<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configure RADIUS authentication with WiFi and ICX 7150 in ICX Switches</title>
    <link>https://community.ruckuswireless.com/t5/ICX-Switches/Configure-RADIUS-authentication-with-WiFi-and-ICX-7150/m-p/27345#M1360</link>
    <description>&lt;P style="margin: 0;"&gt;Hello David,&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Having Dotx security in the access ports of your ICX7150, can be done by following these steps:&lt;/P&gt;
&lt;P style="margin: 0;"&gt;1. state the RADIUS server IP address, ports, and authentication type (dot1x, macauth, webauth)&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;A href="https://docs.commscope.com/bundle/fastiron-08070-securityguide/page/GUID-F3B15898-A375-48A7-876E-3347267FA11D.html" target="_blank" rel="noopener"&gt;https://docs.commscope.com/bundle/fastiron-08070-securityguide/page/GUID-F3B15898-A375-48A7-876E-3347267FA11D.html&lt;/A&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;2. enter the authentication configuration mode and&lt;/P&gt;
&lt;P style="margin: 0;"&gt;2.1. enable dot1x for specific ports&lt;/P&gt;
&lt;P style="margin: 0;"&gt;2.2. set basic authentication parameters like authentication default VLAN, restricted VLAN (if used), re-authentication timers, etc.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;A href="https://docs.commscope.com/bundle/fastiron-08070-securityguide/page/GUID-261DD83D-AA94-443F-AA68-82BB82EDEB79.html" target="_blank" rel="noopener"&gt;https://docs.commscope.com/bundle/fastiron-08070-securityguide/page/GUID-261DD83D-AA94-443F-AA68-82BB82EDEB79.html&lt;/A&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;3. enable aaa authentication for dot1x through RADIUS&lt;/P&gt;
&lt;P id="GUID-46CC4DB9-5522-460E-9788-7F3982996DA6__GUID-E0B03289-F350-42A6-9410-32C9F3516F59"&gt;&lt;CODE&gt;!
aaa authentication dot1x default radius&lt;BR /&gt;&lt;BR /&gt;&lt;/CODE&gt;Those should be the most simple steps to have it up and running.&lt;BR /&gt;We can always go deeper if we wanted &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;Please let me know if it leaves you with some concerns.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Orlando Elias&lt;BR /&gt;Ruckus TAC&lt;/P&gt;</description>
    <pubDate>Thu, 29 Apr 2021 11:57:59 GMT</pubDate>
    <dc:creator>Orlando_Elias</dc:creator>
    <dc:date>2021-04-29T11:57:59Z</dc:date>
    <item>
      <title>Configure RADIUS authentication with WiFi and ICX 7150</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Configure-RADIUS-authentication-with-WiFi-and-ICX-7150/m-p/27344#M1359</link>
      <description>&lt;P style="margin: 0;"&gt;Hi,&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Does anyone have a good reference on configuring 802.1x for both WiFi and port security (on ICX 7150)? Using Ruckus Cloud, it looks pretty simple to add the RADIUS server and get authentication going for a SSID, but I am pretty sure there is more to it than just that :). And reading through the FastIron Security Config Guide, it looks like physical port security can get pretty complicated...&lt;/P&gt;
&lt;P style="margin: 0;"&gt;We are looking to use Windows server with the NPS role as a RADIUS server.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Looking to keep it simple to start - but any references / resources or tips would be greatly appreciated!&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Cheers,&lt;/P&gt;
&lt;P style="margin: 0;"&gt;~D&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 22:19:36 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Configure-RADIUS-authentication-with-WiFi-and-ICX-7150/m-p/27344#M1359</guid>
      <dc:creator>david_levine</dc:creator>
      <dc:date>2021-04-28T22:19:36Z</dc:date>
    </item>
    <item>
      <title>Re: Configure RADIUS authentication with WiFi and ICX 7150</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Configure-RADIUS-authentication-with-WiFi-and-ICX-7150/m-p/27345#M1360</link>
      <description>&lt;P style="margin: 0;"&gt;Hello David,&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Having Dotx security in the access ports of your ICX7150, can be done by following these steps:&lt;/P&gt;
&lt;P style="margin: 0;"&gt;1. state the RADIUS server IP address, ports, and authentication type (dot1x, macauth, webauth)&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;A href="https://docs.commscope.com/bundle/fastiron-08070-securityguide/page/GUID-F3B15898-A375-48A7-876E-3347267FA11D.html" target="_blank" rel="noopener"&gt;https://docs.commscope.com/bundle/fastiron-08070-securityguide/page/GUID-F3B15898-A375-48A7-876E-3347267FA11D.html&lt;/A&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;2. enter the authentication configuration mode and&lt;/P&gt;
&lt;P style="margin: 0;"&gt;2.1. enable dot1x for specific ports&lt;/P&gt;
&lt;P style="margin: 0;"&gt;2.2. set basic authentication parameters like authentication default VLAN, restricted VLAN (if used), re-authentication timers, etc.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;A href="https://docs.commscope.com/bundle/fastiron-08070-securityguide/page/GUID-261DD83D-AA94-443F-AA68-82BB82EDEB79.html" target="_blank" rel="noopener"&gt;https://docs.commscope.com/bundle/fastiron-08070-securityguide/page/GUID-261DD83D-AA94-443F-AA68-82BB82EDEB79.html&lt;/A&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;3. enable aaa authentication for dot1x through RADIUS&lt;/P&gt;
&lt;P id="GUID-46CC4DB9-5522-460E-9788-7F3982996DA6__GUID-E0B03289-F350-42A6-9410-32C9F3516F59"&gt;&lt;CODE&gt;!
