<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco Trunk Interface with Extreme NAC in ExtremeCloud IQ- Site Engine Management Center</title>
    <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78525#M8791</link>
    <description>&lt;P&gt;Hi Stephan&lt;/P&gt;&lt;P&gt;It looks like if you use new-style config mode, changing the authentication host-mode is supported via template&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="71333bd126d34e469418d778022f4a55_273c17e7-73b9-4839-8501-3daf27fe7531.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/5393iE330977CED93DFC6/image-size/large?v=v2&amp;amp;px=999" role="button" title="71333bd126d34e469418d778022f4a55_273c17e7-73b9-4839-8501-3daf27fe7531.png" alt="71333bd126d34e469418d778022f4a55_273c17e7-73b9-4839-8501-3daf27fe7531.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;Unfortunately, not all of my switches support new-style, so this is not a way for me to go. So I won’t test it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Up to now i got it working to send both radius attribute (template and smart-port) to the switch. But the switch does not handle both&amp;nbsp;of them&lt;/P&gt;</description>
    <pubDate>Mon, 09 Nov 2020 20:35:14 GMT</pubDate>
    <dc:creator>michael_klaus</dc:creator>
    <dc:date>2020-11-09T20:35:14Z</dc:date>
    <item>
      <title>Cisco Trunk Interface with Extreme NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78505#M8771</link>
      <description>&lt;P&gt;Dear All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I’m trying to enable Extreme NAC for Cisco switches. It works fine for Clients on Access Ports. For Accesspoints (local breakout), I’m trying to get a trunk interface with management vlan untagged and data VLANs tagged.&lt;/P&gt;&lt;P&gt;For XOS Switches, I would create a Role with the needed VLAN Egress config&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="7d16bbce7e6e4a37bc17f3f4a9fafce5_baf9f1ab-f283-4dde-bbfe-0019261c6d41.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/2862i8752496343F23FFA/image-size/large?v=v2&amp;amp;px=999" role="button" title="7d16bbce7e6e4a37bc17f3f4a9fafce5_baf9f1ab-f283-4dde-bbfe-0019261c6d41.png" alt="7d16bbce7e6e4a37bc17f3f4a9fafce5_baf9f1ab-f283-4dde-bbfe-0019261c6d41.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I cant enforce this role configuration to Cisco switches&amp;nbsp;&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="7d16bbce7e6e4a37bc17f3f4a9fafce5_9af595de-2eeb-4924-8fc2-c8720cc4c3d6.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/2536iDA55DABB9447F81C/image-size/large?v=v2&amp;amp;px=999" role="button" title="7d16bbce7e6e4a37bc17f3f4a9fafce5_9af595de-2eeb-4924-8fc2-c8720cc4c3d6.png" alt="7d16bbce7e6e4a37bc17f3f4a9fafce5_9af595de-2eeb-4924-8fc2-c8720cc4c3d6.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How can I achieve that for Cisco switches with Extreme NAC?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 14:33:59 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78505#M8771</guid>
      <dc:creator>michael_klaus</dc:creator>
      <dc:date>2020-10-12T14:33:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Trunk Interface with Extreme NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78506#M8772</link>
      <description>&lt;P&gt;Michael,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For cisco switches you cannot enforce a Role from the policy domain.&lt;/P&gt;&lt;P&gt;You must send standard and Cisco radius attributes only.&lt;/P&gt;&lt;P&gt;The standards are those in the Policy Mapping and the cisco specific are to be defined via the Custom/Organization fields in Policy Mapping and/or via the “configure device/Radius attributes to send” from the switch in the NAC group Engine:&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="15c954c36b0740168d71a70fa3813d77_8bfd3758-26b1-4a19-b2f5-03aa5eeddf67.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/1331i564FC85A5A31F21D/image-size/large?v=v2&amp;amp;px=999" role="button" title="15c954c36b0740168d71a70fa3813d77_8bfd3758-26b1-4a19-b2f5-03aa5eeddf67.png" alt="15c954c36b0740168d71a70fa3813d77_8bfd3758-26b1-4a19-b2f5-03aa5eeddf67.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="15c954c36b0740168d71a70fa3813d77_52bc3c22-cb9e-48d2-8d7e-3235ef87d147.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/499i7C5D66CE07175235/image-size/large?v=v2&amp;amp;px=999" role="button" title="15c954c36b0740168d71a70fa3813d77_52bc3c22-cb9e-48d2-8d7e-3235ef87d147.png" alt="15c954c36b0740168d71a70fa3813d77_52bc3c22-cb9e-48d2-8d7e-3235ef87d147.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;Mig&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 14:44:57 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78506#M8772</guid>
      <dc:creator>Miguel-Angel_RO</dc:creator>
      <dc:date>2020-10-12T14:44:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Trunk Interface with Extreme NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78507#M8773</link>
      <description>&lt;P&gt;Hi Miguel&lt;/P&gt;&lt;P&gt;I understand that I have do do it via Radius attribute. But I don’t understand where I can define the native (untagged) and the list of allowed vlans.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 15:58:45 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78507#M8773</guid>
      <dc:creator>michael_klaus</dc:creator>
      <dc:date>2020-10-12T15:58:45Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Trunk Interface with Extreme NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78508#M8774</link>
