Cloudpath Admin-200 SG 5.1 L
Cloudpath Admin-200 SG 5.1 L
Student Guide
Revision 0817
CPA 200
ADX, Brocade, Brocade Assurance, the B-wing symbol, DCX, Fabric OS, HyperEdge,
ICX, MLX, MyBrocade, OpenScript, The Effortless Network, VCS, VDX, Vplane, and
Vyatta are registered trademarks, and Fabric Vision and vADX are trademarks of Brocade
Communications Systems, Inc., in the United States and/or in other countries. Other
brands, products, or service names mentioned may be trademarks of others.
Notice: This document is for informational purposes only and does not set forth any
warranty, expressed or implied, concerning any equipment, equipment feature, or service
offered or to be offered by Brocade. Brocade reserves the right to make changes to this
document at any time, without notice, and assumes no responsibility for its use. This
informational document describes features that may not be currently available. Contact a
Brocade sales office for information on feature and product availability. Export of technical
data contained in this document may require an export license from the United States
government.
Revision 0817 1 - 10
CPA 200 Introduction
Revision 0817 1 - 11
CPA 200 Introduction
Revision 0817 1 - 12
CPA 200 Introduction
Revision 0817 1 - 13
CPA 200 Introduction
Revision 0817 1 - 14
Cloudpath Admin 200 Cloudpath Overview
BYOD and the Internet of Things offer new challenges to Wireless LAN providers.
IoT enables thousands of new devices each day to networks, communicating data
both wired and wirelessly. Laptops, smartphones, thermostats, refrigerators,
lamps, lightbulbs, and more all require network access. Each of these devices
represents new data and risks to your wireless network.
Cloudpath has built-in services to facilitate certificate management and the on-
boarding process:
• Mail & SMS Service: Sends enrollment vouchers to emails addresses or text
message to users devices onboarding to the WLAN
• Web Server (HTTP/HTTPS): The Cloudpath web server allows clients to enroll
a device from anywhere prior to being on site or within range of the WLAN
• Lite Network Access Control (NAC) & Mobile Device Management (MDM):
enforces network and device setting policies during the on-boarding process.
• Note: NAC and MDM policies are only enforced during enrollment and
access to the WLAN and are not persistent or checked after enrollment
in Cloudpath 5.1
• MDM Integration: Use the built-in light NAC and MDM or integrate with an
existing MDM provider for persistent NAC and MDM after the onboarding
process.
• Google Console: Deploy The Cloudpath Extension using the Google Console
For Zero IT Certificate Installation.
• To distribute certificates to managed Chromebooks, a Cloudpath
extension is pushed via the Google Admin Console. This extension will
recognize when the device has been authorized and automatically
queries the certificate and install it in the Trusted Platform Module
(TPM).
There are many combinations of users and devices that will onboard to your
WLAN.
Cloudpath allows you to define the onboarding journey by:
• Creating classifications of the devices and users
• Establishing granular controlled access by individual users and devices
• Administering policies and requirements to onboard to your WLAN
• Segregating users and access by SSIDs and VLANs
Revision 0817 2 - 10
Cloudpath Admin 200 Cloudpath Overview
Not all devices are safe to allow onto the WLAN as-is. Cloudpath provides
802.1x secure on-boarding for both Wired and Wireless LANs. During
activation, the user will go through an administrator-specified workflow to get
authenticated, authorized, configured, and moved to the secure SSID.
Example:
• Cloudpath Enrollment System creates a workflow split: Visitor or
Employee.
• Workflows refine the type of access by splitting each of the categories to
separate journeys with different policies and device requirements
• Each of these splits can follow separate policy paths as they continue
through the workflow
• Remediation prior to access: Cloudpath the device settings before getting it
onto the network i.e.: enable Firewall, check for antivirus & windows
updates install custom apps and more. verifies
• A workflow can assign one or more device certificates to authenticate the
access privilege granted.
• After the workflow requirements are met the user device is redirected to the
WLAN and SSID defined by the policy for that device’s journey
Revision 0817 2 - 11
Cloudpath Admin 200 Cloudpath Overview
While what the user sees is simple, there is a lot going on behind the scene to
protect the users, networks, and business. The process of configuring and
connecting a device to the secure network requires the integration of many
components of your network.
In Cloudpath you can also configure Contractor and Guest access to the WLAN.
ES can control the default or maximum time users are allowed access to the
WLAN. For example access can be granted for the single day of an event or the
duration of a user’s contract. Additionally, a user can pre-board a device via
Cloudpath’s Web service before they arrive onsite.
Revision 0817 2 - 12
Cloudpath Admin 200 Cloudpath Overview
Revision 0817 2 - 13
Cloudpath Admin 200 Cloudpath Overview
Revision 0817 2 - 14
Cloudpath Admin 200 Cloudpath Overview
Revision 0817 2 - 15
Cloudpath Admin 200 Cloudpath Overview
1. What are the 3 key services does Cloudpath ES Provide? (Answer: Device
Enablement, Certificate Management, Policy Management)
3. What are the 2 types of Cloudpath Deployments? (Answer: Hosted & Cloud)
Revision 0817 2 - 16
Cloudpath Admin 200 Cloudpath Overview
Revision 0817 2 - 17
Cloudpath Admin 200 Cloudpath Overview
Revision 0817 2 - 18
Cloudpath Admin 200 Certificates and Secure WiFi
Trust: Can be gained by the confidence of the organization that issued the
certificate. Browsers for example, offer visual cues often in the form of a lock
icon providing visitors with the knowledge of when their connection is secure. This
provides evidence to the user that the website is taking steps to secure the
communication between both parties.
Certificates are installed on the server and is used by its clients for security.
Connecting clients are presented with the servers certificate allowing them to
validate the server and establish an encrypted session. These clients have the
ability to examine the certificate to ensure it has not expired, been revoked and is
valid through a process called chain of trust (discussed later).
Because most clients do not have certificates installed, their identify is either
implied or validated through other means such as login credentials etc. This form
of identification can be compromised such as lost or shared passwords and is
required every time a user needs to connect to the network.
Cloudpath provides the ability to install and use certificates on client devices
providing validity for both sides of the connection. It also allows for greater
security by relying on the certificates and not a username/password
authentication method. Certificates also allow for authentication to be specific to a
device instead of anything a user can enter their credentials on.
Server certificates: The public portion of the certificate used by the secure
services server. Any device needing secure connection is presented the servers
certificate for validation and encryption. The server certificate does not contain the
private key and is safe to distribute. The RADIUS server provides the server
certificate to every device that attempts to connect.
TLS client certificate: (If used) The transport layer security (TLS) certificate
submitted by the client’s device allowing the use of the SSL protocol during the
login process. This certificate contains information about the client and about the
organization that issued the certificate.
The difference between a public and private certificate is based more on who has
issued it. As the name implies a public certificate issuer works to establish itself to
all devices making its issued certificates immediately identifiable/trustworthy .
These efforts of a public certificate signer allows them to charge for their services
and certificates they issue.
Private certificate issuers many times have to introduce themselves (install root
certificate) among clients and servers that are going to use certificates they issue.
Certificates can be issued based its use and on the domain and subdomain
structure of the service it is issued for.
Name: Items such as the name, e-mail address, common domain name, and
other details. Additional information can be provided depending on the level of
validation the certificate is created for.
Serial Number: A unique value for the certificate coming from a given CA. The
serial number combined with the issuer name provide a unique certificate. Serial
numbers can be expected to contain long integers (up to 20 octets). A validity
date will accompany the certificate which can vary. With Cloudpath issuing client
certificates and using them for validation, greater control is achieved within your
environment ensuring devices do not “linger” on the network by setting
reasonable expiration dates on the certificates issued.
Public Key: This public-key does not exist as a file, but rather is produced when
a certificate and private key are created.
Signature: This field contains the algorithm identifier for the algorithm used by
the CA to sign the certificate verify it was issued by them.
Using this information/data the certificate can provide proof that the website you
are connecting to is the one intended. Or depending on the level of verification it
can also verify that the website you are connecting to belongs to the correct
representing company.
A certificate chain consists of all the certificates needed to certify the user or
device by the end certificate. The chain includes the end certificate, the
certificates of intermediate CAs, and the certificate of a root CA trusted by all
parties in the chain.
Cloudpath uses the public cert to verify and secure access to the onboarding site
however will manage its client certificates from its internal CA issuing internal
intermediate certificates to its on boarded users.
Referring back to the passport example: The passport can be verified by the
issuing authority allowing it to be trusted by other countries. The credibility of the
passport is based on the issuer and not the passport itself.
The public Root CA certificates are built into the clients browser or OS and the
browser can use it to refer back to the Root Certificate to validate any certificates
issued by that Certificate Authority.
Generally the intermediate certificate(s) are sent by the server to the client during
its initial connection and SSL / TLS certificate exchange
If an intermediate certificate is used in the chain of trust and is missing or expired
then the client will not be able to verify the chain of trust and a security warning
will be displayed
CRL:
As the name implies it’s a list of certificates revoked by the CA
Typically updated every 5-14 days
Clients may have to check through 1000’s of revoked certificates so its inefficient
OCSP:
Allows the client to check individual certificate validly so very efficient compared to
CRL’s
Used by Cloudpath to check for revoked client certificates
Again referring back the passport example: Passports can be verified and
revoked by the issuer at any time. Processes are in place that allow for the
identification of revoked passports at the time they are being used removing the
benefits to the individual that it provides.
Revision 0817 3 - 10
Cloudpath Admin 200 Certificates and Secure WiFi
Revision 0817 3 - 11
Cloudpath Admin 200 Certificates and Secure WiFi
Unlike wired networks, where a level of physical access is required, the ability to
intercept signals on WLANs is very easy. Those who wish to do harm do not need
to enter your building, simply parking across the street provides all the access
they need.
Over the air encryption: is crucial for persistent security. Mutual authentication
by networks and clients is only as good as we are able to keep that
communication private and secure.
Revision 0817 3 - 12
Cloudpath Admin 200 Certificates and Secure WiFi
There are three main categories of wireless network security methods: Open,
WPA2-PSK and WPA2 Enterprise
Open Wi-Fi networks have their place in an overall Wi-Fi solution but they
should never be considered Secure. The ideal use case for Open Wi-Fi networks
are shopping malls, Coffee shops, and other public venues. The reason for this is
that public venues in and of themselves are not considered highly secure. One
does not have a sensitive conversation out in the open.
In Cloudpath an open network is used to allow users access to the network for
their onboarding. This access however is limited using a walled garden and any
unauthenticated user is redirected when they connect to the onboarding portal.
Revision 0817 3 - 13
Cloudpath Admin 200 Certificates and Secure WiFi
The positives of Open Wi-FIs are ease of access and availability, you just
connect. Some open Wi-Fi's use captive portals providing Limited authentication
via social media or self disclosure. Captive portals and open SSIDs provide know
security. Additionally, most users find that captive portal sites are an annoyance
and in the way of their productivity.
Note: Cloudpath uses Open Wi-Fi in concert with Walled Gardens to begin the
secure onboarding. More on Walled Gardens in later modules
WPA2 Pre-shared Key or PSK uses a shared key, or common password for all
users, as the basis for over-the-air encryption. This level of encryption is minimal
and valuable on a small scale, but is only as secure as the length of the PSK,
and how limited it is distributed.
