<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: OnePolicy &amp;quot;deny all&amp;quot; blocks STP on EXOS, but not on EOS in ExtremeSwitching (EOS)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-eos/onepolicy-quot-deny-all-quot-blocks-stp-on-exos-but-not-on-eos/m-p/56202#M751</link>
    <description>Hi all,&lt;BR /&gt;
&lt;BR /&gt;
I have heard a disturbing rumour (I have not received a direct confirmation from an Extreme representative) from a reliable source that the S-Series and K-Series firmware will be (or has been already) changed to break the often used &lt;I&gt;DenyAll&lt;/I&gt; default rule with policies applied after authenticating end systems, just as it is broken on EXOS (see the first post of this thread).&lt;BR /&gt;
&lt;BR /&gt;
To add insult to injury this change is supposed to be implemented without any mention in the Release Notes, breaking existing networks if new firmware is installed, without any chance for a warning in advance. Installing new firmware is often required to stay in compliance with regulations and contracts, including receiving support from Extreme Networks.&lt;BR /&gt;
&lt;BR /&gt;
I do not want to believe this, but there is a certain logic to this ("EOS" always used a couple of &lt;U&gt;undocumented&lt;/U&gt; exceptions to not break networks with a policy that denies "all" frames, while EXOS requires the user to manually allow what is needed for the network to function, see e.g. the issue from the post above or the &lt;A href="https://documentation.extremenetworks.com/exos_22.4/EXOS_21_1/ACL/r_example-acl-rule-entries.shtml" target="_blank" rel="nofollow noreferrer noopener"&gt;Example ACL Rule Entries&lt;/A&gt; from the documentation).&lt;BR /&gt;
&lt;BR /&gt;
Can anybody confirm this, or has seen this with current S-Series or K-Series firmware already?&lt;BR /&gt;
&lt;BR /&gt;
Best regards,&lt;BR /&gt;
Erik&lt;BR /&gt;
&lt;BR /&gt;</description>
    <pubDate>Sun, 21 Jan 2018 00:47:00 GMT</pubDate>
    <dc:creator>Erik_Auerswald</dc:creator>
    <dc:date>2018-01-21T00:47:00Z</dc:date>
    <item>
      <title>OnePolicy "deny all" blocks STP on EXOS, but not on EOS</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/onepolicy-quot-deny-all-quot-blocks-stp-on-exos-but-not-on-eos/m-p/56194#M743</link>
      <description>Hi,&lt;BR /&gt;
&lt;BR /&gt;
when replacing EOS based access switches (e.g. S-Series) with EXOS based switches with OnePolicy support (e.g. X460-G2 or X440-G2), there is a difference in behavior if a &lt;I&gt;deny all&lt;/I&gt; policy is used. On EOS, STP BPDUs are not blocked, but on EXOS they are blocked by the OnePolicy.&lt;BR /&gt;
&lt;BR /&gt;
I have encountered this with a customer using a &lt;I&gt;deny all&lt;/I&gt; default OnePolicy to drop traffic from unauthenticated devices. After authentication, legitimate devices are assigned a OnePolicy to allow desired communication (and a VLAN is assigned using the RFC 3580 method as well).&lt;BR /&gt;
&lt;BR /&gt;
While it is documented that &lt;I&gt;deny all&lt;/I&gt; EXOS ACLs drop all Layer 2 protocols, I was not aware that this was carried over to OnePolicy (and I did &lt;I&gt;not&lt;/I&gt; check the documentation).&lt;BR /&gt;
&lt;BR /&gt;
Another problem is how to allow STP BPDUs in the default policy. I see two obvious methods to recognize them:&lt;BR /&gt;
&lt;OL&gt; 
&lt;LI&gt;By the destination MAC address of 01:80:C2:00:00:00 
&lt;/LI&gt;&lt;LI&gt;By the LLC DSAP of 0x42 and SSAP of 0x42&lt;/LI&gt;&lt;/OL&gt;The first method should be supported on X460-G2 switches (according to &lt;I&gt;show policy capabilities&lt;/I&gt;), but not on e.g. X440-G2. The second method is not supported by either X440-G2 nor X460-G2. Since we had X440-G2 in the lab, we could not test the first method when I was on-site (for a different task that had priority).&lt;BR /&gt;
