<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: XCC Dynamic VLAN Assignment in ExtremeCloud IQ Controller</title>
    <link>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69890#M105</link>
    <description>&lt;P&gt;Hi PeterK,&lt;/P&gt;&lt;P&gt;This design works perfectly on Wired and on the IdentiFi solutions…&amp;nbsp;There's no problem with the VLAN/Topology/Role change…&amp;nbsp;The problem is, when NAC tells XCC to reauth user (and XCC "obeys") and the client tries to reauth receiving the new RADIUS ATTRIBUTES, the client simply can't connect.&lt;/P&gt;&lt;P&gt;If I don't send the VLAN Attributes (just the very same ROLE), and this role is set statically to the desired VLAN, it works flawlessly.&lt;/P&gt;&lt;P&gt;It seems that the XCC is not working fine with this attibutes on &lt;A href="mailto:B@AP" target="_self" rel="noreferrer nofollow ugc"&gt;B@AP&lt;/A&gt;&amp;nbsp;topologies.&lt;/P&gt;&lt;P&gt;By the way, as I stated in previous posts, it WORKS PERFECTLY FINE when, with the very same config BUT the topology is set to &lt;A href="mailto:Bridge@AC" target="_self" rel="noreferrer nofollow ugc"&gt;Bridge@AC&lt;/A&gt;,&amp;nbsp;sending&amp;nbsp;the very same VLAN ATTRIBUTES, it just crashes when the topology is set to &lt;A href="mailto:Bridge@AP" target="_self" rel="noreferrer nofollow ugc"&gt;Bridge@AP&lt;/A&gt;&amp;nbsp;and we pass the VLAN attributes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Leo&lt;/P&gt;</description>
    <pubDate>Fri, 17 Sep 2021 20:15:43 GMT</pubDate>
    <dc:creator>LeoP1</dc:creator>
    <dc:date>2021-09-17T20:15:43Z</dc:date>
    <item>
      <title>XCC Dynamic VLAN Assignment</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69875#M90</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;I'm working on a customer deployment and got some issues using ExtremeControl and XCC (5.36.03).&lt;/P&gt;&lt;P&gt;If I send RFC3580 Vlan Attributes to XCC from the Control, the 802.1x session from the client can't authenticate, even with the VLAN created under Policy &amp;gt; Vlans and the same vlan associated to the Device Group's Profile.&lt;/P&gt;&lt;P&gt;Taking the "Guest Access" role as example, it is configured on the XCC to use the "Default Network VLAN" (as it is in sync with the policy domain, applied to the wired infrastructure too). I've created the VLAN 40 and marked as &lt;A href="mailto:Bridge@AP" target="_self" rel="noreferrer nofollow ugc"&gt;Bridge@AP&lt;/A&gt;&amp;nbsp;Tagged and associated it with the Device Group's Profile (&lt;A href="https://extremeportal.force.com/ExtrArticleDetail?an=000094691" target="_blank" rel="noreferrer noopener nofollow ugc"&gt;https://extremeportal.force.com/ExtrArticleDetail?an=000094691&lt;/A&gt;),&lt;/P&gt;&lt;P&gt;If I send only the FilterID 'policy=Guest Access' the client, the client get's authenticated, but still on the default WLAN VLAN (120). If I send the VTA attributes as follows, the same client can't authenticate:&lt;/P&gt;&lt;P&gt;Filter-Id=Enterasys:version=1:%MANAGEMENT%policy=%POLICY_NAME%&lt;BR /&gt;Login-LAT-Port=%LOGIN_LAT_PORT%&lt;BR /&gt;Service-Type=%MGMT_SERV_TYPE%&lt;BR /&gt;Tunnel-Private-Group-Id=%VLAN_ID%:%VLAN_TUNNEL_TAG%&lt;BR /&gt;Tunnel-Type=13:%VLAN_TUNNEL_TAG%&lt;BR /&gt;Tunnel-Medium-Type=6:%VLAN_TUNNEL_TAG%&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The policy mapping is done on the Control for the dynamic vlan I want to apply.&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Sep 2021 18:56:56 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69875#M90</guid>
      <dc:creator>LeoP1</dc:creator>
      <dc:date>2021-09-13T18:56:56Z</dc:date>
    </item>
    <item>
      <title>Re: XCC Dynamic VLAN Assignment</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69876#M91</link>
      <description>&lt;P&gt;Hi Leo,&lt;/P&gt;&lt;P&gt;For the re-authentication, I send the following: “RFC 3576 - Extreme IdentiFi Wireless”:&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="acf2e1e3d20147099766801b6608dd57_69a8e353-8b38-44c9-9439-c2dd58a5dc43.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/2628iB20D46F786E80E9F/image-size/large?v=v2&amp;amp;px=999" role="button" title="acf2e1e3d20147099766801b6608dd57_69a8e353-8b38-44c9-9439-c2dd58a5dc43.png" alt="acf2e1e3d20147099766801b6608dd57_69a8e353-8b38-44c9-9439-c2dd58a5dc43.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;Mig&lt;/P&gt;</description>
      <pubDate>Mon, 13 Sep 2021 19:59:31 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69876#M91</guid>
      <dc:creator>Miguel-Angel_RO</dc:creator>
      <dc:date>2021-09-13T19:59:31Z</dc:date>
    </item>
    <item>
      <title>Re: XCC Dynamic VLAN Assignment</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69877#M92</link>
      <description>&lt;P&gt;Hi Mig,&lt;/P&gt;&lt;P&gt;I've tried this config, but no luck…&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I see the device authenticated on Control, and the RADIUS attributes are sent, but it seems that XCC is not working as expected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Leo&lt;/P&gt;</description>
      <pubDate>Mon, 13 Sep 2021 20:18:35 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69877#M92</guid>
      <dc:creator>LeoP1</dc:creator>
      <dc:date>2021-09-13T20:18:35Z</dc:date>
    </item>
    <item>
      <title>Re: XCC Dynamic VLAN Assignment</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69878#M93</link>
      <description>&lt;P&gt;Leo,&lt;/P&gt;&lt;P&gt;The integration of XCC with Control requires a lot of steps.&lt;/P&gt;&lt;P&gt;Did you double checked the deployment guide?&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="d7ca3e79f37145389f074199eb2779bf_681a66c0-90bf-4160-aa8e-ad53de293a01.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/4940i35834602436EFE5E/image-size/large?v=v2&amp;amp;px=999" role="button" title="d7ca3e79f37145389f074199eb2779bf_681a66c0-90bf-4160-aa8e-ad53de293a01.png" alt="d7ca3e79f37145389f074199eb2779bf_681a66c0-90bf-4160-aa8e-ad53de293a01.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;Mig&lt;/P&gt;</description>
      <pubDate>Mon, 13 Sep 2021 20:38:21 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69878#M93</guid>
      <dc:creator>Miguel-Angel_RO</dc:creator>
      <dc:date>2021-09-13T20:38:21Z</dc:date>
    </item>
    <item>
      <title>Re: XCC Dynamic VLAN Assignment</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69879#M94</link>
      <description>&lt;P&gt;Leo,&lt;/P&gt;&lt;P&gt;How is your AAA configured on the XCC? You can either integrate with radius server/NAC directly without engaging the onboard XCC NAC OR go through the NAC&amp;nbsp;radius client in XCC. If you have configured the AAA under &lt;STRONG&gt;Onboard &amp;gt; AAA &lt;/STRONG&gt;it would engage the onboard NAC and there is additional configuration required to make either RFC3580 or RFC3576 work without which the CoA won’t work.&amp;nbsp;Though, this method is no more recommended for NAC integration.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The XCC now supports direct integration with Radius/NAC when the AAA policy is created under &lt;STRONG&gt;Configuration &amp;gt; AAA Policy&lt;/STRONG&gt;.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also make sure the time on the NAC and XCC is in sync, I have seen it way too many times and it causes all sorts of authentication issues.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ovais&lt;/P&gt;</description>
      <pubDate>Mon, 13 Sep 2021 21:55:39 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69879#M94</guid>
      <dc:creator>Ovais_Qayyum</dc:creator>
      <dc:date>2021-09-13T21:55:39Z</dc:date>
    </item>
    <item>
      <title>Re: XCC Dynamic VLAN Assignment</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69880#M95</link>
      <description>&lt;P&gt;Hi Ovais,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm using direct integration with NAC using Configuration &amp;gt; AAA Policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Time is in sync, and it works flawlessly (using the default WLAN VLAN) if I send only the FilterID.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now if I use the RFC3580 RADIUS Attributes to assign a different VLAN (note that this other VLAN is already created and associated to the Device Group on XCC), the client (802.1x) simply can't connect (even showing successfully authenticated and authorized on NAC).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've already double-checked the Deployment Guide, bot I couldn't find anything wrong.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Leo&lt;/P&gt;</description>
