Set up Aruba Central for Integration
Table of Contents
Expand all | Collapse all
-
- Integrate IoT Security with AIMS
- Set up AIMS for Integration
- Set up IoT Security and XSOAR for AIMS Integration
- Send Work Orders to AIMS
- Integrate IoT Security with Microsoft SCCM
- Set up Microsoft SCCM for Integration
- Set up IoT Security and XSOAR for SCCM Integration
- Integrate IoT Security with Nuvolo
- Set up Nuvolo for Integration
- Set up IoT Security and XSOAR for Nuvolo Integration
- Send Security Alerts to Nuvolo
- Send Vulnerabilities to Nuvolo
- Integrate IoT Security with ServiceNow
- Set up ServiceNow for Integration
- Set up IoT Security and XSOAR for ServiceNow Integration
- Send Security Alerts to ServiceNow
- Send Vulnerabilities to ServiceNow
- Integrate IoT Security with ServiceNow Service Graph Connector
-
- Integrate IoT Security with Cortex XDR
- Set up Cortex XDR for Integration
- Set up IoT Security and XSOAR for XDR Integration
- Integrate IoT Security with CrowdStrike
- Set up CrowdStrike for Integration
- Set up IoT Security and XSOAR for CrowdStrike Integration
- Integrate IoT Security with Microsoft Defender XDR
- Set up Microsoft Defender XDR for Integration
- Set up IoT Security and Cortex XSOAR for Microsoft Defender XDR Integration
- Integrate IoT Security with Tanium
- Set up Tanium for Integration
- Set up IoT Security and XSOAR for Tanium Integration
-
- Integrate IoT Security with Aruba AirWave
- Set up Aruba AirWave for Integration
- Set up IoT Security and Cortex XSOAR for Aruba AirWave Integration
- View Device Location Information
- Integrate IoT Security with Aruba Central
- Set up Aruba Central for Integration
- Set up IoT Security and XSOAR for Aruba Central Integration
- Integrate IoT Security with Cisco DNA Center
- Set up Cisco DNA Center to Connect with XSOAR Engines
- Set up IoT Security and XSOAR for DNA Center Integration
- Integrate IoT Security with Cisco Meraki Cloud
- Set up Cisco Meraki Cloud for Integration
- Set up IoT Security and XSOAR for Cisco Meraki Cloud
- Integrate IoT Security with Cisco Prime
- Set up Cisco Prime to Accept Connections from IoT Security
- Set up IoT Security and XSOAR for Cisco Prime Integration
- Integrate IoT Security with Network Switches for SNMP Discovery
- Set up IoT Security and Cortex XSOAR for SNMP Discovery
- Integrate IoT Security with Switches for Network Discovery
- Set up IoT Security and Cortex XSOAR for Network Discovery
-
- Integrate IoT Security with Aruba WLAN Controllers
- Set up Aruba WLAN Controllers for Integration
- Set up IoT Security and XSOAR for Aruba WLAN Controllers
- Integrate IoT Security with Cisco WLAN Controllers
- Set up Cisco WLAN Controllers for Integration
- Set up IoT Security and XSOAR for Cisco WLAN Controllers
-
- Integrate IoT Security with Aruba ClearPass
- Set up Aruba ClearPass for Integration
- Set up IoT Security and XSOAR for ClearPass Integration
- Put a Device in Quarantine Using Aruba ClearPass
- Release a Device from Quarantine Using Aruba ClearPass
- Integrate IoT Security with Cisco ISE
- Set up Cisco ISE to Identify IoT Devices
- Set up Cisco ISE to Identify and Quarantine IoT Devices
- Configure ISE Servers as an HA Pair
- Set up IoT Security and XSOAR for Cisco ISE Integration
- Put a Device in Quarantine Using Cisco ISE
- Release a Device from Quarantine Using Cisco ISE
- Apply Access Control Lists through Cisco ISE
- Integrate IoT Security with Cisco ISE pxGrid
- Set up Integration with Cisco ISE pxGrid
- Put a Device in Quarantine Using Cisco ISE pxGrid
- Release a Device from Quarantine Using Cisco ISE pxGrid
- Integrate IoT Security with Forescout
- Set up Forescout for Integration
- Set up IoT Security and XSOAR for Forescout Integration
- Put a Device in Quarantine Using Forescout
- Release a Device from Quarantine Using Forescout
-
- Integrate IoT Security with Qualys
- Set up QualysGuard Express for Integration
- Set up IoT Security and XSOAR for Qualys Integration
