Connect this data source on your own, using the Hunters platform.
TL;DR
Supported data types | 3rd party detection | Hunters detection | IOC search | Search | Table name | Log format | Collection method |
---|---|---|---|---|---|---|---|
HPE Aruba ClearPass | ✅ | ✅ | hpe_aruba_clearpass_alerts | CSV | S3 |
Overview
HPE Aruba ClearPass is a powerful network access control (NAC) solution that provides secure, policy-based access for wired, wireless, and VPN networks. It enables organizations to authenticate, authorize, and enforce security policies for users and devices across diverse environments. With features like role-based access control, device profiling, and automated threat responses, ClearPass simplifies managing network security while enhancing visibility and compliance.
Supported data types
Aruba ClearPass
Table name: hpe_aruba_clearpass_alerts
HPE Aruba ClearPass alerts notify administrators of security events and policy violations within the network. These alerts provide critical information about unauthorized access attempts, suspicious activity, or endpoint compliance issues, enabling swift action to mitigate risks. They can be configured to trigger automated responses or integrate with third-party security tools for enhanced incident management.
Send data to Hunters
Hunters supports the collection of HPE Aruba Networking logs via an intermediary AWS S3 storage.
To connect HPE Aruba Networking logs:
Set up log forwarding from HPE Aruba Networking to a designated AWS S3 bucket.
Once the export is completed and the logs are collected to S3, follow the steps in this section.
Expected format
Logs are expected in CSV format.
_TIME,ATTRIBUTES,COMMON_ALERTS,COMMON_ALERTS_PRESENT,COMMON_AUTH_TYPE,COMMON_CONNECTION_STATUS,COMMON_ENFORCEMENT_PROFILES,COMMON_ERROR_CODE,COMMON_HOST_MAC_ADDRESS,COMMON_LOGIN_STATUS,COMMON_NAS_IP_ADDRESS,COMMON_NAS_NAME,COMMON_NAS_PORT,COMMON_REQUEST_ID,COMMON_REQUEST_TIMESTAMP,COMMON_ROLES,COMMON_SERVICE,COMMON_SESSION_LOG_TIMESTAMP,COMMON_SOURCE,COMMON_SYSTEM_POSTURE_TOKEN,COMMON_USERNAME,CRIBL_PIPE,HOST,RADIUS_AUTH_METHOD,RADIUS_AUTH_SOURCE,SOURCE,SOURCETYPE,_RAW,EVENT_TIME,GENERATED_TIME
1707725749,,"Policy server: Failed to get value for attributes=[AccountStatus, Device Account Enabled, Device Role Name]",0,,Unknown,DUR-Access-Point-VL500,0,6cc49fc2a230,ACCEPT,10.55.244.254,H0863-SW1,1,R081fc508-06-65ca43a7,2024-02-12 08:13:27-08,"[Other], [User Authenticated]",VCA - Wired - MAC Auth - Wireless Vlan 500,2024-02-12 08:13:27.633-08,RADIUS,UNKNOWN,6cc49fc2a230,pip_vca_aruba_clear_pass_snowflake_prod,guestwifi.vca.com,MAC-AUTH,None,/opt/splunkforwarder/syslog/laissplogp01/aruba/clearpass/guestwifi.vca.com/2024-02-12.log,aruba:clearpass,"""Feb 12 08:15:49 guestwifi.vca.com 2024-02-12 08:15:49,464 10.230.107.135 VCA-Syslog 367735390 1 0 Common.Username=\""6cc49fc2a230\"",Common.Service=\""VCA - Wired - MAC Auth - Wireless Vlan 500\"",Common.Roles=\""[Other], [User Authenticated]\"",RADIUS.Auth-Source=\""None\"",RADIUS.Auth-Method=\""MAC-AUTH\"",Common.System-Posture-Token=\""UNKNOWN\"",Common.Enforcement-Profiles=\""DUR-Access-Point-VL500\"",Common.Host-MAC-Address=\""6cc49fc2a230\"",Common.NAS-IP-Address=\""10.55.244.254\"",Common.Error-Code=\""0\"",Common.Alerts=\""Policy server: Failed to get value for attributes=[AccountStatus, Device Account Enabled, Device Role Name]\"",Common.Request-Timestamp=\""2024-02-12 08:13:27-08\"",Common.Alerts-Present=\""0\"",Common.Login-Status=\""ACCEPT\"",Common.NAS-Name=\""H0863-SW1\"",Common.NAS-Port=\""1\"",Common.Request-Id=\""R081fc508-06-65ca43a7\"",Common.Session-Log-Timestamp=\""2024-02-12 08:13:27.633-08\"",Common.Source=\""RADIUS\"",Common.Auth-Type=\""\"",Common.Connection-Status=Unknown""",2024-02-12T16:15:52.488Z,2024-02-12T08:15:49.000Z