<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 802.1x rejected then being approved via MAC auth in ExtremeCloud IQ- Site Engine Management Center</title>
    <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/802-1x-rejected-then-being-approved-via-mac-auth/m-p/68597#M8035</link>
    <description>&lt;P&gt;HI Martin.&lt;/P&gt;&lt;P&gt;you are correct. if the upstream radius does reject then AccessControl Engine does pass reject to the radius client (switch/AP/VPN).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would handle MAC authentications locally =&amp;gt; you can fully control&amp;nbsp;it by ExtremeControl configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We can create workflow/script that will automatically reject MACauth if the dot1X reject&amp;nbsp;is received by upstream radius server, but I am sure the customer will not like this solution as it may have consequences (guest access, the wrong password entered, expired certificate...). How would the customer want to recover from such a situation? like one reject will stop MAC-auth but when it will start again?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 27 Oct 2019 02:44:40 GMT</pubDate>
    <dc:creator>Zdeněk_Pala</dc:creator>
    <dc:date>2019-10-27T02:44:40Z</dc:date>
    <item>
      <title>802.1x rejected then being approved via MAC auth</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/802-1x-rejected-then-being-approved-via-mac-auth/m-p/68592#M8030</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I’m sure this one is easy and is starring me in the face or missing something.&lt;/P&gt;&lt;P&gt;The screenshot below shows a 802.1x client being rejected as intended. The authentication is being proxied to an external RADIUS server.&lt;/P&gt;&lt;P&gt;What then seems to be happening is the end-system is getting on the network via MAC auth, and&amp;nbsp;then hitting a rule&amp;nbsp;as designed. But what is really meant to happen is the reject is meant to&amp;nbsp;mean a reject when authenticating the first time around until the port state changes, thereby stopping access based on the failed 802.1x authentication.&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="bcd6f4d22af24f6fa94e17b412c73f63_daad54e7-3038-4771-8545-3a11a64453c8.jpg"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/4712i51889E1D1CDDB5DA/image-size/large?v=v2&amp;amp;px=999" role="button" title="bcd6f4d22af24f6fa94e17b412c73f63_daad54e7-3038-4771-8545-3a11a64453c8.jpg" alt="bcd6f4d22af24f6fa94e17b412c73f63_daad54e7-3038-4771-8545-3a11a64453c8.jpg" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apologies I don’t have&amp;nbsp;the exact versions of firmware to hand, but can get&amp;nbsp;if required, but XMC&amp;nbsp;running version 8.3&amp;nbsp;and&amp;nbsp;EOS on the switches&lt;/P&gt;&lt;P&gt;The port is configured to do 802.1x / MAC / Web authentication.&lt;/P&gt;&lt;P&gt;My understanding here might not be completely right, but I’m expecting EAPOL traffic between the client and the switch, and on a RADIUS reject from the Authentication Server to the Authenticator (switch) the port should be denied access, and this looks like what seems to be happening from the screenshot&amp;nbsp;and wireshark captures taken from NAC.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I don’t understand if the supplicant is configured for 802.1x then only EAPOL traffic should be sent between it&amp;nbsp;and the switch, how is able to pass traffic for the switch to be able to do MAC auth - does that mean this is a client issue, if so, being a Windows machine, what setting might correct it?&lt;/P&gt;&lt;P&gt;Many thanks in advance&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2019 20:48:13 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/802-1x-rejected-then-being-approved-via-mac-auth/m-p/68592#M8030</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2019-10-24T20:48:13Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x rejected then being approved via MAC auth</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/802-1x-rejected-then-being-approved-via-mac-auth/m-p/68593#M8031</link>
      <description>&lt;P&gt;Hi Martin.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IMHO it is FAD for many platforms. E.g. on EXOS you have both MACauth and Dot1x running at the same time. On Cisco you have MAB&amp;nbsp;following the Dot1x fails&lt;/P&gt;&lt;P&gt;The reason for this behavior:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;imagine guest will connect to your network and the guest does have a supplicant configure for his network. Authentication will be rejected (your network does not have credentials for that guest). You still want to provide the guest with the captive portal.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;If you want different behavior then you should configure the NAC to reject MAC authentication based on some criteria&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Oct 2019 01:32:04 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/802-1x-rejected-then-being-approved-via-mac-auth/m-p/68593#M8031</guid>
