Compare commits

...

12 Commits

12 changed files with 99 additions and 21 deletions

View File

@ -52,6 +52,7 @@ radius dyn-authorization enable
radius dyn-authorization client 10.1.40.115 replay-protection enable secret-key ciphertext AQBapVQ2vkEjsJe6p2n0WzT4LIC6HMsDr5ibUEz8zWkhAbsyCQAAAIKw7uQQYOCmxg== radius dyn-authorization client 10.1.40.115 replay-protection enable secret-key ciphertext AQBapVQ2vkEjsJe6p2n0WzT4LIC6HMsDr5ibUEz8zWkhAbsyCQAAAIKw7uQQYOCmxg==
radius dyn-authorization client 10.1.40.116 replay-protection enable secret-key ciphertext AQBapUEsvBmPVj7QRYqNeM30VNxfF8p9B7SgCW670zXSEq5KCQAAANZ3qFiPk1/XRw== radius dyn-authorization client 10.1.40.116 replay-protection enable secret-key ciphertext AQBapUEsvBmPVj7QRYqNeM30VNxfF8p9B7SgCW670zXSEq5KCQAAANZ3qFiPk1/XRw==
radius dyn-authorization client 10.1.40.117 replay-protection enable secret-key ciphertext AQBapWlcCgIP9yWE2dtj/ZnAVo4UjmEfRIsFEACG0L2YLdWECQAAAD5vmkp6UFPG7A== radius dyn-authorization client 10.1.40.117 replay-protection enable secret-key ciphertext AQBapWlcCgIP9yWE2dtj/ZnAVo4UjmEfRIsFEACG0L2YLdWECQAAAD5vmkp6UFPG7A==
logging 10.1.40.78
ssh server vrf default ssh server vrf default
ssh server vrf mgmt ssh server vrf mgmt
ssh key-exchange-algorithms curve25519-sha256 curve25519-sha256@libssh.org diffie-hellman-group14-sha1 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 ssh key-exchange-algorithms curve25519-sha256 curve25519-sha256@libssh.org diffie-hellman-group14-sha1 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512

View File

@ -54,6 +54,7 @@ radius dyn-authorization enable
radius dyn-authorization client 10.1.40.115 replay-protection enable secret-key ciphertext AQBapVK7sCzSZPpzqGVBeZ7J6sS+vWrv0vkPgTB6dMxBr3AyCQAAADC7sKMxvqtEhQ== radius dyn-authorization client 10.1.40.115 replay-protection enable secret-key ciphertext AQBapVK7sCzSZPpzqGVBeZ7J6sS+vWrv0vkPgTB6dMxBr3AyCQAAADC7sKMxvqtEhQ==
radius dyn-authorization client 10.1.40.116 replay-protection enable secret-key ciphertext AQBapWmD39yWvsSwmnjDejAjVXtKa9pdAwTiCykZdARxJvMZCQAAAIMhIFs7jaARHQ== radius dyn-authorization client 10.1.40.116 replay-protection enable secret-key ciphertext AQBapWmD39yWvsSwmnjDejAjVXtKa9pdAwTiCykZdARxJvMZCQAAAIMhIFs7jaARHQ==
radius dyn-authorization client 10.1.40.117 replay-protection enable secret-key ciphertext AQBapTud3WTe/u+puYlgkwg5ioET5jQvu9V5ETpQlCd5g7JZCQAAABh9MAp4D3gamg== radius dyn-authorization client 10.1.40.117 replay-protection enable secret-key ciphertext AQBapTud3WTe/u+puYlgkwg5ioET5jQvu9V5ETpQlCd5g7JZCQAAABh9MAp4D3gamg==
logging 10.1.40.78
ssh server vrf default ssh server vrf default
ssh server vrf mgmt ssh server vrf mgmt
ssh key-exchange-algorithms curve25519-sha256 curve25519-sha256@libssh.org diffie-hellman-group14-sha1 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 ssh key-exchange-algorithms curve25519-sha256 curve25519-sha256@libssh.org diffie-hellman-group14-sha1 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512

