Deployment Guide

Table Of Contents
3. To edit the RADIUS Attribute settings:
Select Add and provide the Attribute Group name.
In the Attribute field, enter the following:
Filter-Id=%FILTER_NAME%
Filter-Id=Enterasys:version=1:%MANAGEMENT%policy=%POLICY_NAME%
Login-LAT-Port=%LOGIN_LAT_PORT%
Service-Type=%MGMT_SERV_TYPE%
Note
The Attribute Group is configured to ensure that ExtremeWireless APs function with
the appliance.
4. Save the Attribute Group, then select this group as the option in the RADIUS Attributes to Send
field.
5. Press OK.
NAC Manager
6. Go to Tools > Management
7. Select Configuration > Advanced NAC Configurations > AAA Configurations > Local Password
Repository > Default.
8. Add a new user.
Select Add and configure the following parameters:
Display Name
Username
Password
9. Select Save.
10. In the Advanced Configuration window, navigate to NAC Configurations > Rule Components >
End-System Group.
11. Add a new End-System Group.
Add a new MAC entry for each MAC address of each client that should be successfully
authenticated.
12. Select Save.
13. In the Advanced Configuration window, navigate to NAC Configurations > Default.
14. Add a new rule.
From the End-System Group drop-down list, select the End-System Group that you previously
created.
15. In the Profile drop-down list, select Default NAC Profile.
Note
Assuming no prior configuration changes have been made to the Default NAC Profile, it
will send an Enterprise User Filter-ID.
16. Save the rule and move it up the list, just after the Assessment Warning rule.
17. Close the Advanced Configuration window and Enforce the NAC engine.
18. Once the Enforce is successful, close the window.
Configuring
an External NAC Server for MBA and AAA
Authentication Configuring the External NAC Server
Extreme Campus Controller Deployment Guide for version 5.46.03 79