&lt;BR /&gt;
Has anybody encountered this problem before? How was it solved?&lt;BR /&gt;
&lt;BR /&gt;
[Note: &lt;I&gt;OnePolicy&lt;/I&gt; was just called &lt;I&gt;Policy&lt;/I&gt; on EOS, but EXOS knew &lt;I&gt;policy&lt;/I&gt; (.pol) files (also known as &lt;I&gt;ACLs&lt;/I&gt;) as well. EXOS ACLs are more powerful than EXOS OnePolicies.]&lt;BR /&gt;
&lt;BR /&gt;
Thanks,&lt;BR /&gt;
Erik</description>
      <pubDate>Mon, 16 Oct 2017 20:33:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/onepolicy-quot-deny-all-quot-blocks-stp-on-exos-but-not-on-eos/m-p/56194#M743</guid>
      <dc:creator>Erik_Auerswald</dc:creator>
      <dc:date>2017-10-16T20:33:00Z</dc:date>
    </item>
    <item>
      <title>RE: OnePolicy "deny all" blocks STP on EXOS, but not on EOS</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/onepolicy-quot-deny-all-quot-blocks-stp-on-exos-but-not-on-eos/m-p/56195#M744</link>
      <description>Hi Erik,&lt;BR /&gt;
&lt;BR /&gt;
i ran into the same problem!&lt;BR /&gt;
&lt;BR /&gt;
I have a customers project with PEAP and EAP-TLS Authentication and a "Pre-Login" Policy which only allow some specific communications. After upgrade from EXOS 21.1.3 to EXOS 22.3.1.4 PEAP and EAP-TLS is not running anymore.&lt;BR /&gt;
&lt;BR /&gt;
i opened a case.&lt;BR /&gt;
&lt;BR /&gt;
Possible Solutions:&lt;BR /&gt;
+ change Pre-Login Policy from PVID 0 (Deny All ) to PVID 4095 (allow All)&lt;BR /&gt;
+ Enhance Pre-Login Policy with STP BPDU, EAPOL, ...&lt;BR /&gt;
+ Waiting till EXOS 22.4.x which will change behaviour back as it was in 21.1.3&lt;BR /&gt;
&lt;BR /&gt;
Allowing STP via 01:80:C2:00:00:00 on X440-G2 is possible if you do not try to use a variable mask - use ff:ff:ff:ff:ff:ff&lt;BR /&gt;
&lt;BR /&gt;
Here an example:&lt;BR /&gt;
    configure policy profile 1 name "PC-PreAuth" pvid-status "enable" pvid 0&lt;BR /&gt;
configure policy rule 1 macdest 01-80-C2-00-00-00 mask 48 forward&lt;BR /&gt;
configure policy rule 1 ether 0x0806 mask 16 forward&lt;BR /&gt;
configure policy rule 1 ether 0x8100 mask 16 forward&lt;BR /&gt;
configure policy rule 1 ether 0x888E mask 16 forward&lt;BR /&gt;
configure policy rule 1 ether 0x88CC mask 16 forward    &lt;BR /&gt;
&lt;BR /&gt;
Regards,&lt;BR /&gt;
Matthias&lt;BR /&gt;</description>
      <pubDate>Tue, 17 Oct 2017 02:24:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/onepolicy-quot-deny-all-quot-blocks-stp-on-exos-but-not-on-eos/m-p/56195#M744</guid>
      <dc:creator>M_Nees</dc:creator>
      <dc:date>2017-10-17T02:24:00Z</dc:date>
    </item>
    <item>
      <title>RE: OnePolicy "deny all" blocks STP on EXOS, but not on EOS</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/onepolicy-quot-deny-all-quot-blocks-stp-on-exos-but-not-on-eos/m-p/56196#M745</link>
      <description>Hi Matthias,&lt;BR /&gt;
&lt;BR /&gt;
the macdest OnePolicy rule was not accepted on the X440-G2 in the lab. I tried it with the 48 bit mask only, because that is what needs to be matched. After this I checked with "show policy capabilit" what is supported, and destination MAC had no check mark.&lt;BR /&gt;
&lt;BR /&gt;
Regards,&lt;BR /&gt;
Erik</description>
      <pubDate>Tue, 17 Oct 2017 02:24:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/onepolicy-quot-deny-all-quot-blocks-stp-on-exos-but-not-on-eos/m-p/56196#M745</guid>
      <dc:creator>Erik_Auerswald</dc:creator>
      <dc:date>2017-10-17T02:24:00Z</dc:date>
    </item>
    <item>
      <title>RE: OnePolicy "deny all" blocks STP on EXOS, but not on EOS</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/onepolicy-quot-deny-all-quot-blocks-stp-on-exos-but-not-on-eos/m-p/56197#M746</link>
      <description>Do you work with recent EXOS firmware ? I am really sure that the above example works on customers system with X440-G2 with 22.3.1.4 firmware.&lt;BR /&gt;