View File

@ -54,6 +54,7 @@ radius dyn-authorization enable
radius dyn-authorization client 10.1.40.115 replay-protection enable secret-key ciphertext AQBapeRwHpmTCLplGafgVGKQDNlgcZuunxy0tbuPTOcy6y5pCQAAAHSKEOR39HvHvQ== radius dyn-authorization client 10.1.40.115 replay-protection enable secret-key ciphertext AQBapeRwHpmTCLplGafgVGKQDNlgcZuunxy0tbuPTOcy6y5pCQAAAHSKEOR39HvHvQ==
radius dyn-authorization client 10.1.40.116 replay-protection enable secret-key ciphertext AQBape6yWefLB/yu2n/B6jF8j+h4i9efBW8DvetExHxHo0UzCQAAAFJN4aMfZIEeMw== radius dyn-authorization client 10.1.40.116 replay-protection enable secret-key ciphertext AQBape6yWefLB/yu2n/B6jF8j+h4i9efBW8DvetExHxHo0UzCQAAAFJN4aMfZIEeMw==
radius dyn-authorization client 10.1.40.117 replay-protection enable secret-key ciphertext AQBapXdG/+ZGfgzQmpTJ4oztEpgYbxkyUmAiJXjggDB3SFkuCQAAAM1EpMSDf3/HFQ== radius dyn-authorization client 10.1.40.117 replay-protection enable secret-key ciphertext AQBapXdG/+ZGfgzQmpTJ4oztEpgYbxkyUmAiJXjggDB3SFkuCQAAAM1EpMSDf3/HFQ==
logging 10.1.40.78
ssh server vrf default ssh server vrf default
ssh server vrf mgmt ssh server vrf mgmt
ssh key-exchange-algorithms curve25519-sha256 curve25519-sha256@libssh.org diffie-hellman-group14-sha1 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 ssh key-exchange-algorithms curve25519-sha256 curve25519-sha256@libssh.org diffie-hellman-group14-sha1 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512

View File

@ -54,6 +54,7 @@ radius dyn-authorization enable
radius dyn-authorization client 10.1.40.115 replay-protection enable secret-key ciphertext AQBapVqiz5pqXYClo94YNGCdLiFh4+6hH2dxs8aqE7wWO8aHCQAAAAntsSyR41j1eA== radius dyn-authorization client 10.1.40.115 replay-protection enable secret-key ciphertext AQBapVqiz5pqXYClo94YNGCdLiFh4+6hH2dxs8aqE7wWO8aHCQAAAAntsSyR41j1eA==
radius dyn-authorization client 10.1.40.116 replay-protection enable secret-key ciphertext AQBapeAIAlHI+TDna9xAVln0iYeOlelUSFpHgye1zptHI2E2CQAAANvdoPPOcvN8BQ== radius dyn-authorization client 10.1.40.116 replay-protection enable secret-key ciphertext AQBapeAIAlHI+TDna9xAVln0iYeOlelUSFpHgye1zptHI2E2CQAAANvdoPPOcvN8BQ==
radius dyn-authorization client 10.1.40.117 replay-protection enable secret-key ciphertext AQBapcjO1fmwXu60RRKO+QFd6JjFGnpP+DnXczZwJ+BBvjsbCQAAAES/yqJfiwz6FA== radius dyn-authorization client 10.1.40.117 replay-protection enable secret-key ciphertext AQBapcjO1fmwXu60RRKO+QFd6JjFGnpP+DnXczZwJ+BBvjsbCQAAAES/yqJfiwz6FA==
logging 10.1.40.78
ssh server vrf default ssh server vrf default
ssh server vrf mgmt ssh server vrf mgmt
ssh key-exchange-algorithms curve25519-sha256 curve25519-sha256@libssh.org diffie-hellman-group14-sha1 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 ssh key-exchange-algorithms curve25519-sha256 curve25519-sha256@libssh.org diffie-hellman-group14-sha1 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512

