<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SR2148P  802.1x ethernet auth with NPS in Aerohive Migrated Content</title>
    <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/sr2148p-802-1x-ethernet-auth-with-nps/m-p/87218#M11471</link>
    <description>&lt;P&gt;Thank you for your patience, I was able to confirm that this setting is not going to be something we can edit unless we set it to Ban instead of Disconnected. I would normally recommend filing a feature request with your sales engineer to see if we can get that changed in a later release, but HiveManager Classic is a legacy product and will not be receiving any more major updates or feature enhancements. I'm sorry I don't have better news here. &lt;/P&gt;</description>
    <pubDate>Thu, 26 Sep 2019 20:24:04 GMT</pubDate>
    <dc:creator>samantha_lynn</dc:creator>
    <dc:date>2019-09-26T20:24:04Z</dc:date>
    <item>
      <title>SR2148P  802.1x ethernet auth with NPS</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/sr2148p-802-1x-ethernet-auth-with-nps/m-p/87212#M11465</link>
      <description>&lt;P&gt;Hi all&lt;/P&gt;&lt;P&gt;We have implemented 802.1X authentication to windows NPS for our WLAN for a long time. I would like to do the same for wired clients on our SR2148P switches, but I have trouble to find the correct Radius attributes to hand over to the switch. At the moment, I am  working with these:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Tunnel-Medium-Type: 802 (includes all 802 media plus Ethernet canonical format)&lt;/LI&gt;&lt;LI&gt;Tunnel-Pvt-Group-ID: 10&lt;/LI&gt;&lt;LI&gt;Tunnel-Type: Virtual LANs (VLAN)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But other than in the WLAN setup, the Tunnel-Pvt-Group-ID I have to give the VLAN instead of the UP.&lt;/P&gt;&lt;P&gt;Can someone tell me the correct attributes I have to use for wired ethernet 802.1X  auth on Windows NPS?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards, Stefan&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2019 18:40:09 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/sr2148p-802-1x-ethernet-auth-with-nps/m-p/87212#M11465</guid>
      <dc:creator>stefan_meichtry</dc:creator>
      <dc:date>2019-09-16T18:40:09Z</dc:date>
    </item>
    <item>
      <title>Re: SR2148P  802.1x ethernet auth with NPS</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/sr2148p-802-1x-ethernet-auth-with-nps/m-p/87213#M11466</link>
      <description>&lt;P&gt;You can use the tunnel pvt group ID, you'd want to use the option to "Assign user profile based on RADIUS attribute value pairs returned in Access-Accept response message" and then enter the attributes you want to allow. &lt;span class="lia-inline-image-display-wrapper" image-alt="364ff4a873004bff98e0d2a661c10e75_0690c000008shkuAAA.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/3473i8D9B7CD17F3403E7/image-size/large?v=v2&amp;amp;px=999" role="button" title="364ff4a873004bff98e0d2a661c10e75_0690c000008shkuAAA.png" alt="364ff4a873004bff98e0d2a661c10e75_0690c000008shkuAAA.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2019 01:01:38 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/sr2148p-802-1x-ethernet-auth-with-nps/m-p/87213#M11466</guid>
      <dc:creator>samantha_lynn</dc:creator>
      <dc:date>2019-09-19T01:01:38Z</dc:date>
    </item>
    <item>
      <title>Re: SR2148P  802.1x ethernet auth with NPS</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/sr2148p-802-1x-ethernet-auth-with-nps/m-p/87214#M11467</link>
      <description>&lt;P&gt;Thank you for answering.&lt;/P&gt;&lt;P&gt;I was not able to find the screenshot you send in your answer in our HM classic. But anyway, what I see in this picture are exactly the attributes I am useing in WLAN 802.1X and this is working fine.&lt;/P&gt;&lt;P&gt;But when configure Windows NPS with a new network policy this time with NAS Port Type = Ethernet, I do not have the same Radius attributes available in NPS to return like with NAS Port Type = Wireless - IEEE 802.11.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here the picture of NPS for WLAN that is working: &lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="c57d48b5cba04d5dbbd17a878b61a5f0_0690c000008siHZAAY.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/5427i0660E69E0ABB4A2E/image-size/large?v=v2&amp;amp;px=999" role="button" title="c57d48b5cba04d5dbbd17a878b61a5f0_0690c000008siHZAAY.png" alt="c57d48b5cba04d5dbbd17a878b61a5f0_0690c000008siHZAAY.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And this is the one for Ethernet with the attributes of NPS that I think best much as I have not the same available for NAS Port Type Ethernet:&lt;/P&gt;&lt;P&gt;&lt;IMG src="sfdc://0690c000008siI3AAI" alt="18-09-_2019_22-13-30" /&gt;&lt;/P&gt;&lt;P&gt;But with this settings, I end up with VLAN assignment instead of user profile assignment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As said, we are working with HM classic and trying to do both (for WLAN and Ethernet) on the same radius NPS Windows Server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2019 03:22:06 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/sr2148p-802-1x-ethernet-auth-with-nps/m-p/87214#M11467</guid>
