<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Extreme Control Rule and AD in ExtremeCloud IQ- Site Engine Management Center</title>
    <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67593#M7917</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to create Extreme Control rule sets for MAC and .1x authentication.&lt;/P&gt;&lt;P&gt;Is there not a way I can add a group condition to query a LDAP/AD Domain group?&lt;/P&gt;&lt;P&gt;I can see there is an option for&amp;nbsp;LDAP user groups.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, do Extreme offer some sort of downloadable config for updating DHCP&amp;nbsp;fingerprints.&lt;/P&gt;&lt;P&gt;Its really tedious&amp;nbsp;to have to go in and add lines of code to add custom fingerprints, not to mention having to hunt through a log file to get them in the first place.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One other thing, any ideas/thoughts on being able to add if/or conditions into the same rule?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ian&lt;/P&gt;</description>
    <pubDate>Tue, 29 Sep 2020 21:52:52 GMT</pubDate>
    <dc:creator>Ian_Broadway</dc:creator>
    <dc:date>2020-09-29T21:52:52Z</dc:date>
    <item>
      <title>Extreme Control Rule and AD</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67593#M7917</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to create Extreme Control rule sets for MAC and .1x authentication.&lt;/P&gt;&lt;P&gt;Is there not a way I can add a group condition to query a LDAP/AD Domain group?&lt;/P&gt;&lt;P&gt;I can see there is an option for&amp;nbsp;LDAP user groups.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, do Extreme offer some sort of downloadable config for updating DHCP&amp;nbsp;fingerprints.&lt;/P&gt;&lt;P&gt;Its really tedious&amp;nbsp;to have to go in and add lines of code to add custom fingerprints, not to mention having to hunt through a log file to get them in the first place.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One other thing, any ideas/thoughts on being able to add if/or conditions into the same rule?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ian&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 21:52:52 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67593#M7917</guid>
      <dc:creator>Ian_Broadway</dc:creator>
      <dc:date>2020-09-29T21:52:52Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme Control Rule and AD</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67594#M7918</link>
      <description>&lt;P&gt;ok, just read 8.5 release notes, alot more functionality for DHCP fingerprinting.&lt;/P&gt;&lt;P&gt;other concerns still stand though if anyone has any thoughts please.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 22:00:23 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67594#M7918</guid>
      <dc:creator>Ian_Broadway</dc:creator>
      <dc:date>2020-09-29T22:00:23Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme Control Rule and AD</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67595#M7919</link>
      <description>&lt;P&gt;Ian,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Yes you can create a condition to trigger a rule based on an LDAP group	&lt;OL&gt;&lt;LI&gt;&lt;A href="https://gtacknowledge.extremenetworks.com/articles/How_To/How-To-Match-NAC-LDAP-Lookup-To-Active-Directory-Windows-Security-Group" target="_blank" rel="nofollow noreferrer noopener"&gt;https://gtacknowledge.extremenetworks.com/articles/How_To/How-To-Match-NAC-LDAP-Lookup-To-Active-Directory-Windows-Security-Group&lt;/A&gt;&lt;/LI&gt;		&lt;LI&gt;&lt;A href="https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-authorise-Windows-domain-user-computer-using-802-1x-and-LDAP-lookups-to-ensure-the-user-AND-computer-is-in-the-domain-denying-access-to-users-with-valid-domain-credentials-on-BYOD-devices" target="_blank" rel="nofollow noreferrer noopener"&gt;https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-authorise-Windows-domain-user-computer-using-802-1x-and-LDAP-lookups-to-ensure-the-user-AND-computer-is-in-the-domain-denying-access-to-users-with-valid-domain-credentials-on-BYOD-devices&lt;/A&gt;&lt;/LI&gt;		&lt;LI&gt;an others articles&lt;/LI&gt;	&lt;/OL&gt;&lt;/LI&gt;	&lt;LI&gt;I don’t know for the DHCP fingerprint tool&lt;/LI&gt;	&lt;LI&gt;You can add if/or at different levels	&lt;OL&gt;&lt;LI&gt;In the group definition		&lt;OL&gt;&lt;LI&gt;			&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="bfd4bf0d04b44cc99956f9ac0b8bf186_6b431037-8ac9-4132-a46c-8bf4314bedef.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/5136i19EFE3C77C1A5D13/image-size/large?v=v2&amp;amp;px=999" role="button" title="bfd4bf0d04b44cc99956f9ac0b8bf186_6b431037-8ac9-4132-a46c-8bf4314bedef.png" alt="bfd4bf0d04b44cc99956f9ac0b8bf186_6b431037-8ac9-4132-a46c-8bf4314bedef.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;/LI&gt;			&lt;LI&gt;in the policy mappings (a Location Group lookup will trigger the return values)&lt;/LI&gt;		&lt;/OL&gt;&lt;/LI&gt;	&lt;/OL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mig&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 22:05:48 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67595#M7919</guid>
      <dc:creator>Miguel-Angel_RO</dc:creator>
      <dc:date>2020-09-29T22:05:48Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme Control Rule and AD</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67596#M7920</link>