View File

@ -54,6 +54,7 @@ radius dyn-authorization enable
radius dyn-authorization client 10.1.40.115 replay-protection enable secret-key ciphertext AQBapbnr1YDw1a4gr3+u8Kc43BzAzmJNUwAGfkGFeDBF1DS3CQAAANXwqqO2wpefvw== radius dyn-authorization client 10.1.40.115 replay-protection enable secret-key ciphertext AQBapbnr1YDw1a4gr3+u8Kc43BzAzmJNUwAGfkGFeDBF1DS3CQAAANXwqqO2wpefvw==
radius dyn-authorization client 10.1.40.116 replay-protection enable secret-key ciphertext AQBapU/iL5CgKDEEHdSjwU6iHb5T269gKm+f9if64KoP9VpiCQAAAFE+r9jn0t0Lrg== radius dyn-authorization client 10.1.40.116 replay-protection enable secret-key ciphertext AQBapU/iL5CgKDEEHdSjwU6iHb5T269gKm+f9if64KoP9VpiCQAAAFE+r9jn0t0Lrg==
radius dyn-authorization client 10.1.40.117 replay-protection enable secret-key ciphertext AQBapXyNYe2kgdcmbEz9ihR8gl9/MYAXr/ryt4SorggSOjAACQAAAGzV6Agum0cP7g== radius dyn-authorization client 10.1.40.117 replay-protection enable secret-key ciphertext AQBapXyNYe2kgdcmbEz9ihR8gl9/MYAXr/ryt4SorggSOjAACQAAAGzV6Agum0cP7g==
logging 10.1.40.78
ssh server vrf default ssh server vrf default
ssh server vrf mgmt ssh server vrf mgmt
ssh key-exchange-algorithms curve25519-sha256 curve25519-sha256@libssh.org diffie-hellman-group14-sha1 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512 ssh key-exchange-algorithms curve25519-sha256 curve25519-sha256@libssh.org diffie-hellman-group14-sha1 diffie-hellman-group14-sha256 diffie-hellman-group16-sha512