      <pubDate>Mon, 13 Sep 2021 23:21:49 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69880#M95</guid>
      <dc:creator>LeoP1</dc:creator>
      <dc:date>2021-09-13T23:21:49Z</dc:date>
    </item>
    <item>
      <title>Re: XCC Dynamic VLAN Assignment</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69881#M96</link>
      <description>&lt;P&gt;So, looks like there is something wrong with the policy assignment:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#e74c3c;"&gt;If I send only the FilterID 'policy=Guest Access' the client, the client get's authenticated, but still on the default WLAN VLAN (120). If I send the VTA attributes as follows, the same client can't authenticate:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#e74c3c;"&gt;Filter-Id=Enterasys:version=1:%MANAGEMENT%policy=%POLICY_NAME%&lt;BR /&gt;Login-LAT-Port=%LOGIN_LAT_PORT%&lt;BR /&gt;Service-Type=%MGMT_SERV_TYPE%&lt;BR /&gt;Tunnel-Private-Group-Id=%VLAN_ID%:%VLAN_TUNNEL_TAG%&lt;BR /&gt;Tunnel-Type=13:%VLAN_TUNNEL_TAG%&lt;BR /&gt;Tunnel-Medium-Type=6:%VLAN_TUNNEL_TAG%&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When the guest authenticates, do you see it getting&amp;nbsp;“Guest Access” role in XCC “Clients” tab? the only reason it should fall back to&amp;nbsp;the default WLAN VLAN is when one of the following is true:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;The XCC didn’t receive the correct filter-id for the role, therefore it puts the client on default WLAN VLAN.&lt;/LI&gt;	&lt;LI&gt;It received the filter-id but the AP profile does not have this roles assigned/mapped on it.&amp;nbsp;&lt;/LI&gt;	&lt;LI&gt;You are using the attributes to pass VLAN ID, may be you don’t have VLAN configured in policy mapping settings.&amp;nbsp;&lt;/LI&gt;&lt;/OL&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="caa17467a41340099d5aceb6c06d9c7f_e0a39cba-02a9-4690-bca2-197316d8d4e5.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/4383iE1A00119FBE1EE6B/image-size/large?v=v2&amp;amp;px=999" role="button" title="caa17467a41340099d5aceb6c06d9c7f_e0a39cba-02a9-4690-bca2-197316d8d4e5.png" alt="caa17467a41340099d5aceb6c06d9c7f_e0a39cba-02a9-4690-bca2-197316d8d4e5.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;I was wondering why do you need to use RFC3580 and pass the VLAN ID as an attribute, not saying it doesn’t work that way, it does, I have done it many time with RFC3576 and passing VLAN as an attribute like following when the requirement is to assign same user Role but different VLANs based on location for instance.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#e74c3c;"&gt;Filter-Id=Enterasys:%POLICY_NAME%&lt;BR /&gt;Login-LAT-Port=%LOGIN_LAT_PORT%&lt;BR /&gt;Tunnel-Private-Group-Id=%VLAN_ID%:%VLAN_TUNNEL_TAG%&lt;BR /&gt;Tunnel-Type=13:%VLAN_TUNNEL_TAG%&lt;BR /&gt;Tunnel-Medium-Type=6:%VLAN_TUNNEL_TAG%&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;In case, you just need to use diff. Roles each with&amp;nbsp;diff. VLAN, passing the Role as a filter-id to XCC should do the trick since XCC already&amp;nbsp;has&amp;nbsp;the VLAN defined within the Role. If that’s not happening, I will delete the VLAN configuration on the XCC and re-create it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ovais&lt;/P&gt;</description>
      <pubDate>Tue, 14 Sep 2021 02:02:08 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69881#M96</guid>
      <dc:creator>Ovais_Qayyum</dc:creator>
      <dc:date>2021-09-14T02:02:08Z</dc:date>
    </item>
    <item>
      <title>Re: XCC Dynamic VLAN Assignment</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69882#M97</link>
      <description>&lt;P&gt;Hi Ovais,&lt;/P&gt;&lt;OL type="a"&gt;&lt;LI&gt;The XCC didn’t receive the correct filter-id for the role, therefore it puts the client on default WLAN VLAN.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;The XCC should be receiving the correct attributes (as I state on item B below), and I ran an TCPDUMP on NAC, and the RADIUS packets seems to be OK.&lt;/P&gt;&lt;OL start="2" type="a"&gt;&lt;LI&gt;It received the filter-id but the AP profile does not have this roles assigned/mapped on it.&amp;nbsp;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;The AP receives the same Filter-ID, but when I choose to send the other Radius Attributes, the client is unable to authenticate. Simply changing the NAC's response attributes back, without VLAN related attributes, it works, so the Roles ate already at XCC.&lt;/P&gt;&lt;OL start="100" type="i"&gt;&lt;LI&gt;You are using the attributes to pass VLAN ID, may be you don’t have VLAN configured in policy mapping settings.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;I've configured them at the Policy Mapping (and tested on the wired side, with EXOS, and it works es expected).&lt;/P&gt;&lt;OL start="500" type="i"&gt;&lt;LI&gt;I was wondering why do you need to use RFC3580 and pass the VLAN ID as an attribute, not saying it doesn’t work that way, it does, I have done it many time with RFC3576 and passing VLAN as an attribute like following when the requirement is to assign same user Role but different VLANs based on location for instance.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Maybe I wasn't clear, sorry, but I've just configured something like the screenshot provided, and already used it on EXOS and IdentiFi several times, but never with XCC. The goal is really to use the same Role, but assign different VLANs based on the NAC rules, keeping the policy domain consistent across wired/wireless. Passing just the policy in the Filter-ID is not enough, because we don't want to have "Contain to VLAN" Roles, because we use different VLANS, depending on the environment (wired/wireless), departments, AD user groups, etc…&amp;nbsp;But the VLAN attributes seems to be not working…&amp;nbsp;I've ran a test on an old IdentiFi controller, and it works…&lt;/P&gt;&lt;OL start="5" type="a"&gt;&lt;LI&gt;In case, you just need to use diff. Roles each with&amp;nbsp;diff. VLAN, passing the Role as a filter-id to XCC should do the trick since XCC already&amp;nbsp;has&amp;nbsp;the VLAN defined within the Role. If that’s not happening, I will delete the VLAN configuration on the XCC and re-create it.&amp;nbsp;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Unfortunately it's not the case (and I've tested this scenario and selecting the VLAN on the Role make it work perfectly, as soon as I don't pass any VLAN attributes. If I set the VLAN on the Role and send the VLAN attributes, it doesn't work as well). The customer, as stated before, want to use the same Roles, but applying different VLANs depending on the NAC Rules they defined…&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems an issue with XCC…&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Leo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Sep 2021 03:24:43 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69882#M97</guid>
      <dc:creator>LeoP1</dc:creator>
      <dc:date>2021-09-14T03:24:43Z</dc:date>
    </item>
    <item>
      <title>Re: XCC Dynamic VLAN Assignment</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69883#M98</link>
