<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Cisco - Extreme NAC integration -multiauthentication, vlan, dot1x, mac in Scripting</title>
    <link>https://community.extremenetworks.com/t5/scripting/cisco-extreme-nac-integration-multiauthentication-vlan-dot1x-mac/m-p/20758#M283</link>
    <description>Thanks Michael. Order depends of what you want to do first &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; This config was modified many times for different ways of authentication. &lt;BR /&gt;
Also there is one important thing. Instead of whatever you set there Cisco can ignore it. When you set order on ios &amp;lt;15.02 then this settings is inrelevant because cisco always tries dot1x first.  Keep in mind right timouts then.&lt;BR /&gt;</description>
    <pubDate>Mon, 20 Apr 2015 18:25:00 GMT</pubDate>
    <dc:creator>Tomasz_Lubas</dc:creator>
    <dc:date>2015-04-20T18:25:00Z</dc:date>
    <item>
      <title>Cisco - Extreme NAC integration -multiauthentication, vlan, dot1x, mac</title>
      <link>https://community.extremenetworks.com/t5/scripting/cisco-extreme-nac-integration-multiauthentication-vlan-dot1x-mac/m-p/20754#M279</link>
      <description>How to integrate cisco switches with Extreme NAC. You can pass vlan, acl's per user, authenticate mac or user even download acl's from NAC and even more - multiauthenticate up to 8 users on one cisco port...&lt;BR /&gt;</description>
      <pubDate>Mon, 20 Apr 2015 17:40:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/scripting/cisco-extreme-nac-integration-multiauthentication-vlan-dot1x-mac/m-p/20754#M279</guid>
      <dc:creator>Tomasz_Lubas</dc:creator>
      <dc:date>2015-04-20T17:40:00Z</dc:date>
    </item>
    <item>
      <title>RE: Cisco - Extreme NAC integration -multiauthentication, vlan, dot1x, mac</title>
      <link>https://community.extremenetworks.com/t5/scripting/cisco-extreme-nac-integration-multiauthentication-vlan-dot1x-mac/m-p/20755#M280</link>
      <description>Hello&lt;BR /&gt;
&lt;BR /&gt;
You can find a few answers here: &lt;A href="https://community.extremenetworks.com/extreme/topics/integration-cisco-switches-into-enterasys-nac" target="_blank" rel="nofollow noreferrer noopener"&gt;https://community.extremenetworks.com/extreme/topics/integration-cisco-switches-into-enterasys-nac&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;
And I already had seen an integration guide for Cisco switch from Enterasys. But I can't find it anymore on Extremes website.&lt;BR /&gt;
&lt;BR /&gt;
Regards&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Mon, 20 Apr 2015 17:55:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/scripting/cisco-extreme-nac-integration-multiauthentication-vlan-dot1x-mac/m-p/20755#M280</guid>
      <dc:creator>Christoph</dc:creator>
      <dc:date>2015-04-20T17:55:00Z</dc:date>
    </item>
    <item>
      <title>RE: Cisco - Extreme NAC integration -multiauthentication, vlan, dot1x, mac</title>
      <link>https://community.extremenetworks.com/t5/scripting/cisco-extreme-nac-integration-multiauthentication-vlan-dot1x-mac/m-p/20756#M281</link>
      <description>It seems that extreme cut off my previous post... and that was not request for help but howto, anyway thanks Christoph &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;
Below is full content of my post.&lt;BR /&gt;
&lt;BR /&gt;
I'll try to show you how to integrate cisco switches with Extreme NAC.   You can pass vlan, acl's per user, authenticate mac or user... even   download acl's from NAC and even more - multiauthenticate up to 8 users   on one cisco port...rate limit&lt;BR /&gt;
&lt;BR /&gt;
! The first thing is to configure snmp access, you should see nice green circle in NMS after that. &lt;BR /&gt;
&lt;BR /&gt;
snmp-server group V3Group v3 auth write myView&lt;BR /&gt;
snmp-server group snmpgroup v3 auth read V3Read write V3Write&lt;BR /&gt;
snmp-server group snmpgroup v3 priv&lt;BR /&gt;
snmp-server view V3Read iso included&lt;BR /&gt;