View File

@ -1,9 +1,9 @@
Building configuration... Building configuration...
Current configuration : 39831 bytes Current configuration : 39870 bytes
! !
! Last configuration change at 19:40:38 EDT Thu Sep 18 2025 by jkafta72.admin ! Last configuration change at 09:24:35 EDT Thu Sep 25 2025 by mloper19.admin
! NVRAM config last updated at 19:40:38 EDT Thu Sep 18 2025 by jkafta72.admin ! NVRAM config last updated at 09:24:38 EDT Thu Sep 25 2025 by mloper19.admin
! !
version 15.2 version 15.2
no service pad no service pad
@ -137,7 +137,7 @@ spanning-tree portfast edge bpduguard default
spanning-tree extend system-id spanning-tree extend system-id
spanning-tree uplinkfast spanning-tree uplinkfast
spanning-tree backbonefast spanning-tree backbonefast
spanning-tree vlan 10,20,30,35,40,50-60,64,70 priority 8192 spanning-tree vlan 10,20,30,35,40,50-60,64,70,72 priority 8192
! !
redundancy redundancy
mode sso mode sso
@ -387,25 +387,25 @@ interface Loopback0
! !
interface Port-channel11 interface Port-channel11
switchport switchport
switchport trunk allowed vlan 10,20,30,35,40,51,59,60,70,251 switchport trunk allowed vlan 10,20,30,35,40,51,59,60,70,72,251
switchport trunk native vlan 251 switchport trunk native vlan 251
switchport mode trunk switchport mode trunk
! !
interface Port-channel21 interface Port-channel21
switchport switchport
switchport trunk allowed vlan 10,20,30,35,40,52,59,60,70 switchport trunk allowed vlan 10,20,30,35,40,52,59,60,70,72
switchport trunk native vlan 251 switchport trunk native vlan 251
switchport mode trunk switchport mode trunk
! !
interface Port-channel31 interface Port-channel31
switchport switchport
switchport trunk allowed vlan 10,20,30,35,40,53,59,60,70,251 switchport trunk allowed vlan 10,20,30,35,40,53,59,60,70,72,251
switchport trunk native vlan 251 switchport trunk native vlan 251
switchport mode trunk switchport mode trunk
! !
interface Port-channel41 interface Port-channel41
switchport switchport
switchport trunk allowed vlan 10,20,30,35,40,54,59,60,70,251 switchport trunk allowed vlan 10,20,30,35,40,54,59,60,70,72,251
switchport trunk native vlan 251 switchport trunk native vlan 251
switchport mode trunk switchport mode trunk
! !
@ -425,28 +425,28 @@ interface TenGigabitEthernet1/1
! !
interface TenGigabitEthernet1/2 interface TenGigabitEthernet1/2
description *** To hughes-idf104a-sw1 *** description *** To hughes-idf104a-sw1 ***
switchport trunk allowed vlan 10,20,30,35,40,51,59,60,70,251 switchport trunk allowed vlan 10,20,30,35,40,51,59,60,70,72,251
switchport trunk native vlan 251 switchport trunk native vlan 251
switchport mode trunk switchport mode trunk
channel-group 11 mode active channel-group 11 mode active
! !
interface TenGigabitEthernet1/3 interface TenGigabitEthernet1/3
description *** To hughes-idf138a-sw1 *** description *** To hughes-idf138a-sw1 ***
switchport trunk allowed vlan 10,20,30,35,40,52,59,60,70 switchport trunk allowed vlan 10,20,30,35,40,52,59,60,70,72
switchport trunk native vlan 251 switchport trunk native vlan 251
switchport mode trunk switchport mode trunk
channel-group 21 mode active channel-group 21 mode active
! !
interface TenGigabitEthernet1/4 interface TenGigabitEthernet1/4
description *** To hughes-idf119b-sw1 *** description *** To hughes-idf119b-sw1 ***
switchport trunk allowed vlan 10,20,30,35,40,53,59,60,70,251 switchport trunk allowed vlan 10,20,30,35,40,53,59,60,70,72,251
switchport trunk native vlan 251 switchport trunk native vlan 251
switchport mode trunk switchport mode trunk
channel-group 31 mode active channel-group 31 mode active
! !
interface TenGigabitEthernet1/5 interface TenGigabitEthernet1/5
description *** hughes-idf225b-sw1 *** description *** hughes-idf225b-sw1 ***
switchport trunk allowed vlan 10,20,30,35,40,54,59,60,70,251 switchport trunk allowed vlan 10,20,30,35,40,54,59,60,70,72,251
switchport trunk native vlan 251 switchport trunk native vlan 251
switchport mode trunk switchport mode trunk
channel-group 41 mode active channel-group 41 mode active
@ -487,28 +487,28 @@ interface TenGigabitEthernet2/1
! !
interface TenGigabitEthernet2/2 interface TenGigabitEthernet2/2
description *** To hughes-idf104a-sw1 *** description *** To hughes-idf104a-sw1 ***
switchport trunk allowed vlan 10,20,30,35,40,51,59,60,70,251 switchport trunk allowed vlan 10,20,30,35,40,51,59,60,70,72,251
switchport trunk native vlan 251 switchport trunk native vlan 251
switchport mode trunk switchport mode trunk
channel-group 11 mode active channel-group 11 mode active
! !
interface TenGigabitEthernet2/3 interface TenGigabitEthernet2/3
description *** To hughes-idf138a-sw1 *** description *** To hughes-idf138a-sw1 ***
switchport trunk allowed vlan 10,20,30,35,40,52,59,60,70 switchport trunk allowed vlan 10,20,30,35,40,52,59,60,70,72
switchport trunk native vlan 251 switchport trunk native vlan 251
switchport mode trunk switchport mode trunk
channel-group 21 mode active channel-group 21 mode active
! !
interface TenGigabitEthernet2/4 interface TenGigabitEthernet2/4
description *** To hughes-idf119b-sw1 *** description *** To hughes-idf119b-sw1 ***
switchport trunk allowed vlan 10,20,30,35,40,53,59,60,70,251 switchport trunk allowed vlan 10,20,30,35,40,53,59,60,70,72,251
switchport trunk native vlan 251 switchport trunk native vlan 251
switchport mode trunk switchport mode trunk
channel-group 31 mode active channel-group 31 mode active
! !
interface TenGigabitEthernet2/5 interface TenGigabitEthernet2/5
description *** hughes-idf225b-sw1 *** description *** hughes-idf225b-sw1 ***
switchport trunk allowed vlan 10,20,30,35,40,54,59,60,70,251 switchport trunk allowed vlan 10,20,30,35,40,54,59,60,70,72,251
switchport trunk native vlan 251 switchport trunk native vlan 251
switchport mode trunk switchport mode trunk
channel-group 41 mode active channel-group 41 mode active

View File

@ -68,6 +68,7 @@ vsf member 2
link 2 2/1/50 link 2 2/1/50
dhcpv4-snooping dhcpv4-snooping
client track ip client track ip
app-recognition
vlan 1 vlan 1
vlan 10 vlan 10
name mgmt name mgmt

