Assignment of VLANS by MAC address on a 6248

Hello

We have a mixture of 5548 and 6248 switch batteries, all updated to the latest fw, grouped on a 8024f.

We add 560 Polycom phones to our network and want to assign phones to the voice VLAN and use the internal switch on the phone to the computer workstation.

The 5548 have the handy table YES, the:

VLAN voice Yes-table add 00907 Polycom/Veritel_phone___

It works a treat and the assignment of VLANS for phone and PC works beautifully on the 5548.

However, the 6248 legacy does not have this feature.

Am I right assuming that we cannot assign addresses MAC Polycom-issued to one VLAN specific on switches 62XX as 55XX switches on? We are left with assigning simply labeled the voice VLAN? I'm afraid non-voix tag traffic for some applications will be treated badly as voice.

What is the best way to do it? Here are the General config we will stop for the 6248:

Configure
database of VLAN
VLAN 10 100

interface vlan 10
name "VoIP."
output

interface vlan 100
name 'data network '.
Routing
IP 10.1.10.1 255.255.255.0
output

Example config for a switchport with Polycom and PC phone
!
interface ethernet 1/g1
switchport mode general
switchport General pvid 100
No switchport acceptable-framework-type general tag only
VLAN allowed switchport General add 100
switchport general allowed vlan add 10 tag
switchport vlan allowed General remove 1
output
!

The 6248 uses a Broadcom firmware and the 5548 uses a Marvell firmware, that's why we see the differences in the characteristics. The 6248 has no YES table as the 5548. Here is the basic configuration of VLAN voice on the 6248.

1.

To start creating a VLAN voice, create it first VLAN database mode for VLAN.

Console # console (config) # vlan database console(config-vlan) # vlan 2 console (config - vlan) #exit console (config) #.

2.

Then, globally enable the Vlan voice.

Console (config) # vlan VoIP

3.

In the configuration of interface for the desired port mode, assign it VLAN to the port using general mode. Then, assign it VLAN voice on the port with the command vlan vlan id #.

Console (config) # interface console item in gi1/0/10 # switchport general console mode # vlan 2 voice

There is also this white page that goes over the process.

www.Dell.com/.../pwcnt_voice_VLAN_support.pdf

A workstation sends no marked traffic, and will be placed on the general mode port PVID. In this case, it seems that your PVID is VLAN 100, therefore all workstation traffic will go to this VLAN. I'm not aware of a situation where the traffic of the workstation would be confused with traffic voice and placed on the VLAN incorrect, you have a specific situation / application where you think this can happen? I can do some research on this scenario to help alleviate any concerns.

Thank you

Tags: Dell Tech

Similar Questions

  • Blocking MAC address on PowerConnect 6248 switch

    Hello

    I have a PowerConnect 6248 switch where we want to block a specific MAC address from the rest of the network.

    I created a list of MAC access with the following commands:

    Console (config) #mac access-list extended BLOCK
    Console (config-mac-access-list) #deny 001D.09D4.B08E ffff.ffff.ffff all

    Console (config-mac-access-list) #permit a whole

    I then apply it to all interfaces:

    console (config) #mac group-access BLOCK

    What ends by goes, is that all hosts connected to the switch are blocked when my rule should only be blocking the host with mac address 001D.09D4.B08E.

    What I am doing wrong?

    Thank you!

    Have you tried changing your statement to:

    Console (config-mac-access-list) #deny 001D.09D4.B08E 0000.0000.0000 everything

  • 802. 1 x assignment of vlan dynamic based on MAC?

    Hello

    I use Catalyst3750 and authentication widows AD.

    Our customers PC is driving Windows (is not able 802. 1 x) which is connected to the catalyst switch.

    Is it possible to dynamic assignment of that one Vlan based on MAC?

    When possible, we want to do it without help of VMPS.

    and is there any document relating to the foregoing.

    Thank you very much for you help.

    Tomoyuki

    Tomoyuki Hello,

    What Radius server that you use to authenticate your Clients?

    To Secure ACS, you can configure a feature called "MAC-Authentication-Bypass" that accomplishes your needs.

    This feature must be configured on the switch and the Radius Server (which makes the responsibilities of vlan based on the MAC address of the Client)

    An overview of this feature can be found here:

    http://www.Cisco.com/univercd/CC/TD/doc/solution/macauthb.PDF

    I hope this helps.

    Kind regards

    Chris

  • rejected mac addresses are not placed in vlan comments

    Hi all

    I'm kind of new to the switches and learned a lot by reading the documentation sites. My job is to activate authentication aaa on our Cisco switches, we have a 3750stack, a few 3560 s and some 3550 s. I test on one of the 3560, a WS-C3560G-48PS 12.2 (53) SE1-IP-BASE running. Next week I'll update of firmware for 12.2 (55), but with this version, everything should already work.

