cancel
Showing results for 
Search instead for 
Did you mean: 

Extreme Control Rule and AD

Extreme Control Rule and AD

Ian_Broadway
New Contributor III

Hi All,

 

I am trying to create Extreme Control rule sets for MAC and .1x authentication.

Is there not a way I can add a group condition to query a LDAP/AD Domain group?

I can see there is an option for LDAP user groups.

 

Also, do Extreme offer some sort of downloadable config for updating DHCP fingerprints.

Its really tedious to have to go in and add lines of code to add custom fingerprints, not to mention having to hunt through a log file to get them in the first place.

 

One other thing, any ideas/thoughts on being able to add if/or conditions into the same rule?

Thanks

Ian

1 ACCEPTED SOLUTION

Miguel-Angel_RO
Valued Contributor II

Stefan,

 

With a script from @Zdenek Pala (https://github.com/extremenetworks/ExtremeScripting/blob/master/Netsight/oneview_workflows/combo/Use... you can mix both authentications to ensure that the user authentication is done on a computer from the domain:

"Add MAC to Domain Computers" is executed when the computer authenticates. The MAC address is added to End-System and the timestamp is created (updated). Consequent User authentication can be combined with the condition of the End-System group. "Clear old End-Systems in the group" checks if the timestamp is older than X hours and old End-Systems are deleted from the group.

 

Mig

View solution in original post

47 REPLIES 47

SDR
New Contributor III

to be continued…. :-((

 

Miguel-Angel_RO
Valued Contributor II

SDR,

I don’t know what rules are implemented.

Can you share a screen of them?

It would be good to open another thread as this one is supposed to be closed.

Mig

SDR
New Contributor III

Hi Mig,

 

your support is so valueble - Thank you!

Although configured correct yesterday somone changed the setting.

Now User authentication starts - fails however!

 

We have configured the rules according to the documents.

  1. Machine login
  2. Machine + User auth
  3. Non domain machine

Machine boots, Rule 1)  Machine login works successful

User logs in, Rule 2) Machine + User auth fails 

 

Evaluation Tool resulst;

User logs in,

Rule 1) fails due to “USER….does not have LDAP attributes….in LDAP USER group xyz

AND

Rule 2) fails due to “HOST….does not have LDAP attributes….in LDAP HOST group xyz

Rule 3) Non-domain machine  is the one, that “succeeds”.

 

 

Miguel-Angel_RO
Valued Contributor II

Hi SDR,

 

For this behavior you must configure the 802.1X authentication to work as “computer or user” authentication.

When nobody is logged on, the computer auth will be done.

When a user logs on the user auth will be triggered.

Mig

GTM-P2G8KFN