The challenges with PSK, the network has no means to validate who an individual
user is. Any client holding the PSK may enter. WPA2-PSK was intended for
home use on a limited number of devices. Unfortunately, we also see it used on
education campuses, and corporate visitor wireless networks.
Change in the pre-shared key De-authorizes all users from the wireless network.
This is a network management nightmare for help desks as they are call an
endless cycles of handing out PSKs over and over again.
There is no inherent value in PSK's for BYOD environments as devices and users
cannot be separated for the purpose of providing levels of access to the network.
No User differentiation or validation of users for access levels means every
connected device is a BYOD.
Revision 0817 3 - 14
Cloudpath Admin 200 Certificates and Secure WiFi
The most secure WLANs use WPA2-Enterprise and 802.1X. The term
”Enterprise” denotes the use of a RADIUS Server . WPA2-Enterprise provides:
client authentication, network validation, and over-the-air encryption. This is at
the heart of Cloudpath. For this level of security there are some increased
complexities. WPA2-Enterprise requires the configuration of, or a connection to, a
RADIUS server. This connection is available in Cloudpath both on VM and
Hosted. If the environment does not have a RADIUS Server, Cloudpath has one
built in.
Revision 0817 3 - 15
Cloudpath Admin 200 Certificates and Secure WiFi
Certificates are the gold standard in security, not just for Wi-Fi but for numerous
technologies. Certificates have been used in Windows, Unix, and server domains
for years
Revision 0817 3 - 16
Cloudpath Admin 200 Certificates and Secure WiFi
Revision 0817 3 - 17
Cloudpath Admin 200 Certificates and Secure WiFi
ES can deploy Web Browser certificates that need to be trusted
If clients need to have additional Root or Intermediate CA certificates
loaded during provisioning this can be accomplished using the “Trust”
settings in Device Configurations
Examples are private CA’s or re-signed Man in the Middle (MitM) SSL
Proxy certificates
Revision 0817 3 - 18
Cloudpath Admin 200 Certificates and Secure WiFi
Revision 0817 3 - 19
Cloudpath Admin 200 Certificates and Secure WiFi
1. A server should have a certificate installed for each secure service. True or
False? (Answer: True)
2. On-boarded clients are authenticated when connecting to the network using
________________? (Answer: Cloudpath issued Certificates)
3. Certificates are confirmed they are still valid using ______________?
(Answer: Online Certificate Status Protocol (OCSP) )
4. Cloudpath uses ____________ secure Wi-Fi method deploying
____________ for encryption? (Answer: WPA2 Enterprise using EAP-TLS for
encryption)
Revision 0817 3 - 20
Cloudpath Admin 200 Certificates and Secure WiFi
Revision 0817 3 - 21
Cloudpath Admin 200 Certificates and Secure WiFi
Revision 0817 3 - 22
Cloudpath Admin 200 Cloudpath Installation
Note Open Virtualization Appliance (OVA) is a open virtualization file format type.
It is the container for the virtual machine.
Supported Browsers
• Internet Explorer 6.0 and later •Firefox 1.5 and later
• Safari 2.0 and later
• Chrome 3.0 and later
The OVA file can be retrieved from either an activation code, received in email, or
from the licensing server.
From the hyperlink in the activation email you can navigate to the Cloudpath
licensing server, enter activation code, and retrieve the OVA file. Note, if you have
retrieve the OVA file before, Select “Already have credentials for the Cloudpath
license server?” and login via your email address and password.
Log into the Cloudpath licensing server from the credentials in your activation
email or go to https://xpc.cloudpath.net
From the license server you can download the OVA, manage accounts, and
licenses. There is also a link to the current release notes. It is best practice to
read the release notes prior to downloading the OVA.
Console Deployment
• 12 steps to complete then reboot
• Steps can be found in the ES Template Information
Default Service Account: cpn_service
Notes:
• The service account is not available if SSH access is not permitted.
• The shell user is only available during the initial system configuration. After the
initial boot, you must use the service password to access the system.
Use the following commands to explore the Cloudpath lab VM via Linux command
line
Revision 0817 4 - 10
Cloudpath Admin 200 Cloudpath Installation
If you are setting up a Cloudpath account for the first time, you will be sent an
activation code in the activation email.
When browsing to the Cloudpath VM IP address via HTTPS, the first time the
user will see a certificate error. The error will be resolved in future access after
installing the VM Certificate. For initial access, bypass the certificate error by
adding an exception in the browser.
Enter the Cloudpath Activation Code from the activation email.
If you already have a Cloudpath License Server account, use that account to
activate the new Cloudpath ES VM.
Revision 0817 4 - 11
Cloudpath Admin 200 Cloudpath Installation
Revision 0817 4 - 12
Cloudpath Admin 200 Cloudpath Installation
Note: The Legal Company Name listed in this field will be used in the
creation of certificate signing requests (CSR) and subsequent certificates
Revision 0817 4 - 13
Cloudpath Admin 200 Cloudpath Installation
The following Screen “WWW Certificate for HTTPS” will prompt to:
Generate a Certificate Signing Request - (Recommended) to Create a CSR to
be signed by a certificate authority
Upload a WWW Certificate – select this option if you already have a WWW
certificate
Skip for now. - Not recommended as user will receive a certificate error or 404
error when onboarding a device
The system is configured to use HTTPS, but does not currently have a valid
WWW server certificate. An invalid WWW server certificate can impact the ability
of end-user enrollments, causing 404 errors due to a lack of trust.
Revision 0817 4 - 14
Cloudpath Admin 200 Cloudpath Installation
Generate a Certificate Signing Request. This Certificate will be used in the lab for
this module.
Revision 0817 4 - 15
Cloudpath Admin 200 Cloudpath Installation
• The Host Name, Organization Name, and Domain Name will be embedded in
the Certificate Signing Request (CSR).
• Select Next to create the CSR.
• Note: Every CSR, even from the same server and VM, is uniquely coded to a
machine per version.
Revision 0817 4 - 16
Cloudpath Admin 200 Cloudpath Installation
Browse to the Signed CA and download the certificate(s) and select next
Or PEM Upload (Privacy Enhanced Mail) This is the public key for the ES
server
• PEM file is a container format that includes just the public certificate.
• Chain PEM may only contain the signed Certificates but not the Private key.
Root certificates may or may not be included and may need to be obtained
• Additional Chain (optional) Contain certificate changes in the Chain of Trust
to the Root CA
Revision 0817 4 - 17
Cloudpath Admin 200 Cloudpath Installation
The final step of setting up the Cloudpath ES is to select the first workflow
template. Workflow is a customizable enrollment process that provides more
control over who is granted network access and how they should be provisioned.
It is similar to toy building blocks that can snap together or a logical flow chart.
After selecting the workflow template, the Cloudpath ES will do an initial check of
the VM installation.
Revision 0817 4 - 18
Cloudpath Admin 200 Cloudpath Installation
Revision 0817 4 - 19
Cloudpath Admin 200 Cloudpath Installation
1. What are the 2 types of on-premise deployments? (Answer: Bare Metal &
Virtual Appliance)
3. What 2 pieces of information are pulled from the configuration information into
the Certificate Signing Request? (Answer: Legal Company Name & Company
Domain)
Revision 0817 4 - 20
Cloudpath Admin 200 Cloudpath Installation
Revision 0817 4 - 21
Cloudpath Admin 200 Cloudpath Installation
Revision 0817 4 - 22
Cloudpath Admin 200 Cloudpath Components and Concepts
We will discuss in this unit the administrative components that make up the ES
GUI. The main concepts and terms will also be reviewed.
DHCP Fingerprints can identify IoT devices with no direct interface (AKA
Headless Devices) i.e. Cameras, Door Locks, Smart Home Hubs that do not
support the download of a certificate or 802.1X.
• Workflow – This is where are you defined the on boarding journey. These
are process or sequences of steps a device and user is required to follow to
gain access to the network. These steps may include splits for employees,
visitors, or contractors. Each of the splits are separate journeys with
individual requirements for users and devices.
• Trust CA requirements
• NAC and MDM settings by device operating system version, and configuration
Authentication Server hook into 3rd party authentications services. For example
the Active Directory or LDAP services for the network will have no record to
authenticate a person visiting your campus. Authentication service allows a
person to validated by a source external to the network.
• Firewall & Web Filtering- Integrating with 3rd party firewalls & web filter
vendors
• API Keys- Integration of REST APIs to 3rd Party Systems Refer student to
API support Document found in ES Support
Revision 0817 5 - 10
Cloudpath Admin 200 Cloudpath Components and Concepts
• Look & Feel – Page provides settings to customize the graphics, images,
look and feel of the sponsorship portal.
Revision 0817 5 - 11
Cloudpath Admin 200 Cloudpath Components and Concepts
Revision 0817 5 - 12
Cloudpath Admin 200 Cloudpath Components and Concepts
Revision 0817 5 - 13
Cloudpath Admin 200 Cloudpath Components and Concepts
Support documentation is found on any screen by selecting the “?” in the upper
right of the screen.
This contains sub-sections to provide access to the Quick Start Guide and several
Setup Guides to help with common configurations along with licensing
information:
• Upload Support File. This allows the customer to upload a support file to ES.
This file will makes changes to ES and it is advised to create a VM snapshot
first.
Revision 0817 5 - 14
Cloudpath Admin 200 Cloudpath Components and Concepts
https://support.ruckuswireless.com/product_families/6-cloudpath-es-security
Revision 0817 5 - 15
Cloudpath Admin 200 Cloudpath Components and Concepts
4. What 2 functions are under the Sponsorship tab? (Answers: Voucher and
Look & Feel)
Revision 0817 5 - 16
Cloudpath Admin 200 Cloudpath Components and Concepts
Revision 0817 5 - 17
Cloudpath Admin 200 Cloudpath Components and Concepts
Revision 0817 5 - 18
Cloudpath Admin 200 Basic Workflow
Customizable: Provides the ability to conform to your network policies and your
onboarding options you would like to provide to your users.
Flow: Building blocks can be placed in an order (similar to a flow chart) providing
steps you prefer for your environment strategy. This could include the display of
information (acceptable use policy), authentication types such as directories,
sponsorship/voucher or 3rd party options, policy enforcement (Network Access
Control/Mobile Device Management) along with applying access policies
(users/guest/contractor.
Sequence: Each onboarding flow (workflow) is up to you with multiple options
(plug-ins) creating the branching steps sequence depending on the users choices.
3rd party or guests would follow a different branch within the workflow providing
different steps compared to an Employee or company managed device.
Onboarding: The goal is to migrate users to the secure network but only after the
user (or device) has successfully met your requirements of the unique path they
chosen. Users unique path can provide specific policies to be applied to the
connection or device. This can include NAC/MDM enforcement along with VLAN
and ACL assignments.
