Dell Powerconnect W-ClearPass Virtual Appliances W-ClearPass Guest 6.0 Deploym - Page 23

Security Policy Considerations, AirGroup Deployment Process

Page 23 highlights

Security Policy Considerations To ensure that your network remains secure, decisions have to be made regarding guest access: l Do you wish to segregate guest access? Do you want a different VLAN, or different physical network infrastructure to be used by your guests? l What resources are you going to make available to guests (for example, type of network access; permitted times of day; bandwidth allocation)? l Will guest access be separated into different roles? If so, what roles are needed? l How will you prioritize traffic on the network to differentiate quality of service for guest accounts and non-guest accounts? l What will be the password format for guest accounts? Will you be changing this format on a regular basis? l What requirements will you place on the shared secret, between NAS and the RADIUS server to ensure network security is not compromised? l What IP address ranges will operators be using to access the server? l Should HTTPS be required in order to access the visitor management server? AirGroup Deployment Process AirGroup allows users to register their personal mobile devices on the local network and define a group of friends or associates who are allowed to share them. You use ClearPass Guest to define AirGroup administrators and operators. AirGroup administrators can then use ClearPass Guest to register and manage an organization's shared devices and configure access according to username, role, or location. AirGroup operators (end users) can use ClearPass Guest to register their personal devices and define the group who can share them. Table 5 summarizes the steps for configuring AirGroup functionality in ClearPass Guest. Details for these steps are provided in the relevant sections of this Guide. This table does not include the configuration steps performed in ClearPass Policy Manager or the W-Series controller. For complete AirGroup deployment information, refer to the AirGroup Deployment Guide and the ClearPass Policy Manager documentation. Table 5: Summary of AirGroup Configuration Steps in ClearPass Guest Step Section in this Guide Create AirGroup administrators "Creating a New Operator" on page 248 Create AirGroup operators "Creating a New Operator" on page 248 Configure an operator's device limit "Configuring AirGroup Operator Device Limit " on page 247 To authenticate AirGroup users via LDAP: l Define the LDAP server l Define appropriate translation rules "External Operator Authentication" on page 248 "LDAP Translation Rules " on page 254 AirGroup administrator: Register devices or groups of devices "AirGroup Device Registration " on page 53 AirGroup operator: Register personal devices "AirGroup Device Registration " on page 53 (Optional) Configure device registration form with dropdown lists for existing locations and roles "Customizing AirGroup Registration Forms " on page 147 Dell Networking W-ClearPass Guest 6.0 | Deployment Guide Security Policy Considerations | 23

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320

Security Policy Considerations
To ensure that your network remains secure, decisions have to be made regarding guest access:
l
Do you wish to segregate guest access? Do you want a different VLAN, or different physical network
infrastructure to be used by your guests?
l
What resources are you going to make available to guests (for example, type of network access; permitted times
of day; bandwidth allocation)?
l
Will guest access be separated into different roles? If so, what roles are needed?
l
How will you prioritize traffic on the network to differentiate quality of service for guest accounts and non-guest
accounts?
l
What will be the password format for guest accounts? Will you be changing this format on a regular basis?
l
What requirements will you place on the shared secret, between NAS and the RADIUS server to ensure network
security is not compromised?
l
What IP address ranges will operators be using to access the server?
l
Should HTTPS be required in order to access the visitor management server?
AirGroup Deployment Process
AirGroup allows users to register their personal mobile devices on the local network and define a group of friends or
associates who are allowed to share them. You use ClearPass Guest to define AirGroup administrators and operators.
AirGroup administrators can then use ClearPass Guest to register and manage an organization’s shared devices and
configure access according to username, role, or location. AirGroup operators (end users) can use ClearPass Guest to
register their personal devices and define the group who can share them.
Table 5
summarizes the steps for configuring AirGroup functionality in ClearPass Guest. Details for these steps are
provided in the relevant sections of this Guide. This table does not include the configuration steps performed in
ClearPass Policy Manager or the W-Series controller. For complete AirGroup deployment information, refer to the
AirGroup Deployment Guide and the ClearPass Policy Manager documentation.
Step
Section in this Guide
Create AirGroup administrators
"Creating a New Operator" on page 248
Create AirGroup operators
"Creating a New Operator" on page 248
Configure an operator’s device limit
"Configuring AirGroup Operator Device Limit " on page 247
To authenticate AirGroup users via LDAP:
l
Define the LDAP server
l
Define appropriate translation rules
"External Operator Authentication" on page 248
"LDAP Translation Rules " on page 254
AirGroup administrator: Register devices or groups of
devices
"AirGroup Device Registration " on page 53
AirGroup operator: Register personal devices
"AirGroup Device Registration " on page 53
(Optional) Configure device registration form with drop-
down lists for existing locations and roles
"Customizing AirGroup Registration Forms " on page 147
Table 5:
Summary of AirGroup Configuration Steps in ClearPass Guest
Dell Networking W-ClearPass Guest 6.0 | Deployment Guide
Security Policy Considerations |
23