Deployment Guide
Table Of Contents
- Table of Contents
 - Preface
 - About Extreme Campus Controller Deployment
 - Configuring DHCP, NPS, and DNS Services
 - Centralized Site with a Captive Portal
 - Centralized Site with AAA Network
 - Deploying a Mesh Network
 - Configuring an External NAC Server for MBA and AAA Authentication
 - Manage RADIUS Servers for User Authentication
 - External Captive Portal on a Third-Party Server
 - Access Control Rule Admin Portal Access
 - Deploying Centralized Web Authentication
 - Deploying ExtremeCloud IQ - SE as an External Captive Portal
- Deployment Strategy
 - Configuring an External Captive Portal Network
 - Editing the Configuration Profile for Network and Roles
 - Extreme Campus Controller Default Pass-Through Rule
 - Adding Extreme Campus Controller as a Switch to ExtremeCloud IQ - Site Engine
 - Editing the Unregistered Policy on ExtremeCloud IQ - Site Engine
 - Editing the ExtremeCloud IQ - Site Engine Profile for Policy and Location-Based Services
 
 - Deploying an ExtremeGuest Captive Portal
 - Deploying Client Bridge
 - Deploying an Availability Pair
 - Deploying Universal APs
 - Extreme Campus Controller Pair with ExtremeLocation and AirDefense
 - ECP Local Authentication
 - PHP External Captive Portal, Controller’s Firewall Friendly API
 - Index
 
PHP External Captive Portal, Controller’s
Firewall Friendly API
net-auth.php on page 197
login.php on page 201
common_utilities.php on page 203
crypt_aws_s4.php on page 207
ecp-config.php on page 212
This section contains five files that serve as an example of how to build an External Captive Portal that
makes use of the controller’s Firewall-Friendly External Captive Portal Interface. The files presented are:
• net-auth.php
Receives redirected requests from browsers trying to access web sites, verifies that the redirect was
sent from the controller and if so, displays a suitable login page.
• login.php
This script gets invoked as a consequence of a browser submitting the login form created by net-
auth.php. The script authenticates the station in whatever way it likes. If the station is authorized, the
script selects a maximum session duration and an access control role for the station. It then redirects
the station’s browser back to a web server on the controller, using a URI that contains the access
control role, the maximum session duration, other data required by the controller, and a signature.
• crypt_aws_s4.php
This file contains the code that verifies the signatures on received URLs and that signs the URLs that
redirect the station back to the controller.
• common_utilities.php
Utilities used by various ECP scripts.
• ecp-config.php
Contains the main statically configured parameters that the application uses to verify signed URLs
and to create signed URLs.
net-auth.php
<?php
 // net-auth.php 
 // This is a simple implementation of a script that 
 // receives HTTP requests that have been redirected 
 // by a controller configured with "Firewall-Friendly
Extreme Campus Controller Deployment Guide for version 5.46.03
197










