
accounts?
l What will be the password format for guest accounts? Will you be changing this format on a regular basis?
l What requirements will you place on the shared secret, between NAS and the RADIUS server to ensure network
security is not compromised?
l What IP address ranges will operators be using to access the server?
l Should HTTPS be required in order to access the visitor management server?
AirGroup Deployment Process
AirGroup allows users to register their personal mobile devices on the local network and define a group of friends or
associates who are allowed to share them. You use ClearPass Guest to define AirGroup administrators and operators.
AirGroup administrators can then use ClearPass Guest to register and manage an organization’s shared devices and
configure access according to username, role, or location. AirGroup operators (end users) can use ClearPass Guest to
register their personal devices and define the group who can share them.
Table 5 summarizes the steps for configuring AirGroup functionality in ClearPass Guest. Details for these steps are
provided in the relevant sections of this Guide. This table does not include the configuration steps performed in
ClearPass Policy Manager or the W-Series controller. For complete AirGroup deployment information, refer to the
AirGroup Deployment Guide and the ClearPass Policy Manager documentation.
Table 5:
Summary of AirGroup Configuration Steps in ClearPass Guest
StepSection in this Guide
Create AirGroup administrators"Creating a New Operator" on page 248
Create AirGroup operators"Creating a New Operator" on page 248
Configure an operator’s device limit"Configuring AirGroup Operator Device Limit " on page 247
To authenticate AirGroup users via LDAP:
l Define the LDAP server
l Define appropriate translation rules
AirGroup administrator: Register devices or groups of
devices
AirGroup operator: Register personal devices"AirGroup Device Registration " on page 53
(Optional) Configure device registration form with dropdown lists for existing locations and roles
"External Operator Authentication" on page 248
"LDAP Translation Rules " on page 254
"AirGroup Device Registration " on page 53
"Customizing AirGroup Registration Forms " on page 147
This section describes the variety of user assistance available for ClearPass Guest.
Deployment Guide and Online Help
This Deployment Guide provides complete information for all ClearPass Guest features. The following quick links
may be useful in getting started.
Table 6:
Quick Links
For information about...Refer to...
What visitor management is and how it works
Using the guest management features
Role-based access control for operators"Operator Profiles " on page 242
Setting up LDAP authentication for operators"External Operator Authentication" on page 248
Guest self-provisioning features"Self Provisioned Guest Access" on page 28
Dynamic authorization extensions"RFC 3576 Dynamic Authorization" on page 61
SMS receipts for guest accounts"SMS Services " on page 228
Email receipts for guest accounts"Email Receipts and SMTP Services" on page 189
Network administration of the appliance"Administration " on page 219
"About Dell Networking W-ClearPass Guest" on
page 15
"Using Standard Guest Management Features" on
page 29
Context-Sensitive Help
For more detailed information about the area of the application you are using, click the context-sensitive Help link
displayed at the top right of the page. This opens a new browser tab showing the relevant section of this deployment
guide.
The deployment guide may be searched using the Search box in the top right corner.
Type in keywords related to your search and click the Search button to display a list of matches. The most relevant
matches will be displayed first. Words may be excluded from the search by typing a minus sign directly before the
word to exclude (for example-exclude). Exact phrase matches may also be searched for by enclosing the phrase in
double quotes (for example, “word phrase”).
The ClearPass Guest user interface has field help built into every form. The field help provides a short summary of
the purpose of the field at the point you need it most. In many cases this is sufficient to use the application
without further assistance or training.
Quick Help
In list views, click theQuick Help tab located at the top left of the list to display additional information about
the list you are viewing and the actions that are available within the list.
On some forms and views, the Quick Help icon may also be used to provide additional detail about a field.
If You Need More Assistance
If you encounter a problem using ClearPass Guest, your first step should be to consult the appropriate section in this
Deployment Guide.
If you cannot find an answer here, the next step is to contact your reseller. The reseller can usually provide you with
the answer or obtain a solution to your problem.
If you still need information, you can refer to the Contact Support command available under Support Services in
the user interface, or see "Contacting Support" on page 14.
Use of Cookies
Cookies are small text files that are placed on a user’s computer by Web sites the user visits. They are widely used in
order to make Web sites work, or work more efficiently, as well as to provide information to the owners of a site.
Session cookies are temporary cookies that last only for the duration of one user session.
When a user registers or logs in via a W-Series captive portal, Dell uses session cookies solely to remember between
clicks who a guest or operator is. Dell uses this information in a way that does not identify any user-specific
information, and does not make any attempt to find out the identities of those using its W-Series ClearPass
products. Dell does not associate any data gathered by the cookie with any personally identifiable information (PII)
from any source. Dell uses session cookies only during the user’s active session and does not store any permanent
cookies on a user’s computer. Session cookies are deleted when the user closes his/her Web browser.
