<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ExtremeControl Profiling in ExtremeControl</title>
    <link>https://community.extremenetworks.com/t5/extremecontrol/extremecontrol-profiling/m-p/110233#M724</link>
    <description>&lt;P&gt;Yes but how do you issue a CoA automatically after it gets profiled correctly?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 29 Jul 2024 12:09:06 GMT</pubDate>
    <dc:creator>Configterminal</dc:creator>
    <dc:date>2024-07-29T12:09:06Z</dc:date>
    <item>
      <title>ExtremeControl Profiling</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/extremecontrol-profiling/m-p/109874#M715</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi everyone,&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;In addition to dhcp pofiling, what are the other methods supported by ExtremeControl to identify the end-system Operating System?&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;When the switch port/or wifi is 802.1x enabled, only EAP traffic is&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://allowed.so/" target="_blank" rel="noopener"&gt;allowed. So&lt;/A&gt;&lt;SPAN&gt;, no matter how much the end-system is sending DHCP Request, this traffic will not be allowed to pass through the port. Therefore, the DHPC Relay configuration pointing to ExtremeControl will have no effect. Am I right or wrong?&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I created a rule in the NAC to authenticate via 8021.x only end-system running Windows 10 and 11 and when the end-system is first seen, the NAC didn't know who it was.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;The switch is sending the DHCP request to the network, the NAC is receiving these DHCP Requests, however, this is only sent when the challenge imposed by the EAP is processed. Before this, only EAP traffic passes through the port or wireless network.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;If the first packet that arrives at the NAC is from RADIUS, how will the NAC know which operating system is in use by the end-system?&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;I would appreciate it if we could talk more about this.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Thank you very much,&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Edson Moura&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2024 13:11:12 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/extremecontrol-profiling/m-p/109874#M715</guid>
      <dc:creator>Edsond</dc:creator>
      <dc:date>2024-07-23T13:11:12Z</dc:date>
    </item>
    <item>
      <title>Re: ExtremeControl Profiling</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/extremecontrol-profiling/m-p/109921#M716</link>
      <description>&lt;P&gt;You can see the various means of OS 'Device Type Detection' under Control -&amp;gt; Engines -&amp;gt; Engine Settings -&amp;gt; Device Type Detection. Agent-based assessment removed (defunct feature) Control will rely on DHCP Fingerprinting or Captive Portal interaction for this.&lt;/P&gt;&lt;P&gt;OS detection is performed after authentication of the device. If DHCP Fingerprinting is to be successful the DHCP flow should be relayed to Control (or mirrored) in addition to actual relay configuration to real DHCP servers. This way Control gets a glimpse of the DHCP exchange.&lt;/P&gt;&lt;P&gt;'You would never know the operating system of a device simply via EAP/RADIUS exchange. EAP/RADIUS is vendor/device agnostic.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 14:05:58 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/extremecontrol-profiling/m-p/109921#M716</guid>
      <dc:creator>Robert_Haynes</dc:creator>
      <dc:date>2024-07-24T14:05:58Z</dc:date>
    </item>
    <item>
      <title>Re: ExtremeControl Profiling</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/extremecontrol-profiling/m-p/109930#M717</link>
      <description>&lt;P&gt;You are definitely not wrong with your points and I'd be curious how others have handled this with XMC-Control.&amp;nbsp;&lt;/P&gt;&lt;P&gt;My immediate thoughts are the following although I've never attempted this&amp;nbsp; on Control but you can do something like this in ClearPass - You can create a rule that sends back an ACL plus the proper VLAN for the device.&amp;nbsp; The ACL will limit what the device can talk to, e.g.: DHCP Server, XMC NAC Engines, etc.&amp;nbsp; This will allow the Client to perform the DHCP process and receive an IP but not much else - it will of also sent the DHCP Info to the NAC Engines so they can profile accordingly.&amp;nbsp; &amp;nbsp; Once this process is done, ClearPass (or XMC-Control in this case I hope) can issue a CoA and the device should now hit the proper rule giving it the proper access as long as the fingerprinting was done correctly.&lt;/P&gt;&lt;P&gt;I am curious as to how others have handled this as I was thinking of implementing Device Types in my rule set as well but unsure as to how to perform a CoA after fingerprinting is successful&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 19:15:48 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/extremecontrol-profiling/m-p/109930#M717</guid>
      <dc:creator>Configterminal</dc:creator>
      <dc:date>2024-07-24T19:15:48Z</dc:date>
    </item>
    <item>
      <title>Re: ExtremeControl Profiling</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/extremecontrol-profiling/m-p/110231#M723</link>
      <description>&lt;P&gt;From XIQ-SE help topic "&lt;EM&gt;How to Use Device Type Profiling&lt;/EM&gt;":&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Here are some examples of how&amp;nbsp;&lt;SPAN class=""&gt;device&lt;/SPAN&gt;&amp;nbsp;&lt;SPAN class=""&gt;type&lt;/SPAN&gt;&amp;nbsp;profiling can be used to determine network access:&lt;/EM&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;EM&gt;When an end user with valid credentials logs in to the network on a registered iPad versus a registered Windows 10 machine, they receive a lower level of network access.&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;When an end user registers a Windows machine using its MAC address, another user cannot spoof that MAC address using a Linux system. (&lt;SPAN class=""&gt;Device&lt;/SPAN&gt;&amp;nbsp;profiling does not resolve this issue in environments with dual boot machines.)&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;EM&gt;If an end user exports a certificate from a corporate PC to an iPad and successfully authenticates with 802.1x, the iPad is not allowed full network access.&lt;/EM&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I believe the simplest way is to create two rules: upper one 802.1x to permit specific access for Windows 10/11 machines and second below to authorize all device types with lower network access to just allow them to obtain IP address. I will check this in my lab but I believe this is the recommended way to do this according to description above.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2024 09:49:41 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/extremecontrol-profiling/m-p/110231#M723</guid>
