ExtremeControl 8.5 ExtremeControl User Guide
ExtremeControl 8.5 ExtremeControl User Guide
ExtremeControl 8.5 ExtremeControl User Guide
Version 8.5
7/2020
9036792-00
Subject to Change Without Notice
Copyright © 2020 Extreme Networks, Inc. All Rights Reserved.
Legal Notices
Extreme Networks, Inc., on behalf of or through its wholly-owned subsidiary, Enterasys
Networks, Inc., reserves the right to make changes in specifications and other
information contained in this document and its website without prior notice. The reader
should in all cases consult representatives of Extreme Networks to determine whether
any such changes have been made.
The hardware, firmware, software or any specifications described or referred to in this
document are subject to change without notice.
Trademarks
Extreme Networks and the Extreme Networks logo are trademarks or registered
trademarks of Extreme Networks, Inc. in the United States and/or other countries.
All other names (including any product names) mentioned in this document are the
property of their respective owners and may be trademarks or registered trademarks of
their respective companies/owners.
For additional information on Extreme Networks trademarks, please see:
www.extremenetworks.com/company/legal/trademarks/
Contact
If you require assistance, contact Extreme Networks using one of the following methods.
2 of 805
community is monitored by Extreme Networks employees, but is not intended to
replace specific guidance from GTAC.
l Support Portal — Manage cases, downloads, service contracts, product licensing,
and training and certifications.
3 of 805
Extreme Networks® Software License Agreement
4 of 805
Licensed Materials, together with all copies, modifications and merged portions in
any form. The Agreement and Your license to use the Licensed Materials will also
terminate if You fail to comply with any term of condition herein.
3. GRANT OF SOFTWARE LICENSE. Extreme will grant You a non-transferable,
non-exclusive license to use the machine-readable form of the Licensed Software
and the accompanying documentation if You agree to the terms and conditions of
this Agreement. You may install and use the Licensed Software as permitted by the
license type purchased as described below in License Types. The license type
purchased is specified on the invoice issued to You by Extreme or Your dealer, if
any. YOU MAY NOT USE, COPY, OR MODIFY THE LICENSED MATERIALS, IN
WHOLE OR IN PART, EXCEPT AS EXPRESSLY PROVIDED IN THIS
AGREEMENT.
4. LICENSE TYPES.
l Single User, Single Computer. Under the terms of the Single User, Single
Computer license, the license granted to You by Extreme when You install the
License Key authorizes You to use the Licensed Software on any one, single
computer only, or any replacement for that computer, for internal use only. A
separate license, under a separate Software License Agreement, is required for
any other computer on which You or another individual or employee intend to
use the Licensed Software. A separate license under a separate Software
License Agreement is also required if You wish to use a Client license (as
described below).
l Client. Under the terms of the Client license, the license granted to You by
Extreme will authorize You to install the License Key for the Licensed Software
on your server and allow the specific number of Concurrent Users shown on the
relevant invoice issued to You for each Concurrent User that You order from
Extreme or Your dealer, if any, to access the Server Application. A separate
license is required for each additional Concurrent User.
5. AUDIT RIGHTS. You agree that Extreme may audit Your use of the Licensed
Materials for compliance with these terms and Your License Type at any time, upon
reasonable notice. In the event that such audit reveals any use of the Licensed
Materials by You other than in full compliance with the license granted and the terms
of this Agreement, You shall reimburse Extreme for all reasonable expenses related
to such audit in addition to any other liabilities You may incur as a result of such
non-compliance, including but not limited to additional fees for Concurrent Users
over and above those specifically granted to You. From time to time, the Licensed
Software will upload information about the Licensed Software and the associated
devices to Extreme. This is to verify the Licensed Software is being used with a valid
license. By using the Licensed Software, you consent to the transmission of this
5 of 805
information. Under no circumstances, however, would Extreme employ any such
measure to interfere with your normal and permitted operation of the Products, even
in the event of a contractual dispute.
6. RESTRICTION AGAINST COPYING OR MODIFYING LICENSED MATERIALS.
Except as expressly permitted in this Agreement, You may not copy or otherwise
reproduce the Licensed Materials. In no event does the limited copying or
reproduction permitted under this Agreement include the right to decompile,
disassemble, electronically transfer, or reverse engineer the Licensed Software, or
to translate the Licensed Software into another computer language.
The media embodying the Licensed Software may be copied by You, in whole or
in part, into printed or machine readable form, in sufficient numbers only for backup
or archival purposes, or to replace a worn or defective copy. However, You agree
not to have more than two (2) copies of the Licensed Software in whole or in part,
including the original media, in your possession for said purposes without Extreme’s
prior written consent, and in no event shall You operate more copies of the Licensed
Software than the specific licenses granted to You. You may not copy or reproduce
the documentation. You agree to maintain appropriate records of the location of the
original media and all copies of the Licensed Software, in whole or in part, made by
You. You may modify the machine-readable form of the Licensed Software for (1)
your own internal use or (2) to merge the Licensed Software into other program
material to form a modular work for your own use, provided that such work remains
modular, but on termination of this Agreement, You are required to completely
remove the Licensed Software from any such modular work. Any portion of the
Licensed Software included in any such modular work shall be used only on a
single computer for internal purposes and shall remain subject to all the terms and
conditions of this Agreement. You agree to include any copyright or other
proprietary notice set forth on the label of the media embodying the Licensed
Software on any copy of the Licensed Software in any form, in whole or in part, or on
any modification of the Licensed Software or any such modular work containing the
Licensed Software or any part thereof.
7. TITLE AND PROPRIETARY RIGHTS
a. The Licensed Materials are copyrighted works and are the sole and exclusive
property of Extreme, any company or a division thereof which Extreme controls
or is controlled by, or which may result from the merger or consolidation with
Extreme (its "Affiliates"), and/or their suppliers. This Agreement conveys a
limited right to operate the Licensed Materials and shall not be construed to
convey title to the Licensed Materials to You. There are no implied rights. You
shall not sell, lease, transfer, sublicense, dispose of, or otherwise make
available the Licensed Materials or any portion thereof, to any other party.
6 of 805
b. You further acknowledge that in the event of a breach of this Agreement,
Extreme shall suffer severe and irreparable damages for which monetary
compensation alone will be inadequate. You therefore agree that in the event of
a breach of this Agreement, Extreme shall be entitled to monetary damages and
its reasonable attorney’s fees and costs in enforcing this Agreement, as well as
injunctive relief to restrain such breach, in addition to any other remedies
available to Extreme.
8. PROTECTION AND SECURITY. In the performance of this Agreement or in
contemplation thereof, You and your employees and agents may have access to
private or confidential information owned or controlled by Extreme relating to the
Licensed Materials supplied hereunder including, but not limited to, product
specifications and schematics, and such information may contain proprietary details
and disclosures. All information and data so acquired by You or your employees or
agents under this Agreement or in contemplation hereof shall be and shall remain
Extreme’s exclusive property, and You shall use your best efforts (which in any
event shall not be less than the efforts You take to ensure the confidentiality of your
own proprietary and other confidential information) to keep, and have your
employees and agents keep, any and all such information and data confidential, and
shall not copy, publish, or disclose it to others, without Extreme’s prior written
approval, and shall return such information and data to Extreme at its request.
Nothing herein shall limit your use or dissemination of information not actually
derived from Extreme or of information which has been or subsequently is made
public by Extreme, or a third party having authority to do so.
You agree not to deliver or otherwise make available the Licensed Materials or
any part thereof, including without limitation the object or source code (if provided) of
the Licensed Software, to any party other than Extreme or its employees, except for
purposes specifically related to your use of the Licensed Software on a single
computer as expressly provided in this Agreement, without the prior written consent
of Extreme. You agree to use your best efforts and take all reasonable steps to
safeguard the Licensed Materials to ensure that no unauthorized personnel shall
have access thereto and that no unauthorized copy, publication, disclosure, or
distribution, in whole or in part, in any form shall be made, and You agree to notify
Extreme of any unauthorized use thereof. You acknowledge that the Licensed
Materials contain valuable confidential information and trade secrets, and that
unauthorized use, copying and/or disclosure thereof are harmful to Extreme or its
Affiliates and/or its/their software suppliers.
9. MAINTENANCE AND UPDATES. Updates and certain maintenance and support
services, if any, shall be provided to You pursuant to the terms of an Extreme
Service and Maintenance Agreement, if Extreme and You enter into such an
agreement. Except as specifically set forth in such agreement, Extreme shall not be
7 of 805
under any obligation to provide Software Updates, modifications, or enhancements,
or Software maintenance and support services to You.
10. DEFAULT AND TERMINATION. In the event that You shall fail to keep, observe, or
perform any obligation under this Agreement, including a failure to pay any sums
due to Extreme, or in the event that you become insolvent or seek protection,
voluntarily or involuntarily, under any bankruptcy law, Extreme may, in addition to
any other remedies it may have under law, terminate the License and any other
agreements between Extreme and You.
a. Immediately after any termination of the Agreement or if You have for any
reason discontinued use of Software, You shall return to Extreme the original
and any copies of the Licensed Materials and remove the Licensed Software
from any modular works made pursuant to Section 3, and certify in writing that
through your best efforts and to the best of your knowledge the original and all
copies of the terminated or discontinued Licensed Materials have been returned
to Extreme.
b. Sections 1, 7, 8, 10, 11, 12, 13, 14 and 15 shall survive termination of this
Agreement for any reason.
11. EXPORT REQUIREMENTS. You are advised that the Software is of United States
origin and subject to United States Export Administration Regulations; diversion
contrary to United States law and regulation is prohibited. You agree not to directly
or indirectly export, import or transmit the Software to any country, end user or for
any Use that is prohibited by applicable United States regulation or statute
(including but not limited to those countries embargoed from time to time by the
United States government); or contrary to the laws or regulations of any other
governmental entity that has jurisdiction over such export, import, transmission or
Use.
12. UNITED STATES GOVERNMENT RESTRICTED RIGHTS. The Licensed
Materials (i) were developed solely at private expense; (ii) contain "restricted
computer software" submitted with restricted rights in accordance with section
52.227-19 (a) through (d) of the Commercial Computer Software-Restricted Rights
Clause and its successors, and (iii) in all respects is proprietary data belonging to
Extreme and/or its suppliers. For Department of Defense units, the Licensed
Materials are considered commercial computer software in accordance with DFARS
section 227.7202-3 and its successors, and use, duplication, or disclosure by the
U.S. Government is subject to restrictions set forth herein.
13. LIMITED WARRANTY AND LIMITATION OF LIABILITY. The only warranty that
Extreme makes to You in connection with this license of the Licensed Materials is
that if the media on which the Licensed Software is recorded is defective, it will be
replaced without charge, if Extreme in good faith determines that the media and
8 of 805
proof of payment of the license fee are returned to Extreme or the dealer from whom
it was obtained within ninety (90) days of the date of payment of the license fee.
NEITHER EXTREME NOR ITS AFFILIATES MAKE ANY OTHER WARRANTY OR
REPRESENTATION, EXPRESS OR IMPLIED, WITH RESPECT TO THE
LICENSED MATERIALS, WHICH ARE LICENSED "AS IS". THE LIMITED
WARRANTY AND REMEDY PROVIDED ABOVE ARE EXCLUSIVE AND IN LIEU
OF ALL OTHER WARRANTIES, INCLUDING IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, WHICH
ARE EXPRESSLY DISCLAIMED, AND STATEMENTS OR REPRESENTATIONS
MADE BY ANY OTHER PERSON OR FIRM ARE VOID. ONLY TO THE EXTENT
SUCH EXCLUSION OF ANY IMPLIED WARRANTY IS NOT PERMITTED BY
LAW, THE DURATION OF SUCH IMPLIED WARRANTY IS LIMITED TO THE
DURATION OF THE LIMITED WARRANTY SET FORTH ABOVE. YOU ASSUME
ALL RISK AS TO THE QUALITY, FUNCTION AND PERFORMANCE OF THE
LICENSED MATERIALS. IN NO EVENT WILL EXTREME OR ANY OTHER
PARTY WHO HAS BEEN INVOLVED IN THE CREATION, PRODUCTION OR
DELIVERY OF THE LICENSED MATERIALS BE LIABLE FOR SPECIAL,
DIRECT, INDIRECT, RELIANCE, INCIDENTAL OR CONSEQUENTIAL
DAMAGES, INCLUDING LOSS OF DATA OR PROFITS OR FOR INABILITY TO
USE THE LICENSED MATERIALS, TO ANY PARTY EVEN IF EXTREME OR
SUCH OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
DAMAGES. IN NO EVENT SHALL EXTREME OR SUCH OTHER PARTY'S
LIABILITY FOR ANY DAMAGES OR LOSS TO YOU OR ANY OTHER PARTY
EXCEED THE LICENSE FEE YOU PAID FOR THE LICENSED MATERIALS.
Some states do not allow limitations on how long an implied warranty lasts and
some states do not allow the exclusion or limitation of incidental or consequential
damages, so the above limitation and exclusion may not apply to You. This limited
warranty gives You specific legal rights, and You may also have other rights which
vary from state to state.
14. JURISDICTION. The rights and obligations of the parties to this Agreement shall be
governed and construed in accordance with the laws and in the State and Federal
courts of the State of California, without regard to its rules with respect to choice of
law. You waive any objections to the personal jurisdiction and venue of such courts.
None of the 1980 United Nations Convention on the Limitation Period in the
International Sale of Goods, and the Uniform Computer Information Transactions Act
shall apply to this Agreement.
15. GENERAL.
a. This Agreement is the entire agreement between Extreme and You regarding
the Licensed Materials, and all prior agreements, representations, statements,
and undertakings, oral or written, are hereby expressly superseded and
9 of 805
canceled.
b. This Agreement may not be changed or amended except in writing signed by
both parties hereto.
c. You represent that You have full right and/or authorization to enter into this
Agreement.
d. This Agreement shall not be assignable by You without the express written
consent of Extreme. The rights of Extreme and Your obligations under this
Agreement shall inure to the benefit of Extreme’s assignees, licensors, and
licensees.
e. Section headings are for convenience only and shall not be considered in the
interpretation of this Agreement.
f. The provisions of the Agreement are severable and if any one or more of the
provisions hereof are judicially determined to be illegal or otherwise
unenforceable, in whole or in part, the remaining provisions of this Agreement
shall nevertheless be binding on and enforceable by and between the parties
hereto.
g. Extreme’s waiver of any right shall not constitute waiver of that right in future.
This Agreement constitutes the entire understanding between the parties with
respect to the subject matter hereof, and all prior agreements, representations,
statements and undertakings, oral or written, are hereby expressly superseded
and canceled. No purchase order shall supersede this Agreement.
h. Should You have any questions regarding this Agreement, You may contact
Extreme at the address set forth below. Any notice or other communication to
be sent to Extreme must be mailed by certified mail to the following address:
10 of 805
Table of Contents
ExtremeControl® User GuideVersion 8.5 1
Legal Notices 2
Trademarks 2
Contact 2
Extreme Networks® Software License Agreement 4
Table of Contents 11
Control 39
Access Requirements 39
Navigating the Control Tab 39
Dashboard 39
Policy 40
Access Control 40
End-Systems 40
Reports 41
Policy 41
Understanding Policy Domains 43
Understanding Roles 45
Role Summary Column 46
Understanding Services 47
Working with Service Groups 48
Understanding Traffic Classification Rules 49
Adding Devices 50
Viewing Port Configuration Information 50
Working with Port Groups 51
11 of 805
Working with VLANS 51
Viewing Classes of Service 52
Saving the Domain 53
Enforcing 53
Enforce Preview 53
Rule Counts Reported by Devices 54
Verifying 55
AP Aware 55
N-Series Considerations 59
Role Precedence for the N-Series Platinum 59
C2 and B2 Considerations 60
C3 and B3 Considerations 61
Mixed-Stack C2/C3 and B2/B3 Considerations 61
7100 Considerations 62
ExtremeControl Controller Configuration 63
ExtremeControl Controllers Require Separate Domains 63
12 of 805
Modifying ExtremeControl Controllers Preconfigured Policy 63
Modifying the Downstream Default Policy 63
Configuring LAG on ExtremeControl Controllers 63
Configuring LAG on Layer 3 ExtremeControl Controllers - Upstream Ports 64
Configuring LAG on Layer 3 ExtremeControl Controllers - Downstream
Ports 64
Configuring LAG on Layer 2 ExtremeControl Controllers - Upstream Ports 64
Configuring LAG on Layer 2 ExtremeControl Controllers - Downstream
Ports 64
Class of Service 67
Rate Limits 67
Internal VLAN 68
Policy Inheritance 68
Configuring RADIUS Servers 69
Other Considerations 69
Policy Help 70
Policy Tab Overview 70
Details View 70
13 of 805
General 71
Policy Menus 71
Open/Manage Domains Menu 71
Global Domain Settings Menu 73
Tools Menu 74
Enforce Preview Window 75
Left Panel 76
Right Panel 76
Port Selection 93
Device Configuration 94
Authentication Status 94
Global Authentication Settings 96
MAC Authentication Settings 96
Web Authentication Settings 97
General 97
Guest Networking 99
14 of 805
Web Page Banner 100
Convergence End-Point Settings 101
CEP Role Mappings 102
CEP Detection Tab 102
Port Configuration 104
Authentication Mode 105
Port Mode 105
RFC3580 VLAN Authorization Tab 107
Policy 116
Role 116
What is a Role 116
Default Role 116
Policy Domains 117
Service 118
Rule 118
What is a Rule 118
15 of 805
Disabling Rules 119
Conflict Checking 119
Packet Tagging 120
VLAN to Role Mapping 120
Dynamic Egress 121
Setting Domain GVRP Status 124
Policy VLAN Islands 125
Traffic Mirroring 126
16 of 805
General (Role) 141
Default Actions 142
Services 144
VLAN Egress (Role) 145
Add Egress VLAN Window 146
Mappings (Role) 147
MAC to Role Mapping 148
IP to Role Mapping 148
17 of 805
Getting Started with Class of Service 170
Class of Service Overview 171
Implementing CoS 172
Configuring CoS 172
Rate Limits 172
Transmit Queues 174
Flood Control 175
Class of Service 176
General 176
Rate Limiting/Rate Shaping 177
Index Numbers 178
General (CoS Components Folder) 180
General (Rate Limits) 181
Details View (Rate Limits Folder) 182
Priority-Based Rate Limits 184
Add/Edit CoS to Rate Limit Mapping 185
Advanced Rate Limiting by Port Type 186
Configuring Rate Limit Mappings 187
18 of 805
Traffic Descriptions 200
Actions 201
VLAN Membership (Access Control) 201
Priority (Class of Service) 201
Classification Types and their Parameters 202
Layer 2 -- Data Link Classification Types 202
Layer 3 -- Network Classification Types 203
Layer 4 -- Application Transport Classification Types 211
19 of 805
Create a VoIP Edge Service 233
Create a Rule 233
Creating the H.323 Call Setup Role 233
Create a H.323 Call Setup Service 233
Create a Rule 233
Apply the Roles to Network Devices 234
ToS/DSCP Value Definition Chart 234
Policy VLAN Tab Overview 235
General 236
Authentication-Based VLAN to Role Mapping 237
Tagged Packet VLAN to Role Mapping 237
Global VLANs 239
Create VLAN 240
Editing an existing VLAN/Class of Service 241
Selection View (Roles) 241
Policy VLAN Islands 242
(VLANs) - VIDs Tab 242
(VLANs) - Role Mappings Tab 243
General 244
Authentication-Based VLAN to Role Mapping 245
Tagged Packet VLAN to Role Mapping 245
Add Devices (VLAN Islands) 246
Island Topology (Policy VLAN Islands) 248
(Island) - VIDs Tab 248
(Island) - Devices Tab 249
Packet Flow Diagram 251
20 of 805
Network Resources Tab Overview 252
Network Resource Group General Tab 253
Network Resource Topology Tab 254
Network Resource Topology Island Domain Wide 255
Details View (Network Resource Topologies Folder) 257
Devices (Devices) 257
User Sessions (Devices) 258
User Sessions Tab 259
21 of 805
MAC 282
802.1X 282
Web Auth 283
Quarantine 283
Auto Tracking 283
Automatic Re-Authentication 284
Authenticated User Counts 285
Convergence End-Point Access 286
22 of 805
Ports (Port Group) 318
Details View (Port Groups) 319
Add/Remove Ports (User-Defined Port Groups) 320
Add/Remove Ports 321
Port Authentication Configuration 324
Authentication Mode 324
Port Mode 324
RFC3580 VLAN Authorization Tab 326
23 of 805
Renaming a Domain 338
Deleting a Domain 338
How to Create a Role 339
Using the Role Tabs 339
Modifying a Role 340
Adding Services to Roles 340
Removing Services from a Role 341
Modifying a Role's Default Class of Service 341
24 of 805
Modifying a Service 348
Modifying a Service Description 349
Modifying a Service Name 349
Modifying the Roles for a Service 349
Adding a Service to Roles 350
Modifying the Rules for a Manual Service 350
Modifying an Automated Service 350
Deleting a Service 350
25 of 805
How to Define Traffic Descriptions 363
How to Configure Flood Control 364
How to Create Global and Island VLANs 366
Creating a VLAN 366
Editing an Island VLAN ID 367
Deleting a VLAN 367
How to Create a Policy VLAN Island 368
Creating a VLAN Island 368
ExtremeControl 374
ExtremeControl Engine Groups 375
All ExtremeControl Engines 375
ExtremeControl Configurations 375
ExtremeControl Configuration Considerations 376
ExtremeControl Configuration Tables 377
General Considerations 382
Considerations When Implementing Policy Roles 386
26 of 805
ExtremeWireless Controller Configuration 387
DNS Proxy Functionality for Registration and Remediation 388
Basic Operation 388
Backup DNS Server 389
Troubleshooting 389
How to Update a License 391
Install the Assessment Agent Adapter on a Nessus Server 393
How to Configure Local RADIUS Termination at the ExtremeControl Engine 396
27 of 805
Rule Components 410
ExtremeControl Profiles 410
AAA Configurations 411
Portal Configurations 411
Access Policies 411
Registration 413
How Registration Works 415
Assessment 416
28 of 805
Add/Edit User to Authentication Mapping 439
AAA Configurations Panel 443
AAA Configurations 445
Accessing the AAA Configuration 445
Basic AAA Configuration 445
Advanced AAA Configuration 447
Manage LDAP Configurations 450
Add LDAP Configuration Window 452
29 of 805
Portal Configuration Overview 494
Accessing the Portal Configuration 494
Default Portal Configuration 494
Network Settings 494
Administration 494
Website Configuration 495
Look and Feel 495
Guest Access and Registration 495
30 of 805
Registration Settings 514
Portal Configuration Guest Access 516
Registration Settings 517
Secure Guest Access 519
Secure Access Settings 521
Sponsorship 523
Portal Configuration Assessment / Remediation 524
Web Page Settings 526
31 of 805
Keyword Definitions 545
Allowed Web Sites 555
Allowed URLs 555
Allowed Domains 556
Web Proxy Servers 558
Message Strings Editor 559
Manage Notifications 561
Add/Edit Notification 564
Conditions 566
Actions 567
Result 568
Add/Edit MAC Lock 570
MAC to IP Mappings 571
Extreme Management Center Engine Settings 572
Credentials 572
Switch Configuration 573
Admin Web Page Credentials 574
Admin Web Page Authentication 575
32 of 805
Hostname Resolution 587
Username Resolution 588
Reauthentication 589
Miscellaneous 592
Port Link Control 593
NetBIOS 594
Kerberos 594
Microsoft NAP 596
Auditing 596
ExtremeControl Engine Groups 598
ExtremeControl Access Control Group Editor 599
Add/Edit Device Type Group 602
Add/Edit End-System Group 605
End-System Details 608
Access Profile Tab 608
End-System Tab 610
End-System Events Tab 611
Health Results Tab 612
33 of 805
Edit Switches in ExtremeControl Engine Group 631
Add Switches to ExtremeControl Engine Group 635
Advanced Switch Settings 640
All Access Control Engines 642
Engine Settings Window 644
Credentials 644
Switch Configuration 645
Web Service Credentials 646
34 of 805
How To Use Access Control 664
How to Use Device Type Profiling 665
Device Profiling Use Case 665
How to Configure LDAP for End Users and Hosts via Active Directory 673
How to Change the Assessment Agent Adapter Password 683
How to Set ExtremeControl Options 685
Advanced Settings 685
Assessment Server 686
35 of 805
Pre-Registering Guest Users 709
Pre-Registering a Single User 710
Pre-Registering Multiple Users 711
How to Enable RADIUS Accounting 715
Considerations for Fixed Switching Devices 716
Considerations for ExtremeXOS Devices 717
Guest and IoT Manager Configuration in Extreme Management Center and
Access Control 719
36 of 805
How User Verification Works 750
Configure Sponsorship for Guest Registration 753
How to Implement Facebook Registration 756
Requirements 756
Creating a Facebook Application 757
Portal Configuration 763
How Facebook Registration Works 765
Special Deployment Considerations 765
Requirements 776
Creating a Microsoft Application 777
Portal Configuration 782
How Microsoft Registration Works 783
Special Deployment Considerations 783
Networks using DNS Proxy 784
How to Implement Yahoo Registration 785
Requirements 785
37 of 805
Creating a Yahoo Application 786
Portal Configuration 788
How Yahoo Registration Works 790
Special Deployment Considerations 790
Networks using DNS Proxy 790
How to Implement Salesforce Registration 792
Requirements 792
Creating a Salesforce Application 793
38 of 805
Access Requirements
Control
Extreme Management Center's Control tab provides end-system and user identity
reports and control capabilities, allowing better visibility and control for IT analysts,
troubleshooters, and the helpdesk.
Access Requirements
To view the reports in the Control tab, you must be a member of an authorization group
that has been assigned the appropriate capabilities:
l Extreme Management Center (NetSight) OneView > Access OneView
l Extreme Management Center (NetSight) OneView > ExtremeControl > Access
OneView Identity and Access Reports
l Extreme Management Center (NetSight) OneView > ExtremeControl > OneView
End-Systems Read Access or Read/Write Access
Dashboard
Select the Dashboard tab to view information about engines and end-systems.
39 of 805
Navigating the Control Tab
Overview
Provides an overview of end-system connection information. For a description of
each report, click the Info button in the upper right corner of the view. Enable and
disable data display in each chart by clicking on the data set in the chart legend.
For example, if one segment represents a disproportionately large percentage of
the total, mouse over the segment legend to the right of the chart and click on it to
remove it from the pie chart.
System
Provides system-level information for engines and end-systems. For a description
of each report, click the Info button in the upper right corner of the view.
Health
Provides reports on end-system assessment and state information. For a
description of each report, click the Info button in the upper right corner of the
view.
Policy
Clicking the Policy tab lets you create policies for your network. It allows you to create
policies for users and ports, enabling network engineers, information technology
administrators, and business managers to work together to create the appropriate
network experience for each user in their organization.
Access Control
The Access Control tab lets you manage the end user connection experience and
control network access based on a variety of criteria including authentication, user
name, MAC address, time of day, and location. The Access Control tab comes with a
default ExtremeControl Configuration which is automatically assigned to your
ExtremeControl engine. You can use this default configuration as is, or make changes to
the default configuration, if desired.
End-Systems
Clicking the End-Systems tab displays end-system connection information, and lets you
monitor end-system events and view the health results from an end-system's
assessment. Double-click on any row in the table to open a browser window that
displays End-System Details.
40 of 805
Policy
Reports
The Reports tab allows you to view information about the end-systems connecting to
your network, ExtremeControl authentication information, and the top services and roles
based on policy rules. Available reports are accessible via the Reports drop-down list at
the top of the tab and are grouped into the following reporting areas:
l End-Systems
l Access Control
l Access Control — Health
l Policy
Related Information
For information on related topics:
l Administration
l Network
l Alarms and Events
l Reports
l Search
Policy
The Policy tab, contained in the Control tab of Extreme Management Center is a
configuration tool that simplifies the creation and enforcement of policies on networks,
enabling network engineers, information technology administrators, and business
managers to work together to create the appropriate network experience for each user in
their organization.
The Policy tab enables you to create policy profiles, called roles, which are assigned to
the ports in your network. These roles are based on the existing business functions in
your company and consist of services that you create, made up of traffic classification
rules. Roles provide four key policy features: traffic containment, traffic filtering, traffic
security, and traffic prioritization.
Use the following summary to guide you through the basic steps for using the Policy tab.
41 of 805
Policy
1. Create your Policy Domains (see How to Create and Use Domains.)
2. Add your devices to the Extreme Management Center Database and assign them
to the appropriate domain.
3. If desired, group your ports into port groups (see How to Create a Port Group).
4. Create services (see How to Create a Service).
5. If desired, group services into service groups (see How to Create a Service Group).
6. Create roles (see How to Create a Role).
7. Write your configuration to your devices (see Enforcing).
The illustration below shows the Policy tab relationship hierarchy, with Rules at the base
to define specific packet handling behaviors, Roles at the top to identify specific job
functions in the organization, and Services in the middle, providing the interface
between the two layers.
Using policy configuration tools, you can create multiple roles tailored to your specific
needs and set a default policy for some or all of your network devices and ports. These
policies can be deployed on multiple devices throughout your switch fabric.
42 of 805
Policy
43 of 805
Policy
The first time you launch the Policy tab, you are in the Default Policy Domain. You can
manage your entire network in the Default Policy Domain, or you can create multiple
domains each with a different policy configuration, and assign your network devices to
the appropriate domain. The Default Policy Domain is pre-configured with roles and
rules. The roles, services, rules, VLAN membership, and class of service in this initial
configuration define a suggested implementation of how network traffic can be handled.
This is a starting point for a new policy deployment and often needs customization to
fully leverage the power of a policy-enabled network.
For more information about domains, see Policy Domains in the Concepts Help topic.
In the Quick Tour, we'll use the Default Policy Domain as a way to explore the basic
features and functionality of the Policy tab. Later, you may find the Default Policy
Domain useful as you create your own Policy Domains.
If you have just launched the Policy tab for the first time, you are in the Default Policy
Domain and you can proceed to the next step, Understanding Roles. If someone else
has been using the Policy tab before you, use the following steps to create a
demonstration domain you can use for the Quick Tour.
NOTE: If someone uses the Policy tab before you, you may be prompted to save the previous
domain's configuration when you create the new domain. Save the previous domain's
configuration if you are going to use that configuration in the future.
44 of 805
Policy
5. Click on the left-panel VLANs tab. Right-click on Global VLANs and select Create
VLAN for the domain. For more information on creating VLANs, see How to Create
a VLAN.
6. Click on the left-panel Network Resources tab. Right-click on Network Resources
or Global Network Resources (All Domains) and select Create Network Resource
to create a network resource for the domain. You can also right-click Network
Resource Topologies and select Create Network Resource Topology to create a
network resource topology for the domain. For more information on creating a
network resource or network resource topology, see How to Create a Network
Resource.
7. Select Open/Manage Domains > Save Domain. The data elements are saved to
the new Demonstration Domain.
Understanding Roles
Roles are usually designed to reflect different users in your organization and to provide
customized access capabilities based on the role users have in your organization. For
example, accounting and engineering personnel have different network access and
priority needs and therefore may have different roles.
To view information about existing roles:
1. Click on the left-panel Roles/Services tab in the Policy tab main window.
45 of 805
Policy
To filter through roles easily, select the Show Editable Columns drop down and select iif
you wannt to hide or show editable information.
Roles are assigned to users during the authentication process. When a user
successfully authenticates, the port is opened, and if a role is assigned to the user, that
role is applied to the port. A role can also be directly assigned to a port as a default role
for instances when authenticated users are not assigned a role. If an end user on a port
is not assigned a role when logging in (authenticating), or if authentication is inactive on
a port, then the port uses its default role. However, if a user is assigned a role upon
login, then that role overrides any default role on the port.
To create and define a role, right-click Roles and select Create Role.
To create a role:
1. In the Policy tab left panel, select the Roles/Services tab.
2. Select the Roles sub-tab.
3. Right-click the Roles folder, and select Create Role.
4. Enter the role name Office Assistant in the highlighted box and press Ok.
46 of 805
Policy
Understanding Services
Roles can be made up of one or more network access services. These services
determine how network traffic is handled at any network access point configured to use
that role. The Policy tab allows you to create Local Services (services unique to the
current domain) and Global Services (services common to all domains).
Services can be one of two types:
l Manual Service — Contain customized classification rules you create.
l Automated Service — Associated with a particular set of network resources.
Manual services contain one or more traffic classification rules that define how a network
access point handles traffic for a particular network service or application. For example,
you might create a Manual service called "Restricted Employee" that contains a
classification rule that discards TCP HTTP traffic.
We are creating a Manual service and then adding it to a role. Right now, lets take a look
at the services in the domain.
To view information about existing services:
1. Click on the left-panel Roles/Services tab in the Policy tab main window.
2. Expand the Service Repository folder and then the Local Services folder.
3. Expand the Services folder to view a list of services.
4. Expand a service or two to see the individual classification rules that make up the
service.
5. Select a service or two in the left-panel to see the right-panel tabs that display
47 of 805
Policy
specific information for each service. Click the right-panel tabs to see the
information they contain.
For more information:
l Service
l How to Create a Service
48 of 805
Policy
4. Enter the service group name Trusted User in the highlighted box and press
Enter.
5. Right-click Service Group, select Add/Remove Services and add one or two of the
existing Acceptable Use Policy service groups into the Trusted User service group.
For more information:
How to Create a Service Group
49 of 805
Policy
Adding Devices
The first step in adding network devices to Policy tab, is to add the devices to the
Extreme Management Center database. You do this initially, by using the Discovered
tab on the Network tab. This section assumes you have already done this. If you need
more information, refer to the Network tab Help page.
Once you add devices to the Extreme Management Center database, you must assign
the devices to a Policy Domain using the Policy tab. As soon as the devices are
assigned to a domain, they are automatically displayed in the Policy tab device tree.
Only devices assigned to the domain you are currently viewing are displayed.
To assign devices to a domain:
1. In the Policy tab main window, right-click Devices and select Assign Devices to
Domain. The Assign Devices to Domain window opens.
In the left panel, the Unassigned device tree contains all the devices in the
database not assigned to a domain. The right panel displays the devices in the
current domain.
2. For the Quick Tour, select a couple of devices to add to the domain and click Add.
Click OK to add the devices.
You can also use this window to remove a device from the current domain. This
removes the device from the current domain and places it in the Unassigned folder.
It does not delete the device from the Extreme Management Center database.
For more information:
l How to Add and Delete Devices
l How to Create and Use Domains
50 of 805
Policy
3. In the right-panel Ports tab, expand a Ports or Slot folder to display ports on the
device.
4. Right-click on a port and select Current Domain > Show Role Details.
5. Set Default Role, if necessary.
51 of 805
Policy
To view VLANs:
1. From the VLANs tab, expand the Global VLANs folder to see individual VLANs.
2. Click on the Default VLAN listed and view the VLAN information in the right panel.
For more information:
l How to Create a VLAN
l General Tab (VLAN)
l Policy VLAN Islands
2. Select the Class of Service and all information related to the Class of Service
selected is displayed in the right-panel.
For more information:
l Getting Started with Class of Service
l How to Define Rate Limits
l How to Configure Transmit Queues
l How to Create a Class of Service
52 of 805
Policy
Enforcing
Any time you add, make a change to, or delete a role or any part of it (any of its services
and/or rules), the devices in your current domain need to be informed of the change so
that your revised policy configuration can take effect. This is accomplished by enforcing
— writing your policy configuration to a device or devices. Enforce operations are
performed only on the current domain.
To enforce to all devices in the current domain, select Open/Manage Domains >
Enforce Domain. To enforce to a single device, right-click the device and select
Enforce.
Enforce Preview
The Enforce preview tool has a very similar setup to the Enforcing Domain tool. To view
the enforce preview, select Open/Manage Domains > Enforce Preview and select the
device to preview from the left dropdown.
Note: If the device has a red exclamation type next to it in the left panel, then it is
incompatible with the domain configuration and should be corrected.
Enforcing preview shows you a summary of the stats and info, roles, rules, and services
on device. The three preview tabs include:
Device Stats & Info: Shows information on supported role/rule counts, etc.
Roles & Rules: Shows a grid panel with roles and rules that will enforce the device. If
supported, it will show a green circle. A yellow circle indicates a rule not being
53 of 805
Policy
supported, and a red circle denotes a role not being supported. Right-click and select
View/Edit which will close enforce preview and bring you to the item you wish to make
changes to.
Classes of Service: Shows details of the Class of Service and the related rate limit
configuration.
54 of 805
Policy
The total max supported number of rules for EXOS devices is the sum of these 4 types, NOT
the value returned by etsysPolicyRulesMaxEntries (due to that including other things by the
FW).
The devices supported number of rules is only read when the device is added to the
domain, the firmware is upgraded, or the device is manually refreshed.
For more information:
Enforcing
Verifying
To determine if the roles currently in effect on your domain devices match the set of roles
defined in your current Policy Domain configuration, use the Verify feature.
AP Aware
An AP is assigned "AP Aware," all traffic through this port will not need authentication.
This new Role default action is configurable via a new AP Aware setting in the role
configurations view. To enable AP Aware:
1. Click on the left-panel Roles/Services tab in the Policy tab main window.
2. Click on the left-panel Roles sub-tab in the Roles/Services tab.
3. Click a role name to see a description of the role.
4. Using the scroll bar, scroll to find the AP Aware column.
5. Double-click Disabled, and in the drop-down, select Enabled.
When enforce or verify occurs, the secondary logic runs which inspects all AP Aware
enabled roles, and for each role finds all in-use VLANs (rule actions, role default action)
and automatically adds them to that role’s tagged VLAN egress list if they are not
already present. This is then used for the enforce/verify logic, and returned to the client
so the domain is updated accordingly.
The domain data may change from doing an enforce/verify, and needs to be saved.
