Deployment Guide
Table Of Contents
- Table of Contents
- Preface
- About Extreme Campus Controller Deployment
- Configuring DHCP, NPS, and DNS Services
- Centralized Site with a Captive Portal
- Centralized Site with AAA Network
- Deploying a Mesh Network
- Configuring an External NAC Server for MBA and AAA Authentication
- Manage RADIUS Servers for User Authentication
- External Captive Portal on a Third-Party Server
- Access Control Rule Admin Portal Access
- Deploying Centralized Web Authentication
- Deploying ExtremeCloud IQ - SE as an External Captive Portal
- Deployment Strategy
- Configuring an External Captive Portal Network
- Editing the Configuration Profile for Network and Roles
- Extreme Campus Controller Default Pass-Through Rule
- Adding Extreme Campus Controller as a Switch to ExtremeCloud IQ - Site Engine
- Editing the Unregistered Policy on ExtremeCloud IQ - Site Engine
- Editing the ExtremeCloud IQ - Site Engine Profile for Policy and Location-Based Services
- Deploying an ExtremeGuest Captive Portal
- Deploying Client Bridge
- Deploying an Availability Pair
- Deploying Universal APs
- Extreme Campus Controller Pair with ExtremeLocation and AirDefense
- ECP Local Authentication
- PHP External Captive Portal, Controller’s Firewall Friendly API
- Index
Configuring a Captive Portal Network
Configuring an Internal Captive Portal network with WPAv2 PSK privacy.
Note
Centralized sites support B@AC and B@AP VLAN topology.
1. Go to Configure > Networks > WLANs > Add and configure the following parameters:
Network Name
test1-ICP
SSID
test1-ICP
Status
Enable or disable the network service. Disabling the network service shuts o the service but
does not delete it.
Auth Type
Select WPAv2 - Personal (PSK) then select Edit Privacy and enter a password key.
Enable Captive Portal
Check this option and specify the following parameters:
• Captive Portal Type = Internal
• Default captive portal is specified. This is the captive portal we configured.
• Authentication Method. Select Proxy RADIUS (Failover).
Note
Policy assignment through Filter ID is not supported.
• Primary RADIUS. This is the RADIUS server we configured. Enter the IP address. You have the
option to add 1-3 failover RADIUS servers.
• Default VLAN = test1. This is the B@AC VLAN we created.
Default Auth Role
The default network policy roles for an authenticated client. Select the plus sign to create a new
role.
Select the policy role as the default authentication policy role. Typically, Enterprise User is the
Default Auth Role. You can select any of the configured roles.
To configure a new role:
a. Go to Configure > Policy > Roles.
b. Go to Onboard > Rules and edit a policy rule, specifying Default Auth Role in the Accept
Policy field.
Default VLAN
The default network topology. A topology can be thought of as a VLAN (Virtual LAN) with at
least one egress port, and optionally include: sets of services, exception filters, and multicast
Configuring
a Captive Portal Network Centralized Site with a Captive Portal
58 Extreme Campus Controller Deployment Guide for version 5.46.03










