<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Extreme NAC - Service rule deny destination IP on switch in ExtremeControl</title>
    <link>https://community.extremenetworks.com/t5/extremecontrol/extreme-nac-service-rule-deny-destination-ip-on-switch/m-p/92064#M281</link>
    <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have some troubles with NAC configuration on our x440 switches. We’ve created service rule that deny traffic to some destination subnet. Let’s say 10.0.0.0/24, but when client is connected directly to the switch (via ethernet connection) rule doesn’t work! On WiFi everything works completely fine.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Command “show policy capabilities” issue on switch shows us that IP Destination Subnet is supported on this device.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone know how to resolve this problem?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;Marcin&lt;/P&gt;</description>
    <pubDate>Wed, 08 Sep 2021 15:26:33 GMT</pubDate>
    <dc:creator>NieeBieeski</dc:creator>
    <dc:date>2021-09-08T15:26:33Z</dc:date>
    <item>
      <title>Extreme NAC - Service rule deny destination IP on switch</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/extreme-nac-service-rule-deny-destination-ip-on-switch/m-p/92064#M281</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have some troubles with NAC configuration on our x440 switches. We’ve created service rule that deny traffic to some destination subnet. Let’s say 10.0.0.0/24, but when client is connected directly to the switch (via ethernet connection) rule doesn’t work! On WiFi everything works completely fine.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Command “show policy capabilities” issue on switch shows us that IP Destination Subnet is supported on this device.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone know how to resolve this problem?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;Marcin&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 15:26:33 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/extreme-nac-service-rule-deny-destination-ip-on-switch/m-p/92064#M281</guid>
      <dc:creator>NieeBieeski</dc:creator>
      <dc:date>2021-09-08T15:26:33Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme NAC - Service rule deny destination IP on switch</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/extreme-nac-service-rule-deny-destination-ip-on-switch/m-p/92065#M282</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;is the switch part of the Policy domain?&lt;BR /&gt;Is there a NAC rule configured that applies the correct Role?&lt;/P&gt;&lt;P&gt;Regards&lt;BR /&gt;Stefan&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 15:34:51 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/extreme-nac-service-rule-deny-destination-ip-on-switch/m-p/92065#M282</guid>
      <dc:creator>Stefan_K_</dc:creator>
      <dc:date>2021-09-08T15:34:51Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme NAC - Service rule deny destination IP on switch</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/extreme-nac-service-rule-deny-destination-ip-on-switch/m-p/92066#M283</link>
      <description>&lt;P&gt;Hi Stefan,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes and yes. Switch is part of the policy domain, and nac role is configured, proper service that supposed to block traffic is also added to role.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Role action is contain to VLAN&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 15:38:02 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/extreme-nac-service-rule-deny-destination-ip-on-switch/m-p/92066#M283</guid>
      <dc:creator>NieeBieeski</dc:creator>
      <dc:date>2021-09-08T15:38:02Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme NAC - Service rule deny destination IP on switch</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/extreme-nac-service-rule-deny-destination-ip-on-switch/m-p/92067#M284</link>