55 of 805
Policy
Related Information
For information on related concepts:
l Policy Tab Concepts
l Traffic Classification Rules
For information on related windows:
l Main Window
56 of 805
Policy
General Considerations
K-Series,
S-Series, RoamAbout
N-Series R2
Authentication Gold and RoamAbout
Type Platinum E6/E7 E1 AP3000 C2/B2
802.1X Successful Successful Successful Successful Successful
MAC Successful Successful Successful Successful Successful
Web-Based Successful Successful on Successful Web-Based Successful
firmware Auth
version 5.06.x. Not
Failed on older Supported
firmware
versions.
The following table shows Authenticated Traffic Behavior for each device type when the
authenticated role is not defined on the device:
K-Series,
S-Series,
N-Series N-Series
Gold and 5.01 and later RoamAbout R2
Authentication Platinum Gold and RoamAbout
Type 4.11 and earlier Platinum E6/E7 E1 AP3000 C2/B2
802.1X 1 3 2 2 3 2
MAC 1 3 2 2 3 2
Web-Based 1 3 2 2 Web-Based Auth 2
Not Supported
1 - Traffic is forwarded based on the 802.1Q PVID and 802.1p priority for the port,
regardless of whether the port has been assigned a default role. Authenticated users
display a current role of "None" in the Port Usage tab.
57 of 805
Policy
2 - Traffic is forwarded based on the port's default role and authenticated users will
display the default role as their current role in the Port Usage tab. If no default role has
been assigned to the port, the port's 802.1Q PVID and 802.1p priority are used, and the
current role will be "None."
3 - Traffic is forwarded based on the Invalid Role Action configuration at the device level
in the Policy tab.
Flood Control
Individual Class of Service granularity is unsupported on fixed switches, so if any CoS is
assigned a Flood Control rate, all Class of Service on these devices use that rate.
C1 Considerations
Review the following considerations prior to configuring policy on C1 devices:
Policy Support
Policy support on C1 devices utilizes both a port-level role and a device-level role. In the
Policy tab, a role is a set of network access services made up of traffic classification
rules. It may also contain default Access Control (VLAN) and/or Class of Service settings
applied to traffic not handled specifically by the rules contained in the role. Although both
the device-level and port-level roles may contain all of these components, only certain
portions of each role are used when applied to a port on a C1 device.
58 of 805
Policy
On the C1, classification rules are implemented at the device level through a device-
level role. The Policy tab allows you to set a unique device-level role for each C1
device. The device-level role is a regular role that defines how inbound traffic is handled
in terms of classification rules and default Class of Service assignment. In other words,
all classification rules are taken from the device-level role, and any rules defined in the
port-level role are ignored when applied to a port. The Class of Service setting is also
implemented through the device-level role and ignored in the port-level role. However,
the default Access Control setting of the device-level role is ignored, and is defined
through the port-level role.
Classification rules from the device-level role are only applied to ports which also have a
port-level role applied (either statically or dynamically). This allows you to exclude the
device-level role from uplink ports and hosts ports, by not applying a port-level role to
these ports and not enabling authentication on them.
When a port-level role is applied to a port, it overrides any PVID and Class of Service
settings defined on the port through Console or local management. When a device-level
role is applied to a port, it also overrides these PVID and Class of Service settings, and
overrides any Class of Service setting defined in the port-level role. It does not override
any default Access Control setting defined in the port-level role.
In addition, if the port-level role's default Access Control is configured to deny traffic, then
all inbound traffic will be discarded even if it matches a (forward) classification rule.
Rule Limits
C1 devices limit the number of rules you can create for some classification types. Refer
to the C1 information in the Extreme Management Center Release Notes to see which
classification types limit the number of rules.
N-Series Considerations
Review the following considerations prior to configuring policy on N-Series devices:
59 of 805
Policy
MAC-to-Role mapping
IP override policy
IP-to-Role mapping
VLAN-to-Role mapping
Default port role
Single User Authentication:
Devices configured with single user authentication use the following precedence when
applying a role on a user/port (starting with the highest precedence):
MAC override policy
MAC-to-Role mapping
IP override policy
IP-to-Role mapping
Authenticated role
VLAN-to-Role mapping
Default port role
C2 and B2 Considerations
Review the following considerations prior to configuring policy on C2 and B2 devices.
l When TCI Overwrite is enabled on a role, C2 and B2 devices support rewriting the
802.1p bit (CoS values) but not the 802.1Q bit (VLAN ID).
l On C2 and B2 gigabit and 10/100 ports, the number of rules per port is restricted.
Refer to your C2 and B2 firmware release notes for the maximum number of rules
that can be utilized on a port.
l C2 and B2 10/100 ports support two priority-based rate limits (inbound only). When
creating a rate limit to be used on C2 and B2 10/100 ports, create the limit with
either Low priority to associate the rate limit with priorities 0-3 or High priority to
associate the rate limit with priorities 4-7. You can specify both Low and High
priorities if you want to associate the rate limit with priorities 0-7.
l C2 and B2 devices do not support setting a default role on a logical port.
l On C2 and B2 devices, it is strongly recommended that you do not enforce rules
that assign a Class of Service (CoS) that includes Priority 7. Doing so will interfere
with stack communication.
l C2 and B2 devices do not allow a mask for an IP type of service (ToS) rewrite
value associated with a class of service (CoS); they will always use ff.
l C2 and B2 devices do not support VLAN ID traffic classification rules. C2 devices
(firmware 3.02.xx and newer) and B2 devices (firmware 2.xx.xx) support device-
60 of 805
Policy
level VLAN to Role mapping. However, VLAN ID traffic classification rules can be
configured on C2 devices with firmware versions 3.01.xx or older, using CLI.
l B2 only. Each port on a policy-enabled B2 switch can support up to 100 rules and
up to 10 masks. The maximum number of unique rules in a single switch or B2
stack is 100, while the maximum number of unique masks is 18. These unique
rules and masks may be shared across any and all ports in a stack or switch.
C3 and B3 Considerations
Review the following considerations prior to configuring policy on C3 and B3 devices.
l B3/C3 devices do not support TCI Overwrite. The B3/C3 does not overwrite
802.1Q VLAN bits, but overwrites the 802.1p Priority bits.
l B3/C3 devices do not support Layer 3 ICMP rules.
l B3/C3 devices support role-based rate limiting. However, on the B3/C3, class of
service inbound rate limiting works only on policy roles, not on policy rules.
l C3G and B3 devices have the following additional limitations:
l Maximum 100 rules per policy role.
l A system limitation of 768 unique rules.
l Maximum of 15 roles.
l C3 and B3 devices do not support setting a default role on a logical port.
NOTE: While you can create mixed stacks of C2/C3 devices and mixed stacks of B2/B3 devices,
you should not create mixed stacks of C and B devices (e.g. mixed stacks of C2/B2 or
C3/B3 devices).
61 of 805
Policy
l Mixed stacks with a B3/C3 master support role-based rate limiting, however, class
of service inbound rate limiting works only on policy roles, not on policy rules.
l A mixed stack containing a C2H or a B2 has the following limitations:
l A single role limitation of 100 rules and 10 masks.
l A system limitation of 100 unique rules and 18 unique masks.
l No support for Layer 2 rules or Layer 3 ICMP type rules.
l Maximum of 15 roles.
l No support for rate limiting.
l A mixed stack containing a C2G has the following limitations:
l A single role limitation of 100 rules and 10 masks.
l A system limitation of 768 unique rules.
l No support for Layer 2 rules.
l Maximum of 15 roles.
l No support for rate limiting.
l When adding a new device to a mixed stack, the ports should not go active unless
the stack supports the policy configuration. Once a device has joined the stack, no
roles should be enforced that are not supported on all devices. For example:
A C2K is added to an existing C3 stack.
l If the number of masks in the C3 stack's current configuration exceed those
allowed by the C2K, its ports cannot go active.
l Once the C2K joins the stack, no roles can be enforced that exceed the
limitations of any device.
7100 Considerations
l 7100 devices only support fixed IRL index reference mappings for the static CoS.
The IRL Index for the CoS needs to match the priority. This is the default
configuration for domains, but if it is changed for a static CoS, enforce will fail.
l 7100 devices only support fixed TXQ index reference mappings for the static CoS.
The TXQ Index for the CoS needs to match the priority. This is the default
configuration for domains, but if it is changed for a static CoS, enforce will fail.
l 7100 devices only support fixed COS - transmit queue mappings. The transmit
queue specified for a Class of Service must match the 802.1p priority, or enforce
will fail.
l TCI Overwrite configuration is not supported on the 7100. It is always enabled, and
cannot be turned on or off using the Policy tab.
62 of 805
Policy
NOTE: If you are using assisted remediation and quarantined end-users will be required to
download remediation files via FTP, you will also need to add a rule to the Quarantine
policy configuration that opens up ports 49152-65535. If you are concerned with security,
you can configure your FTP server to use a smaller range of ports.
63 of 805
Policy
64 of 805
Policy
Version Supported
The Policy tab only supports Wireless Controller version 8.01.03 and higher.
Policy Rules
This section describes wireless controller support for policy rules.
Rule Actions
The following list defines the wireless controller support for rule actions:
65 of 805
Policy
l Access Control: Permit, Deny, and Contain to VLAN actions are supported.
l Class of Service is supported.
l TCI Overwrite is not supported.
l System Log, Audit Trap, Disable Port, and Traffic Mirror actions are not supported.
Rule Directions
The Policy tab rules are applied to incoming data packets based on the source or
destination address, whereas the wireless controller applies rules to packets based on
In/Out direction. On the wireless controller, "In" means coming from the station into the
network and "Out" means going from the network out to the station. The wireless
controller applies rules to the destination address of inbound packets and to the source
address of outbound packets, as shown in the illustration below.
When you create a rule in the Policy tab that allows traffic to a specific destination, that
same rule permits data flow from the destination back to the traffic source. This means
that Destination rules in the Policy tab map to In/Out rules on the wireless controller.
Certain Policy tab rule types do not have a Source or Destination designation (such as
ICMP); however, these rules still map to In/Out rules on the wireless controller to indicate
the filters are applied to traffic in both directions. Unchecking the In or Out flag for non-
directional rules via the ExtremeWireless Assistant does not affect the way it is reported
to the Policy tab. As long as the rule still exists, verify succeeds.
All rules enforced from the Policy tab are created as "In" rules, and "Out" rules created
on the controller are not reported to the Policy tab.
When the egress policy feature is enabled for a VNS, egressing traffic is applied to the
defined "In" filters as a "reflected" Out rule (with the source and destination fields
reversed) and any explicitly defined "Out" filters created on the controller are ignored.
Egress policy may be enabled per VNS by selecting Port Properties for that VNS.
The wireless controller reports to the Policy tab any rules created directly on the
controller that contain an "In" component. "Out" rules are not reported to the Policy tab.
This allows administrators to define and use "Out" rules on the wireless controller in
special cases where additional restrictions need to be imposed.
66 of 805
Policy
Rule Limits
The wireless controller has a limit of 64 rules per policy role if the policy is enforced at
the controller (bridged @ wireless controller or routed topology), and 32 rules per policy
role if the policy is enforced at the AP (bridged @ AP).
Class of Service
The following list defines the wireless controller support for Class of Service (CoS)
configuration via the Policy tab:
l Inbound and outbound rate limits are supported at the role-level as Class of
Service default actions.
l User-based inbound/outbound rate limits are supported for the Default port group
for wireless controllers only.
l 802.1p Priority configuration is supported.
l ToS/DSCP Marking is supported.
l TCI Overwrite is not supported.
l Transmit Queue Rate Shaping is not supported.
Rate Limits
The wireless controller supports inbound and outbound rate limits at the role-level as
Class of Service (CoS) default actions. There are three states supported for a rate limit:
l Rate limit traffic at the specified rate.
l No Change (the CoS does not specify a rate, and the rate limit is "inherited" from
the port's default role or from the global default policy, if one is defined.)
67 of 805
Policy
To explicitly prevent traffic from being rate limited for a role, you can map a rate limit with
a value of 0 to a CoS, and set that as the default CoS for the role.
Internal VLAN
The wireless controller uses an internal VLAN for processing traffic. For controllers with
firmware version 8.01.xx, the internal VLAN is set by default to use VID 1 and the static
name of "DEFAULT VLAN." For controllers with firmware version 8.11.xx and later, the
internal VLAN uses the VID 4094 and the static name of "INTERNAL VLAN."
This internal VLAN cannot be used in your Policy tab domain configuration to tag traffic.
If the VID for the internal VLAN is used in your domain configuration, the Policy tab
enforce fails with an error message in the Event Log indicating the internal VID cannot
be used.
You can use the Web UI (https:\\<controller IP>:5825 > VNS Config > Topologies >
Internal VLAN) to change the internal VLAN to a different value, but your policy domain
must not use that new value or the Policy tab enforce fails.
NOTE: For controllers with firmware version 8.01.xx. Since using a Default VLAN with a VID of 1 is
valid on wired devices, the controller's internal VLAN must be changed to another value to
prevent issues with the Policy tab enforcing a configuration that uses this VLAN.
Policy Inheritance
The wireless controller uses the concept of policy inheritance, which specifies that if the
authenticated policy's access control (VLAN) or class of service (CoS) is set to "No
Change," then the policy inheritance hierarchy is used to determine the VLAN and/or
CoS. The policy inheritance hierarchy is as follows:
If the authenticated policy's VLAN and CoS are set to "No Change," then the VLAN and
CoS settings for the port's default role is used. If the port's default role does not specify
68 of 805
Policy
the VLAN and CoS, then the global default policy (specified via the ExtremeWireless
Assistant) is used. (In wireless controller terminology, a VNS port's default role is the
VNS's default policy.)
It is important to note that the Policy tab does not support "No Change" rules (filter set). If
any policy's rules (filter set) are set to "No Change," then the Policy tab is not able to
manage the device until the policy containing the "No Change" configuration is
removed.
Other Considerations
l The wireless controller does not support authentication configuration.
l The wireless controller does not support viewing user sessions in the Port Usage
tabs.
l The wireless controller must have any VLANs used in a Role's default action
already defined on the device and configured with an egress port. If the Policy tab
enforces a domain configuration to the wireless controller using a VLAN that does
not have an egress port specified, enforce fails.
69 of 805
Policy Tab Overview
Policy Help
Extreme Management Center Policy enables the creation and deployment of role-based
policies that dynamically control user access, network security, application prioritization
and other parameters. Policy management and role-based administration are keys to
effectively enforcing business and IT rules in the network infrastructure.
Contact your sales representative for information on obtaining an Extreme Management
Center software license.
Details View
Some Details View tabs display a simple list of items for the current selection in the left
panel. However, other Details View tabs present more complex tables of information. To
access Help topics on those tabs, expand the Details View Tabs folder in the Policy tab
Help Table of Contents. The Help topics are named to reflect the item selected in the
left-panel tree. For example, the Help topic for the Details View tab with a device
selected in the left panel is named Details View Tab (Device).
70 of 805
General
General
A General tab is available in the right panel of the Policy tab main window for many
items selected in the left-panel tab. It provides general properties information about the
selected item.
Help topics for the right-panel General tabs are named to reflect the item selected in the
left-panel tree. For example, the Help topic for the General tab with a device selected in
the left panel is named General Tab (Device). For more complete information on the
different General tabs, expand the General Tabs section and select the desired tab.
Policy Menus
The two drop-down menus on the Policy tab provide access to Policy tab functions. The
Open/Manage Domains menu provides options for the domain currently accessed. The
Global Domain Settings drop-down list allows you to configure global Policy tab
settings.
71 of 805
General
Lock Domain
Lets you lock the current Policy Domain for editing purposes. The Policy tab
automatically locks the domain when you begin to edit the domain configuration.
Other Policy tab users are notified that the domain is locked and they are not able
to save their own domain changes until the lock is released. For more information,
see Controlling Client Interactions with Locks.
Save Domain
Lets you save any changes you made to the current Policy Domain. Only users
with the capability to Enforce are able to save the domain.
Enforce Domain
Writes the role and/or any changes you have made to it (rules, services) to all the
devices in your current domain. See Enforcing for more information.
Verify Domain
Compares the roles in your current domain to the roles currently enforced on all the
devices in the current domain. This is useful for ensuring the roles in your domain
are enforced, or, if you use more than one domain, ensuring that the roles in the
domain you are currently using matches what is on the devices. See Verifying for
more information.
Assign Devices to Domain
Opens the Assign Devices to Domain window where you can assign devices that
are in the Extreme Management Center database to the current Policy Domain.
Create Domain
Lets you create and name a new (blank) Policy Domain.
Delete Domain(s)
Opens a window where you can select one or more Policy Domains to delete.
Rename Domain
Lets you rename the current Policy Domain.
Import/Export > Import From Domain
Opens the Import from Domain window where you can import policy configuration
data from one Policy Domain into another domain. (This menu option is not
available if only one domain exists, as there are no other domains from which to
import data.)
Import/Export > Import From File
Opens the Import from File window, which enables you to import policy data from a
.pmd file into the current Policy Domain. Be aware that the import overwrites any
72 of 805
General
existing data in the Policy Domain. Any devices in the .pmd file must already exist
in the Console database or they won't be imported.
Import/Export > Export to File
Lets you save policy data from the current Policy Domain to a .pmd file or .xml file
with the file name and location of your choosing. This file stores all information
about roles, services, and rules configured in the current Policy Domain. This
allows you to save a Domain configuration prior to making changes so that you
can restore the original Domain configuration if required (via Import/Export > Import
From File).
73 of 805
General
Tools Menu
Authentication Configuration
Opens the Authentication Configuration wizard, where you can configure
authentication settings on a device.
RADIUS Configuration
Opens the RADIUS Configuration wizard, where you can configure
RADIUS authentication and accounting settings on a device.
Policy Event Log
Opens the Events tab filtered to display only Policy events.
Related Information
For information on related windows:
l Main Window
74 of 805
General
Show on Enforce
When this checkbox is checked, the Enforce Preview window appears any time
you enforce, before the actual enforcement takes place.
75 of 805
Left Panel
Left Panel
The left panel of the Enforce Preview window displays folders for different device types.
Expand the folders to see your network devices and device groups organized according
to device type. The warning icon ( ) alerts you that Extreme Management Center is not
writing a staged change to this device type (e.g. rules not supported on a device).
Show all device types
Select the checkbox in the left panel to display all device types in the left panel.
When the checkbox is not selected, only the devices you are changing by
enforcing are displayed.
Select a specific device type to display the information Extreme Management Center is
writing to those devices when you enforce in the right panel.
Right Panel
The right panel provides information about whether certain policy management features
are supported and/or enabled for the device type selected in the left panel.
l Additional Warnings - If there are additional problems detected with the enforce,
you will be directed to see the Event Log for details.
l GVRP - Shows whether GVRP is Enabled, Disabled, or Ignored. You can change
GVRP status for the domain via the Edit menu.
l Dynamic Egress - Shows whether Dynamic Egress is Supported or Not Supported.
Device Stats & Info Tab
Displays the devices for the device type selected in the left panel and provides
information about each device. If the number of roles in the domain exceeds the
supported number of roles on a device, the enforce fails.
l # of Roles Supported - The maximum number of roles supported by the
device.
l Domain Role Count Supported - This column says "No" if the number of
roles in the domain exceeds the supported number of roles on the device. A
"Yes" in this column indicates that the number of roles on the device is equal
to or less than the maximum number of supported roles.
76 of 805
Right Panel
NOTE: Select a Role to display only those classification rules and VLANs associated with
the selected role.
NOTE: On N-Series Platinum devices, range classification rules are achieved through
applying subnet masks to values. As such, in order to achieve a user-specified
range, the device may need multiple rules with subnets applied to encompass that
range. So, although the user created only one rule with a range, this list may show
multiple instances of that rule with the name of the rule followed by the portion of the
over-all range it applies to.
VLAN Tab
Excluded - Lists any VLANs associated with unsupported classification rules, or
VLANs that are not supported by the device. These VLANs will not be written to
the devices.
Included - Lists any VLANs associated with supported classification rules and
VLANs associated with roles. These will be written to the devices.
77 of 805
Right Panel
Inbound/Outbound Role-Based Rate Limit Mappings Subtabs - Lists the rate limit
mappings that will be written to the devices:
l Device - The device where the rate limit mapping will be in effect.
l IRL/ORL Port Grp - The name of the port group that contains the rate limit
mapping.
l IRL/ORL Index - The logical inbound rate limit (IRL) or outbound rate limit
(ORL) index number. This index number is specified in a class of service and
dictates the rate limiting behavior for incoming packets.
l Rate Limit - The actual rate limit that the IRL/ORL index is mapped to.
l IRL/ORL Port Type - The type of ports included in the port group. Port type is
based on the number of rate limits the ports support (for example, 8-rate limit
ports and 32-rate limit ports).
l Information - Information about mapping support.
Transmit Queue/Rate Shaper Mappings Subtab - Lists the transmit queue rate
shaper mappings that will be written to the devices:
78 of 805
Right Panel
l Device - The device where the transmit queue rate shaper mapping will be in
effect.
l TxQ Port Grp - The name of the port group that contains the transmit queue
rate shaper mapping.
l TxQ Index - The logical transmit queue rate shaper index number. This index
number is specified in a class of service and dictates the transmit queue and
rate shaper behavior for incoming packets.
l Physical Transmit Queue / Rate Shaper - The actual transmit queue rate
shaper that the index is mapped to.
l TxQ Port Type - The type of ports included in the port group. Port type is
based on the number of transmit queues the ports support (for example, 4-
transmit queue ports and 16-transmit queue ports).
l Information - Information about mapping support.
Mappings Tab
MAC to Role Mapping - Lists the device-level and port-level mappings that will be
written to the devices:
l Device/Port Level - indicates whether the mapping is a device-level mapping
(all devices) or a port-level mapping (IP address and port description). Port-
level mappings on frozen ports will be enforced.
l MAC Address - the MAC address mapped to the role. Masking a MAC
address is only supported on N-Series Platinum devices.
l Mask - the mask associated with the MAC address.
l Role - the role mapped to the MAC address.
IP to Role Mapping - Lists the device-level mappings that will be written to the
devices:
l IP Address - the IP address mapped to the role.
l Mask - the mask associated with each IP address. Masking an IP address is
only supported on N-Series Gold and Platinum devices.
l Role - the role mapped to the IP address.
Tagged Packet VLAN to Role Mapping - Lists the device-level and port-level
mappings that will be written to the devices:
79 of 805
Right Panel
Enforce Button
Enforces the roles, classification rules and VLANs in the current data file to the
devices, based on the level of support available on the devices as indicated in the
Enforce Preview window.
Related Information
For information on related concepts:
l Enforcing
This window lets you import policy configuration data from one Policy Domain into
another domain. To access the Import from Domain window, select
Open/Manage Domain > Import/Export > Import From Domain. (This menu option is
not available if only one domain exists, as there are no other domains from which to
import data.)
80 of 805
Right Panel
Domain
Use the drop-down list to select the domain whose data you want to import.
81 of 805
Right Panel
Devices
Select this option to import devices. Any devices in the .pmd file must already exist
in the Extreme Management Center database or they won't be imported. (See How
to Add and Delete Devices for more information on using Console to add devices
to the Extreme Management Center database.) Devices that are imported are
automatically assigned to the current domain and are displayed in the Policy tab
Network Elements tree. If the devices being imported were already assigned to
another domain, then those devices are reassigned to the current domain. Any
devices that are not imported are listed in an Event Log message along with their
device type and firmware version.
Port Groups (User-Defined)
Select this option to import user-defined port groups. If you are importing a port
group's ports at the same time as the port group, the ports will be associated with
the port group. Otherwise, the ports are not imported.
Class of Service
Select this option to import classes of service, role-based rate limit port groups, and
transmit queue port groups. For the purposes of importing, a class of service is
defined as the class of service name, i.e., priority is not a factor in determining
uniqueness. After a class of service is imported, its associated roles, services, and
rules are updated. When you import class of service data, the relationship between
a class of service and its priority is retained; however, rate limiting characteristics
of the priorities are not imported. If you also elect to import rate limits, the rate limits
are imported first, then the classes of service are imported. You can then redefine
the class of service priorities with some or all of the imported rate limits, if desired.
Although ToS characteristics are not used to determine the uniqueness of a class
of service for importing, if ToS is a part of a class of service, it is imported as an
attribute of the class of service. See append, update and overwrite for information
on how those specific actions affect the import of classes of service.
Adv CoS Config
Select this option to import the class of service configuration (basic or advanced)
for the domain (whether the Advanced Class of Service Configuration option is
selected).
Rate Limits
Select this option to import rate limits. For the purposes of importing, a rate limit is
defined as [rate + direction] when determining uniqueness. Any other duplicates on
the list are not changed. Because rate limits cannot include conflicting priority
values, if a priority is already being utilized by an existing rate limit, it will not be
imported. If you also elect to import classes of service, the rate limits are imported
82 of 805
Right Panel
first, then the classes of service are imported. See append and update for
information on how those specific actions affect the import of rate limits.
NOTE: ZTP+ functionality requires an ExtremeXOS device on which version 21.1 is installed.
NOTE: Only those network elements that are recognized by the existing domain
can be imported as exclusions. Others are ignored.
VLANs
Select this option to import VLANs.
83 of 805
Right Panel
Rate Limits: A rate limit will not be appended if: 1) The Rate, Direction, and 802.1P
Priority are already defined. 2) The Priority list is empty.
CoS: A class of service will not be appended if: 1) The name is the same as an
existing class of service. 2) The class of service names are different but the rate
limits for the imported class of service do not match the existing rate limit settings.
Update existing data with elements from domain
Select this option to 1) replace the selected data elements that exist in your current
domain with the imported data elements, and 2) import the selected data elements
that don't exist in your current domain.
Rate Limits: A rate limit will not be updated if the rate limit and direction do not
match.
CoS: A class of service will not be updated if: 1) The name does not match an
existing class of service. 2) The class of service name matches but the rate limits
for the imported class of service do not match the existing rate limit settings.
Overwrite existing elements
Select this option to replace the selected data elements that exist in your current
domain with the imported data elements.
CoS: A class of service will not be overwritten if the rate limits for the imported
class of service do not match the existing rate limit settings.
84 of 805
Right Panel
NOTE: If you decide that you want to return to the previous configuration (that the import updated),
you can perform a File > Read Policy Domain operation to restore the configuration, as
long as you have not saved the data you imported.
Related Information
For information on related tasks:
This window lets you import policy data from a .pmd file into a Policy Domain. To access
the window, select Open/Manage Domains > Import/Export > Import From File.
85 of 805
Right Panel
86 of 805
Right Panel
Class of Service
Select this option to import classes of service, role-based rate limit port groups, and
transmit queue port groups. For the purposes of importing, a class of service is
defined as the class of service name, i.e., priority is not a factor in determining
uniqueness. After a class of service is imported, its associated roles, services, and
rules are updated. When you import class of service data, the relationship between
a class of service and its priority is retained; however, rate limiting characteristics
of the priorities are not imported. If you also elect to import rate limits, the rate limits
are imported first, then the classes of service are imported. You can then redefine
the class of service priorities with some or all of the imported rate limits, if desired.
Although ToS characteristics are not used to determine the uniqueness of a class
of service for importing, if ToS is a part of a class of service, it is imported as an
attribute of the class of service. See append, update and overwrite for information
on how those specific actions affect the import of classes of service.
Adv CoS Config
Select this option to import the class of service configuration (basic or advanced)
for the domain (whether the Advanced Class of Service Configuration option is
selected).
Rate Limits
Select this option to import rate limits. For the purposes of importing, a rate limit is
defined as [rate + direction] when determining uniqueness. Any other duplicates on
the list are not changed. Because rate limits cannot include conflicting priority
values, if a priority is already being utilized by an existing rate limit, it will not be
imported. If you also elect to import classes of service, the rate limits are imported
first, then the classes of service are imported. See append and update for
information on how those specific actions affect the import of rate limits.
Note: Only those network elements that are recognized by the existing domain can
be imported as exclusions. Others will be ignored.
VLANs
Select this option to import VLANs.
87 of 805
Right Panel
will be lost.
l If the VLANs option is selected and the Policy VLAN Islands feature is
enabled in the current domain as well as the imported domain, the Island
VLANs are imported and are added to any existing Policy VLAN Islands.
Whenever Policy VLAN Islands are imported, all the island VLANs are
recalculated and the island ranges may change. It is possible to import more
islands and VLANs than can be configured. If this is the case, an error appears in
the Event Log, asking that the Base ID and Offset settings be changed.
Network Resources
Select this option to import network resource groups. After a Network Resource is
imported, the associated services are updated. If a network resource group no
longer exists after an import, the service with which it was associated is changed to
a manual service on the Automated Service tab for the service.
Port-Level Role Mapping Status
Select this option to import the Port-Level Role Mappings Enabled status for the
domain.
GVRP Status
Select this option to import the GVRP status for the domain.
Do Not Use Global Services Status
Select this option to import the Do Not Use Global Services status for the domain.
Domain Mode
Select this option to import the domain mode (active or passive) as specified in the
Edit menu.
Use this option only if you want to append, update, or overwrite the globally defined
services and rules in your current domain with the global domain data stored in the
.pmd file you are importing. This option will modify or remove any existing global data
and will affect all domains. If overwrite is selected, all current global data will be
removed and replaced with the global configuration in the file, or nothing if there is no
configuration defined.
Global Services & Rules
Select this option to import Global services (services that are common to all
domains) and their associated classification rules. When you import rules from
another domain, the Policy tab checks for rule conflicts (see Conflict Checking for
more information).
88 of 805
Right Panel
Rate Limits: A rate limit will not be appended if: 1) The Rate, Direction, and 802.1P
Priority are already defined. 2) The Priority list is empty.
CoS: A class of service will not be appended if: 1) The name is the same as an
existing class of service. 2) The class of service names are different but the rate
limits for the imported class of service do not match the existing rate limit settings.
Update existing data with elements from domain
Select this option to 1) replace the selected data elements that exist in your current
domain with the imported data elements, and 2) import the selected data elements
that don't exist in your current domain.
Rate Limits: A rate limit will not be updated if the rate limit and direction do not
match.
CoS: A class of service will not be updated if: 1) The name does not match an
existing class of service. 2) The class of service name matches but the rate limits
for the imported class of service do not match the existing rate limit settings.
Overwrite existing elements
Select this option to replace the selected data elements that exist in your current
domain with the imported data elements.
CoS: A class of service will not be overwritten if the rate limits for the imported
class of service do not match the existing rate limit settings.
NOTE: If you decide that you want to return to the previous configuration (that the import updated),
you can perform a File > Read Policy Domain operation to restore the configuration, as
long as you have not saved the data you imported.
89 of 805
Right Panel
Import Button
Imports the selected data and closes the window.
Related Information
For information on related tasks:
l How to Create and Use Domains
For information on related windows:
l Import From Domain Window
This window lets you assign devices in the Extreme Management Center database to a
Policy Domain or move devices from one domain to another. A Policy Domain contains
any number of roles and a set of devices uniquely assigned to that particular domain. A
device can exist in only one Policy Domain. For more information on domains, see How
to Create and Use Domains.
Initially, you must add your devices to the Extreme Management Center database. Once
your devices are in the database, use this window to assign the devices to a Policy
Domain. As soon as the devices are assigned to a domain, they display automatically in
the Policy tab Devices tab. Only devices that support policy are displayed in the Devices
tab.
To access this window, open the domain to which you want to assign devices, and
select Open/Manage Domains > Assign Devices to Domain.
90 of 805
Right Panel
Devices
The Devices list displays all the unassigned devices in the database (including
devices that do not support policy) but are not assigned to a domain. The panel
also displays any other domains and the devices assigned to that domain. Use the
navigation trees to select a single domain or All Other Domains.
Current Domain
The Current Domain list displays the current domain and the devices assigned to
that domain. To add a device to the current domain, select the device in the left
panel and click the right arrow. You can also select and add multiple devices. To
remove a device from the current domain, select the device and click the left arrow.
This removes the device from the current domain and places it back in the device
tree as either unassigned or as a member of the domain it came from. To remove
all devices, click the double left arrow.
Device Domain Membership
This section is only displayed when more than one domain exists. It lists the
domain assignment for whatever device or device group you have selected in the
Devices panel. This is particularly useful when you have selected All Other
Domains from the drop-down list in the Devices panel, as it allows you to quickly
see the domain assignment for each device.
91 of 805
Right Panel
NOTE: Removing a device from a domain does not delete the device from the Extreme
Management Center database. To delete a device from the database, right-click on the
device in the Network tab, and select Device > Delete Device from the menu. When a
device is deleted from the database, it is automatically removed from the Network and
Policy tabs.
Related Information
For information on related tasks:
l How to Add and Delete Devices
l How to Create and Use Domains
92 of 805
Device Selection
Authentication Configuration
The Authentication Configuration wizard enables you to configure and change the
authentication settings on your devices. Authentication must be configured and enabled
on a device in order for individual port authentication settings to take effect (see How to
Configure Ports).
To access this tab, select Authentication Configuration from the Tools drop-down list.
Device Selection
Use the Device Selection tab to select the devices on which you are configuring
authentication settings.
Select a device from the available devices list in the left of the tab and click the right
arrow icon to move the device to the selected devices list. Click Next> to proceed to the
next tab.
Port Selection
Use the Port Selection tab to select the ports on which you are configuring
authentication settings.
Select a port from the Available Ports list at the top of the tab and click Add Ports to
move the port to the Selected Devices list. Click Next> to proceed to the next tab.
93 of 805
Device Configuration
Device Configuration
The Device Configuration tab allows you to configure authentication for a device. Use
the Port Configuration tab to configure authentication settings for individual ports on the
device. You can also use the drop-down list at the top of the tab to load device and port
configuration settings from a template or import a template from the Extreme
Management Center server into Extreme Management Center.
Import Template
Click to open a window from which you can select a device and port configuration
template saved on the Extreme Management Center server.
Rename/Delete Template
Click rename or delete a device and port configuration template saved on the
Extreme Management Center server.
Save Device & Port Config Settings To Template
Click to save the settings you define on the Device Configuration and Port
Configuration tabs to a template you can load for other devices.
Load Device & Port Config Settings From Template
Click to load a previously saved template of settings you previously defined on the
Device Configuration and Port Configuration tabs.
Authentication Status
Use this section to select the authentication mode and types used on the device.
Use the fields on the left side of this section to select the appropriate single- or
multi-user authentication types. Only options supported by the selected device are
available for selection. Some devices support multiple authentication types and
multiple users (Multi-User Authentication) per port, while others are restricted to
only one or two authentication types and single users per port. Refer to the
Firmware Support matrix for information on the authentication types supported by
each device type.
94 of 805
Device Configuration
95 of 805
Device Configuration
Session Timeout
This setting represents the maximum number of seconds an authenticated session
may last before automatic termination of the session. A value of zero indicates that
no session timeout applies. This value may be superseded by a session timeout
value provided by the authenticating server. For example, if a session is
authenticated by a RADIUS server, that server may send a session timeout value
in its authentication response.
NOTE: Non-zero values are rounded to the nearest non-zero multiple of 10 by the device.
96 of 805
Device Configuration
Set Password/Mask
Select this checkbox to set a password and mask for MAC authentication.
MAC User Password
The password passed to the RADIUS server for MAC authentication.
MAC Mask
You can select a mask to provide a way to authenticate end-systems based on a
portion of their MAC address. For example, you could specify a mask that would
base authentication on the manufacturers ID portion of the MAC address. The
MAC Mask is passed to the RADIUS server for authentication after the primary
attempt to authenticate using the full MAC address fails.
MAC Address Delimiter
The character used between octets in a MAC address:
l None — No delimiter is used in the MAC address (e.g. xxxxxxxxxxxx).
l Hyphen — A hyphen is used as a delimiter in the MAC address (e.g. xx-xx-xx-
xx-xx-xx).
General
The General section lets you specify the URL of the authentication web page and the IP
address of the system where it resides. It also lets you enable certain web authentication
features, such as Enhanced Login Mode, on devices that support those features.
97 of 805
Device Configuration
For example, if an end-user (in Enhanced Login Mode and a Redirect Time of 30
seconds) enters the URL of "http://ExtremeNetworks.com", the user is presented
the authentication web page. When the user successfully authenticates into the
network, the user sees a login success page that displays "Welcome to the
Network. Completing network connections. You will be redirected to
http://ExtremeNetworks.com in approximately 30 seconds."
WINS/DNS Spoofing
This setting allows you to enable and disable WINS/DNS spoofing for the selected
device. Spoofing allows the end-user to resolve the Web Authentication URL
98 of 805
Device Configuration
name to the IP address using WINS/DNS. The default is Disabled. This option is
grayed out if not supported by the device.
Logo Display Status
Specifies whether the Extreme Networks logo is displayed or hidden on the
authentication web page window. This option is grayed out if not supported by the
device.
Authentication Protocol
This setting is the authentication protocol being used (PAP or CHAP). PAP
(Password Authentication Protocol) provides an automated way for a PPP (Point-
to Point Protocol) server to request the identity of user, and confirm it via a
password. CHAP (Challenge Handshake Authentication Protocol), the more
secure of the two protocols, provides a similar function, except that the confirmation
is accomplished using a challenge and response authentication dialog.
Web Authentication URL
This is the URL for your authentication web page. Users wishing to receive
network services access the web page from a browser using this URL. The http://
is supplied. Alphabetical characters, numerical characters and dashes are allowed
as part of the URL, but dots are not. The URL needs to be mapped to the Web
Authentication IP address in DNS or in the hosts file of each client. It must be
resolvable via DNS/WINS, either on the device or at corporate, assuming the Web
Authentication mapping has been set up on the corporate DNS/WINS service. This
option is grayed out if not supported by the device.
Web Authentication IP Address
This is the IP address of your authentication web page server. If you have specified
a Web Authentication URL, the IP address needs to be mapped to the URL in DNS
or in the host file of each client.
Guest Networking
The Guest Networking section lets you configure guest networking, a feature that allows
any user to access the network and obtain a guest policy without having to know a
username or password. The user accesses the authentication web page, where the
username and password fields are automatically filled in, allowing them to log access as
a guest. If the user does not want to log in as a guest, they can type in their valid
username and password to log in.
NOTE: Guest networking is designed for networks using web-based authentication, with port
mode set to Active/Discard.
