cancel
Showing results for 
Search instead for 
Did you mean: 

Extreme Control Rule and AD

Extreme Control Rule and AD

Ian_Broadway
New Contributor III

Hi All,

 

I am trying to create Extreme Control rule sets for MAC and .1x authentication.

Is there not a way I can add a group condition to query a LDAP/AD Domain group?

I can see there is an option for LDAP user groups.

 

Also, do Extreme offer some sort of downloadable config for updating DHCP fingerprints.

Its really tedious to have to go in and add lines of code to add custom fingerprints, not to mention having to hunt through a log file to get them in the first place.

 

One other thing, any ideas/thoughts on being able to add if/or conditions into the same rule?

Thanks

Ian

1 ACCEPTED SOLUTION

Miguel-Angel_RO
Valued Contributor II

Stefan,

 

With a script from @Zdenek Pala (https://github.com/extremenetworks/ExtremeScripting/blob/master/Netsight/oneview_workflows/combo/Use... you can mix both authentications to ensure that the user authentication is done on a computer from the domain:

"Add MAC to Domain Computers" is executed when the computer authenticates. The MAC address is added to End-System and the timestamp is created (updated). Consequent User authentication can be combined with the condition of the End-System group. "Clear old End-Systems in the group" checks if the timestamp is older than X hours and old End-Systems are deleted from the group.

 

Mig

View solution in original post

47 REPLIES 47

PeterK
Contributor III

If Nested Groups are used then you need to add each nested group to the list and use mode “Match Any”. I saw a customer automated this task through API calls.

Of course, but this is only a dirty workaround and not a solution. I hope Extreme will support this in the future.

Zdeněk_Pala
Extreme Employee

If Nested Groups are used then you need to add each nested group to the list and use mode “Match Any”. I saw a customer automated this task through API calls.

Regards Zdeněk Pala

PeterK
Contributor III

I think the problem of Ian ist, that Extreme Control does not support checking ldap attributes of nested group memberships.

You can only check ldap attributes where the account is direct assigned

Zdeněk_Pala
Extreme Employee

Hi,

for some rule components you have “OR” and “AND” already:

c34745203f6b4c3faeed7b37bcfbf3dd_97cd5ef1-e701-4258-9d27-8948930556e1.png

 

regarding the DHCP fingerprinting, here is a new GitHub repository. Feel free to contribute 🙂

 

Regards Zdeněk Pala

Ian_Broadway
New Contributor III

Thank you, i’ll ask the AD guys to check the account permissions for the account used for the LDAP config.

GTM-P2G8KFN