      <description>&lt;P&gt;Michael,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For Cisco switches to understand the dynamic VLAN provisioning there is some more things to do.&lt;/P&gt;&lt;P&gt;Have a look here:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="https://community.cisco.com/t5/security-documents/neat-with-interface-template/ta-p/3642967" target="_blank" rel="nofollow noreferrer noopener"&gt;https://community.cisco.com/t5/security-documents/neat-with-interface-template/ta-p/3642967&lt;/A&gt;&lt;/LI&gt;	&lt;LI&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/wireless/wireless-lan-controller-software/200492-Securing-a-flexconnect-AP-switchport-wit.html" target="_blank" rel="nofollow noreferrer noopener"&gt;https://www.cisco.com/c/en/us/support/docs/wireless/wireless-lan-controller-software/200492-Securing-a-flexconnect-AP-switchport-wit.html&lt;/A&gt;&lt;/LI&gt;	&lt;LI&gt;&lt;A href="https://community.cisco.com/t5/wireless-security-and-network/flexconnect-ap-dynamic-vlan-and-local-central-switched-via/td-p/2430097" target="_blank" rel="nofollow noreferrer noopener"&gt;https://community.cisco.com/t5/wireless-security-and-network/flexconnect-ap-dynamic-vlan-and-local-central-switched-via/td-p/2430097&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;As you’ll see this part is specific to Cisco equipment.&lt;/P&gt;&lt;P&gt;On the Extreme side you’ll have to send this (aligned with your config):&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="271fcfb9d286424084aae7268ac5389a_2744a6ec-6e05-4a9b-8d2a-f215088650a1.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/5247i13C125D6867C709A/image-size/large?v=v2&amp;amp;px=999" role="button" title="271fcfb9d286424084aae7268ac5389a_2744a6ec-6e05-4a9b-8d2a-f215088650a1.png" alt="271fcfb9d286424084aae7268ac5389a_2744a6ec-6e05-4a9b-8d2a-f215088650a1.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;There is some more work ...&lt;span class="lia-inline-image-display-wrapper" image-alt="271fcfb9d286424084aae7268ac5389a_1f609.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/3652i5B095E467F383B0D/image-size/large?v=v2&amp;amp;px=999" role="button" title="271fcfb9d286424084aae7268ac5389a_1f609.png" alt="271fcfb9d286424084aae7268ac5389a_1f609.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mig&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 18:08:07 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78508#M8774</guid>
      <dc:creator>Miguel-Angel_RO</dc:creator>
      <dc:date>2020-10-12T18:08:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Trunk Interface with Extreme NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78509#M8775</link>
      <description>&lt;P&gt;Hello Michael,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;there is a official Extreme Guide for the integration of Cisco into XMC and NAC.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please see here:&lt;/P&gt;&lt;P&gt;&lt;A href="https://gtacknowledge.extremenetworks.com/articles/Q_A/Where-can-I-find-a-Cisco-switch-and-Extreme-Management-Center-Integration-Guide" target="_blank" rel="nofollow noreferrer noopener"&gt;https://gtacknowledge.extremenetworks.com/articles/Q_A/Where-can-I-find-a-Cisco-switch-and-Extreme-Management-Center-Integration-Guide&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Stephan&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 19:19:52 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78509#M8775</guid>
      <dc:creator>StephanH</dc:creator>
      <dc:date>2020-10-12T19:19:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Trunk Interface with Extreme NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78510#M8776</link>
      <description>&lt;P&gt;Thanks for your replys.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So my first step is to get it running to convert a port from access to trunk. Dynamic VLAN is my next stept.&lt;/P&gt;&lt;P&gt;Based on the documentation, I did following configuration.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Radius attribute configuration:&lt;/STRONG&gt;&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="dfc9955869674be880aa11c73d97a9ba_9a75323a-5bf9-4d4b-81ac-09ce9a3209a8.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/1168i86EF78623CB3C7A6/image-size/large?v=v2&amp;amp;px=999" role="button" title="dfc9955869674be880aa11c73d97a9ba_9a75323a-5bf9-4d4b-81ac-09ce9a3209a8.png" alt="dfc9955869674be880aa11c73d97a9ba_9a75323a-5bf9-4d4b-81ac-09ce9a3209a8.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Policy mapping:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Set the custom 1&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="dfc9955869674be880aa11c73d97a9ba_16d363ca-7298-4143-98eb-583a8a56f5be.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/2276i148C596C26A7BB14/image-size/large?v=v2&amp;amp;px=999" role="button" title="dfc9955869674be880aa11c73d97a9ba_16d363ca-7298-4143-98eb-583a8a56f5be.png" alt="dfc9955869674be880aa11c73d97a9ba_16d363ca-7298-4143-98eb-583a8a56f5be.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The result is that in the “End-Systems” tab it looks fine with the defined attributes (cisco-av-pair is set correctly)&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="dfc9955869674be880aa11c73d97a9ba_abbda543-e24b-4f19-9055-a4dc752adf0a.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/3678i6808F1D838515B61/image-size/large?v=v2&amp;amp;px=999" role="button" title="dfc9955869674be880aa11c73d97a9ba_abbda543-e24b-4f19-9055-a4dc752adf0a.png" alt="dfc9955869674be880aa11c73d97a9ba_abbda543-e24b-4f19-9055-a4dc752adf0a.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the config evaluation tool looks fine as well&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="dfc9955869674be880aa11c73d97a9ba_c0670f92-dc88-4851-8850-9a51fdfa7baf.