Security

last person joined: 14 hours ago 

Forum to discuss Enterprise security using HPE Aruba Networking NAC solutions (ClearPass), Introspect, VIA, 360 Security Exchange, Extensions, and Policy Enforcement Firewall (PEF).
Expand all | Collapse all

limit concurrent 802.1x sessions based on user role

This thread has been viewed 6 times
  • 1.  limit concurrent 802.1x sessions based on user role

    Posted Sep 03, 2015 10:33 PM

    I want to limit concurrent 802.1x sessions based on user role and I use this rule but there's error.

    What is my wrong ?

    I'm sure in from statement (from radius_acc). My authentication source is AD_Crop but how can I find name of table ? in this statement

     

    1.JPG

     

     

    Thank you



  • 2.  RE: limit concurrent 802.1x sessions based on user role

    EMPLOYEE
    Posted Sep 10, 2015 09:09 PM

    You are going to need to send that screenshot at full size so that we can read it. :)

     



  • 3.  RE: limit concurrent 802.1x sessions based on user role

    Posted Sep 10, 2015 11:22 PM

    4.JPG

     

    5.JPG

     

    2.JPG3.JPG

     

    Thank you for your reply



  • 4.  RE: limit concurrent 802.1x sessions based on user role

    EMPLOYEE
    Posted Sep 10, 2015 11:38 PM

    Oh, you are trying to do an SQL query in an LDAP source. You need to create a new source, SQL Type, and put it in there. Point the new SQL source at the tipsdb. Just take a look at Endpoints Repository source for configuration.



  • 5.  RE: limit concurrent 802.1x sessions based on user role

    Posted Sep 10, 2015 11:52 PM

    Do you mean I can't put SQL command to query data with in LDAP ?

    but If i use LDAP , How i limit concurrent 802.1x sessions

     

     

    Thank you



  • 6.  RE: limit concurrent 802.1x sessions based on user role

    EMPLOYEE
    Posted Sep 10, 2015 11:57 PM
    Yes. That is what I mean. You need to add it to your service as an Authorization source. Then in Enforcement you can do something like:

    Authorization:SQL-Session-Check Session Equals 1

    Captive portal redirect to a page that tells them they are only allowed one device on the 802.1x network.