I had a cheap consumer-grade Netgear switch that claimed to support dynamic VLAN assignment. The documentation was limited on how to configure it but eventually it worked. I wanted to share the configuration steps with the community to save othera spending 6 hours of tinkering (which was a meaningful experience though).
I configured this on a MS510TX switch, all configurations are web based but it does let you download a configuration file that is readable.
Steps I used to configure the Netgear switch:
Step 1: Global Settings
Menu: Security> Management Security>Global Settings
Change Accounting Mode to "Enable and leave the other settings default (see below)

Step 2: Server Configuration
Menu: Security> Management Security> Server Configuration
Configure Server IP address, port and Secret

Step 3: Configure Accounting
Menu: Security> Management Security> Accouting Server Configuration
Configure Server IP address, port and Secret

Step 4: Enable 802.1X Authentication
Menu: Security> Port Authentication > Advanced > 802.1x Configuration
Enable port-based authentication
Use settings:
Port Based Authentication State: Enable
Guest VLAN: Disable
Guest VLAN ID: 1 (default setting)
Guest VLAN Period: 90 (default setting)
EAPOL VLAN Period: 90 (default setting)

Step 5: Enable 802.1X Authentication on a Port
Menu: Security> Port Authentication > Advanced > Port Authentication
Enable Dynamic VLAN Assignment
Starting state looks like this


First enable Dynamic VLAN Assignment and click "Apply"

The select the port again and now change the Port Control setting to "Auto" and click "Apply"

Step 6: Take a snapshot at of your VLAN table
Menu: Switching > VLAN > Basic > VLAN Configuration

Clearpass Policy:
Step: 7: Identifying the Service
As a NAD, the Netgear switch isn't really sharing a lot of information in the RADIUS Access-Requests. Below information about received

The identify the policy I used:
Type: Radius:IETF: NAS-Port-Type Equals Ethernet (15)
Type: Connection: NAD-IP-Address Equals IP-address-of-the-Netgear-switch
Disclaimer: Skipping over authentication and authorization, moving straight to the Enforcement.
Step 8: Enforcement
Use an enforcement profile that contains these 4 settings:
Radius:IETF: Tunnel-Medium-Type: IEEE-802 (6)
Radius:IETF: Tunnel-Private-Group-Id: NAME OF YOUR VLAN (See step 6)
Radius:IETF: Tunnel-Type: VLAN
Radius:Avenda: Avenda-Tag-Id: 0
Example used by me:
In my case i assigned VLAN 25 name Data to the switch. It only worked by using the name "Data" (without quotes)

In the service it looked like this:

------------------------------
Martijn van Overbeek
Architect, Netcraftsmen a BlueAlly Company
------------------------------