    Basically, the only thing I asked to do at the moment is Mac-Auth Bypass configuration. If the Mac address is accepted, RADIUS returns the VLAN, the device should be placed in, for the most part VLAN 4.

    If the radius (freeradius v 2.1.10) server sends a rejection (see below), the port is not set to the vlan comments, because I expected.

    1. 19 12/21/10
      4:23:19.000 PM
      Dec 21 16:23:19 10.1.1.207 37473: 2204830: .Dec 21 16:20:31.950 CET: %AUTHMGR-5-FAIL: Authorization failed for client (f0de.f119.9870) on Interface Gi0/29 AuditSessionID 0A0101CF0000086CF832980B

      • Host=10.1.1.207
      • SourceType=syslog
      • source=udp:514
      • client_mac=((f0de.f119.9870))
      • client_action=FAIL
      • LINEPROTO_LINK=AUTHMGR-5
    2. 20 12/21/10
      4:23:19.000 PM
      Dec 21 16:23:19 10.1.1.207 37472: 2204808: .Dec 21 16:20:31.950 CET: %MAB-5-FAIL: Authentication failed for client (f0de.f119.9870) on Interface Gi0/29 AuditSessionID 0A0101CF0000086CF832980B

    3. 21 12/21/10
      4:23:18.000 PM
      Dec 21 16:23:18 10.1.1.207 37471: 2204776: .Dec 21 16:20:30.935 CET: %AUTHMGR-5-START: Starting 'mab' for client (f0de.f119.9870) on Interface Gi0/29 AuditSessionID 0A0101CF0000086CF832980B

    Can someone tell me where I'm wrong?

    Thank you

    Chris

    Relevant parts of the running-config:
    AAA new-model
    !
    Group AAA dot1x default authentication RADIUS
    Group AAA authorization network default RADIUS
    AAA accounting delay start
    start-stop radius group AAA accounting dot1x default
    start-stop radius group AAA accounting network default
    !
    AAA - the id of the joint session

    !
    control-dot1x system-auth
    !
    interface GigabitEthernet0/29
    235 a description
    switchport mode access
    switchport voice vlan 2
    load-interval 30
    bandwidth share SRR-queue 10 10 60 20
    queue-series 2
    priority queue
    authentication event failure action allow vlan 7
    action of death event authentication server allow vlan 4
    living action of the server reset the authentication event
    multi-domain of host-mode authentication
    Auto control of the port of authentication
    MAB
    MLS qos trust device cisco-phone
    MLS qos trust cos
    Auto qos voip cisco-phone
    spanning tree portfast
    service-policy input AutoQoS-Police-CiscoPhone
    !
    interface Vlan1
    IP 10.1.1.207 255.255.255.0
    !
    interface Vlan2
    IP 10.1.10.207 255.255.255.0
    !
    default IP gateway - 10.1.1.201
    IP classless
    !
    activate the IP sla response alerts
    RADIUS-server host 10.1.1.24 auth-port 1812 acct-port 1813
    RADIUS timeout 10 Server
    Server RADIUS # 7 button wouldn't you know
    RADIUS vsa server send accounting
    RADIUS vsa server send authentication
    !
    end

    Information of VLAN:

    Ports of status for the name of VLAN
    ---- -------------------------------- --------- ------------------------------
    1 default active Gi0/6, Gi0/8, Gi0/14, Gi0/15
    Gi0/18, Gi0/21, Gi0/29, Gi0/30
    Gi0/34, Gi0/36, Gi0/37, Gi0/49
    Gi0/50, Gi0/51
    2 voice active Gi0/1, Gi0/2, Gi0/3, Gi0/4
    Gi0/5, Gi0/6, Gi0/7, Gi0/8
    Gi0/9, Gi0/10, Gi0/11, Gi0/12
    Gi0/13, Gi0/14, Gi0/15, Gi0/16
    Gi0/17, Gi0/18, Gi0/19, Gi0/20
    Gi0/21, Gi0/22, Gi0/23, Gi0/24
    Gi0/25, Gi0/26, Gi0/27, Gi0/28
    Gi0/29, Gi0/30, Gi0/31, Gi0/32
    Gi0/33, Gi0/34, Gi0/35, Gi0/36
    Gi0/37, Gi0/38, Gi0/39, Gi0/40
    Gi0/42, Gi0/43, Gi0/44, Gi0/45
    Gi0/46, Gi0/47, Gi0/49
    3 active video
    4 active DHCP Gi0/1 and Gi0/2, Gi0/3, Gi0/4
    Gi0/5, Gi0/7, Gi0/9, Gi0/10
    Gi0/11, Gi0/12, Gi0/13, Gi0/16
    Gi0/17, Gi0/19, Gi0/20, Gi0/22
    Gi0/23, Gi0/24, Gi0/25, Gi0/26
    Gi0/27, Gi0/28, Gi0/31, Gi0/32
    Gi0/33, Gi0/35, Gi0/38, Gi0/39
    Gi0/40, Gi0/41, Gi0/42, Gi0/43
    Gi0/44, Gi0/45, Gi0/46, Gi0/48
    5 active transfer
    6 active Test ESX
    7 COMMENTS-VLAN active
    999 native active
    1002 fddi-default law/unsup
    default trcrf 1003 act/unsup
    1004 default fddinet law/unsup
    1005 trbrf default law/unsup

