You are on page 1of 3

In this module, you'll learn about clearpass.

The value of the Clippers applications and the


licensing model to fulfill the clearpass competency sales training requirements. You are
required to view all of the modules slides at the end of each module. You'll be presented with
several questions, check your knowledge and reinforce your learning your responses to the
learning Czech questions are measured but there's no minimum completion percentage
require. Let's get started.

So in the most simple terms, what does clearpass do? It defines who what devices can
connect to which devices with data which infrastructure on which applications. It is
Enterprise Access Control. And identifies forces and working with all our third parties unifies
security response and control.

How do we do that well to begin with identify everything everything the wants to connect at
the point of connection. What is it? Who is it and what kind of policy should we give them
whether it's a contractor and administrator or an employee BYO device we want to identify
that device at the point of connection wired and wireless lie.

We need to identify all the elements we wish to protect. We need to know the service the
storage the internal and cloud-based applications and the network infrastructure itself.

And from that point knowing all the elements trying to connect knowing the assets that we
wish to protect and also Grant access we can define a policy that takes into account context
the user and their role their device type and the house of that device the time and also the
day finally location. Doing that we can create a policy. And if it's in the policy you can do it. If
it's not in the policy you cannot it is black and white. No gray.

That simple premise of identifying all connecting devices of understanding what we want to
protect and enforcing a policy across the Enterprise of access wide and wirelessly. That is
what clearpass policy manager does the per device policy Enterprise exes.

Not every Enterprise is 100% Hewlett Packard Enterprise Aruba know the Cisco there's
Juniper is brocade. There are hundreds of vendors. Not only that but your customers and
opportunities already have existing Security Management infrastructure. They've also
firewalls we want to reinforce their firewalls. We want to work with their existing Security
Management and endpoint Management Solutions unification of security policy has to touch
and the integrated with all elements.

So if that's what Clip House policy manager does then its constituent elements and
applications on board guests and on God could only make things easier. On board and
guests both automation tools for ensuring secure access albeit in very different ways and on
guard our device health check application. Going to cover each of these in more detail.

So why do you need policy management because every Enterprise needs centralized
authentication and needs to be at the center of the business. You need to be making sure
that people do what people are meant to do with nothing else. We built in policy templates.
We make it easy for organization to implement and automating the workflow means that
most of our users do most of the work for us. Or what resources is required for Mighty is kept
to a minimum. How do we do that? Well things like basic guest and onboarding whether
users can self-identify device profiling though means we can make sure only devices we
want to can actually pin to be Enterprise Integration with some firewalls and MDM Solutions
simplifies and makes for a simpler in a single point of governance across the business and
working with multiple vendors is crucial. Doing all of that and providing centralized login
reporting system. Good place to clear thoughts policy manager to start.

So you're looking to sell clearpass policy manager to your customers that is fantastic. What's
included well policy engine radius components and tacacs as well. They're all standard
profiling is included and on connect new SNMP trap solution for authentication is included as
well and we'll cover that in more detail shortly. Policy simulation tool is fantastic and shows
you what effect it will have on the business based on the type of authentication that take
place previously and the template based policy creation tool as well simplifies, the creation
of policies based on using what your users are doing today as a template and merely
walking down. We also include exchange I third-party integration in pi system. So slow and
elements like a group that allow you to work with Apple TVs.

So One Clip husband guest access businesses provide guest access for partners and
visitors on a regular basis though often do it. However on a separate Network the separate
Network and have no idea who is using it what they're doing and you have no control the
better way is to make your guest Network part of your standard Enterprise Network, but will
lay down clear security provisions. The don't allow for cross-contamination the same time
you might also want to allow some guests access. To the Enterprise from the guest Network.

Clearpass guest provides professional consistent guest access to visitors Partners at your
customers, but we sponsored guest access they can also use the guest Network to give
access to specific infrastructure to Consultants temporary employees and contractors.
Because of the policy management engine and the Wake that clip houseguest works. You
can give access to specific infrastructure without exposing the entire Enterprise domain.

Clearpass on board. Makes the use of BYOD devices interfered Christ both more secure
and easier. Buying onboarding mobile devices and installing a certificate. You can use the
native security functions of the mobile device such as fingerprint PIN numbers and
encryption. And then apply a policy of not just what that user can access but what that
device can access with that user. It is the most secure way of authenticating a device into
the Enterprise. It can also be used in conjunction with our partners to he's MDM
management and onboarding of MGM soffit.

and finally Clearpass onboard keeps your Enterprise healthy. But from when a device leaves
the corporate environment to when it returns that its antivirus has been kept up to date that
it's software firewall has been enabled the entire time that USB drives are not connected on
boot-up we can make sure the contagion doesn't enter the Enterprise and cause further
chaos. Those are just a few of the policies a total of 17. You can apply to essentially any
device with a keyboard Mac windows. Linux Chromebooks.

So if we look at Cliff House licensing In brief Please be aware that this slide is a variable
separately to download they pass is available from policy manager 505,000 and 25,000
device counts. It's available either as a hardware Appliance or VM you can cluster devices
and you can share the vices numbers across advices. We also have high capacity guest
mode, which allows you to double the guests only functionality. And you also get 25
Enterprise licenses of all the tools guests on board. And on Garth guest is license based on
the number of unique guest devices per day on board on the number of devices that have
active certificates and on God on the number of unique devices that a health checked over a
seven day period It is not complex. And we do give examples of our licenses models. Should
you have any license violations? You will read sorry, you will lose access to the GUI, but the
functionality will continue.

You might also like