Deployment Guide
Table Of Contents
- Table of Contents
 - Preface
 - About Extreme Campus Controller Deployment
 - Configuring DHCP, NPS, and DNS Services
 - Centralized Site with a Captive Portal
 - Centralized Site with AAA Network
 - Deploying a Mesh Network
 - Configuring an External NAC Server for MBA and AAA Authentication
 - Manage RADIUS Servers for User Authentication
 - External Captive Portal on a Third-Party Server
 - Access Control Rule Admin Portal Access
 - Deploying Centralized Web Authentication
 - Deploying ExtremeCloud IQ - SE as an External Captive Portal
- Deployment Strategy
 - Configuring an External Captive Portal Network
 - Editing the Configuration Profile for Network and Roles
 - Extreme Campus Controller Default Pass-Through Rule
 - Adding Extreme Campus Controller as a Switch to ExtremeCloud IQ - Site Engine
 - Editing the Unregistered Policy on ExtremeCloud IQ - Site Engine
 - Editing the ExtremeCloud IQ - Site Engine Profile for Policy and Location-Based Services
 
 - Deploying an ExtremeGuest Captive Portal
 - Deploying Client Bridge
 - Deploying an Availability Pair
 - Deploying Universal APs
 - Extreme Campus Controller Pair with ExtremeLocation and AirDefense
 - ECP Local Authentication
 - PHP External Captive Portal, Controller’s Firewall Friendly API
 - Index
 
Table 10: RADIUS Server Advanced Settings
Field Description
Username Format Determines if the domain name will be included in the
username when proxying a request to the backend RADIUS
server. Valid values are:
• Strip Domain Name (default) - Select this option unless the
backend RADIUS server requires the domain name to be
included.
• Keep Domain Name - Using this option with a Microsoft IAS
or NPS server, may cause the server to timeout. Therefore,
use an advanced AAA configuration. With a AAA
configuration, only requests for known domains are sent to
the backend RADIUS server. Unknown domains are
processed locally and rejected.
Require Message-Authenticator Protect against spoofed Access-Request messages and
RADIUS message tampering with this attribute. The Require
Message-Authenticator provides additional security when
using PAP and CHAP security protocols for authentication. EAP
uses the Message Authenticator attribute by default.
Health - Use Server Status Request Use Server-Status RADIUS packets, as defined by RFC 5997, to
determine if the backend RADIUS server is running.
Health - Use Access Request Use an access request message to determine if the RADIUS
server is running. The request uses a username and password.
This method looks for any response from the server. The
username and password do not need to be valid. A negative
response will work. However, the username/password fields are
provided to prevent rejects from being logged in the backend
RADIUS server.
Check Interval Determines the wait time between checks to see if the RADIUS
server is running.
Note: This is only applicable if the Server-Status request or
Access request methods are used.
Number of Answers to Alive Determines the number of times the RADIUS server must
respond before it is marked as alive.
Note: This is only applicable if the Server-Status request or
Access request methods are used.
Revive Interval Determines the wait time before allowing requests to go to a
backend RADIUS server, after it stops responding.
Note: Use this option only when there is no other way to detect
the health of the backend RADIUS server.
If Server-Status requests option and Access request option are
not supported by the RADIUS server, then use this option.
Related Topics
RADIUS Settings on page 88
Manage RADIUS Servers for User Authentication on page 87
Manage RADIUS Servers for User Authentication
Advanced RADIUS Settings
Extreme Campus Controller Deployment Guide for version 5.46.03 89