    Network type VLAN SAID MTU Parent RingNo BridgeNo Men BrdgMode Trans1 Trans2
    ---- ----- ---------- ----- ------ ------ -------- ---- -------- ------ ------
    1 100001 1500 enet - 0 0
    2 enet 100002 1500 - 0 0
    3 100003 1500 enet - 0 0
    4 100004 1500 enet - 0 0
    5 enet 100005 1500 - 0 0
    6 100006 1500 enet - 0 0
    7 100007 1500 enet - 0 0
    999 100999 1500 enet - 0 0
    1002 101002 1500 fddi - 0 0
    1003 trcrf 101003 4472 1005 3276 - srb 0 0
    1004 etnbdf 101004 1500 - ieee - 0 0
    1005 trbrf 101005 4472 - 15 ibm - 0 0

    VLAN AREHops STEHops backup RTC
    ---- ------- ------- ----------
    1003 7 7 off

    VLAN SPAN remote
    ------------------------------------------------------------------------------

    Ports of secondary primary Type
    ------- --------- ----------------- ------------------------------------------

    Hello

    Just to the user the correct names, what you want is a vlan auth failure (that you configured correctly). VLAN comments is for PCs that do not have capacity dot1x (do not respond to dot1x packages) but for the avoidance of the mac, the event of "no-response" will never happen.

    Now that we have explained, your config seems therefore quite ok actually. I'd go with debugs to check what the problem is.

    Debug RADIUS

    debug all EMP

    debugging authentication feature mab all
    debugging authentication feature mda all

    Nicolas

    ===

    Remember responses of the rate that you find useful

  • assignment range static mac addresses

    Anyone know or knows where I can find what the mac address range is responsible for functions static mac end user for virtual machines?  There is a specific, cited in the 4.x documentation Beach, but the docs 5.x just say do not walk on the beaches of use reserved for vCenter Server, host network adapters physical, virtual cards, but says not what is Beach, reserved or allowed is, so I don't know what to avoid.  I opened a support ticket and asked the same question and I was told there is no specific void range defined for static assignment, and I have to look in my environment to see what was automatically generated for what could not be attributed.  Of course, this does not solve the potential problem of an address that I choose to be automatically generated by vcenter for a future new virtual machine.

    Also, does anyone know what virtual machine operations can cause the mac to change address?  I'm trying to determine whether it is necessary to assign a static address to a virtual machine that has a license associated with it, so I need to know what would be the probability of this change.  Support could not answer this question.

    Thanks to all in advance.

    Have you checked the http://pubs.vmware.com/vsphere-55/topic/com.vmware.ICbase/PDF/vsphere-esxi-vcenter-server-55-networking-guide.pdf 148 pages

    Documentation - once the MAC address is generated, it does not change unless the virtual machine MAC address conflicts

    with that of another virtual machine saved. The MAC address is stored in the virtual machine configuration file.

  • Assign a static IP address via DHCP based on the Mac address of the virtual machine

    Hi all

    It is especially a feature request, as I'm sure that it is not currently possible to do what I want to do...

    I would like to be able to assign static IP addresses to VM without having to manually configure the network settings of the virtual machine directly. I want to be able to do it from the DHCP settings in the virtual network Editor.

    Most of the routers DHCP allow this. They give an IP address through DHCP based on the MAC address of the client. This means that the customer is concerned that he receives a regular IP DHCP address, but it is never change.

    DHCP is the default option for all OS this makes things much easier to manage, as IP addresses is assigned in the same way, in one place for all DHCP clients, regardless of the client operating system, and without having to manually keep track of which the IP is assigned to which customers etc..

    Also AFAIK at least for Ubuntu, you cannot assign a static IP address without having to also statically assign to the DNS server. It is only the IP address I need to be static, so I prefer not to have to worry about manually assign the DNS server.

    I can just kind of fudge making the really long DHCP lease duration, but the maximum is 99 days only, so finally addresses are going to change, that would mean a whole bunch of reconfiguration for VM services, etc..

    Does anyone know if the workstation 9 has this ability? I am currently on version 8, but I would probably upgrade this function only if she can do it.

    If there is no way to do what I want to directly through the virtual network Editor, can anyone recommend a way to do this, perhaps using Guest only network and then, by running a kind of services to the 3rd party NAT and DHCP on the host?

    Thank you

    Eugene

    There is no GUI option to get what you are looking for, but you can do it manually. Please take a look at Re: assign a static IP to guest with network adapter NAT Virt? where I posted an example.

