<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Clearpass DACL management - EXOS 16+ in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/clearpass-dacl-management-exos-16/m-p/78797#M19765</link>
    <description>Good day,&lt;BR /&gt;
I have recently inherited a project working with EXOS X440 switches in an enviroment moving toward DACL management through clearpass.&lt;BR /&gt;
&lt;BR /&gt;
My current issue relates to the fact I canno seem to add traffic rules using standard IETF Deny IP NAS-Filter parameters. Here is the AAA Config in the switch:&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;configure radius mgmt-access primary server (IPADDRESS SERVER) 1812 client-ip (Switch) vr VR-Default&lt;/B&gt;&lt;BR /&gt;
&lt;B&gt;configure radius mgmt-access primary shared-secret encrypted "#$NCGjTl6wGExsOKZWj+w="&lt;/B&gt;&lt;BR /&gt;
&lt;B&gt;configure radius netlogin primary server (IPADDRESS SERVER) 1812 client-ip (Switch)  vr VR-Default&lt;/B&gt;&lt;BR /&gt;
&lt;B&gt;configure radius netlogin primary shared-secret encrypted "#$RZcQlN6swEz8dL2eLKM="&lt;/B&gt;&lt;BR /&gt;
&lt;B&gt;configure radius-accounting mgmt-access primary server (IPADDRESS SERVER) 1812 client-ip (Switch) vr VR-Default&lt;/B&gt;&lt;BR /&gt;
&lt;B&gt;configure radius-accounting mgmt-access primary shared-secret encrypted "#$YR5fvd2yGlKR18vK23U="&lt;/B&gt;&lt;BR /&gt;
&lt;B&gt;enable radius mgmt-access&lt;/B&gt;&lt;BR /&gt;
&lt;B&gt;enable radius netlogin&lt;/B&gt;&lt;BR /&gt;
&lt;B&gt;enable radius-accounting mgmt-access&lt;/B&gt;&lt;BR /&gt;
&lt;B&gt;enable radius-accounting netlogin&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
Right now, I have no problems with Authentication via MAC, assigning a client VLAN etc, but when trying to apply ACL rules i cannot determine through logging or bashing my skull against it where exactly I am going off the rails.&lt;BR /&gt;
&lt;BR /&gt;
Here are the basics of the ACL I am attempting to apply:&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;1.Radius:IETF | NAS-Filter-Rule     = permit in udp from any to any 53,67&lt;/B&gt;&lt;BR /&gt;
&lt;B&gt;2.Radius:IETF | NAS-Filter-Rule     = permit in ip from any to 10.0.0.0/8&lt;/B&gt;&lt;BR /&gt;
&lt;B&gt;3.Radius:IETF | NAS-Filter-Rule     = deny in ip from any to any&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
None of these rules appear to have any impact, even though I can see them being applied in clearpass output.&lt;BR /&gt;
&lt;BR /&gt;
TLDR; Can apply VLAN's in EXOS switch, but not ACL controls via Aruba Clearpass.</description>
    <pubDate>Mon, 30 Sep 2019 21:15:41 GMT</pubDate>
    <dc:creator>EXOSNewb</dc:creator>
    <dc:date>2019-09-30T21:15:41Z</dc:date>
    <item>
      <title>Clearpass DACL management - EXOS 16+</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/clearpass-dacl-management-exos-16/m-p/78797#M19765</link>
      <description>Good day,&lt;BR /&gt;
I have recently inherited a project working with EXOS X440 switches in an enviroment moving toward DACL management through clearpass.&lt;BR /&gt;
&lt;BR /&gt;
My current issue relates to the fact I canno seem to add traffic rules using standard IETF Deny IP NAS-Filter parameters. Here is the AAA Config in the switch:&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;configure radius mgmt-access primary server (IPADDRESS SERVER) 1812 client-ip (Switch) vr VR-Default&lt;/B&gt;&lt;BR /&gt;
