<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ERS switch integration with Extreme control. in ExtremeControl</title>
    <link>https://community.extremenetworks.com/t5/extremecontrol/ers-switch-integration-with-extreme-control/m-p/120223#M2121</link>
    <description>&lt;P&gt;Hi all,&amp;nbsp;&lt;BR /&gt;I'm working on Fabric Attached edge ERS switch and this switch is connected to VOSS running fabric to integrate the ERS switch with extreme control.&lt;BR /&gt;My goal is to configure mac authentication 802.1x and authenticate wireless clients in AP which is running in Fabric Attach mode.&amp;nbsp;&lt;BR /&gt;i configured the voss and fa and is working fine but the problem is that i can ping the nac and even the radius reachability packets reaches the nac but when i configure a port for mac authentication (NEAP)&amp;nbsp;&lt;BR /&gt;there is no packet reaching extreme control.&amp;nbsp;&lt;BR /&gt;the problem is with my neap and radius configs as i think. So is there a document explain it ?&amp;nbsp;&lt;BR /&gt;i read the ERS security&amp;nbsp; document but that does not seems to work.&lt;BR /&gt;Thank you.&lt;/P&gt;</description>
    <pubDate>Sat, 06 Sep 2025 18:15:27 GMT</pubDate>
    <dc:creator>Ahmed_101</dc:creator>
    <dc:date>2025-09-06T18:15:27Z</dc:date>
    <item>
      <title>ERS switch integration with Extreme control.</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/ers-switch-integration-with-extreme-control/m-p/120223#M2121</link>
      <description>&lt;P&gt;Hi all,&amp;nbsp;&lt;BR /&gt;I'm working on Fabric Attached edge ERS switch and this switch is connected to VOSS running fabric to integrate the ERS switch with extreme control.&lt;BR /&gt;My goal is to configure mac authentication 802.1x and authenticate wireless clients in AP which is running in Fabric Attach mode.&amp;nbsp;&lt;BR /&gt;i configured the voss and fa and is working fine but the problem is that i can ping the nac and even the radius reachability packets reaches the nac but when i configure a port for mac authentication (NEAP)&amp;nbsp;&lt;BR /&gt;there is no packet reaching extreme control.&amp;nbsp;&lt;BR /&gt;the problem is with my neap and radius configs as i think. So is there a document explain it ?&amp;nbsp;&lt;BR /&gt;i read the ERS security&amp;nbsp; document but that does not seems to work.&lt;BR /&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Sat, 06 Sep 2025 18:15:27 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/ers-switch-integration-with-extreme-control/m-p/120223#M2121</guid>
      <dc:creator>Ahmed_101</dc:creator>
      <dc:date>2025-09-06T18:15:27Z</dc:date>
    </item>
    <item>
      <title>Re: ERS switch integration with Extreme control.</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/ers-switch-integration-with-extreme-control/m-p/120225#M2122</link>
      <description>&lt;P&gt;Hi all,&amp;nbsp;&lt;BR /&gt;Now the packets are sent to nac and the client is authenticated successfully in extreme control side, but there is a problem where the clients stay in intruder state :&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;-------------------------- Unauthorized Clients ----------------------------&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Port Client MAC Address Type &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Radius Status&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;---- ------------------ -------------- ------------------------------&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;2&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;E8:6A:64:F4:A3:A3&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;Intruder &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;Pending RADIUS Authentication &lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Total number of DHCP phones: 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Total number of EAP clients: 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Total number of non-EAP clients: 0&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Total number of unauthenticated clients: 1&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;3650GTS-PWR+(config-if)#&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;here is the switch configs :&amp;nbsp;&lt;BR /&gt;3650GTS-PWR+(config-if)#show running-config&lt;BR /&gt;! Embedded ASCII Configuration Generator Script&lt;BR /&gt;! Model = Ethernet Routing Switch 3650GTS-PWR+&lt;BR /&gt;! Software version = v6.4.2.007&lt;BR /&gt;!