    André

  • SG300: Cant assign aw vlan 802. 1 x + freeradius

    We recently got SG300-10 and try to get the assignment of vlan dynamic works via 802.1 x and freeradius. We got it so that the client connected to the SG300 would correctly auth, IE, I see this in "see the dot1x users:

    MAC               Auth   Auth   Session        VLAN

    Port     Username         Address           Method Server Time

    -------- ---------------- ----------------- ------ ------ -------------- ----

    gi7      testuser         58:55:ca:24:19:d4 802.1X Remote 00:04:39

    However, the client does not seem to be at all on the vlan correct or any vlan. If I change the port of "dot1x - radius attributes vlan static" to "dot1x - radius attributes vlan" then the customer cant auth at all (which is expected because it cannot retrieve the information of vlan).

    The freeradius users file looks like this:

    testuser  Cleartext-Password := "testpassword"

    ##Tunnel-Tag = 0,

    Tunnel-Medium-Type = IEEE-802,

    Tunnel-Type = VLAN,

    Tunnel-Private-Group-Id = "104"

    There is this whole line in the eap.conf file:

    copy_request_to_tunnel = yes

    Running config:

    net055#show running-config

    config-file-header

    net055

    v1.3.5.58 / R750_NIK_1_35_647_358

    CLI v1.0

    set system mode switch

    file SSD indicator encrypted

    @

    ssd-control-start

    ssd config

    ssd file passphrase control unrestricted

    no ssd file integrity control

    ssd-control-end cb0a3fdb1f3a1af4e4430033719968c0

    !

    vlan database

    default-vlan vlan 3333

    exit

    vlan database

    vlan 1,100,104,111

    exit

    voice vlan oui-table add 0001e3 Siemens_AG_phone________

    voice vlan oui-table add 00036b Cisco_phone_____________

    voice vlan oui-table add 00096e Avaya___________________

    voice vlan oui-table add 000fe2 H3C_Aolynk______________

    voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone

    voice vlan oui-table add 00d01e Pingtel_phone___________

    voice vlan oui-table add 00e075 Polycom/Veritel_phone___

    voice vlan oui-table add 00e0bb 3Com_phone______________

    dot1x system-auth-control

    hostname net055

    line console

    exec-timeout 30

    exit

    line ssh

    exec-timeout 0

    exit

    encrypted radius-server host 172.16.200.57 key #REMOVED priority 10 usage dot1.x

    radius-server host source-interface vlan 100

    management access-list mlist2

    permit ip-source 172.16.202.0 mask 255.255.255.0

    permit ip-source 172.16.200.0 mask 255.255.255.0

    exit

    management access-class mlist2

    logging buffered debugging

    aaa authentication enable default enable none

    aaa accounting dot1x start-stop group radius

    enable password level 15 encrypted #REMOVED

    no service password-recovery

    no passwords complexity enable

    passwords aging 0

    username #REMOVED password encrypted #REMOVED privilege 15

    username #REMOVED password encrypted #REMOVED privilege 15

    ip ssh server

    ip ssh password-auth

    ip http timeout-policy 1800 https-only

    no ip http server

    tacacs-server timeout 10

    clock timezone " " 0 minutes 0

    clock source sntp

    !

    interface vlan 100

    ip address 172.16.200.21 255.255.255.0

    no ip address dhcp

    !

    interface vlan 104

    name gen-0-Gnv-204.0

    !

    interface vlan 111

    name guest-0-Gnv-10-66-61.0

    dot1x guest-vlan

    !

    interface gigabitethernet1

    switchport trunk allowed vlan add 100,104,111

    !

    interface gigabitethernet7

    dot1x guest-vlan enable

    dot1x reauthentication

    dot1x radius-attributes vlan static

    dot1x port-control auto

    switchport mode general

    switchport general allowed vlan add 104 untagged

    no macro auto smartport

    !

    exit

    ip default-gateway 172.16.200.1

    Looks like there was a similar questions here, but it seems to have never been resolved:

    https://supportforums.Cisco.com/message/3336810#3336810

    Hi all

    I'm working with Colin and that ends up being a problem of RADIUS. In the file eap.conf, for peap (auth phase 1).

    We need to enable copy_request_to_tunnel AND use_tunneled_reply:

    {PEAP

    # The syringe EAP session needs a default value
    # Type of EAP that is distinct from that of
    # module EAP-tunneled.  Inside of the
    # PEAP tunnel, we recommend that you use MS-CHAPv2,
    # as the default type is supported by
    # Windows clients.
    default_eap_type = mschapv2

    # module has PEAP also of these configuration
    Articles of #, which are the same as TTLS.

    copy_request_to_tunnel = yes
    use_tunneled_reply = yes

    Subsequently, we could see the answers of the test with id user vlan posting it once by response.

