<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Extreme control integration with 3rd party switches in ExtremeControl</title>
    <link>https://community.extremenetworks.com/t5/extremecontrol/extreme-control-integration-with-3rd-party-switches/m-p/120059#M2114</link>
    <description>&lt;P&gt;Hi all.&lt;BR /&gt;A customer have many 3rd party switches like hp tp link cisco etc...&lt;BR /&gt;we want to configure mac authentication in extreme control for these switches.&amp;nbsp;&lt;BR /&gt;i got confused a little i know that policy roles is extreme priority so it just works for extreme switches like exos.&amp;nbsp;&lt;BR /&gt;when configuring 3rd party switches we will make a profile under the access control tap but we also mapping it to a policy role. how is that ?&amp;nbsp;&lt;BR /&gt;is there any document explain it ?&amp;nbsp;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Sun, 24 Aug 2025 16:53:09 GMT</pubDate>
    <dc:creator>Ahmed_101</dc:creator>
    <dc:date>2025-08-24T16:53:09Z</dc:date>
    <item>
      <title>Extreme control integration with 3rd party switches</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/extreme-control-integration-with-3rd-party-switches/m-p/120059#M2114</link>
      <description>&lt;P&gt;Hi all.&lt;BR /&gt;A customer have many 3rd party switches like hp tp link cisco etc...&lt;BR /&gt;we want to configure mac authentication in extreme control for these switches.&amp;nbsp;&lt;BR /&gt;i got confused a little i know that policy roles is extreme priority so it just works for extreme switches like exos.&amp;nbsp;&lt;BR /&gt;when configuring 3rd party switches we will make a profile under the access control tap but we also mapping it to a policy role. how is that ?&amp;nbsp;&lt;BR /&gt;is there any document explain it ?&amp;nbsp;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 16:53:09 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/extreme-control-integration-with-3rd-party-switches/m-p/120059#M2114</guid>
      <dc:creator>Ahmed_101</dc:creator>
      <dc:date>2025-08-24T16:53:09Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme control integration with 3rd party switches</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/extreme-control-integration-with-3rd-party-switches/m-p/120060#M2115</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;You can check out the following article:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://extreme-networks.my.site.com/ExtrArticleDetail?an=000082505" target="_blank"&gt;https://extreme-networks.my.site.com/ExtrArticleDetail?an=000082505&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The "Policy Mapping" fields work to allow you to configure RADIUS attributes to be provided back to your HP/Cisco switches based on the RADIUS attributes that are required by the vendor.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;If you can identify what RADIUS attributes need to be returned to apply a policy/ACL, you can use the policy mapping fields to configure Control accordingly.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;-Ryan&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 16:59:24 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/extreme-control-integration-with-3rd-party-switches/m-p/120060#M2115</guid>
      <dc:creator>Ryan_Yacobucci</dc:creator>
      <dc:date>2025-08-24T16:59:24Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme control integration with 3rd party switches</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/extreme-control-integration-with-3rd-party-switches/m-p/120062#M2116</link>
      <description>&lt;P&gt;Hi Ryan Thank you.&amp;nbsp;&lt;BR /&gt;Just another question i want to configure the nac in monitoring mode so i will just enable mac authentication on the switches and make a rule in nac to accept all the requests so our purpose is to just to see the mac addresses of the clients so there will not be any authentication in the background. should i return any radius attributes to the switch or not ? .&amp;nbsp;&lt;BR /&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Aug 2025 06:35:52 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/extreme-control-integration-with-3rd-party-switches/m-p/120062#M2116</guid>
      <dc:creator>Ahmed_101</dc:creator>
      <dc:date>2025-08-25T06:35:52Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme control integration with 3rd party switches</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/extreme-control-integration-with-3rd-party-switches/m-p/120063#M2117</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;For Monitor mode you policy response is required. You can send set the switch to "No Attributes" or set the policy to "No Policy".&lt;BR /&gt;&lt;BR /&gt;Do not set the switch to "None" attributes in the switch "RADIUS attributes to send" field.&lt;/P&gt;&lt;P&gt;Thanks&lt;BR /&gt;-Ryan&lt;/P&gt;</description>
      <pubDate>Mon, 25 Aug 2025 12:24:23 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/extreme-control-integration-with-3rd-party-switches/m-p/120063#M2117</guid>
      <dc:creator>Ryan_Yacobucci</dc:creator>
      <dc:date>2025-08-25T12:24:23Z</dc:date>
    </item>
  </channel>
</rss>