Dell Networking W-ClearPassGuest 6.0 | Deployment GuideField Help | 25
26 | Use of CookiesDell Networking W-ClearPassGuest 6.0 | Deployment Guide
Chapter 3
Guest Manager
The ability to easily create and manage guest accounts is the primary function of Dell Networking W-ClearPass
Guest. The Guest Manager module provides complete control over the user account creation process.
Guest Manager features for managing guest accounts let you:
l Create single or multiple guest accounts and receipts
l List guest accounts and edit individual or multiple accounts
l View and manage active sessions
l Import new accounts from a text file
l Export a list of accounts
l View MAC devices
l Create new MAC devices
Many features can also be customized. For information on customizing Guest Manager settings, forms and views,
guest self-registration, and print templates, see "Configuration " on page 133.
Accessing Guest Manager
To access Dell Networking W-ClearPass Guest’s guest management features, click the Guest link in the left
navigation.
There are two major ways to manage guest access – either by your operators provisioning guest accounts, or by the
guests self-provisioning their own accounts. Both of these processes are described in the next sections.
Sponsored Guest Access
The following figure shows the process of sponsored guest access.
Figure 5: Sponsored guest access with guest created by operator
The operator creates the guest accounts and generates a receipt for the account.
The guest logs on to the Network Access Server (NAS) using the credentials provided on her receipt. The NAS
authenticates and authorizes the guest’s login in ClearPass Guest. Once authorized, the guest is able to access the
network.
Self Provisioned Guest Access
Self-provisioned access is similar to sponsored guest access, but there is no need for an operator to create the
account or to print the receipt. The following figure shows the process of self-provisioned guest access.
Figure 6: Guest access when guest is self-provisioned
The guest logs on to the Network Access Server (NAS), which captures the guest and redirects them to a captive
portal login page. From the login page, guests without an account can browse to the guest self-registration page,
where the guest creates a new account. At the conclusion of the registration process, the guest is automatically
redirected to the NAS to log in.
The guest can print or download a receipt, or have the receipt information delivered by SMS or email.
The NAS performs authentication and authorization for the guest in ClearPass Guest. Once authorized, the guest is
then able to access the network.
See"Customizing Self-Provisioned Access " on page 171 for details on creating and managing self-registration pages.
Using Standard Guest Management Features
This section describes:
l How to create a single guest account and a guest account receipt
l How to create multiple guest accounts and multiple guest account receipts
l How to create a single password for multiple accounts
l How to list and edit single and multiple guest accounts
To customize guest self-registration, please see Configuration on page 133.
Creating a Guest Account
To create a new account, go to Guest > Create Account, or click the Create New Guest Account command link on
the Guest Manager page. The New Visitor Account form opens.
NOTE: The New Visitor Account form (create_user) may be customized by adding new fields, or modifying or removing the
existing fields. See"Customizing Self-Provisioned Access " on page 171 for details about the customization process. The
default settings for this form are described below.
To complete the form, first enter the visitor’s details into the Sponsor’s Name, Visitor Name, Company Name and
Email Address fields. The visitor’s email address will become their username to log into the network.
Dell Networking W-ClearPassGuest 6.0 | Deployment GuideUsing Standard Guest Management Features | 29
You can specify the account activation and expiration times. The visitor account cannot be used before the
activation time, or after the expiration time.
The Account Role specifies what type of account the visitor should have.
A random password is created for each visitor account. This is displayed on this form, but will also be available on
the guest account receipt.
You must mark the Terms of Use check box in order to create the visitor account.
Click theCreate Account button after completing the form.
Creating a Guest Account Receipt
After you click the Create Account button on the New Visitor Account form, the details for that account are
displayed.
To print a receipt for the visitor, select an appropriate template from theOpen print window using template…
list. A new Web browser window will open and the browser’s Print dialog box will be displayed.
Click theSend SMS receipt link to send a guest account receipt via text message. Use the SMS Receipt form to
enter the mobile telephone number to which the receipt should be sent.
Sending SMS receipts requires the SMS Services plugin. If the administrator has enabled automatic SMS, and the
visitor’s phone number was typed into the New Visitor Account form, an SMS message will be sent automatically. A
message is displayed on the account receipt page after an SMS message has been sent.
Click theSend email receipt link to send an email copy of the guest account receipt. Use the Email Receipt form
to enter the email address to which the receipt should be sent. You can also specify the subject line for the email
message. If the administrator has enabled automatic email for guest account receipts, and the visitor’s email address
was typed into the New Visitor Account form, an email receipt will be sent automatically. A message is displayed on
the account receipt page after an email has been sent.
Creating Multiple Guest Accounts
The Create Guest Accounts form is used to create a group of visitor accounts.
To create multiple accounts, go to Guest > Create Multiple, or click the Create Multiple Guest Accounts
command link on the Guest Manager page. The Create Guest Accounts form opens.