    See you soon!

  • Dynamic assignment of VLANS for MAB / ACS 5.5

    Hello

    Tried MAB works with ACS 5.5, and the looks part good ACS in the newspapers - the MAC address is sought, the authorization profile is correct. But on the switch, I get the following text:

    * 1 mar 00:12:53: AAA/AUTHENTIC/8021 X (00000004): choose method list "by default".

    * 1 mar 00:12:53: RADIUS/ENCODE (00000004): orig. component type = DOT1X

    * 1 mar 00:12:53: RADIUS: AAA Attr not supported: audit-session-id [607] 24

    * 1 mar 00:12:53: RADIUS: [0A8E0FDE00000002] 30 41 38 45 30 46 44 45 30 30 30 30 30 30 30 32

    * 1 mar 00:12:53: RADIUS: 30 30 30 38 30 [00080 41A]

    * 1 mar 00:12:53: RADIUS: AAA Attr not supported: interface [171] 20

    * 1 mar 00:12:53: RADIUS: 47 69 67 61 62 69 74 45 74 68 65 72 65 74 31 [GigabitEthernet1] 6F

    * 1 mar 00:12:53: RADIUS: 2F 30 [/ 0]

    * 1 mar 00:12:53: RADIUS (00000004): Config NAS IP: 0.0.0.0

    * 1 mar 00:12:53: RADIUS / ENCODE (00000004): acct_session_id: 4

    * 1 mar 00:12:53: RADIUS (00000004): send

    * 1 mar 00:12:53: RADIUS/ENCODE: best local IP 10.142.15.222 for Radius server address - 10.54.248.55

    * 1 mar 00:12:53: RADIUS (00000004): send request to access the id 10.54.248.55:1645 1645/5, len 162

    * 1 mar 00:12:53: RADIUS: 5th authenticator FE 17 88 64 41 1 D 09-86 EA 51 BE 78 42 B6 EB

    * 1 mar 00:12:53: RADIUS: username [1] 14 "28924ad5a199".

    * 1 mar 00:12:53: RADIUS: User-Password [2] 18 *.

    * 1 mar 00:12:53: RADIUS: 6 Service-Type call control [6] [10]

    * 1 mar 00:12:53: RADIUS: Framed-MTU [12] 6 1500

    * 1 mar 00:12:53: RADIUS: Called-Station-Id [30] 19 "00-1A-A1-99-9F-82".

    * 1 mar 00:12:53: RADIUS: Calling-Station-Id [31] 19 "28-92-4A-D5-A1-99".

    * 1 mar 00:12:53: RADIUS: Message-Authenticato [80] 18

    * 1 mar 00:12:53: RADIUS: EE F5 B8 E1 70 37 A6 3A AD 89 20 A5 A7 D0 E3 B4 [p7:]

    * 1 mar 00:12:53: RADIUS: EAP-Key-Name [102] 2 *.

    * 1 mar 00:12:53: RADIUS: NAS-Port-Type [61] 6 Ethernet [15]

    * 1 mar 00:12:53: RADIUS: NAS-Port [5] 6 50102

    * 1 mar 00:12:53: RADIUS: NAS-Port-Id [87] 22 'GigabitEthernet1/0/2 '.

    * 1 mar 00:12:53: RADIUS: NAS-IP-Address [4] 6 10.142.15.222

    * 1 mar 00:12:53: RADIUS (00000004): started 5 sec timeout

    * 1 mar 00:12:53: RADIUS: receipt id 1645/5 10.54.248.55:1645, Access-Accept, len 106

    * 1 mar 00:12:53: RADIUS: authenticator 26 B4 B9 AB 3 04 68 DA - 38 AF F6 CD 36 95 73 2 b

    * 1 mar 00:12:53: RADIUS: username [1] 19 "28-92-4A-D5-A1-99".

    * 1 mar 00:12:53: RADIUS: [25] of class 31

    * 1 mar 00:12:53: RADIUS: 43 41 43 53 3 a 41 30 31 44 52 46 4 30 30 32 2F [CACS:A01DRFN002 /]

    * 1 mar 00:12:53: RADIUS: 32 33 31 35 38 38 36 30 31 31 37 38 2F [231588601/178]

    * 1 mar 00:12:53: RADIUS: Tunnel-Type [64] 01: VLAN 6 [13]

    * 1 mar 00:12:53: RADIUS: Tunnel-Medium-Type [65] 6 01:ALL_802 [6]

    * 1 mar 00:12:53: RADIUS: Message-Authenticato [80] 18

    * 1 mar 00:12:53: RADIUS: 91 22 50 8 62 C2 F0 10 C6 OF 70 84 AF 31 6 CD [Pbp1l ""]

