12.07.2015 Views

Aruba ClearPass Access Management System ... - Mayflex

Aruba ClearPass Access Management System ... - Mayflex

Aruba ClearPass Access Management System ... - Mayflex

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

AP-120 SERIES CONFIGURATIONCLEARPASS ACCESS MANAGEMENT SYSTEM – FREQUENTLY ASKED QUESTIONS31. What’s the difference between <strong>ClearPass</strong> Onboard and <strong>ClearPass</strong> QuickConnectDevice SupportOnboardiOS now, Android/Windows/Mac at theend of April, Ubuntu mid May) for dot1XQuickConnectWindows, iOS, Mac OS, Android now,Ubuntu mid May) for dot1XPush Supplicants/Agents Yes YesConfigure VPN Yes NoConfigure Active Sync & YesNoExchangeInstall Programs/Apps Yes (Window's Only) Yes (Window's Only)Push Unique Machine Can push certificates (iOS/Mac Lion) and NoCredentialsUnique Credentials (Android/Windows) todevices and revoke their accessRequires <strong>ClearPass</strong> Policy YesNoManagerAdministration <strong>ClearPass</strong> Policy Manager Cloud-based with yearly subscriptionUse CaseBest for enterprise environments wherethere are multiple things to configure onnew devices, especially environmentswhere certs/credentials are requiredBest for environments that experienceconstant change (universities) ororganizations that are moving to dot1Xand do not require certs/credentialsWorks over Any Vendor's YesYesNetworkLicense tracking Through <strong>ClearPass</strong> Policy Manager Cannot track how many users configuredevices (sold by total number of users /honor system for adherence topurchased usage license)32. How is QuickConnect offered in the Cloud?Administrative functions are managed in cloud where an administrator can configure,download, and store 802.1X configuration install packages. The installation package isthen hosted locally and delivered from an IT owned web server.33. Why is profiling devices important to an enterprise?The most basic requirement for profiling is just to find out what’s on the network. This isimportant not only for reporting but also to help with things like capacity planning.More importantly, profiling is important for implementing policies. With BYOD,enterprises need to create policies based on the context of the connection; who isconnecting, with what device, where and to what applications. But now that networksecurity and user experience are based on context, the accuracy of that context becomesfar more important. It is especially important to ensure the accuracy of things like userrole and device type. If I have different security roles for laptops and smartphones, I needARUBA NETWORKS CHANNEL PARTNER CONFIDENTIAL – DO NOT DISTRIBUTE PAGE 19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!