ClearPass Guest Access with Username only

ClearPass - Username Only Captive Portal

Reading Time: 17 minutesIn the past, I saw a lot of guest workflows which either did a very overloaded username and password authentication to fully authenticate the guest or the simple “Just Accept the Ts and Cs”. The first one is very complex for the guest but gives you the option to see who is online and controls … Read more

HPE Greenlake SSO with Google Workspace

Reading Time: 7 minutesFor many organisations is it obvious to use HPE Greenlake SSO to authenticate their users for that service. From my personal experience I can tell that most of them require help somewhere in the process. There are plenty posts about using HPE Greenlake SSO with Azure like the one on the HPE Developer Blog: Configuring … Read more

ClearPass SSO with Google Workspace

ClearPass SSO with Google Workspace - Access Tracker Input

Reading Time: 8 minutesYou can easily configure ClearPass SSO to use Google Workspace for all kinds of Single Sign On based logins. This post will show how to use Google Workspace to authenticate your ClearPass Operators and Guest admins. I have quite a similar post with Azure AD here: ClearPass SSO with Azure AD If you read the … Read more

Use ClearPass RestAPI in Enforcement Profile

Added Device in the Guest Device DB using ClearPass RestAPI

Reading Time: 6 minutesThe ClearPass RestAPI is powerful and has many helpful options during authentication, e.g. sending a mail as a notification. The following post will show, how to use the ClearPass RestAPI during authentication for different tasks. In my scenario, I will create an entry in the Guest Device Repository, if the mac address is unknown and … Read more

Add Custom SQL Queries to CPPM Auth Sources

Custom Queries are not allowed

Reading Time: 3 minutesWe all know the default authentication sources in ClearPass, like GuestDB or Time Source. Since some versions, it is impossible to edit or add custom SQL queries for those authentication sources. This is cumbersome and breaks some often-used scenarios. If you see the following error, you are in the situation I’m talking about: There is … Read more

Azure Routing for EVE-NG

Azure Routing - Effective Routes

Reading Time: 4 minutesThis time I write a small post about my Azure Routing for EVE-NG and how to get this working with my Azure Gateway to access nodes on the EVE-NG. In a previous post, I wrote about the IPSec tunnel from my home lab to Azure. To get access to the nodes on the EVE-NG VM … Read more

Azure Site to Site VPN with an Aruba Gateway

Aruba Gateway Site to Site VPN - Tunnel Status

Reading Time: 4 minutesAs described in earlier posts I run EVE-NG in Azure. For several reasons, I need a direct connection to EVE-NG and the nodes within EVE-NG. I could use an Aruba Gateway in Azure but this would consume too much of my tight budget, so I decided to use an Azure Site to Site VPN with … Read more

Unmanaged SD-Branch Virtual Gateway in EVE-NG

Virtual Gateway - Download Device Identity

Reading Time: 3 minutesFor some testing, I need some Aruba SD-Branch gateways. Instead of using hardware gateways, which I do not have, I use a virtual gateway. You could run them in ESXi as well, but why not use EVE-NG for this. For instructions on how to install EVE-NG use the following link: EVE-NG in Azure For other … Read more

Wired Guest Access with Aruba Wireless Gear

Create new Network - Security

Reading Time: 6 minutesThis is maybe an uncommon scenario but I was asked to write something about this topic. Let’s assume you have Aruba Wireless Gear but your switching stuff is not from Aruba. In this post, I will show how to configure Aruba Controllers or Aruba IAPs to provide Guest Access to wired users as well. I … Read more

Aruba Downloadable User Roles

Downloadable User Role Flow Chart

Reading Time: 16 minutesThis post is all about Aruba Downloadable User Roles and how to use them for wired and wireless access with dot1x and mac authentication. If you use Downloadable User Roles, you get a central point of configuration for all access-related configurations. ClearPass, which is used as the radius server, will have all the roles available. … Read more