    * 1 mar 00:12:53: RADIUS: mount-Auth-Type [81] 6 20003120

    * 1 mar 00:12:53: RADIUS (00000004): receipt of id 1645/5

    * 1 mar 00:12:53: RADIUS: unsupported value 20003120 to the 81 attribute

    * 1 mar 00:12:53: RADIUS/DECODE: Ascend auth type; IN CASE OF FAILURE

    * 1 mar 00:12:53: RADIUS/DECODE: decoder; IN CASE OF FAILURE

    * 1 mar 00:12:53: RADIUS/DECODE: Ascend-Auth-Type attribute; IN CASE OF FAILURE

    * 1 mar 00:12:53: RADIUS/DECODE: analysis response op decode; IN CASE OF FAILURE

    * 1 mar 00:12:53: RADIUS/DECODE: analyze the answer; IN CASE OF FAILURE

    * 1 mar 00:12:53: % MAB-5-FAIL: failure of authentication for the client (2892.4ad5.a199) on the Interface item in gi1/0/2 AuditSessionID 0A8E0FDE0000000200080ABF

    * 1 mar 00:12:53: % AUTHMGR-7-RESULT: result of the "dead server" authentication "MAB" for the client (2892.4ad5.a199) on the Interface item in gi1/0/2 AuditSessionID 0A8E0FDE0000000200080ABF

    * 1 mar 00:12:53: % AUTHMGR-5-FAIL: failed authorization for customer (2892.4ad5.a199) on the Interface item in gi1/0/2 AuditSessionID 0A8E0FDE0000000200080ABF

    It recognizes the attributes 64 and 65, but the Tunnel-private-group-id, which contains the actual number of VLAN is not supported. How can I assign the vlan OK if this attribute is not taken in charge? Does not work with a string corresponding to the name VLAN on the switch either.

    The version is 12.2.55SE10 3750G.

    Hello

    Since him debugs if I see that you are missing an attribute to make the assignment of VLANs, in your test it just to send the following items:

    * 1 mar 00:12:53: RADIUS: Tunnel-Type [64] 01: VLAN 6 [13]

    * 1 mar 00:12:53: RADIUS: Tunnel-Medium-Type [65] 6 01:ALL_802 [6]

    But it would be appropriate to send:

    • Tunnel-Type = 64 = VLAN

    • Tunnel-Medium-Type = 802

    • Tunnel-private-Group-ID = 253

    When the "Tunnel-private-Group-ID" is the number/name of vlan to be awarded, the bellows is an example on what it would look like on the profile of the ACS:

    http://www.Cisco.com/c/dam/en/us/support/docs/wireless/5500-series-wirel...

    Note: Please mark as answer as appropriate

  • Restrict access to the network on 871 router via mac address

    Hello

    I have a Cisco 871 router and I am trying to allow only specific MAC addresses access to the network. Is there a way to specify that only specific MAC addresses are allowed to access? Any other MAC access will be denied?

    I can either have static IP or DHCP for local machines.

    Can I use this "secure DHCP IP address assignment" details found here... http://www.cisco.com/en/US/docs/ios/12_2t/12_2t15/feature/guide/ftdsiaa.html ?

    I use these...

    static Mac address table

    OR

    Security table of Mac addresses

    ... to achieve this?

    Thank you.

    You can use "mac-address-table static" If you know all the mac addresses that will be connected.

    If the router is by distributing ip addresses so you can indeed do secure IP DHCP address assignment.

    Note that you can make a 'mac access-list' switch and aplly in any vlan you want.

    Alternatively, you can do "dhcp snooping" allowing guests who got a dhcp ip addresses and are not identity theft.

    I hope it helps.

    PK

  • VMware device with 2 network cards claiming the same IP address with two MAC addresses

    Hello.

    I see messages intermittent my gateway network two MAC addresses associated with a virtual machine running on a 5.5 ESXi host for the same IP address.

    The virtual machine is a MiTel 3300 controller for a VOIP system. the system is configured with two IP addresses, one on the local network and another with a public IP address in the DMZ. In the network configuration of the 3300, I assigned the address LAN IP at 00: 0C: 29:30:B2:B2 and the DMZ IP at 00: 0C: 29:30:B2:BC (Mac for network devices presented by the ESXi host virtual machine).

    On the host, I configured a vSwitch with exclusive access to two physical network adapters on the host machine. The vSwitch is configured with two machine virtual port groups, LAN and DMZ, with access to the physical network interface cards. Tab grouping of groups vSwitch port NIC, I replaced the order of failover of the switch to activate an active NETWORK card only for the Group of LAN ports and the other card NETWORK only for the DMZ port group. (I don't know how the content of the column of networks is determined. Neither is correct for the traffic on the physical switch. If these are configurable, please advise and I'll change the settings). The relevant parameters of vSwitch, groups of ports and VM are distinguished below.