      <description>&lt;P&gt;I’m not 100% sure if service rules are applied if you use “contain to vlan” instead of “Permit Traffic” or “Deny Traffic”. I only used one of the latter when denying access to certain subnets via service rules.&lt;/P&gt;&lt;P&gt;Can you maybe try to use “Permit Traffic”?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you go to Policy → Devices → Right-Click the switch and hit “Verify” to check if the policy is correctly applied?&lt;BR /&gt;Can you share a screenshot of the policy role?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 15:57:07 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/extreme-nac-service-rule-deny-destination-ip-on-switch/m-p/92067#M284</guid>
      <dc:creator>Stefan_K_</dc:creator>
      <dc:date>2021-09-08T15:57:07Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme NAC - Service rule deny destination IP on switch</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/extreme-nac-service-rule-deny-destination-ip-on-switch/m-p/92068#M285</link>
      <description>&lt;P&gt;I switch to “Permit traffic” works the same as contain to vlan. Switch is synced with domain, everything is applied, i also checked directly on the switch if rules are there, and everything looks fine.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is policy role, it’s create for testing purposes. I’ve try to block traffic also by IPDstSocket, doesn’t work either.&amp;nbsp;&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="b7944cdec9da471c8c9353f0ac8e4120_f14e3de7-4027-4a62-851e-3a72d8f93210.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/2102i73EA9FF77AA7E4EE/image-size/large?v=v2&amp;amp;px=999" role="button" title="b7944cdec9da471c8c9353f0ac8e4120_f14e3de7-4027-4a62-851e-3a72d8f93210.png" alt="b7944cdec9da471c8c9353f0ac8e4120_f14e3de7-4027-4a62-851e-3a72d8f93210.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 16:06:09 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/extreme-nac-service-rule-deny-destination-ip-on-switch/m-p/92068#M285</guid>
      <dc:creator>NieeBieeski</dc:creator>
      <dc:date>2021-09-08T16:06:09Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme NAC - Service rule deny destination IP on switch</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/extreme-nac-service-rule-deny-destination-ip-on-switch/m-p/92069#M286</link>
      <description>&lt;P&gt;Hi Marcin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you checked “show netlogin session ports &lt;EM&gt;port-number”&amp;nbsp;&lt;/EM&gt;output to confirm whether the Policy is applied to the end-system after successful&amp;nbsp;authentication?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please also send the output of “show configuration policy” from the switch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 17:22:29 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/extreme-nac-service-rule-deny-destination-ip-on-switch/m-p/92069#M286</guid>
      <dc:creator>Emre_Kurtman</dc:creator>
      <dc:date>2021-09-08T17:22:29Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme NAC - Service rule deny destination IP on switch</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/extreme-nac-service-rule-deny-destination-ip-on-switch/m-p/92070#M287</link>
      <description>&lt;P&gt;Hi Emre,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is output from “sh netlogin session ports” on port that I’m connected:&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="3e846b135896431b80ce3dbdfe208659_f44c306a-5921-43a3-8cf3-40a8c9b0e90e.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/3033i28AC656E5D88F0FB/image-size/large?v=v2&amp;amp;px=999" role="button" title="3e846b135896431b80ce3dbdfe208659_f44c306a-5921-43a3-8cf3-40a8c9b0e90e.png" alt="3e846b135896431b80ce3dbdfe208659_f44c306a-5921-43a3-8cf3-40a8c9b0e90e.