99 of 805
Device Configuration
100 of 805
Device Configuration
The Default button allows you to reset the banner to default text provided in a text
file (pwa_banner.txt). Initially, the default banner text is the Extreme Networks
contact information. However, you can customize the text for your network by
editing the pwa_banner.txt file, located in the top level of the Policy Manager install
directory. Then, when you click the Default button, the new text will be displayed in
the Web Page Banner area.
101 of 805
Device Configuration
CEP Type
Lists the CEP types supported by the device.
Role
Lists the role mapped to each CEP Type.
Add
Select a CEP Type and click the Add button to open the Add Role Mapping
window, where you can select a role for the selected CEP Type. Your selections
are added to the CEP Role Mappings list.
Remove
Select the CEP Type and click Remove to remove the CEP Type in the CEP Role
Mappings list.
NOTE: CEP detection rules apply only to Siemens, H.323, and SIP (Session Initiation Protocol)
phone detection. Cisco detection uses CiscoDP as its detection method.
102 of 805
Device Configuration
l TCP/UDP Port Number detection — Many CEP vendors use specific TCP/UDP
port numbers for call setup on their IP phones. You can create detection rules that
identify CEP devices based on specific TCP/UDP port numbers. By default,
Siemens Hi-Path phones are detected on TCP/UDP port 4060.
l IP Address detection — H.323 phones use a reserved IP multicast address and
UDP port number for call setup. You can create detection rules to detect an IP
phone based on its IP address in combination with an IP address mask. By default,
H.323 phones are detected using the multicast address 224.0.1.41 and the
TCP/UDP ports 1718, 1719, and 1720. SIP phones are detected using the
multicast address 224.0.1.75 and the TCP/UDP port 5060. H.323 and SIP phones
are also detected using only their respective multicast addresses without the
TCP/UDP ports.
Priority
The rule priority with one (1) being the highest priority. The rule with the highest
priority is used first, so it is recommended the highest priority be given to the
predominate protocol in the network to provide for greater efficiency.
Address
If the rule is based on IP address detection, this field displays the IP address that
incoming packets matched against. By default, H.323 uses 224.0.1.41 as its IP
address, SIP uses 224.0.1.75 as its IP address, and Siemens has no IP address
configured.
Address Mask
If the rule is based on IP address detection, this field displays the IP address mask
against which incoming packets are matched.
End Point Type
Specifies the end-point type assigned (H.323, Siemens, or SIP) if incoming
packets match this rule.
103 of 805
Port Configuration
Protocol
If the rule is based on TCP/UDP port detection, this field displays the protocol type
used for matching, using a port range defined with the Port Low and Port High
values:
l UDP + TCP — Match the port number for both UDP and TCP frames.
l TCP — Match the port number only for TCP frames.
l UDP — Match the port number only for UDP frames.
Port Low
The low end of the port range defined for detection on UDP and/or TCP ports.
Port High
The high end of the port range defined for detection on UDP and/or TCP ports.
Add
Opens the Add/Edit CEP Detection Rule window where you can create CEP
detection rules.
Remove
To remove a CEP detection rule, select the entry and click Remove.
Edit
To edit a CEP detection rule, select the rule and click Edit. The Add/Edit CEP
Detection Rule window opens where you edit the rule's parameters. You can also
double-click an entry in the table to open the edit window.
Port Configuration
The Port Configuration tab allows you to configure authentication for the ports of a
device.
The Authentication Configuration tab has six sections:
l Authentication Mode
l RFC3580 VLAN Authorization
l Login Settings
l Automatic Re-Authentication
l Authenticated User Counts
l CEP Access
104 of 805
Port Configuration
Authentication Mode
This section displays general authentication and port mode information about the port.
Port Mode
This area displays the current port mode for the port, and allows you to change the
settings if desired. Port mode defines whether or not a user is required to authenticate on
a port, and how unauthenticated traffic will be handled. It is a combination of
Authentication Behavior (whether or not authentication is enabled on the port), and
Unauthenticated Behavior (whether unauthenticated traffic will be assigned to the port's
default role or discarded). See Port Mode for a complete description of each port mode.
In addition, this section provides checkboxes that allow you to disable a specific
authentication type at the port level.
Auth/Unauth Behavior
Select an option to specify how authenticated and unauthenticated traffic is
handled on the port. (See Port Mode for more information.) If you set the port's
Authentication Behavior to Active (i.e., you enable authentication for the port), it is
recommended that you enable the Drop VLAN Tagged Frames feature.
NOTE: Authentication Behavior must be set to Active for authentication to be allowed using
CEP Protocols.
105 of 805
Port Configuration
106 of 805
Port Configuration
107 of 805
Port Configuration
supports a mechanism through which the egress state may be returned in the
RADIUS response.
The current egress settings for the port are displayed in the VLAN Oper Egress
column in the User Sessions tab. These options are grayed out if not supported by
the device.
Apply Button
Saves any change you made to the VLAN Authorization settings.
Login Settings
This tab displays the current login settings for the port and allows you to change the
settings if desired. The options available depend on what type(s) of authentication are
enabled on the device.
108 of 805
Port Configuration
109 of 805
Port Configuration
Automatic Re-Authentication
This tab is grayed out if only web-based authentication is enabled on the device. For
802.1X and MAC authentication, the Automatic Re-Authentication tab lets you set up the
periodic automatic re-authentication of logged-in users on this port. Without disrupting
the user's session, the device repeats the authentication process using the most recently
obtained user login information to see if the same user is still logged in. Authenticated
logged-in users are not required to log in again for re-authentication, as this occurs
"behind the scenes."
110 of 805
Port Configuration
111 of 805
Port Configuration
NOTE: Port Mode Authentication Behavior must be set to Active (on the General sub-tab) for
authentication to be allowed using these CEP Protocols.
Enable CEP protocols for multiple ports using the Port Configuration Wizard. In addition
to enabling protocols on the port, you must also configure CEP for the device on which
the port resides. Configure CEP for a single device using the device Authentication tab
(CEP sub-tab) or for multiple devices using the Device Configuration Wizard.
CEP Access
Lists all the CEP protocols supported by the device on which the port resides. Use
the checkboxes to enable or disable CEP protocols on this port. If the device does
not support the CEP feature, this area is blank.
Related Information
For information on related windows:
l Add/Edit CEP Detection Rule Window
112 of 805
Port Configuration
The Control > Policy tab main window is the central point for all Policy tab tasks. It is
divided into a left panel and a right panel. The tabs in the left panel display hierarchical
trees that represent the roles, services, network elements, devices and port groups
involved in managing policies for your network. There are five left-panel tabs:
Roles/Services, Class of Service, VLANs, Network Resources, and Devices. The
tabbed pages in the right panel display detailed information about the item selected in
the left panel.
Information on Policy tab features:
113 of 805
Port Configuration
Icons
The icons used in the Policy tab and their meanings are as follows:
Icon Definition Icon Definition
Pre-Defined Groups User-Defined Groups
Lock
Reminds you the current Policy Domain is locked for editing purposes. You can
lock and unlock the domain from the Lock tool bar button.
Save
Reminds you that you've made changes, and you need to save the data to the
Policy Domain. Clicking this icon initiates the save operation. Only users with the
114 of 805
Port Configuration
Enforce
Reminds you that you've made changes to roles that you need to enforce. Clicking
this icon initiates the enforce operation.
Related Information
For information on related windows:
l Details View Tabs
l Left Panel
Policy Windows
The Windows Help section contains Help topics describing Policy tab windows and their
field definitions.
Policy Concepts
115 of 805
Port Configuration
l Dynamic Egress
l Setting Domain GVRP Status
l Policy VLAN Islands
l Traffic Mirroring
l Port Groups
l Network Resource Groups
l Network Resource Topologies
l Verifying
l Enforcing
l Controlling Client Interactions with Locks
Policy
In the Policy tab, network access policies are called Roles. See Role, below, for a
description.
Role
What is a Role
A role is a set of network access services that can be applied at various access points in
a policy-enabled network. A port takes on a user's role when the user authenticates.
Roles are usually named for a type of user such as Student or Engineering. Often, role
names match the naming conventions that already exist in the organization. A role can
contain any number of services in the Policy tab.
A role may also contain default access control (VLAN) and/or class of service (priority)
characteristics that will be applied to traffic not identified specifically by the set of access
services contained in the role. The set of services included in a role, along with any
access control or class of service defaults, determine how all network traffic will be
handled at any network access point configured to use that role.
Default Role
Once you have created a role, assign it as the default role for a port (see Assigning
Default Roles to Ports).
116 of 805
Port Configuration
Policy Domains
The Policy tab provides the ability to create multiple policy configurations by allowing
you to group your roles and devices into Policy Domains. A Policy Domain contains any
number of roles and a set of devices that are uniquely assigned to that particular domain.
Policy Domains are centrally managed in the database and shared between the Policy
tab clients.
In the Policy tab, you work in one current domain at a time. Each domain is identified by
a unique name. The Domain menu lets you easily switch from one domain to another.
There is no limit to the number of domains you can create, however, a device can exist
in only one Policy Domain.
The first time you launch the Policy tab, you are in the Default Policy Domain. You can
manage your entire network in the Default Policy Domain, or you can create multiple
domains each with a different policy configuration, and assign your network devices to
the appropriate domain. The roles, services, rules, VLAN membership, and class of
service in this initial configuration define a suggested implementation of how network
traffic can be handled. This is a starting point for a new policy deployment and often
needs customization to fully leverage the power of a policy-enabled network.
The Policy tab ships with a set of domain configurations that provide ready-made
workflows for common policy scenarios. Each domain configuration contains all the
elements (roles, services, rules, VLAN membership, class of service) that define how
network traffic is handled for each scenario. These domains are listed in the
Open/Manage Domain menu.
You can import the data elements from one domain into another domain. You can also
import a domain saved as a policy Database file (.pmd file) or data from a Database file
into a domain, and you can export a domain or data from a domain to a .pmd file, (one
file per domain) for backup and troubleshooting purposes. Verify and Enforce operations
are performed only on the current domain.
In order for your network devices to be displayed on the left-panel Devices tab, they must
be assigned to a Policy Domain. Initially, you must add your devices to the Extreme
Management Center database. Once devices have been added to the Extreme
Management Center database, you can assign the devices to a Policy Domain using the
Policy tab. As soon as a device is assigned to a domain, it is automatically displayed on
the left-panel Devices tab. Only devices that support policy are displayed in the Policy
tab.
The Policy tab automatically locks the current Policy Domain when you begin to edit the
domain configuration. Other users are notified that the domain is locked and they are not
117 of 805
Port Configuration
be able to save their own domain changes until the lock is released. For more
information, see Controlling Client Interactions with Locks. After a Policy Domain has
been changed, you must save the domain to notify all clients viewing that domain of the
change and automatically update their view with the new configuration.
Service
Services are sets of rules that define how network traffic for a particular network service
or application should be handled by a network access device. A service might consist of
only one rule governing, for example, email priority, or it might consist of a complex set of
rules combining class of service, filtering, rate limiting, and access control (VLAN)
assignment. The Policy tab allows you to create Local Services (services that are
unique to the current domain) and Global Services (services that are common to all
domains). Global Services let you easily create and manage services shared between
all your domains. A service can be included in any number of roles.
As an example, you might create a service called High Priority Internet Web
Access that contains priority classification rules for traffic directed toward each of your
organization's Internet proxy servers. This service would likely contain one traffic
classification rule for each of your Internet proxy servers.
Services can be one of two types: Manual Service or Automated Service.
l Manual Service - This service consists of one or more traffic classification rules
you create based on your requirements. Manual services are good for applying
customized sets of rules to roles.
l Automated Service - This service automatically creates a rule with a specified
action (class of service and/or access control), for each device in a particular
network resource group. You create a network resource group using a list of IP
addresses or an IP subnet, and then associate the group with the Automated
service (see How to Create a Network Resource Group for more information).
Automated rule types include Layer 3 IP Address and IP Socket rules, and Layer 4
IP UDP Port and IP TCP Port rules.
Services provide a common language that network engineers, information technology
administrators, and business managers understand. See How to Create a Service for
more information.
Rule
What is a Rule
Policy rules define one element of how traffic for a particular network service or
118 of 805
Port Configuration
application is handled by a network access device. For example, you might create a rule
that assigns a certain priority to all email traffic, by adding an 802.1p, ToS, or DiffServ
value to all SMTP traffic. A policy rule can be included in any number of services and
you can select the types of devices to which the rule applies. You create rules by right-
clicking a Service in the Service Repository tab and selecting Create Rule.
See Traffic Classification Rules for a detailed explanation of rules.
Disabling Rules
You can elect to disable a rule during or after its creation. If you disable a rule, it is
temporarily unavailable for use by the current service, but it can still be copied to other
services and enabled, or re-enabled at another time for the current service. Disabling a
rule is a way to temporarily remove a rule from your service without having to delete and
recreate it. You disable rules by right-clicking a Service in the Service Repository tab
and selecting Disable Rule.
Conflict Checking
As you create your Policy view services and rules, you may define conflicting rules. A
conflict exists when two rules in the same service or role define different actions for the
same traffic description. For example, two rules might have the same traffic description,
but forward traffic to different VLANs, or have different priorities. Extreme Management
Center ensures that conflicting rules do not coexist in the same role or service by
checking rule traffic descriptions and action values, providing a message if conflicts are
found, and writing the conflict information to the Event Log. If a rule is disabled, conflicts
between that rule and others are ignored.
The one exception to this conflict checking behavior, is when the conflicting rules coexist
in the same role, but one rule exists in a Local service and the other exists in a Global
service. In this case, the rule defined in the Local service takes precedence over the rule
defined in the Global service because the Local service is specific to the current domain.
Consider the following example:
In the North Campus domain you have a Local service "A" that assigns an Ethertype IP
rule to the Red VLAN. The "A" service is assigned to the Student Role. In addition, a
Global service "B" exists that assigns Ethertype IP rules to the Blue VLAN. The "B"
service is also assigned to the Student Role. In this case, the Local service takes
precedence over the Global service in the North Campus domain. Note that the
precedence pertains to the rule's actions: class of service (priority) and access control
(VLAN). For example, if a rule in a Local service and a rule in a Global service both have
the same traffic description, and the Local rule's actions apply CoS Priority 1 and no
access control (no VLAN), while the Global rule's actions apply CoS Priority 2 and
VLAN Blue(2), then the rule will be enforced using CoS Priority 1 and VLAN Blue(2). In
119 of 805
Port Configuration
addition, if either the Local or Global service has the Accounting or Security actions
enabled, then they will be enforced to the devices.
Packet Tagging
Packet tagging in a Policy view environment occurs as follows:
Tagged packets and ingress filtering are processed first. Then, VLAN ID and priority are
determined.
l VLAN ID: If the packet matches an active VLAN classification rule on the ingress
port, the VID (VLAN ID) specified in the matching VLAN classification rule is
assigned. Otherwise, if there is an active role on the ingress port and it specifies a
default VLAN, the default VID from the active role on the ingress port is assigned. If
there is no active role and no classification rule matches, the 802.1Q PVID for the
ingress port is assigned.
l Priority: If the packet matches an active priority classification rule on the ingress
port, the priority specified in the matching priority classification rule is assigned.
Otherwise, if there is an active role on the ingress port and it specifies a default
priority, the default priority from the active role on the ingress port is assigned. If
there is no active role and no classification rule matches, the 802.1Q_PPRI for the
ingress port is assigned.
The set of classification rules active on a port includes statically created rules that
specify the ingress port on their port list, as well as any rules established as a result of a
role being applied on that port. If the port has no active role and thus no default access
control (VLAN) or class of service (priority), untagged packets that do not match any
classification rules are assigned a VLAN and priority from the 802.1Q and 802.1p
defaults for the ingress port.
For a graphical illustration of the packet tagging process in a Policy view scenario, see
the Packet Flow Diagram. The packet passes through the decision-making process
illustrated in the graphic twice — once for VLAN tagging and once for priority tagging.
120 of 805
Port Configuration
RADIUS server returns a VLAN ID in its RADIUS VLAN Tunnel Attribute. The
device uses the Authentication-Based VLAN to Role mapping list to determine
what role to assign to the end user, based on the VLAN Tunnel Attribute.
Authentication-Based VLAN to Role mappings are only configured at the device
level (for all devices).
NOTE: When configuring Authentication-Based VLAN to role mapping, you must enable
RFC3580 VLAN Authorization on the device via the device Authentication tab. In
addition, VLAN IDs must be configured on the RADIUS server for each user
authorized to access the network. If a user does not have a configured VLAN ID, the
default role (if there is one) or the 802.1Q PVID for the ingress port is assigned. For
more information on configuring VLAN ID attributes on the RADIUS server, refer to
your device firmware documentation, RFC 3580, and your RADIUS server
documentation.
To configure VLAN to Role Mapping in the Policy view, use the role's Mappings tab
and/or the VLAN's General tab.
Dynamic Egress
In the VLANs tab, you can enable Dynamic Egress for a VLAN by selecting the Dynamic
Egress checkbox when you select a VLAN.
121 of 805
Port Configuration
When Dynamic Egress is enabled for a VLAN, any time a device tags a packet with that
VLAN ID, the ingress port is automatically added to the VLAN's egress list, enabling the
reply packet to be forwarded back to the source. This means you do not need to add the
ingress port to the VLAN's egress list manually. (See Example 1, below.)
Dynamic Egress affects only the egress lists for the source and destination ingress ports.
However, GVRP (GARP VLAN Registration Protocol) automatically adds the
interswitch ingress ports to the egress lists of VLANs. (See Example 2, below.) You can
enable GVRP for the domain by selecting the Global Domain Settings > GVRP >
Enable menu option.
NOTE: If you do not want GVRP enabled on your network, you can disable it by selecting the
Global Domain Settings > GVRP > Disable menu option. If necessary, you can then
manually configure the interswitch ports to do what GVRP does automatically, using local
management to set up your interswitch links as Q trunks. The trunk ports will be
automatically added to the egress lists of all the VLANs at the time of trunk configuration.
For more information on using GVRP in the Policy view, see the section on Setting Domain
GVRP Status below.
When you disable Dynamic Egress for a VLAN, the VLAN effectively becomes a discard
VLAN. Since the destination port is not added to the egress list of the VLAN, the device
discards the traffic. If you want a VLAN to act as a discard VLAN, disable Dynamic
Egress for that VLAN. (See Example 3, below.)
If an endstation is talking to a "silent" endstation which does not send responses, like a
printer, you need to add the silent endstation's ingress port to the VLAN's egress list
manually using local management. Dynamic Egress and GVRP take care of adding the
other ingress ports to the VLAN's egress list. (See Example 4, below.)
CAUTION: If no packets are tagged with the applicable VLAN on a port within five minutes,
Dynamic Egress list entries time out. The result is that an endstation appears "silent"
if the VLAN has not been used within that time period. For example, if there is a
"telnet" rule and two users (A and B) are on ports whose role includes a service
containing the "telnet" rule, if User B has not utilized the "telnet" rule within the five
minute time frame, User A is not able to telnet to User B. For this reason, the best
application of Dynamic Egress is for containing undirected traffic on "chatty" clients
which utilize, for example, IPX, NetBIOS, AppleTalk, and/or broadcast/multicast
protocols such as routing protocols.
In this example, Dynamic Egress is enabled for VLAN 5. When source endstation A is
tagged with VLAN 5, Dynamic Egress places A's ingress port (1) on VLAN 5's egress
list. When destination endstation B's traffic is tagged with VLAN 5, Dynamic Egress
122 of 805
Port Configuration
places B's ingress port (2) on VLAN 5's egress list. The device can then forward traffic to
both endstations.
In this example, Dynamic Egress is enabled for VLAN 5, and the destination endstation,
B, is on a different device from the source endstation, A. When A is tagged with VLAN 5,
Dynamic Egress places A's ingress port (1) on VLAN 5's egress list. GVRP then places
interswitch ingress ports (2) and (3) on VLAN 5's egress list. When B's traffic is tagged
with VLAN 5, Dynamic Egress places B's ingress port (4) on VLAN 5's egress list. GVRP
then places interswitch ingress ports (5) and (6) on VLAN 5's egress list. The devices
can then forward traffic to both endstations.
In this example, Dynamic Egress is disabled. When source endstation A is tagged with
VLAN 5, A's ingress port is not placed on VLAN 5's egress list. GVRP places interswitch
ingress ports (1) and (2) on VLAN 5's egress list. When B's traffic is tagged with VLAN 5,
B's ingress port is not placed on VLAN5's egress list. GVRP places interswitch ingress
ports (3) and (4) on VLAN 5's egress list. But VLAN 5 traffic for both A and B is
discarded, because VLAN 5 is not aware of the ingress ports for A and B.
123 of 805
Port Configuration
In this example, Dynamic Egress is enabled for VLAN 5, but the destination endstation,
B, is a "silent" endpoint, like a printer. Endstation B does not send responses, so the
Administrator must place B's ingress port on VLAN 5's egress list manually (1). When A
is tagged with VLAN 5, Dynamic Egress places A's ingress port (2) on VLAN 5's egress
list. GVRP then places interswitch ingress ports (3) and (4), then (5) and (6) on VLAN 5's
egress list. Endstation A is then able to communicate with the printer.
124 of 805
Port Configuration
l Enable — When this option is selected, GVRP is enabled for the devices in the
current domain.
l Disable — Select this option if you do not want GVRP enabled on the devices in the
current domain. Disabling GVRP may affect connectivity through ports with VLANs
that rely on Dynamic Egress. If GVRP is disabled, rules using VLAN containment
may not work properly unless the VLANs have been pre-configured on the devices
outside of Extreme Management Center.
The following table shows how domain GVRP status affects device-level and port-level
GVRP status when an Enforce operation is performed.
125 of 805
Port Configuration
NOTE: The Policy view provides management of Global VLAN settings, but does not provide
management of Island VLANs beyond setting the appropriate VIDs in the Role defaults
and Rule access control actions. Also, you must manage separately other related settings
in the qBridgeMib such as name, and dynamic egress values.
Traffic Mirroring
The Policy view provides policy-based traffic mirroring functionality that allows network
administrators to monitor traffic received at a particular port on the network, by defining a
class of traffic that will be duplicated (mirrored) to another port on that same device
where the traffic can then be analyzed. Traffic mirroring can be configured for a rule
(based on a traffic classification) or as a role default action. Only incoming traffic can be
mirrored using policy-based traffic mirroring, and the traffic mirroring configuration takes
precedence over regular port-based mirroring.
Traffic mirroring uses existing the Policy view port groups (created using the Port Groups
tab) to specify the ports where the mirrored traffic will be sent for monitoring and
analysis. When an end user connects to the device where the specified ports exist, and
is assigned the role that has traffic mirroring configured, then there is a traffic mirror set
up for the port the end user connected to. However, if the end user is assigned a role that
does not have traffic mirroring configured, or if the end user connects to a device that
doesn't have any ports in the specified port groups, then no traffic mirror will exist.
Examples of how traffic mirroring might be used include:
l Mirroring the traffic from suspicious users based on their MAC or IP address.
l Monitoring VoIP calls by IP address or port range.
l Mirroring traffic to optimized IDS systems, for example one system for all HTTP
traffic (to look for suspicious websites) or one system for all emails (to look for
spam).
l Mirroring traffic to ExtremeAnalytics appliances for use in Extreme Management
Center application identification reports and analysis.
For information on configuring traffic mirroring, see the Role tab and the Rule General
tab.
Port Groups
Extreme Management Center allows ports to be combined into groups, similar to the way
services can be combined into service groups. Port groups enable you to configure
126 of 805
Port Configuration
127 of 805
Port Configuration
resources based on the departments within a company (such as Sales, IT, or Human
Resources).
When you create a topology, it contains a Default Island that includes all the devices in
your domain. You can then create additional islands and distribute your devices
between the different islands according to your needs. Each device in a domain must
belong to one island in each topology. You can set any island as the Default island for
new devices that are added to the domain.
Verifying
The Verify feature lets you verify that the roles in your current domain have been
enforced. Verify operations are performed only on the current domain. The Verify
operation compares the roles currently in effect (enforced) on your domain devices with
the roles defined in the current Policy Domain.
NOTE: If you perform a Verify operation following an Import Policy Configuration from Device, the
Verify may fail. This is because the import operation imports only roles and rules from the
device, not the complete policy configuration. Also, when you import device-specific rules,
these rules are converted to a Rule Type of "All Devices," and this will cause Verify to fail. If
you want the rules to be device-specific, you will have to change their Rule Type via the
Rule General tab after the import and prior to Enforce.
You can verify using the Open/Manage Domain > Verify Domain menu option, both of
which verify the information on all the devices in the current domain. You can also
selectively verify on individual devices or device groups in the domain by right-clicking
the device or group in the left panel or in the right-panel Details View tab for the Devices
folder or Device Group folder, and choosing Verify from the menu.
After verifying, you see a window that reports any discrepancies. The title bar of the
window lets you know if the verify was done on all devices in the domain, or a subset of
devices. From this window, you can select Enforce Domain to open the Enforce Preview
window, where you can view the effects enforcing the current role set would have, prior
to actually enforcing. You can also view the full results of the Verify operation in the
event log, which displays any discrepancies and statistics of the operation itself.
Enforcing
In the Policy tab, enforcing means writing role information to a device or devices.
Enforce operations are performed only on the current domain. Any time you add, make a
change to, or delete a role or any part of it (any of its services and/or rules), the devices
in your current domain need to be informed of the change, otherwise the role will not
take effect. To determine if the roles currently in effect on your domain devices match the
128 of 805
Port Configuration
set of roles you have defined in your current Policy Domain configuration, use the Verify
feature.
NOTE: Setting up Profiles and Credentials for Enforce. All SNMP operations that are performed
from the Policy view client use the SNMP credentials of the logged-in user. For example,
when devices are identified, the credentials associated with the user's group are used to
communicate with the devices. However, the Enforce operation occurs on the server and
uses the Extreme Management Center Administrator profile to communicate with devices.
Because of this, the Extreme Management Center Administrator profile must have write
privileges on the devices that users can enforce.
When an Enforce is initiated, the Policy Domain is locked to prevent other clients from
enforcing at the same time. Different Policy Domains can be enforced at the same time,
but if another user attempts to enforce the same domain at the same time, that user will
be notified that the domain is already locked.
To enforce, select the Open/Manage Domains > Enforce Domain menu option. You can
also selectively enforce on individual devices by right-clicking the device in the Devices
tab left panel or in the right-panel Devices tab and choosing Enforce from the menu.
Only users that have been assigned the Enforce capability are allowed to perform an
Enforce.
129 of 805
Policy Tab Right-Panel
l Locks operate on individual Policy Domains. When a user edits a domain, a lock is
acquired for that domain and it remains locked until the same user saves the
domain data or the lock is revoked by another user. You cannot save a domain that
is locked by another user.
l During Enforce, a lock is acquired on the domain which is being enforced. This
ensures a consistent view of the domain while it is being used by the server.
l When devices are being assigned to a Policy Domain, multiple domains may be
locked concurrently. This will happen if devices from one domain are being
reassigned to another domain. In this case, locks for both domains are acquired.
l When a lock is revoked, the last domain save "wins." While consistency is always
maintained by the server, the order of domain saves cannot be guaranteed when
locks are revoked, and consequently work done by one user may be lost.
You can view server locks for all clients via the Options > Server Information tab.
Related Information
For information on related concepts:
l Traffic Classification Rules
For information on related tasks:
l Creating a Role
l How to Create a VLAN
For information on related windows:
l Create VLAN Window
The Policy tab main window is divided into two panels: a left panel and a right panel.
The Right-Panel Tabs Help section contains Help topics describing the tabs and their
field definitions.
The right panel displays different tabs and information depending on the item selected in
the left-panel tree. Help topics for right-panel tabs are named in a manner to reflect this.
For example, the help topic named Details View Tab (Device Group), provides
information on the right-panel Details View tab when a device group is selected in the
left-panel tree.
130 of 805
Policy Left Panel
The left panel of the Policy tab contains tabs that display hierarchical trees representing
the roles, services, classes of service, VLANs, network resources, devices, and port
groups involved in managing policies for your network. What you select in the left panel
determines what is displayed in the right panel. When you first open the Policy tab, the
Roles tab is displayed in the left panel, by default.
Features of the left panel include:
l Expanding and collapsing items in the hierarchy: Double-click the item or its icon,
or single-click the turner to the left of the icon.
l Right-click menus: Right-click a folder or other item in the left panel, and a menu of
the options you can perform on your selection appears.
Information on the left-panel tabs:
l Roles/Services Tab
l Network Elements/Port Groups Tab
l Access Control Configuration
l Class of Service Configuration
l Network Resources Configuration
l Devices/Port Groups
Roles/Services Tab
This tab displays the Roles and Service Repository trees.
Roles Tree
The Roles tree lists the roles defined for the current domain. A role is a set of network
access services that can be applied at various access points in a policy-enabled
network.
131 of 805
Policy Left Panel
Roles Folder
This folder contains the roles defined for the current domain. See How to Create a
Role for more information.
Role
Individual roles are listed by name. Select a role in the left panel, and view
information about that role in the right-panel tabs. Only Quarantine roles are
displayed with a red icon .
132 of 805
Policy Left Panel
133 of 805
Policy Left Panel
Service Group
Individual service groups are listed by name. Expand the service group to see the
services and service groups included in that group.
Services Folder
This folder contains the automated and manual services that have been defined.
For more information, see How to Create a Service.
Automated Service
Individual Automated services are listed under the Services Folder or within a
service group in the Service Groups folder.
Manual Service
Individual Manual services are listed under the Services Folder. Expand the
service to see the rules associated with it.
Rule
Individual rules are listed by name. If the rule is disabled, the rule icon displays a
red X . If the rule is device-specific, the rule icon displays a small switch .
Classes of Service prioritize traffic with an 802.1p priority, and optionally an IP type of
service (ToS/DSCP) value, rate limits, and transmit queue configuration. You can then
assign the class of service as a classification rule action, as part of the definition of an
Automated service, or as a role default. For more information, see Getting Started with
Class of Service.
134 of 805
Policy Left Panel
Class of Service
Select a Class of Service in the left panel, and view information about that service
in the right-panel tabs. For more information, see How to Create a Class of
135 of 805
Policy Left Panel
Service.
CoS Components Folder
This folder contains subfolders of the possible components of a class of service
(Rate Limits, Inbound Rate Limit Port Groups, Outbound Rate Limit Port Groups,
and Transmit Queue Port Groups).
Rate Limits Folder
This folder contains the currently defined rate limits, listed in the order of
precedence. For more information, see How to Define Rate Limits.
Inbound Rate Limit Port Groups
This folders contains the currently defined inbound rate limit port groups. Select a
port group in the left panel and view information about that group in the right-panel
tabs. For more information, see Creating Class of Service Port Groups.
Outbound Rate Limit Port Groups
These folders contain the currently defined outbound rate limit port groups. Select
a port group in the left panel and view information about that group in the right-
panel tabs. For more information, see Creating Class of Service Port Groups.
Transmit Queue Port Groups Folder
This folder contains the currently defined transmit queue port groups and the
transmit queues defined for each group. For more information, see How to
Configure Transmit Queues.
VLAN Tab
The left panel VLAN tab displays the Global VLANs for the current domain. If you have
enabled Policy VLAN Islands, it also displays your Island VLANs and Policy VLAN
Islands.
136 of 805
Policy Left Panel
VLAN
The VLAN icon indicates the access control for the VLAN-- if it is a Discard VLAN,
the icon displays a red X . Otherwise, it is a Contain VLAN.
VLAN Island
Click on a VLAN island to see the devices associated with it listed in the right-
panel Details View tab. The Default Island is created by the Policy tab when you
enable Policy VLAN Islands, and it cannot be deleted.
137 of 805
Policy Left Panel
Network Resource
Individual network resource groups are listed by name. Select a resource in the left
panel, and view information about that resource in the right-panel tabs.
138 of 805
Policy Left Panel
based on the physical location at which they authenticate. If you are not using
custom topologies to group your devices, you will use the Domain Wide topology,
which contains just one island for all your domain devices.
Topology Island
A topology island is a group of devices that have a unique network resource list,
allowing you to set up network resource access based on the location where end
users authenticate.
Devices Tree
The Devices tree displays the devices assigned to the current domain, organized into
groups.
139 of 805
Summary (Roles)
Devices
This tab contains all the devices assigned to the current domain. For information
on adding devices to the domain, see How to Add and Delete Devices.
Port Groups
This tab contains the Pre-Defined and User-Defined Port Groups for the current
domain. The Policy tab allows ports to be combined into groups, similar to the way
devices are combined into device groups. Port groups enable you to configure
multiple ports on the same device or on different devices simultaneously, or to
retrieve port information from them. For more information, see How to Create a Port
Group.
Related Information
For information on related windows:
l Main Window
l Right Panel
Summary (Roles)
This tab provides a summary view of the domain's roles. To access this tab, select the
Roles left-panel tab in the Roles/Services tab. Right-click a role to add/remove services,
rename the role, or delete the role.
140 of 805
General (Role)
Related Information
For information on related windows:
l General Tab (Roles)
l VLAN Egress Tab (Roles)
l Mappings Tab (Roles)
General (Role)
The role General tab lets you assign default actions for a role applied to traffic not
identified specifically by the set of access services contained in the role. You can also
use this tab to enable TCI Overwrite functionality for the role, and enter or edit the
description of the role.
The Services section displays a list of the services and service groups associated with
the selected role, and provides buttons for adding and removing services, creating a new
service, viewing and editing a service or service group, and showing conflicting rules.
To access this tab, select a role in the left panel's Roles tab, then select the General tab
in the right panel. Any additions or changes you make to this tab must be enforced in
order to take effect.
141 of 805
General (Role)
Name
Name of the selected role.
Description
Use the Edit button to open a window where you can enter or modify a description
of the role.
TCI Overwrite
Enable or disable TCI Overwrite functionality for the role. Enabling TCI Overwrite
allows the VLAN (access control) and class of service characteristics defined in
this role or any of its rules to overwrite the VLAN or class of service (CoS) tag in a
received packet if that packet has already been tagged with VLAN or CoS
information. If TCI Overwrite is not enabled, tagged packets will egress using the
TCI data they already contain. You can also enable TCI Overwrite on a per-rule
basis in the Rule Tab.
Default Actions
Default actions for a role are applied to traffic not identified specifically by the set of
access services contained in the role.
142 of 805
General (Role)
Access Control
Use the drop-down list to choose a default access control (VLAN) for the role. You
can select:
l None - No default access control specified.
l Permit Traffic - Allows traffic to be forwarded with the port's assigned VID.
l Deny Traffic - Traffic will be automatically discarded.
l Contain To VLAN - This option contains traffic to the VLAN specified. Use
the drop-down list to the right to select the desired VLAN. You can also select
the NSI (Network Service Identifier) to extend the VLAN address space. The
NSI is Extreme Management Center's implementation of a VXLAN, which
increases the number of available VLANs.
Class of Service
Use the drop-down list to choose a default class of service (priority) for the role,
create a new class of service, or select None if no class of service is desired. The
drop-down list displays all of the classes of service for the current domain and also
allows you to edit a class of service using the Edit button .
System Log
When this option is enabled, a syslog message is generated as long as no
matching rules specify that sending a syslog message is prohibited (that is, the
rule's system log action is set to "Prohibited" on the Rule Tab). When the option is
disabled, the system log setting is ignored.
Audit Trap
When this option is enabled, an audit trap is generated as long no matching rules
specify that sending an audit trap is prohibited (that is, the rule's audit trap action is
set to "Prohibited" on the Rule Tab). When the option is disabled, the audit trap
setting is ignored.
Disable Port
When this option is enabled, the port is disabled as long no matching rules specify
that disabling the port is prohibited (that is, the rule's disable port action is set to
"Prohibited" on the Rule Tab). Ports that have been disabled due to this option are
displayed in the device Role/Rule tab. When the option is disabled, the disable
port setting is ignored.
Traffic Mirror
Use the drop-down list to specify port groups where mirrored traffic is sent for
monitoring and analysis. Select View/Modify Port Groups to open the Port Groups
tab where you can define user-defined port groups for selection.
To the right of the drop-down list is an option to mirror only the first (N) packets of a
143 of 805
General (Role)
flow. This option is intended for use when mirroring traffic to an ExtremeAnalytics
engine. The ExtremeAnalytics engine only needs the initial packets of a flow to
properly identify the traffic, and setting this option will reduce network traffic
overhead for the switch and engine. By default this number is set to 10, but can be
changed by clicking on the Edit button . Note that the value you set is used by
all mirror actions in use in the current domain.
Services
Name
Lists the names of the services and service groups (local and global) associated
with the selected role.
Related Information
For information on related tasks:
l How to Create a Role
l How to Create a Class of Service
144 of 805
VLAN Egress (Role)
The role VLAN Egress tab displays the list of VLANs on the selected role's egress list,
and allows you to add and remove VLANs and set their Egress Forwarding State. Ports
that the selected role is active on forwards traffic belonging to the listed VLANs
according to the specified forwarding state. Both the role's egress list and the VLAN
egress list are checked for egress information. If the lists have duplications, the Forbid
Forwarding state takes precedence.
To access this tab, select a role in the left panel's Roles/Services tab and click the
VLAN Egress tab in the right panel. Any changes made on this tab need to be enforced.
VID
The VLAN ID.
Name
The VLAN Name.
Egress Forwarding State
Ports on which the selected role is active forward traffic belonging to this VLAN
according to the egress forwarding state: Tagged (frames are forwarded as
tagged), Untagged (frames are forwarded as untagged), or Forbid Forwarding
(frames are not forwarded; they are discarded).
Add
Opens the Add Egress VLAN Window, where you can choose a VLAN for the
role's egress list and specify the egress forwarding state.
145 of 805
VLAN Egress (Role)
Remove
Select a VLAN and click Remove to remove the VLAN from the list.
Related Information
For information on related windows:
l Add Egress VLAN Window
The Add Egress VLAN window appears when you click the Add button in the role's
VLAN Egress tab. It allows you to add a VLAN to the Role's Egress list and specify the
egress forwarding state.
VLAN
This is a drop-down list of the available VLANs.
Forwarding State
Select the desired forwarding state: Tagged (frames are forwarded as tagged),
Untagged (frames are forwarded as untagged), or Forbidden (frames are not
forwarded; they are discarded).
