cancel
Showing results forĀ 
Search instead forĀ 
Did you mean:Ā 

Provide VLAN and ISID without policy

Provide VLAN and ISID without policy

ChristianK
New Contributor III
I have EXOS and Fabric with Fabric Attach.
I want dynamic VLAN and ISID assignment without using a policy.
So the switch gets the VLAN AND the ISID dynamically.

At which point I have to configure the ISID?
4 REPLIES 4

Adam_Minowski
Extreme Employee

Just use proper radius attribute

Adam_Minowski_0-1661990857143.png

Attach new "Radius attributes to send" config to EXOS switch.

Then in NAC Profile add ISID number to Custom1 field:

 

Adam_Minowski_1-1661990979918.png

Of course you can remove ISID from Policy config and still use Policy with conjunction to FA (eg. for traffic filtering)

Adam_Minowski_4-1661991248324.png

 

 

 

 

Hi Apologies for bringing up old post but this is sort of what i'm looking for to answer something in 2025 šŸ™‚ but if i was mapping untagged and tagged vlans to a port (such as 3rd party access point with multiple SSID's) how do you achieve multiple dynamic VLAN and I-SID mappings with exos and FA? do you have an example? thanks.

Best option is to use multiple FA-VLAN-ISIDs but you need EXOS 33.2. With that version you can use multiple VLAN:ISID mappings:
FA-VLAN-ISID="10:120010,11:120011,123:120123"
The first VLAN:NSI entry specified is the PVID vlan and the other vlans as egress VLANs

If you don't have EXOS 33.2 then Policy is the only sensible way.

Policy with control "Permit" and VLAN Egress definitions for tagged vlans only.
NAC would respond with Policy name with Filter-ID and FA-VLAN-ISID for untagged traffic.
Example:
Filter-Id=Enterasys:version=1:policy=ACCESS-POINT
FA-VLAN-ISID=11:120011

ACCESS-POINT Policy profile includes "Permit" permission and only "tagged" VLANs (in VLAN Egress tab in Policy Manager)
FA-VLAN-ISID would set up untagged vlan 11 and i-sid 120011

There is a drawback - tagged vlans will not be FA-signalled on uplink port. If you want such behavior and you want to have it automated, then you can use i-sid offset option

# configure fabric attach isid-nsi-offset <number>
In such case dynamic VLANs can have i-sid auto assigned by switch itself. Eg when you would configure:
# configure fabric attach isid-nsi-offset 120000
When dynamic VLAN is created based on Radius response then switch would map it to i-sid adding vlan to offset. For example if vlan would be 100 then i-sid would be 120100 (as per example)

You can also create a python script which will be triggered by UPM and would install all needed fa mappings. Unfortunately distribution of the script to all switches could be the different issue. In one word it is complicated so I don't recommend go that way.

One very important thing. When you would use Policy, there is an option to enable "AP Aware" feature on Policy profile. This feature would disable consecutive auth requests on the port when AP Aware Policy is applied. It is hugely important to avoid double auth requests  for same user/endpoint. Why double? First one would come from WiFi and then, once the endpoint is permitted by WIFi, second session would come from a switch port. It's because port itself is netlogin-enabled to authenticate access point.

Thanks! got to 33.4.1 today and the multiple vlan on port works yes. only issue im trying to work through now is the NSI mapping is not working. the vlans dynamically create with fabric attach just missing the relevant ISID/NSI mapping.

GTM-P2G8KFN