Admins can plug-in what functions they want, anywhere within the workflow. Each
plug-in performs a certain function allowing it to replace a manual onboarding
process. What is currently done to onboard a device by an IT resource can now
be automated using the plug-ins that perform the same task. If the first step is to
verify the user Cloudpath has plug-ins that can authentication of the user using
many different methods. Need the user to authenticate to your AD server? Then
use the Auth Traditional Server plug-in requiring users to enter their credentials
which will be verified by the AD server. Not all users are the same however. If you
are wanting to automate guests within your environment they would not typically
have AD credentials. Cloudpath provides the splitting of users to allow for different
authentication types. This allows the ability to accommodate all users needing
access to your network.
Authenticate to a Third-Party
Cloudpath ES supports third-party integration using Facebook, LinkedIn, Google,
or you can specify a custom OAuth 2.0 server. The social media provides
additional identity information during the onboarding process to deliver
automated, self-service access to the WPA2-Enterprise wireless network.
Send a Notification
Generates a notification about the enrollment. Notification types include email,
SMS, REST API, syslog and more. This step is invisible to the end-user.
You can use only these plug-ins to create the flow for your employees. Using
these plug-ins you allowing them to:
1. Agree to the Acceptable Use Policy
2. Allow them to choose if they are an employee or possibly a visitor
3. Ask them to authenticate using an AD or RADIUS server
4. Ask use for additional information such as the Asset tag of the device they are
onboarding
5. Check to see if this replaces an old device and to de-activate the old certificate
6. Device receives its configuration and certificate and can move to its
designated SSID
Use different plug-ins to create the flow for your guests. Using these plug-ins you
allowing them to:
1. Agree to the Acceptable Use Policy
2. Allow them to choose if they are a visitor instead of employee
3. Ask them to use Facebook, Linkedin or Google+ to allow the gathering of
information about the user
4. Ask use for additional information such as their purpose of their visit
5. Device receives its configuration and certificate and can move to the secure
guest SSID
User Selection: A split plug-in within a workflow can provide options such as
visitor/employee with can be selected taking the user through a different process
than the other selectable options.
Revision 0817 6 - 10
Cloudpath Admin 200 Basic Workflow
Splits or branches within a workflow provide paths based on user types, device
types or both. The purpose of the branches is ultimately to apply unique policies
to the device according to the admin requirements. Each branch usually includes
different authentication methods, unique or additional steps to verify the user
assuring that the config and cert they are about to receive should be applied to
them. Visitors policy will be vastly different than an employee along with their
devices. These differences include duration of access, types of access such as
specific SSIDs, VLANs or ACL binding. Because the user selected a path that
best matches their position or device type you have created for them you can
assure the correct configuration and certificate is applied to the device.
Revision 0817 6 - 11
Cloudpath Admin 200 Basic Workflow
Device configuration assignments along with certificate issuance are the results of
each branch. You select the configuration that should be applied to the device
such as what SSID’s you want it to connect to, If you want to allow the device to
be able to use a wired connection (802.1X port) or how long you want the device
to be able to connect before onboarding again. Each option can be applied to the
end of every branch customizing how that device will be identified and configured.
Revision 0817 6 - 12
Cloudpath Admin 200 Basic Workflow
Example: Guests device configuration profile might identify a guest only SSID
along with a certificate template that limits their access duration. Employees
configuration profile however might associate the device with a SSID that
provides access to all organization portals along with a certificate with a year
expiration date.
Each can be customized to control the onboarded devices after they have been
identified due to their onboarding workflow path.
Revision 0817 6 - 13
Cloudpath Admin 200 Basic Workflow
Certificates Templates can be uniquely created for each branch of the workflow
however most are created differentiating between the types of users or devices.
The CA uses the template to identify the parameters for certificates. Certificate
templates include the start/expiration period, Cypher strength and Subject
Alternative Name (SAN) values of a certificate. You can configure a Subject
Alternative Name for each type of user allowing you to quickly identify the user
type in authentication logs. These names can be set to values such as
username@BYOD.(yourcompanyname) for quick identification Additional abilities
include Extended Key Usage objects in certificates issued by the certificate
template. Once associated with a branch any certificates issued based on that
branch completion will have the values described in the certificate template
assigned to that branch.
Certificate maintenance can also be included in the template with such options as
OCSP Monitoring. This option provides the ability to set a value from the last time
a certificate validity request was received. If no requests are received within the
configured value the certificate will automatically be revoked.
Revision 0817 6 - 14
Cloudpath Admin 200 Basic Workflow
As a user completes the steps established through the active workflow, a client
certificate is issued by the Cloudpath CA and used as the authentication
credentials when connecting to a secured network using WPA2-Enterprise or
802.1X for wired connections.
Wireless LAN Controller are configured (AAA) to use a RADIUS server for
certificate authentication which can be external, Network Policy Server with
RADIUS services or the onboard RADIUS server within Cloudpath.
Proxy RADIUS support is available allowing requests from external RADIUS
servers to be responded for authentication by the Cloudpath onboard RADIUS
server
Revision 0817 6 - 15
Cloudpath Admin 200 Basic Workflow
Onboard CA
The Cloudpath onboard CA can issue a server certificate to the onboard RADIUS
server and it can issue client certificates. After the client certificate issued, all
authentications take place using the certificate
Revision 0817 6 - 16
Cloudpath Admin 200 Basic Workflow
Based on the lab workflow, the first page displayed to the user is the acceptable
use policy. The rest of the process is defined by the workflow and could entail
user/device type selection and authentication steps. The enrollment may contain
an option to remove previous registrations or certificates. After authentication and
authorization is granted, the “Network Wizard Loader” or “Cloudpath App” client is
downloaded to the client. The software configures the Wi-Fi settings, installs
certificates and other settings. For Windows, Android, Linux, and Mac OS X
(depending on configuration options), the device is automatically moved to the
secure SSID.
Wired clients follow this similar process except for the migration to the secured
SSID. Ports that on boarded clients reside on uses 802.1X to authenticate the
user and can assign him to a VLAN along with other ACLs if desired.
The enrollment workflow for Unmanaged Chromebooks follows the same process
as the Windows OS. The user accepts the AUP, logs in with AD credentials and is
presented with the Download page.
The enrollment workflow for Android follows the same process as the other OSes.
The user accepts the AUP, logs in with AD credentials and is presented with the
Download page.
Note: The enrollment workflow for iOS devices follows the same process as the
other OSs. The user accepts the AUP, logs in with AD credentials, but instead of
the download page, as in the other OSes, you are prompted to install the network
profile.
Revision 0817 6 - 17
Cloudpath Admin 200 Basic Workflow
After user connects to the open hotspot they are redirected to captive portal
(Cloudpath) and first presented with a welcome message and AUP agreement
prompt.
User is then presented with the split (branching) where Visitors, Employees or
Partners are their options. Selects the employee option.
User is prompted with request for their credentials that will be verified by an Active
Directory server (in this case the server is identified as test AD)
An additional split (Branch) provides either Your Device or Company Device.
Important to note: that this selection can be performed by a filter ensuring that the
user does not try and onboard a personal device as an IT managed asset.
As the asset was assigned it was accompanied by a voucher (one time
password) providing additional validation and can be associated with the
MAC of the IT device if chosen or due being a member of a specified AD
group. (Departmentalized IT assets)
Result: The device receives a configuration policy with details of the Secure
Internal Network it is to connect to along with a certificate with the Client
Certificate Template attributes
Important to note: Various branches can provide different profiles connecting to
different secure networks depending on your network design/policy. Also the
Certificate template can also have unique values including active/valid dates
along with VLAN and ACL assignments.
Revision 0817 6 - 18
Cloudpath Admin 200 Basic Workflow
Revision 0817 6 - 19
Cloudpath Admin 200 Basic Workflow
Revision 0817 6 - 20
Cloudpath Admin 200 Basic Workflow
Deploy the workflow from the Configuration > Workflow Snapshots tab using the
Publish button or the cloud publish button next to the workflow. Its important to
understand that publishing and snapshot functions are isolated to the workflow
highlighted in blue.
Once Published previous snapshots can be activated (through the activate button)
if needed. By default up to 5 previous snapshots will be stored however you can
store more if needed.
The URL is the result of the publishing process and is used as the landing page
for devices that are attempting to onboard.
The default deployment location is enroll/<network name>/Production, but this
can be modified.
It takes a few minutes to build the deployment package. During this process, all
Cloudpath ES workflow branches are bundled as one configuration creating
various flows for users.
Revision 0817 6 - 21
Cloudpath Admin 200 Basic Workflow
When the snapshot is created and activated, expand the appropriate deployment
location to test the network enrollment process.
Snapshots can be renamed and a description can be added to better identify the
snapshots purpose.
Removing/deleting a workflow can be done using the cleanup option. All details of
the workflow are removed HOWEVER any device, Certificate Templates etc. that
were created to support the workflow remain.
Revision 0817 6 - 22
Cloudpath Admin 200 Basic Workflow
The workflow view when splits are introduced changes depending on the current
flow you are looking at. When each option within the split is selected options for
those steps can be chosen.
View Tabs:
• Properties tab to enable/disable a configuration, or to modify the configuration
Name and Description.
• Enrollment Process tab to configure the steps presented to a user during the
enrollment process.
• Look & Feel tab to configure the Cloudpath ES skin, and to customize the
logos, colors, buttons, and images for the ES, the Wizard, the Download page.
• Advanced tab provides the portal URLs, Managed Chromebook Setup and the
Cleanup option which allows for the deletion of the entire workflow.
Insert Arrows:
• On the top left corner of each step to insert a new enrollment step.
• Alternately, you can click the blank space between two steps to insert a step.
Edit Step:
• The icons on the right side of each step to allow you to edit, modify, delete,
view the enrollment steps. Properties of the step can be configured using the
pencil.
Revision 0817 6 - 23
Cloudpath Admin 200 Basic Workflow
Revision 0817 6 - 24
Cloudpath Admin 200 Basic Workflow
Revision 0817 6 - 25
Cloudpath Admin 200 Basic Workflow
AAA Accounting Server: Collecting of start/stop information and byte counts can
be achieved by the setting up of the accounting server
The secure WPA2-Enterprise SSID to delegate authentication to the Cloudpath
onboard RADIUS server, the NPS, or an external RADIUS server.
Setup to delegate authentication to the onboard AAA server or your existing AAA.
-If using an existing AAA server, it requires layer 3 access to the Enrollment
System VM to verify certificate status (optional).
•If using Active Directory, you need the AD domain information (plus any
subdomains) and the IP address of the AD server.
Generate a Ruckus DPSK
Generates a a Dynamic Pre-shared Key (DPSK) through a Ruckus WLAN
controller. This allows, for example, a gaming system to be registered and issued
a unique PSK.
Revision 0817 6 - 26
Cloudpath Admin 200 Basic Workflow
Create the Onboarding SSID
This is an open SSID providing access to the network which will point the
unauthenticated user to the Cloudpath redirect URL. The Walled Garden will also
be associated with this SSID to limit access.
Create the Secure SSIDs
Depending on your network design multiple Secure SSIDs can be configured and
can be associated with certain client/certificates allowing for diversification,
additional load balance or control of on boarded users.
Revision 0817 6 - 27
Cloudpath Admin 200 Basic Workflow
Regardless if you are using the onboard or an external RADIUS controllers will
need to be configured to allow for certificate authentication for users.
The authentication method will be PAP and the IP address of your Cloudpath
server will be identified. Many controllers require the actual IP address and not a
DNS name.
