Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Example: Enforcing Security Policies on NFX Series Using Aruba ClearPass as the Authentication Source

 

This example covers how to configure security to protect your resources and control access to the internet using the NFX Series device integrated ClearPass authentication and enforcement feature, which relies on the Aruba ClearPass Policy Manager as its authentication source. The NFX Series integrated ClearPass feature allows you to configure security policies that control access to company resources and the Internet by identifying users by username, group name, or the name of a role that ties together a group of users and a device type.

Today’s network environments are more open to attacks of various kinds because they support anywhere, anytime, any device access, to a greater or lesser degree, and they allow a user to use multiple concurrently network-connected devices. Because it allows you identify the user by username, the integrated ClearPass authentication and enforcement feature narrows the security gap that these capabilities introduce.

For details on how user authentication and identity information is conveyed from the CPPM to the NFX Series device, see the following topics:

The example covers the following processes:

  • How to control access at the user level based on username or group name, not device IP address.

    You can use the source-identity parameter in a security policy to specify the name of a user or the name of a group of users whose authentication is provided by the CPPM. The policy is applied to traffic generated by the users when they attempt to access a protected resource or the Internet regardless of the device used. The access control is tied to the user’s name, and not directly to the IP address of the user’s device.

    Note

    You can configure different security policies for a single user that specify different actions, differentiated by the zones and the destination addresses specified or a group that the user belongs to.

  • How to display and interpret the contents of the ClearPass authentication table.

    The NFX Series device creates the ClearPass authentication table to contain user authentication and identity information that it receives from the CPPM. The device refers to the table to authenticate a user who requests access to a resource.

    The ClearPass authentication table contents are dynamic. They are modified to reflect user activity in response to various events and also in regard to security policies that reference groups.

    For example, when a user logs out of the network or in to the network, the ClearPass authentication table is modified, as is the case when a user is removed from a group or a referenced security policy that specifies a group that the user belongs to is deleted. In the latter case, the user entry no longer shows the user as belonging to that group.

    In this example, the ClearPass authentication table contents are displayed to depict changes made because of two events. The content for the users is displayed:

    • Before and after a specific user logs out of the network

    • Before and after a referenced security policy is deleted

      The entry for the user who belonged to the group referenced by the security policy is displayed before and after the policy is deleted.

Requirements

This section defines the software and hardware requirements for the topology for this example. See Figure 1 for the topology design.

The hardware and software components are:

  • Aruba ClearPass. The ClearPass Policy Manager (CPPM) is configured to use its local authentication source to authenticate users.

    Note

    It is assumed that the CPPM is configured to provide the NFX Series device with user authentication and identity information, including the username, a list of the names of any groups that the user belongs to, the IP addresses of the devices used, and the device posture token.

  • NFX Series device running Junos OS that includes the integrated ClearPass feature.

  • A server farm composed of six servers, all in the servers-zone:

    • marketing-server-protected (203.0.113.23 )

    • human-resources-server (203.0.113.25 )

    • accounting-server (203.0.113.72)

    • public-server (203.0.113.62)

    • corporate-server (203.0.113.71)

    • sales-server (203.0.113.81)

  • AC 7010 Aruba Cloud Services Controller running ArubaOS.

  • Aruba AP wireless access controller running ArubaOS.

    The Aruba AP is connected to the AC7010.

    Wireless users connect to the CPPM through the Aruba AP.

  • Juniper Networks EX4300 switch used as the wired 802.1 access device.

    Wired users connect to the CPPM using the EX4300 switch.

  • Six end-user systems:

    • Three wired network-connected PCs running Microsoft OS

    • Two BYOD devices that access the network through the Aruba AP access device

    • One wireless laptop running Microsoft OS

Overview

In its capacity as the authentication source for the integrated ClearPass feature, the CPPM posts to the NFX Series device user authentication and identity information. When it receives this information, the NFX Series UserID daemon processes it and generates entries for the authenticated users in the Routing Engine authentication table and then synchronizes that information to the ClearPass authentication table on the Packet Forwarding Engine side.

The NFX Series device requires the user authentication and identity information to verify that a user is authenticated when the user makes an access request and the traffic generated from the user’s device arrives at the NFX Series device. If a security policy exists that specifies in the source-identity parameter the username or the name of a group that the user belongs to, the NFX Series device searches the contents of its ClearPass authentication table for an entry for that user.

If it does not find an entry for the user in its ClearPass authentication table, the NFX Series device can search its other authentication tables, if you have configured a search order that includes them. See Example: Configuring the NFX Series Integrated ClearPass Feature to Allow the Device to Receive User Authentication Data from ClearPass for information about the authentication table search order.