      <dc:creator>stefan_meichtry</dc:creator>
      <dc:date>2019-09-19T03:22:06Z</dc:date>
    </item>
    <item>
      <title>Re: SR2148P  802.1x ethernet auth with NPS</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/sr2148p-802-1x-ethernet-auth-with-nps/m-p/87215#M11468</link>
      <description>&lt;P&gt;My apologies, those directions were for HiveManager, I didn't realize you were using HiveManager Classic. In that case, you'll want to go to Configuration&amp;gt; Open the Network Policy&amp;gt; Click on Add/Remove below the user profile in use on your Radius SSID&amp;gt; Check the box next to "Assign user profiles based on values returned in the Following RADIUS Attribute&amp;gt; Select the Tunnel-Pvt-Group-ID attribute from the drop down list. Then create a user profile with the same attribute as the Tunnel PVT Group ID. &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="48c2694cd19f4b9c994ee72f343ff3d3_0690c000008sjZKAAY.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/5124iFB2056B323658507/image-size/large?v=v2&amp;amp;px=999" role="button" title="48c2694cd19f4b9c994ee72f343ff3d3_0690c000008sjZKAAY.png" alt="48c2694cd19f4b9c994ee72f343ff3d3_0690c000008sjZKAAY.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Sep 2019 19:39:17 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/sr2148p-802-1x-ethernet-auth-with-nps/m-p/87215#M11468</guid>
      <dc:creator>samantha_lynn</dc:creator>
      <dc:date>2019-09-19T19:39:17Z</dc:date>
    </item>
    <item>
      <title>Re: SR2148P  802.1x ethernet auth with NPS</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/sr2148p-802-1x-ethernet-auth-with-nps/m-p/87216#M11469</link>
      <description>&lt;P&gt;My apologies. I haven't said I am using HM classic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the hint. I was able now to get things working even with the same radius attributes I am using for WLAN like described in many Aerohive docs:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tunnel-Medium-Type:&amp;nbsp;IP (IP version 4)&lt;/P&gt;&lt;P&gt;Tunnel-Pvt-Group-ID: 2351&lt;/P&gt;&lt;P&gt;Tunnel-Type: Generic Route Encapsulation (GRE)&lt;/P&gt;&lt;P&gt;My problem was more related to Windows NPS config. Sorry for that, but with you help I was able to get deeper into to issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I still have another problem with my setup. Let me try to explain, what I am trying to setup.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to have switch ethernet ports configured so if a staff member connects his company notebook with a client certificate installed, will get to the intranet VLAN. This is working very well with the setup right now.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But then I would like to have all other clients (guest notebooks) to end up in our guest VLAN. This is also working, but with a timeout of 60 seconds.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is what the setup looks like:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="bfdc87ba05404ea1a529f7a7f5a4ab05_0690c000008smthAAA.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/5626i1BF22AE9D6785B52/image-size/large?v=v2&amp;amp;px=999" role="button" title="bfdc87ba05404ea1a529f7a7f5a4ab05_0690c000008smthAAA.png" alt="bfdc87ba05404ea1a529f7a7f5a4ab05_0690c000008smthAAA.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I think this is related to the time I see here, but this is not editable here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG src="sfdc://0690c000008smu6AAA" alt="20-09-_2019_16-51-56" /&gt;&lt;/P&gt;&lt;P&gt;I would like to reduce this time to something like 5 or 10 sec.&lt;/P&gt;&lt;P&gt;So in the case of wrong authentication or no authentication at all, the users get quickly to the quest VLAN.&lt;/P&gt;&lt;P&gt;60 sec is mutch to high for this use case.&lt;/P&gt;&lt;P&gt;Can you tell me, where I have to edit this value or if this is not the correct value, where I find it. Or is this not changeable at all?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Sep 2019 22:10:25 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/sr2148p-802-1x-ethernet-auth-with-nps/m-p/87216#M11469</guid>
      <dc:creator>stefan_meichtry</dc:creator>
      <dc:date>2019-09-20T22:10:25Z</dc:date>
    </item>
    <item>