      <description>&lt;P&gt;I see, its a bit more clear now. If you have not tried the following already, give it a go. I think this configuration can help you.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#1a1a1a;"&gt;I have recently implemented the exact same scenario with XCC version 5.26 for few different deployments. I assign same role to users but flip VLAN based on the user’s location, location could be a building or a floor etc. Assuming you are something similar. To achieve this, I used RFC3576 with the attributes I mentioned in my previous post. This use case is addressed a bit differently in XCC, unlike identifi HYBRID mode where we could use RFC3580 and pass role and VLAN as two separate attributes, XCC needs a bit more config. I am not sure what your deployments looks like and how granular the VLAN assignment&amp;nbsp;is. This config example is based on one VLAN per building, therefore “location” is used as a key differentiator. Likewise, you can have one VLAN per floor/device group/AP etc.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#1a1a1a;"&gt;You can use “Location” tab in Site configuration to configure location/zone information, you will use this as a match condition for VLAN assignment, you can either use the name of the SITE itself or one of the following location parameters:&lt;/SPAN&gt;&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="d34692fbfd2d44c88371580b5a38a1e7_738c3e95-5f69-452c-b49f-8226c41e27a9.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/3303i9F2815B91D81519B/image-size/large?v=v2&amp;amp;px=999" role="button" title="d34692fbfd2d44c88371580b5a38a1e7_738c3e95-5f69-452c-b49f-8226c41e27a9.png" alt="d34692fbfd2d44c88371580b5a38a1e7_738c3e95-5f69-452c-b49f-8226c41e27a9.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;Then, make change to AAA policy in XCC and configure either site name/city/region/ as Called station ID to the NAC (based on how granular the VLAN assignment is).&amp;nbsp;&amp;nbsp;XCC will replace original Called station ID with the one you specify here while sending the authentication request to the NAC.&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="d34692fbfd2d44c88371580b5a38a1e7_db29ed3f-d096-410e-a39d-9aa18ccc22f5.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/6065iD619300A5096B925/image-size/large?v=v2&amp;amp;px=999" role="button" title="d34692fbfd2d44c88371580b5a38a1e7_db29ed3f-d096-410e-a39d-9aa18ccc22f5.png" alt="d34692fbfd2d44c88371580b5a38a1e7_db29ed3f-d096-410e-a39d-9aa18ccc22f5.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;On the NAC, create “location groups” and specify the “Site Name” or whatever parameter you used as Called Station ID. NAC will match this with the incoming Called Station ID.&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="d34692fbfd2d44c88371580b5a38a1e7_47a7649a-0930-4686-bebe-ceb9738e8ad9.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/2837iF6BD29F478CAAAE8/image-size/large?v=v2&amp;amp;px=999" role="button" title="d34692fbfd2d44c88371580b5a38a1e7_47a7649a-0930-4686-bebe-ceb9738e8ad9.png" alt="d34692fbfd2d44c88371580b5a38a1e7_47a7649a-0930-4686-bebe-ceb9738e8ad9.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;As for the Policy Mapping, you can create Policy Mappings with the same Role name and specify different “Map to location” value for each of them. This will allow NAC to determine which VLAN to return based on location while still using the same Policy Role. &amp;nbsp;&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="d34692fbfd2d44c88371580b5a38a1e7_21bff256-8d8a-42ba-b2a3-36c3f569c461.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/2603iB4DD45EFC3BE65A9/image-size/large?v=v2&amp;amp;px=999" role="button" title="d34692fbfd2d44c88371580b5a38a1e7_21bff256-8d8a-42ba-b2a3-36c3f569c461.png" alt="d34692fbfd2d44c88371580b5a38a1e7_21bff256-8d8a-42ba-b2a3-36c3f569c461.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ovais&lt;/P&gt;</description>
      <pubDate>Tue, 14 Sep 2021 07:24:50 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69883#M98</guid>
      <dc:creator>Ovais_Qayyum</dc:creator>
      <dc:date>2021-09-14T07:24:50Z</dc:date>
    </item>
    <item>
      <title>Re: XCC Dynamic VLAN Assignment</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69884#M99</link>
      <description>&lt;P&gt;Hi Ovais,&lt;/P&gt;&lt;P&gt;I'll try this approach and let you know if it works!&lt;/P&gt;&lt;P&gt;Thank you so much for the detailed explanation. I appreciate that!&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Leo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Sep 2021 18:19:37 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69884#M99</guid>
      <dc:creator>LeoP1</dc:creator>
      <dc:date>2021-09-14T18:19:37Z</dc:date>
    </item>
    <item>
      <title>Re: XCC Dynamic VLAN Assignment</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69885#M100</link>
      <description>&lt;P&gt;Hi Ovais,&lt;/P&gt;&lt;P&gt;I've just tested your suggestion, but it's not working for me, and now I think I figured out the pinpointed scenario.&lt;/P&gt;&lt;P&gt;The tip about the policy mapping based on location worked perfectly (I never had tested it before, awesome), BUT, when I choose the RADIUS Attributes to send, the client just can't connect, even the NAC sending the attributes…&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've discovered that the config you suggested worked perfectly when I send a &lt;A href="mailto:Bridge@AC" target="_self" rel="noreferrer nofollow ugc"&gt;Bridge@AC&lt;/A&gt;&amp;nbsp;VLAN configured on the XCC, BUT, when I send a &lt;A href="mailto:BRIDGE@AP" target="_self" rel="noreferrer nofollow ugc"&gt;BRIDGE@AP&lt;/A&gt;&amp;nbsp;VLAN, it doesn't work, even if the VLAN is created on XCC and added to the Device Group's Profile (unchecking the "Additional" don't work as well…&amp;nbsp;I don't know why the SECUREIT Vlan shows as REFERENCED, because it is not configured on any WLAN, ROLE, etc).&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="b49aec567dc9475d8d64c4e12f95f3eb_7cbc483f-12fa-4758-a978-018f9f272fbd.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/1383iFA328F5836BD69F1/image-size/large?v=v2&amp;amp;px=999" role="button" title="b49aec567dc9475d8d64c4e12f95f3eb_7cbc483f-12fa-4758-a978-018f9f272fbd.png" alt="b49aec567dc9475d8d64c4e12f95f3eb_7cbc483f-12fa-4758-a978-018f9f272fbd.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="b49aec567dc9475d8d64c4e12f95f3eb_f4817b82-f934-4d8c-a8d0-4cd98f7a0f75.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/2598i3330169A181344AF/image-size/large?v=v2&amp;amp;px=999" role="button" title="b49aec567dc9475d8d64c4e12f95f3eb_f4817b82-f934-4d8c-a8d0-4cd98f7a0f75.png" alt="b49aec567dc9475d8d64c4e12f95f3eb_f4817b82-f934-4d8c-a8d0-4cd98f7a0f75.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Leo&lt;/P&gt;</description>
      <pubDate>Tue, 14 Sep 2021 19:18:15 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69885#M100</guid>
      <dc:creator>LeoP1</dc:creator>
      <dc:date>2021-09-14T19:18:15Z</dc:date>
    </item>
    <item>
      <title>Re: XCC Dynamic VLAN Assignment</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69886#M101</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;Running more tests, I could find that the VLAN Attributes only work for B@AC Topologies, but not for B@AP.&lt;/P&gt;&lt;P&gt;Maybe I'm still missing something, or there's any "magic trick".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Leo&lt;/P&gt;</description>
      <pubDate>Wed, 15 Sep 2021 03:01:08 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69886#M101</guid>
      <dc:creator>LeoP1</dc:creator>
      <dc:date>2021-09-15T03:01:08Z</dc:date>
    </item>
    <item>
      <title>Re: XCC Dynamic VLAN Assignment</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69887#M102</link>
      <description>&lt;P&gt;Hi Leo.&lt;/P&gt;&lt;P&gt;probably a stupid question. When you say “can not authenticate” do you refer to the Client state in XCC or to the windows response?&lt;/P&gt;&lt;P&gt;Is the VLAN configured on the switch where the AP is connected? I mean is the L2 path correct?&lt;/P&gt;&lt;P&gt;Another idea: do you have the &lt;A href="mailto:B@AP" target="_self" rel="noreferrer"&gt;B@AP&lt;/A&gt;&amp;nbsp;topology created&amp;nbsp;in XCC?&lt;/P&gt;&lt;P&gt;Another idea: Have you asked GTAC?&lt;/P&gt;</description>
      <pubDate>Fri, 17 Sep 2021 13:39:55 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69887#M102</guid>
      <dc:creator>Zdeněk_Pala</dc:creator>
      <dc:date>2021-09-17T13:39:55Z</dc:date>
    </item>
    <item>
      <title>Re: XCC Dynamic VLAN Assignment</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69888#M103</link>