&lt;BR /&gt;! Displaying only parameters different to default&lt;BR /&gt;!================================================&lt;BR /&gt;enable&lt;BR /&gt;configure terminal&lt;BR /&gt;!&lt;BR /&gt;! *** CORE ***&lt;BR /&gt;!&lt;BR /&gt;sntp server primary address 192.168.101.150&lt;BR /&gt;sntp enable&lt;BR /&gt;!&lt;BR /&gt;! *** RADIUS ***&lt;BR /&gt;!&lt;BR /&gt;no radius use-management-ip&lt;BR /&gt;radius server host 192.168.101.102 acct-enable&lt;BR /&gt;radius server host 192.168.101.102 used-by eapol acct-enable&lt;BR /&gt;radius server host 192.168.101.102 used-by non-eapol acct-enable timeout 20&lt;BR /&gt;radius accounting interim-updates enable&lt;BR /&gt;radius reachability mode use-radius&lt;BR /&gt;radius reachability timeout 2&lt;BR /&gt;!&lt;BR /&gt;! *** RADIUS Dynamic Server ***&lt;BR /&gt;!&lt;BR /&gt;radius dynamic-server replay-protection&lt;BR /&gt;!&lt;BR /&gt;! *** TACACS+ ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** SNMP ***&lt;BR /&gt;!&lt;BR /&gt;snmp-server view ALL +1&lt;BR /&gt;! snmp-server user ahmed md5 ******** des ******** read-view ALL write-view ALL&lt;BR /&gt;notify-view ALL&lt;BR /&gt;snmp-server host 192.168.101.101 port 162 v3 auth "ahmed"&lt;BR /&gt;!&lt;BR /&gt;! *** IP ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** IP Manager ***&lt;BR /&gt;!&lt;BR /&gt;no ipmgr snmp&lt;BR /&gt;!&lt;BR /&gt;! *** ASSET ID ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** System Logging ***&lt;BR /&gt;!&lt;BR /&gt;logging remote address 192.168.101.101&lt;BR /&gt;logging remote enable&lt;BR /&gt;logging remote facility local4&lt;BR /&gt;logging remote level debug&lt;BR /&gt;!&lt;BR /&gt;! *** STACK ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** Custom Banner ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** SSH ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** SSL ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** SSHC ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** MSTP (Phase 1) ***&lt;BR /&gt;!&lt;BR /&gt;spanning-tree mstp region region-name "e0:a1:29:ed:08:01"&lt;BR /&gt;!&lt;BR /&gt;! *** LACP (Phase 1) ***&lt;BR /&gt;!&lt;BR /&gt;!LACP mode is set to OFF on all interfaces to enable manipulation of&lt;BR /&gt;!ports with LACP enabled&lt;BR /&gt;interface Ethernet ALL&lt;BR /&gt;lacp mode port ALL off&lt;BR /&gt;exit&lt;BR /&gt;!&lt;BR /&gt;! *** VLAN ***&lt;BR /&gt;!&lt;BR /&gt;vlan create 30,1010 type port cist&lt;BR /&gt;vlan ports 2,11 tagging unTagPvidOnly&lt;BR /&gt;vlan configcontrol flexible&lt;BR /&gt;vlan members 1010 11&lt;BR /&gt;vlan ports 11 pvid 1010&lt;BR /&gt;no auto-pvid&lt;BR /&gt;!&lt;BR /&gt;! *** 802.1ab ***&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet ALL&lt;BR /&gt;no lldp tx-tlv port 47 dot3 mdi-power-support&lt;BR /&gt;no lldp tx-tlv port 47 med extendedPSE&lt;BR /&gt;exit&lt;BR /&gt;!&lt;BR /&gt;! *** 802.1ab vendor-specific TLVs config ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** 802.1AB MED Voice Network Policies ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** QOS ***&lt;BR /&gt;!&lt;BR /&gt;!qos if-group name "#FaTrustedIfcs" class trusted&lt;BR /&gt;!qos if-assign port 47 name #FaTrustedIfcs&lt;BR /&gt;!&lt;BR /&gt;! *** RMON ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** EAP Guest VLAN ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** EAP ***&lt;BR /&gt;!&lt;BR /&gt;eapol multihost allow-non-eap-enable&lt;BR /&gt;eapol multihost radius-non-eap-enable&lt;BR /&gt;eapol multihost auto-non-eap-mhsa-enable&lt;BR /&gt;eapol multihost non-eap-phone-enable&lt;BR /&gt;interface Ethernet ALL&lt;BR /&gt;eapol multihost port 1 eap-mac-max 10 allow-non-eap-enable non-eap-mac-max 10 r&lt;BR /&gt;adius-non-eap-enable auto-non-eap-mhsa-enable non-eap-phone-enable mac-max 3&lt;BR /&gt;eapol multihost port 2 eap-mac-max 3 allow-non-eap-enable non-eap-mac-max 3 rad&lt;BR /&gt;ius-non-eap-enable auto-non-eap-mhsa-enable non-eap-phone-enable mac-max 3&lt;BR /&gt;eapol multihost port 3-12 allow-non-eap-enable radius-non-eap-enable auto-non-e&lt;BR /&gt;ap-mhsa-enable non-eap-phone-enable&lt;BR /&gt;eapol multihost port 13 eap-mac-max 3 allow-non-eap-enable non-eap-mac-max 3 ra&lt;BR /&gt;dius-non-eap-enable auto-non-eap-mhsa-enable non-eap-phone-enable mac-max 3&lt;BR /&gt;eapol multihost port 14-50 allow-non-eap-enable radius-non-eap-enable auto-non-&lt;BR /&gt;eap-mhsa-enable non-eap-phone-enable&lt;BR /&gt;exit&lt;BR /&gt;interface Ethernet ALL&lt;BR /&gt;eapol port 1 status auto re-authentication-period 60 quiet-interval 30 max-requ&lt;BR /&gt;est 10&lt;BR /&gt;eapol port 2,13 status auto re-authentication-period 60 quiet-interval 30 serve&lt;BR /&gt;r-timeout 10 max-request 10&lt;BR /&gt;exit&lt;BR /&gt;!