The port used by the RADIUS server can be either the default which is usually the
case for on premise deployments however as shown if you are using the cloud
version of Cloudpath your RADIUS port numbers will be different from the default
value. Verify the port numbers to be used in Cloudpath under
Configuration>Advanced>RADIUS Server.
The shared secret provides Symmetric communication by each side encrypting
the PAP communication using this shared secret as the key. Because of this the
key should be protected thus is not displayed by default in Cloudpath however it
can be obtained using the show secret icon. If it is suspected that the shared
secrete has been compromised a new one can be generated as set as a new
value.
RADIUS Server: A Remote Authentication Dial-In User Service (RADIUS) server
through which users can authenticate.
WPA2-Enterprise requires an authentication server for issuing client certificates
for the wireless authentication. The Cloudpath ES provides an onboard RADIUS
server, supports integration with your existing RADIUS server, or integration with
a Microsoft Network Policy Server acting as a RADIUS server. The default port
number is 1812. The Cloud hosted ES will have a different port number.
Revision 0817 6 - 28
Cloudpath Admin 200 Basic Workflow
RADIUS Accounting provides start/stop information and byte counts on the
connection. Default port number is 1813. The Cloud hosted ES will have a
different port number.
Revision 0817 6 - 29
Cloudpath Admin 200 Basic Workflow
Hotspot Services page can be used to configure a traditional (WISPr 1.0) hotspot
service to provide public access to users through its WLANs. Need the following
to deploy a hotspot:
• Captive Portal: A special web page, typically a login page, to which users that
have associated with your hotspot will be redirected for authentication purposes.
• RADIUS Server
Revision 0817 6 - 30
Cloudpath Admin 200 Basic Workflow
Revision 0817 6 - 31
Cloudpath Admin 200 Basic Workflow
Walled Gardens provide restricted access when connected to the hotspot SSID
network. When applied any attempts to access other sites not listed in the walled
garden will be discarded or redirected to CloudPath. If 3rd party authentication
methods are options included in the active workflow they will need to be added.
The final two steps will be to configure a Hotspot SSID and apply the Walled
Garden and Hotspot service to its configuration.
The secure SSID will then be created where 802.1X will use the AAA server
(previously configured) delegating authentication to the onboard AAA server or
your existing AAA.
If using an existing AAA server, it requires layer 3 access to the Enrollment
System VM to verify certificate status (optional).
If using Active Directory, you need the AD domain information (plus any
subdomains) and the IP address of the AD server.
Revision 0817 6 - 32
Cloudpath Admin 200 Basic Workflow
The Cloudpath ES requires an open SSID for onboarding, and one or more
secure SSIDs, depending on your deployment scheme. The open SSID
terminates to a captive portal that points to the ES, and the secure SSID is the
network to which your users migrate. Best practice is to create an SSID
specifically for the Cloudpath ES.
If your security policy provides a guest SSID for Internet-only or limited network
access, you can set up an open SSID specifically for guests. The guest SSID
redirects guest users to the ES captive portal, where they can onboard to a
limited access network. The limited access is managed using VLAN assignment,
which is configured in the wireless LAN controller, where you can also filter, shape
or throttle the guest VLAN.
Revision 0817 6 - 33
Cloudpath Admin 200 Basic Workflow
2. How do you add a step in a workflow? (Answer: Blue arrow to the left of
the workflow)
Revision 0817 6 - 34
Cloudpath Admin 200 Basic Workflow
Revision 0817 6 - 35
Cloudpath Admin 200 Basic Workflow
In these labs you will create your first workflow that includes two branches and then publish. You
will also configure vSmartzone establishing an onboarding SSID and secure SSID allowing for
users to migrate from an open onboarding connection to the secured SSID using the certificate as
credentials.
Revision 0817 6 - 36
Cloudpath Admin 200 Basic Workflow
Revision 0817 6 - 37
Cloudpath Admin 200 Basic Workflow
Revision 0817 6 - 38
Cloudpath Admin 200 MAC Authentication
2. Registering consists of a user accessing the Captive Portal and registering their
device my entering its MAC address. Registered devices are then given access to
an identified Secured SSID for a preselected amount of time. After of which the
user will then have to re-register the MAC of their device for additional access.
Both instances requires the user to either connect with their preferred device to
the Captive Portal or register its MAC off-site or by other means such as a bulk
import. This involves an Admin to upload a MAC list allowing a pre-enrollment of
MAC addresses for MAC-based device authentication.
.
The Workflow plug-in “ Register a Device for MAC-Based Authentication” allows
users to register the MAC address of the device for MAC authentication by
RADIUS. The MAC address is captured and will have access for the configured
time set.
In this example, the user attempts to access the Internet, is redirected to the captive
portal on the Cloudpath ES and proceeds through the enrollment workflow, during which,
the user is prompted for information.
At the MAC registration step, the Cloudpath ES sends a registration URL to the client for
use in the RADIUS authentication request. The registration URL contains the username,
password, and validity period for the MAC registration.
RADIUS Authentication Example: (270274) Wed Mar 22 19:41:02 2017: Auth: Login OK:
[689c7084a9f2/689c7084a9f2] (from client 0.0.0.0/0 port 0 cli
68:9C:70:84:A9:F2) [CPN]: server=port14597, macAddress=68:9C:70:84:A9:F2,
username=Enrollment-185B40B6-CAC5-4938-BE1C-16E20E8F0C0A, serial=, ssid=
The access point obtains the MAC address of the user device and sends this information
in the RADIUS request to the RADIUS server. The RADIUS server compares the MAC
address and expiration date with existing user information. If the validity period and
expiration period matches, the RADIUS server authorizes the authentication and returns
an Access-Accept to the access point. If other RADIUS attributes are configured, such as
the Filter-Id, they are returned with the Access-Accept.
Subsequent access requests from the user to the access point cause the AP to open the
firewall to allow access to the Internet. This occurs until the validity period expires and
the MAC must re-enroll.
You can configure a single database to house and maintain your MAC
registrations or choose to create multiples providing a unique function.
Example:
Create a DB to register company asset devices such as IP cameras,
Thermostats, or printers while creating another to provide guest headless device
access. Each database can have its own settings for registration duration as well
as the specific WiFi connection that should be used.
For IT-owned devices, you might already have a list of MAC Addresses. Importing
the list allows devices to bypass the registration process and to move straight
towards the configuration wizard
The workflow starting with the AUP can provide a split option where users can
register their non-compliant (WPA2-WPA) devices.
As MACs are registered any devices connected to the Identified SSIDs are
authenticated via a RADIUS server using a unique Enrollment ID as a
username and a MAC address to be the password. With the WiFi controller
set to enable MAC authentication bypass (no redirection) registered
devices cause the AP to open the firewall to allow access to the Internet
Expiration Date Basis - The basis for calculating the default validity period for
MAC registration. Calculations based on minutes, hours, days, weeks, months,
quarters and years using an offset value. Similar options that exclude the use of
the offset value and will be calculated based on registration time. A specified date
can also be configured allowing for all MAC entries to be invalid after the specified
entry.
Behavior - Specifies the prompt and redirect settings for the MAC registration
configuration. Use the Web Page Information section to configure the user prompt
or redirect URL. More details will be discussed in next slide.
Use POSTS - is the process where the redirect is handled as a POST rather than
a GET within the HTML protocol. If Use POST is used POST parameters will have
to be defined to provide proper mapping to values. The config shortcuts provide
the ability to have these prepopulated with the correct mapping depending on the
controller.
Kill Session - If checked, the user's session will be killed as they are redirected
and, if they return, they will be forced to start over.
Additional features such as filtering of workflow plugins based on the MAC lists
can provide options of whether the plugin is visible to non MAC registered
devices.
Different behaviors can be applied to the “Register the MAC address” plugin to
effect how the user is handled. As a result some fields are not applicable to the
behavior chosen therefore only configurable fields pertaining to that behavior will
be selected. Example: If you do not select a behavior that that includes a redirect
option then the redirect URL field will not be displayed. Each behavior has certain
elements that need to be configured to allow it to function correctly. In the next
few slides we will explore the behaviors in more detail to see their effects on the
user experience.
Redirect options provide the ability to verify the user against an authentication
method other than the MAC address list.
Prompt user when MAC is unknown: This is intended for situations where the user
is registering the current device for use on a separate SSID, like a PSK SSID.
The separate SSID is identified in the MAC registration configuration as the SSID
Regex and the devices MAC will be used for authentication onto the identified
SSID.
Revision 0817 7 - 10
Cloudpath Admin 200 MAC Authentication
Always prompt: Intended for scenarios where the user is registering a different
device (such as a gaming device). Each time a user reaches the MAC registration
of the workflow they will be prompted. Understand this only applies when a user
navigates to the MAC registration portion. If the MAC of the device is already
registered when it connects to its intended SSID it will be authorized and will
bypass the redirect of the captive portal.
Revision 0817 7 - 11
Cloudpath Admin 200 MAC Authentication
Redirect when MAC is unknown: Allows the WLAN controller to send the MAC
address via RADIUS to the system. This is Intended to allow the MAC address to
be gathered from the WLAN controller when no MAC exists, this option uses a
redirect to authenticate the user to the WLAN controller. Given the correct
controller configuration, this allows the WLAN controller to send the MAC address
via RADIUS to the system providing an auto discovery process for the MAC.
Revision 0817 7 - 12
Cloudpath Admin 200 MAC Authentication
Always redirect to authenticate user: Intended for scenarios where the user will be
authenticated to the current SSID, this option forces a redirect to occur such that
the user is logged into the WLAN controller's captive portal requiring an
authentication process.
Revision 0817 7 - 13
Cloudpath Admin 200 MAC Authentication
Skip registration when MAC is unknown: this process requires that the MAC be
entered by other means such as a bulk import of MACs that are to access the
SSID. As a result, if this option is chosen, the system will not move to the
registering a MAC address.
Revision 0817 7 - 14
Cloudpath Admin 200 MAC Authentication
Revision 0817 7 - 15
Cloudpath Admin 200 MAC Authentication
Recall during the ES MAC registration process, the AP\WLC obtains the MAC
address of the user device and sends this information in the RADIUS request to
the RADIUS server. The MAC information will be unreadable while encrypted and
therefore break the MAC Registration process.
Revision 0817 7 - 16
Cloudpath Admin 200 MAC Authentication
Revision 0817 7 - 17
Cloudpath Admin 200 MAC Authentication
Automatic branching is term used for a part of the workflow process that
automatically splits clients into different branches based on criteria specified in
filters and restrictions. A user can manually select an option in the workflow or we
can design the workflow to automatically process a client based on the options we
define in the “Split users into different branches” plug-in.
An example could be a split filter that only allows users that match the BYOD APP
AD group name pattern to view the Personal Device user prompt. Users that are
not in the BYOD APP AD group cannot enroll personal devices on the network.
Another example you will see in the lab for this module will be how to auto branch
a user based on their AD group membership.
Revision 0817 7 - 18
Cloudpath Admin 200 MAC Authentication
The “Split users into different branches” workflow plug-in creates a branch or fork
in the enrollment process. This can occur (1) visually by having the user make a
selection or (2) it can occur automatically based on criteria associated with each
option.