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And here is output from sh configuration policy. I only paste here part that is related to policy “MGMT”:&lt;/P&gt;&lt;PRE&gt;&lt;CODE&gt;configure policy profile 1 name "Deny ALL" pvid-status "enable" pvid 0&lt;BR /&gt;configure policy profile 2 name "Facebook" pvid-status "enable" pvid 134&lt;BR /&gt;configure policy profile 3 name "TOMTOM" pvid 322&lt;BR /&gt;configure policy profile 4 name "MGMT" pvid-status "enable" pvid 1065 untagged-vlans 1065&lt;BR /&gt;configure policy profile 5 name "PREH" pvid-status "enable" pvid 135&lt;BR /&gt;configure policy profile 6 name "ARM" untagged-vlans 32&lt;BR /&gt;configure policy profile 7 name "DYSON" untagged-vlans 32&lt;BR /&gt;configure policy profile 8 name "APTIV" pvid-status "enable" pvid 124&lt;BR /&gt;configure policy profile 9 name "FLIR" pvid 143&lt;BR /&gt;configure policy profile 10 name "Permit local"&lt;BR /&gt;configure policy profile 11 name "VO" pvid-status "enable" pvid 138&lt;BR /&gt;configure policy profile 12 name "Panasonic" pvid 129&lt;BR /&gt;configure policy profile 13 name "Captive Portal Redirect" pvid-status "enable" pvid 1065&lt;BR /&gt;configure policy profile 14 name "Unregistered" pvid-status "enable" pvid 4095&lt;BR /&gt;configure policy profile 15 name "Guest" pvid-status "enable" pvid 1079&lt;BR /&gt;configure policy profile 16 name "ASA" untagged-vlans 32&lt;BR /&gt;configure policy profile 17 name "BMW" pvid-status "enable" pvid 150&lt;BR /&gt;configure policy profile 18 name "Cobham" pvid-status "enable" pvid 165&lt;BR /&gt;configure policy profile 19 name "General" pvid-status "enable" pvid 32 untagged-vlans 32&lt;BR /&gt;configure policy profile 20 name "TMO" pvid-status "enable" pvid 32 untagged-vlans 32&lt;BR /&gt;configure policy profile 21 name "Printer" pvid-status "enable" pvid 1040&lt;BR /&gt;configure policy profile 22 name "VoIP" pvid-status "enable" pvid 32&lt;BR /&gt;configure policy profile 23 name "Access Point" pvid-status "enable" pvid 4095 untagged-vlans 1308&lt;BR /&gt;configure policy profile 24 name "CCTV"&lt;BR /&gt;configure policy rule 2 ipdestsocket 8.8.8.8 mask 32 drop&lt;BR /&gt;configure policy rule 2 ipdestsocket 10.200.36.8 mask 30 forward&lt;BR /&gt;configure policy rule 2 ipdestsocket 10.243.9.1:0 mask 48 drop&lt;BR /&gt;configure policy rule 2 ipdestsocket 10.243.40.11 mask 32 drop&lt;BR /&gt;configure policy rule 2 ipdestsocket 10.244.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 2 ipdestsocket 10.244.20.0 mask 24 forward&lt;BR /&gt;configure policy rule 2 ipdestsocket 10.244.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 2 ipdestsocket 10.245.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 2 ipdestsocket 10.245.20.0 mask 24 forward&lt;BR /&gt;configure policy rule 2 ipdestsocket 10.245.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 2 ipdestsocket 10.245.21.0 mask 28 forward&lt;BR /&gt;configure policy rule 2 ipdestsocket 10.245.60.0 mask 24 forward&lt;BR /&gt;configure policy rule 2 ipdestsocket 10.245.65.0 mask 24 drop&lt;BR /&gt;configure policy rule 2 ipdestsocket 192.168.32.0 mask 22 forward&lt;BR /&gt;configure policy rule 2 ipdestsocket 192.168.134.0 mask 24 forward&lt;BR /&gt;configure policy rule 2 tcpdestportIP 80 mask 16 forward&lt;BR /&gt;configure policy rule 2 tcpdestportIP 443 mask 16 forward&lt;BR /&gt;configure policy rule 2 ipproto 1 mask 8 drop&lt;BR /&gt;configure policy rule 2 ipdestsocket 10.243.40.1:0-65535 mask 64 drop&lt;BR /&gt;configure policy rule 3 ipdestsocket 10.200.36.8 mask 30 forward&lt;BR /&gt;configure policy rule 3 ipdestsocket 10.244.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 3 ipdestsocket 10.244.20.0 mask 24 forward&lt;BR /&gt;configure policy rule 3 ipdestsocket 10.244.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 3 ipdestsocket 10.245.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 3 ipdestsocket 10.245.20.0 mask 24 forward&lt;BR /&gt;configure policy rule 3 ipdestsocket 10.245.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 3 ipdestsocket 10.245.60.0 mask 24 forward&lt;BR /&gt;configure policy rule 3 ipdestsocket 192.168.32.0 mask 22 forward&lt;BR /&gt;configure policy rule 3 tcpdestportIP 80 mask 16 forward&lt;BR /&gt;configure policy rule 3 tcpdestportIP 443 mask 16 forward&lt;BR /&gt;configure policy rule 4 ipdestsocket 8.8.8.8 mask 32 drop&lt;BR /&gt;configure policy rule 4 ipdestsocket 10.243.9.1:0 mask 48 drop&lt;BR /&gt;configure policy rule 4 ipdestsocket 10.243.40.11 mask 32 drop&lt;BR /&gt;configure policy rule 4 ipproto 1 mask 8 drop&lt;BR /&gt;configure policy rule 4 ipdestsocket 10.243.40.1:0-65535 mask 64 drop&lt;BR /&gt;configure policy rule 5 ipdestsocket 10.200.36.8 mask 30 forward&lt;BR /&gt;configure policy rule 5 ipdestsocket 10.244.