&lt;B&gt;configure radius mgmt-access primary shared-secret encrypted "#$NCGjTl6wGExsOKZWj+w="&lt;/B&gt;&lt;BR /&gt;
&lt;B&gt;configure radius netlogin primary server (IPADDRESS SERVER) 1812 client-ip (Switch)  vr VR-Default&lt;/B&gt;&lt;BR /&gt;
&lt;B&gt;configure radius netlogin primary shared-secret encrypted "#$RZcQlN6swEz8dL2eLKM="&lt;/B&gt;&lt;BR /&gt;
&lt;B&gt;configure radius-accounting mgmt-access primary server (IPADDRESS SERVER) 1812 client-ip (Switch) vr VR-Default&lt;/B&gt;&lt;BR /&gt;
&lt;B&gt;configure radius-accounting mgmt-access primary shared-secret encrypted "#$YR5fvd2yGlKR18vK23U="&lt;/B&gt;&lt;BR /&gt;
&lt;B&gt;enable radius mgmt-access&lt;/B&gt;&lt;BR /&gt;
&lt;B&gt;enable radius netlogin&lt;/B&gt;&lt;BR /&gt;
&lt;B&gt;enable radius-accounting mgmt-access&lt;/B&gt;&lt;BR /&gt;
&lt;B&gt;enable radius-accounting netlogin&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
Right now, I have no problems with Authentication via MAC, assigning a client VLAN etc, but when trying to apply ACL rules i cannot determine through logging or bashing my skull against it where exactly I am going off the rails.&lt;BR /&gt;
&lt;BR /&gt;
Here are the basics of the ACL I am attempting to apply:&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;1.Radius:IETF | NAS-Filter-Rule     = permit in udp from any to any 53,67&lt;/B&gt;&lt;BR /&gt;
&lt;B&gt;2.Radius:IETF | NAS-Filter-Rule     = permit in ip from any to 10.0.0.0/8&lt;/B&gt;&lt;BR /&gt;
&lt;B&gt;3.Radius:IETF | NAS-Filter-Rule     = deny in ip from any to any&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
None of these rules appear to have any impact, even though I can see them being applied in clearpass output.&lt;BR /&gt;
&lt;BR /&gt;
TLDR; Can apply VLAN's in EXOS switch, but not ACL controls via Aruba Clearpass.</description>
      <pubDate>Mon, 30 Sep 2019 21:15:41 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/clearpass-dacl-management-exos-16/m-p/78797#M19765</guid>
      <dc:creator>EXOSNewb</dc:creator>
      <dc:date>2019-09-30T21:15:41Z</dc:date>
    </item>
    <item>
      <title>Re: Clearpass DACL management - EXOS 16+</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/clearpass-dacl-management-exos-16/m-p/78798#M19766</link>
      <description>Hey everyone -&lt;BR /&gt;
&lt;BR /&gt;
Had to come up with a work around for this as the expected commands aren't working as expected.&lt;BR /&gt;
&lt;BR /&gt;
Had to create a policy in EXOS device blocking an IP&lt;BR /&gt;
configure policy profile 2 name "TEST"&lt;BR /&gt;
configure policy rule 2 ipdestsocket 8.8.8.8 mask 32 drop&lt;BR /&gt;
configure policy rule 2 ipdestsocket 4.2.2.2 mask 32 drop&lt;BR /&gt;
enable policy&lt;BR /&gt;
&lt;BR /&gt;
Once you have this policy in place, in Clearpass you need to push the following command:&lt;BR /&gt;
&lt;BR /&gt;
&lt;BR /&gt;
Radius:IETF  Filter-Id= Test&lt;BR /&gt;
&lt;BR /&gt;
This enforces whatever IP policy you have in place on the EXOS device and can be pushed using any clearpass enforcement profile.</description>
      <pubDate>Thu, 03 Oct 2019 01:23:02 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/clearpass-dacl-management-exos-16/m-p/78798#M19766</guid>
      <dc:creator>EXOSNewb</dc:creator>
      <dc:date>2019-10-03T01:23:02Z</dc:date>
    </item>
  </channel>
</rss>