The image above represents a workflow that is split into two branches, with one
sequence of steps for employees, and another for guest users. Each branch in
the workflow specifies a different authentication method and assigns different
certificates to the user. A workflow utilizing splits without automatic branch
selection requires the client to make the correct selections during the processing.
Revision 0817 7 - 19
Cloudpath Admin 200 MAC Authentication
The settings in the Filters & Restrictions section control which users have access
to a split option. If nothing is specified, all users have access to the split option. If
criteria is specified, only users meeting the criteria have access to the split option.
Revision 0817 7 - 20
Cloudpath Admin 200 MAC Authentication
Filtering can be performed on a per branch workflow. Each can have multiple
filters applied with a combination of match/not match entries. Multiple entries per
field can entered using the pipe (|) between entries. Filtering based on OS along
with user agent (browser) can also be performed based on information advertised
by the browser. Regex expressions can be used which will be explained in more
detail in later modules.
Revision 0817 7 - 21
Cloudpath Admin 200 MAC Authentication
Revision 0817 7 - 22
Cloudpath Admin 200 MAC Authentication
Revision 0817 7 - 23
Cloudpath Admin 200 MAC Authentication
Configuration
Authentication Servers
Modify
Revision 0817 7 - 24
Cloudpath Admin 200 MAC Authentication
Any workflows that have been configured to use the onboard database will use
these credentials for their authentication. As mentioned earlier that if the results of
the workflow is to issue a certificate then future connections to the network will
use the certificate for authorization.
Icons allow for editing, Deleting Password reset and account blocking. Accounts
can be unblocked by simply unchecking the blocked status option.
Export of the list using CSV or XLS format can be accomplished for import or
record keeping.
Revision 0817 7 - 25
Cloudpath Admin 200 MAC Authentication
Revision 0817 7 - 26
Cloudpath Admin 200 MAC Authentication
Revision 0817 7 - 27
Cloudpath Admin 200 MAC Authentication
Revision 0817 7 - 28
Cloudpath Admin 200 MAC Authentication
Revision 0817 7 - 29
Cloudpath Admin 200 MAC Authentication
Revision 0817 7 - 30
Cloupdath Admin 200 Guest Access
Each type of guest can be managed providing unique access through SSID
selection, VLAN or ACL association as well as length of access. All can be
performed though the use of guest workflow branches and Cloudpath templates.
Guests needs along with network access requirements are applied to guests
devices by creating a workflow which supplies them with configuration and a
certificate template.
Single code entry option provides the ability to identify the user including the
sending it through email or SMS. Multiple vouchers can be generated at one time
however it does not allow user information to be specified. Multiple voucher
generation is common when a convention or group that is not identified yet needs
access to the secured network.
Separate lists can be maintained on Cloudpath and can be associated with one or
more workflows. Different sponsors can be assigned to each list/s as well allowing
for logistical or hierarchical options.
Example: Arriving guests to building B, once identified, can be given access to
the guest network from the receptionist who is a sponsor of the guest list. New
contractors on the other hand would be granted access through a HR
representative once their contract is approved.
Voucher list entries can also be uploaded Upload a CSV file containing a list of
vouchers. Templates can be downloaded allowing for their population and
eventual upload to specific voucher lists is available. Uploading unlike the multiple
voucher option allows for the identification of the users.
Voucher list note: The file must be formatted in the template sequence:
vouchers, name, description, company, email, expiration date, sponsor, SMS
phone number, SMS country code. If voucher is left blank, a voucher will be
generated and emailed or SMSed to the user.
Steps in slide:
1. Voucher is created by Admin or Sponsor
2. Voucher is emailed/SMS and delivered to Guest
3. Guest uses OTP to receive necessary details and certificate to access
network
Steps in slide:
1. User submits requested
2. Request is added to a voucher list
3. Voucher is emailed/SMS and delivered to Guest
4. Guest uses OTP to receive necessary details and certificate to access
network
Sponsors maintain the voucher list that is populated by self registration process.
These vouchers are tied to a user and allows the sponsors to revoke.
User Experience:
Step 1: User starts his onboarding journey by selecting a branch that provides
social media gathering of user information (The user's browser will send a
requests the redirect URL for the identity provider and is forwarded to provide
access)
Step 2: User requests oAuth request to be sent to the 3rd party of his choice
where he authorizes access to their account. This is done without sharing of
credentials used at the 3rd party site)
Step 3: Once authorized the user information (email address, Name etc) is
gathered and placed into the enrollment record. This information can later be
used for security audits, recourse or for marketing.
Step 4: Once the user authorization is given the user continues on his onboarding
journey resulting in his device receiving its proper configuration and certificate.
Refer to the deployment guides within the support section of Cloudpath to provide
details and assist in deploying each option.
Note: Sponsored access can be combined with additional options, such as
authentication through Facebook, LinkedIn, or Google. When combined, the
social media provides the authentication while the voucher provides the
authorization. This method provides additional identity information and reduces
the risk of the voucher being intercepted or misused.
Revision 0817 8 - 10
Cloupdath Admin 200 Guest Access
Revision 0817 8 - 11
Cloupdath Admin 200 Guest Access
All sponsor lists are managed from a single URL per CP deployment. Sponsors
are given administration rights to specific lists which will be available to them
when they log in.
Revision 0817 8 - 12
Cloupdath Admin 200 Guest Access
Each sponsor can have specific permissions granted allowing them to perform
certain duties if preferred. These permissions include:
Manage Devices Enrolled By Sponsor -- sponsor can review and revoke
devices enrolled through vouchers issued by that sponsor.
Manage Devices Enrolled By All -- sponsor can review and revoke devices
enrolled through vouchers issued by any sponsor in the group.
Allow Creation by CSV Upload -- sponsor can create vouchers in bulk by
importing a spreadsheet of vouchers.
Allow Bulk Creation – sponsor can perform a bulk creation of vouchers.
Reminder: Bulk creation does not allow the specifying of voucher users.
Add/Edit/Delete Sponsors In Group -- sponsor can add, edit, and delete other
sponsors within the group.
Revision 0817 8 - 13
Cloupdath Admin 200 Guest Access
Multiple voucher lists can be created and can serve a unique purpose. Separate
lists can be created to allow for certain sponsors to manage such as assigning
someone based on building within a campus or even between campuses of a
school or company. Multiple lists may also be created to separate guest vouchers
from contract employees vouchers or even types of devices. List creation will
depend on how Cloudpath is deployed in your environment customizing to your
specific needs.
Revision 0817 8 - 14
Cloupdath Admin 200 Guest Access
Each voucher list created can be modified with default values. These included the
length of characters used for the voucher code, If they are to be alphanumeric or
just numeric along with case sensitive values. Validity effects the time until the
voucher expires. You can also set the voucher to be used more than once for
users that are trying to onboard multiple devices. Maximum days for access can
also be set and can also provide verification the correct user is using the voucher
by requiring the username entry of the user to match who the certificate was
issued to. Many of these fields can be displayed or hidden to the sponsors
controlling their ability to modify the default settings.
Revision 0817 8 - 15
Cloupdath Admin 200 Guest Access
Revision 0817 8 - 16
Cloupdath Admin 200 Guest Access
Revision 0817 8 - 17
Cloupdath Admin 200 Guest Access
Revision 0817 8 - 18
Cloupdath Admin 200 Guest Access
Revision 0817 8 - 19
Cloupdath Admin 200 Guest Access
Revision 0817 8 - 20
Cloudpath Admin 200 Customization and Multi-Workflow
ES uses the system information when configuring the onboard CA, certificate
template and deployment locations.
Each workflow created within a Cloudpath deployment will have the same
prepended values within their URL structure.
The Portal URL is established when the Cloudpath instance is deployed and does
not change once set. All Workflows use this setting as part of its URL structure
therefore should be set in the beginning and not changed. When multiple
Workflow locations are configured each will have an extension value added to the
end of the URL allowing it to be globally unique. Once the workflow is deployed
(snapshot) its unique URL can be used for onboarding of devices using the
workflow designed.
Note: The first two values, Hostname and URL-Safe Company Name, are pre-
populated using the information provided in the initial system setup.
Hotspot 2.0 (HS 2.0), often referred to as Wi-Fi Certified Passpoint, is the new
standard for Wi-Fi public access that automates and secures the connection.
Cloudpath supports Passpoint and provides the URL simarly to the strandard
onboarding URL. For more details on Passpoint refer to the Cloudpath support
document Configuring Cloudpath to Support Hotspot 2.0 Release 2 (Passpoint)
QR code: Offsite users wanting to onboard allows for easy redirection for
onboarding before they are actually on location. I.E. College students,
Conventions. The ability to download
Each workflow is unique in its design accommodating the users that may need
access within a certain environment. The name along with the URL extension of
your choice can be added. This URL along with the prepended URL structure
mentioned previously provides a path that can be used as a redirect destination
for any users needing access. Workflows can be deployed in multiple locations
as long as it meets the needs for the local users. If other locations have different
policies or its users require different access additional workflows are configured to
accommodate that locations requests. As workflows are created they can be
activated by the use of a snapshot. Each workflow is activated independently
along with its unique URL.
With previously unpublished workflows there are two options are available for the
initial publish. Previously published workflows are performed by the snapshot
cloud icon on left of a workflow. Once the workflow is published its URL can be
placed into an AP redirecting unauthenticated users to the workflow created for
that environment. As shown in previous modules the APs require that the
associated SSIDs, walled garden, AAA authentication configurations be in place
as well providing onboarding and authentication for user access.
In addition, users can be given this URL to perform out-of-band onboarding using
this workflow if your CP deployment is external facing.
The default skin of the onboarding user experience is called Modern (Ruckus).
This “skin” is customizable allowing for organizations color and style to be
replicated. Titles and HTML code colors provide the ability to adjust the
onboarding experience. Each section of the display can be configured including:
Background Color
Start over font color
Powered by font color
Button background color list item text color
Etc.
Each workflow has its own customization capabilities. This allows the workflow to
be customized to its environment displaying different icon choices as well as
different themes. Example: In a academic environment workflows could be
created providing a different experience in the dorms than what might be used in
the lecture halls.
HTML templates for download are available allowing for a complete rebranding of
the user experience.
Many aspects of the clients user experience is highly customisable, for both
secure BYOD and guest connectivity. This includes the deployment download and
wizard pages
Revision 0817 9 - 10
Cloudpath Admin 200 Customization and Multi-Workflow
The HTML Template option allows you to import your own fully customized look
and feel. You can change the Browser Title Bar and some of the Fonts / item
Color controls as well.
The “Download Page” and “Wizard Logo” sections can also be customized.
Revision 0817 9 - 11
Cloudpath Admin 200 Customization and Multi-Workflow
Each split (user choice) known as an option can have its own personalized logo.
Along with the split option description key information along with an corresponding
image will provide a clear path for users.
Note: Because the short name overlay (as shown on the left) will not be used
when a custom icon is uploaded addition text or text incorporated into the icon is
suggested to ensure a clear direction for the user.