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 5 ipdestsocket 10.244.20.0 mask 24 forward&lt;BR /&gt;configure policy rule 5 ipdestsocket 10.244.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 5 ipdestsocket 10.245.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 5 ipdestsocket 10.245.20.0 mask 24 forward&lt;BR /&gt;configure policy rule 5 ipdestsocket 10.245.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 5 ipdestsocket 10.245.60.0 mask 24 forward&lt;BR /&gt;configure policy rule 5 ipdestsocket 192.168.32.0 mask 22 forward&lt;BR /&gt;configure policy rule 5 ipdestsocket 192.168.135.0 mask 24 forward&lt;BR /&gt;configure policy rule 5 tcpdestportIP 80 mask 16 forward&lt;BR /&gt;configure policy rule 5 tcpdestportIP 443 mask 16 forward&lt;BR /&gt;configure policy rule 6 ipdestsocket 10.200.36.8 mask 30 forward&lt;BR /&gt;configure policy rule 6 ipdestsocket 10.244.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 6 ipdestsocket 10.244.20.0 mask 24 forward&lt;BR /&gt;configure policy rule 6 ipdestsocket 10.244.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 6 ipdestsocket 10.244.21.160 mask 28 forward&lt;BR /&gt;configure policy rule 6 ipdestsocket 10.245.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 6 ipdestsocket 10.245.20.0 mask 24 forward&lt;BR /&gt;configure policy rule 6 ipdestsocket 10.245.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 6 ipdestsocket 10.245.60.0 mask 24 forward&lt;BR /&gt;configure policy rule 6 ipdestsocket 192.168.32.0 mask 22 forward&lt;BR /&gt;configure policy rule 6 tcpdestportIP 80 mask 16 forward&lt;BR /&gt;configure policy rule 6 tcpdestportIP 443 mask 16 forward&lt;BR /&gt;configure policy rule 7 ipdestsocket 10.200.36.8 mask 30 forward&lt;BR /&gt;configure policy rule 7 ipdestsocket 10.244.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 7 ipdestsocket 10.244.20.0 mask 24 forward&lt;BR /&gt;configure policy rule 7 ipdestsocket 10.244.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 7 ipdestsocket 10.245.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 7 ipdestsocket 10.245.20.0 mask 24 forward&lt;BR /&gt;configure policy rule 7 ipdestsocket 10.245.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 7 ipdestsocket 10.245.21.32 mask 28 forward&lt;BR /&gt;configure policy rule 7 ipdestsocket 10.245.60.0 mask 24 forward&lt;BR /&gt;configure policy rule 7 ipdestsocket 192.168.32.0 mask 22 forward&lt;BR /&gt;configure policy rule 7 tcpdestportIP 80 mask 16 forward&lt;BR /&gt;configure policy rule 7 tcpdestportIP 443 mask 16 forward&lt;BR /&gt;configure policy rule 8 ipdestsocket 10.200.36.8 mask 30 forward&lt;BR /&gt;configure policy rule 8 ipdestsocket 10.244.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 8 ipdestsocket 10.244.20.0 mask 24 forward&lt;BR /&gt;configure policy rule 8 ipdestsocket 10.244.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 8 ipdestsocket 10.245.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 8 ipdestsocket 10.245.20.0 mask 24 forward&lt;BR /&gt;configure policy rule 8 ipdestsocket 10.245.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 8 ipdestsocket 10.245.21.48 mask 28 forward&lt;BR /&gt;configure policy rule 8 ipdestsocket 10.245.60.0 mask 24 forward&lt;BR /&gt;configure policy rule 8 ipdestsocket 192.168.32.0 mask 22 forward&lt;BR /&gt;configure policy rule 8 ipdestsocket 192.168.121.0 mask 24 forward&lt;BR /&gt;configure policy rule 8 tcpdestportIP 80 mask 16 forward&lt;BR /&gt;configure policy rule 8 tcpdestportIP 443 mask 16 forward&lt;BR /&gt;configure policy rule 9 ipdestsocket 10.200.36.8 mask 30 forward&lt;BR /&gt;configure policy rule 9 ipdestsocket 10.244.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 9 ipdestsocket 10.244.20.0 mask 24 forward&lt;BR /&gt;configure policy rule 9 ipdestsocket 10.244.