      <description>&lt;P&gt;Hi Z,&lt;/P&gt;&lt;P&gt;When I say "can not authenticate" I mean that the initial role applied is UNREGISTERED, and the client can connect to VLAN 1121, get an IP address, is redirected to the NAC's Captive Portal for registration without problems, BUT, after registration, NAC sends the RADIUS ATTRIBUTES including the VLAN atributes for the new Role and VLAN 101 (B@AP Tagged) and the client simply can't connect.&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="84942e4c5d014e6ea5b484b42f758fbf_45335ce5-ee71-4053-9dcd-dd6c2f5c8a4d.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/1110i339DD193E299B842/image-size/large?v=v2&amp;amp;px=999" role="button" title="84942e4c5d014e6ea5b484b42f758fbf_45335ce5-ee71-4053-9dcd-dd6c2f5c8a4d.png" alt="84942e4c5d014e6ea5b484b42f758fbf_45335ce5-ee71-4053-9dcd-dd6c2f5c8a4d.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="84942e4c5d014e6ea5b484b42f758fbf_ed509764-fc32-4185-837b-8f93456209f6.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/2839iD53E908E2AC5C1EC/image-size/large?v=v2&amp;amp;px=999" role="button" title="84942e4c5d014e6ea5b484b42f758fbf_ed509764-fc32-4185-837b-8f93456209f6.png" alt="84942e4c5d014e6ea5b484b42f758fbf_ed509764-fc32-4185-837b-8f93456209f6.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="84942e4c5d014e6ea5b484b42f758fbf_578dbb81-427f-4648-a940-d476baf45c44.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/176i6C9331ED1F05D316/image-size/large?v=v2&amp;amp;px=999" role="button" title="84942e4c5d014e6ea5b484b42f758fbf_578dbb81-427f-4648-a940-d476baf45c44.png" alt="84942e4c5d014e6ea5b484b42f758fbf_578dbb81-427f-4648-a940-d476baf45c44.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="84942e4c5d014e6ea5b484b42f758fbf_a9ae202a-4d94-4338-9df9-6b34f0ec977e.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/4927iAF4E9EBC8BFC095C/image-size/large?v=v2&amp;amp;px=999" role="button" title="84942e4c5d014e6ea5b484b42f758fbf_a9ae202a-4d94-4338-9df9-6b34f0ec977e.png" alt="84942e4c5d014e6ea5b484b42f758fbf_a9ae202a-4d94-4338-9df9-6b34f0ec977e.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="84942e4c5d014e6ea5b484b42f758fbf_c26815f4-8ec0-4ef8-a21f-64c42fcb67ed.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/4591i56D14F2DF0B544B4/image-size/large?v=v2&amp;amp;px=999" role="button" title="84942e4c5d014e6ea5b484b42f758fbf_c26815f4-8ec0-4ef8-a21f-64c42fcb67ed.png" alt="84942e4c5d014e6ea5b484b42f758fbf_c26815f4-8ec0-4ef8-a21f-64c42fcb67ed.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="84942e4c5d014e6ea5b484b42f758fbf_bcd2923a-c964-4d13-9eb2-e4c0518b5c7c.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/4399i93987171C3AF2666/image-size/large?v=v2&amp;amp;px=999" role="button" title="84942e4c5d014e6ea5b484b42f758fbf_bcd2923a-c964-4d13-9eb2-e4c0518b5c7c.png" alt="84942e4c5d014e6ea5b484b42f758fbf_bcd2923a-c964-4d13-9eb2-e4c0518b5c7c.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="84942e4c5d014e6ea5b484b42f758fbf_8ab95d01-e944-402b-b475-92b44dcfc553.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/762i5D4F3F4127168346/image-size/large?v=v2&amp;amp;px=999" role="button" title="84942e4c5d014e6ea5b484b42f758fbf_8ab95d01-e944-402b-b475-92b44dcfc553.png" alt="84942e4c5d014e6ea5b484b42f758fbf_8ab95d01-e944-402b-b475-92b44dcfc553.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="84942e4c5d014e6ea5b484b42f758fbf_f96781bd-50e3-44f5-8929-758dab181429.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/1425i2EA6F820A03606C1/image-size/large?v=v2&amp;amp;px=999" role="button" title="84942e4c5d014e6ea5b484b42f758fbf_f96781bd-50e3-44f5-8929-758dab181429.png" alt="84942e4c5d014e6ea5b484b42f758fbf_f96781bd-50e3-44f5-8929-758dab181429.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;The VLAN is created as B@AP at the XCC and configured on the Switch, as if I set the VLAN on the role statically on the XCC and don't send the VLAN attributes from the NAC it works perfectly.&lt;/P&gt;&lt;P&gt;I haven't asked GTAC yet, because maybe I'm missing something stupid and decided to ask here before bothering the GTAC Guys.&lt;/P&gt;&lt;P&gt;I've just captured some screenshots and an AP Log (because XCC logs are not good, IMHO)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;######################## CONNECTING TO THE SEPLAG_DOT1X WLAN AND RECEIVING THE UNREGISTERED POLICY FROM NAC FOR REGISTRATION #########################&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sep 17 11:57:19 krn: ieee80211_mlme.c:445/wlan_mlme_disassoc_request_with_callback()-ath6/C0:BD:D1:DD:CB:77 wlan_vap_is_pmf_enabled=0&lt;/P&gt;&lt;P&gt;Sep 17 11:57:19 krn: ieee80211_mlme.c:499/wlan_mlme_disassoc_request_with_callback()-ath6/C0:BD:D1:DD:CB:77 defer_cleanup=1 ni_pmf=0 key_valid=1&lt;/P&gt;&lt;P&gt;Sep 17 11:57:19 krn: ieee80211_mgmt.c:993/ieee80211_send_disassoc_with_callback()-ath6 DISASSOC C0:BD:D1:DD:CB:77 reason=8&lt;/P&gt;&lt;P&gt;Sep 17 11:57:19 krn: ieee80211_node_ap.c:274/_ieee80211_node_leave()-ath6/C0:BD:D1:DD:CB:77 stassoc=1 ni=e6e8fee0 aid=1 kvalid=1 keyix=5 ncount=2 tm=88569 rss=-41 refcnt=2 rtChRegUtil=13&lt;/P&gt;&lt;P&gt;Sep 17 11:57:19 krn: ieee80211_node_ap.c:413/_ieee80211_node_leave()-ath6 C0:BD:D1:DD:CB:77 ieee80211_crypto_delkey AID=1&lt;/P&gt;&lt;P&gt;Sep 17 11:57:19 krn: ieee80211_node_ap.c:80/chk_ic_counters()-wifi0 Correcting ht40_sta_assoc! orig=65535 new=0&lt;/P&gt;&lt;P&gt;Sep 17 11:57:19 krn: ieee80211_node_ap.c:81/chk_ic_counters()-wifi0 num_corrected=1&lt;/P&gt;&lt;P&gt;Sep 17 11:57:19 hostapd0: 1631879839.814660: ath6: STA c0:bd:d1:dd:cb:77 IEEE 802.11: disassociated&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: ieee80211_mgmt_ap.c:1125/ieee80211_recv_asreq()-ni_flags=a rs_nrates=16&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: ieee80211_node_ap.c:863/ieee80211_node_join()-ath6/C0:BD:D1:DD:CB:77 sta=1 ni=e6e90f90 aid=1 refcnt=2 ncnt=2 rss=-48 mfp=0&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: ol_if_mgmt.c:720/ol_ath_net80211_newassoc()-C0:BD:D1:DD:CB:77 ni_flags=1000000a ni_wds_tx_policy=0 isnew=1 ni=e6e90f90&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: ieee80211_mgmt_ap.c:1359/ieee80211_recv_asreq()-exit&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 hostapd0: 1631879843.486044: ath6: STA c0:bd:d1:dd:cb:77 IEEE 802.11: associated&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 hostapd0: 1631879843.486137: ath6: STA c0:bd:d1:dd:cb:77 WPA: wpa_validate_wpa_ie776 key_mgmt 01 num_pmkid=0 pmksa=(nil)&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 hostapd0: 1631879843.486387: ath6: STA c0:bd:d1:dd:cb:77 WPA: wpa_validate_wpa_ie PW_EAP_PMKID_NOTIFY sent to driver&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: mu_assoc_tab.c:1206/wassp_mu_assoc_handler()-C0:BD:D1:DD:CB:77 ALLOWED&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: wassp_mu_assoc_decode: C0:BD:D1:DD:CB:77 transId 1631535228 filter name Unregistered rule num 7&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: wassp_mu_assoc_decode 3323 unicast filter extentions&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: &amp;nbsp; decodeFilterRulesExtBlock: Optional tlv EID_FILTER_RULE_FIXED_APP_ID not present&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: &amp;nbsp; decodeFilterRulesExtBlock: Optional tlv EID_FILTER_RULES_APP_SIG_GROUP_ID not present&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: &amp;nbsp; decodeFilterRulesExtBlock: Optional tlv EID_FILTER_RULES_APP_SIG_DISP_ID not present&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: &amp;nbsp; decodeFilterRulesExtBlock: Optional tlv EID_IPV6_ADDR not present&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: mu_assoc_tab.c:3341/wassp_mu_assoc_decode()-decode topo array len 56&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: decodeTopologyArray 4004 EID_TOPOLOGY_ARRAY TLV len:56&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: decodeFilterConfigStruct: EID_FILTER_RULES not present&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: decodeTopologyStruct 3981 success!