snmp-server view V3Write iso included&lt;BR /&gt;
snmp-server community rw RW&lt;BR /&gt;
snmp-server location DemoLab-1floor&lt;BR /&gt;
snmp-server contact Your contact info&lt;BR /&gt;
! dont forget create snmp user in your group with auth and priv credentials and proper security &lt;BR /&gt;
! related to NMS profile:)&lt;BR /&gt;
! snmp user ....&lt;BR /&gt;
&lt;BR /&gt;
!Then   we need to configure aaa  radius server(s). Don't forget to check if   you didn't cut your own !branch &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Enable enable password and ssh access   and ntp &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;
&lt;BR /&gt;
enable password 7 13061E010803&lt;BR /&gt;
service password-encryption&lt;BR /&gt;
username cisco privilege 15 password YOur-VerY-Secret-pASword-unencrypted-Here&lt;BR /&gt;
ip domain-name your-domain-name&lt;BR /&gt;
crypto key generate rsa&lt;BR /&gt;
1024&lt;BR /&gt;
!&lt;BR /&gt;
ntp server IP_of_ntp_server_here&lt;BR /&gt;
!duble check if clock is ok [yeah cisco uses clock not date, time or something linuxish :)]&lt;BR /&gt;
!&lt;BR /&gt;
ip ssh version 2&lt;BR /&gt;
line vty 0 4&lt;BR /&gt;
 transport input ssh&lt;BR /&gt;
line vty 5 15&lt;BR /&gt;
 transport input ssh&lt;BR /&gt;
&lt;BR /&gt;
!and finally aaa&lt;BR /&gt;
!The first thing is to check IOS capabilities. From 15.02 you should   be able to multiauth users on !single port [as far as i know the 2960   combo switches has those futures limited]&lt;BR /&gt;
!I have tested on 2960G&lt;BR /&gt;
!&lt;BR /&gt;
aaa new-model&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
aaa group server radius radiusNAC&lt;BR /&gt;
 server name your_radius_server_name&lt;BR /&gt;
!&lt;BR /&gt;
aaa authentication login default line enable&lt;BR /&gt;
aaa authentication enable default enable none&lt;BR /&gt;
aaa authentication dot1x default group radiusNAC&lt;BR /&gt;
aaa authorization network default group radiusNAC&lt;BR /&gt;
aaa accounting update periodic 5&lt;BR /&gt;
aaa accounting dot1x default start-stop group radiusNAC&lt;BR /&gt;
aaa accounting network default start-stop group radiusNAC&lt;BR /&gt;
!&lt;BR /&gt;
aaa server radius dynamic-author&lt;BR /&gt;
! above line is important to reauthenticate&lt;BR /&gt;
! below lines includes keys for radius servers [in this cace nacs agteways] keep in mind that &lt;BR /&gt;
! you should put this keys in unencrypted form &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;  &lt;BR /&gt;
 client NAC_1_IP server-key 7 0223306834322E06737D2138373236343F210919011C&lt;BR /&gt;
 client NAC_2_IP server-key 7 0223306834322E06737D2138373236343F210919011C&lt;BR /&gt;
 auth-type all&lt;BR /&gt;
 ignore session-key&lt;BR /&gt;
 ignore server-key&lt;BR /&gt;
 ignore retransmission&lt;BR /&gt;
!&lt;BR /&gt;
aaa session-id common&lt;BR /&gt;
system mtu routing 1500&lt;BR /&gt;
authentication mac-move permit&lt;BR /&gt;
authentication critical recovery delay 1000&lt;BR /&gt;
!&lt;BR /&gt;
radius-server attribute nas-port format c&lt;BR /&gt;
radius-server dead-criteria time 30 tries 3&lt;BR /&gt;
radius-server vsa send accounting&lt;BR /&gt;
radius-server vsa send authentication&lt;BR /&gt;
!&lt;BR /&gt;
radius server your_radius_server_name&lt;BR /&gt;
 address ipv4 Radius_IP auth-port 1812 acct-port 1813&lt;BR /&gt;
 key 7 132023213438250D1417001207073738252622647C6C&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
dot1x system-auth-control&lt;BR /&gt;
dot1x critical eapol&lt;BR /&gt;
!&lt;BR /&gt;
! And interfaces, 1-for multiauth, 3-for dynamic, downloadable acls, &lt;BR /&gt;
! 4-for multidomain [ipphone and computer on one port]&lt;BR /&gt;
!&lt;BR /&gt;
interface GigabitEthernet0/1&lt;BR /&gt;
 switchport access vlan 33&lt;BR /&gt;
 switchport mode access&lt;BR /&gt;
 ip access-group 110 in&lt;BR /&gt;
 authentication control-direction in&lt;BR /&gt;
 authentication event fail action next-method&lt;BR /&gt;
 authentication event server dead action authorize vlan 23&lt;BR /&gt;
