<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Extreme Newbie - Question about NAC failure in ExtremeCloud IQ- Site Engine Management Center</title>
    <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-newbie-question-about-nac-failure/m-p/36609#M4237</link>
    <description>You can configure netlogin service unavailable vlan, that will put all new users in that vlan if the service (NAC) is unavailable.</description>
    <pubDate>Mon, 26 Sep 2016 12:44:00 GMT</pubDate>
    <dc:creator>OscarK</dc:creator>
    <dc:date>2016-09-26T12:44:00Z</dc:date>
    <item>
      <title>Extreme Newbie - Question about NAC failure</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-newbie-question-about-nac-failure/m-p/36604#M4232</link>
      <description>I am an Extreme newbie.  My college just implemented a new Extreme Networks infrastructure - core, edge, wireless, with NAC and Netsight.  I am a 20 year Cisco veteran and come from a port-based knowledge base.  &lt;BR /&gt;
&lt;BR /&gt;
NAC is completely new (and foreign) to me.  I like what it can do, and I love the information I'm gleaning into my network from Netsight.  However, i'm terrified of what will happen if the NAC controller goes down for any reason.  My sales engineer told me that the switches could be configured to fail open so that things would continue to work in the event that NAC wasn't in the middle - authenticating every entry onto the network.&lt;BR /&gt;
&lt;BR /&gt;
I need some pointers about where to go to configure this, and if it's possible.  Right now things are working ok, but I want to put in that safeguard so that things will still continue to function (without the security of course) when the controller goes down.&lt;BR /&gt;
&lt;BR /&gt;
I'm planning on taking training for all of the products - but my first class doesn't start until November - so I"m a little nervous in supporting this environment until I get some knowledge under my belt.&lt;BR /&gt;
&lt;BR /&gt;
Any and all comments would be welcome.&lt;BR /&gt;
&lt;BR /&gt;
Thank you.&lt;BR /&gt;
&lt;BR /&gt;
Mark Allen&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Sat, 24 Sep 2016 13:39:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-newbie-question-about-nac-failure/m-p/36604#M4232</guid>
      <dc:creator>Mark_Allen</dc:creator>
      <dc:date>2016-09-24T13:39:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Newbie - Question about NAC failure</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-newbie-question-about-nac-failure/m-p/36605#M4233</link>
      <description>Hi Mark.    Welcome to Extreme family. I am sure you will like it.    You can have more NAC-gateways (access control engine) so if one is not available the next will handle the request. All of those engines can be in active-active mode.    If there is no engine (radius server) available you can still define the behavior. The config of the port will apply. You need to define the netlogin mode as "optional" and you need to configure the port for the settings you would like to apply without radius available.    I can share some config examples with you later.    Regards.    Z.</description>
      <pubDate>Sat, 24 Sep 2016 14:58:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-newbie-question-about-nac-failure/m-p/36605#M4233</guid>
      <dc:creator>Zdeněk_Pala</dc:creator>
      <dc:date>2016-09-24T14:58:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Newbie - Question about NAC failure</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-newbie-question-about-nac-failure/m-p/36606#M4234</link>
      <description>Mark, &lt;BR /&gt;
Which models of Extreme switches are you using?</description>
      <pubDate>Sat, 24 Sep 2016 18:22:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-newbie-question-about-nac-failure/m-p/36606#M4234</guid>
      <dc:creator>Schmotter__Ryan</dc:creator>
      <dc:date>2016-09-24T18:22:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Newbie - Question about NAC failure</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-newbie-question-about-nac-failure/m-p/36607#M4235</link>
      <description>That would be great Z.  Thank you for the information.  Ryan, we are using Summit X450 switches I believe, and the Identify wifi</description>
