Specifications

Clarifications and Known Behaviors
ExtremeWare 7.3.1b3 Release Notes 93
Do Not Upload a Configuration Containing Authenticated Clients
In network login campus mode, do not save and upload a configuration containing authenticated
clients. Doing so can corrupt the configuration. To back up a configuration:
1 Disable network login using the
disable netlogin command.
2 Unauthenticate all client ports using the
clear netlogin state ports vlan command.
3 Verify that all ports are unauthenticated using the
show netlogin and show vlan commands.
4 Save the configuration using the
save configuration command.
5 Upload the configuration to your backup server using the
upload configuration command.
When you download this configuration, remember to enable network login (PD2-142190901).
The show netlogin Output Might Display Wrong Authentication
If you disable network login, the output of the show netlogin command incorrectly displays all
existing authenticated 802.1x clients as HTTP. If you enable network login again, the display corrects.
This is cosmetic, and does not affect the actual authentication (PD2-171477134).
ICMP Access Lists and ignore-overlap
The ignore-overlap feature is not supported with ICMP access lists. Use precedence to manage
overlapping. If you specify
ignore-overlap when you create an ICMP access list but do not specify a
precedence number, a precedence of 0 is assigned. In addition, the ICMP access list gives the highest
precedence to the rules created first, instead of giving precedence to the most specific rule
(PD2-157416614).
CPU DoS Protect and ACL Precedence
If you configure the CPU DoS protect feature with a filter precedence of x, you cannot create an access
list with a precedence of x, x+1, or x+2. All other values are acceptable.
If you configure an access list with a precedence of x, you cannot configure the CPU DoS protect feature
with a filter precedence of x, x-1 or x-2. All other values are acceptable (PD2-129163428).
MSM Failover Clears Logins
An MSM failover clears the Network Login state, forcing users to log in again (PD2-109075331).
Network Login RADIUS Server Interoperability
The following RADIUS authentication servers are tested and supported with Network Login:
Microsoft Windows 2000 Internet Authentication Service
Funk Steel-Belted-Radius Enterprise Edition version 4.0
The following authentication methods are supported with Network Login:
PAP (web-based only)
EAP-MD5 (802.1x only)
EAP-TLS (802.1x only)
EAP-TTLS (802.1x only)