Deployment Guide
Table Of Contents
- Table of Contents
- Preface
- About Extreme Campus Controller Deployment
- Configuring DHCP, NPS, and DNS Services
- Centralized Site with a Captive Portal
- Centralized Site with AAA Network
- Deploying a Mesh Network
- Configuring an External NAC Server for MBA and AAA Authentication
- Manage RADIUS Servers for User Authentication
- External Captive Portal on a Third-Party Server
- Access Control Rule Admin Portal Access
- Deploying Centralized Web Authentication
- Deploying ExtremeCloud IQ - SE as an External Captive Portal
- Deployment Strategy
- Configuring an External Captive Portal Network
- Editing the Configuration Profile for Network and Roles
- Extreme Campus Controller Default Pass-Through Rule
- Adding Extreme Campus Controller as a Switch to ExtremeCloud IQ - Site Engine
- Editing the Unregistered Policy on ExtremeCloud IQ - Site Engine
- Editing the ExtremeCloud IQ - Site Engine Profile for Policy and Location-Based Services
- Deploying an ExtremeGuest Captive Portal
- Deploying Client Bridge
- Deploying an Availability Pair
- Deploying Universal APs
- Extreme Campus Controller Pair with ExtremeLocation and AirDefense
- ECP Local Authentication
- PHP External Captive Portal, Controller’s Firewall Friendly API
- Index
Related Topics
Default Access Control Groups on page 114
Configure Admin Access Policy Role on page 114
Default Access Control Groups
The following Access Control system groups are provided with the Extreme Campus Controller
installation by default.
• Blacklist. A list of MAC addresses that are prohibited from accessing the network.
• Registered Guests. A list of MAC addresses that have been granted access to the network via the
Guest captive portal.
• Registration Denied Access. A list of MAC addresses that have been denied access to the network.
• Registration Pending Access. A list of MAC addresses that are waiting permission to access to the
network.
• Web Authenticated Users. A list of MAC addresses that have been granted access to the network via
the Authenticated captive portal.
• DFNDR_PolicyGeneration. Default Group created for Extreme Defender Application. Allows
Defender Policy Generator to move clients to and from build roles.
In addition, the following Device Type groups are provided with your Extreme Campus Controller
installation:
• Windows
• Windows Mobile
• Linux
• Mac
• iPhone
• BlackBerry
• Android
• Windows
• Mobile Game Console
• Chrome OS
You cannot delete system groups.
Related Topics
Define Rule Precedence on page 119
Configure Admin Access Policy Role
Configure a Policy Role that allows Admin access to the captive portal Admin page using Port 8445.
Table 15 on page 115 describes each setting and provides an example value configured for the Captive
Portal Admin Role.
1. Go to Configure > Policy > Role > Add.
Default Access Control Groups
Access Control Rule Admin Portal Access
114 Extreme Campus Controller Deployment Guide for version 5.46.03