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/1187i9C40275BB24AB48D/image-size/large?v=v2&amp;amp;px=999" role="button" title="dfc9955869674be880aa11c73d97a9ba_c0670f92-dc88-4851-8850-9a51fdfa7baf.png" alt="dfc9955869674be880aa11c73d97a9ba_c0670f92-dc88-4851-8850-9a51fdfa7baf.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;But on the switch the interface remains as access port. So I did a debug on the switch and a tcp dump on the NAC engine. In both of them, I can’t see this atrribute.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Tcp Dump NAC Engine&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;root@itbzs951:~$ tcpdump "host 172.16.1.99" -v&lt;BR /&gt;tcpdump: listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes&lt;BR /&gt;08:11:14.080546 IP (tos 0x0, ttl 253, id 45515, offset 0, flags [none], proto UDP (17), length 286)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 172.16.1.99.datametrics &amp;gt; itbzs951.rzb.ch.radius: RADIUS, length: 258&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Access-Request (1), id: 0x4f, Authenticator: 685e68a2ba54bbdba948fcb175c862d5&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; User-Name Attribute (1), length: 14, Value: 008077515afa&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; User-Password Attribute (2), length: 18, Value:&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Service-Type Attribute (6), length: 6, Value: Call Check&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Vendor-Specific Attribute (26), length: 31, Value: Vendor: Cisco (9)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Vendor Attribute: 1, Length: 23, Value: service-type=Call Check&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Framed-MTU Attribute (12), length: 6, Value: 1500&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Called-Station-Id Attribute (30), length: 19, Value: 34-F8-E7-C4-01-83&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Calling-Station-Id Attribute (31), length: 19, Value: 00-80-77-51-5A-FA&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Message-Authenticator Attribute (80), length: 18, Value: .Q......c.H.....&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Unknown Attribute (102), length: 2, Value:&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Vendor-Specific Attribute (26), length: 49, Value: Vendor: Cisco (9)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Vendor Attribute: 1, Length: 41, Value: audit-session-id=AC1001630000009C7FB1A5B2&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Vendor-Specific Attribute (26), length: 18, Value: Vendor: Cisco (9)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Vendor Attribute: 1, Length: 10, Value: method=mab&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; NAS-IP-Address Attribute (4), length: 6, Value: 172.16.1.99&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; NAS-Port-Id Attribute (87), length: 20, Value: GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; NAS-Port-Type Attribute (61), length: 6, Value: Ethernet&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; NAS-Port Attribute (5), length: 6, Value: 50103&lt;BR /&gt;08:11:14.128037 IP (tos 0x0, ttl 64, id 57966, offset 0, flags [none], proto UDP (17), length 65)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; itbzs951.rzb.ch.radius &amp;gt; 172.16.1.99.datametrics: RADIUS, length: 37&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Access-Accept (2), id: 0x4f, Authenticator: 9c553fbf49b3d282e6125af6c230c862&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Tunnel-Type Attribute (64), length: 6, Value: Tag[Unused] VLAN&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Tunnel-Private-Group-ID Attribute (81), length: 5, Value: 999&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Tunnel-Medium-Type Attribute (65), length: 6, Value: Tag[Unused] 802&lt;BR /&gt;08:11:15.170597 IP (tos 0x0, ttl 253, id 45526, offset 0, flags [none], proto UDP (17), length 252)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 172.16.1.99.sa-msg-port &amp;gt; itbzs951.rzb.ch.radius-acct: RADIUS, length: 224&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Accounting-Request (4), id: 0x5e, Authenticator: 390556e6c058ae69e9f8e4daa2ee3993&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; User-Name Attribute (1), length: 14, Value: 008077515afa&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Vendor-Specific Attribute (26), length: 49, Value: Vendor: Cisco (9)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Vendor Attribute: 1, Length: 41, Value: audit-session-id=AC1001630000009C7FB1A5B2&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Vendor-Specific Attribute (26), length: 19, Value: Vendor: Cisco (9)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Vendor Attribute: 1, Length: 11, Value: vlan-id=999&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Vendor-Specific Attribute (26), length: 18, Value: Vendor: Cisco (9)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Vendor Attribute: 1, Length: 10, Value: method=mab&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Called-Station-Id Attribute (30), length: 19, Value: 34-F8-E7-C4-01-83&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Calling-Station-Id Attribute (31), length: 19, Value: 00-80-77-51-5A-FA&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; NAS-IP-Address Attribute (4), length: 6, Value: 172.16.1.99&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; NAS-Port-Id Attribute (87), length: 20, Value: GigabitEthernet0/3&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; NAS-Port-Type Attribute (61), length: 6, Value: Ethernet&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; NAS-Port Attribute (5), length: 6, Value: 50103&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Acct-Session-Id Attribute (44), length: 10, Value: 00000071&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Acct-Status-Type Attribute (40), length: 6, Value: Start&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Event-Timestamp Attribute (55), length: 6, Value: Tue Oct 13 08:11:15 2020&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Acct-Delay-Time Attribute (41), length: 6, Value: 00 secs&lt;BR /&gt;08:11:15.171425 IP (tos 0x0, ttl 64, id 58193, offset 0, flags [none], proto UDP (17), length 48)&lt;BR /&gt;&amp;nbsp; &amp;nbsp; itbzs951.rzb.ch.radius-acct &amp;gt; 172.16.1.99.sa-msg-port: RADIUS, length: 20&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Accounting-Response (5), id: 0x5e, Authenticator: 9268a78ff22e9f4a1253178622130e1c&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Debug Switch:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Oct 13 08:11:13.165: dot1x-ev:[Gi0/3] Interface state changed to UP&lt;BR /&gt;Oct 13 08:11:13.169: dot1x-ev:DOT1X Supplicant not enabled on GigabitEthernet0/3&lt;BR /&gt;Oct 13 08:11:13 UTC+1: %LINK-3-UPDOWN: Interface GigabitEthernet0/3, changed state to up&lt;BR /&gt;Oct 13 08:11:14.070: AAA/AUTHEN/8021X (00000000): Pick method list 'default'&amp;nbsp;&lt;BR /&gt;Oct 13 08:11:14.070: AAA/AUTHEN(00000000): There is no General DBReply Method Index details may not be specified&lt;BR /&gt;Oct 13 08:11:14.070: RADIUS/ENCODE(00000000):Orig. component type = Invalid&lt;BR /&gt;Oct 13 08:11:14.070: RADIUS/ENCODE(00000000): Unsupported AAA attribute hwidb&lt;BR /&gt;Oct 13 08:11:14.070: RADIUS/ENCODE(00000000): Unsupported AAA attribute auth-profile&lt;BR /&gt;Oct 13 08:11:14.070: RADIUS/ENCODE(00000000): Unsupported AAA attribute aaa-authen-type&lt;BR /&gt;Oct 13 08:11:14.070: RADIUS/ENCODE(00000000): Unsupported AAA attribute aaa-authen-service&lt;BR /&gt;Oct 13 08:11:14.070: RADIUS/ENCODE(00000000): Unsupported AAA attribute clid-mac-addr&lt;BR /&gt;Oct 13 08:11:14.070: RADIUS/ENCODE(00000000): Unsupported AAA attribute target-scope&lt;BR /&gt;Oct 13 08:11:14.070: RADIUS/ENCODE(00000000): Unsupported AAA attribute aaa-unique-id&lt;BR /&gt;Oct 13 08:11:14.070: RADIUS(00000000): Config NAS IP: 0.0.0.0&lt;BR /&gt;Oct 13 08:11:14.070: RADIUS(00000000): Config NAS IPv6: ::&lt;BR /&gt;Oct 13 08:11:14.070: RADIUS(00000000): sending&lt;BR /&gt;Oct 13 08:11:14.070: RADIUS/ENCODE: Best Local IP-Address 172.16.1.99 for Radius-Server 192.168.105.6&lt;BR /&gt;Oct 13 08:11:14.070: RADIUS: Message Authenticator encoded&lt;BR /&gt;Oct 13 08:11:14.070: RADIUS(00000000): Send Access-Request to 192.168.105.6:1812 onvrf(0) id 1645/79, len 258&lt;BR /&gt;Oct 13 08:11:14.070: RADIUS: &amp;nbsp;authenticator 68 5E 68 A2 BA 54 BB DB - A9 48 FC B1 75 C8 62 D5&lt;BR /&gt;Oct 13 08:11:14.070: RADIUS: &amp;nbsp;User-Name &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; [1] &amp;nbsp; 14 &amp;nbsp;"008077515afa"&lt;BR /&gt;Oct 13 08:11:14.070: RADIUS: &amp;nbsp;User-Password &amp;nbsp; &amp;nbsp; &amp;nbsp; [2] &amp;nbsp; 18 &amp;nbsp;*&lt;BR /&gt;Oct 13 08:11:14.070: RADIUS: &amp;nbsp;Service-Type &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;[6] &amp;nbsp; 6 &amp;nbsp; Call Check &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;[10]&lt;BR /&gt;Oct 13 08:11:14.074: RADIUS: &amp;nbsp;Vendor, Cisco &amp;nbsp; &amp;nbsp; &amp;nbsp; [26] &amp;nbsp;31 &amp;nbsp;&lt;BR /&gt;Oct 13 08:11:14.074: RADIUS: &amp;nbsp; Cisco AVpair &amp;nbsp; &amp;nbsp; &amp;nbsp; [1] &amp;nbsp; 25 &amp;nbsp;"service-type=Call Check"&lt;BR /&gt;Oct 13 08:11:14.074: RADIUS: &amp;nbsp;Framed-MTU &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;[12] &amp;nbsp;6 &amp;nbsp; 1500 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;BR /&gt;Oct 13 08:11:14.074: RADIUS: &amp;nbsp;Called-Station-Id &amp;nbsp; [30] &amp;nbsp;19 &amp;nbsp;"34-F8-E7-C4-01-83"&lt;BR /&gt;Oct 13 08:11:14.074: RADIUS: &amp;nbsp;Calling-Station-Id &amp;nbsp;[31] &amp;nbsp;19 &amp;nbsp;"00-80-77-51-5A-FA"&lt;BR /&gt;Oct 13 08:11:14.074: RADIUS: &amp;nbsp;Message-Authenticato[80] &amp;nbsp;18 &amp;nbsp;&lt;BR /&gt;Oct 13 08:11:14.074: RADIUS: &amp;nbsp; F0 51 02 09 AD CE DA 95 63 8A 48 91 D1 86 94 F7 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; [ QcH]&lt;BR /&gt;Oct 13 08:11:14.074: RADIUS: &amp;nbsp;EAP-Key-Name &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;[102] 2 &amp;nbsp; *&lt;BR /&gt;Oct 13 08:11:14.074: RADIUS: &amp;nbsp;Vendor, Cisco &amp;nbsp; &amp;nbsp; &amp;nbsp; [26] &amp;nbsp;49 &amp;nbsp;&lt;BR /&gt;Oct 13 08:11:14.074: RADIUS: &amp;nbsp; Cisco AVpair &amp;nbsp; &amp;nbsp; &amp;nbsp; [1] &amp;nbsp; 43 &amp;nbsp;"audit-session-id=AC1001630000009C7FB1A5B2"&lt;BR /&gt;Oct 13 08:11:14.074: RADIUS: &amp;nbsp;Vendor, Cisco &amp;nbsp; &amp;nbsp; &amp;nbsp; [26] &amp;nbsp;18 &amp;nbsp;&lt;BR /&gt;Oct 13 08:11:14.074: RADIUS: &amp;nbsp; Cisco AVpair &amp;nbsp; &amp;nbsp; &amp;nbsp; [1] &amp;nbsp; 12 &amp;nbsp;"method=mab"&lt;BR /&gt;Oct 13 08:11:14.074: RADIUS: &amp;nbsp;NAS-IP-Address &amp;nbsp; &amp;nbsp; &amp;nbsp;[4] &amp;nbsp; 6 &amp;nbsp; 172.16.1.99 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;Oct 13 08:11:14.074: RADIUS: &amp;nbsp;NAS-Port-Id &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; [87] &amp;nbsp;20 &amp;nbsp;"GigabitEthernet0/3"&lt;BR /&gt;Oct 13 08:11:14.074: RADIUS: &amp;nbsp;NAS-Port-Type &amp;nbsp; &amp;nbsp; &amp;nbsp; [61] &amp;nbsp;6 &amp;nbsp; Ethernet &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;[15]&lt;BR /&gt;Oct 13 08:11:14.074: RADIUS: &amp;nbsp;NAS-Port &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;[5] &amp;nbsp; 6 &amp;nbsp; 50103 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;Oct 13 08:11:14.074: RADIUS(00000000): Sending a IPv4 Radius Packet&lt;BR /&gt;Oct 13 08:11:14.074: RADIUS(00000000): Started 1 sec timeout&lt;BR /&gt;Oct 13 08:11:14.123: RADIUS: Received from id 1645/79 192.168.105.6:1812, Access-Accept, len 37&lt;BR /&gt;Oct 13 08:11:14.123: RADIUS: &amp;nbsp;authenticator 9C 55 3F BF 49 B3 D2 82 - E6 12 5A F6 C2 30 C8 62&lt;BR /&gt;Oct 13 08:11:14.123: RADIUS: &amp;nbsp;Tunnel-Type &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; [64] &amp;nbsp;6 &amp;nbsp; 00:VLAN &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; [13]&lt;BR /&gt;Oct 13 08:11:14.123: RADIUS: &amp;nbsp;Tunnel-Private-Group[81] &amp;nbsp;5 &amp;nbsp; "999"&lt;BR /&gt;Oct 13 08:11:14.123: RADIUS: &amp;nbsp;Tunnel-Medium-Type &amp;nbsp;[65] &amp;nbsp;6 &amp;nbsp; 00:ALL_802 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;[6]&lt;BR /&gt;Oct 13 08:11:14.123: RADIUS(00000000): Received from id 1645/79&lt;BR /&gt;Oct 13 08:11:14 UTC+1: %EPM-6-POLICY_REQ: IP 0.0.0.0| MAC 0080.7751.5afa| AuditSessionID AC1001630000009C7FB1A5B2| EVENT APPLY&lt;BR /&gt;Oct 13 08:11:14 UTC+1: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/3, changed state to up&lt;BR /&gt;Oct 13 08:11:15.161: RADIUS/ENCODE(00000000):Orig. component type = Invalid&lt;BR /&gt;Oct 13 08:11:15.161: RADIUS/ENCODE(00000000): Unsupported AAA attribute clid-mac-addr&lt;BR /&gt;Oct 13 08:11:15.161: RADIUS(00000000): Config NAS IP: 0.0.0.0&lt;BR /&gt;Oct 13 08:11:15.161: RADIUS(00000000): Config NAS IPv6: ::&lt;BR /&gt;Oct 13 08:11:15.161: RADIUS(00000000): sending&lt;BR /&gt;Oct 13 08:11:15.161: RADIUS/ENCODE: Best Local IP-Address 172.16.1.99 for Radius-Server 192.168.105.6&lt;BR /&gt;Oct 13 08:11:15.161: RADIUS(00000000): Send Accounting-Request to 192.168.105.6:1813 onvrf(0) id 1646/94, len 224&lt;BR /&gt;Oct 13 08:11:15.161: RADIUS: &amp;nbsp;authenticator 39 05 56 E6 C0 58 AE 69 - E9 F8 E4 DA A2 EE 39 93&lt;BR /&gt;Oct 13 08:11:15.161: RADIUS: &amp;nbsp;User-Name &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; [1] &amp;nbsp; 14 &amp;nbsp;"008077515afa"&lt;BR /&gt;Oct 13 08:11:15.161: RADIUS: &amp;nbsp;Vendor, Cisco &amp;nbsp; &amp;nbsp; &amp;nbsp; [26] &amp;nbsp;49 &amp;nbsp;&lt;BR /&gt;Oct 13 08:11:15.161: RADIUS: &amp;nbsp; Cisco AVpair &amp;nbsp; &amp;nbsp; &amp;nbsp; [1] &amp;nbsp; 43 &amp;nbsp;"audit-session-id=AC1001630000009C7FB1A5B2"&lt;BR /&gt;Oct 13 08:11:15.165: RADIUS: &amp;nbsp;Vendor, Cisco &amp;nbsp; &amp;nbsp; &amp;nbsp; [26] &amp;nbsp;19 &amp;nbsp;&lt;BR /&gt;Oct 13 08:11:15.165: RADIUS: &amp;nbsp; Cisco AVpair &amp;nbsp; &amp;nbsp; &amp;nbsp; [1] &amp;nbsp; 13 &amp;nbsp;"vlan-id=999"&lt;BR /&gt;Oct 13 08:11:15.165: RADIUS: &amp;nbsp;Vendor, Cisco &amp;nbsp; &amp;nbsp; &amp;nbsp; [26] &amp;nbsp;18 &amp;nbsp;&lt;BR /&gt;Oct 13 08:11:15.165: RADIUS: &amp;nbsp; Cisco AVpair &amp;nbsp; &amp;nbsp; &amp;nbsp; [1] &amp;nbsp; 12 &amp;nbsp;"method=mab"&lt;BR /&gt;Oct 13 08:11:15.165: RADIUS: &amp;nbsp;Called-Station-Id &amp;nbsp; [30] &amp;nbsp;19 &amp;nbsp;"34-F8-E7-C4-01-83"&lt;BR /&gt;Oct 13 08:11:15.165: RADIUS: &amp;nbsp;Calling-Station-Id &amp;nbsp;[31] &amp;nbsp;19 &amp;nbsp;"00-80-77-51-5A-FA"&lt;BR /&gt;Oct 13 08:11:15.165: RADIUS: &amp;nbsp;NAS-IP-Address &amp;nbsp; &amp;nbsp; &amp;nbsp;[4] &amp;nbsp; 6 &amp;nbsp; 172.16.1.99 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;Oct 13 08:11:15.165: RADIUS: &amp;nbsp;NAS-Port-Id &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; [87] &amp;nbsp;20 &amp;nbsp;"GigabitEthernet0/3"&lt;BR /&gt;Oct 13 08:11:15.165: RADIUS: &amp;nbsp;NAS-Port-Type &amp;nbsp; &amp;nbsp; &amp;nbsp; [61] &amp;nbsp;6 &amp;nbsp; Ethernet &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;[15]&lt;BR /&gt;Oct 13 08:11:15.165: RADIUS: &amp;nbsp;NAS-Port &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;[5] &amp;nbsp; 6 &amp;nbsp; 50103 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;Oct 13 08:11:15.165: RADIUS: &amp;nbsp;Acct-Session-Id &amp;nbsp; &amp;nbsp; [44] &amp;nbsp;10 &amp;nbsp;"00000071"&lt;BR /&gt;Oct 13 08:11:15.165: RADIUS: &amp;nbsp;Acct-Status-Type &amp;nbsp; &amp;nbsp;[40] &amp;nbsp;6 &amp;nbsp; Start &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; [1]&lt;BR /&gt;Oct 13 08:11:15.165: RADIUS: &amp;nbsp;Event-Timestamp &amp;nbsp; &amp;nbsp; [55] &amp;nbsp;6 &amp;nbsp; 1602569475 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;BR /&gt;Oct 13 08:11:15.165: RADIUS: &amp;nbsp;Acct-Delay-Time &amp;nbsp; &amp;nbsp; [41] &amp;nbsp;6 &amp;nbsp; 0 &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;BR /&gt;Oct 13 08:11:15.165: RADIUS(00000000): Sending a IPv4 Radius Packet&lt;BR /&gt;Oct 13 08:11:15.165: RADIUS(00000000): Started 1 sec timeout&lt;BR /&gt;Oct 13 08:11:15.168: RADIUS: Received from id 1646/94 192.168.105.6:1813, Accounting-response, len 20&lt;BR /&gt;Oct 13 08:11:15.168: RADIUS: &amp;nbsp;authenticator 92 68 A7 8F F2 2E 9F 4A - 12 53 17 86 22 13 0E 1C&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For me it looks like the NAC engine doesn’t sent the attribute but the attribute is shown in the dashboard.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;regards&lt;BR /&gt;Michael&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2020 13:16:30 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78510#M8776</guid>
      <dc:creator>michael_klaus</dc:creator>
      <dc:date>2020-10-13T13:16:30Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Trunk Interface with Extreme NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78511#M8777</link>
