Deployment Guide

Table Of Contents
Editing Device Group Profile for Network and Role.................................................................................59
Creating Adoption Rules........................................................................................................................................62
Centralized Site with AAA Network................................................................................65
Deployment Strategy...............................................................................................................................................65
Configuring a AAA Network................................................................................................................................ 65
Creating an Engine Rule.........................................................................................................................................67
Creating a Policy Role............................................................................................................................................. 67
Applying a AAA Network and Role to the Device Group..................................................................... 68
Deploying a Mesh Network..............................................................................................70
Deployment Strategy.............................................................................................................................................. 70
Mesh Point Network Settings................................................................................................................................71
Configure Device Groups for Mesh Point........................................................................................................71
Advanced Configuration Profile and Mesh Device Settings................................................................. 73
Profile Advanced Settings............................................................................................................................ 73
Edit Mesh Device Settings............................................................................................................................74
Configuring an External NAC Server for MBA and AAA Authentication ..................77
Deployment Strategy...............................................................................................................................................77
Configuring the External NAC Server..............................................................................................................78
Network with Default Auth Role........................................................................................................................80
Configuring an MBA Network.................................................................................................................... 80
Configuring a AAA Network.........................................................................................................................81
Network with Pass-Through External RADIUS........................................................................................... 83
Configuring an MBA Network.....................................................................................................................83
Configuring a AAA Network....................................................................................................................... 84
Manage RADIUS Servers for User Authentication........................................................ 87
RADIUS Settings........................................................................................................................................................ 88
Advanced RADIUS Settings................................................................................................................................. 88
Configure a Pass Through Rule..........................................................................................................................90
External Captive Portal on a Third-Party Server........................................................... 91
Firewall Friendly External Captive Portal Flow of Events......................................................................92
FF-ECP on Extreme Campus Controller................................................................................................92
Configure the Firewall............................................................................................................................................. 94
Configure an External Captive Portal.............................................................................................................. 94
Understand Processing Performed by the ECP......................................................................................... 94
The Redirection URL Sent from Extreme Campus Controller.................................................... 95
Compose the Login or Splash Screen Page.......................................................................................105
Approve the Client.................................................................................................................................................. 105
Compose the Redirection Response Sending the Browser back to the Appliance............... 106
Signing the Redirection to Extreme Campus Controller............................................................. 106
Case 1: When a RADIUS Server Authenticates the Client........................................................... 107
Case 2: When the ECP is the Final Authority....................................................................................108
Access Control Rule Admin Portal Access.................................................................... 112
Deployment Strategy.............................................................................................................................................. 112
Configure Access Control Group.......................................................................................................................113
Default Access Control Groups..................................................................................................................114
Configure Admin Access Policy Role.............................................................................................................. 114
Configure Access Control Rule...........................................................................................................................116
Table of Contents
iv Extreme Campus Controller Deployment Guide for version 5.46.03