      <description>&lt;P&gt;Hi Ian,&lt;/P&gt;&lt;P&gt;of course there is! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="3f1449db7f7c46e9b32ac302d0447323_1f4fd0ec-39e6-4e55-8f54-51daff91464c.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/1851i5C1D47FB46F37C7A/image-size/large?v=v2&amp;amp;px=999" role="button" title="3f1449db7f7c46e9b32ac302d0447323_1f4fd0ec-39e6-4e55-8f54-51daff91464c.png" alt="3f1449db7f7c46e9b32ac302d0447323_1f4fd0ec-39e6-4e55-8f54-51daff91464c.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;This user group is used in a NAC-Rule to allow the CLI-Access to network switches for the configured AD-Group (which is censored in the screen).&lt;/P&gt;&lt;P&gt;Can of course also used in combination with MAC and Dot1x Auth.&lt;/P&gt;&lt;P&gt;Edit: Dang, much too slow.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 22:16:48 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67596#M7920</guid>
      <dc:creator>Stefan_K_</dc:creator>
      <dc:date>2020-09-29T22:16:48Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme Control Rule and AD</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67597#M7921</link>
      <description>&lt;P&gt;are you able to use an attribute that isnt returned by the device used for testing the connection?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I picked my host for example of which I know what domain groups it belongs to.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is it just a memberof attribute you can use? or can you use something else?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried to reference a rule with a memberof attribute and tested on a specific client to which i took the value knowing that client is in that AD group&amp;nbsp;and then specifically tried to get that client to match but it never did.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 21:07:55 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67597#M7921</guid>
      <dc:creator>Ian_Broadway</dc:creator>
      <dc:date>2020-09-30T21:07:55Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme Control Rule and AD</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67598#M7922</link>
      <description>&lt;P&gt;Ian,&lt;/P&gt;&lt;P&gt;You can use any attribute refering the object in the AD.&lt;/P&gt;&lt;P&gt;Your missed test is probably a syntax isue.&lt;/P&gt;&lt;P&gt;Here an example for the memberOf attribute&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="1816eb79114743a9bb58ed3eeabcfc24_9fb87a0a-ff8d-4c5b-89be-f07f77194147.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/5841iA2A38653E89A95BB/image-size/large?v=v2&amp;amp;px=999" role="button" title="1816eb79114743a9bb58ed3eeabcfc24_9fb87a0a-ff8d-4c5b-89be-f07f77194147.png" alt="1816eb79114743a9bb58ed3eeabcfc24_9fb87a0a-ff8d-4c5b-89be-f07f77194147.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you want to use another attribute, just change the name of the attribute&lt;/P&gt;&lt;P&gt;Mig&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 21:14:23 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67598#M7922</guid>
      <dc:creator>Miguel-Angel_RO</dc:creator>
      <dc:date>2020-09-30T21:14:23Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme Control Rule and AD</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67599#M7923</link>
      <description>&lt;P&gt;we have a group for Domain computers, when I browse AD i can see my host is a member of 3 groups, one being Domain Computers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to use this group to&amp;nbsp;reference as a memberOf attribute in the LDAP host group and then use this as a condition in the rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;when I test my host it only reports back the other two groups under the memberOf attribute.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I’ve asked my AD guys if they can think of why it doesn't report the Domain Computers back as a value, see below;&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="8aa9208115cd46f09dd0e276259c96e2_19113eef-fa48-43d9-adbf-ede8dea02cb0.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/754i8951B754CD9EEBCA/image-size/large?v=v2&amp;amp;px=999" role="button" title="8aa9208115cd46f09dd0e276259c96e2_19113eef-fa48-43d9-adbf-ede8dea02cb0.png" alt="8aa9208115cd46f09dd0e276259c96e2_19113eef-fa48-43d9-adbf-ede8dea02cb0.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="8aa9208115cd46f09dd0e276259c96e2_6fd7e672-459c-4e96-86a1-4d76abb8c58f.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/4036iABC50BC1507D5996/image-size/large?v=v2&amp;amp;px=999" role="button" title="8aa9208115cd46f09dd0e276259c96e2_6fd7e672-459c-4e96-86a1-4d76abb8c58f.png" alt="8aa9208115cd46f09dd0e276259c96e2_6fd7e672-459c-4e96-86a1-4d76abb8c58f.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;doesnt report the Domain Computers value. They’re all security groups.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I’m told the account used in the LDAP config has read access to the Domain, perhaps this is not enough?&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 21:42:14 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67599#M7923</guid>
      <dc:creator>Ian_Broadway</dc:creator>
      <dc:date>2020-09-30T21:42:14Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme Control Rule and AD</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67600#M7924</link>