 authentication event server alive action reinitialize&lt;BR /&gt;
 authentication host-mode multi-auth&lt;BR /&gt;
 authentication open&lt;BR /&gt;
 authentication order dot1x mab&lt;BR /&gt;
 authentication priority dot1x mab&lt;BR /&gt;
 authentication port-control auto&lt;BR /&gt;
 authentication periodic&lt;BR /&gt;
 authentication timer reauthenticate server&lt;BR /&gt;
 authentication violation replace&lt;BR /&gt;
 dot1x pae authenticator&lt;BR /&gt;
!&lt;BR /&gt;
interface GigabitEthernet0/2&lt;BR /&gt;
 switchport mode trunk&lt;BR /&gt;
!&lt;BR /&gt;
interface GigabitEthernet0/3&lt;BR /&gt;
 switchport access vlan 33&lt;BR /&gt;
 switchport mode access&lt;BR /&gt;
 ip access-group 110 in&lt;BR /&gt;
 authentication control-direction in&lt;BR /&gt;
 authentication event fail action next-method&lt;BR /&gt;
 authentication event server dead action authorize vlan 23&lt;BR /&gt;
 authentication event no-response action authorize vlan 400&lt;BR /&gt;
 authentication event server alive action reinitialize&lt;BR /&gt;
 authentication open&lt;BR /&gt;
 authentication order mab dot1x&lt;BR /&gt;
 authentication priority mab dot1x&lt;BR /&gt;
 authentication port-control auto&lt;BR /&gt;
 authentication periodic&lt;BR /&gt;
 authentication timer reauthenticate server&lt;BR /&gt;
 authentication violation replace&lt;BR /&gt;
 mab&lt;BR /&gt;
 dot1x pae authenticator&lt;BR /&gt;
 dot1x timeout tx-period 1&lt;BR /&gt;
 dot1x max-reauth-req 1&lt;BR /&gt;
 spanning-tree portfast&lt;BR /&gt;
!&lt;BR /&gt;
interface GigabitEthernet0/4&lt;BR /&gt;
 switchport mode access&lt;BR /&gt;
 switchport voice vlan 2&lt;BR /&gt;
 ip access-group default_acl in&lt;BR /&gt;
 authentication control-direction in&lt;BR /&gt;
 authentication event fail action authorize vlan 400&lt;BR /&gt;
 authentication event server dead action authorize vlan 23&lt;BR /&gt;
 authentication event no-response action authorize vlan 400&lt;BR /&gt;
 authentication event server alive action reinitialize&lt;BR /&gt;
 authentication host-mode multi-domain&lt;BR /&gt;
 authentication open&lt;BR /&gt;
 authentication order mab&lt;BR /&gt;
 authentication priority mab dot1x&lt;BR /&gt;
 authentication port-control auto&lt;BR /&gt;
 authentication periodic&lt;BR /&gt;
 authentication timer reauthenticate server&lt;BR /&gt;
 authentication violation replace&lt;BR /&gt;
 mab&lt;BR /&gt;
 dot1x pae authenticator&lt;BR /&gt;
 dot1x timeout tx-period 1&lt;BR /&gt;
 dot1x max-reauth-req 1&lt;BR /&gt;
 spanning-tree portfast&lt;BR /&gt;
!&lt;BR /&gt;
ip access-list extended Unregistered&lt;BR /&gt;
 permit ip any host 192.168.30.20&lt;BR /&gt;
 permit ip any host 192.168.30.21&lt;BR /&gt;
 deny   udp any any eq domain&lt;BR /&gt;
 permit ip any any&lt;BR /&gt;
ip access-list extended default_acl&lt;BR /&gt;
 permit ip any any&lt;BR /&gt;
access-list 100 permit ip any any&lt;BR /&gt;
access-list 110 permit ip any any&lt;BR /&gt;
ip access-list extended EnterpriseUser&lt;BR /&gt;
 permit ip any any&lt;BR /&gt;
&lt;BR /&gt;
! Thats all from cisco , then NAC&lt;BR /&gt;
&lt;BR /&gt;
We need to make policy, end devices/users group, nac profile, group and conf for switch parameters.&lt;BR /&gt;
Below screens shows how to pass vlan and named acl to cisco switch.&lt;BR /&gt;
&lt;BR /&gt;
&lt;P class="fancybox-image"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="0532f779b99f4881b22a0d09f6218246_RackMultipart20150420-17690-1kugnz9-cisco-radius-conf1_inline.jpg"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/4358i10B92F82E9E44B1F/image-size/large?v=v2&amp;amp;px=999" role="button" title="0532f779b99f4881b22a0d09f6218246_RackMultipart20150420-17690-1kugnz9-cisco-radius-conf1_inline.jpg" alt="0532f779b99f4881b22a0d09f6218246_RackMultipart20150420-17690-1kugnz9-cisco-radius-conf1_inline.jpg" /&gt;&lt;/span&gt;&lt;/P&gt; &lt;BR /&gt;
&lt;BR /&gt;