aaa authentication dot1x default radius&lt;BR /&gt;&lt;BR /&gt;&lt;/CODE&gt;Those should be the most simple steps to have it up and running.&lt;BR /&gt;We can always go deeper if we wanted &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;Please let me know if it leaves you with some concerns.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Orlando Elias&lt;BR /&gt;Ruckus TAC&lt;/P&gt;</description>
      <pubDate>Thu, 29 Apr 2021 11:57:59 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Configure-RADIUS-authentication-with-WiFi-and-ICX-7150/m-p/27345#M1360</guid>
      <dc:creator>Orlando_Elias</dc:creator>
      <dc:date>2021-04-29T11:57:59Z</dc:date>
    </item>
    <item>
      <title>Re: Configure RADIUS authentication with WiFi and ICX 7150</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Configure-RADIUS-authentication-with-WiFi-and-ICX-7150/m-p/27346#M1361</link>
      <description>&lt;P style="margin: 0;"&gt;Hi David,&lt;BR /&gt;Hope you are doing great.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;We do not have any other official guides.&amp;nbsp; If you look through the authentication section you will see examples as well.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Hope this helps.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Thanks&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Hashim&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Apr 2021 18:27:56 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Configure-RADIUS-authentication-with-WiFi-and-ICX-7150/m-p/27346#M1361</guid>
      <dc:creator>hashim_bharooc1</dc:creator>
      <dc:date>2021-04-29T18:27:56Z</dc:date>
    </item>
    <item>
      <title>Re: Configure RADIUS authentication with WiFi and ICX 7150</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Configure-RADIUS-authentication-with-WiFi-and-ICX-7150/m-p/27347#M1362</link>
      <description>&lt;P style="margin: 0;"&gt;David:&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;We run many hundreds of these switches in production with 802.1x, data VLANS, Voice VLANS, Wireless VLANS, etc.&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;Here is a typical config.&amp;nbsp; I am still actually tweaking it to do TACACS, fall back to RADIUS, then Local, but it is more or less our working Layer-2 ICX config, and it has full 802.1x support, which is working flawlessly in production with ISE.&amp;nbsp; I have not tested this with ClearPass, but if the polices are correct, I am certain it would work.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;ver 08.0.90kT211&lt;BR /&gt;!&lt;BR /&gt;stack unit 1&lt;BR /&gt;&amp;nbsp; module 1 icx7150-c12-poe-port-management-module&lt;BR /&gt;&amp;nbsp; module 2 icx7150-2-copper-port-2g-module&lt;BR /&gt;&amp;nbsp; module 3 icx7150-2-sfp-plus-port-20g-module&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;vlan 1 name DEFAULT-VLAN by port&lt;BR /&gt;&amp;nbsp;no untagged ethe 1/1/1 to 1/1/12&lt;BR /&gt;!&lt;BR /&gt;vlan 250 name PCI-Compliance by port&lt;BR /&gt;&amp;nbsp;tagged ethe 1/2/1&lt;BR /&gt;!&lt;BR /&gt;vlan 123 name Data by port&lt;BR /&gt;&amp;nbsp;untagged ethe 1/2/1 to 1/2/2&lt;BR /&gt;!&lt;BR /&gt;vlan 301 name Voice by port&lt;BR /&gt;&amp;nbsp;tagged ethe 1/1/1 to 1/1/12 ethe 1/2/1 to 1/2/2&lt;BR /&gt;!&lt;BR /&gt;vlan 400 name Aruba-Mgmt by port&lt;BR /&gt;&amp;nbsp;tagged ethe 1/2/1&lt;BR /&gt;!