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 9 ipdestsocket 10.245.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 9 ipdestsocket 10.245.20.0 mask 24 forward&lt;BR /&gt;configure policy rule 9 ipdestsocket 10.245.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 9 ipdestsocket 10.245.60.0 mask 24 forward&lt;BR /&gt;configure policy rule 9 ipdestsocket 192.168.32.0 mask 22 forward&lt;BR /&gt;configure policy rule 9 ipdestsocket 192.168.143.0 mask 24 forward&lt;BR /&gt;configure policy rule 9 tcpdestportIP 80 mask 16 forward&lt;BR /&gt;configure policy rule 9 tcpdestportIP 443 mask 16 forward&lt;BR /&gt;configure policy rule 11 ipdestsocket 10.200.36.8 mask 30 forward&lt;BR /&gt;configure policy rule 11 ipdestsocket 10.244.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 11 ipdestsocket 10.244.20.0 mask 24 forward&lt;BR /&gt;configure policy rule 11 ipdestsocket 10.244.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 11 ipdestsocket 10.244.21.16 mask 28 forward&lt;BR /&gt;configure policy rule 11 ipdestsocket 10.245.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 11 ipdestsocket 10.245.20.0 mask 24 forward&lt;BR /&gt;configure policy rule 11 ipdestsocket 10.245.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 11 ipdestsocket 10.245.60.0 mask 24 forward&lt;BR /&gt;configure policy rule 11 ipdestsocket 192.168.32.0 mask 22 forward&lt;BR /&gt;configure policy rule 11 ipdestsocket 192.168.138.0 mask 24 forward&lt;BR /&gt;configure policy rule 11 tcpdestportIP 80 mask 16 forward&lt;BR /&gt;configure policy rule 11 tcpdestportIP 443 mask 16 forward&lt;BR /&gt;configure policy rule 12 ipdestsocket 10.200.36.8 mask 30 forward&lt;BR /&gt;configure policy rule 12 ipdestsocket 10.244.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 12 ipdestsocket 10.244.20.0 mask 24 forward&lt;BR /&gt;configure policy rule 12 ipdestsocket 10.244.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 12 ipdestsocket 10.245.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 12 ipdestsocket 10.245.20.0 mask 24 forward&lt;BR /&gt;configure policy rule 12 ipdestsocket 10.245.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 12 ipdestsocket 10.245.60.0 mask 24 forward&lt;BR /&gt;configure policy rule 12 ipdestsocket 192.168.32.0 mask 22 forward&lt;BR /&gt;configure policy rule 12 tcpdestportIP 80 mask 16 forward&lt;BR /&gt;configure policy rule 12 tcpdestportIP 443 mask 16 forward&lt;BR /&gt;configure policy rule 13 ipdestsocket 10.200.36.8 mask 30 forward&lt;BR /&gt;configure policy rule 13 ipdestsocket 10.244.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 13 ipdestsocket 10.245.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 14 ipdestsocket 10.200.36.8 mask 30 forward&lt;BR /&gt;configure policy rule 14 ipdestsocket 10.244.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 14 ipdestsocket 10.244.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 14 ipdestsocket 10.245.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 14 ipdestsocket 10.245.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 16 ipdestsocket 10.200.36.8 mask 30 forward&lt;BR /&gt;configure policy rule 16 ipdestsocket 10.244.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 16 ipdestsocket 10.244.20.0 mask 24 forward&lt;BR /&gt;configure policy rule 16 ipdestsocket 10.244.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 16 ipdestsocket 10.245.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 16 ipdestsocket 10.245.20.0 mask 24 forward&lt;BR /&gt;configure policy rule 16 ipdestsocket 10.245.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 16 ipdestsocket 10.245.21.112 mask 28 forward&lt;BR /&gt;configure policy rule 16 ipdestsocket 10.245.60.0 mask 24 forward&lt;BR /&gt;configure policy rule 16 ipdestsocket 192.168.32.0 mask 22 forward&lt;BR /&gt;configure policy rule 16 tcpdestportIP 80 mask 16 forward&lt;BR /&gt;configure policy rule 16 tcpdestportIP 443 mask 16 forward&lt;BR /&gt;configure policy rule 17 ipdestsocket 10.200.36.8 mask 30 forward&lt;BR /&gt;configure policy rule 17 ipdestsocket 10.244.