&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: &amp;nbsp; decodeTopologyArray: decoding EID_TOPOLOGY_ARRAY success struct count:1 &amp;nbsp;&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: topology array - entry count:1 &amp;nbsp; &amp;nbsp; &amp;nbsp; p:e2200000&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: topology struct - vlanId:1121 isBridged:yes isTagged:yes isArpProxy:yes&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: filterName:VLAN-BAP-CORP-Grupo1&amp;nbsp; &amp;nbsp; ruleCount:0&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: sessMgmt_utils.c:4317/ssmHandleAC2APMuIP()-RESP has IP=10.1.121.2 old linger node IP=0.0.0.0&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: chantry_arppxy_node.c:143/chantry_arppxy_node_add_ipv4()-Setting c0:bd:d1:dd:cb:77 10.1.121.2&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: wassp_mu_assoc_decode: Success: chantry6: apply filter Unregistered with 7 rules&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: mu_assoc_tab.c:3509/wassp_mu_assoc_decode()-li_vlanid_count 1 li_controller_vlanid_count 0&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: dev_ident_drv.c:92/devIdentUpdateLiAndSiteSess()-C0:BD:D1:DD:CB:77 devIdent old 0 0 0 new 290 104 15&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: [19/1] FWLOG: [84827658] RATE: ChainMask 3, peer_mac cb:77, phymode 8, ni_flags 0x02211006, vht_mcs_set 0xfffa, ht_mcs_set 0xffff, legacy_rate_set 0x0ff0&lt;/P&gt;&lt;P&gt;Sep 17 11:57:23 krn: [31/5] FWLOG: [84827659] RTT_REPORT ( 0x2804, 0x3, 0x479, 0x0, 0x9 )&lt;/P&gt;&lt;P&gt;Sep 17 11:57:29 krn: wassp_mu_update_handler 2404&lt;/P&gt;&lt;P&gt;Sep 17 11:57:29 krn: &amp;nbsp; decodeFilterRulesExtBlock: Optional tlv EID_FILTER_RULE_FIXED_APP_ID not present&lt;/P&gt;&lt;P&gt;Sep 17 11:57:29 krn: &amp;nbsp; decodeFilterRulesExtBlock: Optional tlv EID_FILTER_RULES_APP_SIG_GROUP_ID not present&lt;/P&gt;&lt;P&gt;Sep 17 11:57:29 krn: &amp;nbsp; decodeFilterRulesExtBlock: Optional tlv EID_FILTER_RULES_APP_SIG_DISP_ID not present&lt;/P&gt;&lt;P&gt;Sep 17 11:57:29 krn: &amp;nbsp; decodeFilterRulesExtBlock: Optional tlv EID_IPV6_ADDR not present&lt;/P&gt;&lt;P&gt;Sep 17 11:57:29 krn: decodeTopologyArray 4004 EID_TOPOLOGY_ARRAY TLV len:56&lt;/P&gt;&lt;P&gt;Sep 17 11:57:29 krn: decodeFilterConfigStruct: EID_FILTER_RULES not present&lt;/P&gt;&lt;P&gt;Sep 17 11:57:29 krn: decodeTopologyStruct 3981 success!&lt;/P&gt;&lt;P&gt;Sep 17 11:57:29 krn: &amp;nbsp; decodeTopologyArray: decoding EID_TOPOLOGY_ARRAY success struct count:1 &amp;nbsp;&lt;/P&gt;&lt;P&gt;Sep 17 11:57:29 krn: topology array - entry count:1 &amp;nbsp; &amp;nbsp; &amp;nbsp; p:e2200000&lt;/P&gt;&lt;P&gt;Sep 17 11:57:29 krn: topology struct - vlanId:1121 isBridged:yes isTagged:yes isArpProxy:yes&lt;/P&gt;&lt;P&gt;Sep 17 11:57:29 krn: filterName:VLAN-BAP-CORP-Grupo1&amp;nbsp; &amp;nbsp; ruleCount:0&lt;/P&gt;&lt;P&gt;Sep 17 11:57:29 krn: mu_assoc_tab.c:2592/wassp_mu_update_handler()-chantry6 C0:BD:D1:DD:CB:77 filterName: "Unregistered" numRule 7&lt;/P&gt;&lt;P&gt;Sep 17 11:57:29 hostapd0: 1631879849.972798: ath6: STA c0:bd:d1:dd:cb:77 WPA: pairwise key handshake completed (RSN)&lt;/P&gt;&lt;P&gt;Sep 17 11:57:29 hostapd0: 1631879849.972860: ====&amp;gt; AUTHENTICATED sm_AUTH_PAE_AUTHENTICATED_Enter 342&lt;/P&gt;&lt;P&gt;Sep 17 11:57:29 hostapd0: 1631879849.972860: ====&amp;gt; sm_AUTH_PAE_AUTHENTICATED_Enter 343 sm-&amp;gt;eap_type_supp 25 eap_type_authsrv 0&lt;/P&gt;&lt;P&gt;Sep 17 11:57:29 hostapd0: 1631879849.972860: ====&amp;gt; MAC: c0:bd:d1:dd:cb:77&lt;/P&gt;&lt;P&gt;Sep 17 11:57:29 hostapd0: 1631879849.973016: ath6: STA c0:bd:d1:dd:cb:77 IEEE 802.1X: authenticated - EAP type: 0 (unknown)&lt;/P&gt;&lt;P&gt;Sep 17 11:57:29 krn: ieee80211_wireless.c:9160/ieee80211_ioctl_setkey()-ath6 C0:BD:D1:DD:CB:77 keyix=65535&lt;/P&gt;&lt;P&gt;Sep 17 11:57:29 krn: ieee80211_wireless.c:9301/ieee80211_ioctl_setkey()-ath6 C0:BD:D1:DD:CB:77 error=0 keytype=3 keylen=16 keyix=65535&lt;/P&gt;&lt;P&gt;Sep 17 11:57:29 krn: m2MsgApp_TaskletHandler 425 hapd--&amp;gt;tsk--&amp;gt;AP OP_TASKLET_APP_HAPD_AUTH_TYPE from srcTid:36&lt;/P&gt;&lt;P&gt;Sep 17 11:57:29 krn: m3TaskHdlr.c:362/tskHdlr_muAuthType()-C0:BD:D1:DD:CB:77, eap type 25&lt;/P&gt;&lt;P&gt;Sep 17 11:57:29 krn: m3TaskHdlr.c:366/tskHdlr_muAuthType()-c0:bd:d1:dd:cb:77, size 1152&lt;/P&gt;&lt;P&gt;Sep 17 11:57:30 krn: [22/27] FWLOG: [84834297] WAL_DBGID_SECURITY_UCAST_KEY_SET ( 0xcb77, 0x0 )&lt;/P&gt;&lt;P&gt;Sep 17 11:57:30 krn: [22/29] FWLOG: [84834297] WAL_DBGID_SECURITY_ENCR_EN (&amp;nbsp; )&lt;/P&gt;&lt;P&gt;Sep 17 11:57:30 krn: [22/26] FWLOG: [84834297] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x443ba4 )&lt;/P&gt;&lt;P&gt;Sep 17 11:57:30 krn: [22/35] FWLOG: [84834605] WAL_DBGID_TX_BA_SETUP ( 0x443ba4, 0xcb770006, 0xf, 0x40, 0x1 )&lt;/P&gt;&lt;P&gt;Sep 17 11:57:30 krn: [19/1] FWLOG: [84834606] RATE: ChainMask 3, peer_mac cb:77, phymode 10, ni_flags 0x02211006, vht_mcs_set 0xfffa, ht_mcs_set 0xffff, legacy_rate_set 0x0ff0&lt;/P&gt;&lt;P&gt;Sep 17 11:57:31 krn: [22/35] FWLOG: [84835061] WAL_DBGID_TX_BA_SETUP ( 0x443ba4, 0xcb770000, 0x0, 0x40, 0x1 )&lt;/P&gt;&lt;P&gt;Sep 17 11:57:33 cap: __delta__ deltaCounterUpdate 330 lastRead:0x8589934748 newRead:0x81 32bit roll over:0x200000000!!!&lt;/P&gt;&lt;P&gt;Sep 17 11:57:33 cap: __delta__ deltaCounterUpdate 330 lastRead:0x8589934709 newRead:0x57 32bit roll over:0x200000000!!!&lt;/P&gt;&lt;P&gt;Sep 17 11:57:33 cap: __delta__ deltaCounterUpdate 330 lastRead:0x8589966690 newRead:0x11416 32bit roll over:0x200000000!!!&lt;/P&gt;&lt;P&gt;Sep 17 11:57:33 cap: __delta__ deltaCounterUpdate 330 lastRead:0x8589979112 newRead:0x15121 32bit roll over:0x200000000!!!&lt;/P&gt;&lt;P&gt;Sep 17 11:57:33 cap: __delta__ muDeltaEntryEncode 3964&amp;nbsp; radio mismatch calling:0 map:1 C0:BD:D1:DD:CB:77&lt;/P&gt;&lt;P&gt;Sep 17 11:57:39 krn: vap-8(ath18):ieee80211_send_nulldata[356] cur chan 11 flags 0x10080&amp;nbsp; is not same as home chan 1 flags 0xa0&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sep 17 11:57:39 krn: vap-8(ath8):ieee80211_send_nulldata[356] cur chan 149 flags 0x100100&amp;nbsp; is not same as home chan 36 flags 0x140&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;################ CLIENT REDIRECTED TO THE NAC PORTAL FOR REGISTRATION... REGISTERING ########################&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sep 17 11:58:03 cap: __delta__ muDeltaEntryEncode 3964&amp;nbsp; radio mismatch calling:0 map:1 C0:BD:D1:DD:CB:77&lt;/P&gt;&lt;P&gt;Sep 17 11:58:30 sensor: excessive dpi packets, 20+21, from 10.1.121.2(45648) -&amp;gt; 10.100.0.251(443), TCP, dir=0 , displayId=0, are ignored&lt;/P&gt;&lt;P&gt;Sep 17 11:58:30 sensor: excessive dpi packets, 20+21, from 10.1.121.2(45647) -&amp;gt; 10.100.0.251(443), TCP, dir=0 , displayId=0, are ignored&lt;/P&gt;&lt;P&gt;Sep 17 11:58:30 sensor: excessive dpi packets, 19+21, from 10.1.121.2(45646) -&amp;gt; 10.100.0.251(443), TCP, dir=0 , displayId=0, are ignored&lt;/P&gt;&lt;P&gt;Sep 17 11:58:30 sensor: excessive dpi packets, 20+19, from 10.1.121.2(45645) -&amp;gt; 10.100.0.251(443), TCP, dir=0 , displayId=0, are ignored&lt;/P&gt;&lt;P&gt;Sep 17 11:58:30 sensor: excessive dpi packets, 19+21, from 10.1.121.2(45644) -&amp;gt; 10.100.0.251(443), TCP, dir=0 , displayId=0, are ignored&lt;/P&gt;&lt;P&gt;Sep 17 11:58:30 sensor: excessive dpi packets, 18+21, from 10.1.121.2(45641) -&amp;gt; 10.100.0.251(443), TCP, dir=0 , displayId=0, are ignored&lt;/P&gt;&lt;P&gt;Sep 17 11:58:33 cap: __delta__ muDeltaEntryEncode 3964&amp;nbsp; radio mismatch calling:0 map:1 C0:BD:D1:DD:CB:77&lt;/P&gt;&lt;P&gt;Sep 17 11:59:01 timesync: TIMESERVER=pool.ntp.org AP_MODE=0 DISCOV_MODE="On-Prem"&lt;/P&gt;&lt;P&gt;Sep 17 11:59:03 cap: __delta__ muDeltaEntryEncode 3964&amp;nbsp; radio mismatch calling:0 map:1 C0:BD:D1:DD:CB:77&lt;/P&gt;&lt;P&gt;Sep 17 11:59:33 cap: __delta__ muDeltaEntryEncode 3964&amp;nbsp; radio mismatch calling:0 map:1 C0:BD:D1:DD:CB:77&lt;/P&gt;&lt;P&gt;Sep 17 11:59:45 sensor: excessive dpi packets, 18+21, from 10.1.121.2(45665) -&amp;gt; 10.100.0.251(443), TCP, dir=0 , displayId=0, are ignored&lt;/P&gt;&lt;P&gt;Sep 17 11:59:45 sensor: excessive dpi packets, 20+19, from 10.1.121.2(45664) -&amp;gt; 10.100.0.251(443), TCP, dir=0 , displayId=0, are ignored&lt;/P&gt;&lt;P&gt;Sep 17 11:59:45 sensor: excessive dpi packets, 21+20, from 10.1.121.2(45663) -&amp;gt; 10.100.0.251(443), TCP, dir=0 , displayId=0, are ignored&lt;/P&gt;&lt;P&gt;Sep 17 11:59:45 sensor: excessive dpi packets, 18+16, from 10.1.121.2(45662) -&amp;gt; 10.100.0.251(443), TCP, dir=0 , displayId=0, are ignored&lt;/P&gt;&lt;P&gt;Sep 17 11:59:45 