: Set up Aruba ClearPass for Integration
Focus
Focus

Set up Aruba ClearPass for Integration

Table of Contents

Set up Aruba ClearPass for Integration

Set up Aruba ClearPass for integration with IoT Security through Cortex XSOAR.
Note: These instructions are based on Aruba ClearPass 6.9.0. They should remain valid with later versions of ClearPass although it’s possible that some elements in the UI might change in the future.
  1. Create an operator profile.
    You must use an operator profile that has full access to API services, ClearPass Insight, and ClearPass Policy Manager. If you already have such a profile, you can use that when configuring the RESTful API client. Otherwise, create a new profile as described here:
    1. Log in to ClearPass Guest, click AdministrationOperator LoginsProfilesCreate a new operator profile.
    2. Enter the following in the Operator Profile Editor that appears, leave the other settings at their default values, and then Save Changes:
      Name: Enter a name for the profile, such as iot-security_api.
      Privileges
      API Services: Full Access
      Insight: Full Access
      Policy Manager: Full Access
  2. Add a RESTful API client.
    Define a client for the XSOAR engine to use when accessing the Aruba ClearPass API. There are two important settings that you must record so that you can enter them later when configuring an Aruba ClearPass instance on Cortex XSOAR: the client ID and client secret. The client uses the operator profile that you created in the previous step.
    1. While still logged in to Aruba ClearPass Guest, click AdministrationAPI ServicesAPI ClientsCreate API Client.
    2. Enter the following in the Create API Client dialog box, leave the other settings at their default values, and then click Create API Client:
      Client ID: Enter a unique text string for the client ID. Note what it is so that you can enter it later when configuring the integration settings in Cortex XSOAR.
      Operator Profile: Choose the operator profile you configured in the previous section; for example, iot-security_api.
      Grant Type: Client credentials (grant_type=client_credentials)
      When you choose this, ClearPass Guest automatically generates a client secret and displays it. Record the client secret for later use when configuring Cortex XSOAR.
    When IoT Security connects through XSOAR to Aruba ClearPass, ClearPass automatically generates custom endpoint attribute names that IoT Security populates with the device data it learns. You don’t have to define these names in ClearPass; they are automatically created. The following list shows some of the default attribute names.
    Attribute NameEntityData TypeComments
    PanwIoTProfileEndpointStringDevice profile
    PanwIoTIPEndpointStringDevice IP address
    PanwIoTCategoryEndpointStringCategory to which the device belongs
    PanwIoTRiskScoreEndpointStringRisk score of the device
    PanwIoTConfidenceEndpointStringConfidence score for device identification
    PanwIoTTagEndpointStringAsset tag, which IoT Security learns from an integrated CMMS solution
    PanwIoTHostnameEndpointStringDevice hostname
    PanwIoTOSEndpointStringOperating system of the device
    PanwIoTModelEndpointStringDevice model
    PanwIoTVendorEndpointStringDevice vendor
    PanwIoTSerialEndpointStringSerial number of the device
    PanwIoTEPPEndpointStringWhether the device has endpoint protection
    PanwIoTInternetAccessEndpointStringWhether the device has Internet access
    PanwIoTAETEndpointStringApplication entity title (if learned from X-ray machines, ultrasound machines, PACS servers, DICOM workstations, and DICOM viewers)
    If you want to use different names than those shown here, change the default attribute names in the Aruba ClearPass incremental and bulk export job settings in Cortex XSOAR. See Configure IoT Security and Cortex XSOAR for Aruba ClearPass. When XSOAR next connects with ClearPass, ClearPass automatically generates the customized attribute names.
  3. Enable Insight.
    By enabling Insight, IoT Security can enrich the device characteristics it learns from monitoring network traffic with data from ClearPass.
    1. While logged in to ClearPass Policy Manager, click AdministrationServer ManagerServer Configuration, and then click your server name.
    2. On the System tab, select Enable Insight and Enable as Insight Master, leave the other settings as they are, and then Save.
  4. Configure policies and profiles.
    Once IoT Security and Aruba ClearPass are integrated, IoT Security provides ClearPass with device profiles that you can then use to create security groups for defining network segments and access policies.
    1. In ClearPass Policy Manager, click ConfigurationEnforcement and add policies to segment IoT devices into VLANs based on PanwIoTProfile attribute values.
    2. While in the same Enforcement section, add enforcement profiles to isolate and quarantine devices based on alert-triggered notifications.