Deployment Guide
Table Of Contents
- Table of Contents
 - Preface
 - About Extreme Campus Controller Deployment
 - Configuring DHCP, NPS, and DNS Services
 - Centralized Site with a Captive Portal
 - Centralized Site with AAA Network
 - Deploying a Mesh Network
 - Configuring an External NAC Server for MBA and AAA Authentication
 - Manage RADIUS Servers for User Authentication
 - External Captive Portal on a Third-Party Server
 - Access Control Rule Admin Portal Access
 - Deploying Centralized Web Authentication
 - Deploying ExtremeCloud IQ - SE as an External Captive Portal
- Deployment Strategy
 - Configuring an External Captive Portal Network
 - Editing the Configuration Profile for Network and Roles
 - Extreme Campus Controller Default Pass-Through Rule
 - Adding Extreme Campus Controller as a Switch to ExtremeCloud IQ - Site Engine
 - Editing the Unregistered Policy on ExtremeCloud IQ - Site Engine
 - Editing the ExtremeCloud IQ - Site Engine Profile for Policy and Location-Based Services
 
 - Deploying an ExtremeGuest Captive Portal
 - Deploying Client Bridge
 - Deploying an Availability Pair
 - Deploying Universal APs
 - Extreme Campus Controller Pair with ExtremeLocation and AirDefense
 - ECP Local Authentication
 - PHP External Captive Portal, Controller’s Firewall Friendly API
 - Index
 
Deploying Centralized Web
Authentication
Deployment Strategy on page 120
CWA with ISE Deployment on page 121
CWA with ExtremeControl Deployment on page 136
Deployment Strategy
Centralized Web Authentication (CWA) provides the URL for the captive portal dynamically through
RADIUS attributes, following the successful authentication over 802.1x. CWA can integrate with both an
ExtremeControl captive portal server and a Cisco® ISE captive portal server.
The configuration required on Extreme Campus Controller is the same regardless of the captive portal
server used:
On Extreme Campus Controller:
1. Configure a AAA Policy, defining the RADIUS server, then reference that AAA Policy on the CWA
captive portal network configuration.
The RADIUS server in the AAA Policy is the authentication server that sends the redirection attribute
back to Extreme Campus Controller. You only need the role name on Extreme Campus Controller to
match the Filter-ID sent in the RADIUS-Accept.
2. Configure a CWA captive portal network.
3. Configure a Redirect Policy Role that includes at least one redirect rule.
When integrating with an ExtremeControl server, we use the ExtremeControl rules engine. The rule
engine assigns the policy Unregistered to the redirection and assigns the policy Enterprise User when
authenticated by the captive portal:
1. Map the redirection policy that you created on Extreme Campus Controller to ExtremeControl.
2. Create an allow policy on Extreme Campus Controller and map it to ExtremeControl.
When integrating with a Cisco® ISE captive portal server:
1. Configure an Authorization Profile that references the policy role configured on Extreme Campus
Controller.
2. Configure an Authorization Policy that references the Authorization Profile.
120
Extreme Campus Controller Deployment Guide for version 5.46.03










