07-23-2024 06:09 AM - edited 07-23-2024 06:11 AM
Hi everyone,
In addition to dhcp pofiling, what are the other methods supported by ExtremeControl to identify the end-system Operating System?
When the switch port/or wifi is 802.1x enabled, only EAP traffic is allowed. So, no matter how much the end-system is sending DHCP Request, this traffic will not be allowed to pass through the port. Therefore, the DHPC Relay configuration pointing to ExtremeControl will have no effect. Am I right or wrong?
I created a rule in the NAC to authenticate via 8021.x only end-system running Windows 10 and 11 and when the end-system is first seen, the NAC didn't know who it was.
The switch is sending the DHCP request to the network, the NAC is receiving these DHCP Requests, however, this is only sent when the challenge imposed by the EAP is processed. Before this, only EAP traffic passes through the port or wireless network.
If the first packet that arrives at the NAC is from RADIUS, how will the NAC know which operating system is in use by the end-system?
I would appreciate it if we could talk more about this.
Thank you very much,
Edson Moura
Solved! Go to Solution.
07-30-2024 10:46 AM
Hello folks,
As Configterminal said, maybe create a ACL e applied in all ports to permit DHCP. When the NAC receives the dhcp request, it will able to knows the end-system and to apply the correct rule.
"My immediate thoughts are the following although I've never attempted this on Control but you can do something like this in ClearPass - You can create a rule that sends back an ACL plus the proper VLAN for the device. The ACL will limit what the device can talk to, e.g.: DHCP Server, XMC NAC Engines, etc. "
Thanks,
Edson Moura
07-30-2024 10:46 AM
Hello folks,
As Configterminal said, maybe create a ACL e applied in all ports to permit DHCP. When the NAC receives the dhcp request, it will able to knows the end-system and to apply the correct rule.
"My immediate thoughts are the following although I've never attempted this on Control but you can do something like this in ClearPass - You can create a rule that sends back an ACL plus the proper VLAN for the device. The ACL will limit what the device can talk to, e.g.: DHCP Server, XMC NAC Engines, etc. "
Thanks,
Edson Moura
07-29-2024 02:49 AM
From XIQ-SE help topic "How to Use Device Type Profiling":
Here are some examples of how device type profiling can be used to determine network access:
I believe the simplest way is to create two rules: upper one 802.1x to permit specific access for Windows 10/11 machines and second below to authorize all device types with lower network access to just allow them to obtain IP address. I will check this in my lab but I believe this is the recommended way to do this according to description above.
07-29-2024 05:09 AM
Yes but how do you issue a CoA automatically after it gets profiled correctly?
07-31-2024 02:33 AM
Hi,
I've found solution which works for EXOS switches. Keep in mind that in EXOS you can enable both MAC-based and 802.1x authentication which works concurrently which allows then the NAC to do something like this:
So just create a rule for MAC-based authentication which gives a limited access to for Base Services (ARP + DHCP) and 802.1x rule with device profiling and it works