<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Switch Management Access using NAC Rules in ExtremeCloud IQ- Site Engine Management Center</title>
    <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/switch-management-access-using-nac-rules/m-p/84408#M9196</link>
    <description>&lt;P&gt;I have configured my X460-G2 switches to use NAC for management access.&lt;/P&gt;&lt;P&gt;I have 2 sets of switches and would like 1 AD group to manage any and another to manage just a subset.&lt;/P&gt;&lt;P&gt;The AD authentication and groups work fine.&amp;nbsp; I have tried to set up a rule that uses the “End-System”&amp;nbsp; criteria.&amp;nbsp; I have created an End-System group based on the switch IP (I tried the MAC as well) but the switches IP doesn’t seem to be recognized.&lt;/P&gt;&lt;P&gt;I have RADIUS authentication and accounting enabled.&lt;/P&gt;&lt;P&gt;Is this the correct way to create different access for switches?&amp;nbsp; If so what am I missing?&lt;/P&gt;&lt;P&gt;Is there a different rule I could create to accomplish this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;</description>
    <pubDate>Tue, 16 Mar 2021 02:50:50 GMT</pubDate>
    <dc:creator>Christopher_Tay</dc:creator>
    <dc:date>2021-03-16T02:50:50Z</dc:date>
    <item>
      <title>Switch Management Access using NAC Rules</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/switch-management-access-using-nac-rules/m-p/84408#M9196</link>
      <description>&lt;P&gt;I have configured my X460-G2 switches to use NAC for management access.&lt;/P&gt;&lt;P&gt;I have 2 sets of switches and would like 1 AD group to manage any and another to manage just a subset.&lt;/P&gt;&lt;P&gt;The AD authentication and groups work fine.&amp;nbsp; I have tried to set up a rule that uses the “End-System”&amp;nbsp; criteria.&amp;nbsp; I have created an End-System group based on the switch IP (I tried the MAC as well) but the switches IP doesn’t seem to be recognized.&lt;/P&gt;&lt;P&gt;I have RADIUS authentication and accounting enabled.&lt;/P&gt;&lt;P&gt;Is this the correct way to create different access for switches?&amp;nbsp; If so what am I missing?&lt;/P&gt;&lt;P&gt;Is there a different rule I could create to accomplish this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 02:50:50 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/switch-management-access-using-nac-rules/m-p/84408#M9196</guid>
      <dc:creator>Christopher_Tay</dc:creator>
      <dc:date>2021-03-16T02:50:50Z</dc:date>
    </item>
    <item>
      <title>Re: Switch Management Access using NAC Rules</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/switch-management-access-using-nac-rules/m-p/84409#M9197</link>
      <description>&lt;P&gt;Hi Chris,&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;I have tried to set up a rule that uses the “End-System”&amp;nbsp; criteria.&amp;nbsp; I have created an End-System group based on the switch IP (I tried the MAC as well) but the switches IP doesn’t seem to be recognized.&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Use a location group instead of an end-system group and it will work fine.&lt;/P&gt;&lt;P&gt;The location groups can be used for:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;limit rules on specific switches (as in this case)&lt;/LI&gt;	&lt;LI&gt;limit rules on specific switch-ports&lt;/LI&gt;	&lt;LI&gt;limit rules on specific access-points&lt;/LI&gt;&lt;/UL&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="ac85cc2661de4f849acab8f5ec6416dd_19483616-4c47-4910-a9b5-87d2fb24d497.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/2012i8D4712667E9AED9B/image-size/large?v=v2&amp;amp;px=999" role="button" title="ac85cc2661de4f849acab8f5ec6416dd_19483616-4c47-4910-a9b5-87d2fb24d497.png" alt="ac85cc2661de4f849acab8f5ec6416dd_19483616-4c47-4910-a9b5-87d2fb24d497.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;Best regards&lt;BR /&gt;Stefan&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 03:03:33 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/switch-management-access-using-nac-rules/m-p/84409#M9197</guid>
      <dc:creator>Stefan_K_</dc:creator>
      <dc:date>2021-03-16T03:03:33Z</dc:date>
    </item>
    <item>
      <title>Re: Switch Management Access using NAC Rules</title>
      <link>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/switch-management-access-using-nac-rules/m-p/84410#M9198</link>
      <description>&lt;P&gt;Hi Stefan,&lt;/P&gt;&lt;P&gt;That worked exactly how I was hoping for.&lt;/P&gt;&lt;P&gt;Thank you for the help&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;</description>
      <pubDate>Tue, 16 Mar 2021 22:39:50 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecloud-iq-site-engine/switch-management-access-using-nac-rules/m-p/84410#M9198</guid>
      <dc:creator>Christopher_Tay</dc:creator>
      <dc:date>2021-03-16T22:39:50Z</dc:date>
    </item>
  </channel>
</rss>