Revision 0817 9 - 12
Cloudpath Admin 200 Customization and Multi-Workflow
Sponsorship > Look & Feel > Edit form enables you to change the text, color
scheme and logo for the Sponsor’s Portal. Because the sponsors portal is
universal this effects all sponsors access. Titles along with display colors can be
adjusted to better suit your deployment environment. A custom logo displayed in
the upper right can be changed as well.
Revision 0817 9 - 13
Cloudpath Admin 200 Customization and Multi-Workflow
Revision 0817 9 - 14
Cloudpath Admin 200 Customization and Multi-Workflow
Revision 0817 9 - 15
Cloudpath Admin 200 Customization and Multi-Workflow
Revision 0817 9 - 16
Cloudpath Admin 200 NAC & MDM Client Management
Revision 0817 10 - 1
Cloudpath Admin 200 NAC & MDM Client Management
Revision 0817 10 - 2
Cloudpath Admin 200 NAC & MDM Client Management
Revision 0817 10 - 3
Cloudpath Admin 200 NAC & MDM Client Management
• Registration
• Profile Management
• Wireless Updates
• Application control
• Certificate
• Software version
• Proxy settings
• Lock Screen
• Device Behavior on WLAN
• Scripts
• PMK
• IPv6
Revision 0817 10 - 4
Cloudpath Admin 200 NAC & MDM Client Management
Revision 0817 10 - 5
Cloudpath Admin 200 NAC & MDM Client Management
Revision 0817 10 - 6
Cloudpath Admin 200 NAC & MDM Client Management
• Blackberry
• Windows RT
• Windows Phone 8+
Revision 0817 10 - 7
Cloudpath Admin 200 NAC & MDM Client Management
After configuring the RADIUS Server information and Additional Options the
base policy is functional and maybe deployed.
However, the policy is not yet complete. From here we can configure the
Operating Systems, MDM and NAC setting by navigating to the Operating
Systems page.
Revision 0817 10 - 8
Cloudpath Admin 200 NAC & MDM Client Management
Revision 0817 10 - 9
Cloudpath Admin 200 NAC & MDM Client Management
• Certificate Settings – contain requirements for trusted intermediate and trusted root
certificate authorities. User or Machine certificates can be specified
• NAC Settings - contain plug ins and requirements for third-party NAC Service
provider integrations. Additionally there are options to require OS specific Service
packs, Hot fixes, and firewall settings for the OS being administered
• Software Settings- define what software and services must be running on specified
operating systems to onboard. It additionally contains policy requirements for
administers to require third party software package installation. Note if a software
package is required, This will negate zero-IT on boarding and require the user to
configure an additional software package.
• Proxy Settings - automatically configures the OS browser proxy and can block use
of proxy bypass
• General Settings – very greatly by operating system and offer opportunities to refine
security posture.
• Examples of this are to disable Device tethering and wired NIC cards while
on the WLAN. These settings prohibit users from bridging potentially
noncompliant devices onto the network.
Revision 0817 10 - 10
Cloudpath Admin 200 NAC & MDM Client Management
1. NAC sets policy at the ______________ layer while MDM sets policy for
______________ OS settings. (Answer: Network - Device)
2. Cloudpath NAC and MDM lite settings are not ______________ after
enrollment or onboarding. (Answer: lite or persistent)
4. Cloudpath can set policy to allow device on the network based on OS version.
True or False? (Answer: True)
Revision 0817 10 - 11
Cloudpath Admin 200 NAC & MDM Client Management
Revision 0817 10 - 12
Cloudpath Admin 200 NAC & MDM Client Management
Revision 0817 10 - 13
Cloudpath Admin 200 NAC & MDM Client Management
Revision 0817 10 - 14
Cloudpath Admin 200 Advanced Workflow
Revision 0817 11 - 1
Cloudpath Admin 200 Advanced Workflow
Revision 0817 11 - 2
Cloudpath Admin 200 Advanced Workflow
Example: MAC Registration option allows for an SSID regex expression allowing
many closely named SSID to be included with one expression.
A good reference for Regex characters is located at the following MSDN link:
https://msdn.microsoft.com/en-us/library/az24scfc(d=printer,v=vs.110).aspx
A great free Regex tool to help learn and find examples is located at:
http://regexr.com/ and http://regexlib.com/
Revision 0817 11 - 3
Cloudpath Admin 200 Advanced Workflow
Ensuring that users are entering information in a consistent and correct format
provides the ability to filter workflow options based on the pattern that the data
was entered. Not only can the REGEX expression be used to validate the data
format but also provides the ability to use a REGEX expression when filtering
workflows or branches.
Revision 0817 11 - 4
Cloudpath Admin 200 Advanced Workflow
Variables allow for an association of a variable name and its value field. This
information is stored in an enrollment record within Cloudpath for audit and data
collection as well as population of the client certificate such as the username.
All user entries are collected within the enrollment record. Filtering of branches
however are chosen based on the last entry.
Example: If a user puts in their company email and a later step in the branch asks
for the user to oAuth to Facebook which collects the users email address. The
email address used to filter any following splits will be the one collected from the
oAuth facebook entry.
Revision 0817 11 - 5
Cloudpath Admin 200 Advanced Workflow
Prompt user plug-in provides customizable input fields and a label value to
associate with it. This variable label does not have to be pre configured into the
variables to be used in the variable name field. Regex values can be used for
these fields as well to validate user input ensuring its is properly formatted and
legitimate.
These variables collected by the users can be also exported and used for network
planning and security audits or if authorized added to marketing or contact
databases.
Formatting of these fields can play important roll especially if later in the workflow
they are used to possibly filter data or effect users experience. With Regex
validations the field values will be consistent for both input and filtering.
The phone number field provides a text “phone number”, the variable label and
regex expression for formatting.
User input values are stored in the enrollment record and can be used as filter
values, auditing or data collection.
Revision 0817 11 - 6
Cloudpath Admin 200 Advanced Workflow
These variables collected by the users can be also exported and used for network
planning and security audits or if authorized added to marketing or contact
databases.
Formatting of these fields can play important roll especially if later in the workflow
they are used to possibly filter data or effect users experience. With Regex
validations the field values will be consistent for both input and filtering.
The phone number field provides a text “phone number”, the variable label and
regex expression for formatting.
User input values are stored in the enrollment record and can be used as filter
values, auditing or data collection.
Revision 0817 11 - 7
Cloudpath Admin 200 Advanced Workflow
Each branch option within the Split-users plugin can be filtered using matching or
not matching criteria. These filter patterns will effect the display of the option to
the user based on information they have entered or what was gathered from their
connection. This information is collected in their enrollment record and retained
for future filtering options. Common words such as a domain name along with
regex expressions can be used within the fields providing partial matching of
expressions providing broad collection of slightly different entries.
This is very useful when filtering common domain name email filtering etc.
Revision 0817 11 - 8
Cloudpath Admin 200 Advanced Workflow
User information gathered and placed within their enrollment record can be used
to filter certain branches that might be available to them during their onboarding
process.
Within a given field we have two options of match or does not match, In this
example we are using email criteria expressed using an Regex expression. As a
result each email address matching this filter will allow this split option to be
visible to the user during their onboard experience.
Additional “filters” can be placed in other fields such as Operating System for
even further filtering of branch options. This is useful if you want to separate
mobile devices from laptops etc. This type of limiting on branches also provides
another level of security or ensuring the user is selecting the proper branches to
follow or not even presented with certain options. The current release limits what
fields that can be used for filtering branches however this option continues to
expand
Revision 0817 11 - 9
Cloudpath Admin 200 Advanced Workflow
These tools also help to limit how much of the onboarding process information is
exposed to possible hackers as well.
Revision 0817 11 - 10
Cloudpath Admin 200 Advanced Workflow
Any users that do not have an email that matches the regex expression will have
this option displayed to them. Other users however that the expression matches
will not have the option to choose from.
Filtering provides further control over the users experience and ensures that
devices are being properly configured. In this illustration the ability to use filtering
to ensure that employees do not register their devices using the guest user option
but instead other options such as Employee BYOD etc is accomplished by not
allowing the guest user option displayed to them.
Revision 0817 11 - 11
Cloudpath Admin 200 Advanced Workflow
Cloudpath provides the ability to filter an option based on user values such as
email or domain name, Devices along with the OS they are running along with
User-agent pattern which includes browsers along with the OS version being
used. Location filtering allows for IP addresses to be identified and filtered based
on their value. There are other filter criteria that can be used for filtering beyond
these options. Details of these additional filtration options can be found in the
Cloudpath documentation.
Many user string values can be found on the web such as below:
http://www.useragentstring.com/pages/useragentstring.php
Revision 0817 11 - 12
Cloudpath Admin 200 Advanced Workflow
An ability to verify new enrollments to be checked for the required parameters can
be enforced under the properties of a workflow. As users are redirected to the
onboarding URL the identified parameters can be checked and enforced before
the user will be offered to onboard. As a result the user not meeting the required
information will be directed to a page that can provide information or further
instruction on how to onboard their device. This
Revision 0817 11 - 13
Cloudpath Admin 200 Advanced Workflow
Devices can not only be authenticated with Wi-Fi connections but also hardwired
802.1X supplicant devices. Switch ports can be enabled for 802.1X
authentication using the Cloudpath onboarding certificate. This allows for one
onboarding event for a user providing versatile connections depending on the
clients needs. Because certificate templates also provide dynamic VLAN, an ACL
assignments, users privileges are consistent regardless of their type of
connection. Centralized control of network access (wireless/wired) provide easy
deployment and maintenance for all connected devices. Added features such as
Change of Authority can also be utilized on wired solutions providing full control of
connected device regardless of their connection type.
Revision 0817 11 - 14
Cloudpath Admin 200 Advanced Workflow
Below is a sample configuration of an ICX switch providing 802.1X Supplicant
authentication on its edge ports 1/1/2 to 1/1/10.
Revision 0817 11 - 15
Cloudpath Admin 200 Advanced Workflow
Revision 0817 11 - 16
Cloudpath Admin 200 Advanced Workflow
Revision 0817 11 - 17
Cloudpath Admin 200 Advanced Workflow
Revision 0817 11 - 18
Cloudpath Admin 200 Workflow Notifications & Events
Revision 0817 12 - 1
Cloudpath Admin 200 Workflow Notifications & Events
Revision 0817 12 - 2
Cloudpath Admin 200 Workflow Notifications & Events
Revision 0817 12 - 3
Cloudpath Admin 200 Workflow Notifications & Events
The Notifications tab allows you to review emails and SMS messages, event logs,
and schedule reports.
The Notifications table displays email and SMS notifications that have been sent
by the system. The system logs email and SMS notifications sent for sponsors,
messages for vouchers, network access, and certificate issuance or revocation.
The table can be exported to CSV, XLS, filtered or cleared. The default retention
rule is 30 days from time of creation.
Note: Best practice is to set logging to match your company’s data retention
policy.
