<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: NAC Service Rule in ExtremeCloud IQ- Site Engine Management Center</title>
    <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/nac-service-rule/m-p/47044#M6533</link>
    <description>Hi Ronny,&lt;BR /&gt;
&lt;BR /&gt;
easy question first: The Difference between "IP Socket Destination" and "IP TCP Port Destination" is that the first will match on both UDP and TCP, while "IP TCP/UDP Port Destination" only match their respective protocol.&lt;BR /&gt;
&lt;BR /&gt;
As to your actual problem, I don't think building such a rule is possible. It seems like there is some kind of technical limitation as to how complex these policy rules can become.&lt;BR /&gt;
&lt;BR /&gt;
If your clients are not residing in the same subnet as the SSH servers (192.168.1.0 in your example), I guess the easiest workaround would be to block those SSH connections with an ACL on their gateway.&lt;BR /&gt;</description>
    <pubDate>Wed, 10 Jun 2015 20:02:00 GMT</pubDate>
    <dc:creator>Andre_K_</dc:creator>
    <dc:date>2015-06-10T20:02:00Z</dc:date>
    <item>
      <title>NAC Service Rule</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/nac-service-rule/m-p/47043#M6532</link>
      <description>Hi together,&lt;BR /&gt;
&lt;BR /&gt;
one quick question.&lt;BR /&gt;
I want to deny traffic for a specific Role in Policy Manager.&lt;BR /&gt;
So the aim is that traffic from that Role is denied if the Destination is for example&lt;BR /&gt;
the subnet 192.168.1.0/24 with Port 22 (SSH).&lt;BR /&gt;
I have tried to forbid this traffic with IP TCP Port Destination but it doesn't work for a subnet and also if i will insert a single host.&lt;BR /&gt;
Only IP Socket Destination denied that traffic for a single host but it was not possible to insert a complete subnet in this application mask.&lt;BR /&gt;
So where is my fault?&lt;BR /&gt;
Is it possible to deny such traffic for a complete destination subnet.&lt;BR /&gt;
I don't understand also the difference between IP Socket Destination and IP TCP Port Destination.&lt;BR /&gt;
&lt;BR /&gt;
Greetings Ronny</description>
      <pubDate>Wed, 10 Jun 2015 17:51:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/nac-service-rule/m-p/47043#M6532</guid>
      <dc:creator>Ronny_Engelhard</dc:creator>
      <dc:date>2015-06-10T17:51:00Z</dc:date>
    </item>
    <item>
      <title>RE: NAC Service Rule</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/nac-service-rule/m-p/47044#M6533</link>
      <description>Hi Ronny,&lt;BR /&gt;
&lt;BR /&gt;
easy question first: The Difference between "IP Socket Destination" and "IP TCP Port Destination" is that the first will match on both UDP and TCP, while "IP TCP/UDP Port Destination" only match their respective protocol.&lt;BR /&gt;
&lt;BR /&gt;
As to your actual problem, I don't think building such a rule is possible. It seems like there is some kind of technical limitation as to how complex these policy rules can become.&lt;BR /&gt;
&lt;BR /&gt;
If your clients are not residing in the same subnet as the SSH servers (192.168.1.0 in your example), I guess the easiest workaround would be to block those SSH connections with an ACL on their gateway.&lt;BR /&gt;</description>
      <pubDate>Wed, 10 Jun 2015 20:02:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/nac-service-rule/m-p/47044#M6533</guid>
      <dc:creator>Andre_K_</dc:creator>
      <dc:date>2015-06-10T20:02:00Z</dc:date>
    </item>
    <item>
      <title>RE: NAC Service Rule</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/nac-service-rule/m-p/47045#M6534</link>
      <description>Looks like it's only supported on some models... like WLAN Controller &amp;amp; K/S/Matrix series.&lt;BR /&gt;
So set the "rule type" to the device you are need the rule for and give it a try.&lt;BR /&gt;
&lt;BR /&gt;
Here the example for the K/S/Matrix series.....&lt;BR /&gt;
&lt;BR /&gt;
