<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: X460 reauth/CoA from Forescout in ExtremeSwitching (EXOS/Switch Engine)</title>
    <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x460-reauth-coa-from-forescout/m-p/118629#M22987</link>
    <description>&lt;P&gt;Morning&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;did you get all this to work?&lt;/P&gt;</description>
    <pubDate>Fri, 25 Apr 2025 06:24:36 GMT</pubDate>
    <dc:creator>NikAll</dc:creator>
    <dc:date>2025-04-25T06:24:36Z</dc:date>
    <item>
      <title>X460 reauth/CoA from Forescout</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x460-reauth-coa-from-forescout/m-p/96555#M21967</link>
      <description>&lt;P&gt;Hi, does anyone have any experience with reauthentication commands issued from Forescout appliances?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've confirmed that the Forescout appliances are sending the reauthenticate command with the relevant info to the switch, but the switch doesn't seem to be acknowledging this. Whether I use CoA or manually force a reauth.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the switch side of things, dynamic authorization is enabled and reauthenticate is enabled for the port that my client is connected to.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Jul 2023 16:23:30 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x460-reauth-coa-from-forescout/m-p/96555#M21967</guid>
      <dc:creator>PhilDyer</dc:creator>
      <dc:date>2023-07-24T16:23:30Z</dc:date>
    </item>
    <item>
      <title>Re: X460 reauth/CoA from Forescout</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x460-reauth-coa-from-forescout/m-p/118629#M22987</link>
      <description>&lt;P&gt;Morning&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;did you get all this to work?&lt;/P&gt;</description>
      <pubDate>Fri, 25 Apr 2025 06:24:36 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x460-reauth-coa-from-forescout/m-p/118629#M22987</guid>
      <dc:creator>NikAll</dc:creator>
      <dc:date>2025-04-25T06:24:36Z</dc:date>
    </item>
    <item>
      <title>Re: X460 reauth/CoA from Forescout</title>
      <link>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x460-reauth-coa-from-forescout/m-p/118712#M22996</link>
      <description>&lt;P&gt;Hi Phil,&lt;BR /&gt;&lt;BR /&gt;I don't have a setup with Forescout, but the required AVPs should be the same regardless. This is documented in the 'Change-of-Authorization Mandatory Attributes' section of the user guide.&lt;BR /&gt;&lt;BR /&gt;page 1159:&amp;nbsp;&lt;A href="https://documentation.extremenetworks.com/switchengine_32.7.1/downloads/SwitchEngine_User_Guide_32.7.1.pdf" target="_blank" rel="noopener"&gt;https://documentation.extremenetworks.com/switchengine_32.7.1/downloads/SwitchEngine_User_Guide_32.7.1.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Using FreeRadius, I initiate a CoA using a command similar to the following:&lt;/P&gt;&lt;P&gt;echo "Calling-Station-ID =&amp;nbsp; 16-92-F9-E6-DB-7C, NAS-IP-Address = 2.2.2.1, Filter-Id = test"&amp;nbsp; | radclient -x -r 1 2.2.2.1:3799 coa gns3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Where:&lt;/P&gt;&lt;P&gt;-Calling-Station-ID is the MAC address of the authenticated client who's auth session is being changed.&lt;/P&gt;&lt;P&gt;-NAS-IP-Address is the IP of the switch authenticating the client.&lt;/P&gt;&lt;P&gt;-Filter-ID is the new policy profile to assign to the client.&lt;/P&gt;&lt;P&gt;-Additionally, note that the RADIUS packet must be a 'CoA' packet with the correct shared-secret (gns3 in this case), udp port number (3799 by default), etc.&lt;/P&gt;&lt;P&gt;-Attributes like 'message authenticator' should also be present, but that usually happens automatically depending on your NAC solution.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the switch side, the following is configured in my example setup:&lt;/P&gt;&lt;P&gt;-Basic mgmt IP that can ping the RADIUS server&lt;/P&gt;&lt;P&gt;-RADIUS netlogin and dynamic auth are enabled and configured with a shared secret.&lt;/P&gt;&lt;P&gt;-Netlogin is enabled on the relevant client port for either MAC or dot1x auth.&lt;/P&gt;&lt;P&gt;-Policy is also enabled with some basic profiles in my example setup&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;#&lt;BR /&gt;# Module aaa configuration.&lt;BR /&gt;#&lt;BR /&gt;configure radius netlogin 1 server 2.2.2.2 1812 client-ip 2.2.2.1 vr VR-Default&lt;BR /&gt;configure radius 1 shared-secret encrypted "#$n/IaHgb009BStaephqiOIOCblSE/vw=="&lt;BR /&gt;configure radius dynamic-authorization 1 server 2.2.2.2 client-ip 2.2.2.1 vr VR-Default shared-secret encrypted "#$RXGUNOJWRvMjnF+viXeJXUTtruqofA=="&lt;BR /&gt;enable radius netlogin&lt;BR /&gt;enable radius dynamic-authorization&lt;BR /&gt;&lt;BR /&gt;EXOS-VM.2 # show conf netlogin&lt;BR /&gt;#&lt;BR /&gt;# Module netLogin configuration.&lt;BR /&gt;#&lt;BR /&gt;enable netlogin mac&lt;BR /&gt;enable netlogin ports 1,11 mac&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;EXOS-VM.3 # show conf policy&lt;BR /&gt;#&lt;BR /&gt;# Module policy configuration.&lt;BR /&gt;#&lt;BR /&gt;configure policy profile 1 name "AP" pvid-status "enable" pvid 4095 auth-override "enable"&lt;BR /&gt;configure policy profile 2 name "test" pvid-status "enable" pvid 4095&lt;BR /&gt;enable policy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe you can also use RFC3580 tunnel attributes instead of filter-IDs in the CoA response. You may need to set the maptable response to tunnel or both:&amp;nbsp;&lt;BR /&gt;configure policy maptable response&lt;BR /&gt;&amp;nbsp; both Apply both attributes&lt;BR /&gt;&amp;nbsp; policy Apply the filter-id attribute&lt;BR /&gt;&amp;nbsp; tunnel Apply the vlan-tunnel attribute&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;If you need a VLAN to be dynamically created, turn on VLANauthorization:&amp;nbsp;conf policy vlanauthorization enable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps!&lt;/P&gt;</description>
      <pubDate>Wed, 14 May 2025 13:48:37 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremeswitching-exos-switch/x460-reauth-coa-from-forescout/m-p/118712#M22996</guid>
      <dc:creator>Gabriel_G</dc:creator>
      <dc:date>2025-05-14T13:48:37Z</dc:date>
    </item>
  </channel>
</rss>