      <title>Re: SR2148P  802.1x ethernet auth with NPS</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/sr2148p-802-1x-ethernet-auth-with-nps/m-p/87217#M11470</link>
      <description>&lt;P&gt;It doesn't look like we can edit that field when using Disconnected as the Deny Action. The only way I can edit that field is by setting the Deny Action to "Ban", and then when I change it back to Disconnected, it goes back to the default 60 and won't let me edit. I'm going to ask our engineers if this is by design, I'll let you know as soon as I hear back. &lt;/P&gt;</description>
      <pubDate>Sat, 21 Sep 2019 01:05:40 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/sr2148p-802-1x-ethernet-auth-with-nps/m-p/87217#M11470</guid>
      <dc:creator>samantha_lynn</dc:creator>
      <dc:date>2019-09-21T01:05:40Z</dc:date>
    </item>
    <item>
      <title>Re: SR2148P  802.1x ethernet auth with NPS</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/sr2148p-802-1x-ethernet-auth-with-nps/m-p/87218#M11471</link>
      <description>&lt;P&gt;Thank you for your patience, I was able to confirm that this setting is not going to be something we can edit unless we set it to Ban instead of Disconnected. I would normally recommend filing a feature request with your sales engineer to see if we can get that changed in a later release, but HiveManager Classic is a legacy product and will not be receiving any more major updates or feature enhancements. I'm sorry I don't have better news here. &lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2019 20:24:04 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/sr2148p-802-1x-ethernet-auth-with-nps/m-p/87218#M11471</guid>
      <dc:creator>samantha_lynn</dc:creator>
      <dc:date>2019-09-26T20:24:04Z</dc:date>
    </item>
    <item>
      <title>Re: SR2148P  802.1x ethernet auth with NPS</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/sr2148p-802-1x-ethernet-auth-with-nps/m-p/87219#M11472</link>
      <description>&lt;P&gt;Thank you very much for helping me.&lt;/P&gt;&lt;P&gt;Perhaps I am trying to build it to complicate and this can be achieved much easier. Do you see another way of having this use case done? I still think that this is a use case, many companies today have: assigning VLANs depending on user type (staff or guest). In WLAN this is quite easy to build, as&lt;/P&gt;&lt;P&gt;there is always an client authentification. In ethernet I just have the problem, that the guest notebooks are mostly not sending any authentication at all and so I cannot authenticate and assign VLAN with Radius attributes. The process should be the other way around. When connecting the  thernet port, all notebooks first end up in the guest VLAN independent of sending any authentication. If the client sends an authentication, I can than switch the VLAN (or even the UP) depending of the usertype controlled by Radius. Like this, I do not have to deliver two ethernet ports for each public room in the building. Hopefully you understand my use case.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Sep 2019 13:55:20 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/sr2148p-802-1x-ethernet-auth-with-nps/m-p/87219#M11472</guid>
      <dc:creator>stefan_meichtry</dc:creator>
      <dc:date>2019-09-27T13:55:20Z</dc:date>
    </item>
    <item>
      <title>Re: SR2148P  802.1x ethernet auth with NPS</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/sr2148p-802-1x-ethernet-auth-with-nps/m-p/87220#M11473</link>
      <description>&lt;P&gt;If a client isn't sending out authentication requests, we won't be able to work with the client at all. The APs have to have communication from a client device before they can engage in the connect process. &lt;/P&gt;</description>
      <pubDate>Thu, 10 Oct 2019 01:52:01 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/sr2148p-802-1x-ethernet-auth-with-nps/m-p/87220#M11473</guid>
      <dc:creator>samantha_lynn</dc:creator>
      <dc:date>2019-10-10T01:52:01Z</dc:date>
    </item>
    <item>
      <title>Re: SR2148P  802.1x ethernet auth with NPS</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/sr2148p-802-1x-ethernet-auth-with-nps/m-p/87221#M11474</link>
      <description>&lt;P&gt;I am still talking about switch ethernet ports and not about APs. But it will not be possible with Aerohive as I see. &lt;/P&gt;&lt;P&gt;I still think, I am not the only user with this use case. So I will have a look if there is a solution for this by other products. Thank you very much for your help.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Oct 2019 02:01:07 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/sr2148p-802-1x-ethernet-auth-with-nps/m-p/87221#M11474</guid>
      <dc:creator>stefan_meichtry</dc:creator>
      <dc:date>2019-10-10T02:01:07Z</dc:date>
    </item>
  </channel>
</rss>