Retention rules can be changed in Administration Data Cleanup Cleanup
Thresholds Notifications
Revision 0817 12 - 4
Cloudpath Admin 200 Workflow Notifications & Events
Revision 0817 12 - 5
Cloudpath Admin 200 Workflow Notifications & Events
Revision 0817 12 - 6
Cloudpath Admin 200 Workflow Notifications & Events
Revision 0817 12 - 7
Cloudpath Admin 200 Workflow Notifications & Events
Revision 0817 12 - 8
Cloudpath Admin 200 Workflow Notifications & Events
Revision 0817 12 - 9
Cloudpath Admin 200 Workflow Notifications & Events
The Events log (Dashboard > Notifications > Events) displays all system
events, such as account logins, enrollments, acceptance of AUPs,
registrations, certificate issuance, errors, account updates and snapshot
creation. You can filter and clear events in the log
Revision 0817 12 - 10
Cloudpath Admin 200 Workflow Notifications & Events
The Events log (Dashboard > Notifications > Events) displays all system
events. The Events logs are categorized by: Event Type, Level, Tracking ID,
Message, Timestamp and can be filtered above the field types.
Revision 0817 12 - 11
Cloudpath Admin 200 Workflow Notifications & Events
Revision 0817 12 - 12
Cloudpath Admin 200 Workflow Notifications & Events
1. What is the default retention time for events in the log? (Answer: 30 day)
3. Where are the logs for enrollment records found? (Answer: Dashboard >
Notifications > Notifications)
Revision 0817 12 - 13
Cloudpath Admin 200 Workflow Notifications & Events
Revision 0817 12 - 14
Cloudpath Admin 200 Workflow Notifications & Events
Revision 0817 12 - 15
Cloudpath Admin 200 Workflow Notifications & Events
Revision 0817 12 - 16
Cloudpath Admin 200 Updating Cloudpath
Revision 0817 13 - 1
Cloudpath Admin 200 Updating Cloudpath
Revision 0817 13 - 2
Cloudpath Admin 200 Updating Cloudpath
Revision 0817 13 - 3
Cloudpath Admin 200 Updating Cloudpath
Registered administrators are notified via email when a wizard update is available
for the Cloud Tenant
Revision 0817 13 - 4
Cloudpath Admin 200 Updating Cloudpath
Customers with cloud deployments do not perform any actions for the upgrade of
ES.
Revision 0817 13 - 5
Cloudpath Admin 200 Updating Cloudpath
Revision 0817 13 - 6
Cloudpath Admin 200 Updating Cloudpath
Revision 0817 13 - 7
Cloudpath Admin 200 Updating Cloudpath
Administrators will receive an email notification when minor or major updates are
available. Administrators can also manually check for new updates to the system
software/wizard under Administration > System > System Updates.
Revision 0817 13 - 8
Cloudpath Admin 200 Updating Cloudpath
Note: When taking an ES Snapshot, not for the sake of upgrading, always check
the Wizard version to avoid making an unscheduled or unintended Minor Upgrade
Revision 0817 13 - 9
Cloudpath Admin 200 Updating Cloudpath
For Major Upgrades begin by following the steps in Module 5 with the exception of
assigning the new VM a temporary IP, in the same subnet, that is accessible to
both the Internet and the old VM containing the OVA being upgraded. Make sure
that the new VM and old VM can ping the other’s IP.
Revision 0817 13 - 10
Cloudpath Admin 200 Updating Cloudpath
1. What are the two main types of upgrades? (Answer: Minor and Major)
4. When doing a major update for a locally deployed VM the new OVA and VM
must be in the same? (Answer: Subnet)
Revision 0817 13 - 11
Cloudpath Admin 200 Updating Cloudpath
Revision 0817 13 - 12
Cloudpath Admin 200 Updating Cloudpath
Revision 0817 13 - 13
Cloudpath Admin 200 Module Name
Revision 0817 13 - 14
Cloudpath Admin 200 Server Clustering
Revision 0817 14 - 1
Cloudpath Admin 200 Server Clustering
Revision 0817 14 - 2
Cloudpath Admin 200 Server Clustering
In both configurations, all nodes are active and the database is synchronized
to all nodes. A load balancer is required in either a Master-Master or Star
Topology. Cloudpath does not support an active-passive configuration.
With the two-server configuration, the data is pushed from the server from
which replication is configured to the second server. Cloudpath supports an
Active-Active system, but must employ a load balancer. Without a load
balancer in your network setup, the Cloudpath system becomes Active-
Standby.
With the star-pattern configuration, the data is pushed from the hub server (the
server from which replication is configured) to the other server nodes.
Revision 0817 14 - 3
Cloudpath Admin 200 Server Clustering
Prerequisites
• Set up 2 or more ES virtual appliances with the same version OVA
• For Initial setup all VMs in the Cluster must be able to communicate with the
host and each other to sync. It best practice to PING all servers from each
other prior to beginning the cluster setup
• Note: after replication setup is complete, you can restrict
communications if needed. The hub must always be able to see the
spoke nodes but the nodes can be restricted to only see the hub
• If the network environment is not using a load balancer, the deployment
URL for the master server becomes the deployment URL for all servers in
the cluster
• If the network environment is using a load balancer between the Hub and
Spoke or between the Master-Master the system will display a message
when you log in that the URL is a mismatch with the server certificate.
• This message can be suppressed by adding the load balancer URL
to the topology in Administrative Company Info Vanity URL
Revision 0817 14 - 4
Cloudpath Admin 200 Server Clustering
Choose the Virtual Machine ES server as the Master node. This is the server from
which you set up replication in the ES Admin UI.
The Cloudpath ES saves the data from the server node from which replication
was configured, then copies the database to the other server nodes. This can
take a while, depending on the number of server nodes and the size of the
database.
Revision 0817 14 - 5
Cloudpath Admin 200 Server Clustering
When all processes are complete and display a Success status, click Next to
return to the replication Setup page.
The Setup Status should be in the Completed state and the Status in the Running
state. The ES provides a log file for the replication setup process.
Revision 0817 14 - 6
Cloudpath Admin 200 Server Clustering
When replication is successfully completed click the “Next” button to return to the
setup page – validate the status showing Online
Cluster Status
• The Replication Servers table lists all servers in the cluster. After setup, all
servers should be Enabled (green icon) and ONLINE. Status page.
• The Collect Replication Logs button is typically used for troubleshooting. This
gathers the necessary log information and saves it to a tar.gz file. This file can
be sent to the support team upon request.
• Load Balancer: button allows the user to enter the URL of any load balancing
device in the topology
• Click the Details button to view the replication
• Note: When upgrading a Cluster wait for re-sync to complete each time before
upgrading other nodes
Revision 0817 14 - 7
Cloudpath Admin 200 Server Clustering
The Replication Status give the current state of all nodes in the cluster topology
Replication States
• Not Setup - The ES server has not been configured for replication.
• Running - Replication has been set up and is currently running.
• Stopped - Replication has been configured but the replication service is not
running.
• Starting: Synchronizing - The ES server was previously stopped or disabled
and is in the process of synchronizing with the master server.
• Offline: Normal - The server is configured for replication, but has been disabled.
• Offline: Error - The server is in an error state and will try to correct the issue.
This can take 5 to 10 minutes. If the server is unable to resolve the issue,
replication should be disabled for troubleshooting.
Revision 0817 14 - 8
Cloudpath Admin 200 Server Clustering
The firewall ports for Clustering are found under Administration Advanced
Firewall Requirements. However, these ports will not be visible until after the
deployment of replication is complete. After completing replication we will come
back to this setting to establish the firewall rules. The ports 5 for replication are
TCP: 10000, 10001, 3306, 2112 and 8022 used for SSH. Changes for firewall
setting are done on the individual ES’s
Validate the inbound and outbound firewall setting on the ES Servers in the
cluster topology. This information is generated based topology configuration.
Changed to firewall setting are made on the individual ES nodes, not he cluster.
Revision 0817 14 - 9
Cloudpath Admin 200 Server Clustering
Adding an ES VM to a Cluster
• Best Practice: Plan out the all instance of Cloudpath in the topology to avoid
rework and un-clustering.
Revision 0817 14 - 10
Cloudpath Admin 200 Server Clustering
To make topology changes, such as adding another server (when Cluster is built
and a new ES was not added on initial setup, or replacing an inoperable server in
the cluster, you must take down the cluster configuration and rebuild it with the
new servers.
Revision 0817 14 - 11
Cloudpath Admin 200 Server Clustering
2. How many times should you change a cluster node’s FQDN? (Answer: 0)
3. After setup, all nodes should have what kind of icon in the status chart?
(Answer: Green Enabled Icon)
Revision 0817 14 - 12
Cloudpath Admin 200 Server Clustering
Revision 0817 14 - 13
Cloudpath Admin 200 Server Clustering
Revision 0817 14 - 14
Cloudpath Admin 200 Basic Troublshooting
Revision 0817 15 - 1
Cloudpath Admin 200 Basic Troublshooting
Revision 0817 15 - 2
Cloudpath Admin 200 Basic Troublshooting
Revision 0817 15 - 3
Cloudpath Admin 200 Basic Troublshooting
Revision 0817 15 - 4
Cloudpath Admin 200 Basic Troublshooting
The first place to look for System Issues is in the Events Log. The Events log
(Dashboard > Notifications > Events) displays all system events, such as
account logins, enrollments, acceptance of AUPs, registrations, certificate
issuance, errors, account updates, and snapshot creation.
Look for “Error” logs related to the trouble event. If the error is preceded by
ADMIN_ACCESS and SYSTEM_CONFIGURATION consider rolling back to the
previous Snapshot and investigate the system configuration changes.
Revision 0817 15 - 5
Cloudpath Admin 200 Basic Troublshooting
Revision 0817 15 - 6
Cloudpath Admin 200 Basic Troublshooting
Web Server
• Note - Only On-Premise accounts can edit Web Server information. Cloud
accounts can only view the Web Server.
• Warning changes to the Web Server may disrupt user enrollment
• The component is should be running.
• HTTPS can be enabled if it was not previously setup.
• Confirm the Web Server Certificate keys.
• The Pencil Icon presents options to change Enrollment Session Timeout,
Admin UI Allowed IP/CIDR, SSL Cipher List, SSL Protocols and Strict
Transport Security settings.
• The web service and application can also be restarted as part of
troubleshooting.
Network
• Components should be reviewed to ensure the hostname and IP information
is correct.
• The Diagnostics option provides a tool to view the network diagnostic test
and download the results of that test.
Revision 0817 15 - 7
Cloudpath Admin 200 Basic Troublshooting
Each system contains rolling logs, which can be reviewed for troubleshooting
purposes.
The Cloudpath system logs all network activity to and from individual components
of the system, including protocols used, whitelists, and packet information.
Debug or download additional logs from each component. All logs can be run in
Normal (default) or Debug (finer, or verbose) mode.
• General Log - The General log is the JBoss server log file, which are web
application log files.
• SCEP Log - Logs related to Simple Certificate Enrollment Protocol (SCEP).
The system provides an outward-facing SCEP server interface that allows
SCEP clients, such as iOS, to pull certificates via SCEP.
• OCSP Log - Logs related to Online Certificate Status Protocol (OCSP), which
is used for obtaining the revocation status of an X.509 digital certificate.
• Replication Log - Logs related to the replication setup and operation of ES
Clusters
Revision 0817 15 - 8
Cloudpath Admin 200 Basic Troublshooting
Walled Gardens are dynamic as they engage connections to 3rd party services to
streamline the onboarding process. 3Rd party URLs added to the ES Walled
Garden exception lists grant WLAN access to social media, vendor store applets
and 3rd party O-auth services for authentication. If users report issues of time
outs in the onboarding process, ask the method of onboarding and validate the
exception list URL to the 3rd party service.