      <dc:creator>Bartek</dc:creator>
      <dc:date>2024-07-29T09:49:41Z</dc:date>
    </item>
    <item>
      <title>Re: ExtremeControl Profiling</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/extremecontrol-profiling/m-p/110233#M724</link>
      <description>&lt;P&gt;Yes but how do you issue a CoA automatically after it gets profiled correctly?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2024 12:09:06 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/extremecontrol-profiling/m-p/110233#M724</guid>
      <dc:creator>Configterminal</dc:creator>
      <dc:date>2024-07-29T12:09:06Z</dc:date>
    </item>
    <item>
      <title>Re: ExtremeControl Profiling</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/extremecontrol-profiling/m-p/110357#M726</link>
      <description>&lt;P&gt;Hello folks,&lt;/P&gt;&lt;DIV class=""&gt;The image below show us that before the authentication only EAP/RADIUS pass througt to port/switch.&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Edsond_1-1722361032326.png" style="width: 400px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/7942i49473EA19E33A7E7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Edsond_1-1722361032326.png" alt="Edsond_1-1722361032326.png" /&gt;&lt;/span&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;So, the NAC doesn't receive the DHCP Request from end-system. So, the EAC (or other NAC) doesn't who is the operational system.&lt;/SPAN&gt;&lt;P&gt;As&amp;nbsp;&lt;A class="" href="https://community.extremenetworks.com/t5/user/viewprofilepage/user-id/45811" target="_self"&gt;&lt;SPAN class=""&gt;Configterminal&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;said, maybe create a ACL e applied in all ports to permit DHCP. When the NAC receives the dhcp request, it will able to knows the end-system and to apply the correct rule.&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;My immediate thoughts are the following although I've never attempted this&amp;nbsp; on Control but you can do something like this in ClearPass - You can create a rule that sends back an ACL plus the proper VLAN for the device.&amp;nbsp; The ACL will limit what the device can talk to, e.g.: DHCP Server, XMC NAC Engines, etc. "&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Edson Moura&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Tue, 30 Jul 2024 17:46:40 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/extremecontrol-profiling/m-p/110357#M726</guid>
      <dc:creator>Edsond</dc:creator>
      <dc:date>2024-07-30T17:46:40Z</dc:date>
    </item>
    <item>
      <title>Re: ExtremeControl Profiling</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/extremecontrol-profiling/m-p/110497#M727</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I've found solution which works for EXOS switches. Keep in mind that in EXOS you can enable both MAC-based and 802.1x authentication which works concurrently which allows then the NAC to do something like this:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Bartek_0-1722418325840.png" style="width: 999px;"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/7966i0D720A37237E9ECC/image-size/large?v=v2&amp;amp;px=999" role="button" title="Bartek_0-1722418325840.png" alt="Bartek_0-1722418325840.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;So just create a rule for MAC-based authentication which gives a limited access to for Base Services (ARP + DHCP) and 802.1x rule with device profiling and it works&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2024 09:33:49 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/extremecontrol-profiling/m-p/110497#M727</guid>
      <dc:creator>Bartek</dc:creator>
      <dc:date>2024-07-31T09:33:49Z</dc:date>
    </item>
    <item>
      <title>Re: ExtremeControl Profiling</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/extremecontrol-profiling/m-p/110554#M728</link>
      <description>&lt;P&gt;Hi Bartek,&lt;/P&gt;&lt;P&gt;This could work with a wired network. But, how does it work on a wireless network with WAP2/3 Enterprise?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Edson Moura&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2024 15:44:10 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/extremecontrol-profiling/m-p/110554#M728</guid>
      <dc:creator>Edsond</dc:creator>
      <dc:date>2024-07-31T15:44:10Z</dc:date>
    </item>
    <item>
      <title>Re: ExtremeControl Profiling</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/extremecontrol-profiling/m-p/110770#M732</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I've made a screenshot of working example in my lab so I ensure it works. In "accepted solution" you mentioned only about the wired network so I didn't try any wireless as irrelevant for you.&lt;BR /&gt;In wireless I would try to use PPSK with MAC-based authentication enabled to let NAC appliance do the magic. I can check this in my lab when I come back from my holiday. I believe it would be a KISS solution but I am interested of your solution using only 802.1x (I suppose that CoA would be required). What kind of wireless solution are you using now?&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2024 09:24:22 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/extremecontrol-profiling/m-p/110770#M732</guid>
      <dc:creator>Bartek</dc:creator>
      <dc:date>2024-08-05T09:24:22Z</dc:date>
    </item>
    <item>
      <title>Re: ExtremeControl Profiling</title>
      <link>https://community.extremenetworks.com/t5/extremecontrol/extremecontrol-profiling/m-p/110772#M733</link>
      <description>&lt;P&gt;Hi Bartek,&lt;/P&gt;&lt;P&gt;I'm using Extreme Cloud IQ with 802.1x.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Edson Moura&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2024 12:13:20 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremecontrol/extremecontrol-profiling/m-p/110772#M733</guid>
      <dc:creator>Edsond</dc:creator>
      <dc:date>2024-08-05T12:13:20Z</dc:date>
    </item>
  </channel>
</rss>