      <description>&lt;P&gt;Hello Michael.&lt;/P&gt;&lt;P&gt;the Cisco Ethernet Interface Type (= Access or Trunk Port) can’t configured via Radius attributes.&lt;/P&gt;&lt;P&gt;This is independet of the Radius-Server or NAC-Vendor. Cisco does not offer the possibility to switch over via radius protocol.&lt;/P&gt;&lt;P&gt;This is because unlike other vendors, Cisco explicitly distinguishes the port type, while others simply distribute tagged and untagged VLANs. Which is again provided for in the radius protocol.&lt;/P&gt;&lt;P&gt;If you need an dynamic change between Trunk and Access Port and the standard configuration ist Access Port you can enable authentication, and trigger a script on XMC if a access point is&amp;nbsp;is recognized. This script hast to change the Cisco port Config and do an reauth.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Stephan&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2020 13:38:24 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78511#M8777</guid>
      <dc:creator>StephanH</dc:creator>
      <dc:date>2020-10-13T13:38:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Trunk Interface with Extreme NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78512#M8778</link>
      <description>&lt;P&gt;Hello Michael,&lt;/P&gt;&lt;P&gt;sorry I saw some of my text is missing on my replay. The following was missing:&lt;/P&gt;&lt;P&gt;Only if you enable “Client Information Signaling Protocol (CISP)” on your switch you can change the port type via Radius according the&amp;nbsp;Network Edge Authentication Topology (NEAT).&lt;/P&gt;&lt;P&gt;Do you have enabled CISP?&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Stephan&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2020 14:54:18 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78512#M8778</guid>
      <dc:creator>StephanH</dc:creator>
      <dc:date>2020-10-13T14:54:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Trunk Interface with Extreme NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78513#M8779</link>
      <description>&lt;P&gt;Hello Michael,&lt;/P&gt;&lt;P&gt;one additional point. You can try to change “cisco-avpair=” to “Cisco-AVPair=”.&lt;/P&gt;&lt;P&gt;I think there was at least in the past a dependence on upper and lower case letters.&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Stephan&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2020 15:10:54 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78513#M8779</guid>
      <dc:creator>StephanH</dc:creator>
      <dc:date>2020-10-13T15:10:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Trunk Interface with Extreme NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78514#M8780</link>
      <description>&lt;P&gt;Hi Stephan&lt;/P&gt;&lt;P&gt;After changing to “Cisco-AVPair=”, the Ports gets configured as a trunk port. So next step will be to check if I can send native and allowed vlans via Radius attribute.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks a lot&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2020 19:46:57 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78514#M8780</guid>
      <dc:creator>michael_klaus</dc:creator>
      <dc:date>2020-10-13T19:46:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Trunk Interface with Extreme NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78515#M8781</link>
      <description>&lt;P&gt;Hello Stefan,&lt;/P&gt;&lt;P&gt;with pleasure.&lt;/P&gt;&lt;P&gt;I am not sure if this is possilbe.&lt;/P&gt;&lt;P&gt;According this guide (&lt;A href="https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_8021x/configuration/15-e/sec-usr-8021x-15-e-book/sec-ieee-neat.pdf" target="_blank" rel="nofollow noreferrer noopener"&gt;https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_8021x/configuration/15-e/sec-usr-8021x-15-e-book/sec-ieee-neat.pdf&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;&lt;EM&gt;“The VSA changes the authenticator switch port mode from access to trunk and enables 802.1X trunk encapsulation and the access VLAN (if any) would be converted to a native trunk VLAN. &lt;SPAN style="color:#f1c40f;"&gt;VSA does not change any of the port configurations on the supplicant.”&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;it sound there is no vlan change available. &amp;nbsp;But it’s not 100% clear if&amp;nbsp;an additional vsa can send the vlan IDs. Like you configured for vlan 999.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you still these lines in the debug from your switch?&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;BR /&gt;Oct 13 08:11:15.165: RADIUS: &amp;nbsp;Vendor, Cisco &amp;nbsp; &amp;nbsp; &amp;nbsp; [26] &amp;nbsp;19 &amp;nbsp;&lt;BR /&gt;Oct 13 08:11:15.165: RADIUS: &amp;nbsp; Cisco AVpair &amp;nbsp; &amp;nbsp; &amp;nbsp; [1] &amp;nbsp; 13 &amp;nbsp;"vlan-id=999"&lt;BR /&gt;Oct 13 08:11:15.165: RADIUS: &amp;nbsp;Vendor, Cisco &amp;nbsp; &amp;nbsp; &amp;nbsp; [26] &amp;nbsp;18 &amp;nbsp;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This entry point to the vlan send by NAC.&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Stephan&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2020 20:24:18 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78515#M8781</guid>
      <dc:creator>StephanH</dc:creator>
      <dc:date>2020-10-13T20:24:18Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Trunk Interface with Extreme NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78516#M8782</link>