Revision 0817 15 - 9
Cloudpath Admin 200 Basic Troublshooting
• Client will not be redirected to the portal as long as the mac registration is valid.
• Client must be able to communicate with the wireless controller on the on
boarding/guest VLAN
• Cloudpath will not receive the client mac address unless the client is redirected
to the captive portal. client can not browse directly to the portal.
Revision 0817 15 - 10
Cloudpath Admin 200 Basic Troublshooting
• Log into the controller command line and run the: no encrypt-mac-ip
command.
• Note: You must be in ‘enable’ mode to run this command.
Revision 0817 15 - 11
Cloudpath Admin 200 Basic Troublshooting
Revision 0817 15 - 12
Cloudpath Admin 200 Basic Troublshooting
Note: If using the hosted training.cloudapth.net and wish to use a local AD server
then the site Firewall and NAT rules must allow the inbound authentication access
from the respective source socket (72.18.151.76:389 for LDAP or :636 for LDAP
over SSL
Revision 0817 15 - 13
Cloudpath Admin 200 Basic Troublshooting
If the correct firewall ports are not open you will experience issues with AD
integration, cannot create snapshots, or the Cloudpath ES cannot communicate
with your network systems.
Revision 0817 15 - 14
Cloudpath Admin 200 Basic Troublshooting
• System Rules
• Retrieve system updates.
• System interacting with cloud services (licensing, wizards, built-in email,
etc).
• Support tunnel for remote assistance. Only necessary when support
tunnel is enabled.
• Support 3rd party O-auth
• External CA: System querying certificates from external CA.
• Authentication Server: Authenticates to Active Directory server and other 3rd
party user validation
• NTP: Performs NTP synchronization
• RADIUS CoA: Send CoA to wired/wireless infrastructure (default RADIUS
client)
Revision 0817 15 - 15
Cloudpath Admin 200 Basic Troublshooting
The availability of the system can be monitored at various layers. At the lowest
layer, the system responds to ICMP pings.
For local VM deployment the positive and negative test can be run from a browser
to the HOSTNAME
Revision 0817 15 - 16
Cloudpath Admin 200 Basic Troublshooting
Revision 0817 15 - 17
Cloudpath Admin 200 Basic Troublshooting
Revision 0817 15 - 18
Cloudpath Admin 200 Basic Troublshooting
Revision 0817 15 - 19
Cloudpath Admin 200 Basic Troublshooting
Revision 0817 15 - 20
Cloudpath Admin 200 Basic Troublshooting
Revision 0817 15 - 21
Cloudpath Admin 200 Basic Troublshooting
Additional Resources
http://support.ruckuslwireless.com
Revision 0817 15 - 22
Cloudpath Admin 200 Basic Troublshooting
Revision 0817 15 - 23
Cloudpath Admin 200 Basic Troublshooting
Revision 0817 15 - 24
Cloudpath Admin 200 Basic Troublshooting
Revision 0817 15 - 25
Cloudpath Admin 200 Basic Troublshooting
Revision 0817 15 - 26
Cloudpath Admin 200 Eduroam
Revision 0817 1
Cloudpath Admin 200 Eduroam
Revision 0817 2
Cloudpath Admin 200 Eduroam
Eduroam (https://www.eduroam.us/introduction)
eduroam is a “federation” of Radius proxies that allows educational institute
Radius servers to pass user authentications between each other:
Global network supporting roaming between research and educational
institutions
eduroam provides a secure 802.1X Wi-Fi SSID for internet access when
clients roam between educational institutes
Supports EAP-PEAP / TTLS / TLS
Cloudpath
Cloudpath provisions local devices with an eduroam SSID policy certificate.
Visiting users authenticate to their home Radius server through Cloudpath Radius
and then via the eduroam federation:
Visiting clients are not onboarded because they have to trust their home Radius
server, not the local one
Local users to authenticate to local service through Cloudpath Radius
Revision 0817 3
Cloudpath Admin 200 Eduroam
Revision 0817 4
Cloudpath Admin 200 Eduroam
Revision 0817 5
Cloudpath Admin 200 Eduroam
A Visited Institution should not configure devices for a Visiting User. The
configuration is dictated by the users Home Institution
eduroam-US is authoritative for the .edu TLD, and handles routing to other TLDs
including those handled by eduroam in Europe (for all European members of the
federation), eduroam in the Asia-Pacific region (including Australia, China, Hong
Kong, Japan, New Zealand, and Taiwan), and Canada. Within the US the
eduroam-US Top-Level RADIUS Server (TLRS) handles routing to .edu member
institutions. (Technical Overview. (n.d.). Retrieved August 11, 2016, from
https://www.eduroam.us/node/10)
Revision 0817 6
Cloudpath Admin 200 Eduroam
The slide is a review of the process and tasks that occur depending on the type of
user and location.
Revision 0817 7
Cloudpath Admin 200 Eduroam
Filter ID: - The filter ID included in the RADIUS reply for successful
authentications.
Revision 0817 8
Cloudpath Admin 200 Eduroam
Class ID: - The class included in the RADIUS reply for successful authentications.
Reauthentication: - The re-authentication period, in seconds, included in the
RADIUS reply for successful authentications. If the device stays connected for
longer than this period, the WLAN or switch will require that the device (invisibly to
user) re-authenticate. In wireless, this causes the encryption keys to be rotated.
Additional Attribute: - Clicking the plus(+) sign will allow for additional standard
RADIUS attributes.
Revision 0817 9
Cloudpath Admin 200 Eduroam
Placing Cloudpath ES on the Internet allows users to easily configure or fix their
device from anywhere in the world at any time of day or night.
Note - Eduroam have a statement on their web site about not using Web Portals
for authentication as they are insecure. This is only for visiting users and not
applicable to their onboarding portal for a local user.
Revision 0817 10
Cloudpath Admin 200 Eduroam
Which RADUIS server determines the policy to implement? (Ans: Visting RADIUS
server)
Where is “eduroam” enabled in the ES GUI? (Ans: Configuration -> Advanced ->
RADIUS Server -> eduroam tab)
Revision 0817 11
Cloudpath Admin 200 Eduroam
• ES will handle the authorization of the user & device, the installation of the
certificate across most common BYOD and IT devices, and will provide
reporting on the user, device, certificate, and policy
Cloudpath integrates with Microsoft IIS and CA via a DLL referred to as the
Integration Module
While configuring a user’s device, Cloudpath ES prompts the user for credentials.
It then generates a CSR, authenticates to the CA, and sends the CSR to the CA
via the Integration Module. The Integration Module, in coordination with the CA,
authenticates the user and, if valid credentials are provided, signs a certificate for
the user. The characteristics of the certificate generated are dictated by the
certificate template utilized. The certificate is then streamed back to the Cloudpath
Wizard, which installs it and configures the SSID to utilize it.
Download Cloudpath ES technical guide from support site for more information:
“Issuing Certificates From a Microsoft CA Configuration Guide”
The reference name for this certificate template. This is visible to the
administrator only.
2. CA Name - The name of the CA, which appears in the Certificate Authority
console.
Note - The CA Name should be the name of the CA as displayed in the Certificate
Authority snap-in. On Windows, it also displays in the Issued By field when a
certificate is viewed in the CertMgr.
3. Request Attributes - The attributes used when querying the CA. This typically
includes, at a minimum, the certificate template name. For example,
Certificate Template:User.
• Most commonly, the RADIUS server replies with the username based on the
CN of the certificate. But, additional options are available. This username is
used by some WLAN infrastructure as the username displayed within the
WLAN UI. Certificate Common Name (Default). Returns the certificate
common name as the username.
• Alternative Configurations:
• Allowed SSID(s): regular expression defining the SSID(s) from which devices
are allowed to authenticate. This only needs populated if multiple secure SSIDs
exist and users are only allowed to authenticate from one of them.
Within a template in Microsoft CA, the behavior for building the Subject Name is
configurable. It is strongly recommended, and the default behavior, that Microsoft
CA builds the CN and SAN automatically (left image).
if you wish to use a custom subject, it must be passed via the CSR and the ES
needs to verify that the CSR has the appropriate values before sending to
Microsoft CA. The fields below configure the subject of the CSR destined for
Microsoft CA when 'Supply is the request' (right image) is selected in the template
3. Where is the Integration Module DLL installed after the download? (Answer:
IIS Server)
Revision 0817 1
Cloudpath Admin 200 Chromebook
Revision 0817 2
Cloudpath Admin 200 Chromebook
Google Management Console - deploy and control users, devices and apps
across a fleet of Chromebooks.
Revision 0817 3
Cloudpath Admin 200 Chromebook
Revision 0817 4
Cloudpath Admin 200 Chromebook
Unmanaged devices - the user downloads the ONC file, which contains the
certificate and Wi-Fi settings required to connect to the secure network.
ONC Only - Allows installation using the ONC file only. It can be used for both
unmanaged and managed Chromebooks
ONC + User Extension - Allows installation using the ONC file or Chrome
extension. If the extension is used, the certificate is installed as the user
ONC + Device Extension - Allows installation using the ONC file or Chrome
extension. If the extension is used, the certificate is installed as the device
User Extension Only - Allows installation to the user TPM using only the Chrome
extension
Device Extension Only - Allows installation to the device TPM using only the
Chrome extension.
Revision 0817 5
Cloudpath Admin 200 Chromebook
Extension Messages.
Extension Install Instructions - are displayed to the user if an extension is used to
install the certificate on the device.
Completed Message - appears after the certificate has been successfully installed
using the extension.
App ID to Notify - notifies an app when the certificate installation is complete. This
can be useful if an app is managing the enrollment process for the user.
Revision 0817 6
Cloudpath Admin 200 Chromebook
1. Login to support.ruckuswireless.com
3. Select the “Documents” tab and scroll down to locate and select the below for
downloads:
• Cloudpath_ES 4.3.2861 (GA) Chromebook Config Guide
• Cloudpath_ES 4.3.2861 (GA) Chromebook User Experience Guide
Revision 0817 7
Cloudpath Admin 200 Chromebook
2. Where in the ES GUI can you enable or disable Chrome support? (Ans:
Configuration > Advanced > Device Configurations)
Revision 0817 8
Cloudpath Admin 200 Chromebook
Revision 0817 9
Cloudpath Admin 200 Chromebook
Revision 0817 10
Cloudpath Admin 200 Cloudpath Multi-Tenant (MSP)
Super Admin can not create a work flow, no RADIUS, Tennent admin only
If a Super Admin switches into a tenanted Account, they can’t switch back out to
the Super Admin view (they have to logout and back in)
Multi-tenant is enabled before the initial system setup. Once enabled, the
database structure cannot be reverted back to a single-tenant instance.
Multitenant Configuration
The administrator needs to manually initiate a check for new updates to the
system software/wizard under Administration System System Updates.
2. The “Set It & Forget It” account is ________ level account. (Answer: Tenant)
3. What will happen if Multi-Tenant is enabled after initial setup? (Answer: The
workflow configuration will be lost)