&lt;BR /&gt;! *** EAP Fail Open VLAN ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** EAP Voip VLAN ***&lt;BR /&gt;!&lt;BR /&gt;! eapol enable&lt;BR /&gt;!&lt;BR /&gt;! *** Interface ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** Rate-Limit ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** MLT (Phase 1) ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** MAC-Based Security ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** LACP (Phase 2) ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** ADAC ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** MSTP (Phase 2) ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** Port Mirroring ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** VLAN Phase 2***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** MLT (Phase 2) ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** PoE ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** RTC ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** Extreme Networks Energy Saver ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** AUR ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** AAUR ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** L3 ***&lt;BR /&gt;!&lt;BR /&gt;interface vlan 1010&lt;BR /&gt;ip address 192.168.101.15 255.255.255.0 2&lt;BR /&gt;exit&lt;BR /&gt;!&lt;BR /&gt;ip routing&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** IPV6 ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** MLD ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** FHS ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! --- FHS Global settings ---&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! --- IPV6 access list settings ---&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! --- IPv6 mac access list settings ---&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! --- IPV6 dhcp guard settings ---&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! --- IPV6 RA Guard settings ---&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! --- IPV6 Policy Port Map settings ---&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! --- IPV6 FHS ND SBT Table settings ---&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! --- IPV6 Source Guard Interface settings ---&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** VLACP ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** DHCP Relay ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** L3 Protocols ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! --- IP Directed Broadcast ---&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! --- Proxy ARP ---&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! --- UDP Broadcast Forwarding ---&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! --- Route Policies ---&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! --- RIP ---&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** DHCP SNOOPING ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** ARP INSPECTION ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** IP SOURCE GUARD ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** IGMP ***&lt;BR /&gt;!&lt;BR /&gt;interface vlan 1&lt;BR /&gt;ip igmp&lt;BR /&gt;exit&lt;BR /&gt;interface vlan 30&lt;BR /&gt;ip igmp&lt;BR /&gt;exit&lt;BR /&gt;interface vlan 1010&lt;BR /&gt;ip igmp&lt;BR /&gt;exit&lt;BR /&gt;!&lt;BR /&gt;! *** STACK MONITOR ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** SLPP-guard ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** DHCP Server ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** SLAMON ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** STORM CONTROL ***&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;! *** Fabric Attach ***&lt;BR /&gt;!&lt;BR /&gt;fa zero-touch-option auto-trusted-mode-fa-client client-type 6&lt;BR /&gt;fa zero-touch-option auto-pvid-mode-fa-client client-type 6&lt;BR /&gt;i-sid 1000030 vlan 30&lt;BR /&gt;i-sid 1001010 vlan 1010&lt;BR /&gt;!&lt;BR /&gt;! *** ZTP+ ***&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 07 Sep 2025 12:09:31 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/ers-switch-integration-with-extreme-control/m-p/120225#M2122</guid>
      <dc:creator>Ahmed_101</dc:creator>
      <dc:date>2025-09-07T12:09:31Z</dc:date>
    </item>
  </channel>
</rss>

