Deployment Guide

The network administrator, operators, and visitors may use different network interfaces to access the visitor
management features. The exact topology of the network and the connections made to it will depend on the type of
network access offered to visitors and the geographical layout of the access points.
Key Interactions
The following figure shows the key interactions between W-ClearPass Guest and the people and other components
involved in providing guest access.
Figure 3 Interactions involved in guest access
W-ClearPass Guest is part of your networkā€™s core infrastructure and manages guest access to the network.
NAS devices, such as wireless access points and wired switches on the edge of the network, use the RADIUS protocol
to ask W-ClearPass Policy Manager to authenticate the username and password provided by a guest logging in to the
network. If authentication is successful, the guest is then authorized to access the network.
Roles are assigned to a guest as part of the context W-ClearPass Policy Manager uses to apply its policies. RADIUS
attributes that define a roleā€™s access permissions are contained within Policy Managerā€™s Enforcement Profile. Additional
features such as role mapping for W-ClearPass Guest can be performed in W-ClearPass Policy Manager.
The network usage of authorized guests is monitored by the NAS and reported in summary form to W-ClearPass Policy
Manager using RADIUS accounting, which allows administrators to generate network reports in W-ClearPass Insight.
AAA Framework
W-ClearPass Guest is built on the industry standard AAA framework, which consists of authentication, authorization,
and accounting components.
The following figure shows how the different components of this framework are employed in a guest access scenario.
Dell Networking W-ClearPass Guest 6.3 | User Guide W-ClearPass Guest Overview | 23