cancel
Showing results for 
Search instead for 
Did you mean: 

Extreme control integration with 3rd party switches

Extreme control integration with 3rd party switches

Ahmed_101
New Contributor III

Hi all.
A customer have many 3rd party switches like hp tp link cisco etc...
we want to configure mac authentication in extreme control for these switches. 
i got confused a little i know that policy roles is extreme priority so it just works for extreme switches like exos. 
when configuring 3rd party switches we will make a profile under the access control tap but we also mapping it to a policy role. how is that ? 
is there any document explain it ? 
Thanks

1 ACCEPTED SOLUTION

Ryan_Yacobucci
Extreme Employee

Hello,

For Monitor mode you policy response is required. You can send set the switch to "No Attributes" or set the policy to "No Policy".

Do not set the switch to "None" attributes in the switch "RADIUS attributes to send" field.

Thanks
-Ryan

View solution in original post

3 REPLIES 3

Ryan_Yacobucci
Extreme Employee

Hello,

For Monitor mode you policy response is required. You can send set the switch to "No Attributes" or set the policy to "No Policy".

Do not set the switch to "None" attributes in the switch "RADIUS attributes to send" field.

Thanks
-Ryan

Ryan_Yacobucci
Extreme Employee

Hello,

You can check out the following article: 

https://extreme-networks.my.site.com/ExtrArticleDetail?an=000082505

 

The "Policy Mapping" fields work to allow you to configure RADIUS attributes to be provided back to your HP/Cisco switches based on the RADIUS attributes that are required by the vendor. 

If you can identify what RADIUS attributes need to be returned to apply a policy/ACL, you can use the policy mapping fields to configure Control accordingly.

Thanks
-Ryan

Hi Ryan Thank you. 
Just another question i want to configure the nac in monitoring mode so i will just enable mac authentication on the switches and make a rule in nac to accept all the requests so our purpose is to just to see the mac addresses of the clients so there will not be any authentication in the background. should i return any radius attributes to the switch or not ? . 
Thank you.

GTM-P2G8KFN