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 17 ipdestsocket 10.244.20.0 mask 24 forward&lt;BR /&gt;configure policy rule 17 ipdestsocket 10.244.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 17 ipdestsocket 10.244.21.32 mask 28 forward&lt;BR /&gt;configure policy rule 17 ipdestsocket 10.245.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 17 ipdestsocket 10.245.20.0 mask 24 forward&lt;BR /&gt;configure policy rule 17 ipdestsocket 10.245.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 17 ipdestsocket 10.245.60.0 mask 24 forward&lt;BR /&gt;configure policy rule 17 ipdestsocket 192.168.32.0 mask 22 forward&lt;BR /&gt;configure policy rule 17 ipdestsocket 192.168.150.0 mask 24 forward&lt;BR /&gt;configure policy rule 17 tcpdestportIP 80 mask 16 forward&lt;BR /&gt;configure policy rule 17 tcpdestportIP 443 mask 16 forward&lt;BR /&gt;configure policy rule 18 ipdestsocket 10.200.36.8 mask 30 forward&lt;BR /&gt;configure policy rule 18 ipdestsocket 10.244.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 18 ipdestsocket 10.244.20.0 mask 24 forward&lt;BR /&gt;configure policy rule 18 ipdestsocket 10.244.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 18 ipdestsocket 10.245.19.10 mask 32 forward&lt;BR /&gt;configure policy rule 18 ipdestsocket 10.245.20.0 mask 24 forward&lt;BR /&gt;configure policy rule 18 ipdestsocket 10.245.20.5 mask 32 forward&lt;BR /&gt;configure policy rule 18 ipdestsocket 10.245.21.128 mask 28 forward&lt;BR /&gt;configure policy rule 18 ipdestsocket 10.245.60.0 mask 24 forward&lt;BR /&gt;configure policy rule 18 ipdestsocket 192.168.32.0 mask 22 forward&lt;BR /&gt;configure policy rule 18 ipdestsocket 192.168.165.0 mask 25 forward&lt;BR /&gt;configure policy rule 18 tcpdestportIP 80 mask 16 forward&lt;BR /&gt;configure policy rule 18 tcpdestportIP 443 mask 16 forward&lt;BR /&gt;configure policy rule 19 ipdestsocket 10.243.40.11 mask 32 drop&lt;BR /&gt;configure policy vlanauthorization enable&lt;BR /&gt;enable policy&lt;BR /&gt;&lt;/CODE&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 17:43:19 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/extreme-nac-service-rule-deny-destination-ip-on-switch/m-p/92070#M287</guid>
      <dc:creator>NieeBieeski</dc:creator>
      <dc:date>2021-09-08T17:43:19Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme NAC - Service rule deny destination IP on switch</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/extreme-nac-service-rule-deny-destination-ip-on-switch/m-p/92071#M288</link>
      <description>&lt;P&gt;Hi Marcin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just one thing to confirm, as you are also trying to deny 8.8.8.8. Does that one work at least perhaps?&lt;/P&gt;&lt;P&gt;What is the fw version on the switch by the way?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;Tomasz&lt;/P&gt;</description>
      <pubDate>Thu, 09 Sep 2021 21:51:30 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/extreme-nac-service-rule-deny-destination-ip-on-switch/m-p/92071#M288</guid>
      <dc:creator>Tomasz</dc:creator>
      <dc:date>2021-09-09T21:51:30Z</dc:date>
    </item>
    <item>
      <title>Re: Extreme NAC - Service rule deny destination IP on switch</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/extreme-nac-service-rule-deny-destination-ip-on-switch/m-p/92072#M289</link>
      <description>&lt;P&gt;Hi Tomasz,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes and no. When I’m connected via cable to switch connection to 8.8.8.8 is still passing thru. When I’m connected to WLC [which is part of the same domain, and it’s connected to the same Access Control Engine] the traffic is blocked.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Version of the switch is:&amp;nbsp;30.7.2.1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Marcin&lt;/P&gt;</description>
      <pubDate>Fri, 10 Sep 2021 14:11:30 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/extreme-nac-service-rule-deny-destination-ip-on-switch/m-p/92072#M289</guid>
      <dc:creator>NieeBieeski</dc:creator>
      <dc:date>2021-09-10T14:11:30Z</dc:date>
    </item>
  </channel>
</rss>