&lt;P class="fancybox-image"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="dd06c4ed945d4f3783b6de1694af7a0b_RackMultipart20150610-5122-16uvmgn-PM_rule_ssh_subnet_inline.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/4172i0D573B15A4C205B7/image-size/large?v=v2&amp;amp;px=999" role="button" title="dd06c4ed945d4f3783b6de1694af7a0b_RackMultipart20150610-5122-16uvmgn-PM_rule_ssh_subnet_inline.png" alt="dd06c4ed945d4f3783b6de1694af7a0b_RackMultipart20150610-5122-16uvmgn-PM_rule_ssh_subnet_inline.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 10 Jun 2015 23:40:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/nac-service-rule/m-p/47045#M6534</guid>
      <dc:creator>Ronald_Dvorak</dc:creator>
      <dc:date>2015-06-10T23:40:00Z</dc:date>
    </item>
    <item>
      <title>RE: NAC Service Rule</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/nac-service-rule/m-p/47046#M6535</link>
      <description>Hi,&lt;BR /&gt;
&lt;BR /&gt;
thanks for your answers.&lt;BR /&gt;
The Access Switch where the client is connected to, is a Enterasys B5 Switch.&lt;BR /&gt;
But i don't understand why this is not possible.&lt;BR /&gt;
I also tried to deny the traffic to the complete subnet, so the complete IP protocol.&lt;BR /&gt;
This works!&lt;BR /&gt;
But the limitation to tcp oder udp with a specific port is not possible.&lt;BR /&gt;
This is strange.&lt;BR /&gt;
&lt;BR /&gt;
Ronny</description>
      <pubDate>Wed, 10 Jun 2015 23:56:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/nac-service-rule/m-p/47046#M6535</guid>
      <dc:creator>Ronny_Engelhard</dc:creator>
      <dc:date>2015-06-10T23:56:00Z</dc:date>
    </item>
    <item>
      <title>RE: NAC Service Rule</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/nac-service-rule/m-p/47047#M6536</link>
      <description>Hi, &lt;BR /&gt;
&lt;BR /&gt;
 Building policy to block traffic to specified IP address or subnet is not possible in case of stackable switches (A/B/C/D). You can do it only for S/K series. It is like that because of limits of hardware. &lt;BR /&gt;
 It is also possible in case of wireless controllers. &lt;BR /&gt;
 So building such rule is generally possible but limited to specific models of switches. &lt;BR /&gt;
&lt;BR /&gt;
 Piotr</description>
      <pubDate>Thu, 11 Jun 2015 23:18:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/nac-service-rule/m-p/47047#M6536</guid>
      <dc:creator>Piotr_Owczarek</dc:creator>
      <dc:date>2015-06-11T23:18:00Z</dc:date>
    </item>
    <item>
      <title>RE: NAC Service Rule</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/nac-service-rule/m-p/47048#M6537</link>
      <description>Hi&lt;BR /&gt;
&lt;BR /&gt;
The policy rule would look as follows:&lt;BR /&gt;
&lt;BR /&gt;
set policy profile 3 name "Test" pvid-status enable pvid 4095&lt;BR /&gt;
set policy rule 3 ipdestsocket 192.168.100.0  mask 24 drop&lt;BR /&gt;
&lt;BR /&gt;
This will drop all traffic destined to 192.168.100.x/24.&lt;BR /&gt;
&lt;BR /&gt;
The policy can be applied to a individual port.&lt;BR /&gt;
&lt;BR /&gt;
The B5 supports the following Policy Features:&lt;BR /&gt;
&lt;P class="fancybox-image"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="e1b1e3e4572f4675ae6d835fff21da95_RackMultipart20150611-16576-1u46hf2-Capture_inline.jpg"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/1394i90D9CDCBD35A2D6C/image-size/large?v=v2&amp;amp;px=999" role="button" title="e1b1e3e4572f4675ae6d835fff21da95_RackMultipart20150611-16576-1u46hf2-Capture_inline.jpg" alt="e1b1e3e4572f4675ae6d835fff21da95_RackMultipart20150611-16576-1u46hf2-Capture_inline.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Fri, 12 Jun 2015 01:23:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/nac-service-rule/m-p/47048#M6537</guid>
      <dc:creator>Andre_Brits_Kan</dc:creator>
      <dc:date>2015-06-12T01:23:00Z</dc:date>
    </item>
  </channel>
</rss>