&lt;P class="fancybox-image"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="0532f779b99f4881b22a0d09f6218246_RackMultipart20150420-4857-13qcrb2-cisco-radius-conf6_inline.jpg"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/4552iB7148095BA281DB5/image-size/large?v=v2&amp;amp;px=999" role="button" title="0532f779b99f4881b22a0d09f6218246_RackMultipart20150420-4857-13qcrb2-cisco-radius-conf6_inline.jpg" alt="0532f779b99f4881b22a0d09f6218246_RackMultipart20150420-4857-13qcrb2-cisco-radius-conf6_inline.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;BR /&gt;
&lt;BR /&gt;
You should enable debug on cisco to check if our work works &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;
&lt;BR /&gt;
debug authentication...&lt;BR /&gt;
debug radius ...&lt;P class="fancybox-image"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="0532f779b99f4881b22a0d09f6218246_RackMultipart20150420-25612-b03zdr-cisco_debug_inline.jpg"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/3601iB0019FBD7FC3D5D8/image-size/large?v=v2&amp;amp;px=999" role="button" title="0532f779b99f4881b22a0d09f6218246_RackMultipart20150420-25612-b03zdr-cisco_debug_inline.jpg" alt="0532f779b99f4881b22a0d09f6218246_RackMultipart20150420-25612-b03zdr-cisco_debug_inline.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;BR /&gt;
&lt;BR /&gt;
If   you want to pass ACL's from NAC to cisco then you should use another   option fields and reconfigure switch parameters. Look at avpair   atributes !&lt;BR /&gt;
&lt;P class="fancybox-image"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="0532f779b99f4881b22a0d09f6218246_RackMultipart20150420-6329-vy5sa2-cisco-radius-conf7_inline.jpg"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/1477iD9A55B956F3A58CF/image-size/large?v=v2&amp;amp;px=999" role="button" title="0532f779b99f4881b22a0d09f6218246_RackMultipart20150420-6329-vy5sa2-cisco-radius-conf7_inline.jpg" alt="0532f779b99f4881b22a0d09f6218246_RackMultipart20150420-6329-vy5sa2-cisco-radius-conf7_inline.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;BR /&gt;
 &lt;BR /&gt;
&lt;BR /&gt;
Thats all, wish you many success playing with cisco &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Pls let me know if you got any success.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Mon, 20 Apr 2015 18:25:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/scripting/cisco-extreme-nac-integration-multiauthentication-vlan-dot1x-mac/m-p/20756#M281</guid>
      <dc:creator>Tomasz_Lubas</dc:creator>
      <dc:date>2015-04-20T18:25:00Z</dc:date>
    </item>
    <item>
      <title>RE: Cisco - Extreme NAC integration -multiauthentication, vlan, dot1x, mac</title>
      <link>https://community.extremenetworks.com/t5/scripting/cisco-extreme-nac-integration-multiauthentication-vlan-dot1x-mac/m-p/20757#M282</link>
      <description>Great job Tomasz,&lt;BR /&gt;
&lt;BR /&gt;
I would alter the interface confic a little bit.&lt;BR /&gt;
&lt;BR /&gt;
Your Config:&lt;BR /&gt;
authentication order mab dot1x&lt;BR /&gt;
authentication priority mab dot1x&lt;BR /&gt;
&lt;BR /&gt;
My Config:&lt;BR /&gt;
authentication order mab dot1x&lt;BR /&gt;
authentication priority&lt;B&gt; dot1x mab&lt;/B&gt;&lt;BR /&gt;
&lt;BR /&gt;
Reason: If the dot1x authentication grants higher priveleges, I think they will not be enforced in your config.&lt;BR /&gt;
&lt;BR /&gt;
Best Regards&lt;BR /&gt;
Michael</description>
      <pubDate>Mon, 20 Apr 2015 18:25:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/scripting/cisco-extreme-nac-integration-multiauthentication-vlan-dot1x-mac/m-p/20757#M282</guid>
      <dc:creator>Michael_Kirchne</dc:creator>
      <dc:date>2015-04-20T18:25:00Z</dc:date>
    </item>
    <item>
      <title>RE: Cisco - Extreme NAC integration -multiauthentication, vlan, dot1x, mac</title>
      <link>https://community.extremenetworks.com/t5/scripting/cisco-extreme-nac-integration-multiauthentication-vlan-dot1x-mac/m-p/20758#M283</link>
      <description>Thanks Michael. Order depends of what you want to do first &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; This config was modified many times for different ways of authentication. &lt;BR /&gt;