    On the virtual machine itself, through the VMWare host, I assigned 00: 0C: 29:30:B2:B2 for the Group of LAN ports and 00: 0C: 29:30:B2:BC to the DMZ group port (best I can tell, anyway, since the MAC address field annoyingly obscures the last two digits of the MAC address - break if I invert the mapping) (, but all seems OK).

    The goal here is to make sure that MACs of ports vSwitch the 3300 is listening and sending always correspond to the physical ports that are VLAN Tag by the physical switch to ensure the routing. Generally speaking, it seems that what is happening but, intermittently, we cross one-way calls that suggests a problem of routing between us and our SIP trunk provider; coinciding with these incidents, I get an email along the lines of "the security in the network device has detected a conflict of IP address with two or more devices. The period of INVESTIGATION "DMZ. DMZ. DMZ. DMZ' is claimed by the following clients with MAC addresses: ' 00: 0C: 29:30:B2:B2' ' 00: 0C: 29:30:B2:BC'. »

    I did something in the configuration that would lead to this kind of collision intermittent? Have a hacked together a way to do something that could be accomplished in a way that is simpler and more reliable?

    Thanks for any idea that you can offer.

    Kind regards

    J.

    I probably don't fully understand your configuration, but it seems that you are not interested in using the collection of NETWORK adapters in the virtual switch of the VM MiTel 3300.

    If it is correct, why not create two virtual switches, each with a group of port (LAN and DMZ) unique and with a separate connection of (vmnic2 and vmnic1)?

    In general, collection of NETWORK adapters may be used to share traffic between uplinks and ensure that if one of the uplinks connect fails, a virtual machine still has access to the network.

  • Is it possible to find the MAC address in Microsoft Windows computers.

    Original title: help
    its possible find in microsoft net computers IP - MAC address, and where I need to write if I run to

    Hello

    Yes, the MAC address is present in every system that connects to the Internet and runs any version of Windows.

    MAC address stands for Media Access Control (MAC address) is a unique identifier assigned to the network interfaces for communications on the physical network segment.

    To find the MAC address on Windows XP computer try the steps below.

    (a) click the start menu button in the Windows taskbar.

    (b) click 'run... '. "in this menu.

    (c) type "cmd" in the text box that appears. A command prompt window launches on the desktop.

    (d) in the command window, type ' ipconfig/all'. The details are displayed for each of the network adapters on the computer. Computers installed with the software VPN or software emulation will have one or more virtual cards.

    (e) the "IP address" field contains the IP address of the network card.

    (f) the 'physical address' field contains the MAC address of the card.

  • Why must know the MAC address cable modem if I bought a new modem cable or ISP company.

    Original title: why the ISP or cable modem company need to know my cable modem MAC address if I bought a new one, beside that received from a modem cable or ISP company?

    Why the ISP or cable modem company need to know my modem cable MAC address if I bought a new one, beside that received from a modem cable or ISP company?

    The cable provides tend to lock their network by MAC address or they assign you an IP address based on your cable modem MAC address.

    Some (for example cable Telewest in the United Kingdom), used to go as far as locking down for the mac address of the PC connected to the cable modem, which is why some routers have the ability to clone the mac address of a connected device.
  • "clone mac address".

    WRT64G

    I have a server (2003) and a PC (XP) connected to my router and a laptop (vista) wireless to the router. I connect to my server and PC thru 'mstsc' where I could use two of them through my laptop. Everything was fine until I wanted to go further to access my server via the internet (which I can do w/out for now). I started tweaking the router, and when I fell on the button for "clone Mac address" I from the PC. Now when I want to access my PC and the server I clone my Mac address from my laptop to the router and then I can't get on the internet until I have clone the Mac address to my PC. I guess I should write down Mac address, but I didn't and now I don't know how to get it back. And I guess that's where I went wrong, I'm not sure. Can someone tell me how to get back where I was? Or tell me what I need to use the settings.

    Thank you

    "clone mac address" means the process of duplication of the MAC address of one of the computers on your network to the port on your router Internet (WAN). This is generally only done under circumstances where your service provider equipment external Internet to your network is expected to see a certain MAC address before it will assign a WAN IP address to your equipment.

    What some service providers used to make Internet was set up your internet connection and to register the MAC address that was on the device (usually a PC) that is directly related to their modem (or what they used to provide connectivity to their network). They would configure their network equipment to provide an IP address only if she saw this MAC address of your connection. If you have modified the equipment to connect to the modem, you must call to reset their equipment to account for your new MAC address. Most of the suppliers do no more, but the MAC cloning on the routers address is a way to circumvent the duty to call. If you have installed a router at some point after the original installation of your ISP and your internet connection does not work, you could try cloning your MAC PC address to the internet port of the router, thus deceiving their equipment into thinking that the same PC was still connected to the modem.

    In most cases, MAC address cloning is no longer necessary (despite the recommendations of many here). There are cases where it can work to correct a connection failed, but it is rare.