View File

@ -7,7 +7,7 @@ clock timezone America/New_York -04 0
! !
conductorip 10.1.35.33 ipsec ****** interface vlan 35 conductorip 10.1.35.33 ipsec ****** interface vlan 35
location "Building1.floor1" location "Building1.floor1"
controller config 679 controller config 680
crypto-local pki ServerCert scsd_full_wc3 StarCert-Ex03_26_fullchain.pfx crypto-local pki ServerCert scsd_full_wc3 StarCert-Ex03_26_fullchain.pfx
crypto-local pki ServerCert scsd_full_wc_2026 StarCert-Ex03_26_fullchain.pfx crypto-local pki ServerCert scsd_full_wc_2026 StarCert-Ex03_26_fullchain.pfx
crypto-local pki ServerCert scsd_wc3_2026 StarCert-Expire03202026.pfx crypto-local pki ServerCert scsd_wc3_2026 StarCert-Expire03202026.pfx
@ -1853,6 +1853,8 @@ aaa rfc-3576-server "10.1.40.117"
! !
aaa authentication mac "default" aaa authentication mac "default"
! !
aaa authentication mac "IoT"
!
aaa authentication dot1x "Aruba100_dot1_aut" aaa authentication dot1x "Aruba100_dot1_aut"
! !
aaa authentication dot1x "default" aaa authentication dot1x "default"
@ -1861,6 +1863,8 @@ aaa authentication dot1x "default-psk"
! !
aaa authentication dot1x "Intune_dot1_aut" aaa authentication dot1x "Intune_dot1_aut"
! !
aaa authentication dot1x "IoT_dot1_aut"
!
aaa authentication dot1x "LemoyneTest_dot1_aut" aaa authentication dot1x "LemoyneTest_dot1_aut"
! !
aaa authentication dot1x "SCSD_IoT_dot1_aut" aaa authentication dot1x "SCSD_IoT_dot1_aut"
@ -1895,6 +1899,10 @@ aaa server-group "internal"
auth-server Internal position 1 auth-server Internal position 1
set role condition Role value-of set role condition Role value-of
! !
aaa server-group "IoT_dot1_svg"
auth-server NOC-CP-A position 1
auth-server NOC-CP-B position 2
!
aaa server-group "SCSD_Secure_dot1_svg" aaa server-group "SCSD_Secure_dot1_svg"
auth-server NOC-CP-B position 1 auth-server NOC-CP-B position 1
auth-server NOC-CP-A position 2 auth-server NOC-CP-A position 2
@ -1941,6 +1949,12 @@ aaa profile "Intune_aaa_prof"
initial-role "authenticated" initial-role "authenticated"
authentication-dot1x "Intune_dot1_aut" authentication-dot1x "Intune_dot1_aut"
! !
aaa profile "IoT_aaa_prof"
authentication-mac "IoT"
authentication-dot1x "IoT_dot1_aut"
dot1x-default-role "guest-logon"
dot1x-server-group "IoT_dot1_svg"
!
aaa profile "LemoyneTest_aaa_prof" aaa profile "LemoyneTest_aaa_prof"
initial-role "authenticated" initial-role "authenticated"
authentication-dot1x "LemoyneTest_dot1_aut" authentication-dot1x "LemoyneTest_dot1_aut"
@ -2563,6 +2577,10 @@ wlan ssid-profile "Intune_ssid_prof"
g-tx-rates 12 18 24 36 48 54 g-tx-rates 12 18 24 36 48 54
hide-ssid hide-ssid
! !
wlan ssid-profile "IoT_ssid_prof"
essid "IoT"
opmode mpsk-aes
!
wlan ssid-profile "SCSD_IoT_ssid_prof" wlan ssid-profile "SCSD_IoT_ssid_prof"
essid "SCSD_IoT" essid "SCSD_IoT"
wpa-passphrase *redacted* wpa-passphrase *redacted*
@ -3347,6 +3365,11 @@ wlan virtual-ap "Intune"
forward-mode decrypt-tunnel forward-mode decrypt-tunnel
ssid-profile "Intune_ssid_prof" ssid-profile "Intune_ssid_prof"
! !
wlan virtual-ap "IoT"
aaa-profile "IoT_aaa_prof"
vlan 30
ssid-profile "IoT_ssid_prof"
!
wlan virtual-ap "SCSD_IoT" wlan virtual-ap "SCSD_IoT"
aaa-profile "SCSD_IoT_aaa_prof" aaa-profile "SCSD_IoT_aaa_prof"
vlan 307 vlan 307
@ -3746,6 +3769,7 @@ ap-group "default"
virtual-ap "Aruba100" virtual-ap "Aruba100"
virtual-ap "Intune" virtual-ap "Intune"
virtual-ap "Vendor" virtual-ap "Vendor"
virtual-ap "IoT"
dot11a-radio-profile "default_radio_a_ui" dot11a-radio-profile "default_radio_a_ui"
dot11g-radio-profile "default_radio_g_ui" dot11g-radio-profile "default_radio_g_ui"
regulatory-domain-profile "default_rdp_ui" regulatory-domain-profile "default_rdp_ui"