      <description>&lt;P&gt;Indeed:&amp;nbsp;&lt;A href="https://gtacknowledge.extremenetworks.com/articles/Q_A/Active-Directory-Permissions-For-NAC-NTLM-Authentication/" target="_blank" rel="nofollow noreferrer noopener"&gt;https://gtacknowledge.extremenetworks.com/articles/Q_A/Active-Directory-Permissions-For-NAC-NTLM-Authentication/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Mig&lt;/P&gt;&lt;P&gt;Indeed:&amp;nbsp;&lt;A href="https://gtacknowledge.extremenetworks.com/articles/Q_A/Active-Directory-Permissions-For-NAC-NTLM-Authentication/" target="_blank" rel="nofollow noreferrer noopener"&gt;https://gtacknowledge.extremenetworks.com/articles/Q_A/Active-Directory-Permissions-For-NAC-NTLM-Authentication/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Mig&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 21:46:50 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67600#M7924</guid>
      <dc:creator>Miguel-Angel_RO</dc:creator>
      <dc:date>2020-09-30T21:46:50Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme Control Rule and AD</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67601#M7925</link>
      <description>&lt;P&gt;Ian,&lt;/P&gt;&lt;P&gt;You need to adapt the user rights with this:&amp;nbsp;&lt;A href="https://gtacknowledge.extremenetworks.com/articles/Q_A/Active-Directory-Permissions-For-NAC-NTLM-Authentication/" target="_blank" rel="nofollow noreferrer noopener"&gt;https://gtacknowledge.extremenetworks.com/articles/Q_A/Active-Directory-Permissions-For-NAC-NTLM-Authentication/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Mig&lt;/P&gt;</description>
      <pubDate>Wed, 30 Sep 2020 21:47:28 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67601#M7925</guid>
      <dc:creator>Miguel-Angel_RO</dc:creator>
      <dc:date>2020-09-30T21:47:28Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme Control Rule and AD</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67602#M7926</link>
      <description>&lt;P&gt;Thank you, i’ll ask the AD guys to check the account permissions for the account used for the LDAP config.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Oct 2020 13:42:57 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67602#M7926</guid>
      <dc:creator>Ian_Broadway</dc:creator>
      <dc:date>2020-10-01T13:42:57Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme Control Rule and AD</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67603#M7927</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;for some rule components you have “OR” and “AND” already:&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="c34745203f6b4c3faeed7b37bcfbf3dd_97cd5ef1-e701-4258-9d27-8948930556e1.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/1186i3E32D79C049E9ABC/image-size/large?v=v2&amp;amp;px=999" role="button" title="c34745203f6b4c3faeed7b37bcfbf3dd_97cd5ef1-e701-4258-9d27-8948930556e1.png" alt="c34745203f6b4c3faeed7b37bcfbf3dd_97cd5ef1-e701-4258-9d27-8948930556e1.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;regarding the DHCP fingerprinting, here is a new &lt;A href="https://github.com/extremenetworks/XMC-Report-Views/blob/master/Fingerprints/README.md" target="_blank" rel="nofollow noreferrer noopener"&gt;GitHub&amp;nbsp;repository&lt;/A&gt;. Feel free to contribute &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Oct 2020 15:53:17 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67603#M7927</guid>
      <dc:creator>Zdeněk_Pala</dc:creator>
      <dc:date>2020-10-01T15:53:17Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme Control Rule and AD</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67604#M7928</link>
      <description>&lt;P&gt;I think the problem of Ian ist, that Extreme Control does not support checking ldap attributes of nested group memberships.&lt;/P&gt;&lt;P&gt;You can only check ldap attributes where the account is direct assigned&lt;/P&gt;</description>
      <pubDate>Thu, 01 Oct 2020 16:45:58 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67604#M7928</guid>
      <dc:creator>PeterK</dc:creator>
      <dc:date>2020-10-01T16:45:58Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme Control Rule and AD</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67605#M7929</link>
      <description>&lt;P&gt;If Nested Groups are used then you need to add each nested group to the list and use mode “Match Any”. I saw a customer automated this task through API calls.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Oct 2020 17:12:41 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67605#M7929</guid>
      <dc:creator>Zdeněk_Pala</dc:creator>
      <dc:date>2020-10-01T17:12:41Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme Control Rule and AD</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67606#M7930</link>
      <description>&lt;P&gt;If Nested Groups are used then you need to add each nested group to the list and use mode “Match Any”. I saw a customer automated this task through API calls.&lt;/P&gt;	&lt;P&gt;Of course, but this is only a dirty workaround and not a solution.&amp;nbsp;I hope Extreme will support this in the future.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Oct 2020 17:41:54 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67606#M7930</guid>
      <dc:creator>PeterK</dc:creator>
      <dc:date>2020-10-01T17:41:54Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme Control Rule and AD</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67607#M7931</link>