      <pubDate>Sat, 24 Sep 2016 18:42:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-newbie-question-about-nac-failure/m-p/36607#M4235</guid>
      <dc:creator>Mark_Allen</dc:creator>
      <dc:date>2016-09-24T18:42:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Newbie - Question about NAC failure</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-newbie-question-about-nac-failure/m-p/36608#M4236</link>
      <description>This is the config I use in my lab. see ports 1-5 =&amp;gt; authentication is optional.&lt;BR /&gt;
If the radius server is not responding or sends reject then port config is used.&lt;BR /&gt;
If you want to not allow access then you need to send accept with specific policy profile &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;
&lt;BR /&gt;
Image   : ExtremeXOS version 21.1.1.4 21.1.1.4-patch1-5 by release-manager          on Thu Jun 16 14:19:33 EDT 2016&lt;BR /&gt;
BootROM : 1.0.2.1&lt;BR /&gt;
Diagnostics : 5.4&lt;BR /&gt;
&lt;BR /&gt;
Core-Lab-Network.5 # sh config policy#&lt;BR /&gt;
# Module policy configuration.&lt;BR /&gt;
#&lt;BR /&gt;
enable policy&lt;BR /&gt;
configure netlogin port 1 authentication mode optional&lt;BR /&gt;
configure netlogin port 2 authentication mode optional&lt;BR /&gt;
configure netlogin port 3 authentication mode optional&lt;BR /&gt;
configure netlogin port 4 authentication mode optional&lt;BR /&gt;
configure netlogin port 5 authentication mode optional&lt;BR /&gt;
configure policy profile 1 name "DMZ" pvid-status "enable" pvid 3530&lt;BR /&gt;
configure policy profile 2 name "MailServer" pvid-status "enable" pvid 3530 cos-status "enable" cos 1&lt;BR /&gt;
configure policy profile 3 name "WebServer" pvid-status "enable" pvid 3530&lt;BR /&gt;
configure policy profile 4 name "AD" pvid-status "enable" pvid 3530 cos-status "enable" cos 3&lt;BR /&gt;
configure policy profile 5 name "Deny Access" pvid-status "enable" pvid 3530&lt;BR /&gt;
configure policy profile 7 name "VDI" pvid-status "enable" pvid 3530 egress-vlans 3530&lt;BR /&gt;
configure policy profile 8 name "DCMDemokit" pvid-status "enable" pvid 3540 egress-vlans 3540&lt;BR /&gt;
configure policy rule 1 udpsourceportIP 67 mask 16 drop&lt;BR /&gt;
configure policy rule 1 tcpsourceportIP 3389 mask 16 cos 4&lt;BR /&gt;
configure policy rule 1 ipproto 1 mask 8 drop&lt;BR /&gt;
configure policy rule 2 udpsourceportIP 67 mask 16 drop&lt;BR /&gt;
configure policy rule 2 tcpsourceportIP 80 mask 16 drop&lt;BR /&gt;
configure policy rule 2 tcpsourceportIP 3389 mask 16 cos 4&lt;BR /&gt;
configure policy rule 3 udpsourceportIP 67 mask 16 drop&lt;BR /&gt;
configure policy rule 3 tcpsourceportIP 3389 mask 16 cos 4&lt;BR /&gt;
configure policy rule 5 ipproto 1 mask 8 drop&lt;BR /&gt;
configure policy rule 5 ipproto 6 mask 8 drop&lt;BR /&gt;
configure policy rule 5 ipproto 17 mask 8 drop&lt;BR /&gt;
Core-Lab-Network.5 # sh config netlogin&lt;BR /&gt;
#&lt;BR /&gt;
# Module netLogin configuration.&lt;BR /&gt;
#&lt;BR /&gt;
enable netlogin dot1x mac&lt;BR /&gt;
configure netlogin add mac-list ff:ff:ff:ff:ff:ff 48 encrypted "ckr'ptplsa"&lt;BR /&gt;
enable netlogin ports 1-6 mac&lt;BR /&gt;
configure netlogin mac ports 1 timers reauthentication on&lt;BR /&gt;
configure netlogin mac ports 2 timers reauthentication on&lt;BR /&gt;
configure netlogin mac ports 3 timers reauthentication on&lt;BR /&gt;
configure netlogin mac ports 4 timers reauthentication on&lt;BR /&gt;
configure netlogin mac ports 5 timers reauthentication on&lt;BR /&gt;
configure netlogin mac ports 6 timers reauthentication on&lt;BR /&gt;
Core-Lab-Network.6 # sh config aaa&lt;BR /&gt;
#&lt;BR /&gt;
# Module aaa configuration.&lt;BR /&gt;
#&lt;BR /&gt;
configure radius netlogin 1 server 192.168.10.31 1812 client-ip 192.168.10.1 vr VR-Default&lt;BR /&gt;
configure radius 1 shared-secret encrypted "#$KWL/jjCjiUsl/KlkJtR1Ag6ENmJDzLlN5CccJ4zm"&lt;BR /&gt;
enable radius&lt;BR /&gt;
disable radius mgmt-access&lt;BR /&gt;
enable radius netlogin&lt;BR /&gt;
configure radius timeout 15</description>
      <pubDate>Sat, 24 Sep 2016 18:42:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-newbie-question-about-nac-failure/m-p/36608#M4236</guid>