Related Information
For information on related tasks:
l How to Create a VLAN
For information on related windows:
l Create VLAN Window
l VLAN Egress Tab (Role)
146 of 805
Mappings (Role)
Mappings (Role)
This tab lets you view and configure four different mapping lists for the selected role:
l MAC to Role Mapping — Lets you assign the role to an end user based on the
user's MAC address.
l IP to Role Mapping — Lets you assign the role to an end user based on the user's
IP address.
l Tagged Packet VLAN to Role Mapping — Lets you assign the role to network traffic
based on the traffic's VLAN ID.
l Authentication-Based VLAN to Role Mapping — Lets you assign the role to an end
user during the authentication process, based on a VLAN Attribute.
To access this tab, select a role in the left-panel Roles tab and click the Mappings tab in
the right panel. Any additions or changes you make to this tab must be enforced in order
to take effect.
147 of 805
Mappings (Role)
firmware version 02.00.16 and higher), and D2, A4, and G3 devices (G3 firmware
version 6.03.xx and higher). These devices only support one device-level VLAN to
role mapping. If you do not make a selection, there will be no device-level mapping
for these devices. Use the Mappings tab in the Enforce Preview window to quickly
see which VLAN to role mapping is selected for these devices.
Type
This column indicates the type of mapping: MAC to Role, IP to Role, Tagged
Packet VLAN to Role, and Authentication based VLAN to Role.
Value
The MAC addresses, IP addresses, or VLAN mapped to this role.
Src/Dst
Specifies whether the MAC address is a source or destination address.
Device/Port Level
This column indicates whether the mapping is a device-level mapping (all devices)
or a port-level mapping (IP address and port description).
Add Button
Opens the Add Role Mapping window, where you can add a new Role mapping by
entering the Mapping Type, Value, and Direction.
Remove Button
Remove the selected mapping from the list by clicking Remove.
IP to Role Mapping
IP to Role mapping provides a way to assign a role to an end station based on its IP
address. For example, in networks that haven't deployed authentication, this would allow
you to map an individual IP address such as an administrator's laptop, to a specific role.
When the end station connects to the network, the policy-enabled device identifies the IP
address and applies the mapped role.
148 of 805
Mappings (Role)
Related Information
For information on related concepts:
l VLAN to Role Mapping
Add and remove services and service groups from roles using the Add/Remove
Services window.
To access the Add/Remove Services window, you must have a role selected in the left-
panel Roles tab. Click the Add/Remove button in the Services section of the Role
window.
If you add a service to a role and any or all of the following conditions exist, you are in
effect adding an "empty" service, and a warning message displays when you click OK:
149 of 805
Mappings (Role)
150 of 805
Details View (Service)
Related Information
For information on related tasks:
l Adding Services to a Role
l Removing Services from a Role
This tab displays information about the rules contained in a Manual service or an
Automated service. To display this tab:
1. Select a service in the left-panel's Roles/Services > Service Repository tab.
2. Open either the Local Services tab or Global Services tab, depending on the type
of service.
3. Select a service from within the Services left-panel tab.
The Details View tab opens in the right panel. Right-click a rule in the table to see a
menu of available options.
NOTE: Rules included in services are read in the order in which they are listed in Extreme
Management Center. To configure rules for ExtremeCloud Appliance (XCA) devices,
ensure Extreme Management Center lists the rules in the correct order or the service may
not execute the correct rule. To reorder rules in the same service, use drag-and-drop
capabilities to move from one group to another.
For Manual services, you can double-click on any of the table columns opens the rule's
General tab.
151 of 805
Details View (Service)
Name
Name of the rule. For rules contained in an Automated service, this column gives
detailed information about the rule including the associated Network Resource
(NR), if multiple resource groups are specified. You can rename a rule by right-
clicking the rule and selecting Rename.
Rule Status
Indicates whether the rule is currently available for use by this service (Enabled),
or not (Disabled), as set in the General tab for the rule. If the rule is disabled, the
rule icon displays a red X . You can enable or disable a rule by right-clicking
and selecting Enable Rule or Disable Rule, respectively.
Rule Type
Indicates the device types to which the rule applies. (See Create Classification
Rule Window for more information.)
152 of 805
Details View (Service)
CoS
Class of service action associated with the rule. Double-clicking on this column
allows you change the setting.
System Log
Displays whether the syslog functionality (a syslog message is generated when
the rule is used) is enabled, disabled, or prohibited for the rule. Double-clicking on
this column allows you change the setting.
l Enabled - If this option is enabled, a syslog message is generated when the
rule is used. This option must be enabled if you are configuring Policy Rule
Hit Reporting on your devices.
l Disabled - If this option is disabled and this rule is hit, it does not generate a
Syslog message, but lower-precedence rules and the role default actions
may still specify a syslog message be sent for this data packet if there is a
match.
l Prohibited - If this rule is hit, no syslog message is generated for this data
packet, even when a lower-precedence rule or the role default actions has
the System Log action set to enabled.
Audit Trap
Displays whether the audit trap functionality (an audit trap is generated when the
rule is used) is enabled, disabled, or prohibited for the rule. Double-clicking on this
column allows you change the setting.
l Enabled - If this option is enabled, an audit trap is generated when the rule is
used.
l Disabled - If this option is disabled and this rule is hit, it does not generate an
audit trap, but lower-precedence rules and the role default actions may still
specify generating an audit trap for this data packet if there is a match.
l Prohibited - If this rule is hit, no audit trap is generated for this data packet,
even when a lower-precedence rule or the role default actions has the Audit
Trap action set to enabled.
Disable Port
Displays whether the disable port functionality (ports reported as using this rule will
be disabled) is enabled, disabled, or prohibited for the rule. Double-clicking on this
column allows you change the setting.
l Enabled - If this option is enabled, any port reported as using this rule are
disabled.
153 of 805
Details View (Service)
l Disabled - If this option is disabled and this rule is hit, it does not disable the
port, but lower-precedence rules and the role default actions may still specify
disabling the port for this data packet if there is a match.
l Prohibited - If this rule is hit, the port is not disabled, even when a lower-
precedence rule or the role default actions has the Disable Port action set to
enabled.
Traffic Mirror
Displays whether the traffic mirror functionality is enabled, disabled, or prohibited
for the rule. Double-clicking on this column allows you change the setting.
l Select port group(s) - Use the drop-down list to specify the port groups
where mirrored traffic will be sent for monitoring and analysis.
l Disabled - If this option is disabled and this rule is hit, traffic mirroring will not
take place, but lower-precedence rules and the role default actions may still
specify traffic mirroring for this data packet if there is a match.
l Prohibited - If this rule is hit, traffic mirroring is disabled, even when a lower-
precedence rule or the role default actions has the Traffic Mirror action
specified.
TCI Overwrite
Displays whether TCI Overwrite is enabled, disabled, or prohibited for the rule.
Double-clicking on this column allows you change the setting.
l Enabled - Enabling TCI Overwrite allows the VLAN (access control) and
class of service characteristics defined in this rule to overwrite the VLAN or
class of service (CoS) tag in a received packet, if that packet has already
been tagged with VLAN or CoS information.
l Disabled - If this option is disabled the TCI Overwrite option is ignored, but
lower-precedence rules and the role default actions may still specify TCI
Overwrite for the data packet if there is a match.
l Prohibited - Do not set TCI Overwrite for this data packet, even when a
lower-precedence rule or the role default actions has the TCI Overwrite
option set to enabled.
Quarantine Role
Displays whether a Quarantine role is enabled, disabled, or prohibited for the rule.
Double-clicking on this column allows you change the setting.
l Select Role - Use the drop-down list to select the role that you want to assign
as a Quarantine role.
154 of 805
Details View (Service)
l Disabled - If this option is disabled and this rule is hit, a Quarantine role will
not be assigned, but lower-precedence rules may still specify a Quarantine
role for this data packet if there is a match.
l Prohibited - If this rule is hit, a Quarantine role will not be assigned, even
when a lower-precedence rule has a Quarantine role action specified.
Related Information
For information on related concepts:
l Traffic Classification Rules
For information on related windows:
l Rule Tab
155 of 805
Details View (Service)
Service Repository
Selecting Service Repository in the Roles/Services navigation panel in the left panel
opens the Service Repository panel.
Double-click Local Services to display the service groups and services associated with
the current domain or Global Services (All Domains) to display the service groups and
services available to all domains.
Name
Displays the Local or Global service groups and services.
Related Information
For information on related tasks:
l How to Create a Service
l How to Create a Service Group
156 of 805
Details View (Services)
Local/Global Services
Selecting Local Services or Global Services (All Domains) in the Roles/Services >
Service Repository navigation panel in the left panel opens the Local Services or Global
Services (All Domains) panel, respectively.
Double-click Service Groups to display the services that are part of a service group or
Services to view services not contained within a service group.
Name
Double-click one of the options to display the Service Groups or Services.
Related Information
For information on related tasks:
This tab lists the Automated and Manual services you create in the Policy tab. To display
the tab, expand the Local Services or Global Services left-panel tab in the
Roles/Services > Service Repository tab, and select the Services tab. To see a menu of
options available for a service, right-click the service.
157 of 805
Details View (Service Group)
For information on the differences between automated or manual services, and local or
global services, see the Policy tab Concepts Help topic's section on Services.
Name
Name of the service.
Number of Rules
Number of rules associated with the service.
Included in Roles Directly (Indirectly)
Number of roles in which the service is included.
Parent Service Group
The service group in which the service is included.
Related Information
For information on related tasks:
This tab lists information about the services or service groups contained in a Local or
Global service group. To display this tab, select a service group in the left-panel
Roles/Services > Service Repository tab.
158 of 805
Details View (Service Group)
Name
The name of the service or service group.
Number of Rules
The number of rules included in the service or service group.
Related Information
For information on related tasks:
l How to Create a Service
You can add and remove services from service groups using the Add/Remove Services
window.
To access the Add/Remove Services window, either select the Service Groups tab in
the Local Services or Global Services left-panel tab, right-click on a service group in the
159 of 805
Details View (Service Group)
right panel and select Add/Remove Services. You can also right-click on a service
group in the Service Groups left-panel tab and select Add/Remove Services from the
menu.
160 of 805
Rule
Related Information
For information on related tasks:
l Adding Services to a Service Group
l Removing Services from a Service Group
Rule
The rule General tab displays general information about the rule selected for a Service
in the left-panel Roles/Services > Service Repository > Local or Global Services tab
and enables you to change it. In addition, you can view and change the Traffic
Description and Actions associated with the rule. Traffic Description identifies the type of
traffic to which the rule pertains. Actions apply class of service, access control, and/or
accounting and security behavior to packets matching the rule.
Any additions or changes you make to this tab must be enforced in order to take effect. If
you modify an enabled rule's actions, the Policy tab checks for conflicts with other rules
in the services and roles with which the newly modified rule is associated. See Conflict
Checking for more information.
161 of 805
Rule
General Area
Service Name
Displays the name of the rule.
Description
Use the Edit button to open a window where you can enter or modify a description
of the rule.
Rule Status
Lets you disable the rule, or enable it if it's already disabled. If the rule is disabled,
it is unavailable for use by the current service, but can still be copied to other
services and enabled, or re-enabled at another time for the current service.
Disabling a rule is an alternative to deleting and recreating it. The rule icon in the
left panel displays a red X if the rule is disabled.
Rule Type
Use the drop-down list to select the types of devices to which you wish this rule to
apply when enforced. The recommended selection is All Devices, unless there is a
specific need for a device-specific rule. If this need arises, the Rule Type feature
allows services to be customized to contain rules specific to a device's type when
support for a traffic description and/or action may not be available on all managed
devices.
For device-specific rules, only those traffic descriptions supported on the device
are available when you define the rule's traffic description on this tab. For All
Devices rules, all traffic descriptions are available; however, you must be aware
that you cannot enforce the rule to a device on which it is not supported.
TCI Overwrite
Specify the TCI Overwrite functionality for the rule:
l Enabled — Enabling TCI Overwrite allows the VLAN (access control) and
class of service characteristics defined in this rule to overwrite the VLAN or
class of service (CoS) tag in a received packet, if that packet has already
been tagged with VLAN or CoS information.
l Disabled — If this option is disabled the TCI Overwrite option is ignored, but
lower-precedence rules and the role default actions may still specify TCI
Overwrite for the data packet if there is a match.
l Prohibited — Do not set TCI Overwrite for this data packet, even when a
lower-precedence rule or the role default actions has the TCI Overwrite
option set to enabled.
162 of 805
Rule
Remove Button
Removes the traffic description from the rule.
Edit Button
If a Traffic Description Type has been defined for the rule, clicking Edit opens the
Edit Rule window, where you can edit the parameters or values for the rule's
classification type.
Actions Area
The Actions area allows you to view and change the actions associated with a rule.
Actions apply access control, class of service, security, and/or accounting behavior to
packets matching the rule.
Access Control
Use this drop-down list to select the appropriate access control for the rule. You
can permit traffic to be forwarded, deny traffic altogether, or contain traffic to a
VLAN. Select None to disable access control for this rule.
l Permit Traffic — allows traffic to be forwarded with the port's assigned VID.
l Deny Traffic — traffic will be automatically discarded.
l Contain to VLAN — contains traffic to a specific VLAN. Use the drop-down list
to select the desired VLAN.
Class of Service
Use the drop-down list to select a class of service to associate with the rule. The
Policy tab lets you define classes of service that each include an 802.1p priority,
and optionally an IP type of service (ToS/DSCP) value, rate limits, and transmit
queue configuration. You can then assign a class of service as a classification rule
163 of 805
Rule
action. See Getting Started with Class of Service and How to Create a Class of
Service for more information. Select None to disable class of service for this rule.
When rule accounting is enabled on a device, each rule keeps a list of the ports on
which it has been used. Use the following three options to specify certain rule usage
actions to take place when a "rule hit" is reported.
System Log
Specify System Log functionality for the rule.
l Enabled — If this option is enabled, a syslog message is generated when the
rule is used. This option must be enabled if you are configuring Policy Rule
Hit Reporting on your devices.
l Disabled — If this option is disabled and this rule is hit, it does not generate a
Syslog message, but lower-precedence rules and the role default actions
may still specify a syslog message be sent for this data packet if there is a
match.
l Prohibited — If this rule is hit, no syslog message is generated for this data
packet, even when a lower-precedence rule or the role default actions has
the System Log action set to enabled.
Audit Trap
Specify Audit Trap functionality for the rule:
l Enabled — If this option is enabled, an audit trap is generated when the rule is
used.
l Disabled — If this option is disabled and this rule is hit, it does not generate
an audit trap, but lower-precedence rules and the role default actions may
still specify generating an audit trap for this data packet if there is a match.
l Prohibited — If this rule is hit, no audit trap is generated for this data packet,
even when a lower-precedence rule or the role default actions has the Audit
Trap action set to enabled.
Disable Port
Specify Disable Port functionality for the rule:
l Enabled — If this option is enabled, any port reported as using this rule will be
disabled. Ports that have been disabled due to this option are displayed in
the device Role/Rule tab.
l Disabled — If this option is disabled and this rule is hit, it does not disable the
port, but lower-precedence rules and the role default actions may still specify
disabling the port for this data packet if there is a match.
164 of 805
Rule
l Prohibited — If this rule is hit, the port is not disabled, even when a lower-
precedence rule or the role default actions has the Disable Port action set to
enabled.
Traffic Mirror
Specify traffic mirroring functionality for the rule:
l Select port group(s) — Use the drop-down list to specify the port groups
where mirrored traffic will be sent for monitoring and analysis. Select
View/Modify Port Groups to open the Port Groups tab where you can define
user-defined port groups for selection.
To the right of the drop-down list is an option to mirror only the first (N)
packets of a flow. This option is intended for use when mirroring traffic to an
ExtremeAnalytics engine. The ExtremeAnalytics engine only needs the initial
packets of a flow to properly identify the traffic, and setting this option will
reduce network traffic overhead for the switch and engine. By default this
number is set to 10, but can be changed by clicking on the Edit button .
Note that the value you set is used by all mirror actions in use in the current
domain.
l Disabled — If this option is disabled and this rule is hit, traffic mirroring will not
take place, but lower-precedence rules and the role default actions may still
specify traffic mirroring for this data packet if there is a match.
l Prohibited — If this rule is hit, traffic mirroring is disabled, even when a lower-
precedence rule or the role default actions has the Traffic Mirror action
specified.
Quarantine Role
Specify the Quarantine Role functionality for the rule:
l Select Role — Use the drop-down list to select the role that you want to
assign as a Quarantine role. Specifying a role as a Quarantine role turns the
role's icon red, denoting its restrictive nature.
l Disabled — If this option is disabled and this rule is hit, a Quarantine role will
not be assigned, but lower-precedence rules may still specify a Quarantine
role for this data packet if there is a match.
l Prohibited — If this rule is hit, a Quarantine role will not be assigned, even
when a lower-precedence rule has a Quarantine role action specified.
Related Information
For information on related concepts:
165 of 805
Rule
Create Rule
This window appears when you right-click a service group or the Services tab in the left-
panel and select Create Rule. If you use this window, traffic descriptions and actions
can be added to the rule afterwards (see Using the Rule Tabs). In order for a rule to be
applied to devices, you must enforce.
Name
Enter a name for the rule.
Type
Select the types of devices to which you wish this rule to apply when enforced.
See Rule Type for more information on the consequences of your choice.
OK
Click OK to create the rule and close the Create Rule window.
Apply
Click Apply to create the rule and remain in the Create Rule window.
166 of 805
Rule
Cancel
Click Cancel to close the Create Rule window without saving your changes.
Related Information
For information on related concepts:
l Traffic Classification Rules
For information on related tasks:
l Using the Rule Tabs
For information on related windows:
Edit Rule
The Edit Rule window allows you to change the traffic description associated with a rule.
The Traffic Description, which includes the traffic classification layer, traffic classification
type, and traffic value, was entered when the rule was created (see How to Create or
Modify a Rule).
To display the Edit Rule window, select the rule in the left panel's Services tab. In the
Traffic Description section, click Edit to bring up the Edit Rule window.
If you modify an enabled rule's traffic descriptions, the Policy tab checks for conflicts with
other rules in the services and roles with which the newly modified rule is associated.
See Conflict Checking for more information.
The contents of the Edit Rule window varies according to the selected rule and traffic
description.
167 of 805
Rule
Layer Area
Traffic Classification Layer
The OSI model classification layer (or All Layers) currently associated with the
rule. Each layer has multiple classification types from which you can select. If you
change the layer, the Type and Value sections in the window change, and you
must make new selections in those sections. See Classification Types and their
Parameters for information.
Traffic Classification Type
The traffic classification type currently associated with the rule. Each classification
type consists of certain parameters and/or values. If you change the type, the Value
section of the window changes, and you must make new selections in that section.
See Classification Types and their Parameters for information.
Value Area
This area displays the values currently selected for the traffic classification type, and
allows you to change those values. Each traffic classification type requires certain
parameters and/or values. See Classification Types and their Parameters for parameter
information.
Related Information
For information on related concepts:
l Traffic Classification Rules
For information on related tasks:
168 of 805
Rule
Use this tab to view the Class of Service (CoS) configuration for the current domain. To
access this window, select the Class of Service left-panel tab from the Policy tab.
This window displays the eight pre-populated static classes of service, each associated
with one of the 802.1p priorities (0-7). Use these predefined classes of service or create
your own classes of service.
Expanding this tab in the left panel allows you to select individual classes of service in
the right panel, which opens them in the Class of Service tab, where you can edit the
configuration for the selected CoS.
Name
The name of the class of service.
Index
The index number automatically assigned to the class of service.
Priority
The 802.1p priority associated with the class of service. The priority for the eight
static classes of service provided by the Policy tab (Priority 0-7), cannot be disabled
169 of 805
Rule
or changed.
ToS
The IP type of service value associated with this class of service, if any. See IP Type
of Service for more information.
Drop Precedence
The drop precedence associated with this class of service. Double-click in the
column to select a Drop Precedence value: Low, Medium, or High.
Related Information
For information on related concepts:
This Help topic provides an overview of Policy tab's class of service (CoS) functionality,
including information about defining rate limits and configuring transmit queues.
After you have read this topic, look at an example of how a network administrator might
use CoS to configure VoIP traffic with appropriate priority, ToS, queue treatment, and
flood control by clicking on the link: Class of Service Example.
This guide includes the following information:
l Class of Service Overview
l Rate Limits
l Transmit Queues
l Flood Control
170 of 805
Rule
The ICMP protocol, used for error messaging, has a low bandwidth requirement, with a
high tolerance for delay and jitter, and is appropriate for a low priority setting. HTTP and
FTP protocols, used respectively for browser‐generated and file transfer traffic, have a
medium to high bandwidth requirement, with a medium to high tolerance for delay and
jitter, and are appropriate for a medium priority level. Voice (VoIP), used for voice calls,
171 of 805
Rule
has a low bandwidth requirement, but is very sensitive to delay and jitter and is
appropriate for a high priority level.
Implementing CoS
CoS determines how a given network flow is assigned bandwidth as it transits your
network devices. As a preliminary step to using CoS, it is important that you understand
the characteristics of the flows on your network and associate these flows with your
policy roles. In this sense, CoS is the third step in a three step process:
1. Understand your network flows using NetFlow.
2. Associate your network flows with a Policy tab role.
3. Configure your classes of service and associate them with the rules contained in
your roles.
Configuring CoS
The Policy tab lets you configure multiple classes of service that include one or more of
the following components:
l 802.1p priority
l IP type of service (ToS) value
l drop precedence
l inbound and outbound rate limits
l outbound rate shaper per transmit queue.
l flood control rate limits
After you have created and defined your classes of service, they are then available when
you make a class of service selection for a rule action (Rule tab), a role default (General
tab), or an automated service (Automated Service tab).
To view and configure CoS, open the Class of Service Overview tab from the Policy tab.
It is pre-populated with eight static classes of service, each associated with one of the
802.1p priorities (0-7). You can use these classes of service as is, or configure them to
include ToS, drop precedence, rate limit, and/or transmit queue values. In addition, you
can also create your own classes of service (user-defined CoS).
Rate Limits
Rate limits are one component of a Policy tab class of service. They control the transmit
rate at which traffic enters and exits ports in your network. All traffic mapped to a Class of
172 of 805
Rule
Service on a given port share the bandwidth specified by the rate limit.
For instructions on how to configure rate limits, see How to Define Rate Limits.
Rate limits are tied directly to roles and rules, and are written to a device when the
role/rule is enforced. When rate limits are implemented, all traffic on the port that
matches the rule with the associated rate limit cannot exceed the configured limit. If the
rate exceeds the configured limit, frames are dropped until the rate falls below the limit.
The rate limit remains on the port only as long as the role using the rate limit is active on
the port either as the authenticated role or as the port's default role.
The following figure shows how bursty traffic is clipped above the assigned threshold
when rate limiting is applied.
The CoS can be configured to perform one or all of the following actions when a rate
limit is exceeded:
l Generate System Log on Rate Violation - a syslog message is generated when the
rate limit is first exceeded.
l Generate Audit Trap on Rate Violation - an audit trap is generated when the rate
limit is first exceeded.
l Disable Port on Rate Violation - the port is disabled when the rate limit is first
exceeded.
The Policy tab class of service also provides the ability to create rate limit port groups.
Port groups let you specify different rate limits within the same class of service. For
example, you might create a port group for edge ports and a port group for core ports,
and assign two different rate limits. For more information on rate limit port groups, see
Creating Class of Service Port Groups.
173 of 805
Rule
Transmit Queues
Transmit queue configuration is defined within a class of service and associated with a
specific role via a rule action or as a role default. It is implemented based on the role
assigned to a port. All traffic received on a port and matching a rule with the associated
class of service is forwarded using the defined transmit queue configuration.
For instructions on how to configure transmit queues, see How to Configure Transmit
Queues.
There are three components to transmit queue configuration:
l Transmit Queue Configuration allows you to set the transmit queue associated
with the class of service.
l Transmit Queue Rate Shapers let you pace the rate at which traffic is transmitted
out of that transmit queue.
l Bandwidth Configuration allows you to specify how the traffic in each transmit
queue is serviced as it egresses the port.
The transmit queue configuration remains on the port only as long as the role using the
configuration is active on the port either as the authenticated role or as the port's default
role.
The following figure shows how bursty traffic is smoothed out when it goes above the
assigned threshold when rate shaping is applied.
Rate shaping retains excess packets in a queue and then schedules these packets for
later transmission over time. Therefore, the packet output rate is smoothed and bursts in
transmission are not propagated as seen with rate limiting.
Rate shaping can be used for the following reasons:
174 of 805
Rule
l to control bandwidth
l to offer differing levels of service
l to avoid traffic congestion on other network links by removing the bursty property of
traffic that can lead to discarded packets
The Policy tab class of service also provides the ability to create transmit queue shaper
port groups that allow you to isolate certain kinds of sensitive network traffic so that you
can vary the bandwidth of the shape for that single queue. For more information on
transmit queue port groups, see Creating Class of Service Port Groups.
Flood Control
Flood control provides rate limiting capabilities to individual Class of Service to allow
certain types of flooded traffic to be dropped. When enabled, incoming traffic is
monitored over one second intervals. Traffic is identified using the following
configuration types:
l unknown - unicast
l broadcast
l multicast
A traffic control rate sets the acceptable flow for each type, specified in packets per
second. If, during a one second interval, the incoming traffic of a configured type reaches
the traffic control rate on the port, the traffic is dropped until the interval ends. Packets are
then allowed to flow again until the limit is reached.
By default, Flood Control is disabled for each CoS. Similar to CoS Port Groups, a
different configuration can be assigned for each group. Since Flood Control is shared
across all CoS, once Flood Control is enabled on at least one CoS, those rates apply to
all ports that have Flood Control enabled.
For instructions on how to configure flood controls, see How to Configure Flood Control.
Related Information
For information on related tasks:
l How to Create a Class of Service
l How to Define Rate Limits
l How to Configure Transmit Queues
175 of 805
Class of Service
Class of Service
This tab lets you view and configure the components of a class of service (CoS). See
below for a description of each section. For more information, see How to Create a Class
of Service.
Once you have created and defined a class of service, you can then apply it as a
classification rule action, as part of the definition of an automated service, or as a role
default. For more information, see Getting Started with Class of Service.
To access this tab, select the Class of Service left-panel tab on the Policy tab. Select a
class of service in the tree, and the information for the selected class of service displays
in the right panel.
General
Name
Name of the selected class of service.
176 of 805
Class of Service
Description
Use the Edit button to open a window where you can add or modify a description
for the class of service.
Transmit Queue
This field displays the transmit queue associated with the class of service for each
port type. Use the Edit button to display a menu where you can select a new
transmit queue, if desired.
802.1p Priority
This drop-down list lets you select the 802.1p priority associated with the class of
service, if desired. This field is grayed out for the eight static classes of service
provided by the Policy tab (Priority 0-7), because the 802.1p priority cannot be
disabled or changed.
ToS
Some IP rules allow a ToS value to be written to the ToS field in the IP header of
incoming packets. Click the Edit button to open the Edit ToS window, where you
can enter a ToS value. The value must be an 8-bit hexadecimal number between 0
and FF (see IP Type of Service for more information).
Drop Precedence
The Drop Precedence option is used in conjunction with the Flex-Edge feature
available on K-Series and S-Series (Release 7.11 or higher) devices. Flex-Edge
provides the unique capability to prioritize traffic in the MAC chip as it enters the
switch. When the Class of Service is assigned to a policy role, and that role is
applied to a port via a MAC source address mapping or the port default role, the
drop precedence dictates the internal priority (within the MAC chip) used for
packets received on the port. If congestion occurs, packets with a high drop
precedence are discarded first. Therefore, if a packet is important, it should have a
low drop precedence. Refer to the K-Series or S-Series Configuration Guide for
more information on the Flex-Edge feature and drop precedence.
177 of 805
Class of Service
transmitted out of the transmit queue. You can add or change a rate limit or a rate shaper
by double-clicking on the area below a port group name.
If you have ExtremeWireless Controllers (Release 8.01.xx or higher) on your network,
you also see the IRL and ORL user rate limits associated with the class of service. User
rate limits specify the bandwidth given to each individual user on a port. Currently, user
rate limits are only available on wireless controllers.
For more information, see Advanced Rate Limiting by Port Type and How to Configure
Transmit Queues.
Index Numbers
At the bottom of the tab there is a section for configuring the rate limit and transmit queue
index numbers associated with this class of service. These index numbers are used to
map the class of service to the actual rate limits and transmit queue configuration on the
device.
Typically, each class of service uses a different index number. The Policy tab
automatically assigns these index numbers when you configure a class of services' rate
limits and transmit queue shapers. An index number of "-1" indicates that no mappings
are associated with the class of service.
All CoS using the same index will use the same rate limit and rate shaping assignments,
and thus all traffic using those CoS will share the bandwidth.
IRL/ORL Index (Inbound/Outbound Rate Limits Index)
The inbound/outbound port rate limit index associated with the class of service.
Index numbers map logical rate limit indexes to the actual physical rate limits you
have created in the Policy tab. Click the button to open the Rate Limits selection
view window, and select an index for the CoS. For convenience, existing index to
rate limit mappings are displayed; if one of the existing indexes is selected, the
displayed mappings will apply for this CoS. (Selecting an index highlights all the
mappings configured for that index number within the selection view.)
TxQ Index (Transmit Queue Index)
The transmit queue index associated with the class of service. Index numbers map
logical transmit queue indexes on the ports to the actual physical transmit queues
you have configured in the Policy tab. If you have selected an 802.1p priority for
this class of service, a default transmit queue index is automatically specified
based on the selected priority. You can use the default index or change it
according to your own transmit queue configuration. Click the button to open the
Transmit Queues selection view window, which lists all the possible transmit
queues, organized by index number for each existing port type and group.
178 of 805
Class of Service
Selecting an index automatically includes all the transmit queues configured for
that index number.
IUB/OUB Index (Inbound/Outbound User-Based Rates Index)
If you have ExtremeWireless Controllers (Release 8.01.xx or higher) on your
network, you also see the inbound/outbound user rate limits associated with the
class of service. User rate limits specify the bandwidth given to each individual
user on a port. Currently, user rate limits are only available for these wireless
controllers. Click the button to open the Rate Limits selection view window, and
select an index for the CoS. For convenience, existing index to rate limit mappings
are displayed; if one of the existing indexes is selected, the displayed mappings
apply for this CoS. (Selecting an index highlights all the mappings configured for
that index number within the selection view.)
NOTE: By default, Flood Control is not managed by the Policy tab. To manage flood control
configuration on devices in a domain, it can be enabled via the Domain Managed CoS
Components drop-down list by selecting All CoS Components or by selecting Flood
Control.
Related Information
For information on related concepts:
l Getting Started with Class of Service
For information on related tasks:
l How to Create a Class of Service
l How to Define Rate Limits
l How to Configure Transmit Queues
179 of 805
General (CoS Components Folder)
This tab lists the elements that comprise a class of service. It appears when you select
the CoS Components tab in the Class of Service left-panel tab of the Policy tab.
See Getting Started with Class of Service for more information about these components.
180 of 805
General (CoS Components Folder)
Related Information
For information on related concepts:
l Getting Started with Class of Service
For information on related tasks:
l How to Create a Class of Service
l How to Define Rate Limits
l How to Configure Transmit Queues
l How to Configure Flood Control
This tab allows you to create and define a rate limit. Rate limits are components of a
class of service and are used to control the transmit rate at which traffic enters and exits
ports in your network.
To access this window, open the Control tab, select the Policy tab > Class of Service
left-panel tab > CoS Components left-panel tab > Rate Limits tab. Select an existing
rate limit to view or modify a rate limit or right-click the Rate Limits left-panel tab and
select the Create Rate Limit option to create a new rate limit.
To create the rate limit, fill out the window and click OK (to create a single rate limit) or
Apply (to create more rate limits). After you create the rate limit, the General tab for the
new rate limit appears, where you can configure additional rate limit parameters.
Name
181 of 805
Details View (Rate Limits Folder)
Actions
Select the action(s) you would like this rate limit to use:
l System Log - a syslog message is generated when the rate limit is first
exceeded.
l Audit Trap - an audit trap is generated when the rate limit is first exceeded.
l Disable Port - the port is disabled when the rate limit is first exceeded.
Related Information
For information on related concepts:
l Rate Limits
This tab lists information on any rate limits that have been defined in the Policy tab.
To access this tab, select the Class of Service > CoS Components > Rate Limits left-
panel tab. See How to Define Rate Limits for more information.
182 of 805
Details View (Rate Limits Folder)
Name
Name of the rate limit.
Syslog
Specifies whether a syslog message will be generated when the rate limit is first
exceeded.
Audit Trap
Specifies whether an audit trap will be generated when the rate limit is first
exceeded.
Disable Port
Specifies whether the port will be disabled when the rate limit is first exceeded.
Related Information
For information on related windows:
183 of 805
Details View (Rate Limits Folder)
When priority-based rate limiting is implemented, the combined rate of all traffic on the
port that matches the priorities associated with the rate limit cannot exceed the
configured limit. If the rate exceeds the configured limit, frames are dropped until the rate
falls below the limit.
Once a rate limit is associated with a priority, that priority includes rate limiting wherever
and however it is used, until the rate limit is deleted from Extreme Management Center.
Also, once a priority-based rate limit is applied to a port, it remains on the port even if the
role that originally used the rate limit is no longer associated with the port. For example,
if an untagged packet arrives on a port where there is no role or default priority, but the
port's 802.1p priority includes a rate limit, that traffic is rate limited. As another example, if
the priority of a tagged packet matches a priority-based rate limit on a port, the traffic is
rate limited.
To configure a priority-based rate limit, you need to specify the following components:
l Rate Limit - The highest transmission rate at which traffic can enter or exit a port.
l Direction - The direction to which the limit applies (inbound or outbound traffic). In
order to control traffic inbound and outbound on the same port, two rate limits must
be configured (one inbound and one outbound). Inbound rate limiting takes place
after a frame is classified into one of the eight priorities. Outbound rate limiting
takes place just before a frame is queued for transmission. A single frame may
pass through inbound and outbound rate limits depending on the path it takes
through the device and the rate limiting configuration on the device.
l Priority - The 802.1p priority or priorities with which the rate limit is associated.
l Precedence - The order in which the rate limit is written to supported devices.
Extreme Management Center allows you to define as many rate limits as you wish;
184 of 805
Details View (Rate Limits Folder)
however, the number written to a device is restricted by the number of rate limits
supported by the device. Each port on the device may utilize any or all of the
defined rate limits up to the number of rate limits it supports.
l Exclusion - The devices/ports you wish to be excluded from the rate limit. For
example, rate limiting is most often used for edge devices; therefore, you might
want to exclude a device group or port group containing non-edge devices or ports.
This window lets you configure the rate limit mappings for a rate limit port group. Rate
limit mappings map a logical rate limit index to an actual physical rate limit you have
created in Extreme Management Center.
For reference, the CoS IRL/ORL Index table (at the bottom of the window) displays
classes of service that already have an IRL/ORL index specified, so that you can see
which classes of service are affected by mapping an index to a rate limit.
To access this window, open the click on the Add/Edit button on the CoS - Rate Limit
Mappings tab (Control tab > Policy tab > Class of Service left-panel tab >
CoS Components left-panel tab and select a port group in either the Inbound Rate Limit
Port Groups or Outbound Rate Limit Port Groups left-panel tab, depending on the type
of rate limit.
IRL/ORL Index
Specify the IRL (Inbound Rate Limit) or ORL (Outbound Rate Limit) Index you are
mapping.
Rate Limit
Use the drop-down list to select a rate limit to map to the index. Rate limits are
listed by the rate limit name followed by the precedence. For information on how to
185 of 805
Details View (Rate Limits Folder)
create a rate limit, see How to Define Rate Limits. Select None to remove an
existing mapping for the specified port types.
Port Types
These options allow you to create a mapping for all port types at once, or create a
mapping just for specific port types.
Related Information
For information on related concepts:
l Getting Started with Class of Service
For information on related tasks:
The Policy tab class of service feature provides the ability to create rate limit port groups
that let you group together ports with similar rate limiting requirements. For instructions
on creating a port group, see Creating Class of Service Port Groups.
This Help topic provides information about an advanced port group feature that lets you
specify different rate limits for the different port types contained in a port group: 8-rate
limit, 32-rate limit, 64-rate limit, and 100-rate limit port types.
After you have created your port groups, you can use the CoS to rate limit mappings tab
to configure rate limit index mappings for each group. These mappings map a logical
rate limit index to an actual physical rate limit created in the Policy tab. For each class of
service, you can select one mapping index that gives you the desired physical rate limit
for each port group (see the Index Numbers section of the CoS General tab for more
information on CoS Index Numbers).
The Policy tab supports a maximum of 100 logical rate limit indexes and each rate limit
port group lets you map all 100 indexes. For 8-rate limit, 32-rate limit, and 64-rate limit
ports, this means that the number of logical indexes might be greater than the actual
number of rate limits the port supports. The port group can map 100 logical rate limit
186 of 805
Details View (Rate Limits Folder)
indexes, but they can only be mapped to a maximum of 8, 32, or 64 different physical
rate limits on those ports.
For example, you want to have 25 rate limits for 25 different CoS. You need to define the
behavior for the 8-rate port type, since once you get to the 9th rate, you would have no
more resources available for the remaining rates (9-25). You would either need to share
some of the same resources, or not rate limit with the remaining rates.
The maximum supported indexes for a device is based on the largest number of rates
supported for that device. On devices supporting a maximum of 8 rate limits, indexes 0-7
are supported. On devices supporting a maximum of 32 rate limits, indexes 0-31 are
supported. On devices supporting 64 rate limits, IRL indexes 0-63 are supported. If a rate
limit port group maps indexes greater than the supported value, they are ignored during
Enforce (indicated in the Class of Service > Rate Limit Mappings tables of Enforce
Preview)
Instructions on:
l Configuring Rate Limit Mappings
l Associating Rate Limits with a Class of Service
187 of 805
Details View (Rate Limits Folder)
Related Information
For information on related concepts:
l Getting Started with Class of Service
188 of 805
Summary (Rate Limit Port Groups Folder)
This tab lists the name of all the inbound or outbound rate limit port groups (depending
on the left-panel tab you select). Rate limit mappings map a logical rate limit index
(IRL/ORL Index) to an actual physical rate limit. You can configure a port group's
mappings on the port group Mappings tab.