      <description>&lt;P&gt;Its not a nested group actually but if im honest anything that makes the integration better is a win for sure, its a global security group that sits in an OU along with other security groups. It does not belong to other groups.&lt;/P&gt;&lt;P&gt;Its the group all domain joined PCs/Laptops become&amp;nbsp;a member of when joined to the domain.&lt;/P&gt;&lt;P&gt;the other groups i referenced above are also part of the same OU yet the host only reports the memberOf attributes of the other two groups, not the domain computers one.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Still waiting on the permissions check with the account used in&amp;nbsp;the LDAP config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will let you know if this solves it.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Oct 2020 21:48:33 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67607#M7931</guid>
      <dc:creator>Ian_Broadway</dc:creator>
      <dc:date>2020-10-01T21:48:33Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme Control Rule and AD</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67608#M7932</link>
      <description>&lt;P&gt;Yep looks like it could well be an account issue as getting this error on the Appliance&lt;/P&gt;&lt;P&gt;2020-10-01 15:58:41,919 ERROR [com.enterasys.tesNb.server.freeradius.files.SambaInstallationManager] (EnforceHandler - Off Thread Notify Listeners0:) Failed to join domain: "removed" for user: "removed" with error code: 255&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; ADS join did not work, falling back to RPC...&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Failed to join domain: User specified does not have administrator privileges&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Failed to join domain: failed to find DC for domain “removed”&amp;nbsp;- {Operation Failed} The requested operation was unsuccessful.&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Oct 2020 22:04:51 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67608#M7932</guid>
      <dc:creator>Ian_Broadway</dc:creator>
      <dc:date>2020-10-01T22:04:51Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme Control Rule and AD</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67609#M7933</link>
      <description>&lt;P&gt;So is there a way you can make the conditions in a rule be or conditions?&lt;/P&gt;&lt;P&gt;At the moment any conditions in the rule all have to be matched?&lt;/P&gt;&lt;P&gt;For example I have a rule for Medical devices. I would like it so that if Fingerprinting determines its&amp;nbsp; “medical device” it will hit this rule or if its part of a certain vlan/subnet to which I know for a fact is solely for medical devices&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="d6f93f818dd94313926be210307c4af1_6f2366fd-8b43-4d3d-a1d3-576d90870e90.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/2871i3FC238A988857E50/image-size/large?v=v2&amp;amp;px=999" role="button" title="d6f93f818dd94313926be210307c4af1_6f2366fd-8b43-4d3d-a1d3-576d90870e90.png" alt="d6f93f818dd94313926be210307c4af1_6f2366fd-8b43-4d3d-a1d3-576d90870e90.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;or do i have to have multiple rules to be able to capture this behaviour?&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 19:20:13 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67609#M7933</guid>
      <dc:creator>Ian_Broadway</dc:creator>
      <dc:date>2020-10-08T19:20:13Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme Control Rule and AD</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67610#M7934</link>
      <description>&lt;P&gt;Ian,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A workaround could be to define a new devicegroup including all the fingerprints you are looking for and match this group.&lt;/P&gt;&lt;P&gt;Mig&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 19:26:37 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67610#M7934</guid>
      <dc:creator>Miguel-Angel_RO</dc:creator>
      <dc:date>2020-10-08T19:26:37Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme Control Rule and AD</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67611#M7935</link>
      <description>&lt;P&gt;thats fine but the issue is the manual process of adding fingerprints.&lt;/P&gt;&lt;P&gt;some things on the Medical subnet might not be classed as a medical device based on the default fingerprints, hence the reason to reference the multiple conditions in a rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;would be ideal if the invert option was alongside an or and an and statement.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Oct 2020 15:22:30 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67611#M7935</guid>
      <dc:creator>Ian_Broadway</dc:creator>
      <dc:date>2020-10-09T15:22:30Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme Control Rule and AD</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67612#M7936</link>
      <description>&lt;P&gt;ok, so back on topic, as a test, the account used to join the EAC appliances to the domain/used in the ldap configuration&amp;nbsp;was given full domain admin rights.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When testing it still couldnt see the host device return the memberof attribute for the “domain computers” group. it worked for all other member groups as mentioned in an earlier host.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;any ideas?&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 20:29:24 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/extreme-control-rule-and-ad/m-p/67612#M7936</guid>
      <dc:creator>Ian_Broadway</dc:creator>
      <dc:date>2020-10-12T20:29:24Z</dc:date>
    </item>
  </channel>
</rss>