sensor: excessive dpi packets, 18+21, from 10.1.121.2(45661) -&amp;gt; 10.100.0.251(443), TCP, dir=0 , displayId=0, are ignored&lt;/P&gt;&lt;P&gt;Sep 17 11:59:45 sensor: excessive dpi packets, 21+18, from 10.1.121.2(45648) -&amp;gt; 10.100.0.251(443), TCP, dir=0 , displayId=0, are ignored&lt;/P&gt;&lt;P&gt;Sep 17 12:00:03 cap: __delta__ muDeltaEntryEncode 3964&amp;nbsp; radio mismatch calling:0 map:1 C0:BD:D1:DD:CB:77&lt;/P&gt;&lt;P&gt;Sep 17 12:00:31 krn: wassp_mu_update_handler 2404&lt;/P&gt;&lt;P&gt;Sep 17 12:00:31 krn: &amp;nbsp; decodeFilterRulesExtBlock: Optional tlv EID_FILTER_RULE_FIXED_APP_ID not present&lt;/P&gt;&lt;P&gt;Sep 17 12:00:31 krn: &amp;nbsp; decodeFilterRulesExtBlock: Optional tlv EID_FILTER_RULES_APP_SIG_GROUP_ID not present&lt;/P&gt;&lt;P&gt;Sep 17 12:00:31 krn: &amp;nbsp; decodeFilterRulesExtBlock: Optional tlv EID_FILTER_RULES_APP_SIG_DISP_ID not present&lt;/P&gt;&lt;P&gt;Sep 17 12:00:31 krn: &amp;nbsp; decodeFilterRulesExtBlock: Optional tlv EID_IPV6_ADDR not present&lt;/P&gt;&lt;P&gt;Sep 17 12:00:31 krn: decodeTopologyArray 4004 EID_TOPOLOGY_ARRAY TLV len:56&lt;/P&gt;&lt;P&gt;Sep 17 12:00:31 krn: decodeFilterConfigStruct: EID_FILTER_RULES not present&lt;/P&gt;&lt;P&gt;Sep 17 12:00:31 krn: decodeTopologyStruct 3981 success!&lt;/P&gt;&lt;P&gt;Sep 17 12:00:31 krn: &amp;nbsp; decodeTopologyArray: decoding EID_TOPOLOGY_ARRAY success struct count:1 &amp;nbsp;&lt;/P&gt;&lt;P&gt;Sep 17 12:00:31 krn: topology array - entry count:1 &amp;nbsp; &amp;nbsp; &amp;nbsp; p:e2200000&lt;/P&gt;&lt;P&gt;Sep 17 12:00:31 krn: topology struct - vlanId:1121 isBridged:yes isTagged:yes isArpProxy:yes&lt;/P&gt;&lt;P&gt;Sep 17 12:00:31 krn: filterName:VLAN-BAP-CORP-Grupo1&amp;nbsp; &amp;nbsp; ruleCount:0&lt;/P&gt;&lt;P&gt;Sep 17 12:00:31 krn: mu_assoc_tab.c:2592/wassp_mu_update_handler()-chantry6 C0:BD:D1:DD:CB:77 filterName: "Unregistered" numRule 7&lt;/P&gt;&lt;P&gt;Sep 17 12:00:31 hostapd0: 1631880031.103882: ====&amp;gt; AUTHENTICATED sm_AUTH_PAE_AUTHENTICATED_Enter 342&lt;/P&gt;&lt;P&gt;Sep 17 12:00:31 hostapd0: 1631880031.103913: ====&amp;gt; sm_AUTH_PAE_AUTHENTICATED_Enter 343 sm-&amp;gt;eap_type_supp 25 eap_type_authsrv 0&lt;/P&gt;&lt;P&gt;Sep 17 12:00:31 hostapd0: 1631880031.103944: ====&amp;gt; MAC: c0:bd:d1:dd:cb:77&lt;/P&gt;&lt;P&gt;Sep 17 12:00:31 hostapd0: 1631880031.104069: ath6: STA c0:bd:d1:dd:cb:77 IEEE 802.1X: authenticated - EAP type: 0 (unknown)&lt;/P&gt;&lt;P&gt;Sep 17 12:00:31 krn: m2MsgApp_TaskletHandler 425 hapd--&amp;gt;tsk--&amp;gt;AP OP_TASKLET_APP_HAPD_AUTH_TYPE from srcTid:36&lt;/P&gt;&lt;P&gt;Sep 17 12:00:31 krn: m3TaskHdlr.c:362/tskHdlr_muAuthType()-C0:BD:D1:DD:CB:77, eap type 25&lt;/P&gt;&lt;P&gt;Sep 17 12:00:31 krn: m3TaskHdlr.c:366/tskHdlr_muAuthType()-c0:bd:d1:dd:cb:77, size 1152&lt;/P&gt;&lt;P&gt;Sep 17 12:00:32 hostapd0: 1631880032.755866: ath6: STA c0:bd:d1:dd:cb:77 WPA: pairwise key handshake completed (RSN)&lt;/P&gt;&lt;P&gt;Sep 17 12:00:32 krn: ieee80211_wireless.c:9160/ieee80211_ioctl_setkey()-ath6 C0:BD:D1:DD:CB:77 keyix=65535&lt;/P&gt;&lt;P&gt;Sep 17 12:00:32 krn: ieee80211_wireless.c:9301/ieee80211_ioctl_setkey()-ath6 C0:BD:D1:DD:CB:77 error=0 keytype=3 keylen=16 keyix=65535&lt;/P&gt;&lt;P&gt;Sep 17 12:00:33 cap: __delta__ muDeltaEntryEncode 3964&amp;nbsp; radio mismatch calling:0 map:1 C0:BD:D1:DD:CB:77&lt;/P&gt;&lt;P&gt;Sep 17 12:00:33 krn: [22/27] FWLOG: [85021367] WAL_DBGID_SECURITY_UCAST_KEY_SET ( 0xcb77, 0x0 )&lt;/P&gt;&lt;P&gt;Sep 17 12:00:33 krn: [22/29] FWLOG: [85021367] WAL_DBGID_SECURITY_ENCR_EN (&amp;nbsp; )&lt;/P&gt;&lt;P&gt;Sep 17 12:00:33 krn: [22/26] FWLOG: [85021367] WAL_DBGID_SECURITY_ALLOW_DATA ( 0x443ba4 )&lt;/P&gt;&lt;P&gt;Sep 17 12:01:00 sensor: excessive dpi packets, 21+20, from 10.1.121.2(45692) -&amp;gt; 10.100.0.251(443), TCP, dir=0 , displayId=0, are ignored&lt;/P&gt;&lt;P&gt;Sep 17 12:01:00 sensor: excessive dpi packets, 17+20, from 10.1.121.2(45691) -&amp;gt; 10.100.0.251(443), TCP, dir=0 , displayId=0, are ignored&lt;/P&gt;&lt;P&gt;Sep 17 12:01:00 sensor: excessive dpi packets, 22+21, from 10.1.121.2(45690) -&amp;gt; 10.100.0.251(443), TCP, dir=0 , displayId=0, are ignored&lt;/P&gt;&lt;P&gt;Sep 17 12:01:00 sensor: excessive dpi packets, 18+24, from 10.1.121.2(45648) -&amp;gt; 10.100.0.251(443), TCP, dir=0 , displayId=0, are ignored&lt;/P&gt;&lt;P&gt;Sep 17 12:02:03 cap: __delta__ muDeltaEntryEncode 3964&amp;nbsp; radio mismatch calling:0 map:1 C0:BD:D1:DD:CB:77&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;############### CLIENT DEVICE REGISTERED, SHOULD RECEIVE ROLE MOBILE AND VLAN 101 B@AP TAGGED ###############&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 hostapd0: 03897:chantry_client.c:455/ieee8021x_purge_pmk_allhostapd()-EAP PURGE&amp;nbsp; cb 77 at hapd f9 76&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 hostapd0: 03897:chantry_client.c:455/ieee8021x_purge_pmk_allhostapd()-EAP PURGE&amp;nbsp; cb 77 at hapd f9 76&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 hostapd0: 03897:chantry_client.c:455/ieee8021x_purge_pmk_allhostapd()-EAP PURGE&amp;nbsp; cb 77 at hapd f9 76&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 hostapd0: 03897:chantry_client.c:455/ieee8021x_purge_pmk_allhostapd()-EAP PURGE&amp;nbsp; cb 77 at hapd f9 76&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 hostapd0: 03897:chantry_client.c:455/ieee8021x_purge_pmk_allhostapd()-EAP PURGE&amp;nbsp; cb 77 at hapd f9 76&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 hostapd0: 03897:chantry_client.c:455/ieee8021x_purge_pmk_allhostapd()-EAP PURGE&amp;nbsp; cb 77 at hapd f9 76&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 hostapd0: 03897:chantry_client.c:455/ieee8021x_purge_pmk_allhostapd()-EAP PURGE&amp;nbsp; cb 77 at hapd f9 76&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 hostapd0: 03897:chantry_client.c:455/ieee8021x_purge_pmk_allhostapd()-EAP PURGE&amp;nbsp; cb 77 at hapd f9 76&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 hostapd0: 03897:chantry_client.c:455/ieee8021x_purge_pmk_allhostapd()-EAP PURGE&amp;nbsp; cb 77 at hapd f9 76&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 hostapd0: 03897:chantry_client.c:455/ieee8021x_purge_pmk_allhostapd()-EAP PURGE&amp;nbsp; cb 77 at hapd f9 76&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 cap: 01123:wassp_prot_input.c:1586/wassp_mu_discon_handler()-C0:BD:D1:DD:CB:77 EID_STATUS="DAS_REQ" (15)&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 hostapd0: 03897:chantry_client.c:455/ieee8021x_purge_pmk_allhostapd()-EAP PURGE&amp;nbsp; cb 77 at hapd f9 76&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 hostapd0: 03897:chantry_client.c:455/ieee8021x_purge_pmk_allhostapd()-EAP PURGE&amp;nbsp; cb 77 at hapd f9 76&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: chantry_ext_ioctl.c:412/ioctl_kickmacbyattr()-ath0 DISASSOC C0:BD:D1:DD:CB:77 reason=8&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: Skipping domlme for STA C0:BD:D1:DD:CB:77 (li-&amp;gt;li_vap-&amp;gt;io_dev ath6 != vns ath0 ) (li-&amp;gt;li_vap-&amp;gt;dev: chantry6)&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: chantry_ext_ioctl.c:412/ioctl_kickmacbyattr()-ath3 DISASSOC C0:BD:D1:DD:CB:77 reason=8&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: Skipping domlme for STA C0:BD:D1:DD:CB:77 (li-&amp;gt;li_vap-&amp;gt;io_dev ath6 != vns ath3 ) (li-&amp;gt;li_vap-&amp;gt;dev: chantry6)&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: chantry_ext_ioctl.c:412/ioctl_kickmacbyattr()-ath4 DISASSOC C0:BD:D1:DD:CB:77 reason=8&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: Skipping domlme for STA C0:BD:D1:DD:CB:77 (li-&amp;gt;li_vap-&amp;gt;io_dev ath6 != vns ath4 ) (li-&amp;gt;li_vap-&amp;gt;dev: chantry6)&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: chantry_ext_ioctl.c:412/ioctl_kickmacbyattr()-ath5 DISASSOC C0:BD:D1:DD:CB:77 reason=8&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: Skipping domlme for STA C0:BD:D1:DD:CB:77 (li-&amp;gt;li_vap-&amp;gt;io_dev ath6 != vns ath5 ) (li-&amp;gt;li_vap-&amp;gt;dev: chantry6)&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: chantry_ext_ioctl.c:412/ioctl_kickmacbyattr()-ath6 DISASSOC C0:BD:D1:DD:CB:77 reason=8&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: chantry_export.c:2792/chantry_domlme()-DISASSOC