      <dc:creator>Zdeněk_Pala</dc:creator>
      <dc:date>2019-10-25T01:32:04Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x rejected then being approved via MAC auth</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/802-1x-rejected-then-being-approved-via-mac-auth/m-p/68594#M8032</link>
      <description>&lt;P&gt;Hi Zdenek,&lt;/P&gt;&lt;P&gt;Thanks for replying.&lt;/P&gt;&lt;P&gt;Wow, right, not obviously ever occurred to me, but makes sense.&lt;/P&gt;&lt;P&gt;In addition (as you allude too)&amp;nbsp;we could&amp;nbsp;turn off MAC auth on the port altogether, but think they use phones for that, unless&amp;nbsp;we can get them to do some kind of 802.1x also?&lt;/P&gt;&lt;P&gt;I’ve used CEP authentication with phones before in EXOS,&amp;nbsp;maybe use IDM to get data into NAC…..clutching at straws now…..&lt;/P&gt;&lt;P&gt;Be good to have an EXOS command that simply overrides the ‘Guest’ feature, with a reject staying as a reject until link state - maybe a feature request?&lt;/P&gt;&lt;P&gt;Now I know the reason its easier to think of ways to overcome it.&lt;/P&gt;&lt;P&gt;Much appreciated.&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Oct 2019 04:43:01 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/802-1x-rejected-then-being-approved-via-mac-auth/m-p/68594#M8032</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2019-10-25T04:43:01Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x rejected then being approved via MAC auth</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/802-1x-rejected-then-being-approved-via-mac-auth/m-p/68595#M8033</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if you do not want the “Guest” feature then you can:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;configure NAC to answer for all phones (end-system group or OUI) with VoIP policy/vlan&lt;/LI&gt;	&lt;LI&gt;combine the above OUI and device type (have in mind that the device type is detected after the first successful authentication )&lt;/LI&gt;	&lt;LI&gt;configure NAC to answer for all other MAC auth requests to reject&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;It is very flexible = you can define what behavior you want and where...&lt;/P&gt;</description>
      <pubDate>Fri, 25 Oct 2019 13:18:56 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/802-1x-rejected-then-being-approved-via-mac-auth/m-p/68595#M8033</guid>
      <dc:creator>Zdeněk_Pala</dc:creator>
      <dc:date>2019-10-25T13:18:56Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x rejected then being approved via MAC auth</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/802-1x-rejected-then-being-approved-via-mac-auth/m-p/68596#M8034</link>
      <description>&lt;P&gt;Hi Zdenek,&lt;/P&gt;&lt;P&gt;Thanks for the info.&lt;/P&gt;&lt;P&gt;Think the customer was trying to be a little more blunt with the configuration,&amp;nbsp;because they are&amp;nbsp;using RADIUS proxy they wanted a reject from their RADIUS server to be a reject and stop there. As the reject is coming back at the authentication stage it doesn’t then pass to the NAC rule engine to do what you mentioned above.&lt;/P&gt;&lt;P&gt;Suggested a couple of things i.e.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Put&amp;nbsp;in an authentication rule to allow local authentication and then pass directly onto the rule engine.&lt;/LI&gt;	&lt;LI&gt;Have the External RADIUS server return an accept with a ‘Filter-ID’ that matches a deny rule.&lt;/LI&gt;	&lt;LI&gt;Disable MAC auth on the port (believe this isn’t an option in their case)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Maybe there is a couple more ideas?&lt;/P&gt;&lt;P&gt;So I can hopefully contributing something helpful back too, what you describe is typically how I would configure things, a separate rule for each MAC auth device. With MAC auth being a&amp;nbsp;weaker authentication I will apply an explicit ‘deny all’ and then just allow only what its trying to do.&lt;/P&gt;&lt;P&gt;I add whitelists in to bypass the deployed rules, just in case something doesn’t work because of a missed rule restriction. Also roll out piecemeal by just added switches to the ‘Production Switches’ as and when each area is&amp;nbsp;moved. If they didn’t hit that they would just hit the catch all rule.&lt;/P&gt;&lt;P&gt;Once all migrated I either changed the catch all rule to deny traffic, or put them onto a guest network.&lt;/P&gt;&lt;P&gt;Would that be a similar’ish approach to what you would take?