View File

@ -7,7 +7,7 @@ clock timezone America/New_York -04 0
! !
conductorip 10.1.35.33 ipsec ****** interface vlan 35 conductorip 10.1.35.33 ipsec ****** interface vlan 35
location "Building1.floor1" location "Building1.floor1"
controller config 679 controller config 680
crypto-local pki ServerCert scsd_full_wc3 StarCert-Ex03_26_fullchain.pfx crypto-local pki ServerCert scsd_full_wc3 StarCert-Ex03_26_fullchain.pfx
crypto-local pki ServerCert scsd_full_wc_2025 Star-Exp042025-fullchain.pfx crypto-local pki ServerCert scsd_full_wc_2025 Star-Exp042025-fullchain.pfx
crypto-local pki ServerCert scsd_full_wc_2026 StarCert-Ex03_26_fullchain.pfx crypto-local pki ServerCert scsd_full_wc_2026 StarCert-Ex03_26_fullchain.pfx
@ -1857,6 +1857,8 @@ aaa rfc-3576-server "10.1.40.117"
! !
aaa authentication mac "default" aaa authentication mac "default"
! !
aaa authentication mac "IoT"
!
aaa authentication dot1x "Aruba100_dot1_aut" aaa authentication dot1x "Aruba100_dot1_aut"
! !
aaa authentication dot1x "default" aaa authentication dot1x "default"
@ -1865,6 +1867,8 @@ aaa authentication dot1x "default-psk"
! !
aaa authentication dot1x "Intune_dot1_aut" aaa authentication dot1x "Intune_dot1_aut"
! !
aaa authentication dot1x "IoT_dot1_aut"
!
aaa authentication dot1x "LemoyneTest_dot1_aut" aaa authentication dot1x "LemoyneTest_dot1_aut"
! !
aaa authentication dot1x "SCSD_IoT_dot1_aut" aaa authentication dot1x "SCSD_IoT_dot1_aut"
@ -1899,6 +1903,10 @@ aaa server-group "internal"
auth-server Internal position 1 auth-server Internal position 1
set role condition Role value-of set role condition Role value-of
! !
aaa server-group "IoT_dot1_svg"
auth-server NOC-CP-A position 1
auth-server NOC-CP-B position 2
!
aaa server-group "SCSD_Secure_dot1_svg" aaa server-group "SCSD_Secure_dot1_svg"
auth-server NOC-CP-B position 1 auth-server NOC-CP-B position 1
auth-server NOC-CP-A position 2 auth-server NOC-CP-A position 2
@ -1945,6 +1953,12 @@ aaa profile "Intune_aaa_prof"
initial-role "authenticated" initial-role "authenticated"
authentication-dot1x "Intune_dot1_aut" authentication-dot1x "Intune_dot1_aut"
! !
aaa profile "IoT_aaa_prof"
authentication-mac "IoT"
authentication-dot1x "IoT_dot1_aut"
dot1x-default-role "guest-logon"
dot1x-server-group "IoT_dot1_svg"
!
aaa profile "LemoyneTest_aaa_prof" aaa profile "LemoyneTest_aaa_prof"
initial-role "authenticated" initial-role "authenticated"
authentication-dot1x "LemoyneTest_dot1_aut" authentication-dot1x "LemoyneTest_dot1_aut"
@ -2528,6 +2542,10 @@ wlan ssid-profile "Intune_ssid_prof"
g-tx-rates 12 18 24 36 48 54 g-tx-rates 12 18 24 36 48 54
hide-ssid hide-ssid
! !
wlan ssid-profile "IoT_ssid_prof"
essid "IoT"
opmode mpsk-aes
!
wlan ssid-profile "SCSD_IoT_ssid_prof" wlan ssid-profile "SCSD_IoT_ssid_prof"
essid "SCSD_IoT" essid "SCSD_IoT"
wpa-passphrase *redacted* wpa-passphrase *redacted*
@ -3312,6 +3330,11 @@ wlan virtual-ap "Intune"
forward-mode decrypt-tunnel forward-mode decrypt-tunnel
ssid-profile "Intune_ssid_prof" ssid-profile "Intune_ssid_prof"
! !
wlan virtual-ap "IoT"
aaa-profile "IoT_aaa_prof"
vlan 30
ssid-profile "IoT_ssid_prof"
!
wlan virtual-ap "SCSD_IoT" wlan virtual-ap "SCSD_IoT"
aaa-profile "SCSD_IoT_aaa_prof" aaa-profile "SCSD_IoT_aaa_prof"
vlan 307 vlan 307
@ -3711,6 +3734,7 @@ ap-group "default"
virtual-ap "Aruba100" virtual-ap "Aruba100"
virtual-ap "Intune" virtual-ap "Intune"
virtual-ap "Vendor" virtual-ap "Vendor"
virtual-ap "IoT"
dot11a-radio-profile "default_radio_a_ui" dot11a-radio-profile "default_radio_a_ui"
dot11g-radio-profile "default_radio_g_ui" dot11g-radio-profile "default_radio_g_ui"
regulatory-domain-profile "default_rdp_ui" regulatory-domain-profile "default_rdp_ui"