- Perform a Vulnerability Scan Using Qualys
- Get Vulnerability Scan Reports from Qualys
- Integrate IoT Security with Rapid7
- Set up Rapid7 InsightVM for Integration
- Set up IoT Security and XSOAR for Rapid7 Integration
- Perform a Vulnerability Scan Using Rapid7
- Get Vulnerability Scan Reports from Rapid7
- Integrate IoT Security with Tenable
- Set up Tenable for Integration
- Set up IoT Security and XSOAR for Tenable Integration
- Perform a Vulnerability Scan Using Tenable
- Get Vulnerability Scan Reports from Tenable
Set up Aruba Central for Integration
Set up Aruba Central for integration with IoT Security
through Cortex XSOAR.
- Create a user account in Aruba Central with read-only access.XSOAR uses this account when authenticating to the Aruba Central API.
- Log in to Hewlett Packard Enterprise (HPE) with an account that has administrator credentials and navigate to the homepage of your account.
- Click Manage at the top of the home page and then select Identity & AccessRoles & PermissionsCreate Role.
- Select Create new role, choose Aruba Central, and then click Next to launch a role creation wizard.
- Enter a role name such as XSOAR-API-Access and a meaningful description, and then click Next.
- Click Add Permissions, select NMS Service, select View, and then click Add.
- Click Next on the next page of the wizard and then click Finish on the last page.The new role appears on the Roles & Permissions page.
Send an invitation to someone to become an Aruba Central user with read-only privileges.It makes sense to invite someone who will configure the Aruba Central integration instance on Cortex XSOAR. The purpose of the user account is to configure XSOAR to use it when accessing the Aruba Central API to retrieve device information. Inviting the person who will configure XSOAR means he or she can use the username and password for the user account in the Aruba Central integration instance configuration.- Select Identity & ControlUsersInvite Users.
- Enter an email address and choose an HPE GreenLake Role such as Observer.The user account will not be used to access HPE GreenLake; however, you must assign an HPE GreenLake role first so that once the user account is created and activated, you can assign it the read-only role you created for it when accessing the Aruba Central application.Hewlett Packard sends an HPE Cloud Signup Invite to the email address.
- When the recipient receives the email message, he or she clicks Accept Invitation.The link opens a webpage where the person can create an HPE account.
- The user enters an email address, password, first name, and last name; accepts the HPE terms of use; and then clicks Register.The user must share the password with you so you can enter it and the user’s email address (as a username) when configuring an Aruba Central integration instance in Cortex XSOAR later.Hewlett Packard sends a verification email to the email address.
- When the recipient receives the email message, he or she clicks Activate Account.
- Once the account is activated, select Identity & AccessUsers, select the newly activated user, click the Action menu icon ( . . . ), and then click Assign Role.
- Choose Aruba Central for Application and XSOAR-API-ACCESS for Role and then click Assign Role.
- Confirm the role assignment when prompted.
Create an API gateway and get the information for configuring an Aruba Central integration instance in XSOAR.- Return to your HPE GreenLake homepage and click Launch for Aruba Central.
- Select OrganizationPlatform IntegrationRest API.
- Copy the API gateway domain URL in the API Documentation field and paste it in a text file for use when configuring an Aruba Central integration instance in Cortex XSOAR. For example: https://eu-apigw.central.arubanetworks.com
- Click Apps & Tokens+ Add Apps & TokensGenerate.
- Copy the generated client ID and client secret and add it to the text file.
- Click the user icon in the upper right or the UI, copy the customer ID, and paste it in the text file as well.