Deployment Guide
Table Of Contents
- Table of Contents
 - Preface
 - About Extreme Campus Controller Deployment
 - Configuring DHCP, NPS, and DNS Services
 - Centralized Site with a Captive Portal
 - Centralized Site with AAA Network
 - Deploying a Mesh Network
 - Configuring an External NAC Server for MBA and AAA Authentication
 - Manage RADIUS Servers for User Authentication
 - External Captive Portal on a Third-Party Server
 - Access Control Rule Admin Portal Access
 - Deploying Centralized Web Authentication
 - Deploying ExtremeCloud IQ - SE as an External Captive Portal
- Deployment Strategy
 - Configuring an External Captive Portal Network
 - Editing the Configuration Profile for Network and Roles
 - Extreme Campus Controller Default Pass-Through Rule
 - Adding Extreme Campus Controller as a Switch to ExtremeCloud IQ - Site Engine
 - Editing the Unregistered Policy on ExtremeCloud IQ - Site Engine
 - Editing the ExtremeCloud IQ - Site Engine Profile for Policy and Location-Based Services
 
 - Deploying an ExtremeGuest Captive Portal
 - Deploying Client Bridge
 - Deploying an Availability Pair
 - Deploying Universal APs
 - Extreme Campus Controller Pair with ExtremeLocation and AirDefense
 - ECP Local Authentication
 - PHP External Captive Portal, Controller’s Firewall Friendly API
 - Index
 
Deploying ExtremeCloud IQ - SE as an
External Captive Portal
Deployment Strategy on page 150
Configuring an External Captive Portal Network on page 151
Editing the Configuration Profile for Network and Roles on page 155
Extreme Campus Controller Default Pass-Through Rule on page 155
Adding Extreme Campus Controller as a Switch to ExtremeCloud IQ - Site
Engine on page 157
Editing the Unregistered Policy on ExtremeCloud IQ - Site Engine on page 162
Editing the ExtremeCloud IQ - Site Engine Profile for Policy and Location-Based
Services on page 164
Deployment Strategy
The following strategy outlines how to configure Extreme Campus Controller to integrate with Extreme
Management Center or ExtremeCloud IQ - Site Engine (XMC), which houses the external captive portal,
handling client authentication. The portal resides on the ExtremeControl engine and Extreme Campus
Controller handles the client network connections. Trac connecting to the Guest network will send and
receive all RADIUS requests from the externally defined RADIUS server, not from the Extreme Campus
Controller that processes the request. The ExtremeControl engine provides RADIUS authentication and
authorization and policies that are defined in Extreme Management Center or ExtremeCloud IQ - Site
Engine.
The following outlines how to integrate Extreme Campus Controller with ExtremeCloud IQ - Site Engine,
configuring an External Captive Portal on the ExtremeControl engine.
1. If you are authentication with Local Onboarding, create a RADIUS pass-through rule on Extreme
Campus Controller.
Note
It is possible to authenticate directly to the AAA RADIUS server. Refer to the Extreme
Campus Controller User Guide for information about AAA RADIUS Authentication.
2. Add Extreme Campus Controller to ExtremeCloud IQ - Site Engine as a switch.
3. On ExtremeControl, create an Unregistered Policy for the Extreme Campus Controller Pass-Through
Network.
4. Edit the ExtremeControl configuration profile, associating network policy and Location-Based
Services.
150
Extreme Campus Controller Deployment Guide for version 5.46.03










