Wired Intelligent Edge

 View Only
  • 1.  Issue with MAC-Auth and tunneling without preauth-role

    Posted Apr 29, 2025 11:34 AM

    Good morning! I am still in the very early stages of a Clearpass and Wired security deployment/testing. I'm running into a strange issue on the switches running CX and some of my Aruba AP's. 

    Our Aruba AP's use a MAC-AUTH service to authenticate to Clearpass. Right now, my Role Mappping Policy looks for the O/S Family to equal "Aruba" and the category to equal "Access Points" in order for clearpass to assign it the "AP" role. Our enforcement policy would then give it a Local User Role that basically allows the device full access. The default role of our MAC-AUTH service would be to tunnel devices to our Aruba wireless controller where firewall policies can be applied in order to deal with devices we do not recognize

    When one of the Aruba AP's boots up and hits Clearpass, it doesn't pass all of the device fingerprint information to ClearPass, so ClearPass designates the default policy we have of tunneling the device to our Aruba controller, by assigning the device the local user tunnel role. No matter how many times I boot the device, it never passes all of the information to Clearpass. 

    With my testing, I've gone as far to completely remove any "Deny" statements in the ACL that is applied to the role on the wireless controller/mobility master. The VLAN that it drops those devices into should have full access to clearpass, etc. 

    Here is the port-access client list. Devices are given that "LUR-UBT-User" role and tunneled off. The AP is on interface 1/1/3

    6300(config-if)# show port-access clients 

    Port Access Clients

    RADIUS overridden user roles are suffixed with '*'

    Flags: Onboarding-Method|Mode|Device-Type|Status 

    Onboarding-Method: 1x 802.1X, ma MAC-Auth, ps Port-Security, dp Device-Profile 
    Mode: c Client-Mode, d Device-Mode, m Multi-Domain 
    Device-Type: d Data, v Voice 
    Status: s Success, f Failed, p In-Progress, d Role-Download-Failed 

    --------------------------------------------------------------------------------------------------------------
    Port     Client-Name             IPv4-Address    User-Role                           VLAN            Flags    
    --------------------------------------------------------------------------------------------------------------
    1/1/1    host/SR2160-TEST.cdn... 10.11.88.20     COD-MACHINE                         multi           1x|c|-|s
    1/1/3    b45d50c82a60            10.11.88.243    LUR-UBT-User                        (u)4091         ma|c|-|s

    Now .. what I've found is: If I issue this the "preauth-role" command to the interface and assign it one of the local roles on the switch, the device is able to pass all of the necessary device attributes to Clearpass, and the device is profiled properly and given the correct role.

    6300(config-if)# show run interface 1/1/3
    interface 1/1/3
        no shutdown 
        mtu 9198
        no routing
        vlan trunk native 1188
        vlan trunk allowed 1188,1190
        spanning-tree port-type admin-edge
        aaa authentication port-access client-limit 12
        aaa authentication port-access preauth-role COD-MACHINE
        aaa authentication port-access dot1x authenticator
            eapol-timeout 10
            max-eapol-requests 1
            max-retries 1
            enable
        aaa authentication port-access mac-auth
            enable
        exit

    Here, 1188 is my data vlan, and 1190 is my voice vlan, for phones. If i use the pre-auth role of COD-MACHINE, the device is placed in the normal 1188 vlan for initial authorization, and it communicates perfectly well with clearpass. Below, you can see the authorization attributes are now passed into Clearpass

    The device is given the "COD-AP" role and enforcement policy gives it the "COD-MACHINE" user role to pass to the switch

    --------------------------------------------------------------------------------------------------------------
    Port     Client-Name             IPv4-Address    User-Role                           VLAN            Flags    
    --------------------------------------------------------------------------------------------------------------
    1/1/1    host/SR2160-TEST.cdn... 10.11.88.20     COD-MACHINE                         multi           1x|c|-|s
    1/1/3    b45d50c82a60            10.11.88.243    COD-MACHINE                         multi           ma|c|-|s

    Is this expected behavior? perhaps I'm missing something with the allowed vlans and the tunnel node vlan?

    Would love some input



  • 2.  RE: Issue with MAC-Auth and tunneling without preauth-role

    Posted Apr 30, 2025 03:04 AM

    In order to get profiling information in, you would need to get (unknown) clients in a role that allows at least DHCP, and in a VLAN that has an ip-helper (or DHCP relay) to the ClearPass server. Goal is that the DHCP request reach the ClearPass server for profiling purposes (ClearPass will NOT respond with an IP, so make sure you have a real DHCP server as well).

    If you tunnel the traffic for unknown devices, if that is LUR-UBT-User, the traffic is tunneled to the controller/gateway, there you can easily make sure DHCP is allowed and forwarded to the ClearPass.

    In the case you are not fully familiar with how this works, it may be good to ask your partner to have a look together. For someone who fully understands the working, it will be trivial to make this work.



    ------------------------------
    Herman Robers
    ------------------------
    If you have urgent issues, always contact your HPE Aruba Networking partner, distributor, or Aruba TAC Support. Check https://www.arubanetworks.com/support-services/contact-support/ for how to contact HPE Aruba Networking TAC. Any opinions expressed here are solely my own and not necessarily that of Hewlett Packard Enterprise or HPE Aruba Networking.

    In case your problem is solved, please invest the time to post a follow-up with the information on how you solved it. Others can benefit from that.
    ------------------------------



  • 3.  RE: Issue with MAC-Auth and tunneling without preauth-role

    Posted Apr 30, 2025 09:18 AM

    So the VLAN that tunneled devices get does use DHCP. It's the same VLAN that our wireless guest users go into. The VLAN already has the IP of the clearpass cluster listed in the group of IP-Helpers on our core switches. However, I did not set up the controller and am unfamiliar with any DHCP settings that may exist there? 

    It's very possible, if there's some hidden DHCP options that I'm not aware of on the controller, that this may clear up several other issues i've been encountering, including devices that are PXE booting and having issues sending their attribute information as well.




  • 4.  RE: Issue with MAC-Auth and tunneling without preauth-role

    Posted Apr 30, 2025 03:12 AM

    You can also do 802.1X authentication for your Aruba APs with the built in certificate for better security.
    Check out Herman´s video on the Airheads channel.

    https://www.youtube.com/watch?v=5QjUix9yL1U&t=5s&ab_channel=AirheadsBroadcasting