To access this tab, open the Class of Service > CoS Components left-panel tab, then,
select either the Inbound Rate Limit Port Groups left-panel tab or the Outbound Rate
Limit Port Groups tab. The Summary tab displays in the right panel.
Name
The name of the port group
Related Information
For information on related concepts:
This tab lets you view and configure the rate limit mappings for a rate limit port group.
Rate limit mappings map a logical rate limit index used by classes of service to an actual
physical rate limit you create in Extreme Management Center.
189 of 805
CoS - Rate Limit Mappings (Rate Limit Port Group)
Each port group has its own set of index mappings. Extreme Management Center
automatically assigns these index numbers when you configure a class of services' rate
limits and transmit queue shapers.
The rate limit mappings tab allows you to do two things:
l Map the index to a different rate for different port groups (edge ports versus inter-
switch links). See Creating Class of Service Port Groups.
l Map the index to a different rate limit for each port type (8-rate limit, 32-rate limit,
64-rate limit, and 100-rate limit) in a port group. See Advanced Rate Limiting by
Port Type.
To access this tab:
NOTE: Create a new port group by right-clicking the Inbound Rate Limit Port Groups or
Outbound Rate Limit Port Groups left-panel tab, selecting Create Port Group,
entering a Name for the port group, and clicking OK.
6. Select the CoS - Rate Limit Mappings tab in the right panel.
190 of 805
CoS - Rate Limit Mappings (Rate Limit Port Group)
IRL/ORL Index
The logical inbound rate limit (IRL) or outbound rate limit (ORL) index number. This
index number is specified in a class of service and dictates the rate limiting
behavior for incoming or outgoing packets. For each rate limit port group, use this
tab to map the index number to an actual rate limit.
Rate Limit
The actual rate limit to which the IRL/ORL index is mapped.
191 of 805
Ports (Rate Limit Port Group)
Related Information
For information on related concepts:
l Getting Started with Class of Service
For information on related tasks:
l How to Define Rate Limits
l Advanced Rate Limiting by Port Type
For information on related windows:
l Ports Tab (Rate Limit Port Group)
The rate limit port group Ports tab lets you view all the ports in the selected port group,
as well as add and remove ports to and from the group. It provides information about
each port, and lets you view and edit port information (via the port's General tab).
To access this tab:
1. Open the Control tab.
2. Open the Policy tab.
3. Open the Class of Service > CoS Components left-panel tab.
4. Select either the Inbound Rate Limit Port Groups or Outbound Rate Limit Port
Groups left-panel tab, depending on whether the rate limit is inbound or outbound.
5. Select a existing port group in the left panel to open it in the Rate Limit Port Group
tab.
NOTE: Create a new port group by right-clicking the Inbound Rate Limit Port Groups or
Outbound Rate Limit Port Groups left-panel tab, selecting Create Port Group,
entering a Name for the port group, and clicking OK.
192 of 805
Ports (Rate Limit Port Group)
Name
Name of the port, constructed of the name or IP address of the device and either
the port index number or the port interface name.
Rate/Queue Port Type
The number of rate limits the port supports.
Default Role
The Default Role assigned to the port.
Alias
Shows the alias (ifAlias) for the interface, if one is assigned.
Stats
Shows statistics collected for a port, enabled via the Flow Collection & Interface
setting in the PortView.
Port Type
Type of port. Possible values include: Access, Interswitch Backplane, Backplane,
Interswitch, and Logical.
Neighbor
The port's neighbor port.
Port Speed
Speed of the port. Possible values include: 10/100, speed in megabits per second
(for example, 800.0 Mbps), Unknown (displayed for logical ports).
Description
A description of the port.
193 of 805
Automated Service
Related Information
For information on related concepts:
l Getting Started with Class of Service
For information on related tasks:
l How to Define Rate Limits
l Creating Class of Service Port Groups
For information on related windows:
l CoS - Rate Limits Mappings Tab (Rate Limit Port Group)
Automated Service
Selecting an Automated Service opens the Automated Service tab which allows you to
define settings for the service. For more information on services, see How to Create a
Service.
194 of 805
Automated Service
Service Name
Name of the selected service.
Description
Use the Edit button to open a window where you can enter or modify a description
of the service.
TCI Overwrite
Specify the TCI Overwrite functionality for the service:
l Enabled - Enabling TCI Overwrite allows the VLAN (access control) and
class of service characteristics defined in this service to overwrite the VLAN
or class of service (CoS) tag in a received packet, if that packet has already
been tagged with VLAN or CoS information.
l Disabled - If this option is disabled the TCI Overwrite option is ignored, but
lower-precedence rules and the role default actions may still specify TCI
Overwrite for the data packet if there is a match.
l Prohibited - Do not set TCI Overwrite for this data packet, even when a
lower-precedence rule or the role default actions has the TCI Overwrite
option set to enabled.
195 of 805
Automated Service
Actions Area
Use this area to define the access control and/or a class of service for the Automated
service rule. This section is not displayed for a Manual service.
Access Control
Use this drop-down list to select the appropriate access control for the rule. You
can permit traffic to be forwarded, deny traffic altogether, or contain traffic to a
VLAN. Select None to disable access control for this rule.
l Permit Traffic - allows traffic to be forwarded with the port's assigned VID.
l Deny Traffic - traffic will be automatically discarded.
l Contain to VLAN - contains traffic to a specific VLAN. Use the drop-down list
to select the desired VLAN. Use the Contain to VLAN drop-down list to
select a VLAN.
Class of Service
Use the drop-down list to select a class of service to associate with the service.
The Policy tab lets you define classes of service that each include an 802.1p
196 of 805
Automated Service
priority, and optionally an IP type of service (ToS/DSCP) value, rate limits, and
transmit queue configuration. You can then assign a class of service as a
classification rule action. See Getting Started with Class of Service and How to
Create a Class of Service for more information. Select None to disable class of
service for this rule. Use the configuration menu button to the right of the drop-
down list to add or edit a Class of Service.
When rule accounting is enabled on a device, each rule keeps a list of the ports on
which it has been used. The next three options allow you to specify certain rule usage
actions to take place when a "rule hit" is reported.
System Log
Specify System Log functionality for the rule:
l Enabled - If this option is enabled, a syslog message is generated when the
rule is used. This option must be enabled if you are configuring Policy Rule
Hit Reporting on your devices.
l Disabled - If this option is disabled and this rule is hit, it does not generate a
Syslog message, but lower-precedence rules and the role default actions
may still specify a syslog message be sent for this data packet if there is a
match.
l Prohibited - If this rule is hit, no syslog message is generated for this data
packet, even when a lower-precedence rule or the role default actions has
the System Log action set to enabled.
Audit Trap
Specify Audit Trap functionality for the rule:
l Enabled - If this option is enabled, an audit trap is generated when the rule is
used.
l Disabled - If this option is disabled and this rule is hit, it does not generate an
audit trap, but lower-precedence rules and the role default actions may still
specify generating an audit trap for this data packet if there is a match.
l Prohibited - If this rule is hit, no audit trap is generated for this data packet,
even when a lower-precedence rule or the role default actions has the Audit
Trap action set to enabled.
Disable Port
Specify Disable Port functionality for the rule:
l Enabled - If this option is enabled, any port reported as using this rule is
disabled. Ports that have been disabled due to this option are displayed in
the device Role/Rule tab.
197 of 805
Automated Service
l Disabled - If this option is disabled and this rule is hit, it does not disable the
port, but lower-precedence rules and the role default actions may still specify
disabling the port for this data packet if there is a match.
l Prohibited - If this rule is hit, the port is not disabled, even when a lower-
precedence rule or the role default actions has the Disable Port action set to
enabled.
Traffic Mirror
Specify traffic mirroring functionality for the rule:
l Select port group(s) - Use the drop-down list to select the port groups where
mirrored traffic will be sent for monitoring and analysis. Use the configuration
menu button to the right of the drop-down list and select View/Modify Port
Groups to open the Port Groups tab where you can define user-defined port
groups for selection.
l Disabled - If this option is disabled and this rule is hit, traffic mirroring will not
take place, but lower-precedence rules and the role default actions may still
specify traffic mirroring for this data packet if there is a match.
l Prohibited - If this rule is hit, traffic mirroring is disabled, even when a lower-
precedence rule or the role default actions has the Traffic Mirror action
specified.
Quarantine Role
Specify Quarantine role functionality for the rule:
l Enabled - If this option is enabled, any role reported as using this rule is
quarantined.
l Disabled - If this option is disabled and this rule is hit, it does not quarantine
the role, but lower-precedence rules and the role default actions may still
specify quarantining the role for this data packet if there is a match.
l Prohibited - If this rule is hit, the role is not quarantined, even when a lower-
precedence rule or the role default actions has the Quarantine Role action
set to enabled.
Related Information
For information on related tasks:
l How to Create a Service
l How to Create a Network Resource
198 of 805
Automated Service
Traffic Classification rules allow you to assign VLAN membership and/or class of service
to your network traffic based on the traffic's classification type. Classification types are
derived from Layers 2, 3, 4, and 7 of the OSI model, and all network traffic can be
classified according to specific layer 2/3/4/7 information contained in each frame. In the
Policy tab, rules are used to provide four key policy features: traffic containment, traffic
filtering, traffic security, and traffic prioritization. Examples of how to design rules for each
of these features are given below.
A Traffic Classification rule has two main parts: Traffic Description and Actions. The
Traffic Description identifies the traffic classification type for the rule. The Actions specify
whether traffic matching that classification type will be assigned VLAN membership,
class of service, or both. When a frame arrives on a port, the switch checks to see if the
frame's classification type matches the type specified in a rule. If it does, then the actions
defined in that rule will apply to the frame.
In the Policy tab, rules are created and then grouped together into Services, which are
then used to define roles. A role is assigned to each port either through end user
authentication or as the port's default role. This means that there can be multiple rules
active on a port. When a frame is received on a port, if the frame's classification type
matches more than one rule, classification precedence rules are used to determine
which rule to use.
NOTE: Rules included in services are read in the order in which they are listed in Extreme
Management Center. To configure rules for ExtremeCloud Appliance (XCA) devices,
ensure Extreme Management Center lists the rules in the correct order or the service may
not execute the correct rule. To reorder rules in the same service, use drag-and-drop
capabilities to move from one group to another.
199 of 805
Automated Service
Traffic Descriptions
When you create a Traffic Classification rule in the Policy tab, you must define the rule's
traffic description. The traffic description identifies the traffic classification type for that
rule. You must select a classification type, and then select or enter certain parameters or
values for each type.
Classification types are grouped according to Layers 2, 3, 4, and 7 of the OSI model and
there are multiple classification types for each layer.
OSI Model
Layer 7 - Application
Layer 6 - Presentation
Layer 5 - Session
Layer 4 - Transport
Layer 3 - Network
Layer 2 - Data Link
Layer 1 - Physical
Specific Layer 2/3/4/7 information contained in each frame is used to identify the frame's
classification type. Each layer uses different information to classify frames.
l Layer 2 Data Link -- classifies frames based on an exact match of the MAC
address or specific protocol type of each frame.
l Layer 3 Network -- classifies IP or IPX frames based on specific information
contained within the Layer 3 header.
200 of 805
Automated Service
Actions
When you create a Traffic Classification rule in the Policy tab, you must define the
actions the rule performs. When a frame arrives on a port, the switch checks to see if the
frame's classification type matches the type specified in a rule. If it does, then the actions
defined in that rule will apply to the frame. Actions specify whether the frame will be
assigned VLAN membership (access control) and/or priority (class of service).
201 of 805
Automated Service
The Policy tab enables you to utilize priority by creating classes of service that each
include an 802.1p priority, and optionally an IP type of service (ToS/DSCP) value, rate
limits, and transmit queue configuration. You can then assign the class of service as a
classification rule action, as part of the definition of an automated service, or as a role
default. See Getting Started with Class of Service for more information.
202 of 805
Automated Service
DSAP/SSAP
This classification type is based on the specific protocol type of each frame defined
in the DSAP and SSAP fields. Select a protocol from the list of well-known values,
or select Other and manually enter a custom two-byte value in hexadecimal format
(0xFFFF). The LSB of the DSAP address specifies Individual(0) or Group(1), while
the LSB of the SSAP address specifies Command(0) or Response(1). For the
SNAP frame type, you may enter Advanced DSAP/SSAP configurations. The
advanced fields are not supported on legacy devices and are ignored.
VLAN ID
This classification type is based on an exact match of the VLAN tag contained
within a frame. Select a VLAN ID (VID) from the list of VLANs defined in the Policy
tab. If you select Other, you must enter a single VID or specify a range of VIDs in
decimal form. Range rules are not supported on legacy devices.
Priority
This classification type is based on an exact match of the Priority tag contained
within a frame. Select a Priority value 0 - 7 from the list of well-known values, or
select Other and enter a value in decimal form.
203 of 805
Automated Service
204 of 805
Automated Service
(hop count) by IPX routers. Enter a valid IPX Class of Service in decimal form, 0-
255. You can enter a range of values, however range rules are not supported on
legacy devices or N-Series Gold.
IPX Packet Type
This classification type is based on specific information contained within the Layer
3 header of an IPX frame. Select an IPX Packet type from the list of well-known
values or select Other and manually enter the value in decimal form. You can
enter a range of values, however range rules are not supported on legacy devices
or N-Series Gold.
205 of 805
Automated Service
206 of 805
Automated Service
207 of 805
Automated Service
208 of 805
Automated Service
IP Fragment
This classification type is based on Layer 4 information in fragmented frames. IP
supports frame fragmentation, where large frames are divided into smaller
fragments and sent wrapped in the original Layer 3 (IP) header. When a frame is
fragmented, information that is Layer 4 and above is only present in the first
fragment. For example, the first fragment may be classified to Layer 4, while
subsequent fragments will be classified only to Layer 3. The product line does not
support Layer 4 classification for IP frames that have been fragmented, as the
Layer 4 information is not present in these frames. Using the IP Fragment
classification rule, any frame which is a fragment of a larger frame, is classified
according to the information in the original frame. If the first fragment is classified to
Layer 4, subsequent fragments will also be classified to Layer 4.
ICMP and ICMPv6
These classification types are based on an exact match of the ICMP (Internet
Control Message Protocol) message contained in the ICMP tag within a frame.
Select an ICMP well-known value type from the list of well-known values (some
well-known value types also let you select a code), or select Other and manually
enter the value in hexadecimal form. The format of the value is 0xXXYY, where
"XX" is the ICMP type, and "YY" is the associated code, if applicable. You can
enter a range of values, however range rules are not supported on legacy devices
or N-Series Gold.
IP Type of Service
This classification type is based on an exact match of the one-byte ToS/DSCP
field contained in the IP header of a frame. The ToS (Type of Service) or DSCP
(Diffserve Codepoint) value is defined by an 8-bit hexadecimal number between 0
and FF. Enter a value or click Select to open a window where you can generate a
hex value.
Type of Service can be used by applications to indicate priority and Quality of
Service for each frame. The level of service is determined by a set of service
parameters which provide a three way trade-off between low-delay, high-reliability,
and high-throughput. The use of service parameters may increase the cost of
service. In many networks, better performance for one of these parameters is
209 of 805
Automated Service
coupled with worse performance on another. Except for very unusual cases, at
most, two of the parameters should be set.
For a ToS value, the 8-bit hexadecimal number breaks down as follows:
Bits 0-2: Precedence
Bit 3: 0=Normal Delay, 1=Low Delay
Bit 4: 0=Normal Throughput, 1=High Throughput
Bit 5: 0=Normal Reliability, 1=High Reliability
Bits 6-7: Explicit Congestion Notification
The precedence bits (bits 0-2) break down as follows:
111 - Network Control
110 - Internetwork Control
101 - CRITIC/ECP
100 - Flash Override
011 - Flash
010 - Immediate
001 - Priority
000 - Routine
The Network Control precedence designation is intended to be used within a
network only. The actual use and control of that designation is up to each network.
The Internetwork Control designation is intended for use by gateway originators
only.
For a DSCP value, the value represents codepoints for two Differentiated Services
(DS) Per-Hop-Behavior (PHB) groups called Expedited Forwarding (EF) and
Assured Forwarding (AF). For more information on these PHB groups, refer to
RFC 2597 and RFC 2598.
IP Protocol Type
This classification type is based on the specific protocol type defined in a field
contained in the IP header of each frame. Select a protocol from the list of well-
known values, or select Other and manually enter the value in decimal form. You
can enter a range of values, however range rules are not supported on legacy
devices or N-Series Gold.
210 of 805
Automated Service
Note: Certain devices do not support Layer 4 classification for IP frames that have been
fragmented, as the Layer 4 information is not present in these frames. If a device has an
FDDI HSIM installed, Layer 4 classification will not be supported for any frames larger
than 1500 bytes. Frames larger than 1500 bytes are fragmented internally in the switch.
When creating classification rules based on specific Layer 4 information, using the IP
Fragment classification rule will allow fragmented frames to be classified according to
the Layer 4 information contained in the original frame.
IP UDP Port Source, IP UDP Port Destination, IP UDP Port Bilateral
These classification types are based on specific Layer 4 UDP port numbers
contained within the header of an IP frame. Select a UDP type from the list of well-
known values, or select Other and manually enter the value in decimal form. (UDP
port numbers are defined in RFC 1700.) You can enter a range of values, however
211 of 805
Automated Service
range rules are not supported on legacy devices or N-Series Gold. Enter a valid
IPv4 or IPv6 address and optional mask ("/n"), if desired. The IP address is an
optional field and does not have to be specified. It is only valid for non-range port
values.
212 of 805
Automated Service
213 of 805
Automated Service
214 of 805
Automated Service
IP UDP Port Source Range, IP UDP Port Destination Range, IP UDP Port Bilateral
Range
These classification types are based on Layer 4 UDP port numbers contained
within the header of an IP frame. When you select this type, you enter a range of
UDP port numbers that the port number in the header will be matched against.
Enter the start and end range values in decimal form. UDP port numbers are
defined in RFC 1700.
IP TCP Port Source Range, IP TCP Port Destination Range, IP TCP Port Bilateral
Range
These classification types are based on Layer 4 TCP port numbers contained
within the header of an IP frame. When you select this type, you enter a range of
TCP port numbers that the port number in the header will be matched against.
Enter the start and end range values in decimal form. TCP port numbers are
defined in RFC 1700.
215 of 805
Automated Service
Traffic Containment
Using classification rules, network administrators can group together users of a given
protocol, subnet, or application, and control where their traffic can logically go on the
network.
The figure above shows a configuration where the network administrator wants to
separate end-user traffic into VLANs based on the assigned IP subnet of each
department. This can easily be accomplished by creating two Layer 3 classification rules
based on the IP subnet range of the respective departments.
Rule 1 - Engineering, which uses the 132.181.28.x subnet, will be assigned
to the Red VLAN.
Rule 2 - Sales, which uses the 132.181.29.x subnet, will be assigned to the
Blue VLAN.
Based on these two Layer 3 classification rules, the traffic from the Engineering VLAN
will be isolated from the Sales VLAN. Since these rules are based on Layer 3
information, an Engineering user could enter the network from a connection in the Sales
department, and that user would still be contained in the Engineering VLAN.
Traffic Filtering
Classification rules can also be used to filter out (discard) specific unwanted traffic. Filter
criteria can include things such as broadcast routing protocols, specific IP addresses, or
even applications such as HTTP or SMTP.
216 of 805
Automated Service
The figure above shows a common configuration in which a routed backbone is using
both RIP and OSPF for its routing protocols. The network administrator does not want
the multicast OSPF and broadcast RIP frames propagated to the end stations. The
network is designed so that only end users are attached to the E7 devices.
To implement filtering in this scenario, a Layer 3 rule and a Layer 4 rule will be created.
Rule 1 (Layer 3) - Any frame received with an IP Protocol Type of 89 (OSPF)
will be discarded.
Rule 2 (Layer 4) - Any frame received with a Bilateral UDP port number of
520 (RIP) will be discarded.
Based on this configuration, all RIP and OSPF frames will be filtered from the end users.
Traffic Security
Traffic Security uses the same concepts as Traffic Filtering. Imagine a scenario where
network access is provided to a group of unknown users. There have been problems
with these unknown users "hacking" into the router and altering the configuration. A
simple classification rule can be put in place that will prevent these types of occurrences.
In the figure above, the network components include a router and an E7 device. In this
configuration end-users connect to the ports of the E7 device.
Since the end-users would never need to communicate directly to the router using the
router's IP address, a Layer 3 IP classification rule will be used.
217 of 805
Automated Service
Rule - Any frames received by the switch with a destination IP address of the
router (129.168.1.2) will be discarded.
The end result is that any frames from a user trying to "hack" into the router will be
discarded before ever reaching the router.
Traffic Prioritization
Classification rules can be used to specify that certain network applications receive the
highest transmission priority. For example, a network administrator wants to assign
priority to three network applications, SAP R/3, web traffic, and email, in that order.
To accomplish the prioritization goals in this example, there are two main steps required:
creating the classification rules, and then configuring the priority-to-transmit queue
mapping for the switch, if needed.
First, create one Layer 3 and two Layer 4 classification rules.
Rule 1, Layer 3 (SAP R/3) - All frames to or from the IP address of the SAP
R/3 server will be tagged with a priority indicator of 7 (highest).
Rule 2, Layer 4 (Web) - All frames with a TCP port number of 80 (HTTP) will
be tagged with a priority indicator of 5.
Rule 3, Layer 4 (email) - All frames with a TCP port number of 25 (SMTP) will
be tagged with a priority indicator of 3.
Note: An IP address classification was selected for Rule 1 because it has been
observed that SAP R/3 dynamically negotiates the TCP/UDP port used, so the port
number selections vary from session to session. If this was not the case, a Layer 4 UDP
classification could be used.
Then, configure the priority-to-transmit queue mappings. Each switch has default priority-
to-transmit queue mappings. You can use these defaults or change the mappings using
local management or the legacy Console java application. In addition, the Policy tab
provides the ability to configure transmit queues as part of the Role-Based Rate Limits
218 of 805
Ports (Transmit Queue Port Group)
and Transmit Queue Configuration class of service mode. This functionality is available
only on certain devices such as the S-Series and N-Series Gold and Platinum devices
(refer to the Extreme Management Center Firmware Support matrix for specific
device/firmware rate limit support).
Based on the default priority-to-traffic queue mapping for an E7 device, the priorities
assigned above will work out so that each frame classification type will be mapped to the
desired traffic queue. This means that no user configuration of the priority-to-transmit
queue mapping would be required.
With the classification rules described above, the network traffic would be prioritized as
shown in the table below:
Related Information
For information on related tasks:
l How to Create or Modify a Rule
l How to Define Traffic Descriptions
The Ports tab lets you view all the ports in the selected transmit queue port group, as
well as add and remove ports to and from the group. It provides information about each
port, and lets you view and edit port information.
To access this tab:
1. Open the Control tab.
2. Open the Policy tab.
3. Open the Class of Service > CoS Components left-panel tab.
4. Select either the Transmit Queue Port Groups left-panel tab.
219 of 805
Ports (Transmit Queue Port Group)
5. Select a existing port group in the left panel to open it in the Transmit Queue Port
Group tab.
NOTE: Create a new port group by right-clicking the Transmit Queue Port Groups left-
panel tab, selecting Create Port Group, entering a Name for the port group, and
clicking OK.
Name
Name of the port, constructed of the name or IP address of the device and either
the port index number or the port interface name.
Rate/Queue Port Type
The number of rate limits the port supports.
Default Role
The Default Role assigned to the port.
Alias
Shows the alias (ifAlias) for the interface, if one is assigned.
Stats
Shows statistics collected for a port, enabled via the Flow Collection & Interface
setting in the PortView.
220 of 805
Summary (Transmit Queue Port Groups)
Port Type
Type of port. Possible values include: Access, Interswitch Backplane, Backplane,
Interswitch, and Logical.
Neighbor
The port's neighbor port.
Port Speed
Speed of the port. Possible values include: 10/100, speed in megabits per second
(for example, 800.0 Mbps), Unknown (displayed for logical ports).
Description
A description of the port.
Add/Remove Ports Button
Opens the Add/Remove Ports window, where you can add and remove ports to
and from the port group. When you create new port groups, you add ports from the
Default group into your newly defined port groups.
Related Information
For information on related concepts:
l Getting Started with Class of Service
For information on related tasks:
l How to Configure Transmit Queues
For information on related windows:
l CoS - Transmit Queue Mappings Tab (Transmit Queue Port Group)
This tab displays the transmit queue port groups. Transmit queue mapping maps a
logical transmit queue index (used by a class of service) to an actual physical transmit
queue you have configured in the Policy tab. You can configure transmit queue
mappings for a port group using the CoS - Transmit Queue Mappings tab.
To access this tab, open the Class of Service > CoS Components tab. Then, select the
select the Transmit Queue Port Groups tab in the left panel. The Summary tab displays
in the right panel.
221 of 805
CoS - Transmit Queue Mappings (Transmit Queue Port Group)
Name
The name of the transmit queue port group.
Related Information
For information on related concepts:
l Getting Started with Class of Service
For information on related tasks:
l How to Configure Transmit Queues
For information on related windows:
l CoS - Transmit Queue Mappings Tab (Transmit Queue Port Group)
l Ports Tab (Transmit Queue Port Group)
This tab lets you view and configure the transmit queue mappings for a port group.
Transmit queue mappings map a logical rate limit index used by classes of service to an
actual physical rate limit you have created in Extreme Management Center.
Each port group has its own set of index mappings. Extreme Management Center
automatically assigns these index numbers when you configure a class of services' rate
limits and transmit queue shapers.
The Transmit Queue Mappings tab allows you to do two things:
l Map the index to a different rate for different port groups (edge ports versus inter-
switch links). See Creating Class of Service Port Groups
222 of 805
CoS - Transmit Queue Mappings (Transmit Queue Port Group)
l Map the index to a different rate limit for each port type (8-rate limit, 32-rate limit,
64-rate limit, and 100-rate limit) in a port group. See Advanced Rate Limiting by
Port Type.
To access this tab:
1. Open the Control tab.
2. Open the Policy tab.
3. Open the Class of Service > CoS Components left-panel tab.
4. Select either the Transmit Queue Port Groups left-panel tab.
5. Select a existing port group in the left panel to open it in the Transmit Queue Port
Group tab.
NOTE: Create a new port group by right-clicking the Transmit Queue Port Groups left-
panel tab, selecting Create Port Group, entering a Name for the port group, and
clicking OK.
6. Select the CoS - Transmit Queue Mappings tab in the right panel.
TXQ Index
The logical transmit queue index. This index number is specified in a class of
service and dictates the queue and shaping behavior for incoming packets.
223 of 805
Ports (Flood Control Port Groups)
Transmit Queue
Displays the physical transmit queue used to map to each transmit queue index.
To change this value, click the Edit Index Mapping button to open the Edit
Transmit Queue Mapping window and select a value in the Transmit Queue drop-
down list.
Rate Shaper
The transmit queue's associated rate shaper. To change this value, click the
Select Rate Shaper button to open the Select Transmit Queue Rate Shaper
window and select a value in the Rate Limit field.
TXQ Port Type
The Port Type is based on the number of transmit queues the port supports: 4
transmit queues or 16 transmit queues.
Related Information
For information on related concepts:
l Getting Started with Class of Service
For information on related tasks:
l How to Configure Transmit Queues
For information on related windows:
l Ports Tab (Transmit Queue Port Group)
The Flood Control Port Group Ports tab provides a table of information about the ports
in the selected port group. It also includes buttons that enable you to retrieve the latest
information about the ports and to add and remove ports. To access this tab, select a port
group in the left-panel Flood Control Port Groups tab, then select the Ports tab in the
right panel.
NOTE: The Ports tab is only available when a Flood Control port group is selected, and when
advanced mode is enabled on the CoS Components tab.
224 of 805
Ports (Flood Control Port Groups)
Name
Name of the port, constructed of the name or IP address of the device and either
the port index number or the port interface name.
Rate/Queue Port Type
Shows the selected port type rate/queue.
Default Role
Shows the default role for the port. See Default Role in the Concepts topic for
information on default roles. For additional information, see Port Mode.
Alias
Shows the alias (ifAlias) for the interface, if one is assigned.
Stats
Shows that statistics are being collected for a port, enabled via the PortView.
Port Type
Type of port. Possible values include: Access, Interswitch Backplane, Backplane,
Interswitch, and Logical.
Neighbor
Port to which the port is connected.
Port Speed
Speed of the port. Possible values include: 10/100, speed in megabits per second
(for example, 800.0 Mbps), Unknown (displayed for logical ports).
225 of 805
Ports (Flood Control Port Groups)
Description
A description of the port.
Add/Remove Button
Selecting a port in the table and clicking this button opens the Add/Remove Ports
window, which enables you to add and remove ports to and from the port group.
This option is available for user-defined port groups only.
Related Information
For information on related concepts:
l Getting Started with Class of Service
226 of 805
Ports (Flood Control Port Groups)
Name
The name of the port group.
Related Information
For information on related concepts:
l Getting Started with Class of Service
227 of 805
Flood Control Rate Limits (Flood Control Port Groups)
This tab allows you to set individual flood control rates for each traffic type (Unicast,
Multicast, and Broadcast).
Choices include:
l None
l Rate limits created in the Rate Limit tab. For additional information, see Create
Rate Limit/Shaper.
As flood control is enabled/disabled for a Class of Service, when enabled, each column
displays a rate limit, or None, if no rate has been defined for that portion of flood control.
To access this tab, open the Class of Service > CoS Components left-panel tab. Then,
select the Flood Control checkbox from the General tab in the left-panel to display the
Flood Control Port Groups tab in the left panel. Expand the Flood Control Port Groups
tab, and select a flood control port group in the tree. The Flood Control Port Groups tab
is displayed in the right panel.
Unicast Unknown
Select a rate, create a new rate, or edit an existing flood control rate limit for
Unicast traffic.
Multicast
Select a rate, create a new rate, or edit an existing flood control rate limit for
Multicast traffic.
228 of 805
Flood Control Rate Limits (Flood Control Port Groups)
Broadcast
Select a rate, create a new rate, or edit an existing flood control rate limit for
Broadcast traffic.
Related Information
For information on related concepts:
l Getting Started with Class of Service
For information on related tasks:
l How to Create a Class of Service
l How to Configure Flood Control
l How to Create a Rate Limit
For information on related windows:
l General Tab (Rate Limit)
229 of 805
Flood Control Rate Limits (Flood Control Port Groups)
Transmit Queue
CoS IRL
CoS Name Priority Queue # Shaping Bandwidth
Index
Edge Core Edge Core Edge Core Edge Core
Scavenger (Static) 0 0 15 Mb/s 0 0 10% 5% 5%
Best Effort (Static) 1 1
Bulk Data (Static) 2 2 1 1 80% 45% 45%
Critical Data (Static) 3 3
Network Control (Static) 4 4 40 PPS 1 Mb/s
2 2 1 Mb/s 25% 25%
Network Mgmt (Static) 5 5 2 Mb/s
RTP/Voice/Video (Static) 6 6
1 Mb/s 25 Mb/s 3 3 25% 25%
High Priority (Static) 7 7
VoIP Call Setup 8 7 5 PPS 3 3 25% 25%
The following figure displays the network setup for this example configuration, with the
desired Profile/CoS summary for each network device. Each device is configured with
VoIP and Data VLANs. Each VoIP VLAN contains four 1‐gigabit interfaces for each
device.
230 of 805
Flood Control Rate Limits (Flood Control Port Groups)
Edge and Core port groups in the RTP/Voice/Video (Static) CoS provide for the
difference in rate limiting needs between the end user and aggregation devices. A VoIP
Call Setup CoS provides rate limiting for the setup aspect of the VoIP call.
The Edge, Core, and H.323 Call Setup roles are configured with TCI Overwrite, default
CoS 5 (best default priority for voice and video), and default access control that contains
traffic to the appropriate VLAN.
Use the Policy tab to configure the policy roles and related services using the following
instructions. For more information, see How to Create a Class of Service and How to
Define Rate Limits.
231 of 805
Flood Control Rate Limits (Flood Control Port Groups)
Create a Rule
1. Create a Layer 2 traffic classification rule for VLAN ID 22 within the VoIPCore
service.
2. Assign the static RTP/Voice/Video CoS (CoS Index 6) as the Class of Service
action for the rule.
232 of 805
Flood Control Rate Limits (Flood Control Port Groups)
Create a Rule
1. Create a Layer 2 traffic classification rule for VLAN ID 12 within the VoIPEdge
service.
2. Assign the static RTP/Voice/Video CoS (CoS Index 6) as the Class of Service
action for the rule.
Create a Rule
Create a Layer 4 traffic classification rule as follows:
1. Traffic Classification Type: IP TCP Port Destination
2. Enter in Single Value field: 1720 (TCP Port ID).
233 of 805
Flood Control Rate Limits (Flood Control Port Groups)
234 of 805
Policy VLAN Tab Overview
The VLAN tab displays information about the VLAN selected in the left panel and lets
you configure certain VLAN parameters. If you are using VLAN to Role mapping in your
network, you can also use this tab to map the VLAN to a specific role. If you make a
change on this tab, you need to enforce it.
To view this tab, select Control > Policy > VLANs and select a VLAN from the drop
down.
235 of 805
Policy VLAN Tab Overview
General
This area provides general information about the VLAN and allows you to configure the
VLAN.
Name
Name of the VLAN selected in the left panel.
VID
Unique number assigned to the VLAN, also called VID (for VLAN ID). This ID was
either assigned by an administrator or assigned automatically by the system when
the VLAN was created. The value can be anywhere between 1 and 4094, with VID
1 being reserved for the DEFAULT VLAN (a name for a particular VLAN, not to be
confused with a role's assigned default VLAN).
Dynamic Egress
Dynamically add all ports which use this VLAN to this VLAN's egress list. Dynamic
Egress is enabled by default in Policy Manager. Leave disabled for discard
VLANs. See Dynamic Egress for more information.
236 of 805
Policy VLAN Tab Overview
237 of 805
Policy VLAN Tab Overview
If supported by the device, you can enable TCI Overwrite for an individual role in the role's
General tab. The stackable devices support rewriting the CoS values but not the VLAN ID.
Select
Opens the role Selection View, where you can choose a role to associate with the
VLAN at the device level.
Primary C2/B2/D2/C3/B3/G3/C5/B5/A4 mapping
Use this checkbox to specify that this VLAN to role mapping will be the primary
mapping for C2/C3/C5 and B2/B3/B5 devices (C2 firmware version 03.02.xx and
higher/B2 firmware version 02.00.16 and higher), and D2, A4, and G3 devices (G3
firmware version 6.03.xx and higher). These devices only support one device-level
VLAN to role mapping. If you do not make this selection, there will be no device-
level mapping for these devices.
Port Level Mappings
This table lists any port-level Tagged Packet VLAN to Role Mappings configured
for this VLAN. Port-level mappings override any device-level mapping.
Related Information
For information on related concepts:
l Dynamic Egress
l Policy VLAN Islands
For information on related tasks:
l How to Create a VLAN
l How to Create a Policy VLAN Island
238 of 805
Global VLANs
Global VLANs
This tab appears when you select the Global VLANs tab in the VLANs left-panel tab. It
displays a table of information about the existing VLANs.
Right-clicking the Global VLANs tab allows you to create a new VLAN by selecting the
Create VLAN option, while selecting Reload VLANs updates the list of VLANs with the
latest information.
If you right-click a VLAN in the left-panel tab or in the right-panel table, you have the
option to rename and delete the selected VLAN.
Name
Name of the VLAN.
VID
Unique number assigned to the VLAN, also called VID (for VLAN ID). For Global
VLANs, this ID was either assigned by an administrator or assigned automatically
by the system when the VLAN is created. The value can be anywhere between 1
and 4094, with VID 1 being reserved for the DEFAULT VLAN (a name for a
particular VLAN, not to be confused with a role's assigned default VLAN).
Dynamic Egress
Indicates whether the Dynamic Egress feature is on (Enabled) or off (Disabled) for
the VLAN. The default is Enabled; therefore, this column displays Enabled unless
a user has turned it off for a particular VLAN.
239 of 805
Global VLANs
Related Information
For information on related tasks:
l How to Create a VLAN
For information on related windows:
l VLAN Tab
l VLAN Egress Tab (Role)
Create VLAN
This window appears when you right-click the Global VLANs left-panel tab and select
Create VLAN. See How to Create a VLAN, How to Create a Policy VLAN Island, and
Roles for additional information.
Name
The name for the VLAN you want to create. VLAN names can be up to 32
characters in length, including spaces. Do not create a VLAN name that uses any
letters with diacritical marks. Diacritical marked letters are not supported by SNMP.
VLAN names are case sensitive. For example, "Sales" and "sales" would be
considered two different VLAN names. You can have multiple VLANs with the
same name but with different VLAN IDs in the Policy tab.
VID
Unique numerical identifier for the VLAN, also known as VLAN ID. Can be a value
between 1 and 4094, with VID1 being reserved for the DEFAULT VLAN (a name
for a particular VLAN, not to be confused with a default VLAN you assign to a role).
240 of 805
Selection View (Roles)
OK Button
Creates the VLAN.
Related Information
For information on related concepts:
l Dynamic Egress
l Policy VLAN Islands
For information on related tasks:
l How to Create a VLAN
l How to Create a Policy VLAN Island
For information on related windows:
l General Tab (Role)
The Roles Selection View appears when you are selecting a role for VLAN to role
mapping. It also lets you clear the current VLAN to role mapping. To access this view,
click the desired VLAN in the VLANs > Global VLANs left-panel tab, then click the
Select button in the VLAN to Role Mapping section on the VLAN tab.