The integrated ClearPass feature allows you to create identity-aware security policies configured to match traffic issued by users based on their username or the name of a group that they belong to.

Note

You configure role mappings on the CPPM, not on the NFX Series device.

For example, a device type role mapping might tie user identities to company-owned computers. You could specify this role as a group in a security policy configured to apply to all users who are mapped to the rule. In this case, the conditions set by CPPM for the rule—use of company-owned computer—would apply to all users mapped to the rule. The NFX Series device does not consider the conditions, but rather accepts the rule from the CPPM.

The following configurations included in this example cover security policies that are applicable based on the type of device used as defined by the CPPM through rule mappings. It is assumed that the CPPM posted to the NFX Series device the following mapped rules that are used as groups in security policies:

  • marketing-access-for-pcs-limited-group

    Maps jxchan to the device type PC.

    The policy that specifies marketing-access-for-pcs-limited-group in its source-identity field allows jxchan, and other users who are mapped to it, access to the marketing-server-protected server using their PC, whether it is company owned or not.

  • accounting-grp-and-company-device

    Maps users who belong to accounting groups using company devices. The CPPM sends the role accounting-grp-and-company-device to the NFX Series device. The mapping is done on the CPPM by role mapping rules.

    The policy that specifies accounting-grp-and-company-device in its source identity field allows users who are mapped to the rule to access protected resources on the accounting-server. The group accounting-grp is mapped to the rule. Therefore the mapped rule applies to the members of accounting-grp.

    The user viki2 belongs to accounting-grp. If all conditions apply—that is, if viki2 is using a company-owned device and the policy permits access—she is allowed access to the resources on accounting-server. But, recall that the NFX Series device does not analyze the rule. Rather it applies it to all users who are mapped to it by the CPPM.

  • guest-device-byod

    Maps the guest group to the device type byod—that is, any user-owned device brought to the network.

    The policy that specifies guest-device-byod in its source identity field denies users who are mapped to the rule access to all servers in the server zone if they are using smartphones or other user-owned devices. The username guest2 is mapped to this rule by the CPPM.

For all cases, if the users are allowed or denied access according to the security policy conditions, you can assume that the following conditions exist:

  • The CPPM posted the correct authentication information for the users and groups to the NFX Series device.

  • The NFX Series device processed the authenticated user information correctly and generated entries for the users and groups in its ClearPass authentication table.

Table 1 summarizes the users, their groups, and the zones to which they belong. All users belong to the default GLOBAL domain.

Table 1: Authenticated User Information for Security Policy Example

User

Group

Zone

Abe (abew1)

  • marketing-access-limited-grp

marketing-zone

John (jxchan)

  • posture-healthy

  • marketing-access-for-pcs-limited-group

  • marketing-general

  • sales-limited

  • corporate-limited

marketing-zone

Lin (lchen1)

  • posture-healthy

  • human-resources-grp

  • accounting-limited

  • corporate-limited

human-resources-zone

Viki (viki2)

  • posture-healthy

  • accounting-grp

  • accounting-grp-and-company-device

  • corporate-limited

accounting-zone

guest1

  • posture-healthy

  • guest

public-zone

guest2

  • posture-healthy

  • guest-device-byod

public-zone

Topology

Figure 1 shows the topology for this example.

Figure 1: Topology for the Integrated ClearPass Authentication Enforcement Through Security Policies Example
Topology for the Integrated ClearPass
Authentication Enforcement Through Security Policies Example

Configuration

This section covers how to configure the NFX Series device to include security policies that match traffic issued by users authenticated by the CPPM.

CLI Quick Configuration

To quickly configure this example, copy the following statements, paste them into a text file, remove any line breaks, change any details necessary to match your network configuration, copy and paste the statements into the CLI at the [edit] hierarchy level, and then enter commit from configuration mode.

Configuring Interfaces, Zones, and an Address Book

Step-by-Step Procedure

The following example requires you to navigate various levels in the configuration hierarchy. For instructions on how to do that, see Using the CLI Editor in Configuration Mode.

Configure the following interfaces and assign them to zones:

  • ge-1/0/3.0 > marketing-zone

  • ge-1/0/3.1 > human-resources-zone

  • ge-1/0/3.2> accounting-zone

  • ge-1/0/4.0 > public-zone

  • ge-1/0/4.1 > servers-zone

Because this example uses logical interfaces, you must configure VLAN tagging.

  1. Configure interfaces for the NFX Series device:
  2. Configure zones.
  3. Configure an address book containing the IP addresses of the servers to use as destination addresses in security policies.
  4. Attach the servers-zone-addresses address book to servers-zone.

Results

From configuration mode, confirm your configuration for interfaces by entering the show interfaces command. If the output does not display the intended configuration, repeat the instructions in this example to correct the configuration.