    There is no reason you need to clone the MAC address of your router, if your internet connection work before you start playing with trying to get RDP (mstsc) access to your devices from the internet. You need just the port to the RDP port on the router... but note that if you want to access these two machines on the internet, they will have to listen on different ports. You can use a registry editing in Windows to change the port used for RDP so that the XP and server box are tuned on unique ports.

    http://support.microsoft.com/kb/306759 - how to change the listening port for remote desktop

  • BEFSR81 v3 MAC address filtering

    I have a simple network configuration with wired computers connected to the router and the router connected to the modem.

    My goal is to associate the IPs assigned to MACs. So if I have 4 (A, B, C, D) computers connected to the router, it assigned a specific IP address. If someone disconnected a computer to replace it with their own, the router would recognize the MAC change and could not allow the connection.

    I know that the router can filter certain IP or Mac addresses from the internet, but some evil doer who simply unplug the computer to plug its own would still have access to the local network. That and I have no way of knowing what would MAC the author.

    So far, I have configured my computer to request a static IP (192.168.1.2-5) and the DHCP Server give the rest (6 to 254). Then the IP filter is on the DHCP range to block those from the internet.

    But as I said, I need these completely blocked IPs. Also. If a user connects to a computer windows laptop and guess the static IP address, then the router fortunately would give him access to everything...

    Sorry, I know it's confusing. Bottom line is I have to let only specific Mac to connect to the network. Or SOME form of protection for the cable networks... Super sticky ethernet cables is not an option, although it would solve the problem.

    nicfortin1342 wrote:

    My goal is to associate the IPs assigned to MACs. So if I have 4 (A, B, C, D) computers connected to the router, it assigned a specific IP address. If someone disconnected a computer to replace it with their own, the router would recognize the MAC change and could not allow the connection.

    Cannot do this with the BEFSR81 and it is not a matter of how it is recent - the firmware just does not support, does support an address IP or MAC, some of them not allowing not blocking.  I think that it has been designed as a primitive, rather than a security measure parental control.

    With DHCP servers better (like those of most of the firewall) than the BEFSR81 has, you can configure DHCP to "static maps" so that the lease of the intellectual property will be distributed based on the MAC address, and which would you allow to adjust things until only the DHCP leases to some MAC addresses issue.

    Despite this, MAC addresses can be manually changed and spoofed, such as IP addresses, so neither is really a good measure of security.

    You have to ask in the BEFSR81 firewall features, which, instead, is simply a router.

    In the grand scheme of things, because the MAC and IP addresses can be spoofed, if someone can get physical access to your network, you are pretty well watered unless the traffic is encrypted.

    Russ

  • Find the offending MAC address to bpduguard

    I have a Cisco WS-C6509-E with IOS, connected to a hypervisor with several virtual machines on it.

    The port on the 6500 that connects to the hypervisor is a trunk port and allowed to bpduguard.

    One of the virtual machines is originally the port pass to err - disable State by sending BPDUS. I'm trying to figure out which, the Cisco itself. Specifically, I'm trying to find the MAC address of the virtual machines.

    Is this possible? I watched with full spanning tree debugging on debugging, but all I get is that the port will in err - disable. He's going to tell me what is the address MAC offending (or anything on the BPDUS).

    Short of stripping the VLAN on the trunk, until I have the network guilty (which won't actually give me guilty unit but rather, only sound VLAN), I don't know if there is a direct command or debug to give me this information directly. Can anyone help?

    Hello

    Try extending over the port and capture some of the traffic.

    Thank you

    John

Maybe you are looking for

  • How do I know that I have installed the fusion drive correctly?

    I recently bought an iMac with a fusion drive. So, I'm a newbie in the world of osx. But last night, for some reason, I had to reinstall el capitan, but since I'm a beginner I don't know if I put the fuser unit correctly. I'm worried because I think

  • upgrading processors T440p

    Hello world! If someone knows if it is possible to upgrade a processor on my new laptop T440p? If one day I want to get a quad core... Config: I5 4300 M, 4 GB RAM Thank you very much!

  • Different geographical region cannot read DVD

    Why if I always buy a disc of DVD (Korean film) WMP says that "Windows Media Player cannot play the DVD because the disc prohibits playback in your region of the world. You must obtain a disc that is intended for your geographic region. » Anyone can

  • synology NAS E3200 slow transfer rate

    Hello. I just bought a synology NAS ds212j.  I've updated to DSM4.0. I bought 2 Seagate ST2000DM001 Barracuda 7200 tr / MIN SATA 6 GB/s NCQ 64 MB Cache 3.5 inch internal nu 2 TB drive My e3200 has the 1.0.04)is latest firmware I'm backup via time mac

  • More old HP LaserJet 5N with Windows 7

    I used this printer successfully with XP but cannot get to work with Windows 7. I have instaled driversand troubleshooting of windows can not find the problem. When I try to print, it appears on the calendar but says "printing error". I can hear the