C0:BD:D1:DD:CB:77 reason=8&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: ieee80211_mlme.c:445/wlan_mlme_disassoc_request_with_callback()-ath6/C0:BD:D1:DD:CB:77 wlan_vap_is_pmf_enabled=0&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 cap: wlanDisconnectClientsR: C0:BD:D1:DD:CB:77, cat VNS_CAT_ALL&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 cap: Send 22 bytes mu cb 77 disconnect response data to AC&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: ieee80211_mlme.c:499/wlan_mlme_disassoc_request_with_callback()-ath6/C0:BD:D1:DD:CB:77 defer_cleanup=1 ni_pmf=0 key_valid=1&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: ieee80211_mgmt.c:993/ieee80211_send_disassoc_with_callback()-ath6 DISASSOC C0:BD:D1:DD:CB:77 reason=8&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: chantry_ext_ioctl.c:412/ioctl_kickmacbyattr()-ath7 DISASSOC C0:BD:D1:DD:CB:77 reason=8&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: Skipping domlme for STA C0:BD:D1:DD:CB:77 (li-&amp;gt;li_vap-&amp;gt;io_dev ath6 != vns ath7 ) (li-&amp;gt;li_vap-&amp;gt;dev: chantry6)&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: chantry_ext_ioctl.c:412/ioctl_kickmacbyattr()-ath10 DISASSOC C0:BD:D1:DD:CB:77 reason=8&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: Skipping domlme for STA C0:BD:D1:DD:CB:77 (li-&amp;gt;li_vap-&amp;gt;io_dev ath6 != vns ath10 ) (li-&amp;gt;li_vap-&amp;gt;dev: chantry6)&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: chantry_ext_ioctl.c:412/ioctl_kickmacbyattr()-ath13 DISASSOC C0:BD:D1:DD:CB:77 reason=8&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: Skipping domlme for STA C0:BD:D1:DD:CB:77 (li-&amp;gt;li_vap-&amp;gt;io_dev ath6 != vns ath13 ) (li-&amp;gt;li_vap-&amp;gt;dev: chantry6)&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: chantry_ext_ioctl.c:412/ioctl_kickmacbyattr()-ath14 DISASSOC C0:BD:D1:DD:CB:77 reason=8&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: Skipping domlme for STA C0:BD:D1:DD:CB:77 (li-&amp;gt;li_vap-&amp;gt;io_dev ath6 != vns ath14 ) (li-&amp;gt;li_vap-&amp;gt;dev: chantry6)&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: chantry_ext_ioctl.c:412/ioctl_kickmacbyattr()-ath15 DISASSOC C0:BD:D1:DD:CB:77 reason=8&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: Skipping domlme for STA C0:BD:D1:DD:CB:77 (li-&amp;gt;li_vap-&amp;gt;io_dev ath6 != vns ath15 ) (li-&amp;gt;li_vap-&amp;gt;dev: chantry6)&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: chantry_ext_ioctl.c:412/ioctl_kickmacbyattr()-ath16 DISASSOC C0:BD:D1:DD:CB:77 reason=8&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: Skipping domlme for STA C0:BD:D1:DD:CB:77 (li-&amp;gt;li_vap-&amp;gt;io_dev ath6 != vns ath16 ) (li-&amp;gt;li_vap-&amp;gt;dev: chantry6)&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: chantry_ext_ioctl.c:412/ioctl_kickmacbyattr()-ath17 DISASSOC C0:BD:D1:DD:CB:77 reason=8&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: Skipping domlme for STA C0:BD:D1:DD:CB:77 (li-&amp;gt;li_vap-&amp;gt;io_dev ath6 != vns ath17 ) (li-&amp;gt;li_vap-&amp;gt;dev: chantry6)&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: ieee80211_node_ap.c:274/_ieee80211_node_leave()-ath6/C0:BD:D1:DD:CB:77 stassoc=1 ni=e6e90f90 aid=1 kvalid=1 keyix=5 ncount=2 tm=286776 rss=-41 refcnt=2 rtChRegUtil=14&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: ieee80211_node_ap.c:413/_ieee80211_node_leave()-ath6 C0:BD:D1:DD:CB:77 ieee80211_crypto_delkey AID=1&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: ieee80211_node_ap.c:80/chk_ic_counters()-wifi0 Correcting ht40_sta_assoc! orig=65535 new=0&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 krn: ieee80211_node_ap.c:81/chk_ic_counters()-wifi0 num_corrected=1&lt;/P&gt;&lt;P&gt;Sep 17 12:02:10 hostapd0: 1631880130.261770: ath6: STA c0:bd:d1:dd:cb:77 IEEE 802.11: disassociated&lt;/P&gt;&lt;P&gt;Sep 17 12:02:17 krn: ieee80211_mgmt_ap.c:1125/ieee80211_recv_asreq()-ni_flags=a rs_nrates=16&lt;/P&gt;&lt;P&gt;Sep 17 12:02:17 krn: ieee80211_node_ap.c:863/ieee80211_node_join()-ath6/C0:BD:D1:DD:CB:77 sta=1 ni=e6e92040 aid=1 refcnt=2 ncnt=2 rss=-47 mfp=0&lt;/P&gt;&lt;P&gt;Sep 17 12:02:17 krn: ol_if_mgmt.c:720/ol_ath_net80211_newassoc()-C0:BD:D1:DD:CB:77 ni_flags=1000000a ni_wds_tx_policy=0 isnew=1 ni=e6e92040&lt;/P&gt;&lt;P&gt;Sep 17 12:02:17 krn: ieee80211_mgmt_ap.c:1359/ieee80211_recv_asreq()-exit&lt;/P&gt;&lt;P&gt;Sep 17 12:02:17 hostapd0: 1631880137.432373: ath6: STA c0:bd:d1:dd:cb:77 IEEE 802.11: associated&lt;/P&gt;&lt;P&gt;Sep 17 12:02:17 hostapd0: 1631880137.432435: ath6: STA c0:bd:d1:dd:cb:77 WPA: wpa_validate_wpa_ie776 key_mgmt 01 num_pmkid=1 pmksa=(nil)&lt;/P&gt;&lt;P&gt;Sep 17 12:02:17 hostapd0: 1631880137.432685: ath6: STA c0:bd:d1:dd:cb:77 WPA: wpa_validate_wpa_ie PW_EAP_PMKID_NOTIFY sent to driver&lt;/P&gt;&lt;P&gt;Sep 17 12:02:17 krn: mu_assoc_tab.c:1206/wassp_mu_assoc_handler()-C0:BD:D1:DD:CB:77 Not allowed&lt;/P&gt;&lt;P&gt;Sep 17 12:02:17 krn: mu_assoc_tab.c:1215/wassp_mu_assoc_handler()-chantry6 C0:BD:D1:DD:CB:77 DEAUTHed from ASSOC RSP! status=0&lt;/P&gt;&lt;P&gt;Sep 17 12:02:17 krn: chantry_export.c:2310/madwifi_send_deauth_imp()-chantry6/C0:BD:D1:DD:CB:77 reason=9&lt;/P&gt;&lt;P&gt;Sep 17 12:02:17 hostapd0: 1631880137.454678: ath6: STA c0:bd:d1:dd:cb:77 IEEE 802.11: disassociated&lt;/P&gt;&lt;P&gt;Sep 17 12:02:17 krn: chantry_export.c:2338/madwifi_send_deauth_imp()-chantry6 wireless_handlers is NULL, will try to convert to a chantry device...&lt;/P&gt;&lt;P&gt;Sep 17 12:02:17 hostapd0: 03897:chantry_client.c:455/ieee8021x_purge_pmk_allhostapd()-EAP PURGE&amp;nbsp; cb 77 at hapd f9 76&lt;/P&gt;&lt;P&gt;Sep 17 12:02:17 krn: chantry_export.c:2353/madwifi_send_deauth_imp()-Deauthing C0:BD:D1:DD:CB:77 on ath6&lt;/P&gt;&lt;P&gt;Sep 17 12:02:17 krn: ieee80211_wireless.c:2781/ieee80211_ioctl_setmlme()-ath6 DISASSOC/DEAUTH! C0:BD:D1:DD:CB:77 op=3&lt;/P&gt;&lt;P&gt;Sep 17 12:02:17 krn: ieee80211_wireless.c:2823/ieee80211_ioctl_setmlme()-ath6/C0:BD:D1:DD:CB:77 ATH_SUPPORT_DEFERRED_NODE_CLEANUP!&lt;/P&gt;&lt;P&gt;Sep 17 12:02:17 krn: ieee80211_mlme.c:445/wlan_mlme_disassoc_request_with_callback()-ath6/C0:BD:D1:DD:CB:77 wlan_vap_is_pmf_enabled=0&lt;/P&gt;&lt;P&gt;Sep 17 12:02:17 krn: ieee80211_mlme.c:499/wlan_mlme_disassoc_request_with_callback()-ath6/C0:BD:D1:DD:CB:77 defer_cleanup=1 ni_pmf=0 key_valid=0&lt;/P&gt;&lt;P&gt;Sep 17 12:02:17 krn: ieee80211_mgmt.c:993/ieee80211_send_disassoc_with_callback()-ath6 DISASSOC C0:BD:D1:DD:CB:77 reason=9&lt;/P&gt;&lt;P&gt;Sep 17 12:02:17 krn: ieee80211_wireless.c:2835/ieee80211_ioctl_setmlme()-DISASSOC rc=0&lt;/P&gt;&lt;P&gt;Sep 17 12:02:17 krn: ieee80211_node_ap.c:274/_ieee80211_node_leave()-ath6/C0:BD:D1:DD:CB:77 stassoc=1 ni=e6e92040 aid=1 kvalid=0 keyix=65535 ncount=2 tm=22 rss=-47 refcnt=2 rtChRegUtil=11&lt;/P&gt;&lt;P&gt;Sep 17 12:02:17 krn: ieee80211_node_ap.c:80/chk_ic_counters()-wifi0 Correcting ht40_sta_assoc! orig=65535 new=0&lt;/P&gt;&lt;P&gt;Sep 17 12:02:17 krn: ieee80211_node_ap.c:81/chk_ic_counters()-wifi0 num_corrected=1&lt;/P&gt;&lt;P&gt;Sep 17 12:02:17 krn: [19/1] FWLOG: [85128501] RATE: ChainMask 3, peer_mac cb:77, phymode 8, ni_flags 0x02211006, vht_mcs_set 0xfffa, ht_mcs_set 0xffff, legacy_rate_set 0x0ff0&lt;/P&gt;&lt;P&gt;Sep 17 12:02:17 krn: [31/5] FWLOG: [85128501] RTT_REPORT ( 0x2804, 0x3, 0x479, 0x0, 0x9 )&lt;/P&gt;&lt;P&gt;Sep 17 12:02:26 krn: ieee80211_mgmt_ap.c:1125/ieee80211_recv_asreq()-ni_flags=a rs_nrates=16&lt;/P&gt;&lt;P&gt;Sep 17 12:02:26 krn: ieee80211_node_ap.c:863/ieee80211_node_join()-ath6/C0:BD:D1:DD:CB:77 sta=1 ni=e6e930f0 aid=1 refcnt=2 ncnt=2 rss=-44 mfp=0&lt;/P&gt;&lt;P&gt;Sep 17 12:02:26 krn: ol_if_mgmt.c:720/ol_ath_net80211_newassoc()-C0:BD:D1:DD:CB:77 ni_flags=1000000a ni_wds_tx_policy=0 isnew=1 ni=e6e930f0&lt;/P&gt;&lt;P&gt;Sep 17 12:02:26 krn: ieee80211_mgmt_ap.c:1359/ieee80211_recv_asreq()-exit&lt;/P&gt;&lt;P&gt;Sep 17 12:02:26 hostapd0: 1631880146.437465: ath6: STA c0:bd:d1:dd:cb:77 IEEE 802.11: associated&lt;/P&gt;&lt;P&gt;Sep 17 12:02:26 hostapd0: 1631880146.437528: ath6: STA c0:bd:d1:dd:cb:77 WPA: wpa_validate_wpa_ie776 key_mgmt 01 num_pmkid=1 pmksa=(nil)&lt;/P&gt;&lt;P&gt;Sep 17 12:02:26 hostapd0: 1631880146.437777: ath6: STA c0:bd:d1:dd:cb:77 WPA: wpa_validate_wpa_ie PW_EAP_PMKID_NOTIFY sent to driver&lt;/P&gt;&lt;P&gt;Sep 17 12:02:26 krn: mu_assoc_tab.c:1206/wassp_mu_assoc_handler()-C0:BD:D1:DD:CB:77 Not allowed&lt;/P&gt;&lt;P&gt;Sep 17 12:02:26 krn: mu_assoc_tab.c:1215/wassp_mu_assoc_handler()-chantry6 C0:BD:D1:DD:CB:77 DEAUTHed from ASSOC RSP! status=0&lt;/P&gt;&lt;P&gt;Sep 17 12:02:26 krn: chantry_export.c:2310/madwifi_send_deauth_imp()-chantry6/C0:BD:D1:DD:CB:77 reason=9&lt;/P&gt;&lt;P&gt;Sep 17 12:02:26 krn: chantry_export.c:2338/madwifi_send_deauth_imp()-chantry6 wireless_handlers is NULL, will try to convert to a chantry device...