From configuration mode, confirm your configuration for zones by entering the show security zones command. If the output does not display the intended configuration, repeat the instructions in this example to correct the configuration.

From configuration mode, confirm your configuration for the address book by entering the show security address-book command. If the output does not display the intended configuration, repeat the instructions in this example to correct the configuration.

Configuring Identity-Aware Security Policies to Control User Access to Company Resources

Step-by-Step Procedure

This task entails configuring security policies that apply to a user’s access to resources based on username or group name, and not the IP address of the device used.

Note that all users belong to the default GLOBAL domain.

  1. Configure a security policy that specifies marketing-access-for-pcs-limited-group as the source-identity. It allows the user jxchan, who belongs to this group, access to any of the servers in the servers-zones when he is using a PC, whether it is a personal device or a company-owned device. The username jxchan is mapped by the CPPM to the rule marketing-access-for-pcs-limited-group.
  2. Configure a security policy that allows the user abew1 access to the marketing-zone-protected server (IP address 203.0.113.23 ) in the servers-zone regardless of the device that he uses.
  3. Configure a security policy that allows the user viki2 access to the accounting-server (IP address 203.0.113.72) in the servers-zone when she is using a company-owned device. The user viki2 belongs to accounting-grp which is mapped to the company-owned-device rule (accounting-grp-and-company-device) by the CPPM.
  4. Configure a security policy that allows users who belong to the corporate-limited group limited access to the corporate-server server (IP address 203.0.113.71) in the servers-zone when they are initiating a request from the human-resources zone.

    If the source-address were specified as “any”, the policy would apply to other users who also belong to the corporate-limited group.

  5. Configure a security policy that allows the user abew1 access to the corporate-server (IP address 203.0.113.71) server in the servers-zone. The user abew1 belongs to marketing-access-limited-grp to which the security policy applies.
  6. Configure a security policy that allows users who belong to the sales-limited-group access to the human-resources-server (IP address 203.0.113.81) server when they initiate a request from the marketing-zone. The user jxchan belongs to sales-limited-group.
  7. Configure a security policy that allows users who belong to the guest group access to the public-server (IP address 203.0.113.91) in the servers-zone.
  8. Configure a security policy that denies users who belong to the guest-device-byod group access to any servers in the servers-zone when they use their own devices.

Results

From configuration mode, confirm your security policies configuration for integrated ClearPass by entering the show security policies command.

If the output does not display the intended configuration, repeat the configuration instructions in this example to correct it.

Verification

This section verifies the ClearPass authentication table contents after certain events occur that cause some of its user authentication entries to be modified. It also shows how to ensure that the ClearPass authentication table has been deleted successfully after you issue the delete command. It includes the following parts:

Displaying the ClearPass Authentication Table Contents Before and After an Authenticated User Logs Out of the Network

Purpose

Display the ClearPass authentication table contents when a specific, authenticated user is logged in to the network and after the user logs out.

Action

Enter the show services user-identification authentication-table authentication-source authentication-source command for the ClearPass authentication table, which is referred to as aruba-clearpass. Notice that the ClearPass authentication table includes an entry for the user viki2.

show services user-identification authentication-table authentication-source aruba-clearpass

Enter the same command again after viki2 logs out of the network. Notice that the ClearPass authentication table no longer contains an entry for viki2.

Displaying the Authentication Table Contents Before and After a Referenced Security Policy Is Deleted

Purpose

Display the ClearPass authentication table contents for a specific user—lchen1—who belongs to a group that is referenced by a security policy. Delete that security policy, then display the entry for that user again.

Action

Enter the show service user-identification authentication-table authentication-source user user-name command to display the ClearPass authentication table entry for a specific user, lchen1. Notice that it includes the group corporate-limited.

show service user-identification authentication-table authentication-source user lchen1

The human-resources-p1 security policy source-identity field refers to the group corporate-limited. As shown above in the ClearPassauthentication entry for him, the user lchen1 belongs to that group. Here is the configuration for the human-resources-p1 referenced security policy:

After you delete the human-resources-p1 security policy, whose source-identity parameter refers to the group called corporate-limited, enter the same command again. Notice that the authentication entry for lchen1 does not contain the corporate-limited group.

show service user-identification authentication-table authentication-source aruba-clearpass user lchen1

Take a different approach in verifying the ClearPass authentication table state after the modification. Display the entire table to verify that the group—corporate-limited—is not included in any of the user entries. Note that if more than one user belonged to the corporate-limited group, authentication entries for all of the affected users would not show that group name.

From operational mode, enter the show services user-identification authentication-table authentication-source aruba-clearpass command.

show services user-identification authentication-table authentication-source aruba-clearpass