<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: VLAN Assignment Policy Manager NAC in ExtremeCloud IQ- Site Engine Management Center</title>
    <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/vlan-assignment-policy-manager-nac/m-p/32599#M3482</link>
    <description>Hi Ronny,&lt;BR /&gt;
&lt;BR /&gt;
Contain to Vlan means  Allow. If You want to deny some traffic you have to explicit specify it as a blocking rule. &lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Tue, 16 Jun 2015 18:47:00 GMT</pubDate>
    <dc:creator>Piotr_Owczarek</dc:creator>
    <dc:date>2015-06-16T18:47:00Z</dc:date>
    <item>
      <title>VLAN Assignment Policy Manager NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/vlan-assignment-policy-manager-nac/m-p/32598#M3481</link>
      <description>Hi,&lt;BR /&gt;
&lt;BR /&gt;
i have one problem with vlan assignment and nac / policy manager.&lt;BR /&gt;
We are introducing a Extreme NAC Appliance.&lt;BR /&gt;
So at present the vlan information for a client is set in the Netsight Console.&lt;BR /&gt;
In the future we only want to assign a vlan for a client only at one position in network, only in the assigned role for example.&lt;BR /&gt;
So when i define a role, i can choose the standard operation for traffic that not matches any service rule. Only when i choose contain to vlan, the assigned vlan id that is configured on the switch is overwritten. But then i have the princip of a blacklist if i want to filter any traffic.&lt;BR /&gt;
How is it possible to invers that princip.&lt;BR /&gt;
I have been experimenting with the vlan egress tab in policy manager, but with this option you have the problem that the configured vlan on the switch must be consisent with the vlan chosen in policy manager. Additionally i have to say i only want to use untagged vlans.&lt;BR /&gt;
Is there any possibility to do this?&lt;BR /&gt;
&lt;BR /&gt;
Many thanks&lt;BR /&gt;
&lt;BR /&gt;
Ronny&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 16 Jun 2015 18:14:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/vlan-assignment-policy-manager-nac/m-p/32598#M3481</guid>
      <dc:creator>Ronny_Engelhard</dc:creator>
      <dc:date>2015-06-16T18:14:00Z</dc:date>
    </item>
    <item>
      <title>RE: VLAN Assignment Policy Manager NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/vlan-assignment-policy-manager-nac/m-p/32599#M3482</link>
      <description>Hi Ronny,&lt;BR /&gt;
&lt;BR /&gt;
Contain to Vlan means  Allow. If You want to deny some traffic you have to explicit specify it as a blocking rule. &lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 16 Jun 2015 18:47:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/vlan-assignment-policy-manager-nac/m-p/32599#M3482</guid>
      <dc:creator>Piotr_Owczarek</dc:creator>
      <dc:date>2015-06-16T18:47:00Z</dc:date>
    </item>
    <item>
      <title>RE: VLAN Assignment Policy Manager NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/vlan-assignment-policy-manager-nac/m-p/32600#M3483</link>
      <description>Hi,&lt;BR /&gt;
&lt;BR /&gt;
thanks for you comment.&lt;BR /&gt;
Yes i understand that but why is it not possible to invers that.&lt;BR /&gt;
My aim is to deny any traffic as default option and allow only specific traffic to one vlan.&lt;BR /&gt;
&lt;BR /&gt;
Ronny&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 16 Jun 2015 22:13:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/vlan-assignment-policy-manager-nac/m-p/32600#M3483</guid>
      <dc:creator>Ronny_Engelhard</dc:creator>
      <dc:date>2015-06-16T22:13:00Z</dc:date>
    </item>
    <item>
      <title>RE: VLAN Assignment Policy Manager NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/vlan-assignment-policy-manager-nac/m-p/32601#M3484</link>
      <description>It is not possible to ivert action of contain to vlan. But You can still use deny action with static port to clan assignment. You can also try to play with NAC profile and check if it will be possible to send both Enterasys policy and clan id in one profile.</description>
      <pubDate>Wed, 17 Jun 2015 02:10:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/vlan-assignment-policy-manager-nac/m-p/32601#M3484</guid>
      <dc:creator>Piotr_Owczarek</dc:creator>
      <dc:date>2015-06-17T02:10:00Z</dc:date>
    </item>
    <item>
      <title>RE: VLAN Assignment Policy Manager NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/vlan-assignment-policy-manager-nac/m-p/32602#M3485</link>
      <description>Another option would be to send back both VLAN Assignment (RFC 3580) and Policy assignment from NAC. You need to configure the switch to accept both in Policy Manager, but that should allow you to dynamically assign the VLAN and use any permit/deny rules needed. See attached images for where to allow this in Policy Manager and where to configure it in NAC.&lt;BR /&gt;
&lt;BR /&gt;
&lt;P class="fancybox-image"&gt;&lt;A href="https://d1uyvls174j03l.cloudfront.net/extremenetworks-us/attachment/RackMultipart20150617-26787-1k7fonm-Screen_Shot_2015-06-17_at_9.20.09_AM_inline.png" rel="image" class="fancybox"&gt;&lt;IMG src="https://d1uyvls174j03l.cloudfront.net/extremenetworks-us/attachment/RackMultipart20150617-26787-1k7fonm-Screen_Shot_2015-06-17_at_9.20.09_AM_inline.png" /&gt;&lt;/A&gt;&lt;/P&gt;&lt;BR /&gt;
&lt;BR /&gt;
&lt;P class="fancybox-image"&gt;&lt;A href="https://d1uyvls174j03l.cloudfront.net/extremenetworks-us/attachment/RackMultipart20150617-13757-18fvu5r-Screen_Shot_2015-06-17_at_9.20.54_AM_inline.png" rel="image" class="fancybox"&gt;&lt;IMG src="https://d1uyvls174j03l.cloudfront.net/extremenetworks-us/attachment/RackMultipart20150617-13757-18fvu5r-Screen_Shot_2015-06-17_at_9.20.54_AM_inline.png" /&gt;&lt;/A&gt;&lt;/P&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 17 Jun 2015 18:23:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/vlan-assignment-policy-manager-nac/m-p/32602#M3485</guid>
      <dc:creator>TylerMarcotte</dc:creator>
      <dc:date>2015-06-17T18:23:00Z</dc:date>
    </item>
    <item>
      <title>RE: VLAN Assignment Policy Manager NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/vlan-assignment-policy-manager-nac/m-p/32603#M3486</link>
      <description>Thanks a lot, think this will solve my problem.&lt;BR /&gt;
I will test it tomorrow.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 17 Jun 2015 21:43:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/vlan-assignment-policy-manager-nac/m-p/32603#M3486</guid>
      <dc:creator>Ronny_Engelhard</dc:creator>
      <dc:date>2015-06-17T21:43:00Z</dc:date>
    </item>
    <item>
      <title>RE: VLAN Assignment Policy Manager NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/vlan-assignment-policy-manager-nac/m-p/32604#M3487</link>
      <description>So i checked the Solution and it works indeed.&lt;BR /&gt;
&lt;BR /&gt;
Thank you for that solution!! </description>
      <pubDate>Thu, 18 Jun 2015 14:15:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/vlan-assignment-policy-manager-nac/m-p/32604#M3487</guid>
      <dc:creator>Ronny_Engelhard</dc:creator>
      <dc:date>2015-06-18T14:15:00Z</dc:date>
    </item>
  </channel>
</rss>