&lt;BR /&gt;vlan 401 name AnSSID by port&lt;BR /&gt;&amp;nbsp;tagged ethe 1/2/1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;authentication&lt;BR /&gt;&amp;nbsp; auth-default-vlan 123&lt;BR /&gt;&amp;nbsp; re-authentication&lt;BR /&gt;&amp;nbsp; dot1x enable&lt;BR /&gt;&amp;nbsp; dot1x enable ethe 1/1/1 to 1/1/12&lt;BR /&gt;&amp;nbsp; dot1x port-control auto ethe 1/1/1 to 1/1/12&lt;BR /&gt;&amp;nbsp; mac-authentication enable&lt;BR /&gt;&amp;nbsp; mac-authentication enable ethe 1/1/1 to 1/1/12&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;aaa authentication web-server default tacacs+ local&lt;BR /&gt;aaa authentication enable default local&lt;BR /&gt;aaa authentication dot1x default radius&lt;BR /&gt;aaa authentication login default tacacs+ local&lt;BR /&gt;aaa authentication login privilege-mode&lt;BR /&gt;aaa authorization coa enable&lt;BR /&gt;aaa accounting commands 0 default start-stop tacacs+&lt;BR /&gt;aaa accounting exec default start-stop tacacs+&lt;BR /&gt;aaa accounting system default start-stop tacacs+&lt;BR /&gt;console timeout 30&lt;BR /&gt;enable aaa console&lt;BR /&gt;enable acl-per-port-per-vlan&lt;BR /&gt;hostname TEST&lt;BR /&gt;ip address 10.1.126.11 255.255.248.0&lt;BR /&gt;ip dns domain-list XXXX.xx.gov&lt;BR /&gt;ip dns server-address 10.1.123.50 10.1.123.51&lt;BR /&gt;no ip dhcp-client auto-update enable&lt;BR /&gt;no ip dhcp-client enable&lt;BR /&gt;ip default-gateway 10.1.124.1&lt;BR /&gt;!&lt;BR /&gt;logging host 10.1.132.250&lt;BR /&gt;logging console&lt;BR /&gt;logging persistence&lt;BR /&gt;no telnet server&lt;BR /&gt;username XXXXwan password .....&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;radius-server host 172.31.112.52 auth-port 1812 acct-port 1813 default key 2 $YT1nb2LEK5VVlp8OA== dot1x mac-auth&lt;BR /&gt;tacacs-server host 172.31.112.52&lt;BR /&gt;tacacs-server key 2 $YT1nb25VVKRClp8OA==&lt;BR /&gt;cdp run&lt;BR /&gt;fdp run&lt;BR /&gt;snmp-server contact Network Security Operations&lt;BR /&gt;snmp-server host 10.1.123.250 version v3 priv XXXXwan&lt;BR /&gt;snmp-server group XXXXv3 v3 priv access 99 read all write all&lt;BR /&gt;snmp-server user XXXXwan XXXXv3 v3 access 99 encrypted auth sha badb61e7ebc559c61e2ab1c6a8403cecb3ded8da priv encrypted aes badb61e7ebc559c61e2a61c6a8403cec&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;clock summer-time&lt;BR /&gt;clock timezone us Eastern&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ntp&lt;BR /&gt;&amp;nbsp;server 10.123.1.1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;web access-group 99&lt;BR /&gt;no web-management http&lt;BR /&gt;web-management https&lt;BR /&gt;banner motd ^&lt;BR /&gt;------------------------------------------------------------------------&lt;BR /&gt;^&lt;BR /&gt;ICX Test Switch&lt;BR /&gt;^&lt;BR /&gt;This system is solely for the use of authorized XXXX personnel.&lt;BR /&gt;The information contained herein is the property of XXXX and subject to&lt;BR /&gt;non-disclosure, security, and confidentiality requirements.&lt;BR /&gt;XXXX will monitor system usage for unauthorized activities.&lt;BR /&gt;Any user accessing this system expressly consents to such monitoring.&lt;BR /&gt;^&lt;BR /&gt;Asset NO-TAG&lt;BR /&gt;^&lt;BR /&gt;------------------------------------------------------------------------&lt;BR /&gt;^&lt;BR /&gt;!&lt;BR /&gt;ssh access-group 99&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;sz registrar&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface ethernet 1/1/1&lt;BR /&gt;&amp;nbsp;trust dscp&lt;BR /&gt;!&lt;BR /&gt;interface ethernet 1/1/2&lt;BR /&gt;&amp;nbsp;trust dscp&lt;BR /&gt;!