241 of 805
Policy VLAN Islands
Related Information
For information on related tasks:
l Creating a Role
For information on related windows:
This tab displays a table of the Island VLANs being used in the Policy VLAN Island, and
the names created on the devices in the island. To display this tab, select Control >
Policy > VLANs > Policy VLANs Islands.
The VLANs Tab provides two sub-tabs:
l (VLAN) - VIDs Tab
l (VLAN) - Role Mappings Tab
242 of 805
Policy VLAN Islands
VLANs
Name of all defined VLANs. Select a VLAN to see the policy VLAN islands in the
VLAN Settings section of the window and the VIDs with which that island is
associated.
Create
Opens the Create VLAN window from which you can create a PVI VLAN. Unlike
global VLANs, PVI VLANs are not created by the Policy tab during enforce. It is left
to the user to configure these on the device(s) externally. The Policy tab only
associates the appropriate VIDs to the rules during enforce.
Island Name
Shows the names of all VLAN Islands for the PVI VLAN selected in the VLANs
section of the window.
Island VLAN ID
Shows the VID used for this PVI VLAN in this Island.
Edit Island VLAN ID
Selecting an island in the table and clicking this button opens the Edit Island VLAN
ID window, where you can change the VID for the Island VLAN.
243 of 805
Policy VLAN Islands
General
This area provides general information about the VLAN and allows you to configure the
VLAN.
Name
Name of the VLAN selected in the left panel.
VID
Unique number assigned to the VLAN, also called VID (for VLAN ID). This ID was
either assigned by an administrator or assigned automatically by the system when
the VLAN was created. The value can be anywhere between 1 and 4094, with VID
1 being reserved for the DEFAULT VLAN (a name for a particular VLAN, not to be
confused with a role's assigned default VLAN).
Dynamic Egress
Dynamically add all ports which use this VLAN to this VLAN's egress list. Dynamic
Egress is enabled by default in Policy Manager. Leave disabled for discard
VLANs. See Dynamic Egress for more information.
244 of 805
Policy VLAN Islands
245 of 805
Policy VLAN Islands
If supported by the device, you can enable TCI Overwrite for an individual role in the role's
General tab. The stackable devices support rewriting the CoS values but not the VLAN ID.
Select
Primary C2/B2/D2/C3/B3/G3/C5/B5/A4 mapping
Use this checkbox to specify that this VLAN to role mapping will be the primary
mapping for C2/C3/C5 and B2/B3/B5 devices (C2 firmware version 03.02.xx and
higher/B2 firmware version 02.00.16 and higher), and D2, A4, and G3 devices (G3
firmware version 6.03.xx and higher). These devices only support one device-level
VLAN to role mapping. If you do not make this selection, there will be no device-
level mapping for these devices.
Port Level Mappings
This table lists any port-level Tagged Packet VLAN to Role Mappings configured
for this VLAN. Port-level mappings override any device-level mapping.
NOTE: This functionality is not yet enabled.
Related Information
For information on related concepts:
l Policy VLAN Islands
l VLAN to Role mapping
For information on related tasks:
l How to Create a Policy VLAN Island
246 of 805
Policy VLAN Islands
Destination
Select the VLAN Island to which the device is to be added.
Devices Section
Expand the Island folder from which the VLAN Island is being selected to add the
device or devices.
Add Button
Adds the device(s) selected in the Devices panel to the island selected in the
Islands panel.
Related Information
For information on related concepts:
247 of 805
Island Topology (Policy VLAN Islands)
This tab displays a table of information about the Policy VLAN Islands, which shows the
VIDs used in the selected island for all defined PVI VLANs. To access this tab, select
the Policy VLAN Islands node in the tree of the Access Control Configuration view, and
select the Island Topology tab on the right panel.
248 of 805
Island Topology (Policy VLAN Islands)
Islands
Name of all defined PVI islands. Select an island to see the VIDs and devices
associated with that Island.of the VLAN island in which the Island VLAN is being
used.
VLAN Name
Shows the defined PVI VLANs in the Domain. Unlike global VLANs, PVI VLANs
are not created by the Policy tab during enforce. It is left to the user to configure
these on the device(s) externally. The Policy tab only associates the appropriate
VIDs to the rules during enforce.
Island VLAN ID
Shows the VID used for this PVI VLAN in this Island.
249 of 805
Island Topology (Policy VLAN Islands)
Create
Opens the Create VLAN Island dialog. For more information, see Creating a VLAN
Island.
Name
The device's IP address.
Add Devices
Opens a separate dialog to add devices to specific Islands. For more information,
see Add/Remove Devices window.
Related Information
For information on related concepts:
l Policy VLAN Islands
l Network Resource Groups
For information on related tasks:
l How to Create a Policy VLAN Island
l How to Create a Network Resource Group
250 of 805
Island Topology (Policy VLAN Islands)
251 of 805
Network Resources Tab Overview
The Network Resources tab displays a table of information about all the network
resources in the current domain. To access this tab, select the Network Resources >
Network Resources left-panel tab on the Policy tab. The Details View is displayed in the
right panel. Right-click a network resource to rename or delete it. See How to Create a
Network Resource for more information on topologies and islands.
Name
Name of the network resource group.
Resource Count
The number of addresses added to the network resource.
Type
The network resource type:
l Layer 2 MAC - Define a group of network resource MAC addresses.
l Layer 3 IP - Define a group of network resource IP addresses.
Topology
The network resource topology for this group.
Related Information
For information on related windows:
252 of 805
Network Resource Group General Tab
This tab lets you configure a network resource group, which is a group of network
resource devices associated with an Automated service. You configure the group by
selecting a network resource type (MAC or IP) and typology, and then creating a list of
MAC or IP addresses for the resources that are part of the group. Once a network
resource group is defined, you can associate it with the desired Automated service (see
How to Create a Service for more information).
To access this tab, select a network resource group in the Network Resources left-panel
tab of the Policy tab.
Name
Name of the network resource group selected in the left panel.
Description
Use the Edit button to open a window where you can add or modify a description
for the network resource group.
253 of 805
Network Resource Topology Tab
Type
Select the network resource type:
l Layer 2 MAC - Define a group of network resource MAC addresses.
l Layer 3 IP - Define a group of network resource IP addresses.
Topology
Use this drop-down list to select a network resource topology for this group. Use
the configuration menu button on the right to add a new topology or edit an existing
topology.
Network Resource Address List
Lists the addresses included in the selected network resource. Use the address
field (IPv4 or IPv6, depending on the selected type) and click the Add button to add
a new resource to the list.
Related Information
For information on related tasks:
l How to Create a Network Resource Group
l How to Create a Service
This tab appears when you select a Network Resource Topology in the left panel of the
Network Resources tab. It displays a list of the islands defined for the topology and the
number of devices assigned to each island. See How to Create a Network Resource for
more information on topologies and islands.
254 of 805
Network Resource Topology Island Domain Wide
Name
Name of the topology island.
Device Count
The number of devices included in that island.
Related Information
For information on related windows:
l General Tab (Network Resource Group)
l How to Create a Network Resource
The Domain Wide tab displays a table of information about all the devices in an island
within the network resource topology selected in the left panel. To access this tab, select
a network resource island in a network resource topology on the Network Resources >
Network Resource Topologies left-panel tab on the Policy tab. The Domain Wide view
is displayed in the right panel. To see a menu of options available for a device, right-
click the device.
Name
Name of the device, or its IP address if it does not have a display name.
Device Type
Indicates the type of device. Certain devices may be listed as "Authentication
Only" (supports 802.1X and RFC 3580 only; does not support Policy).
255 of 805
Network Resource Topology Island Domain Wide
CoS Mode
Shows whether the Class of Service mode has been enabled or disabled on the
device.
Firmware Version
Shows the current firmware revision for this device.
Add Devices Button
Click the Add Devices button to add devices to the network resource topology.
256 of 805
Devices (Devices)
Name
Name of the network resource topology.
Net Resc Count
The number of network resource groups using this topology.
Network Resources Using
The names of the network resource groups using this topology.
Related Information
For information on related windows:
l General Tab (Network Resource Group)
l How to Create a Network Resource
Devices (Devices)
The Devices tab displays a table of information about all the devices in the current
domain. To access this tab, select the Devices/Port Groups > Devices left-panel tab on
257 of 805
User Sessions (Devices)
the Policy tab. The Details View is displayed in the right panel. To see a menu of options
available for a device, right-click the device.
Name
Name of the device, or its IP address if it does not have a display name.
Device Type
Indicates the type of device. Certain devices may be listed as "Authentication
Only" (supports 802.1X and RFC 3580 only; does not support Policy).
CoS Mode
Indicates whether Class of Service is enabled or disabled on the device.
Firmware Version
Shows the current firmware revision for this device.
Related Information
For information on related windows:
l Details View Tabs
The device User Sessions panel displays information related to end user login sessions
for a device.
This tab can be accessed in a variety of ways:
1. Select a device in the left-panel Devices tab, then click the User Sessions tab in
the right panel.
258 of 805
User Sessions (Devices)
2. Select the My Network navigation tree in the left panel, select a device in the
Devices list, and right-click the device or open the tools menu and select View >
User Sessions.
3. Open the Control > Policy tab, select Devices in the left panel, and select the User
Sessions tab in the right panel.
NOTE: Devices configured for multi-user authentication always list only active sessions even if the
Show Only Active Session checkbox is deselected.
Session entries are collected up to the maximum allowed. When the maximum is
reached, the oldest session entries are replaced with newer ones. The exception to this
is the RoamAbout R2, where older session data is not kept.
For devices that support one authenticated user per port, only one user/current role per
port appears in the table. For devices that support multiple authenticated users per port,
all users authenticated on its ports are listed in the table, along with the roles under
which they are authenticated.
259 of 805
User Sessions (Devices)
Session Status
The status of the device.
Switch IP
The IP address or name of the device.
Switch Port
A description of the port.
Switch Alias
The alias (ifAlias) for the interface, is one is assigned.
Type
The authentication type of this login session: Web-Based, 802.1X, MAC, CEP,
Quarantine, Auto Tracking, or Role Override. If Role Override is displayed, it
signifies that a rule has been applied to the port, overriding the user's current role
with a different role.
l Role Override (MAC) signifies that a MAC address rule has been applied to
the port, overriding the Default role or any authenticated role assigned to the
end user.
l Role Override (IP) signifies that an IP address rule has been applied to the
port, overriding the Default role or any authenticated role assigned to an end
user authenticated with Single User 802.1X. An IP Address rule will not
override the authenticated role for any authentication type other than Single
User 802.1X.
MAC Address
The MAC address of the remote user of this login session.
IP Address
For web-based authentication sessions, this column displays the IP address of the
remote user of this login session.
Hostname
The hostname of the remote user of this login session. To determine the hostname,
the Policy tab takes the IP address (when available) and uses the hostname cache
on the Extreme Management Center server. The hostname cache must be
explicitly enabled by selecting the Enable Name Resolution checkbox in the
Administration > Options > tab (by default, this option is disabled).
Role
The role under which the user authenticated on the port. If the user authenticated
via RFC 3580 VLAN Authorization, this column displays the role the VLAN is
mapped to (configured through Authentication-based VLAN to Role Mapping). If
260 of 805
User Sessions (Devices)
VLAN to Role mapping has not been configured, the port's Default role is
displayed (if there is one); otherwise, the column displays "N/A."
Default VID Source
When traffic received on a port doesn't match any rules, it is assigned the default
VLAN ID. This column indicates the source for the default VLAN ID:
l Policy Default Access Control - The role assigned to the session defines the
default VLAN ID via its Default Access Control.
l PVID - If the role assigned to the session has no Default Access Control
specified, then the 802.1Q PVID for the port is assigned to the traffic.
Default VID
Displays the VLAN ID that comes from the source listed in the Default VLAN ID
Source column: Permit (4095), Deny (VLAN ID #), or Contain (VLAN ID #).
RFC3580 VID
If the user authenticated via RFC 3580 VLAN Authorization, this is the VLAN ID
that was returned from the RADIUS server. A VLAN ID value of 0 indicates that no
VLAN was assigned. If VLAN authentication is not supported on the device, this
column will display "N/A."
VLAN Oper Egress
The modification that will be made to the VLAN egress list for the VLAN ID
returned by the RADIUS server, if the user authenticated via RFC 3580 VLAN
Authorization.
l None - No modification to the VLAN egress list will be made.
l Tagged - The port will be added to the list with the egress state set to Tagged
(frames will be forwarded as tagged).
l Untagged - The port will be added to the list with the egress state set to
Untagged (frames will be forwarded as untagged).
l Dynamic - The port will use information returned in the RADIUS response to
modify the VLAN egress list.
If VLAN authentication is not supported on the device, this column will display
"N/A."
Start Time
The time and date when the login session started.
Duration
The duration of the user's login session, in the format D + HH:MM:SS.
261 of 805
User Sessions (Devices)
Auth Status
The authentication status of the login session. Possible values are:
l Authentication Successful
l Authentication Failed
l Authentication in Progress
l Authentication Server Timeout
l Authentication Terminated
Terminate Cause
The reason the login session terminated. For web-based authentication, the
possible values are:
l Administratively Terminated
l Authorization Revoked
l Link Down
l Not Applicable
l Port Disabled
l Unknown Termination Cause
l User Logged Out
For 802.1X authentication, the possible values are:
l Authorization Revoked
l Client Restarted
l Link Down (or Lost Carrier)
l Not Applicable
l Port Disabled
l Port Reinitialized
l Reauthentication Failed
l Unknown Termination Cause
l User Logged Out
Authentication Server
The RADIUS server that authenticated the session.
262 of 805
User Sessions (Devices)
Related Information
For information on related concepts:
l MAC Locking
l Getting Started with Class of Service
For information on related tasks:
l Defining Rate Limits
For information on related windows:
l General Tab (Rate Limit)
263 of 805
User Sessions (Devices)
Authentication (Device)
The device Authentication tab enables you to configure and change the authentication
settings on the selected device. Authentication must be configured and enabled on the
device in order for individual port authentication settings to take effect (see How to
Configure Ports).
To access this tab, select a device in the left panel under Devices > Devices, then click
the Authentication tab in the right panel.
Apply
Click this button to save any changes you made to the Authentication tab.
Refresh
Click this button to update the tab with your changes.
Authentication Status
Use this section to select the authentication mode and types used on the device.
264 of 805
User Sessions (Devices)
Use the fields on the left side of this section to select the appropriate single- or
multi-user authentication types. Only options supported by the selected device are
available for selection. Some devices support multiple authentication types and
multiple users (Multi-User Authentication) per port, while others are restricted to
only one or two authentication types and single users per port. Refer to the
Firmware Support matrix for information on the authentication types supported by
each device type.
WARNING: Switching Authentication Types, or changing the Authentication
Status from Enabled to Disabled, logs off any currently authenticated
users.
265 of 805
Current User Counts
l devices that do not support policy tag packets with the VLAN ID.
l devices that support both policy and Authentication-Based VLAN to Role
Mapping classify packets according to the role to which the VLAN ID maps.
NOTE: On E1 and E6/E7 devices, if both 802.1X and MAC authentication are enabled, it is
possible for the device to receive a start or response 802.1X packet while a MAC
authentication is in progress. If this happens, the device immediately terminates the MAC
authentication, and the 802.1X authentication proceeds to completion. Regardless of the
success of the 802.1X login attempt, no new MAC authentication logins may occur on the
port until 1) the link is toggled; 2) the user executes an 802.1X logout; or 3) the 802.1X
session is terminated administratively.
266 of 805
Current User Counts
Session Timeout
This setting represents the maximum number of seconds an authenticated session
may last before automatic termination of the session. A value of zero indicates that
no session timeout applies. This value may be superseded by a session timeout
value provided by the authenticating server. For example, if a session is
authenticated by a RADIUS server, that server may send a session timeout value
in its authentication response.
NOTE: Non-zero values are rounded to the nearest non-zero multiple of 10 by the device.
Set Password/Mask
Select this checkbox to set a password and mask for MAC authentication.
MAC User Password
The password passed to the RADIUS server for MAC authentication.
267 of 805
Current User Counts
MAC Mask
You can select a mask to provide a way to authenticate end-systems based on a
portion of their MAC address. For example, you could specify a mask that would
base authentication on the manufacturers ID portion of the MAC address. The
MAC Mask is passed to the RADIUS server for authentication after the primary
attempt to authenticate using the full MAC address fails.
MAC Address Delimiter
The character used between octets in a MAC address:
l None — No delimiter is used in the MAC address (e.g. xxxxxxxxxxxx).
l Hyphen — A hyphen is used as a delimiter in the MAC address (e.g. xx-xx-xx-
xx-xx-xx).
General
The General section lets you specify the URL of the authentication web page and the IP
address of the system where it resides. It also lets you enable certain web authentication
features, such as Enhanced Login Mode, on devices that support those features.
268 of 805
Current User Counts
For example, if an end-user (in Enhanced Login Mode and a Redirect Time of 30
seconds) enters the URL of "http://ExtremeNetworks.com", the user is presented
the authentication web page. When the user successfully authenticates into the
network, the user sees a login success page that displays "Welcome to the
Network. Completing network connections. You will be redirected to
http://ExtremeNetworks.com in approximately 30 seconds."
WINS/DNS Spoofing
This setting allows you to enable and disable WINS/DNS spoofing for the selected
device. Spoofing allows the end-user to resolve the Web Authentication URL
269 of 805
Current User Counts
name to the IP address using WINS/DNS. The default is Disabled. This option is
grayed out if not supported by the device.
Logo Display Status
Specifies whether the Extreme Networks logo is displayed or hidden on the
authentication web page window. This option is grayed out if not supported by the
device.
Authentication Protocol
This setting is the authentication protocol being used (PAP or CHAP). PAP
(Password Authentication Protocol) provides an automated way for a PPP (Point-
to Point Protocol) server to request the identity of user, and confirm it via a
password. CHAP (Challenge Handshake Authentication Protocol), the more
secure of the two protocols, provides a similar function, except that the confirmation
is accomplished using a challenge and response authentication dialog.
Web Authentication URL
This is the URL for your authentication web page. Users wishing to receive
network services access the web page from a browser using this URL. The http://
is supplied. Alphabetical characters, numerical characters and dashes are allowed
as part of the URL, but dots are not. The URL needs to be mapped to the Web
Authentication IP address in DNS or in the hosts file of each client. It must be
resolvable via DNS/WINS, either on the device or at corporate, assuming the Web
Authentication mapping has been set up on the corporate DNS/WINS service. This
option is grayed out if not supported by the device.
Web Authentication IP Address
This is the IP address of your authentication web page server. If you have specified
a Web Authentication URL, the IP address needs to be mapped to the URL in DNS
or in the host file of each client.
Guest Networking
The Guest Networking section lets you configure guest networking, a feature that allows
any user to access the network and obtain a guest policy without having to know a
username or password. The user accesses the authentication web page, where the
username and password fields are automatically filled in, allowing them to log access as
a guest. If the user does not want to log in as a guest, they can type in their valid
username and password to log in.
NOTE: Guest networking is designed for networks using web-based authentication, with port
mode set to Active/Discard.
270 of 805
Current User Counts
271 of 805
Current User Counts
The Default button allows you to reset the banner to default text provided in a text
file (pwa_banner.txt). Initially, the default banner text is the Extreme Networks
contact information. However, you can customize the text for your network by
editing the pwa_banner.txt file, located in the top level of the Policy Manager install
directory. Then, when you click the Default button, the new text will be displayed in
the Web Page Banner area.
272 of 805
Current User Counts
CEP Type
Lists the CEP types supported by the device.
Role
Lists the role mapped to each CEP Type.
Add
Select a CEP Type and click the Add button to open the Add Role Mapping
window, where you can select a role for the selected CEP Type. Your selections
are added to the CEP Role Mappings list.
Remove
Select the CEP Type and click Remove to remove the CEP Type in the CEP Role
Mappings list.
NOTE: CEP detection rules apply only to Siemens, H.323, and SIP (Session Initiation Protocol)
phone detection. Cisco detection uses CiscoDP as its detection method.
273 of 805
Current User Counts
l TCP/UDP Port Number detection — Many CEP vendors use specific TCP/UDP
port numbers for call setup on their IP phones. You can create detection rules that
identify CEP devices based on specific TCP/UDP port numbers. By default,
Siemens Hi-Path phones are detected on TCP/UDP port 4060.
l IP Address detection — H.323 phones use a reserved IP multicast address and
UDP port number for call setup. You can create detection rules to detect an IP
phone based on its IP address in combination with an IP address mask. By default,
H.323 phones are detected using the multicast address 224.0.1.41 and the
TCP/UDP ports 1718, 1719, and 1720. SIP phones are detected using the
multicast address 224.0.1.75 and the TCP/UDP port 5060. H.323 and SIP phones
are also detected using only their respective multicast addresses without the
TCP/UDP ports.
Priority
The rule priority with one (1) being the highest priority. The rule with the highest
priority is used first, so it is recommended the highest priority be given to the
predominate protocol in the network to provide for greater efficiency.
Address
If the rule is based on IP address detection, this field displays the IP address that
incoming packets matched against. By default, H.323 uses 224.0.1.41 as its IP
address, SIP uses 224.0.1.75 as its IP address, and Siemens has no IP address
configured.
Address Mask
If the rule is based on IP address detection, this field displays the IP address mask
against which incoming packets are matched.
End Point Type
Specifies the end-point type assigned (H.323, Siemens, or SIP) if incoming
packets match this rule.
274 of 805
Current User Counts
Protocol
If the rule is based on TCP/UDP port detection, this field displays the protocol type
used for matching, using a port range defined with the Port Low and Port High
values:
l UDP + TCP — Match the port number for both UDP and TCP frames.
l TCP — Match the port number only for TCP frames.
l UDP — Match the port number only for UDP frames.
Port Low
The low end of the port range defined for detection on UDP and/or TCP ports.
Port High
The high end of the port range defined for detection on UDP and/or TCP ports.
Add
Opens the Add/Edit CEP Detection Rule window where you can create CEP
detection rules.
Remove
To remove a CEP detection rule, select the entry and click Remove.
Edit
To edit a CEP detection rule, select the rule and click Edit. The Add/Edit CEP
Detection Rule window opens where you edit the rule's parameters. You can also
double-click an entry in the table to open the edit window.
Related Information
For information on related windows:
275 of 805
Current User Counts
NOTE: CEP detection rules apply only to Siemens, H.323, and SIP (Session Initiation Protocol)
phone detection. Cisco detection uses CiscoDP as its detection method.
276 of 805
CEP Detection Settings
Address Mask
If the rule is based on IP address detection, enter the IP address mask against
which incoming packets are matched.
End Point Type
Select the endpoint type (H.323, Siemens, or SIP) assigned to incoming packets
that match this rule.
Protocol
If the rule is based on TCP/UDP port detection, select the UDP and/or TCP
checkbox and define a port range with Port Low and Port High values:
l UDP and TCP — Match the port number for both UDP and TCP frames.
l TCP — Match the port number only for TCP frames.
l UDP — Match the port number only for UDP frames.
Port Low
Define the low end of the port range for detection on UDP and/or TCP ports.
Port High
Define the high end of the port range for detection on UDP and/or TCP ports.
Related Information
For information on related windows:
l Device Authentication Tab
277 of 805
CEP Detection Settings
Ports (Authentication)
The Ports (Authentication) tab allows you to configure and change the authentication
settings for a port. Authentication must be configured and enabled on the device in order
for individual port authentication settings to take effect. Only those areas of the tab that
relate to the authentication type configured on the device are available for editing.
To access the Ports (Authentication) tab, select a device in the left-panel Devices >
Devices tab, then select Authentication > Ports in the right panel.
Select a port in the top section to display and configure the authentication settings for
that port in the bottom of the window.
Click the Apply button at the top of the window to save changes to this tab.
The Authentication Configuration tab has six sections:
278 of 805
Authentication Mode
l Authentication Mode
l RFC3580 VLAN Authorization
l Login Settings
l Automatic Re-Authentication
l Authenticated User Counts
l Convergence End-Point Access
Authentication Mode
This tab displays general authentication and port mode information about the port.
This area displays the current port mode for the port, and allows you to change the
settings if desired. Port mode defines whether or not a user is required to authenticate on
a port, and how unauthenticated traffic is handled. It is a combination of Authentication
Behavior (whether or not authentication is enabled on the port), and Unauthenticated
Behavior (whether unauthenticated traffic is assigned to the port's default role or
discarded). See Port Mode for a complete description of each port mode.
In addition, this section provides checkboxes that allow you to disable a specific
authentication type at the port level.
Port Mode (Auth/Unauth Behavior)
Select an option to specify whether or not authentication is enabled on the port.
(See Port Mode for more information.)
NOTE: Authentication Behavior must be set to Active for authentication to be allowed using
CEP Protocols.
279 of 805
RFC3580 VLAN Authorization
NOTE: For Single User 802.1X+MAC authentication with Active/Default Role as the
selected port mode: Disabling 802.1X authentication also disables MAC
authentication on the port. An end user connecting to the port is not able to
authenticate via 802.1X or MAC. The port behaves as if Inactive/Default Role is the
selected port mode.
280 of 805
Login Settings
You can also enable and disable VLAN Authorization at the device level using the
device Authentication tab. If the device does not support RFC 3580, this tab will be
grayed out.
Login Settings
This tab displays the current login settings for the port and allows you to change the
settings if desired. The options available depend on what type(s) of authentication are
enabled on the device.
281 of 805
Login Settings
MAC
Hold Time (sec)
Amount of time (in seconds) authentication remains timed out after the user fails to
login. Valid values are 0-65535. The default is 60. (Hold Time is also known as
Quiet Period in web-based and MAC authentication.)
802.1X
Hold Time (sec)
Amount of time (in seconds) authentication remains timed out after the user fails to
login. Valid values are 0-65535. The default is 60.
Auth request period (sec)
For 802.1X authentication, how often (in seconds) the device queries the port to
see if there is a new user on it. If a user is found, the device then attempts to
authenticate the user. Valid values are 1-65535. The default is 30.
282 of 805
Login Settings
Web Auth
Max Requests
Number of times a user can attempt to log in before authentication fails and login
attempts are not allowed. For web-based authentication, valid values are 1-
2147483647, zero is not allowed, and the default is 2.
Hold Time (sec)
Amount of time (in seconds) authentication remains timed out after the specified
Max Requests is reached. Valid values are 0-65535. The default is 60.
Quarantine
Session Timeout (sec)
For Quarantine authentication, the maximum number of seconds an authenticated
session may last before automatic termination of the session. A value of zero
indicates that no session timeout applies.
Session Idle Timeout (sec)
For Quarantine authentication, the maximum number of consecutive seconds an
authenticated session may be idle before automatic termination of the session. A
value of zero indicates that the device level setting is used.
Auto Tracking
Session Timeout (sec)
For Auto Tracking sessions, the maximum number of seconds a session may last
before automatic termination of the session. A value of zero indicates that the device
283 of 805
Automatic Re-Authentication
Automatic Re-Authentication
This tab is grayed-out if only web-based authentication is enabled on the device. For
802.1X and MAC authentication, the Automatic Re-Authentication tab lets you set up the
periodic automatic re-authentication of logged-in users on this port. Without disrupting
the user's session, the device repeats the authentication process using the most recently
obtained user login information, to see if the same user is still logged in. Authenticated
logged-in users are not required to log in again for re-authentication, as this occurs
"behind the scenes."
284 of 805
Authenticated User Counts
285 of 805
Convergence End-Point Access
Enable Button
Selects all the checkboxes and enables all the CEP protocols for this port.
Disable All Button
Deselects all the checkboxes and disables all the CEP protocols for this port.
Related Information
For information on related tasks:
l How to Configure Ports
286 of 805
Authentication Tab
RADIUS (Device)
The device RADIUS tab allows you to configure and enable communication between
the selected device (the RADIUS client), a RADIUS server or servers, and Extreme
Management Center, for the purposes of authentication and accounting.
RADIUS accounting collects various data and statistics, such as the length of time a
user has been logged on, and makes that data available to an administrator. It is used by
a device to save accounting data on a RADIUS server. The device sends accounting
requests to the server. The server acknowledges these requests, and data is passed to
the server via accounting updates. For more information on accounting functionality,
refer to your RADIUS server documentation.
To display the device RADIUS tab, select a device in the left-panel Devices tab, then
click the RADIUS tab in the right panel.
Authentication Tab
Use this tab to view and configure the RADIUS authentication servers with which the
device (the RADIUS client) can communicate.
287 of 805
Authentication Tab
Timeout Duration
The total number of seconds the device will wait for the RADIUS authentication
server to respond, before trying again. Valid values are 1-65535. For
ExtremeWireless devices, this value is entered when the RADIUS server is added.
Management Access Timeout Duration Override (sec)
The total number of seconds the device waits for the RADIUS authentication
server to respond before trying again for users accessing the
RADIUS authentication server(s) that have requested management access via the
console, Telnet, SSH, or HTTP, etc.
Network Access Timeout Duration Override (sec)
The total number of seconds the device waits for the RADIUS authentication
server to respond before trying again for users accessing the network via 802.1X,
288 of 805
Authentication Tab
289 of 805
Authentication Tab
each. In this scenario, the sticky round-robin algorithm allows the S-Series device
to spread the load across all three ExtremeControl engines while using the same
ExtremeControl engine for all RADIUS transactions for a given session
(MAC address).
Apply Button
Applies the changes you made in the RADIUS Authentication Client Settings
section.
290 of 805
Authentication Tab
Max Sessions
The maximum number of sticky round-robin authentication sessions allowed on
the server when the sticky round-robin RADIUS authentication algorithm is
configured for the device. This value is not used when other algorithms are being
used. In sticky round-robin, if a MAC address needs to re-authenticate, the request
is sent to the same RADIUS server as the initial authentication request, unless the
current number of authentication sessions for the server has reached the specified
Max Sessions value. When this value is reached, re-authentication requests will
instead default to the standard round-robin behavior to determine which RADIUS
server to send the request to.
Number of Retries
The number of times the device will resend an authentication request if the
RADIUS authentication server does not respond. For ExtremeWireless devices,
this value is configured per RADIUS server. For all other devices, this value is
global to all RADIUS servers, and is specified per device (Client Default) in the
RADIUS Authentication Client Settings section.
Timeout Duration
The amount of time in seconds the device will wait for the RADIUS authentication
server to respond to an authentication request. For ExtremeWireless devices, this
value is configured per RADIUS server. For all other devices, this value is global to
all RADIUS servers, and is specified per device (Client Default) in the RADIUS
Authentication Client Settings section.
Management Interface
The IP address and VRName used when the switch is communicating with a
configured RADIUS server.
Apply Button
Applies any changes you made in the RADIUS Authentication Server(s) tab.
Add Button
Opens the Add RADIUS Authentication Server window, where you can enter the
parameters for a server you want to add to the list. When you click OK on this
window, the new server is added.
Remove Button
Select a RADIUS authentication server in the list and use this button to remove the
server.
Edit Button
Select a RADIUS authentication server in the list and use this button to edit the
server's parameters. You can also edit the server parameters by double-clicking
291 of 805
Accounting Tab
Accounting Tab
Use this tab to view and configure the RADIUS accounting servers with which the
device (the RADIUS client) can communicate.
292 of 805
Accounting Tab
Allows you to override the Accounting Status for users accessing the
RADIUS accounting server(s) that have requested management access via the
console, Telnet, SSH, or HTTP, etc.
Network Access Auth Status Override
Allows you to override the Accounting Status for users accessing the network via
802.1X, MAC, or Web-Based authentication.
Per Authentication Type Accounting Status
Allows you to enable/disable RADIUS accounting for individual authentication
types. Some authentication types do not have RADIUS accounting enabled by
default (when global RADIUS accounting is enabled). Enabling these
authentication types will give both ExtremeControl and other RADIUS servers
more complete information regarding authentication sessions. These options also
allow you to disable accounting messages from certain authentication types, for
example, Auto-Tracking, which does not actually authenticate end users. Note that
the global Accounting Status option controls accounting on a global basis for all
authentication types. Devices that do not support this functionality will have these
fields grayed out.
Update Interval (minutes)
Collected accounting data is sent from the device to the RADIUS accounting
server via accounting updates. The Accounting Update Interval is the amount of
time in minutes between accounting updates. Valid values are 1-65535. It is
recommended that the value be greater than 10 minutes, and careful consideration
should be given to its impact on network traffic. Devices that do not support
RADIUS accounting have this field grayed out (with the exception of an SNMPv1
R2 device, which display accounting values but will not allow you to set them.) For
ExtremeWireless devices, this value is entered when the RADIUS server is added.
293 of 805
Accounting Tab
294 of 805
Accounting Tab
(with the exception of an SNMPv1 R2 device, which display accounting values but
does not allow you to set them.)
Update Interval
The amount of time in minutes between accounting updates. For ExtremeWireless
devices, this value is configured per RADIUS server. For all other devices, this
value is global to all RADIUS servers, and is specified per device (Client Default)
in the RADIUS Accounting Client Settings section.
Management Interface
The IP address and VRName used when the switch is communicating with a
configured RADIUS server.
Apply Button
Applies any changes you made in the RADIUS Accounting Server(s) tab.
Add Button
Opens the Add RADIUS Accounting Server window, where you can enter the
parameters for a server you want to add to the list. When you click OK on this
window, the new server is added.
Remove Button
Select a RADIUS accounting server in the list and use this button to remove the
server.
Edit Button
Select a RADIUS accounting server in the list and use this button to edit the
server's parameters. You can also edit the server parameters by double-clicking
the server entry in the list.
Related Information
For information on related concepts:
l Authentication
For information on related windows:
l Ports Tab (Device)
l Add RADIUS Authentication Server Window
l Add RADIUS Accounting Server Window
295 of 805
Accounting Tab
296 of 805
Accounting Tab
Response Mode
Select the RADIUS response attribute the device uses for authentication:
l Filter ID (Discard VTA) — The Filter ID (role) is used. If a VLAN Tunnel Attribute
(VTA) is returned, it is ignored.
l VLAN Tunnel Attribute (Discard Tunnel Attribute) — The VLAN Tunnel Attribute is
used and the Authentication-Based VLAN to Role Mappings are applied, if
present. If a Filter ID is returned, it is ignored.
l Filter ID With VLAN Tunnel Attribute — Both attributes are applied in the following
manner: the role is applied to the user, except that the VLAN Tunnel Attribute
replaces the role's Default Access Control VLAN (if present). In this case, the
Authentication-Based VLAN to Role mappings are ignored (as the role was
297 of 805
Accounting Tab
explicitly assigned). VLAN classification rules are still applied, as defined by the
assigned role.
Retransmit Algorithm
Select the authentication retransmission algorithm for this device to use with your
RADIUS servers. Devices that do not support this functionality have the option
grayed out.
l Standard — Specifies that the primary RADIUS server should always be used for
authentication, if it is available. The standard RADIUS authentication algorithm
focuses on using RADIUS servers for redundancy rather than for scale
provisioning. The only time secondary RADIUS servers are used, is when the
primary server is unreachable due to a network outage or because server capacity
is exceeded.
l Round-Robin — The round-robin RADIUS authentication algorithm spreads
RADIUS server usage evenly between available RADIUS servers, allowing the
load balancing of a large number of authentications across all RADIUS servers.
This allows for a maximum authentication throughput for the number of servers
configured. Additionally, if a single server is down, only a portion of the
authenticating sessions are affected by the outage.
l Sticky Round-Robin — This algorithm uses round-robin when assigning a RADIUS
server to each unique authentication session, but specifies that the same
RADIUS server is used for any given authentication session once a session is
initiated. In large-scale ExtremeControl deployments, this algorithm is used for
switches authenticating more users than an ExtremeControl appliance supports.
For example, an ExtremeControl deployment might have an S-Series device that
supports 9000 users deployed at the distribution level and authenticating users to
three ExtremeControl appliances that support 3000 users each. In this scenario,
the sticky round-robin algorithm allows the S-Series device to spread the load
across all three ExtremeControl appliances while using the same ExtremeControl
appliance for all RADIUS transactions for a given session (MAC address).
Apply Button
Applies the changes you made in the RADIUS Authentication Client Settings
section.
298 of 805
Accounting Tab
Priority
Order in which the RADIUS authentication server is checked, as compared to the
other RADIUS authentication servers listed here. The lower the number, the higher
the priority with 1 being the highest priority.
Address
IP address of the RADIUS authentication server.
Client UDP Port
UDP port number (1-65535) on the RADIUS authentication server to which the
device sends authentication requests; 1812 is the default port number.
Access Type
The type of authentication access allowed for this RADIUS server:
l Any access — the server can authenticate users originating from any access
type.
l Management access — the server can only authenticate users that requested
management access via the console, Telnet, SSH, or HTTP, etc.
l Network access — the server can only authenticate users accessing the
network via 802.1X, MAC, or Web-Based authentication.
Devices that do not support this feature display N/A in this column.
Current Sessions
The current number of sessions associated with this server when the device is
using the sticky round-robin RADIUS authentication algorithm. This value is not
used when other algorithms are being used.
Max Sessions
The maximum number of sticky round-robin authentication sessions allowed on
the server when the sticky round-robin RADIUS authentication algorithm is
configured for the device. This value is not used when other algorithms are
selected. In sticky round-robin, if a MAC address needs to re-authenticate, the
request is sent to the same RADIUS server as the initial authentication request,
unless the current number of authentication sessions for the server has reached
the specified Max Sessions value. When this value is reached, re-authentication
requests instead default to the standard round-robin behavior to determine the
RADIUS server to which to send the request.
Number of Retries
The number of times the device resends an authentication request if the RADIUS
authentication server does not respond. For ExtremeWireless devices, this value is
configured per RADIUS server. For all other devices, this value is global to all
299 of 805
Accounting Tab
RADIUS servers, and is specified per device (Client Default) in the RADIUS
Authentication Client Settings section.
Timeout Duration (sec)
The amount of time in seconds the device waits for the RADIUS authentication
server to respond to an authentication request. For ExtremeWireless devices, this
value is configured per RADIUS server. For all other devices, this value is global to
all RADIUS servers, and is specified per device (Client Default) in the RADIUS
Authentication Client Settings section.
Management Interface
The IP address and VRName used when the switch is communicating with a
configured RADIUS server.