Also there is one important thing. Instead of whatever you set there Cisco can ignore it. When you set order on ios &amp;lt;15.02 then this settings is inrelevant because cisco always tries dot1x first.  Keep in mind right timouts then.&lt;BR /&gt;</description>
      <pubDate>Mon, 20 Apr 2015 18:25:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/scripting/cisco-extreme-nac-integration-multiauthentication-vlan-dot1x-mac/m-p/20758#M283</guid>
      <dc:creator>Tomasz_Lubas</dc:creator>
      <dc:date>2015-04-20T18:25:00Z</dc:date>
    </item>
    <item>
      <title>RE: Cisco - Extreme NAC integration -multiauthentication, vlan, dot1x, mac</title>
      <link>https://community.extremenetworks.com/t5/scripting/cisco-extreme-nac-integration-multiauthentication-vlan-dot1x-mac/m-p/20759#M284</link>
      <description>Yes - against most config examples with current software, in my opinion it is best practice to set the order to mac than dot1x (to avoid timing issues) and priority to dot1x.&lt;BR /&gt;
&lt;BR /&gt;
Thanks a lot &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;
&lt;BR /&gt;
Michael</description>
      <pubDate>Mon, 20 Apr 2015 18:25:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/scripting/cisco-extreme-nac-integration-multiauthentication-vlan-dot1x-mac/m-p/20759#M284</guid>
      <dc:creator>Michael_Kirchne</dc:creator>
      <dc:date>2015-04-20T18:25:00Z</dc:date>
    </item>
    <item>
      <title>RE: Cisco - Extreme NAC integration -multiauthentication, vlan, dot1x, mac</title>
      <link>https://community.extremenetworks.com/t5/scripting/cisco-extreme-nac-integration-multiauthentication-vlan-dot1x-mac/m-p/20760#M285</link>
      <description>You should know that it is NOT possible to authenticate more than ONE user per port in a different vlan exept if you use the one client as "voice vlan" on the Cisco.....</description>
      <pubDate>Mon, 20 Apr 2015 19:05:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/scripting/cisco-extreme-nac-integration-multiauthentication-vlan-dot1x-mac/m-p/20760#M285</guid>
      <dc:creator>Rainer_Adam</dc:creator>
      <dc:date>2015-04-20T19:05:00Z</dc:date>
    </item>
    <item>
      <title>RE: Cisco - Extreme NAC integration -multiauthentication, vlan, dot1x, mac</title>
      <link>https://community.extremenetworks.com/t5/scripting/cisco-extreme-nac-integration-multiauthentication-vlan-dot1x-mac/m-p/20761#M286</link>
      <description>Rainer pls read &lt;A href="http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960x/software/15-0_2_EX/security/configuration_guide/b_sec_152ex_2960-x_cg/b_sec_152ex_2960-x_cg_chapter_010000.html#concept_4399A67822B44467858A3DD4B5613E1A" target="_blank" rel="nofollow noreferrer noopener"&gt;http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960x/software/15-0_2_EX/security/configur...&lt;/A&gt;&lt;BR /&gt;
section &lt;BR /&gt;
Multi-auth Per User VLAN assignment&lt;BR /&gt;
&lt;BR /&gt;
and sentence: "When a hub is connected to an access port, and the port is configured    with an access VLAN (V0).       The host (H1) is assigned to VLAN (V1) through the hub. The operational    VLAN of the port is changed to V1. This behaviour is similar on a single-host    or multi-domain-auth port.    &lt;BR /&gt;
&lt;BR /&gt;
   When a second host (H2) is connected and gets assigned to VLAN ( V2),    the port will have two operational VLANs (V1 and V2). If H1 and H2 sends    untagged ingress traffic, H1 traffic is mapped to VLAN (V1) and H2 traffic to    VLAN (V2), all egress traffic going out of the port on VLAN (V1) and VLAN (V2)    are untagged."&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Mon, 20 Apr 2015 19:14:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/scripting/cisco-extreme-nac-integration-multiauthentication-vlan-dot1x-mac/m-p/20761#M286</guid>
      <dc:creator>Tomasz_Lubas</dc:creator>
      <dc:date>2015-04-20T19:14:00Z</dc:date>
    </item>
  </channel>
</rss>