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="fad8f6418b8a4b248e2ba9d04ed30f0a_b0481336-4340-4ac4-badf-2f6adc4f49f8.jpg"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/4296i09579F3A27CCAE90/image-size/large?v=v2&amp;amp;px=999" role="button" title="fad8f6418b8a4b248e2ba9d04ed30f0a_b0481336-4340-4ac4-badf-2f6adc4f49f8.jpg" alt="fad8f6418b8a4b248e2ba9d04ed30f0a_b0481336-4340-4ac4-badf-2f6adc4f49f8.jpg" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="fad8f6418b8a4b248e2ba9d04ed30f0a_8f211e38-61f7-4acb-a27b-43f9c993e9c1.jpg"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/5127i7F4013FA6E287260/image-size/large?v=v2&amp;amp;px=999" role="button" title="fad8f6418b8a4b248e2ba9d04ed30f0a_8f211e38-61f7-4acb-a27b-43f9c993e9c1.jpg" alt="fad8f6418b8a4b248e2ba9d04ed30f0a_8f211e38-61f7-4acb-a27b-43f9c993e9c1.jpg" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="fad8f6418b8a4b248e2ba9d04ed30f0a_915417e3-5201-4926-9c16-968dc4ca751e.jpg"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/1244iE671F6F92892F4B0/image-size/large?v=v2&amp;amp;px=999" role="button" title="fad8f6418b8a4b248e2ba9d04ed30f0a_915417e3-5201-4926-9c16-968dc4ca751e.jpg" alt="fad8f6418b8a4b248e2ba9d04ed30f0a_915417e3-5201-4926-9c16-968dc4ca751e.jpg" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Oct 2019 16:01:59 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/802-1x-rejected-then-being-approved-via-mac-auth/m-p/68596#M8034</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2019-10-25T16:01:59Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x rejected then being approved via MAC auth</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/802-1x-rejected-then-being-approved-via-mac-auth/m-p/68597#M8035</link>
      <description>&lt;P&gt;HI Martin.&lt;/P&gt;&lt;P&gt;you are correct. if the upstream radius does reject then AccessControl Engine does pass reject to the radius client (switch/AP/VPN).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would handle MAC authentications locally =&amp;gt; you can fully control&amp;nbsp;it by ExtremeControl configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We can create workflow/script that will automatically reject MACauth if the dot1X reject&amp;nbsp;is received by upstream radius server, but I am sure the customer will not like this solution as it may have consequences (guest access, the wrong password entered, expired certificate...). How would the customer want to recover from such a situation? like one reject will stop MAC-auth but when it will start again?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 27 Oct 2019 02:44:40 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/802-1x-rejected-then-being-approved-via-mac-auth/m-p/68597#M8035</guid>
      <dc:creator>Zdeněk_Pala</dc:creator>
      <dc:date>2019-10-27T02:44:40Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x rejected then being approved via MAC auth</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/802-1x-rejected-then-being-approved-via-mac-auth/m-p/68598#M8036</link>
      <description>&lt;P&gt;Hello Martin and Zdenek,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to say that we should have a setting on the EOS to get the desired behavior without rules engine creativity, but I can’t say that I’m 100% confident.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A couple things you may be able to try:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;EoS defaults with “auth-optional”, meaning that if authentication is not successful it has no bearing on the port. Potentially “auth-required” may change the port behavior to not pass traffic if a reject is received.&lt;BR /&gt;	&amp;nbsp;&lt;/LI&gt;	&lt;LI&gt;Multi-auth mode set to “strict”.&amp;nbsp;&lt;BR /&gt;	I think that in this setting we will not attempt multiple types of authentication. If there is an 802.1x supplicant and we see EAP on the port we won’t attempt MAC auth. That way when EAP fails (Maybe add auth-required here) we’ll not attempt MAC authentication and not pass traffic.&lt;BR /&gt;&lt;BR /&gt;	&amp;nbsp;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Just throwing some ideas you can try to get the behavior you’d like, can’t say for sure if either of these will do the trick.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;-Ryan&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2019 00:57:48 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/802-1x-rejected-then-being-approved-via-mac-auth/m-p/68598#M8036</guid>
      <dc:creator>Ryan_Yacobucci</dc:creator>
      <dc:date>2019-10-28T00:57:48Z</dc:date>
    </item>
    <item>
      <title>Re: 802.1x rejected then being approved via MAC auth</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/802-1x-rejected-then-being-approved-via-mac-auth/m-p/68599#M8037</link>
      <description>&lt;P&gt;Thanks Ryan, and Zdenek,&lt;/P&gt;&lt;P&gt;Will try and give these a go a report back if the suggestions helped.&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Martin&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2019 17:44:36 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/802-1x-rejected-then-being-approved-via-mac-auth/m-p/68599#M8037</guid>
      <dc:creator>Anonymous</dc:creator>
      <dc:date>2019-11-06T17:44:36Z</dc:date>
    </item>
  </channel>
</rss>