View File

@ -7,7 +7,7 @@ clock timezone America/New_York -04 0
! !
conductorip 10.1.35.33 ipsec ****** interface vlan 35 conductorip 10.1.35.33 ipsec ****** interface vlan 35
location "Building1.floor1" location "Building1.floor1"
controller config 679 controller config 680
crypto-local pki ServerCert scsd_full_wc3 StarCert-Ex03_26_fullchain.pfx crypto-local pki ServerCert scsd_full_wc3 StarCert-Ex03_26_fullchain.pfx
crypto-local pki ServerCert scsd_full_wc_2025 Star-Exp042025-fullchain.pfx crypto-local pki ServerCert scsd_full_wc_2025 Star-Exp042025-fullchain.pfx
crypto-local pki ServerCert scsd_full_wc_2026 StarCert-Ex03_26_fullchain.pfx crypto-local pki ServerCert scsd_full_wc_2026 StarCert-Ex03_26_fullchain.pfx
@ -1851,6 +1851,8 @@ aaa rfc-3576-server "10.1.40.117"
! !
aaa authentication mac "default" aaa authentication mac "default"
! !
aaa authentication mac "IoT"
!
aaa authentication dot1x "Aruba100_dot1_aut" aaa authentication dot1x "Aruba100_dot1_aut"
! !
aaa authentication dot1x "default" aaa authentication dot1x "default"
@ -1859,6 +1861,8 @@ aaa authentication dot1x "default-psk"
! !
aaa authentication dot1x "Intune_dot1_aut" aaa authentication dot1x "Intune_dot1_aut"
! !
aaa authentication dot1x "IoT_dot1_aut"
!
aaa authentication dot1x "LemoyneTest_dot1_aut" aaa authentication dot1x "LemoyneTest_dot1_aut"
! !
aaa authentication dot1x "SCSD_IoT_dot1_aut" aaa authentication dot1x "SCSD_IoT_dot1_aut"
@ -1893,6 +1897,10 @@ aaa server-group "internal"
auth-server Internal position 1 auth-server Internal position 1
set role condition Role value-of set role condition Role value-of
! !
aaa server-group "IoT_dot1_svg"
auth-server NOC-CP-A position 1
auth-server NOC-CP-B position 2
!
aaa server-group "SCSD_Secure_dot1_svg" aaa server-group "SCSD_Secure_dot1_svg"
auth-server NOC-CP-B position 1 auth-server NOC-CP-B position 1
auth-server NOC-CP-A position 2 auth-server NOC-CP-A position 2
@ -1939,6 +1947,12 @@ aaa profile "Intune_aaa_prof"
initial-role "authenticated" initial-role "authenticated"
authentication-dot1x "Intune_dot1_aut" authentication-dot1x "Intune_dot1_aut"
! !
aaa profile "IoT_aaa_prof"
authentication-mac "IoT"
authentication-dot1x "IoT_dot1_aut"
dot1x-default-role "guest-logon"
dot1x-server-group "IoT_dot1_svg"
!
aaa profile "LemoyneTest_aaa_prof" aaa profile "LemoyneTest_aaa_prof"
initial-role "authenticated" initial-role "authenticated"
authentication-dot1x "LemoyneTest_dot1_aut" authentication-dot1x "LemoyneTest_dot1_aut"
@ -2520,6 +2534,10 @@ wlan ssid-profile "Intune_ssid_prof"
g-tx-rates 12 18 24 36 48 54 g-tx-rates 12 18 24 36 48 54
hide-ssid hide-ssid
! !
wlan ssid-profile "IoT_ssid_prof"
essid "IoT"
opmode mpsk-aes
!
wlan ssid-profile "SCSD_IoT_ssid_prof" wlan ssid-profile "SCSD_IoT_ssid_prof"
essid "SCSD_IoT" essid "SCSD_IoT"
wpa-passphrase *redacted* wpa-passphrase *redacted*
@ -3304,6 +3322,11 @@ wlan virtual-ap "Intune"
forward-mode decrypt-tunnel forward-mode decrypt-tunnel
ssid-profile "Intune_ssid_prof" ssid-profile "Intune_ssid_prof"
! !
wlan virtual-ap "IoT"
aaa-profile "IoT_aaa_prof"
vlan 30
ssid-profile "IoT_ssid_prof"
!
wlan virtual-ap "SCSD_IoT" wlan virtual-ap "SCSD_IoT"
aaa-profile "SCSD_IoT_aaa_prof" aaa-profile "SCSD_IoT_aaa_prof"
vlan 307 vlan 307
@ -3703,6 +3726,7 @@ ap-group "default"
virtual-ap "Aruba100" virtual-ap "Aruba100"
virtual-ap "Intune" virtual-ap "Intune"
virtual-ap "Vendor" virtual-ap "Vendor"
virtual-ap "IoT"
dot11a-radio-profile "default_radio_a_ui" dot11a-radio-profile "default_radio_a_ui"
dot11g-radio-profile "default_radio_g_ui" dot11g-radio-profile "default_radio_g_ui"
regulatory-domain-profile "default_rdp_ui" regulatory-domain-profile "default_rdp_ui"

