HPE Aruba Networking ClearPass Policy Manager (CPPM) uses endpoint classification (profiling) to identify and categorize devices on the network, enabling policy enforcement based on device type, OS, or other attributes. CPPM supports two primary profiling methods: passive and active classification.
Passive Classification: This method involves observing network traffic that endpoints send as part of their normal operation, without CPPM sending any requests to the device. Examples include DHCP fingerprinting (analyzing DHCP Option 55), HTTP User-Agent string analysis, and TCP fingerprinting (analyzing TTL and window size). Passive classification is non-intrusive and does not generate additional network traffic.
Active Classification: This method involves CPPM sending requests to the endpoint to gather information. Examples include SNMP scans (to query device details), WMI scans (for Windows devices), and SSH scans (to gather system information). Active classification is more intrusive and may require credentials or network access to the device.
Option A, "Passive classification refers exclusively to MAC OUI-based classification, while active classification refers to any other classification method," is incorrect. Passive classification includes more than just MAC OUI-based classification (e.g., DHCP fingerprinting, TCP fingerprinting). MAC OUI (Organizationally Unique Identifier) analysis is one passive method, but not the only one. Active classification specifically involves sending requests, not just "any other method."
Option B, "Passive classification classifies endpoints based on entries in dictionaries, while active classification uses admin-defined rules to classify endpoints," is incorrect. Both passive and active classification use CPPM’s fingerprint database (not "dictionaries") to match device attributes. Admin-defined rules are used for policy enforcement, not classification, and apply to both methods.
Option C, "Passive classification is only suitable for profiling endpoints in small business environments, while enterprises should use active classification exclusively," is incorrect. Passive classification is widely used in enterprises because it is non-intrusive and scalable. Active classification is often used in conjunction with passive methods to gather more detailed information, but enterprises do not use it exclusively.
Option D, "Passive classification analyzes traffic that endpoints send as part of their normal functions; active classification involves sending requests to endpoints," is correct. This accurately describes the fundamental difference between the two methods: passive classification observes existing traffic, while active classification actively queries the device.
The HPE Aruba Networking ClearPass Policy Manager 6.11 User Guide states:
"Passive classification analyzes traffic that endpoints send as part of their normal functions, such as DHCP requests, HTTP traffic, or TCP packets, without ClearPass sending any requests to the device. Examples include DHCP fingerprinting and TCP fingerprinting. Active classification involves ClearPass sending requests to the endpoint to gather information, such as SNMP scans, WMI scans, or SSH scans, which may require credentials or network access." (Page 246, Passive vs. Active Profiling Section)
Additionally, the ClearPass Device Insight Data Sheet notes:
"Passive classification observes network traffic generated by endpoints during normal operation, such as DHCP or HTTP traffic, to identify devices without generating additional traffic. Active classification, in contrast, sends requests to endpoints (e.g., SNMP or WMI scans) to gather detailed information, which can be more intrusive but provides deeper insights." (Page 3, Profiling Methods Section)
[References:, HPE Aruba Networking ClearPass Policy Manager 6.11 User Guide, Passive vs. Active Profiling Section, Page 246., ClearPass Device Insight Data Sheet, Profiling Methods Section, Page 3.===========]