<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Block Access Points with NAC in ExtremeCloud IQ- Site Engine Management Center</title>
    <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/block-access-points-with-nac/m-p/41228#M5180</link>
    <description>I'm trying to create a nac rule to block students from putting access points on our network and extending our network unsecurely.  I think I could key of of Device Type but don't see any matching type.  Is there a way to add types to the system?</description>
    <pubDate>Thu, 31 Aug 2017 22:57:00 GMT</pubDate>
    <dc:creator>Matthew_Perry</dc:creator>
    <dc:date>2017-08-31T22:57:00Z</dc:date>
    <item>
      <title>Block Access Points with NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/block-access-points-with-nac/m-p/41228#M5180</link>
      <description>I'm trying to create a nac rule to block students from putting access points on our network and extending our network unsecurely.  I think I could key of of Device Type but don't see any matching type.  Is there a way to add types to the system?</description>
      <pubDate>Thu, 31 Aug 2017 22:57:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/block-access-points-with-nac/m-p/41228#M5180</guid>
      <dc:creator>Matthew_Perry</dc:creator>
      <dc:date>2017-08-31T22:57:00Z</dc:date>
    </item>
    <item>
      <title>RE: Block Access Points with NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/block-access-points-with-nac/m-p/41229#M5181</link>
      <description>Hello, are you using Extreme for your wireless? If so, this is something you can do easily with Radar (rogue AP detection).</description>
      <pubDate>Thu, 31 Aug 2017 23:09:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/block-access-points-with-nac/m-p/41229#M5181</guid>
      <dc:creator>Steve_Ballantyn</dc:creator>
      <dc:date>2017-08-31T23:09:00Z</dc:date>
    </item>
    <item>
      <title>RE: Block Access Points with NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/block-access-points-with-nac/m-p/41230#M5182</link>
      <description>We are, but we're not only concerned with wireless access.  We would like to use NAC to block wired switches/routers as well.</description>
      <pubDate>Fri, 01 Sep 2017 01:23:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/block-access-points-with-nac/m-p/41230#M5182</guid>
      <dc:creator>Joshua_Puusep</dc:creator>
      <dc:date>2017-09-01T01:23:00Z</dc:date>
    </item>
    <item>
      <title>RE: Block Access Points with NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/block-access-points-with-nac/m-p/41231#M5183</link>
      <description>Hello,&lt;BR /&gt;
we are using NAC with MAC authentication.&lt;BR /&gt;
Known MAC address are in End Systems group and our rules "move" the devices into a VLAN and the device get access.&lt;BR /&gt;
The rules looks like "if the MAC address of the device is in a End System Group and the authentication type is MAC then use the accept policy ...".&lt;BR /&gt;
If no rules match the last rule is the catch-all rule that will collect all unknown devices.&lt;BR /&gt;
And our catch-all rule will put all devices in our guest vlan. But in your case I would change it that all unknown MAC address will deny.&lt;BR /&gt;
So you don't need to deny special address and catch-all unknown devices.&lt;BR /&gt;
I hope this will help you,&lt;BR /&gt;
Axel&lt;BR /&gt;</description>
      <pubDate>Fri, 01 Sep 2017 11:15:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/block-access-points-with-nac/m-p/41231#M5183</guid>
      <dc:creator>ar1</dc:creator>
      <dc:date>2017-09-01T11:15:00Z</dc:date>
    </item>
    <item>
      <title>RE: Block Access Points with NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/block-access-points-with-nac/m-p/41232#M5184</link>
      <description>The system IDs the device via DHCP fingerprinting.&lt;BR /&gt;
&lt;BR /&gt;
In the past I've used the below article to create a GTAC ticket so unknown devices could get implemented into the system.&lt;BR /&gt;
&lt;BR /&gt;
&lt;A href="https://gtacknowledge.extremenetworks.com/articles/How_To/NAC-Troubleshooting-Tips-Debug-Methodology-For-OS-Detection" target="_blank" rel="nofollow noreferrer noopener"&gt;https://gtacknowledge.extremenetworks.com/articles/How_To/NAC-Troubleshooting-Tips-Debug-Methodology...&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
In your case I don't think that would work as there are too many AP vendors out to ID them all correctly.</description>
      <pubDate>Fri, 01 Sep 2017 14:18:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/block-access-points-with-nac/m-p/41232#M5184</guid>
      <dc:creator>Ronald_Dvorak</dc:creator>
      <dc:date>2017-09-01T14:18:00Z</dc:date>
    </item>
    <item>
      <title>RE: Block Access Points with NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/block-access-points-with-nac/m-p/41233#M5185</link>
      <description>That's pretty much what I thought.  We were hoping to get at least some of the vendors in the system preemptively before school starts.  Thanks for the article.</description>
      <pubDate>Fri, 01 Sep 2017 14:18:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/block-access-points-with-nac/m-p/41233#M5185</guid>
      <dc:creator>Joshua_Puusep</dc:creator>
      <dc:date>2017-09-01T14:18:00Z</dc:date>
    </item>
    <item>
      <title>RE: Block Access Points with NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/block-access-points-with-nac/m-p/41234#M5186</link>
      <description>I've wrote an article on how to create DHCP fingerprints....&lt;BR /&gt;
&lt;BR /&gt;
&lt;A href="https://community.extremenetworks.com/extreme/topics/create-a-extremecontrol-nac-dhcp-fingerprint" target="_blank" rel="nofollow noreferrer noopener"&gt;https://community.extremenetworks.com/extreme/topics/create-a-extremecontrol-nac-dhcp-fingerprint&lt;/A&gt;</description>
      <pubDate>Fri, 01 Sep 2017 19:09:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/block-access-points-with-nac/m-p/41234#M5186</guid>
      <dc:creator>Ronald_Dvorak</dc:creator>
      <dc:date>2017-09-01T19:09:00Z</dc:date>
    </item>
  </channel>
</rss>