&lt;BR /&gt;
Regards&lt;BR /&gt;</description>
      <pubDate>Tue, 17 Oct 2017 02:24:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/onepolicy-quot-deny-all-quot-blocks-stp-on-exos-but-not-on-eos/m-p/56197#M746</guid>
      <dc:creator>M_Nees</dc:creator>
      <dc:date>2017-10-17T02:24:00Z</dc:date>
    </item>
    <item>
      <title>RE: OnePolicy "deny all" blocks STP on EXOS, but not on EOS</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/onepolicy-quot-deny-all-quot-blocks-stp-on-exos-but-not-on-eos/m-p/56198#M747</link>
      <description>It should have been 22.3, but I am not totally sure, because we rebooted into an older firmware the verify that some Policy Manager issues were introduced by 22.3. We should have rebooted into 22.3 before the above mentioned tests, as far as I remember.&lt;BR /&gt;
&lt;BR /&gt;
Thanks,&lt;BR /&gt;
Erik</description>
      <pubDate>Tue, 17 Oct 2017 02:24:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/onepolicy-quot-deny-all-quot-blocks-stp-on-exos-but-not-on-eos/m-p/56198#M747</guid>
      <dc:creator>Erik_Auerswald</dc:creator>
      <dc:date>2017-10-17T02:24:00Z</dc:date>
    </item>
    <item>
      <title>RE: OnePolicy "deny all" blocks STP on EXOS, but not on EOS</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/onepolicy-quot-deny-all-quot-blocks-stp-on-exos-but-not-on-eos/m-p/56199#M748</link>
      <description>Issue is still existing in EXOS 22.4:&lt;BR /&gt;
&lt;BR /&gt;
&lt;A href="https://gtacknowledge.extremenetworks.com/articles/Solution/802-1X-Authentication-Fails-after-Reject-Role-Applied-to-Port" target="_blank" rel="nofollow noreferrer noopener"&gt;https://gtacknowledge.extremenetworks.com/articles/Solution/802-1X-Authentication-Fails-after-Reject...&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 13 Dec 2017 13:38:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/onepolicy-quot-deny-all-quot-blocks-stp-on-exos-but-not-on-eos/m-p/56199#M748</guid>
      <dc:creator>M_Nees</dc:creator>
      <dc:date>2017-12-13T13:38:00Z</dc:date>
    </item>
    <item>
      <title>RE: OnePolicy "deny all" blocks STP on EXOS, but not on EOS</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/onepolicy-quot-deny-all-quot-blocks-stp-on-exos-but-not-on-eos/m-p/56200#M749</link>
      <description>Hi Matthias,&lt;BR /&gt;
&lt;BR /&gt;
that is a new issue (EAPoL blocked by a &lt;I&gt;DenyAll&lt;/I&gt; policy) that I have not seen in the wild yet, this worked before 22.3.1.4.&lt;BR /&gt;
&lt;BR /&gt;
Thanks for pointing out this article!&lt;BR /&gt;
&lt;BR /&gt;
Erik&lt;BR /&gt;</description>
      <pubDate>Wed, 13 Dec 2017 13:38:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/onepolicy-quot-deny-all-quot-blocks-stp-on-exos-but-not-on-eos/m-p/56200#M749</guid>
      <dc:creator>Erik_Auerswald</dc:creator>
      <dc:date>2017-12-13T13:38:00Z</dc:date>
    </item>
    <item>
      <title>RE: OnePolicy "deny all" blocks STP on EXOS, but not on EOS</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/onepolicy-quot-deny-all-quot-blocks-stp-on-exos-but-not-on-eos/m-p/56201#M750</link>
      <description>There is another issue with regard to a DenyAll default policy: &lt;BR /&gt;
&lt;A href="https://gtacknowledge.extremenetworks.com/articles/Solution/Authenticated-user-FDB-entry-stay-learned-in-the-untagged-vlan-and-can-t-send-traffic/" target="_blank" rel="nofollow noreferrer noopener"&gt;Authenticated user FDB entry stay learned in the untagged vlan, and can't send traffic&lt;/A&gt;. That one is supposed to be fixed in 22.3, perhaps this "fix" introduced the new problem with EAPoL frames?&lt;BR /&gt;
&lt;BR /&gt;
I do not like how this issue is progressing... &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 13 Dec 2017 13:38:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/onepolicy-quot-deny-all-quot-blocks-stp-on-exos-but-not-on-eos/m-p/56201#M750</guid>