      <description>&lt;P&gt;Hello Stefan,&lt;/P&gt;&lt;P&gt;I have searched my knowledge base again.&amp;nbsp;&lt;BR /&gt;Maybe a interface&amp;nbsp;template is a good workaround.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/neat-with-interface-template/ta-p/3642967" target="_blank" rel="nofollow noreferrer noopener"&gt;https://community.cisco.com/t5/security-documents/neat-with-interface-template/ta-p/3642967&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Stephan&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2020 20:35:55 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78516#M8782</guid>
      <dc:creator>StephanH</dc:creator>
      <dc:date>2020-10-13T20:35:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Trunk Interface with Extreme NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78517#M8783</link>
      <description>&lt;P&gt;Hello Stefan,&lt;/P&gt;&lt;P&gt;I did a quick web search, too. Here is another description regarding NEAT and templates:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515#toc-hId--100650304" target="_blank" rel="nofollow noreferrer noopener"&gt;https://community.cisco.com/t5/security-documents/ise-secure-wired-access-prescriptive-deployment-guide/ta-p/3641515#toc-hId--100650304&lt;/A&gt;&lt;/P&gt;&lt;P&gt;There are some hints in the net about disadvantages concerning the port configuration with NEAT.&lt;/P&gt;&lt;P&gt;for example here:&amp;nbsp;&lt;A href="https://community.cisco.com/t5/network-access-control/flexconnect-ap-ise-and-neat/td-p/3302383" target="_blank" rel="nofollow noreferrer noopener"&gt;https://community.cisco.com/t5/network-access-control/flexconnect-ap-ise-and-neat/td-p/3302383&lt;/A&gt;&lt;/P&gt;&lt;P&gt;It seems that Cisco still has problems to implement a function like "AP Aware" from Extreme.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Stephan&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2020 20:47:03 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78517#M8783</guid>
      <dc:creator>StephanH</dc:creator>
      <dc:date>2020-10-13T20:47:03Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Trunk Interface with Extreme NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78518#M8784</link>
      <description>&lt;P&gt;I solved it with macros because NEATis not available on all switches.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks for your help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;best regards&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2020 11:15:21 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78518#M8784</guid>
      <dc:creator>michael_klaus</dc:creator>
      <dc:date>2020-10-15T11:15:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Trunk Interface with Extreme NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78519#M8785</link>
      <description>&lt;P&gt;Hello Michael,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;nice to hear that you have found a solution.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you tigger the macro with the radius attribute “auto-smart-port=event-trigger from NAC, if a appropriate device is authenticated on the access port?&lt;BR /&gt;Or how do you enable a macro on the specific port?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Stephan Harrer&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2020 11:48:49 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78519#M8785</guid>
      <dc:creator>StephanH</dc:creator>
      <dc:date>2020-10-15T11:48:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Trunk Interface with Extreme NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78520#M8786</link>
      <description>&lt;P&gt;Yes exactly, I use the radius attribute “uto-smart-port=event-trigger” if the mac address is in my Accesspoint End System group.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;best regards&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2020 13:21:58 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78520#M8786</guid>
      <dc:creator>michael_klaus</dc:creator>
      <dc:date>2020-10-15T13:21:58Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Trunk Interface with Extreme NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78521#M8787</link>
      <description>&lt;P&gt;Michael,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you share the solution?&lt;/P&gt;&lt;P&gt;I’m interested in the config lines for Cisco and the definition of the radius attributes.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Mig&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2020 14:05:10 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78521#M8787</guid>
      <dc:creator>Miguel-Angel_RO</dc:creator>
      <dc:date>2020-10-15T14:05:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Trunk Interface with Extreme NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78522#M8788</link>
      <description>&lt;P&gt;Hi Miguel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes sure, I can share my cisco config. In the meantime, I tested NEAT as well and it seems to be easier than using macro.