View File

@ -6,7 +6,7 @@ hostname "NOC-ARUBA-MM-2"
clock timezone America/New_York -04 0 clock timezone America/New_York -04 0
! !
location "Building1.floor1" location "Building1.floor1"
controller config 679 controller config 680
crypto-local pki ServerCert scsd_wc2_full_2025 Star-Exp042025-fullchain.pfx crypto-local pki ServerCert scsd_wc2_full_2025 Star-Exp042025-fullchain.pfx
crypto-local pki ServerCert scsd_wc2_full_2026 StarCert-Ex03_26_fullchain.pfx crypto-local pki ServerCert scsd_wc2_full_2026 StarCert-Ex03_26_fullchain.pfx
crypto-local pki ServerCert scsd_wildcard_2025 StartCert-Expire042025.pfx crypto-local pki ServerCert scsd_wildcard_2025 StartCert-Expire042025.pfx

View File

@ -6,7 +6,7 @@ hostname "noc-aruba-mm"
clock timezone America/New_York -04 0 clock timezone America/New_York -04 0
! !
location "Building1.floor1" location "Building1.floor1"
controller config 679 controller config 680
crypto-local pki ServerCert scsd_wc2_full_2025 Star-Exp042025-fullchain.pfx crypto-local pki ServerCert scsd_wc2_full_2025 Star-Exp042025-fullchain.pfx
crypto-local pki ServerCert scsd_wc2_full_2026 StarCert-Ex03_26_fullchain.pfx crypto-local pki ServerCert scsd_wc2_full_2026 StarCert-Ex03_26_fullchain.pfx
crypto-local pki ServerCert scsd_wildcard_2025 StartCert-Expire042025.pfx crypto-local pki ServerCert scsd_wildcard_2025 StartCert-Expire042025.pfx