Add Button
Opens the Add/Edit RADIUS Authentication Server window, where you can enter
the parameters for a server you want to add to the list. When you click OK on this
window, the new server is added.
Edit Button
Select a RADIUS authentication server in the list and use this button to edit the
server's parameters. You can also edit the server parameters by double-clicking
the server entry in the list.
Remove Button
Select a RADIUS authentication server in the list and use this button to remove the
server.
Apply Button
Applies any changes you made in the RADIUS Authentication Server(s) tab.
Related Information
For information on related concepts:
l Authentication
For information on related windows:
l Port Properties - Authentication Configuration Tab
l Add RADIUS Authentication Server Window
l Add RADIUS Accounting Server Window
300 of 805
Accounting Tab
IP Address
IP address of the device.
Auth Client Status
Informs you whether or not the device is enabled as a RADIUS client. If Enabled,
the device is a RADIUS client and communicates with a RADIUS authentication
server whenever a user logs on to a port on the device, as long as the port itself is
enabled for authentication. If Disabled, the device is currently not enabled as a
RADIUS client.
Auth Retries
Number of attempts the device (RADIUS client) makes to connect to the RADIUS
authentication server before giving up and trying the next RADIUS server on the
list.
Auth Timeout Duration
Total number of seconds the device (RADIUS client) waits for the RADIUS
authentication server to respond before trying again.
Auth Server Address
The IP addresses of the RADIUS servers the client device attempts to contact.
301 of 805
Accounting Tab
Related Information
For information on related concepts:
l Authentication
For information on related windows:
302 of 805
Accounting Tab
303 of 805
Accounting Tab
Accounting Status
Allows you to enable or disable RADIUS accounting on SNMPv3 devices that
support it. RADIUS accounting is used by a device to save accounting data on a
RADIUS accounting server. If accounting is enabled, an accounting session starts
after the user is successfully authenticated by a RADIUS authentication server.
The default is Disabled. For ExtremeWireless devices, the status is automatically
set to Enabled when a RADIUS server exists and Disabled when it does not.
Devices that do not support RADIUS accounting have this field grayed out.
Management Access Auth Status Override
Allows you to override the Accounting Status for users accessing the
RADIUS accounting server(s) that have requested management access via the
console, Telnet, SSH, or HTTP, etc.
304 of 805
Accounting Tab
that have requested management access via the console, Telnet, SSH, or HTTP,
etc.
Network Access Timeout Duration Override (sec)
The total number of seconds the device waits for the RADIUS accounting server to
respond before trying again for users accessing the network via 802.1X, MAC, or
Web-Based authentication.
Apply Button
Applies the changes you made in the RADIUS Accounting Client Settings section.
Devices that do not support this feature display N/A in this column.
305 of 805
Accounting Tab
Number of Retries
The number of times the device resends an accounting request if the RADIUS
accounting server does not respond. Valid values are 0-20. Devices that do not
support RADIUS accounting display N/A in this column (with the exception of an
SNMPv1 R2 device, which displays accounting values, but does not allow you to
set them.)
Timeout Duration (sec)
The amount of time in seconds the device waits for the RADIUS accounting server
to respond to an accounting request. Valid values are 2-10 seconds. Devices that
do not support RADIUS accounting display N/A in this column (with the exception
of an SNMPv1 R2 device, which displays accounting values, but does not allow
you to set them.)
Remove Button
Select a RADIUS accounting server in the list and use this button to remove the
server.
Edit Button
Select a RADIUS accounting server in the list and use this button to edit the
server's parameters. You can also edit the server parameters by double-clicking
the server entry in the list.
Related Information
For information on related concepts:
306 of 805
Accounting Tab
l Authentication
For information on related windows:
l Port Properties - Authentication Configuration Tab
l Add RADIUS Authentication Server Window
l Add RADIUS Accounting Server Window
307 of 805
Accounting Tab
IP Address
IP address of the device.
Acct. Client Status
Informs you whether or not RADIUS accounting is enabled on the device (the
RADIUS client). RADIUS accounting is supported on certain SNMPv3 devices,
and is used by the device to save accounting data on a RADIUS server. If
accounting is enabled, an accounting session starts after the user is successfully
authenticated by a RADIUS server. Devices that do not support RADIUS
accounting display N/A in this column (with the exception of an SNMPv1 R2
device, which displays a status.)
Acct. Update Interval
Collected accounting data is sent from the device (RADIUS client) to the RADIUS
server via accounting updates. The Accounting Update Interval is the amount of
time in minutes between accounting updates. Devices that do not support RADIUS
accounting display N/A in this column (with the exception of an SNMPv1 R2
device, which displays a value.)
Acct Server Address
The IP addresses of the RADIUS servers the client device attempts to contact.
308 of 805
Accounting Tab
Related Information
For information on related concepts:
l Authentication
For information on related windows:
l Add RADIUS Authentication Server Window
l Add RADIUS Accounting Server Window
309 of 805
Accounting Tab
Authentication Server IP
Enter the IP or IPv6 address, or the hostname of the RADIUS authentication
server. Not all devices support IPv6 address types.
Authentication Client UDP Port
Enter the UDP port number (1-65535) the device (RADIUS client) uses to send
authentication requests to the RADIUS authentication server; 1812 is the default
port number.
Server Shared Secret
A string of characters used to encrypt and decrypt communications between the
device (RADIUS client) and the RADIUS authentication server. This string must
match the shared secret entered when you added the client device on the RADIUS
310 of 805
Accounting Tab
server. Without the shared secret, the server and client are unable to communicate,
and authentication attempts fail. The shared secret must be at least 6 characters
long; 16 characters is recommended. Dashes are allowed in the string, but spaces
are not.
NOTES: If you are configuring multiple RADIUS servers, the same server shared secret
must be used for each RADIUS server. This is because most devices (RADIUS
clients) only support one shared secret. Matrix N-Series devices with firmware
version 5.0 or above are an exception to this, as these devices do support a unique
shared secret for each server.
This Server Shared Secret is not to be confused with the Application Shared
Secret that encrypts communication between the RADIUS client and Extreme
Management Center, entered in the Application Shared Secret area of the
RADIUS tab for a device.
Number of Retries
The number of times the device will resend an authentication request if the
RADIUS authentication server does not respond. For ExtremeWireless devices,
this value is configured for each server. For all other devices, this value is global to
all RADIUS servers, and is specified per device (Client Default) in the RADIUS
Authentication Client Settings section of the RADIUS tab.
Timeout Duration
The amount of time in seconds the device will wait for the RADIUS authentication
server to respond to an authentication request. For ExtremeWireless devices, this
value is configured for each server. For all other devices, this value is global to all
RADIUS servers, and is specified per device (Client Default) in the RADIUS
Authentication Client Settings section of the RADIUS tab.
311 of 805
Accounting Tab
Server Priority
Order in which the RADIUS authentication server will be checked, as compared to
the other RADIUS authentication servers on the device. The lower the number, the
higher the priority.
Management Interface
Select the IP address and VRName to use when the switch is communicating with
a configured RADIUS server.
NOTE: ExtremeXOS devices must define a Management Interface.
Related Information
For information on related concepts:
l Authentication
For information on related windows:
l RADIUS Tab
312 of 805
Accounting Tab
Accounting Server IP
Enter the IP or IPv6 address, or the hostname of the RADIUS accounting server.
Not all devices support IPv6 address types.
Accounting Client UDP Port
Enter the UDP port number (1-65535) the device (RADIUS client) uses to send
accounting requests to the RADIUS server; 1813 is the default port number.
Devices that do not support RADIUS accounting will have this field grayed out
(with the exception of an SNMPv1 R2 device, which will display accounting values
but will not allow you to set them.)
313 of 805
Accounting Tab
This Server Shared Secret is different than the Application Shared Secret that
encrypts communication between the RADIUS client and Extreme Management
Center, entered in the Application Shared Secret area of the RADIUS tab for a
device.
314 of 805
Ports (Device)
Related Information
For information on related windows:
l RADIUS Tab
Ports (Device)
The device Port Groups tab displays a table of information about the selected device's
ports. To access this tab, select a port group from the left panel'sDevices/Port
Groups>Port Groups tab.
315 of 805
Ports (Device)
Name
Name of the port, constructed of the name or IP address of the device and either
the port index number or the port interface name.
Instance
Shows the instance for the port.
Dot1dIndex
The index value assigned to the port interface.
Status
Shows the status (Up, Down, or Unknown) of the port.
Default Role
Displays the default role for the port. To set the default role, select a port, right-click
and select Set Default Role. The Roles Selection view appears where you can
select the desired default role. See Default Role in the Concepts topic for
information on default roles.
NOTE: Setting a default role on an ExtremeWireless Controller port that is not yet a VNS,
creates a new VNS on the HWC.
Alias
Shows the alias (ifAlias) for the interface, if one is assigned.
Stats
Displays information about the port, if configured in PortView.
Port Type
Type of port. Possible values include: Access, CDP, CDP FTM 1 Backplane, FTM
1 Backplane, and Logical.
316 of 805
Ports (Device)
Neighbor
The port to which the port is connected.
Port Speed
Speed of the port. Possible values include: 10/100, speed in megabits per second
(for example, 800.0 Mbps), Unknown (displayed for logical ports).
VLANs
The VLANs to which the port is associated.
Description
A description of the port and the device.
Port Type Details
Additional information about the type of port.
Serial Number
The serial number of the device.
Retrieve Button
Retrieves the most recent information about the ports on the device.
Related Information
For information on related tasks:
l How to Create a Port Group
317 of 805
Ports (Device)
Name
Name of the port, constructed of the name or IP address of the device and either
the port index number or the port interface name.
Default Role
See Default Role in the Concepts topic for information on default roles. For
additional information, see Port Mode.
Alias
Shows the alias (ifAlias) for the interface, if one is assigned.
Port Type
Type of port. Possible values include: Access, Interswitch Backplane, Backplane,
Interswitch, and Logical.
Port Speed
Speed of the port. Possible values include: 10/100, speed in megabits per second
(for example, 800.0 Mbps), Unknown (displayed for logical ports).
318 of 805
Details View (Port Groups)
Related Information
For information on related tasks:
l How to Configure Ports
For information on related windows:
l Add/Remove Ports Window
l Port (Authentication) Tab
This tab appears when you select the Devices/Port Groups > Port Groups left-panel
tab. It displays a table of information about the existing port groups.
Name
Name of the port group.
Number of Ports
Number of ports in the port group.
Related Information
For information on related windows:
l Details View Tabs
319 of 805
Add/Remove Ports (User-Defined Port Groups)
Use the Add/Remove Ports window to add and remove ports from user-defined port
groups.
To access this window, select the left-panel Port Groups tab. Expand the User-Defined
Port Groups folder and select a port group. From this window you can:
l Click the Add/Remove Ports button in the right-panel Ports tab.
l Right-click a Port Group in the left-panel and select Add/Remove Ports.
320 of 805
Add/Remove Ports (User-Defined Port Groups)
Remove Button
Click Remove to remove the ports selected in the Other Groups — Port
Membership list from the port group.
Remove All Button
Click Remove All to remove all the ports in the Other Groups — Port Membership
list.
Related Information
For information on related tasks:
l Adding Ports to a Port Group
l Removing Ports from a Port Group
Add/Remove Ports
In this window, you can add and remove ports to and from port groups. Initially, all ports
are grouped into a Default port group. When you create new port groups, you add ports
from the Default group into your newly defined port groups using this window.
To access this window, open the Devices > Port Groups tab. Then, right-click on the
port group to which the ports are being added and select Add/Remove Ports. The
Add/Remove Ports window opens with the ports in the Default port group displayed in
the left panel.
Add ports to the port group by selecting the ports in the left-panel, then selecting the port
group in the right panel and clicking Add To Group.
NOTE: User based ports are not listed because user based port groups can only be one default.
321 of 805
Add/Remove Ports (User-Defined Port Groups)
Devices
This field displays the Devices assigned to the Policy Domain. Ports grouped in
the Devices list are not members of the Port Group.
Group Port Membership
This field displays any port groups you have created and their currently defined
ports.
Add To Group Button
Adds the ports selected under the Devices list to the port group selected on the
right.
Remove Button
Select the ports you want to remove from a port group and click Remove to return
the ports to the Devices list.
Remove All Button
Select a port group and click Remove All to remove all ports from the port group
and return them to the Devices list.
Related Information
For information on related concepts:
l Getting Started with Class of Service
For information on related tasks:
322 of 805
Add/Remove Ports (User-Defined Port Groups)
323 of 805
Add/Remove Ports (User-Defined Port Groups)
Authentication Mode
This section displays general authentication and port mode information about the port.
Port Mode
This area displays the current port mode for the port, and allows you to change the
settings if desired. Port mode defines whether or not a user is required to authenticate on
a port, and how unauthenticated traffic will be handled. It is a combination of
Authentication Behavior (whether or not authentication is enabled on the port), and
Unauthenticated Behavior (whether unauthenticated traffic will be assigned to the port's
default role or discarded). See Port Mode for a complete description of each port mode.
324 of 805
Add/Remove Ports (User-Defined Port Groups)
In addition, this section provides checkboxes that allow you to disable a specific
authentication type at the port level.
Auth/Unauth Behavior
Select an option to specify how authenticated and unauthenticated traffic is
handled on the port. (See Port Mode for more information.) If you set the port's
Authentication Behavior to Active (i.e., you enable authentication for the port), it is
recommended that you enable the Drop VLAN Tagged Frames feature.
NOTE: Authentication Behavior must be set to Active for authentication to be allowed using
CEP Protocols.
325 of 805
Add/Remove Ports (User-Defined Port Groups)
NOTE: For Multi-User Web-Based authentication with Active/Discard as the selected port
mode: This checkbox is automatically selected because multi-user web-based
authentication does not support the Active/Discard port mode.
Apply Button
Applies any Port Mode changes to the port.
CEP protocols in the CEP Access tab
Use the CEP Access tab to disable CEP protocols at the port level.
326 of 805
Add/Remove Ports (User-Defined Port Groups)
Login Settings
This tab displays the current login settings for the port and allows you to change the
settings if desired. The options available depend on what type(s) of authentication are
enabled on the device.
327 of 805
Add/Remove Ports (User-Defined Port Groups)
328 of 805
Add/Remove Ports (User-Defined Port Groups)
Automatic Re-Authentication
This tab is grayed out if only web-based authentication is enabled on the device. For
802.1X and MAC authentication, the Automatic Re-Authentication tab lets you set up the
periodic automatic re-authentication of logged-in users on this port. Without disrupting
the user's session, the device repeats the authentication process using the most recently
obtained user login information to see if the same user is still logged in. Authenticated
logged-in users are not required to log in again for re-authentication, as this occurs
"behind the scenes."
329 of 805
Add/Remove Ports (User-Defined Port Groups)
330 of 805
Add/Remove Ports (User-Defined Port Groups)
NOTE: Port Mode Authentication Behavior must be set to Active (on the General sub-tab) for
authentication to be allowed using these CEP Protocols.
Enable CEP protocols for multiple ports using the Port Configuration Wizard. In addition
to enabling protocols on the port, you must also configure CEP for the device on which
the port resides. Configure CEP for a single device using the device Authentication tab
(CEP sub-tab) or for multiple devices using the Device Configuration Wizard.
331 of 805
Add/Remove Ports (User-Defined Port Groups)
CEP Access
Lists all the CEP protocols supported by the device on which the port resides. Use
the checkboxes to enable or disable CEP protocols on this port. If the device does
not support the CEP feature, this area is blank.
Related Information
For information on related tasks:
l How to Configure Ports
The How To section contains Help topics that give you instructions for performing tasks
in the Policy tab.
The Policy tab includes several Add/Remove windows in which you can add items from
a left panel to a right panel, and remove items from the right panel. The following
procedures explain how to make single and multiple selections in the panels and move
the selections to the opposite panel.
332 of 805
Add/Remove Ports (User-Defined Port Groups)
Instructions on:
l Selecting single items
l Selecting multiple sequential items
l Selecting multiple non-sequential items
To select a sequence of items in the left panel and add them to the right panel:
1. Hold down the Shift key and click the first and last (or last and first) items in the
sequence.
2. Click the Right Arrow button.
To remove a sequence of items from the right panel:
1. Hold down the Shift key and click the first and last (or last and first) items in the
sequence.
2. Click the Left Arrow button.
1. Hold down the Ctrl key and click each item you want to add.
2. Click the Right Arrow button.
To remove multiple non-sequential items from the right panel:
1. Hold down the Ctrl key and click each item you want to remove.
2. Click the Left Arrow button.
Extreme Management Center provides the ability to create multiple policy configurations
by allowing you to group your roles and devices into Policy Domains. A Policy Domain
333 of 805
Add/Remove Ports (User-Defined Port Groups)
contains any number of roles and a set of devices that are uniquely assigned to that
particular domain. For example, a university may have a Dormitory domain with a policy
configuration created for students, and an Administration domain with a policy
configuration for staff members.
You can create multiple domains and easily switch from one domain to another. You can
also export policy domain configuration data to a .pmd file, (one file per domain) for
backup and troubleshooting purposes, and you can import data from a .pmd file into a
policy domain.
In order for your network devices to be displayed in the Policy tab's left-panel Devices
tab, they must be assigned to a Policy Domain. Initially, you must use a device Discover
to add your devices to the Extreme Management Center database. Once your devices
are in the database, you can assign the devices to a Policy Domain. As soon as the
devices are assigned to a domain, they are automatically displayed in the Policy tab's
left-panel Devices tab. Only devices that support policy are displayed.
Extreme Management Center automatically locks the current Policy Domain when you
begin to edit the domain configuration. Other users are notified that the domain is locked
and they are not be able to save their own domain changes until the lock is released. For
more information, see Controlling Client Interactions with Locks. After a modification is
made, you must save the domain to notify all clients that are viewing that domain of the
change, and automatically update their view with the new configuration.
Instructions on:
l Creating a New Domain
l Opening a Domain
l Assigning Devices to a Domain
l Removing Devices From a Domain
l Importing a File into a Domain
l Exporting a Domain to a File
l Importing Data from a Domain
l Saving a Domain
l Reading a Domain
l Renaming a Domain
l Deleting a Domain
334 of 805
Add/Remove Ports (User-Defined Port Groups)
Opening a Domain
In Extreme Management Center, you work in one current domain at a time. To change to
a different domain, use the Open/Manage Domain > Open Domain menu to select the
desired domain. If you have made changes to the current domain, you are prompted to
update the database with the current domain configuration prior to opening the new
domain.
335 of 805
Add/Remove Ports (User-Defined Port Groups)
4. The right panel displays the current domain and the devices assigned to that
domain. To add a device to the current domain, select the device in the left panel
and click Add. You can also select and add multiple devices.
5. To remove a device from the current domain, select the device and click Remove.
This removes the device from the current domain and places it back in the device
tree as either unassigned or as a member of the domain from which it came. It does
not delete the device from the Extreme Management Center database.
6. Click OK.
7. The selected devices are assigned to the current domain and displayed in the
Policy tab left-panel Devices tab. (Only devices that support policy are assigned to
the domain and displayed.)
NOTE: Removing a device from a domain does not delete the device from the Extreme
Management Center database. To delete a device from the database, right-click on the
device in the left-panel Devices tab, and select Delete from the menu. When a device is
deleted from the database, it is automatically removed from Extreme Management Center
and the Devices tab.
1. If necessary, open the domain from which you want to remove devices.
2. Select Open/Manage Domain > Assign Devices to Domain. The Assign Devices
to Domain window opens.
3. The right panel displays the current domain and the devices assigned to that
domain. To remove a device from the current domain, select the device from the
Current Domain right-panel and click the left arrow. This removes the device from
the current domain and places it back in the device tree as either unassigned or as
a member of the domain from which it came. It does not delete the device from the
Extreme Management Center database.
4. Click OK.
336 of 805
Add/Remove Ports (User-Defined Port Groups)
1. Make sure that the domain you want to import a file into is your current domain.
2. Select Open/Manage Domain > Import/Export > Import From File. The Import
from File window opens.
3. Enter the name and path for the data file (PMD) you want to import, or browse to
the file. Clicking Select File, opens a dialog box from which you can select a data
file by searching your local drive or a network drive.
4. Select the specific data elements you want to import or click Select All to select all
the data import options at once. See Data Elements to Import for important
information on each element and how they are imported.
5. To append, update, or overwrite the global rules with the PMD file you are
importing, select the Global Services & Rules checkbox.
6. Select how you want the imported data applied to your current domain. Click on
the links below for detailed information on how each specific action affects the
import of certain data elements.
l Append data to existing elements
l Update existing data with elements from domain
l Overwrite existing elements
7. Click OK. The data elements are imported and see a message regarding import
status.
337 of 805
Add/Remove Ports (User-Defined Port Groups)
4. Select the specific data elements you want to import or click Select All to select all
the data import options at once. See Data Elements to Import for important
information on each element and how they are imported.
5. Select how you want the imported data applied to your current domain. Click on
the links below for detailed information on how each specific action affects the
import of certain data elements.
l Append data to existing elements
l Update existing data with elements from domain
l Overwrite existing elements
6. Click Import. The data elements are imported and you see a message regarding
import status.
Saving a Domain
After a Policy Domain has been changed, you must save the domain to notify all clients
using that domain of the change and automatically update their tab with the new
configuration. An asterisk (*) is displayed beside the Policy tab title when you have
made changes to the domain that need to be saved. You can save a Policy Domain by
selecting Open/Manage Domain > Save Domain. To discard unsaved changes you
made to a domain, open the Open/Manage Domains > Open Domain menu and select
the domain in which you are currently working.
Renaming a Domain
You can rename the current Policy Domain by selecting Open/Manage Domain
> Rename Domain and entering a new name.
Deleting a Domain
Related Information
For information on related tasks:
l How to Add and Delete Devices
For information on related windows:
338 of 805
Add/Remove Ports (User-Defined Port Groups)
A role is a policy profile consisting of a set of network access services that you can apply
at various access points in a policy-enabled network. A port takes on a user's role when
the user authenticates.
Creating a role using the role tabs consists of creating a name for the role with the
Create Role menu option, then defining its characteristics (default class of service,
default access control, and/or services) using the role's right-panel tabs. You might also
use this method if you are creating a role for which there is default class of service and/or
access control, but no services.
If you want to change the characteristics of a role, you can select the role in the left panel
and use the right panel to modify it.
Instructions on:
l Using the Role Tabs
l Modifying a Role
l Deleting a Role
339 of 805
Add/Remove Ports (User-Defined Port Groups)
New Role). You can then rename the new role. Press Enter after you've entered
the name. (If you don't press Enter, the name remains New Role.)
4. Select the role in the left panel, and the role opens in the right panel. Use the right
panel to add a role description, enable TCI Overwrite, and set the role's default
actions (including access control and class of service).
5. In the Services section in the right panel, click the Add/Remove Services button to
add services to the role. This opens the role Add/Remove Services window.
NOTE: The Policy tab checks for rule conflicts when more than one service is added. See
Conflict Checking for more information.
6. To add a VLAN to the Role's Egress list, select the role and use the VLAN Egress
tab in the right panel.
7. To configure MAC, IP, and VLAN to role mapping lists for the role, select the role
and use the Mappings tab in the right panel.
8. Now that you have created the role, you can:
l Assign the role as the default role for a port
l Modify the role's characteristics
9. Enforce to write the new information to the devices.
Modifying a Role
Once you've created a role, you can change its characteristics by selecting the role in
the Policy tab's left panel and using the associated tabs in the right panel.
Instructions on:
340 of 805
Add/Remove Ports (User-Defined Port Groups)
1. Select the left panel Roles/Services > Roles tab and expand the Roles tab. Select
the role to which you want to add services in the left panel, then select the General
tab in the right panel.
2. Click Add/Remove Services. This opens the Add/Remove Services window.
3. Make sure the role to which you wish to add services is displayed in the Role
selection box.
4. In the Groups and Services panel, select the services and/or service groups you
wish to add to the role, and click the Right Arrow button. To remove services,
select them in the Selected Services panel and click the Left Arrow button.
NOTE: The Policy tab checks for rule conflicts when more than one service is added. See
Conflict Checking for more information.
5. If you wish, you can select another role, and add or remove services from it.
6. Click OK.
7. Enforce to write the new information to the devices.
341 of 805
Add/Remove Ports (User-Defined Port Groups)
Deleting a Role
1. In the Policy tab left panel, select a device in the Devices left-panel tab.
2. Select the port on which you want to delete the default role.
3. Right-click the port and select Policy > Set Default Role.
4. Click the Clear Default Role checkbox.
5. Select the default role for the port.
6. Click OK.
7. Enforce to write the new information to the devices.
342 of 805
Add/Remove Ports (User-Defined Port Groups)
Related Information
For information on related concepts:
l Traffic Classification Rules
For information on related tasks:
l Assigning Default Roles to Ports
l Clearing Default Roles from Ports
l How to Make Selections on Add/Remove Windows
l How to Assign a Default Role to a Port
In the Policy tab, you can specify a default role for the port. To configure ports you use
the Set Default Role window.
NOTE: Setting a default role on an ExtremeWireless Controller port that is not yet a VNS, creates
a new VNS on the wireless controller.
1. Select a device in the left-panel Devices tab and expand a slot or ports grouping in
the right-panel Details view.
2. Right-click the desired port and select Policy > Set Default Role from the menu.
The Set Default Role window opens.
343 of 805
Add/Remove Ports (User-Defined Port Groups)
3. Click Assign/Replace Default Role and select a role in the drop-down list.
4. Click OK.
NOTE: If you are replacing the current default role with another one, you don't need to clear the
current default role. Selecting the new default role and clicking OK clears the previous
default role automatically.
The Quarantine role is a highly restrictive role used to isolate users and restrict network
access.
The Quarantine role is used in conjunction with the Extreme Networks Intrusion
Prevention System (IPS) to create an automatic response to threats detected on the
network. Once the Quarantine role has been enforced to the network and the Extreme
Networks IPS is properly configured, this role can be automatically set as the default role
on any port where a threat has been detected. Normally, roles are applied to ports via
authentication.
You can also set the Quarantine role as a port's default role if, for example, you have
modified the role to provide some limited access and you want to use it as a "guest" role.
The Policy tab default domain includes the Quarantine role. However, if you add a new
domain, you need to create the Quarantine role. For information on how to create a role,
see How to Create a Role.
After you have created the role, you can modify the role's default class of service and
access control settings, and make changes to the role's services and rules using the
right-panel tabs, just like any other role. If you make any changes to the Quarantine role,
344 of 805
Add/Remove Ports (User-Defined Port Groups)
keep in mind that the role may be used by other applications and should remain highly
restrictive in nature.
Instructions on:
l Modifying the Quarantine Role: Use the right-panel tabs to modify the Quarantine
role's default values and add or remove services.
l Setting the Quarantine Role as the Default Role on a Port: Use the right-panel
General tab or the Port Configuration wizard to set the Quarantine role as a default
role on a port.
Adding/Removing Services
Use the General tab to add or remove services to the Quarantine role.
1. Select the Quarantine Role in the left-panel Roles tab.
2. In the right-panel General tab, click Add/Remove Services. This opens the
Add/Remove Services window.
3. Make sure the Quarantine role is displayed in the Role selection box.
4. Select the service or service group in the All Services & Service Groups and click
the Right Arrow button to add them to the Selected Services & Service Groups list.
To remove services, select them in the Selected Services & Service Groups list
and click the Left Arrow button. To remove all services, click the Double Left
345 of 805
Add/Remove Ports (User-Defined Port Groups)
Arrow button.
NOTE: The Policy tab checks for rule conflicts when more than one service is added. See
Conflict Checking for more information.
5. Click OK.
6. Be sure to perform an Enforce to write the new Quarantine role to the devices.
The Quarantine role is assigned as a default role just like any other role. Refer to
Assigning Default Roles to Ports for instructions.
Related Information
For information on related tasks:
l Assigning Default Roles to Ports
For information on related windows:
l Add/Remove Services Window
l General Tab (Role)
Services are sets of rules that define how network traffic for a particular network service
or application should be handled by a network access device. A service might consist of
only one rule governing, for example, email priority, or it might consist of a complex set of
rules combining class of service, filtering, rate limiting, and access control (VLAN)
assignment. Extreme Management Center policy allows you to create Local Services
(services unique to the current domain) and Global Services (services common to all
domains). Global Services let you easily create and manage services shared between
all your domains.
Services can be one of two types: Manual Service or Automated Service.
346 of 805
Add/Remove Ports (User-Defined Port Groups)
l Manual Service — This service consists of one or more traffic classification rules
you create based on your requirements. Manual services are good for applying
customized sets of rules to roles.
l Automated Service — This service automatically creates a rule with a specified
action (class of service and/or access control), for each device in a particular
network resource group or groups. You create a network resource group using a
list of MAC or IP addresses, and then associate the group with the Automated
service (see How to Create a Network Resource for more information). Automated
rule types include Layer 2 MAC Address rules, Layer 3 IP Address and IP Socket
rules, and Layer 4 IP UDP Port and IP TCP Port rules.
To create a service using the service tabs, right-click the Services tab and select Create
Service. If you are creating a Manual service, you can then use the Create Rule menu
option and the tabs for the rule to define the rules for the service. You can also use the
service tabs and rule tabs to modify an existing service and its rules.
Once you've created a service, you can apply it to any number of roles in the Policy tab.
A role may utilize both Manual and Automated services.
Instructions on:
l Using the Service Tabs
l Modifying a Service
l Deleting a Service
347 of 805
Add/Remove Ports (User-Defined Port Groups)
4. Type the service name in the Create window. The service name is case-sensitive;
therefore, Extreme Management Center policy sees Engineer and engineer as
two different service names. Click OK. If you don't do this, the name remains New
Service. The right-panel displays the service you created.
5. Define the rule's traffic description and actions, and enter a description of the
service, if desired. For information on configuring the fields on this tab, see the
Automated Service window Help topic.
6. Enforce to write the new information to your devices.
NOTE: When you add more than one rule to a service, Extreme Management Center
checks for conflicts with other rules in the service. See Conflict Checking for more
information.
Modifying a Service
Once you've created a service, you can change its characteristics by selecting the
service or its rules in the left-panel Services tab and using the menu options or
associated right-panel tabs.
l Modifying a Service Description
l Modifying a Service Name
l Modifying the Roles for a Service
348 of 805
Add/Remove Ports (User-Defined Port Groups)
NOTE: If the service is a member of a service group and it's more convenient, you can find
the service under the service group in the Service Groups folder. Any change you
make to the name there are also reflected in the Services tab.
3. Right-click the service whose name you want to change, and select Rename.
4. Type the new name in the Rename window.
5. Click OK to save the change to the database.
349 of 805
Add/Remove Ports (User-Defined Port Groups)
NOTE: If the service is a member of a service group and it's more convenient, you can find
the service under the service group in the Service Groups tab. Any change you
make to the rule there will also be reflected in the Services tab.
NOTE: If the service is a member of a service group and it's more convenient, you can find
the service under the service group in the Service Groups tab. Any change you
make to the service there are also reflected in the Services tab.
2. Select the service you want to modify. The Automated Service window opens in
the right panel.
3. Modify the characteristics of the Automated service as required.
4. Enforce to write the new information to your devices.
Deleting a Service
Deleting a service removes the service and its rules. If copies of the rules exist for other
services, those copies are not affected by the deletion. However, deleting the service
removes it from any service groups and roles with which it was associated, so be sure
350 of 805
Add/Remove Ports (User-Defined Port Groups)
the service is not needed before you delete it. Deleting a Global service deletes the
service from all your domains.
1. Select the left-panel Roles/Services > Service Repository tab.
2. Expand the Services tab in either the Local Services or Global Services tab,
depending on the type of service you are deleting.
NOTE: If the service is a member of a service group and it's more convenient, you can find
the service under the service group in the Service Groups tab. Any change you
make to the service there are also reflected in the Services tab.
Related Information
For information on related concepts:
l Traffic Classification Rules
For information on related tasks:
l Adding Services to Roles
l Adding Services to Service Groups
l Creating Service Groups
l How to Create a Class of Service
l How to Create a Network Resource Group
l How to Create or Modify a Rule
l How to Define a Rate Limit
For information on related windows:
l Details View Tabs
l Automated Service Tab
Extreme Management Center Policy lets you create service groups into which you can
group Local and Global services. A service group can contain any number of services,
351 of 805
Add/Remove Ports (User-Defined Port Groups)
as well as other service groups. A service can be a part of more than one group.
Instructions on:
l Creating a Service Group
l Adding Services to a Service Group
l Removing Services from a Service Group
352 of 805
Add/Remove Ports (User-Defined Port Groups)
1. Right-click the service group from which you wish to remove services, and select
Add/Remove Services.
2. In the Add/Remove Services window, select the services or service groups you
want to remove from the service group, and click the Left Arrow button.
3. Click OK.
Related Information
For information on related tasks:
l How to Create a Service
l Deleting a Service
Traffic Classification rules allow you to assign a class of service and/or access control
(VLAN membership) to network traffic, depending on the traffic's classification type.
Classification types are based on layers 2, 3, and 4 of the OSI model, and traffic is
classified according to specific layer 2/3/4 information contained in each frame. For more
information, see Traffic Classification Rules.
A rule has two main parts: Traffic Description and Actions. The Traffic Description
identifies the type of traffic to which the rule pertains. Actions specify whether that traffic
is assigned class of service, access control, or both.
In order to create a rule, you must first create a service with which to associate it.
Instructions on:
l Creating a Rule
l Disabling/Enabling a Rule
l Deleting a Rule
Creating a Rule
When you create a rule using the Rule tab, you first create and name the rule using the
Create Rule menu option, then define its characteristics in the right panel. You can also
use the right panel to modify an exiting rule's characteristics.
353 of 805
Add/Remove Ports (User-Defined Port Groups)
1. In the Policy tab left panel, select the Roles/Services > Service Repository tab.
2. Expand either the Local or Global Services folder, depending on whether the rule
is going to be used locally or by all users.
3. Expand either the Service Groups or Services folder and click on the service for
which you want to create a rule.
4. Right-click on the service and select Create Rule.
5. In the Create Rule window, enter a name for the rule and select the rule type. Click
OK. The rule is created in the left-panel tree.
6. Select the rule to and use the associated right-panel Rule tab to define the rule.
Refer to the Rule tab Help topic for information on configuring the rule.
7. Enforce to write the new information to the devices.
Disabling/Enabling a Rule
In the Policy tab, you can disable and enable individual or multiple rules. You can also
disable and enable all the rules associated with a service, or all the rules for all the
services in a service group. The rule icon in the left panel displays a red X if the rule is
disabled.
Disabling a rule is an alternative to deleting and recreating it. If you disable a rule, it is
temporarily unavailable for use by the service with which it is associated. However, the
rule can be copied to another service and enabled for that service.
Disabling/Enabling an Individual Rule
You can enable or disable a rule on the Rule tab or by right-clicking on the rule in the
Service Repository tab and selecting Disable Rule(s) or Enable Rule(s).
1. In the Policy tab left panel, select the Roles/Services > Service Repository tab.
2. Expand either the Local or Global Services folder, depending on whether the rule
is going to be used locally or by all users.
3. Expand either the Service Groups or Services folder and click on the service for
which you want to create a rule.
4. Select the rule you want to disable or enable.
The Rule tab opens in the right panel.
5. Select Enable or Disable in the Rule Status field. Disabling the rule turns on the
red X on the rule icon in the left panel, and re-enabling it turns it off.
6. Enforce to write the new information to the devices.
Disabling/Enabling the Rules for a Service or Service Group
If a service is associated with more than one service group, disabling or enabling the
354 of 805
Add/Remove Ports (User-Defined Port Groups)
rules for the service in one service group will disable/enable the rules for the service in
the other service groups of which the service is a part.
1. In the Policy tab left panel, select the Roles/Services > Service Repository tab.
2. Expand either the Local or Global Services folder, depending on whether the rule
is used locally or by all users.
3. Right-click the service or service group containing the rules you want to disable or
enable and select Disable Rule(s) or Enable Rule(s).
4. Click Yes to confirm the change.
5. Enforce to write the new information to the devices.
Deleting a Rule
Deleting a rule removes the rule from a service. If the service is also part of a service
group, the rule is deleted there as well, so be sure the rule is not needed before you
delete it.
1. In the Policy tab left panel, select the Roles/Services > Service Repository tab.
2. Expand either the Local or Global Services folder, depending on whether you are
deleting a rule used locally or by all users.
3. Right-click the rule you want to delete, and select Delete.
4. Click Yes to confirm, then OK to clear the confirmation message. The rule is
deleted wherever it exists.
5. Enforce to write the new information to the devices.
Related Information
For information on related concepts:
l Traffic Classification Rules
For information on related windows:
l Edit Rule Window
l Rule Tab
355 of 805
Add/Remove Ports (User-Defined Port Groups)
The Policy tab allows you to create and define rate limits as components of a class of
service. Rate limits are used to control the transmit rate at which traffic enters and exits
ports in your network.
The Policy tab uses role-based rate limits that are tied directly to roles and rules, and are
written to a device when the role/rule is enforced.
Instructions on:
l Defining Rate Limits
l Removing a Rate Limit
356 of 805
Add/Remove Ports (User-Defined Port Groups)
l Disable Port on Rate Violation — the port is disabled when the rate limit
is first exceeded.
c. Click OK.
The rate limit appears in the CoS Configuration table mapped to the CoS.
Role-based rate limits are written to your devices when you enforce the role that
includes them.
NOTE: If you simply select None from the drop-down list, it un-maps the rate from the class of
service but it does not remove the rate limit.
Related Information
For information on related concepts:
l Rate Limits
For information on related tasks:
l How to Create a Class of Service
For information on related windows:
l Create Rate Limit Window
l General Tab (Rate Limit)
357 of 805
Add/Remove Ports (User-Defined Port Groups)
The Policy tab lets you define classes of service (CoS) that can include one or more of
the following components: an 802.1p priority, an IP type of service (ToS) value, drop
precedence, rate limits, and transmit queue configuration.
Initially, the Class of Service Configuration window (available from the Policy tab Class
of Service left-menu tab) is pre-populated with eight static classes of service, each
associated with one of the 802.1p priorities (0-7). You can use these classes of service
as is, or configure them to include ToS, rate limit, and/or transmit queue values. In
addition, you can also create your own classes of service.