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3&gt;Macro&lt;/H3&gt;&lt;P&gt;&lt;CODE&gt;conf t&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;no macro auto global control device&lt;BR /&gt;&lt;BR /&gt;no macro auto global control trigger&lt;BR /&gt;&lt;BR /&gt;macro auto global processing&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;CODE&gt;macro auto execute AP_TRUNK&amp;nbsp;&amp;nbsp;{&lt;BR /&gt;&lt;BR /&gt;if [[ $LINKUP == YES ]]&lt;BR /&gt;&lt;BR /&gt;then conf t&lt;BR /&gt;&lt;BR /&gt;default interface $INTERFACE&lt;BR /&gt;&lt;BR /&gt;interface $INTERFACE&lt;BR /&gt;&lt;BR /&gt;Description AP_TRUNK&lt;BR /&gt;&lt;BR /&gt;macro description $TRIGGER&lt;BR /&gt;&lt;BR /&gt;switchport trunk allowed vlan ##VLAN-LIST##&lt;BR /&gt;&lt;BR /&gt;switchport trunk native vlan ##VLAN##&lt;BR /&gt;&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;&lt;BR /&gt;spanning-tree portfast trunk&lt;BR /&gt;&lt;BR /&gt;macro auto processing&lt;BR /&gt;&lt;BR /&gt;exit&lt;BR /&gt;&lt;BR /&gt;fi&lt;BR /&gt;&lt;BR /&gt;if [[ $LINKUP == NO ]]&lt;BR /&gt;&lt;BR /&gt;then conf t&lt;BR /&gt;&lt;BR /&gt;default interface $INTERFACE&lt;BR /&gt;&lt;BR /&gt;interface $INTERFACE&lt;BR /&gt;&lt;BR /&gt;description NAC&lt;BR /&gt;&lt;BR /&gt;no switchport trunk allowed vlan&lt;BR /&gt;&lt;BR /&gt;no switchport trunk native vlan&lt;BR /&gt;&lt;BR /&gt;switchport mode access&lt;BR /&gt;&lt;BR /&gt;macro auto processing&lt;BR /&gt;&lt;BR /&gt;authentication control-direction in&lt;BR /&gt;&lt;BR /&gt;authentication event server dead action authorize&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;authentication event server dead action authorize voice&lt;BR /&gt;&lt;BR /&gt;authentication event server alive action reinitialize&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;authentication host-mode multi-host&lt;BR /&gt;&lt;BR /&gt;authentication order mab dot1x&lt;BR /&gt;&lt;BR /&gt;authentication priority dot1x mab&lt;BR /&gt;&lt;BR /&gt;authentication port-control auto&lt;BR /&gt;&lt;BR /&gt;authentication periodic&lt;BR /&gt;&lt;BR /&gt;authentication timer reauthenticate server&lt;BR /&gt;&lt;BR /&gt;authentication violation restrict&lt;BR /&gt;&lt;BR /&gt;mab&lt;BR /&gt;&lt;BR /&gt;snmp trap mac-notification change added&lt;BR /&gt;&lt;BR /&gt;snmp trap mac-notification change removed&lt;BR /&gt;&lt;BR /&gt;dot1x pae authenticator&lt;BR /&gt;&lt;BR /&gt;dot1x timeout tx-period 10&lt;BR /&gt;&lt;BR /&gt;no macro description $TRIGGER&lt;BR /&gt;&lt;BR /&gt;exit&lt;BR /&gt;&lt;BR /&gt;fi&lt;BR /&gt;&lt;BR /&gt;}&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;int range ##INTERFACE-RANGE##&lt;BR /&gt;&lt;BR /&gt;macro auto processing&amp;nbsp;&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;Radius Attribute: Cisco-AVPair=auto-smart-port=AP_TRUNK&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;H3&gt;NEAT&lt;/H3&gt;&lt;P&gt;&lt;CODE&gt;cisp enable&lt;BR /&gt;&lt;BR /&gt;!&lt;BR /&gt;&lt;BR /&gt;template AP_TRUNK&lt;BR /&gt;&lt;BR /&gt;switchport trunk encapsulation dot1q&lt;BR /&gt;&lt;BR /&gt;switchport trunk native vlan 100&lt;BR /&gt;&lt;BR /&gt;switchport mode trunk&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;Radius Attribute: Cisco-AVPair=interface-template-name=AP_TRUNK&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Comparison Smart Port vs. Macro:&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="0f95b5ae2c094a4f8db483d2ed89fb8d_2a0edad3-e719-44a8-bb7a-96a6bc9623b9.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/5891i8D917454D632F4B7/image-size/large?v=v2&amp;amp;px=999" role="button" title="0f95b5ae2c094a4f8db483d2ed89fb8d_2a0edad3-e719-44a8-bb7a-96a6bc9623b9.png" alt="0f95b5ae2c094a4f8db483d2ed89fb8d_2a0edad3-e719-44a8-bb7a-96a6bc9623b9.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;best regards&lt;BR /&gt;Michael&lt;/P&gt;</description>
      <pubDate>Thu, 15 Oct 2020 18:53:16 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78522#M8788</guid>
      <dc:creator>michael_klaus</dc:creator>
      <dc:date>2020-10-15T18:53:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Trunk Interface with Extreme NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78523#M8789</link>
      <description>&lt;P&gt;Hello Michael,&lt;/P&gt;&lt;P&gt;how did you solve authentication with neat and Extreme APs?&lt;/P&gt;&lt;P&gt;Normal for an standard port (printer, pc,...) “authentication host-mode&amp;nbsp;multi-auth” is a good choice to authentication every client separatly (if more the one is present).&lt;/P&gt;&lt;P&gt;If you now plug an AP to the port&amp;nbsp;“authentication host-mode&amp;nbsp;multi-host” is a better choice to authenticate only the first device (=AP). All wireless clients are authenticated via the wireless controller.&lt;/P&gt;&lt;P&gt;If you use “multi-auth” with an Access Point on the port you will see every wireless client twice. From WLAN and from LAN.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hoped there is a way to change the “authentication host-mode “ via the port template but it seems that’s not possible.&lt;/P&gt;&lt;P&gt;How do you handle that?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Nov 2020 15:08:55 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78523#M8789</guid>
      <dc:creator>StephanH</dc:creator>
      <dc:date>2020-11-03T15:08:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Trunk Interface with Extreme NAC</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78524#M8790</link>
      <description>&lt;P&gt;Hi Stephan&lt;/P&gt;&lt;P&gt;Yes you’re right, you can’t change the authentication host-mode via port template. But with Macros it works. What I’m trying to do is to do all the needed config via port template and just the changing the authentication host-mode with a macro. But up to now I didn’t get i working to send both Cisco-AVPair attributes via NAC. I’m still on my engineering.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;best regards&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;</description>
      <pubDate>Thu, 05 Nov 2020 16:31:45 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/cisco-trunk-interface-with-extreme-nac/m-p/78524#M8790</guid>
      <dc:creator>michael_klaus</dc:creator>
      <dc:date>2020-11-05T16:31:45Z</dc:date>
    </item>
  </channel>
</rss>

