Configuration Guide
Table Of Contents
- ExtremeControl Guest and IoT Manager Configuration
- Extreme Networks® Software License Agreement
- Table of Contents
- About this Document
- New in this Document
- Guest and IoT Manager Overview
- Installing Guest and IoT Manager
- Administering Guest and IoT Manager
- Configuring Onboarding Template
- Creating an Onboarding Template
- Configuring the Common Details
- Configuring the Guest User Account Details
- Configuring Sponsor Approval
- Configuring the Device Record Details
- Configuring Device Type Groups
- Configuring the Account Notification Templates
- Configuring Advanced Details
- Configuring Guest User Provisioning Using Outlook Add-in
- Configuring Guest User Provisioning Using Vouchers
- Configuring Guest User and Device Provisioning Using CSV
- Configuring Device Record Details
- Configuring Zero Touch Guest User Provisioning
- Managing Onboarding Templates
- Configuring Custom Attributes
- Configuring Access Groups
- Creating an Onboarding Template
- Configuring Provisioners
- Configuring Self-Services
- Managing Guest Users
- Managing Devices
- Configuring Guest and Devices
- Using Self-Provisioning Services
- Guest and IoT Manager Add-In for Outlook
- Automated Login of the Guest User using the Login URL
- Troubleshooting and FAQs
- Testing RADIUS Connection Settings
- Restarting Guest and IoT Manager
- Problem: Virtual Appliance Troubleshooting
- Problem: Saving Access Control Engine Settings
- Problem: User Groups / End System Group Not Visible in Guest and IoT Manager
- Problem: Provisioner Cannot Login
- Problem: Guest and IoT Manager Email / SMS Notification Failed
- Problem: Unable to Access Guest and IoT Manager Application URL
- Problem: User and Device Troubleshooting
- Problem: Sponsor List is Not Available
- Problem: Modification in Network Interface settings does not reflect post dep...
- Problem: Outlook Add-in Issues
- Problem: Service Unavailable in Browser
- Problem: Time Zone Issues for Schedule Tasks
- Problem: Users/Devices are not getting cleaned up for Housekeeping Tasks
- Problem: Unable to Access GIM UI
- Problem: LDAP Provisioner login fails
- Problem: LDAP Sponsors are not populating in the Self-Service Page
- Problem: Server Error during bulk creation
- Problem: Unable to Renew Password
- Problem: Guest User account is not created post sending SMS
- Problem: Login URL redirects to Captive Portal
- Problem: “Server Error. Please contact Administrator Error message on clickin...
- Problem: FQDN not being used in URLs
- Problem: Unable to Customize Provisioner Login page
- Problem: Login failed. Invalid credentials/Account Expired” message on clicki...
- Problem: Outlook Add-in throws Security Exception post enabling FQDN
- Command Line Interface
Guest and IoT Manager Application Framework
28 of 291
Once the Provisioner logs in, then the Provisioner has access to the Onboarding
Templates that the Administrator has provided and is able to provision Guest
User and / or Devices.
The Guest and IoT Manager Overview chapter provides information on the
following:
l Guest and IoT Manager Application Framework
l User Roles and Access Controls
l Launching Guest and IoT Manager
l Using the Online Help System
Guest and IoT Manager Application Framework
The Extreme Management Center portfolio system for provisioning and
managing guest network access consists of the following components:
l Guest and IoT Manager Administrator Application for managing
provisioners and for performing bulk updates of Guests and Devices.
l Guest and IoT Manager Provisioner Application for managing Guests and
Devices.
l Access Control Engine that authenticates and authorizes users who desire
to connect to your network.
l Extreme Management Center Application to create the authorization
policies that determine which users can connect to specific parts of your
network.
l (Optionally) Extreme Management Center Captive Portal : The web-based
authentication helps users connect their “Bring Your Own Device” (BYOD)
devices to enterprise network even though if it is not equipped with 802.1X
authentication software.
User Roles and Access Controls
Roles are an important concept in the Guest and IoT Manager application. Roles
determine what users can view or perform, including what they can monitor and