      <dc:creator>Erik_Auerswald</dc:creator>
      <dc:date>2017-12-13T13:38:00Z</dc:date>
    </item>
    <item>
      <title>RE: OnePolicy "deny all" blocks STP on EXOS, but not on EOS</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/onepolicy-quot-deny-all-quot-blocks-stp-on-exos-but-not-on-eos/m-p/56202#M751</link>
      <description>Hi all,&lt;BR /&gt;
&lt;BR /&gt;
I have heard a disturbing rumour (I have not received a direct confirmation from an Extreme representative) from a reliable source that the S-Series and K-Series firmware will be (or has been already) changed to break the often used &lt;I&gt;DenyAll&lt;/I&gt; default rule with policies applied after authenticating end systems, just as it is broken on EXOS (see the first post of this thread).&lt;BR /&gt;
&lt;BR /&gt;
To add insult to injury this change is supposed to be implemented without any mention in the Release Notes, breaking existing networks if new firmware is installed, without any chance for a warning in advance. Installing new firmware is often required to stay in compliance with regulations and contracts, including receiving support from Extreme Networks.&lt;BR /&gt;
&lt;BR /&gt;
I do not want to believe this, but there is a certain logic to this ("EOS" always used a couple of &lt;U&gt;undocumented&lt;/U&gt; exceptions to not break networks with a policy that denies "all" frames, while EXOS requires the user to manually allow what is needed for the network to function, see e.g. the issue from the post above or the &lt;A href="https://documentation.extremenetworks.com/exos_22.4/EXOS_21_1/ACL/r_example-acl-rule-entries.shtml" target="_blank" rel="nofollow noreferrer noopener"&gt;Example ACL Rule Entries&lt;/A&gt; from the documentation).&lt;BR /&gt;
&lt;BR /&gt;
Can anybody confirm this, or has seen this with current S-Series or K-Series firmware already?&lt;BR /&gt;
&lt;BR /&gt;
Best regards,&lt;BR /&gt;
Erik&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Sun, 21 Jan 2018 00:47:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/onepolicy-quot-deny-all-quot-blocks-stp-on-exos-but-not-on-eos/m-p/56202#M751</guid>
      <dc:creator>Erik_Auerswald</dc:creator>
      <dc:date>2018-01-21T00:47:00Z</dc:date>
    </item>
    <item>
      <title>RE: OnePolicy "deny all" blocks STP on EXOS, but not on EOS</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/onepolicy-quot-deny-all-quot-blocks-stp-on-exos-but-not-on-eos/m-p/56203#M752</link>
      <description>Erik,&lt;BR /&gt;
I spoke with engineering about this rumor.  They have not made changes to which protocols are still processed by EOS in the presence of a default drop rule in policy.  They also stated that there is no plan to do so in the future.&lt;BR /&gt;</description>
      <pubDate>Sun, 21 Jan 2018 00:47:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/onepolicy-quot-deny-all-quot-blocks-stp-on-exos-but-not-on-eos/m-p/56203#M752</guid>
      <dc:creator>Daniel_Coughlin</dc:creator>
      <dc:date>2018-01-21T00:47:00Z</dc:date>
    </item>
    <item>
      <title>RE: OnePolicy "deny all" blocks STP on EXOS, but not on EOS</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-eos/onepolicy-quot-deny-all-quot-blocks-stp-on-exos-but-not-on-eos/m-p/56204#M753</link>
      <description>Hi Daniel,&lt;BR /&gt;
&lt;BR /&gt;
thanks for the info, that was the reply I hoped to get. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;
&lt;BR /&gt;
Erik</description>
      <pubDate>Sun, 21 Jan 2018 00:47:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-eos/onepolicy-quot-deny-all-quot-blocks-stp-on-exos-but-not-on-eos/m-p/56204#M753</guid>
      <dc:creator>Erik_Auerswald</dc:creator>
      <dc:date>2018-01-21T00:47:00Z</dc:date>
    </item>
  </channel>
</rss>