&lt;/P&gt;&lt;P&gt;Sep 17 12:02:26 krn: chantry_export.c:2353/madwifi_send_deauth_imp()-Deauthing C0:BD:D1:DD:CB:77 on ath6&lt;/P&gt;&lt;P&gt;Sep 17 12:02:26 krn: ieee80211_wireless.c:2781/ieee80211_ioctl_setmlme()-ath6 DISASSOC/DEAUTH! C0:BD:D1:DD:CB:77 op=3&lt;/P&gt;&lt;P&gt;Sep 17 12:02:26 krn: ieee80211_wireless.c:2823/ieee80211_ioctl_setmlme()-ath6/C0:BD:D1:DD:CB:77 ATH_SUPPORT_DEFERRED_NODE_CLEANUP!&lt;/P&gt;&lt;P&gt;Sep 17 12:02:26 krn: ieee80211_mlme.c:445/wlan_mlme_disassoc_request_with_callback()-ath6/C0:BD:D1:DD:CB:77 wlan_vap_is_pmf_enabled=0&lt;/P&gt;&lt;P&gt;Sep 17 12:02:26 krn: ieee80211_mlme.c:499/wlan_mlme_disassoc_request_with_callback()-ath6/C0:BD:D1:DD:CB:77 defer_cleanup=1 ni_pmf=0 key_valid=0&lt;/P&gt;&lt;P&gt;Sep 17 12:02:26 krn: ieee80211_mgmt.c:993/ieee80211_send_disassoc_with_callback()-ath6 DISASSOC C0:BD:D1:DD:CB:77 reason=9&lt;/P&gt;&lt;P&gt;Sep 17 12:02:26 krn: ieee80211_wireless.c:2835/ieee80211_ioctl_setmlme()-DISASSOC rc=0&lt;/P&gt;&lt;P&gt;Sep 17 12:02:26 hostapd0: 03897:chantry_client.c:455/ieee8021x_purge_pmk_allhostapd()-EAP PURGE&amp;nbsp; cb 77 at hapd f9 76&lt;/P&gt;&lt;P&gt;Sep 17 12:02:26 krn: ieee80211_node_ap.c:274/_ieee80211_node_leave()-ath6/C0:BD:D1:DD:CB:77 stassoc=1 ni=e6e930f0 aid=1 kvalid=0 keyix=65535 ncount=2 tm=65 rss=-44 refcnt=2 rtChRegUtil=11&lt;/P&gt;&lt;P&gt;Sep 17 12:02:26 krn: ieee80211_node_ap.c:80/chk_ic_counters()-wifi0 Correcting ht40_sta_assoc! orig=65535 new=0&lt;/P&gt;&lt;P&gt;Sep 17 12:02:26 krn: ieee80211_node_ap.c:81/chk_ic_counters()-wifi0 num_corrected=1&lt;/P&gt;&lt;P&gt;Sep 17 12:02:26 hostapd0: 1631880146.502476: ath6: STA c0:bd:d1:dd:cb:77 IEEE 802.11: disassociated&lt;/P&gt;&lt;P&gt;Sep 17 12:02:26 krn: [19/1] FWLOG: [85137717] RATE: ChainMask 3, peer_mac cb:77, phymode 8, ni_flags 0x02211006, vht_mcs_set 0xfffa, ht_mcs_set 0xffff, legacy_rate_set 0x0ff0&lt;/P&gt;&lt;P&gt;Sep 17 12:02:26 krn: [31/5] FWLOG: [85137718] RTT_REPORT ( 0x2804, 0x3, 0x479, 0x0, 0x9 )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;################## CLIENT CANT CONNECT ###################&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Follows attached some screenshots about my config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Leo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&amp;nbsp;&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Fri, 17 Sep 2021 19:14:48 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69888#M103</guid>
      <dc:creator>LeoP1</dc:creator>
      <dc:date>2021-09-17T19:14:48Z</dc:date>
    </item>
    <item>
      <title>Re: XCC Dynamic VLAN Assignment</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69889#M104</link>
      <description>&lt;P&gt;I think this is a desgin-problem.&lt;/P&gt;&lt;P&gt;It’s always not a good idea to change vlan/ip-net during a active connection.&lt;/P&gt;&lt;P&gt;In this case, the client wired oder wireless needs a trigger to release the IP and Discovery for a new. In wired enviroment this can be triggered by link down and up. But in wireless, I think that shouldn’t be possible.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Sep 2021 20:08:45 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69889#M104</guid>
      <dc:creator>PeterK</dc:creator>
      <dc:date>2021-09-17T20:08:45Z</dc:date>
    </item>
    <item>
      <title>Re: XCC Dynamic VLAN Assignment</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69890#M105</link>
      <description>&lt;P&gt;Hi PeterK,&lt;/P&gt;&lt;P&gt;This design works perfectly on Wired and on the IdentiFi solutions…&amp;nbsp;There's no problem with the VLAN/Topology/Role change…&amp;nbsp;The problem is, when NAC tells XCC to reauth user (and XCC "obeys") and the client tries to reauth receiving the new RADIUS ATTRIBUTES, the client simply can't connect.&lt;/P&gt;&lt;P&gt;If I don't send the VLAN Attributes (just the very same ROLE), and this role is set statically to the desired VLAN, it works flawlessly.&lt;/P&gt;&lt;P&gt;It seems that the XCC is not working fine with this attibutes on &lt;A href="mailto:B@AP" target="_self" rel="noreferrer nofollow ugc"&gt;B@AP&lt;/A&gt;&amp;nbsp;topologies.&lt;/P&gt;&lt;P&gt;By the way, as I stated in previous posts, it WORKS PERFECTLY FINE when, with the very same config BUT the topology is set to &lt;A href="mailto:Bridge@AC" target="_self" rel="noreferrer nofollow ugc"&gt;Bridge@AC&lt;/A&gt;,&amp;nbsp;sending&amp;nbsp;the very same VLAN ATTRIBUTES, it just crashes when the topology is set to &lt;A href="mailto:Bridge@AP" target="_self" rel="noreferrer nofollow ugc"&gt;Bridge@AP&lt;/A&gt;&amp;nbsp;and we pass the VLAN attributes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Leo&lt;/P&gt;</description>
      <pubDate>Fri, 17 Sep 2021 20:15:43 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69890#M105</guid>
      <dc:creator>LeoP1</dc:creator>
      <dc:date>2021-09-17T20:15:43Z</dc:date>
    </item>
    <item>
      <title>Re: XCC Dynamic VLAN Assignment</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69891#M106</link>
      <description>&lt;P&gt;oh, ok…&amp;nbsp;good to know...&lt;/P&gt;&lt;P&gt;I always had a lot of trouble with vlan assignment at XCC.&lt;/P&gt;&lt;P&gt;AFAIK you need a policy role for every VLAN at the XCC, otherwise the tunnel-attribute is not accepted. I can’t see that in your screenshots and this is what was the solution for me...&lt;/P&gt;</description>
      <pubDate>Fri, 17 Sep 2021 20:21:47 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69891#M106</guid>
      <dc:creator>PeterK</dc:creator>
      <dc:date>2021-09-17T20:21:47Z</dc:date>
    </item>
    <item>
      <title>Re: XCC Dynamic VLAN Assignment</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69892#M107</link>
      <description>&lt;P&gt;Hi PeterK,&lt;/P&gt;&lt;P&gt;I've just posted the config where I got issues…&amp;nbsp;In summary: &lt;A href="mailto:B@AC" target="_self" rel="noreferrer nofollow ugc"&gt;B@AC&lt;/A&gt;&amp;nbsp;works perfectly, &lt;A href="mailto:B@AP" target="_self" rel="noreferrer nofollow ugc"&gt;B@AP&lt;/A&gt;&amp;nbsp;don't work. Below follows more info...&lt;/P&gt;&lt;P&gt;As far as I discovered, the Dynamic VLAN assignment works without a "Role-to-VLAN pair"&amp;nbsp;static creation on XCC, using RADIUS VLAN attributes, on &lt;A href="mailto:B@AC" target="_self" rel="noreferrer nofollow ugc"&gt;B@AC&lt;/A&gt;&amp;nbsp;topologies, but is not working o &lt;A href="mailto:B@AP" target="_self" rel="noreferrer nofollow ugc"&gt;B@AP&lt;/A&gt;&amp;nbsp;or FabricAttach topologies, even with the association of the VLANs to the Device Group's profile.&lt;/P&gt;&lt;P&gt;Creating the "Role-to-VLAN pairs" is not an option, as the customer is using a single Policy Domain for Wired and Wireless, and this solutions "would not fit" on the environment. Using B@AC solution is not an option as well.&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;-Leo&lt;/P&gt;</description>
      <pubDate>Fri, 17 Sep 2021 20:32:33 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69892#M107</guid>
      <dc:creator>LeoP1</dc:creator>
      <dc:date>2021-09-17T20:32:33Z</dc:date>
    </item>
    <item>
      <title>Re: XCC Dynamic VLAN Assignment</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69893#M108</link>
      <description>&lt;P&gt;Hi Leo,&lt;/P&gt;&lt;P&gt;ok; understand.&lt;/P&gt;&lt;P&gt;In this case you should open a Case.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Sep 2021 20:39:14 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-controller/xcc-dynamic-vlan-assignment/m-p/69893#M108</guid>
      <dc:creator>PeterK</dc:creator>
      <dc:date>2021-09-17T20:39:14Z</dc:date>
    </item>
  </channel>
</rss>