&lt;BR /&gt;interface ethernet 1/1/3&lt;BR /&gt;&amp;nbsp;trust dscp&lt;BR /&gt;!&lt;BR /&gt;interface ethernet 1/1/4&lt;BR /&gt;&amp;nbsp;trust dscp&lt;BR /&gt;!&lt;BR /&gt;interface ethernet 1/1/5&lt;BR /&gt;&amp;nbsp;trust dscp&lt;BR /&gt;!&lt;BR /&gt;interface ethernet 1/1/6&lt;BR /&gt;&amp;nbsp;trust dscp&lt;BR /&gt;!&lt;BR /&gt;interface ethernet 1/1/7&lt;BR /&gt;&amp;nbsp;trust dscp&lt;BR /&gt;!&lt;BR /&gt;interface ethernet 1/1/8&lt;BR /&gt;&amp;nbsp;trust dscp&lt;BR /&gt;!&lt;BR /&gt;interface ethernet 1/1/9&lt;BR /&gt;&amp;nbsp;trust dscp&lt;BR /&gt;!&lt;BR /&gt;interface ethernet 1/1/10&lt;BR /&gt;&amp;nbsp;trust dscp&lt;BR /&gt;!&lt;BR /&gt;interface ethernet 1/1/11&lt;BR /&gt;&amp;nbsp;trust dscp&lt;BR /&gt;!&lt;BR /&gt;interface ethernet 1/1/12&lt;BR /&gt;&amp;nbsp;trust dscp&lt;BR /&gt;!&lt;BR /&gt;interface ethernet 1/2/1&lt;BR /&gt;&amp;nbsp;trust dscp&lt;BR /&gt;!&lt;BR /&gt;interface ethernet 1/2/2&lt;BR /&gt;&amp;nbsp;trust dscp&lt;BR /&gt;!&lt;BR /&gt;interface ethernet 1/3/1&lt;BR /&gt;&amp;nbsp;speed-duplex 1000-full&lt;BR /&gt;!&lt;BR /&gt;interface ethernet 1/3/2&lt;BR /&gt;&amp;nbsp;speed-duplex 1000-full&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip access-list standard 99&lt;BR /&gt;&amp;nbsp;sequence 10 permit host 10.1.10.190&lt;BR /&gt;&amp;nbsp;sequence 20 permit host 10.1.10.191&lt;BR /&gt;&amp;nbsp;sequence 30 permit host 10.1.120.250&lt;BR /&gt;&amp;nbsp;sequence 40 permit host 10.1.123.2&lt;BR /&gt;&amp;nbsp;sequence 50 permit host 10.1.123.3&lt;BR /&gt;&amp;nbsp;sequence 60 permit host 10.1.123.4&lt;BR /&gt;&amp;nbsp;sequence 70 permit host 10.1.123.5&lt;BR /&gt;&amp;nbsp;sequence 80 permit host 10.1.123.6&lt;BR /&gt;&amp;nbsp;sequence 90 permit 10.1.15.0 0.0.0.255&lt;BR /&gt;&amp;nbsp;sequence 100 permit 192.168.56.0 0.0.7.255&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;lldp med network-policy application voice tagged vlan 301 priority 5 dscp 46 ports ethe 1/1/1 to 1/1/12&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip ssh &amp;nbsp;authentication-retries 2&lt;BR /&gt;ip ssh &amp;nbsp;timeout 30&lt;BR /&gt;ip ssh &amp;nbsp;idle-time 30&lt;BR /&gt;ip ssh &amp;nbsp;scp disable&lt;BR /&gt;ip ssh &amp;nbsp;encryption disable-aes-cbc&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Sat, 01 May 2021 02:06:04 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Configure-RADIUS-authentication-with-WiFi-and-ICX-7150/m-p/27347#M1362</guid>
      <dc:creator>netwizz</dc:creator>
      <dc:date>2021-05-01T02:06:04Z</dc:date>
    </item>
    <item>
      <title>Re: Configure RADIUS authentication with WiFi and ICX 7150</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Configure-RADIUS-authentication-with-WiFi-and-ICX-7150/m-p/27348#M1363</link>
      <description>&lt;P style="margin: 0;"&gt;Thanks for sharing. This is helpful to see.&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;I am thinking that these configs on the ICX switches are different (so to speak) than when setting up the same for an SSID, and that there is much more to learn on building the policy configs on the RADIUS server &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P style="margin: 0;"&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 03 May 2021 16:19:56 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Configure-RADIUS-authentication-with-WiFi-and-ICX-7150/m-p/27348#M1363</guid>
      <dc:creator>david_levine</dc:creator>
      <dc:date>2021-05-03T16:19:56Z</dc:date>
    </item>
  </channel>
</rss>