      <dc:creator>Zdeněk_Pala</dc:creator>
      <dc:date>2016-09-24T18:42:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Newbie - Question about NAC failure</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-newbie-question-about-nac-failure/m-p/36609#M4237</link>
      <description>You can configure netlogin service unavailable vlan, that will put all new users in that vlan if the service (NAC) is unavailable.</description>
      <pubDate>Mon, 26 Sep 2016 12:44:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-newbie-question-about-nac-failure/m-p/36609#M4237</guid>
      <dc:creator>OscarK</dc:creator>
      <dc:date>2016-09-26T12:44:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Newbie - Question about NAC failure</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-newbie-question-about-nac-failure/m-p/36610#M4238</link>
      <description>As Oscar stated there is also this option = if you do not use policy.  So you can choose </description>
      <pubDate>Mon, 26 Sep 2016 12:44:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-newbie-question-about-nac-failure/m-p/36610#M4238</guid>
      <dc:creator>Zdeněk_Pala</dc:creator>
      <dc:date>2016-09-26T12:44:00Z</dc:date>
    </item>
    <item>
      <title>RE: Extreme Newbie - Question about NAC failure</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-newbie-question-about-nac-failure/m-p/36611#M4239</link>
      <description>Mark,&lt;BR /&gt;
&lt;BR /&gt;
As Z mentioned above, you can add a redundant ExtremeControl (NAC) server to provide redundancy.  This is highly recommended and does not affect your client licensing, as this will be pooled between the servers. &lt;BR /&gt;
&lt;BR /&gt;
You can also leverage your existing RADIUS environment and add the RADIUS server(s) as a secondary or tertiary authentication source in your switch config.  This will allow RADIUS to handle authentication in the event that the NAC server(s) are down, which would be a reeeeeally rare event, but a simple safety net.  To that end, you'll probably want to configure VLAN containment using an Extreme VSA on the RADIUS server, so that devices are moved to the correct VLAN.   You don't get full policy, but you get the devices access to the network.  Generally, I'd default to a "data" VLAN for general network access and then leverage your service-specific VLAN's for easily identifiable devices, like VoIP phones.   I believe the vendor-specific VSA for extended VLAN's is 211. This VSA allows you to specify which VLAN's should be tagged or untagged and you can use the 802.1q number or name.  Name is particularly useful if you've standardized on a VLAN name per building/site, but have established a different tag number to segment the network.  Adding a "u" before the label will add the VLAN as untagged and a "t" will add it as tagged.  For example, "u201" would add VLAN 201 as untagged or "tvoice" would add VLAN "voice" as tagged to the authenticating port for that MAC address.  You can use a delimiter to add multiple VLAN's to the port if needed, but generally clients are only configured for a single VLAN outside the data center. &lt;BR /&gt;
&lt;BR /&gt;
These links on Extreme's support site may be useful.&lt;BR /&gt;
&lt;BR /&gt;
&lt;A href="https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-assign-VLAN-to-a-MAC-based-netlogin-port-while-using-radius-server-for-Authentication/" target="_blank" rel="nofollow noreferrer noopener"&gt;https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-assign-VLAN-to-a-MAC-based-netlogin...&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
&lt;A href="https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-configure-802-1x-based-Netlogin-with-Radius-on-EXOS/" target="_blank" rel="nofollow noreferrer noopener"&gt;https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-configure-802-1x-based-Netlogin-wit...&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
Regards, Scott</description>
      <pubDate>Tue, 27 Sep 2016 06:46:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-newbie-question-about-nac-failure/m-p/36611#M4239</guid>
      <dc:creator>Scott_Singer1</dc:creator>
      <dc:date>2016-09-27T06:46:00Z</dc:date>
    </item>
  </channel>
</rss>

