HI,
We faced an issue while using CoA from ClearPass with MAC OSx, in clearpass i have allowed access to all 802.1x clients that have correct ceridentials to a guest vlan with limited access to get the device fingerprinting, then CPPM auto CoA the clients after a success fingerprinting and then clients reauthenticate again and match the corret OS policies.
This works fine except after CoA the MAC OSx clients do not release the old IP and get new IP from the new VLANs after CoA, they retain the old IP which is not valid anymore.
Anyone faced the samething ? I found the same issue reported with Cisco and ISE but couldn't find an article or post from Aruba.
Android and IOS clients work fine with no issues.
Kind Regards