After you have created and defined your classes of service, they are then available when
you make a class of service selection for a rule action (Rule tab), a role default (General
tab), or an automated service (Automated Service window).
It is recommended that you read Getting Started with Class of Service before creating
your classes of service.
Instructions on:
l Creating a Class of Service
l Creating Class of Service Port Groups
l Deleting a Class of Service
Use the following instructions to create a new class of service using the Class of Service
Configuration window.
1. Open Extreme Management Center and select Control tab > Policy tab > Class of
Service left-menu tab.
2. Right-click the Class of Service tab tree and select Create COS from the menu.
The Create window opens.
3. Enter the name for the CoS in the Name field and click OK.
The new class of service opens in the right panel.
4. Click the Edit button to enter a description for the CoS.
358 of 805
Add/Remove Ports (User-Defined Port Groups)
5. Click the Edit button next to the Transmit Queue field to open the Edit Transmit
Queue window, from which you can select a transmit queue for the class of
service. If you would like to select a different transmit queue for each port type,
select the Select Q/Port Type option. Then, when you click OK, a window opens
where you can specify a different transmit queue for each port type.
6. Select an 802.1p priority from the drop-down list to choose the priority (0-7 with 7
being the highest priority).
7. Click the Edit button to select the ToS option to associate an IP ToS (Type of
Service) value with the class of service, if desired (see IP Type of Service for more
information). Enter a value in the Type of Service (ToS) field.
8. Specify a Drop Precedence, if necessary. The Drop Precedence is used in
conjunction with the Flex-Edge feature available on K-Series and S-Series
(Release 7.11 or higher) devices. Flex-Edge provides the unique capability to
prioritize traffic in the MAC chip as it enters the switch. When the Class of Service
is assigned to a policy role, and that role is applied to a port via a MAC source
address mapping or the port default role, the drop precedence dictates the internal
priority (within the MAC chip) that will be used for packets received on the port. If
congestion occurs, packets with a high drop precedence are discarded first.
Therefore, if a packet is important, it should have a low drop precedence. Refer to
the K-Series or S-Series Configuration Guide for more information on the Flex-
Edge feature and drop precedence.
9. If desired, use the Rate Limiting/Rate Shaping section to select a port inbound,
outbound, and transmit queue rate limit to associate with the class of service. Click
View/Edit next to the IRL Port Group Mappings or ORL Port Group Mappings to
open the CoS - Rate Limit Mappings tab of the Rate Limit Port Groups window
where you can add, edit, or delete a rate limit. The rate limit you select here applies
to all IRL/ORL port groups. Click the View/Edit button next to TXQ Port Group
Shapers field to open the CoS - Transmit Queue Mappings tab to configure
transmit queue mappings.
10. If you have ExtremeWireless Controllers on your network, you see an option to
select inbound and outbound user rate limits to associate with the class of service.
User rate limits specify the bandwidth given to each individual user on a port.
Currently, user rate limits are only available for wireless controllers.
11. Click Open/Manage Domain > Save Domain. The class of service is created and
is listed in the Class of Service tab.
After a class of service has been created, you can double-click in the Class of Service
Configuration table to modify its characteristics, if necessary.
359 of 805
Add/Remove Ports (User-Defined Port Groups)
360 of 805
Add/Remove Ports (User-Defined Port Groups)
Related Information
For information on related tasks:
l Getting Started with Class of Service
l How to Define Rate Limits
l How to Configure Transmit Queues
For information on related windows:
l Class of Service Tab
The Policy tab allows you to configure transmit queues as a component of a class of
service (CoS).
There are two transmit queue configuration capabilities:
l Transmit Queue Configuration — Allows you to set the transmit queue associated
with the class of service.
l TxQ Shaper — Transmit Queue Rate Shapers let you pace the rate at which traffic
is transmitted out of a transmit queue.
These two capabilities are configured in the Class of Service tab available from the
Policy tab.
For more information, see the section on transmit queues in Getting Started with Class of
Service.
Instructions on:
l Transmit Queue Configuration
l Transmit Queue Rate Shapers
361 of 805
Add/Remove Ports (User-Defined Port Groups)
TIP: For more detailed information, refer to the tooltip that appears when you hover the cursor
over the Queue column.
For more information, see the section on transmit queues in Getting Started with Class of
Service.
NOTE: A rate shaper is associated to a specific transmit queue, not a CoS. This means that the 1)
you should select the queue you want to use for a CoS first, then set the shaper and 2) all
CoS using that queue uses the same rate shaper. Associating a rate shaper to a transmit
queue is accomplished via the CoS - Transmit Queue Mappings tab. For additional
information, see the CoS - Transmit Queue Mappings Tab (Transmit Queue Port Group)
Help topic.
362 of 805
Add/Remove Ports (User-Defined Port Groups)
Related Information
For information on related concepts:
l Getting Started with Class of Service
For information on related tasks:
l How to Create a Class of Service
Traffic Classification rules allow you to assign VLAN membership and/or class of service
to network traffic based on the traffic's classification type. Traffic descriptions are the part
of a rule that defines this classification type. For more information, see Traffic
Classification Rules.
The Edit Rule window accessed via the Traffic Description section of the Rule window is
used to define traffic descriptions for new rules.
Use the following steps to create a new rule:
1. Open the Control tab.
2. Select the Policy tab.
3. In the Policy tab left panel, select the Roles/Services tab.
4. Open the Service Repository tab and open either the Local or Global Services tab,
depending on the location of the rule being edited.
5. Open either the Service Groups or Services tab and click on the service for which
you want to create a rule.
6. From the menu bar, select Tools > Create Classification Rule. You can also right-
click on the service and select the option from the menu.
The Rule opens in the right panel.
7. Click the Edit button in the Traffic Description area.
The Edit Rule window opens.
8. Enter the information for the Traffic Description rule. For additional information, see
Edit Rule window.
9. Enforce to write the new information to the devices.
363 of 805
Add/Remove Ports (User-Defined Port Groups)
Related Information
For information on related concepts:
l Traffic Classification Rules
For information on related tasks:
l How to Create or Modify a Rule
For information on related windows:
l General Tab (Rule)
Flood Control provides rate limiting capabilities to CoS to allow certain types of flooded
traffic to be dropped. The flood control traffic types are:
l unknown - unicast
l multicast
l broadcast
When Flood Control is enabled, incoming traffic is monitored over one second intervals.
A traffic control rate sets the acceptable flow for each type, specified in packets per
second. If, during a one second interval, the incoming traffic of a configured type reaches
the traffic control rate on the port, the traffic is dropped until the interval ends. Packets are
then allowed to flow again until the limit is reached.
By default, Flood Control is disabled for each CoS. Similarly to CoS Port Groups, a
different configuration can be assigned for each group. Since Flood Control is shared
across all CoS, once Flood Control is enabled on at least one CoS, those rates apply to
all ports that have Flood Control enabled.
How to Display Flood Control Port Groups on the CoS Components Tab
1. Select the CoS Components left-panel tab on the Class of Service left-panel tab.
The CoS Configuration tab opens.
2. Verify that the Flood Control checkbox is selected.
How to Create a Flood Control Port Group
364 of 805
Add/Remove Ports (User-Defined Port Groups)
1. From the left-panel menu, open the CoS Components tab and select the Flood
Control Port Groups tab.
2. Right-click the Flood Control Port Groups tab and select Create Port Groups.
3. In the Create window, enter a name for the Flood Control Port Group and click OK.
A New Flood Control item is added to the CoS Configuration Window.
How to Enable/Disable Flood Control for a CoS
Flood Control Rate Limits are shared across all CoS. Once a Flood Control rate has
been enabled on at least one CoS, that is the rate specified for all Flood Control enabled
CoS.
1. Open the Flood Control Port Groups tab (Class of Service > CoS Components
tab) and select a Port Group.
2. Select a rate from the drop-down list for the desired Flood Control broadcast traffic
type Unicast, Multicast, or Broadcast.
3. Select an existing rate or create a new one.
4. Open a CoS in the Class of Service left-panel tab, and enable Flood Control for
the CoS by selecting the Enable in the Flood Ctrl Status drop-down list.
How to Add/Remove Ports to Flood Control Port Groups
1. From the Class of Service left-panel tab, select the CoS Components > Flood
Control Port Groups tab.
2. Right-click a Flood Control Port Group, and select Add/Remove Ports.
3. Add or remove the ports in the Add/Remove Ports window.
Related Information
For information on related concepts:
l Getting Started with Class of Service
l Class of Service Configuration Tab
For information on related tasks:
l How to Create a Class of Service
l How to Define Rate Limits
l How to Configure Transmit Queues
For information on related windows:
365 of 805
Add/Remove Ports (User-Defined Port Groups)
The Policy tab VLANs left-panel tab used for access control are displayed in the Access
Control Configuration window. If you have enabled the Policy VLAN Islands feature,
there are two tabs in the VLANs tab: Global VLANs and Policy VLAN Islands .
Otherwise, only the Global VLANs folder is displayed. For more information on Policy
VLAN Islands, see How to Create a Policy VLAN Island.
The Policy tab provides you with one Global Default VLAN, available when you first
access the Policy tab. You can create additional VLANs by selecting the Create VLAN
option available when you right-click on the Global VLANs tab.
Creating a VLAN
1. Open the Policy tab.
2. Select the left-panel VLANs > Global VLANs tab.
3. Right click the Global VLANs tab and select Create VLAN from the menu.
4. Fill out the Create VLAN Window to your specifications.
5. Click OK to create the VLAN and close the Create VLAN window.
6. Enforce to write the new information to the devices.
366 of 805
Add/Remove Ports (User-Defined Port Groups)
Deleting a VLAN
Deleting a VLAN removes it and its associations with any roles and services from the
NetSight database and from the devices.
WARNING: The delete operation immediately removes the VLAN(s) from the devices in
the Devices tab and could result in serious consequences if the VLANs are
used outside the scope of the Policy tab.
1. Open the Policy tab and select the VLANs left-panel tab.
2. Expand the Global VLANs left-panel tab.
3. Right-click on the VLAN you wish to delete and select Delete from the menu. A
confirmation window opens.
4. Click Yes to delete the VLAN.
5. Enforce to write the new information to the devices.
Related Information
For information on related concepts:
l Dynamic Egress
l Policy VLAN Islands
For information on related windows:
367 of 805
Add/Remove Ports (User-Defined Port Groups)
VLAN islands enable you to set up, for example, a guest VLAN that restricts the guests
in one facility from communicating with guests in another facility. See Policy VLAN
Islands for more information.
Instructions on:
l Creating a VLAN Island
l Modifying a VLAN Island
l Deleting a VLAN Island
Once you've created a VLAN island, you can change its characteristics using the right-
panel tabs as follows:
l To change a VLAN island name: Right-click the island in the VLANs section of the
VLANs > Policy VLAN Islands and select Rename.
l To change a VLAN island description: Use the island's Island Topology tab.
l To edit an Island VLAN ID: Use the Edit Island VLAN ID button on the island's
VLANs tab.
l To change a VLAN Island Configuration (Base ID, Offset, Naming Convention):
Use the Policy VLAN Islands tab Island Topology tab .
368 of 805
Add/Remove Ports (User-Defined Port Groups)
l To add or remove devices from a VLAN island: Use the VLAN Islands
Add/Remove Devices window.
Related Information
For information on related concepts:
l Policy VLAN Islands
For information on related windows:
l Add/Remove Devices window
l VLANs Tab (Policy VLAN Islands)
l Island Topology Tab (Policy VLAN Islands)
Network Resource groups provide a quick and easy way to define traffic classification
rules for groups of network resources such as routers, VoIP (Voice over IP) gateways,
and servers. You create a network resource group by defining a list of MAC or IP
addresses for the resources you want included in the group.
In addition, you can use Network Resource Topologies to define a different resource list
for different groups of devices in your domain. This enables you to set up network
resource access based on the location where end users authenticate.
Once a network resource group has been defined, you can associate it with an
Automated service (see How to Create a Service for more information). The Automated
service automatically creates a rule with a specified action (class of service and/or
access control), for each resource address in the network resource group. Automated
rule types include Layer 2 MAC Address rules, Layer 3 IP Address and IP Socket rules,
and Layer 4 IP UDP Port and IP TCP Port rules.
369 of 805
Add/Remove Ports (User-Defined Port Groups)
You can also create Global Network Resources shared between all your domains and
can be used by global automated services. Network Resource Topologies are not
available for Global Network Resources.
TIP: The Policy tab Demo.pmd file contains examples of network resource groups that you
might want to create, such as Internet Proxy Servers and SAP Servers.
370 of 805
Add/Remove Ports (User-Defined Port Groups)
The Network Resource Topology is available for selection when you create your
network resources.
Related Information
For information on related tasks:
l How to Create a Service
For information on related windows:
l General Tab (Network Resource Group)
The Extreme Management Center database contains all the devices in your network and
displays them in the left-panel device tree. The Network tab and the Policy tab share a
common view of the device tree, except that only devices that support policy are
displayed in the Policy tab tree. Any changes you make to the devices are reflected in
both trees.
Initially, perform a device Discover to populate the database. Once devices have been
added to the Extreme Management Center database, you must assign the devices to a
Policy Domain using the Policy tab. As soon as the devices are assigned to a domain,
they are automatically displayed in the Policy tab device tree. Only devices assigned to
the domain you are currently viewing are displayed. For more information, see How to
Create and Use Domains.
371 of 805
Add/Remove Ports (User-Defined Port Groups)
After you have initially added your devices, you can use the Policy tab's Add Device
window to add a single device to the database and the current domain.
Instructions on:
l Adding a Single Device
l Deleting Devices from the Database
NOTE: If you want to remove a device from a domain without deleting it from the database, you
must use the Assign Devices to Domain window. For more information, see Removing
Devices from a Domain.
372 of 805
Add/Remove Ports (User-Defined Port Groups)
1. Open the Network tab, select the device being deleted from the Devices table.
2. Right-click the device and select Device > Delete Device from the menu. A
confirmation message advises that you are deleting the device from the Extreme
Management Center database.
3. Click Yes to delete the device.
Related Information
For information on related tasks:
l How to Create and Use Domains
The Policy tab allows you to group ports into user-defined port groups, similar to the way
you can group services into service groups. Port groups enable you to configure multiple
ports on the same device or on different devices, simultaneously. A port can be a
member of more than one group.
When you create a user-defined port group, you select individual ports to add to the
group.
The Policy tab also provides you with Pre-Defined Port Groups which are automatically
populated according to port characteristics. See Pre-Defined Port Groups for more
information.
Instructions on:
l Creating a Port Group
l Adding Ports to a Port Group
l Removing Ports from a Port Group
373 of 805
ExtremeControl
1. Select the left-panel Devices > Port Groups tab. Expand the User-Defined Port
Groups folder and select a port group.
2. Right-click the port group and select Add/Remove Ports from the menu.
3. In the Add/Remove Ports window, select the ports you want to add to the port
group in the Devices list and click Add to Group to move the port to the Group Port
Membership list.
4. Click OK.
Related Information
For information on related windows:
l Add/Remove Ports Window
ExtremeControl
The Access Control tab provides secure, policy-based management for the
ExtremeControl solution. It configures and manages ExtremeControl gateways, provides
user to device location mapping services, generates network endpoint audit reports and
interfaces with other security management applications.
Contact your sales representative for information on obtaining an Extreme Management
Center software license.
The Access Control tab contains three main navigation trees in the left-panel:
374 of 805
ExtremeControl
l Details — Displays basic information about the engine, provides a summary of the
interface, and allows you to disable ExtremeControl authentication and
assessment.
l End-Systems — Displays end-systems monitored by the ExtremeControl engine.
l Switches — Shows the switches monitored by the gateway engine and allows you
to add, delete, and edit the switch configuration.
ExtremeControl Configurations
The ExtremeControl Configurations tree lets you manage the end-user connection
experience and control network access based on a variety of criteria including
authentication, user name, MAC address, time of day, and location. Extreme
375 of 805
ExtremeControl
Configure a registration that forces any new end-system connected on the network to
provide the user's identity in a web page form before being allowed access to the
network. End users are automatically provisioned network access on demand without
time-consuming and costly network infrastructure reconfigurations. In addition, IT
operations gains visibility into the end-systems and their associated users (for example,
guests, students, contractors, and employees) on the network.
Via the ExtremeControl Configurations tree, you can also configure agent-less or agent-
based security posture assessment of endpoints. The Access Control tab uses
assessment servers to assess and audit connecting end-systems and provide details
about an end-system's patch levels, running processes, anti-virus definitions, device
type, operating system, and other information critical in determining an end-system's
security compliance. End-systems that fail assessment can be dynamically quarantined
with restrictive network access to prevent security threats from entering the network.
Assisted remediation is a process that informs end users when their end-systems have
been quarantined due to network security policy non-compliance, and allows end users
to safely remediate their non-compliant end-systems without assistance from IT
operations. Once the remediation steps have been successfully performed and the end-
system is compliant with network security policy, the appropriate network resources are
allocated to the end-system, again without the intervention of IT operations.
Related Information
For information on related windows:
l Configurations
l Notifications
376 of 805
ExtremeControl
Switch
Support,
Number of Switch Session
Devices Suppo Timeout
Allowed to rt and
Policy/VLA Connect to Authenticati IEEE Terminati
N Switch Authenticati Type of on 802.1 on Action Suggested
Configurati on-enabled End- Method X RADIUS Configurati
on Edge Port Systems Deployed MIB Attributes on
- Policy Only * * * * * A
(without
changing of
VLANs)
- VLAN only Multiple Microsoft XP S 802.1X2 Yes * A
- Policy and P1
VLAN with KB82259
- Policy Only 6
(with installed1
changing of
VLANs)
- VLAN only Multiple * 802.1X2 Yes * B
- Policy and
VLAN
- Policy Only
(with
changing of
VLANs)
377 of 805
ExtremeControl
Switch
Support,
Number of Switch Session
Devices Suppo Timeout
Allowed to rt and
Policy/VLA Connect to Authenticati IEEE Terminati
N Switch Authenticati Type of on 802.1 on Action Suggested
Configurati on-enabled End- Method X RADIUS Configurati
on Edge Port Systems Deployed MIB Attributes on
- VLAN only Multiple * 802.1X2 No Yes C
- Policy and
VLAN
- Policy Only
(with
changing of
VLANs)
- VLAN only Multiple * 802.1X2 No No D
- Policy and
VLAN
- Policy Only
(with
changing of
VLANs)
- VLAN only Multiple * MAC * * B
- Policy and Authenticatio
VLAN n
- Policy Only
(with
changing of
VLANs)
[for
Enterasys
switch]
- VLAN only Multiple * MAC * Yes C
- Policy and Authenticatio
VLAN n
- Policy Only
(with
changing of
VLANs)
[for non-
Enterasys
switch]
378 of 805
ExtremeControl
Switch
Support,
Number of Switch Session
Devices Suppo Timeout
Allowed to rt and
Policy/VLA Connect to Authenticati IEEE Terminati
N Switch Authenticati Type of on 802.1 on Action Suggested
Configurati on-enabled End- Method X RADIUS Configurati
on Edge Port Systems Deployed MIB Attributes on
- VLAN only Multiple * MAC * No D
- Policy and Authenticatio
VLAN n
- Policy Only
(with
changing of
VLANs)
[for non-
Enterasys
switch]
- VLAN only Single Microsoft or * * * E
- Policy and MAC OS
VLAN
- Policy Only
(with
changing of
VLANs)
- VLAN only Single Linux * * * F
- Policy and
VLAN
- Policy Only
(with
changing of
VLANs)
Wireless Multiple * * * * G
Device
* = Any value.
N/A = Not applicable.
1For more information on this patch, see the following link: http://support.microsoft.com/default.aspx?scid=kb;en-us;KB822596
2When 802.1X is implemented to authenticate multiple users on a single switch port, the downstream device providing connectivity to the
users must support the forwarding of EAP frames. Unintelligent devices such as repeaters and switches with newer firmware releases
should forward EAP frames. However, some switches do not forward EAP frames therefore preventing the 802.1X authentication of
multiple users on a single port.
379 of 805
ExtremeControl
380 of 805
ExtremeControl
381 of 805
ExtremeControl
* = Any value.
N/A = Not applicable.
General Considerations
l Gateway RADIUS Attributes to Send - Send RFC 3580 Only Feature. This
feature (configured in the Add/Edit Switches to Identity and Access Appliance
Group panel) lets you specify that an ExtremeControl Gateway sends a VLAN
(instead of a policy) via RFC 3580-defined RADIUS Tunnel attributes to the RFC
3580-enabled switches in your network. Keep in mind the following considerations
when configuring this feature:
l Send RFC 3580 Only is not supported on Matrix E7 Devices. Matrix E7
devices should not be configured with the "Gateway RADIUS Attributes to
Send" parameter set to RFC 3580 Only.
l Send RFC 3580 Only does not support end-systems with static IP
addresses. The Send RFC 3580 Only feature is not-supported for end-
systems with static IP addresses. This is because end-systems transitioned
between VLANs must be assigned an IP address on the appropriate subnet
to maintain IP connectivity to the network, which is facilitated dynamically
through DHCP.
l Send RFC 3580 Only requires a particular DHCP configuration for
Active/Default Role port mode. When the Send RFC 3580 Only feature is
configured, the Active/ Default Role port mode on network devices requires a
particular DHCP configuration. The DHCP lease time for the pool of IP
addresses that corresponds to the default role's VLAN must be short (e.g.
less than 1 minute) because the Active/Default Role port mode allows end-
systems to obtain IP addresses via the DHCP protocol before they are
authenticated to a VLAN.
l Switch management fails with Send RFC 3580 Only and certain Auth
Access Types. Switch management via TELNET/WebView fails with the
382 of 805
ExtremeControl
l Enable Port Link Control Option. Port link control is required if you are using
VLAN only (RFC 3580) switches or if you are using policy with VLANs on policy-
enabled switches. When an end-system is transitioned between VLANs with a
new VLAN being assigned to a switch port, the end-system is required to obtain a
new IP address for the assigned VLAN. To do this, the ExtremeControl Gateway
links down the port (using the ifAdmin MIB), waits the configured amount of time,
and then links up the port, causing the end-system to make a new DHCP request
and get a new IP address.
l Port Link Control is not supported on authentication-enabled switch ports
providing connectivity to multiple end-systems. Do not enable port link
control for switches authenticating multiple users per port. When an
ExtremeControl Gateway is configured to return only the VLAN RADIUS
attribute, the gateway links down the authenticated port to force the end-
system to release and then renew the DHCP IP address when port link
control is enabled. This action interrupts IP connectivity of other
authenticated end-systems on the port. If the switch is an Enterasys switch,
protection is automatically provided by reading the number of users currently
on the port prior to linking down an port.
l Port Link Control is only supported on Windows XP or later. Port link control
is only supported for end-users that are authenticating from end-systems
running Windows XP or later. When an ExtremeControl Gateway is
configured to return only the VLAN RADIUS attribute, the gateway links
down the authenticated port to force the end-system to release and then
renew the DHCP IP address when port link control is enabled. However,
other systems such as NT workstations, do not release their DHCP IP
address when the port is linked down. To account for this scenario, disable
port link control, set the ExtremeControl Profile to "Use Assessment Policy
During Initial Assessment Only," and set the DHCP lease time for the IP
address pools that correspond to the VLAN(s) associated to the Quarantine
and Assessing access policies, as well as the default VLAN associated to
the unauthenticated state of the port, to a low value (e.g. 1 minute). This
forces an end-system to send DHCP Request messages every 30 seconds
383 of 805
ExtremeControl
384 of 805
ExtremeControl
385 of 805
ExtremeControl
A mobile device can access the standard (non-mobile) version of the Captive
Portal using any desktop-supported browsers available on a mobile device.
l For other browsers, the Mobile Captive Portal requires the browser on the
mobile device be compatible with Webkit or Sencha Touch. To confirm
compatibility with Webkit or Sencha Touch, open http://<ip_of_
engine>/mobile_screen_preview using your mobile web browser. If the
browser is compatible, the page displays properly.
l RADIUS Configuration on E1 Devices. The ExtremeControl engine opens an
SSH/Telnet session on the E1 device and enable RADIUS by running a script of
CLI commands. CLI credentials for the device are obtained from the device profile
and must be configured in the Authorization/Device Access tool.
386 of 805
ExtremeControl
a Guest policy role, NetBIOS traffic is probably discarded, but doing so could impact the
MAC to IP resolution process.
Review the following information and verify that the policy roles and rules deployed on
your network will allow the required communication between end-systems and your
ExtremeControl engines.
IP resolution via NetBIOS
MAC Resolution via NetBIOS
ExtremeControl engine UDP Port 137 <==> End-System Port 137
Remediation and Registration
ExtremeControl engine (TCP or UDP) Port 80 <==> End-System Port (determined on
the client) - HTTP
ExtremeControl engine (TCP or UDP) Port 443 <==> End-System Port (determined on
the client) - HTTPS
ExtremeControl Agent Discovery via HTTP
ExtremeControl engine Port TCP 8080 <==> End-System Port (determined on the
client)
ExtremeControl Agent Heartbeat via HTTPS
ExtremeControl engine Port TCP 8443 <==> End-System Port (determined on the
client)
ExtremeControl Agent-less Assessment
All ports determined by the selected test set.
The following software is optional and may be installed with agent-less Assessment:
SAMBA add-on enabled
TCP Ports 149 and 195, and UDP Ports 137 and 138.
387 of 805
ExtremeControl
l If you have configured Assisted Remediation, you must perform the following steps
if your network includes wireless controllers:
l Enable the "ToS override for ExtremeControl" option configured through
Wireless Manager in the Edit WLAN Service > Authentication Mode
Configuration > Settings window.
l If Policy Manager is not being used to configure policy on the wireless
controller, use Wireless Manager to manually add the following rule to the
VNS Quarantine, Assessing, and Unregistered filters to allow HTTP traffic to
pass through (IN/OUT) the controller when end-systems are proxied to the
Internet during remediation.
0.0.0.0/0 tcp port 80 (Allow traffic In/Out)
l If Policy Manager is being used to configure policy for the wireless controller,
use the Classification Rule Wizard to add an "Allow HTTP" rule to a service
currently included in your Quarantine, Assessing, and Unregistered policy
roles. The rule would be a traffic classification type "IP TCP Port Destination"
with the TCP type set to HTTP (80) and the Access Control set to "Permit
Traffic."
Basic Operation
To set up DNS proxy, the ExtremeControl engine is configured as a secondary DNS
server in the DHCP scope, in addition to the primary DNS server on the network. When
an end-system is required to register or undergo remediation, access to the primary DNS
server is blocked and the end-system sends its DNS requests to the DNS proxy on the
ExtremeControl Gateway engine.
The DNS proxy must determine whether to spoof the packet or forward the request to the
primary DNS server. If the end-system is unregistered or quarantined, the DNS proxy
spoofs the DNS packet and send back a DNS response to the end-system with the
ExtremeControl engine IP address. This redirects the end-system traffic to the web portal
where the end user can register or remediate. Once the end user has registered or
388 of 805
ExtremeControl
remediated their end-system, their DNS requests are forwarded to the primary DNS
server.
For third-party devices, a dynamic ACL is configured to block access to the primary DNS
server for end-systems undergoing registration or remediation. This causes the DNS
requests to be sent to the DNS proxy. The DNS proxy determines whether spoofing is
necessary or not by checking the state of the end-system in the database. If the end-
system is unregistered or quarantined, the DNS proxy spoofs the DNS packet.
To allow access to hosts or domains for any protocol other than http, you must add the
host or domain to the list of allowed web sites configured in the Network Settings view of
the ExtremeControl Edit Portal Configuration window. The DNS proxy uses this list of
allowed domains to determine if the end-system is allowed access to the requested
domain. This can be useful if you want to allow end-systems to perform specific
functions such as anti-virus updates or software updates that run over TCP/UDP ports.
You can also define post authorization assessment behavior using DNS proxy. End-
systems in the scan state are granted access according to the assessment settings in
your ExtremeControl profile.
l If an assessment policy is not defined, the user is allowed access while being
scanned.
l If an assessment policy is defined for initial assessment only, the user is allowed
access if they passed the last scan. If the first or last scan resulted in quarantine,
the user is redirected to the ExtremeControl Gateway.
l If an assessment policy is defined for all assessments, the user is redirected to the
ExtremeControl Gateway.
Troubleshooting
DNS proxy error messages are logged in the /var/log/dnsProxy.log file on the
ExtremeControl engine. You can enable diagnostics for DNS proxy by going to the
ExtremeControl engine administration web page and enabling the DNS Proxy
diagnostic group to provide troubleshooting information. Launch the ExtremeControl
engine administration web page by using the following URL:
389 of 805
ExtremeControl
390 of 805
ExtremeControl
6. Read the End User License Agreement, select the I accept the terms of the
License Agreement radio button, and select Continue.
7. Enter or paste your license into the text area.
8. Select Update.
The license is updated.
391 of 805
ExtremeControl
Related Information
For information on related tasks:
l How to Install the Assessment Agent Adapter on a Nessus Server
l How to Set ExtremeControl Options - Assessment Server
For information on related windows:
l Manage Assessment Settings Window
l ExtremeControl Options - Assessment Server
392 of 805
ExtremeControl
NOTE: As of Extreme Management Center version 8.5, only Nessus Version 6 is officially
supported.
1. Go to the Network Management Suite (NMS) Download web page to download the
Assessment Agent Adapter:
https://extranet.extremenetworks.com/downloads/Pages/NMS.aspx. Select the
version of Extreme Management Center you are using.
2. Scroll down to find the Identity and Access Tools section of the web page. The
install file is named "Assessment Adapter (for 3rd party assessment integration)".
Download the file and copy it to the Nessus server.
3. Open a shell and "cd" to the directory where you downloaded the install file.
4. Change the permissions on the install file by entering the following command at
the shell prompt:
chmod 755 EXTRAssessmentServerAgentAdapter_
x.x.x.x.bin
5. Run the install program by entering the following command at the shell prompt:
./EXTRAssessmentServerAgentAdapter_x.x.x.x.bin
6. The Introduction screen appears. Press Enter.
7. Enter Nessus as the agent type to install. Press Enter.
8. The Choose Install Folder screen appears where you can choose the installation
folder or directory. Enter an absolute path or press Enter to accept the default
installation folder /root/AssessmentAgent. The installer requires 100 MB of
memory. If the installation folder does not have enough memory, an error displays.
9. The Pre-Installation Summary screen appears. This screen shows you the
locations you have chosen for the installation process and disk space
requirements. Review this information to ensure its accuracy. Press Enter.
10. The Nessus Server Information screen appears. You must enter information in
several fields in this screen.
393 of 805
ExtremeControl
11. Enter the port on which the Nessus daemon is running. The default value is 1241.
Press Enter.
12. Enter the username you created when you installed the Nessus server. Press
Enter.
If you did not create a user when you installed the Nessus server, from a shell
prompt, type:
cd /nessus installation directory/sbin
followed by
nessuscli adduser username
and follow the prompts to add a user to the application. Press Enter.
13. Enter the password for the Nessus user. Press Enter.
14. The SSL Server Information screen appears. Enter the port on which the HTTPS
daemon is running. The default port number is 8445. Press Enter. The
Assessment Agent Adapter begins installing.
15. If you are upgrading to a newer version of the Assessment Agent Adapter, you are
asked if you want to overwrite several files: launchAS.sh, bin/nessus_cmd, and
version.txt. Enter the letter "y" to answer yes and press Enter.
16. The Installation Complete screen appears. The installation is complete and the
Assessment Agent Adapter has been installed on the server.
17. Start the Assessment Agent Adapter as a background process by entering the
following command at the shell prompt:
/assessmet agent adapter installation
directory/launchAS.sh &
18. Make sure that the Nessus daemon and the Assessment Agent Adapter are started
each time the system is started, by adding this command into your rc.local script:
/assessment agent adapter installation
directory/launchAS.sh &
19. To verify the Assessment Agent Adapter is running on the system, from the shell
prompt enter:
netstat -an | grep port number
where port number is the port you entered that has the HTTPS daemon running on
it. The default value for this is 8445. Returned entries containing ESTABLISHED
or LISTEN is displayed.
20. To verify the Nessus application is running on the system, from the shell prompt
enter:
ps -eaf | grep nessusd
A return entry similar to: "nessusd: waiting for incoming connections" is displayed.
This is an indication that the Nessus process is running correctly on the system.
394 of 805
ExtremeControl
Related Information
For information on related tasks:
l How to Change the Assessment Agent Adapter Password
l How to Set ExtremeControl Options - Assessment Server
For information on related windows:
l Manage Assessment Settings Window
l Edit Assessment Configuration Window
395 of 805
ExtremeControl
RADIUS
Certificates Password Supported Password
Protocol Required Required Hash Types
PAP No Yes PKCS5 Reversible, SHA1,
NT Hash
CHAP No Yes PKCS5 Reversible
MsCHAP Yes Yes PKCS5 Reversible, NT
Hash
PEAP (EAP- Yes Yes PKCS5 Reversible, NT
MsCHAPv2) Hash
EAP-TTLS Yes Yes PKCS5 Reversible, SHA1,
NT Hash
EAP-TLS Yes No N/A
396 of 805
LDAP Authentication
RADIUS
Certificates Password Supported Password
Protocol Required Required Hash Types
EAP-MD5 No Yes PKCS5 Reversible
Instructions on:
l LDAP Authentication
l User Authentication Considerations
l Local Authentication
l User Password Considerations
l Certificate Configuration
l EAP-TLS Certificate Requirements
LDAP Authentication
LDAP authentication uses a backend Active Directory server or LDAP server defined in
your AAA Configuration to authenticate users. Additionally, some protocols also require
RADIUS server and client certificates to be used in conjunction with LDAP
authentication (see Certificate Configuration).
Before configuring LDAP authentication, read through the User Authentication
considerations described below.
Active Directory
Supported Protocols: PAP, MsCHAP, PEAP, EAP-MsCHAPV2, and EAP-TTLS with
tunneled PAP.
PAP or EAP-TTLS with tunneled PAP protocols
During the authentication process, the ExtremeControl engine sends an LDAP bind
request to the Active Directory domain controller using the password retrieved from the
397 of 805
LDAP Authentication
end user's authentication request. Therefore, the LDAP protocol must be allowed
between the ExtremeControl engine and the Active Directory domain controller for the
authentication process to take place.
MsCHAP, PEAP, and EAP-MsCHAPv2 protocols
These three protocols work with Active Directory (and not other LDAP servers) because
they use NT Hash for password encryption, which is the same password hash type used
by the Microsoft Active Directory domain controller.
Authentication requests are made by the ExtremeControl engine sending an ntlm_auth
request to the Active Directory domain controller. The ExtremeControl engine attempts to
join the Active Directory domain using the LDAP configuration and the administrator
username and password. In your LDAP configuration, the administrator username used
to connect to the LDAP server must be a member of the built-in Domain Administrator
group or Account Operators group. (See the Active Directory Permissions section
below.)
Additionally, the DNS configuration must be set up so that the ExtremeControl engine
can resolve the domain by name. To do this, you should configure the DNS server to be
one of the domain controllers for that domain, and verify that the domain name is
configured correctly on the ExtremeControl engine. If users authenticate to multiple
domains, you must also configure the domains to fully trust each other. Refer to the
following Microsoft documentation for information on how to set up domain trusts:
https://technet.microsoft.com/en-us/library/cc740018%28WS.10%29.aspx.
Note: For these protocols to work when the active directory domain server is set to only allow
NTLMv2 authentication, your version of Samba must pass a flag during authentication to
allow for NTLMv1 to work for 802.1x MSCHAPv2 when the AD is set to the highest security
setting (NTLMv2 only). On earlier versions, these protocols do not work if the active directory
is set to only allow NTLMv2 because these protocols do not use NTLMv2 and the hash
passed to NAC Manager is rejected by the active directory server. Allowing only NTLMv2
authentication only works if NAC Manager proxies the 802.1x request to Microsoft IAS/NPS.
Microsoft IAS/NPS allows this lower level of authentication because it is in a TLS session,
which Microsoft believes makes it as secure as NTLMv2. For more information, see
https://technet.microsoft.com/en-us/library/cc772468.aspx
398 of 805
LDAP Authentication
l Reset Password
l Validated write to DNS host name
l Validated write to service principal
l Read and write account restrictions
l Read and write DNS host name attributes
l Write servicePrincipalName
Active Directory with User Log On Restrictions
In Active Directory, it is possible to configure an option that restricts a user domain log on
to specific computers. This configuration is enforced during the domain log on process.
In an ExtremeControl environment where users authenticate using 802.1X and NAC
Manager is configured to proxy RADIUS requests, no additional configuration is
required. The 802.1X authentication process completes normally and the determination
of whether the user is allowed to log on to the domain from the specific computer is
enforced at that time.
In an ExtremeControl environment where NAC Manager is terminating 802.1X
authentications locally, NAC Manager performs an NTLM authentication to authenticate
the 802.1X session. This process simulates the domain log on process. Therefore, the
incoming authentication request for the user appears to be coming from a computer (the
ExtremeControl engine) that the user is not allowed to log on to, and the authentication
attempt is rejected.
The solution in this scenario is to add the ExtremeControl engines to the list of
computers the user is allowed to log on to. This allows the 802.1X authentication
process to complete and successfully authenticate the user. The enforcement of whether
the user is allowed to log on to the specific computer takes place during the domain log
on process.
399 of 805
Local Authentication
Local Authentication
Local authentication uses a local password repository defined in your AAA
Configuration to authenticate users. Additionally, some protocols also require RADIUS
server and client certificates to be used in conjunction with local authentication (see
Certificate Configuration). Before configuring local authentication, read through the user
password considerations described below.
Certificate Configuration
If the protocol you are using requires RADIUS certificates for authentication (see the
table above), review the certificate configuration information in this section.
During installation, ExtremeControl generates a unique private key and server certificate
for the NAC Manager RADIUS server. This certificate provides basic functionality while
you are configuring and testing your NAC Manager deployment. To integrate with the
certificate structure you already have on your network, update to a certificate generated
by a Certificate Authority that your connecting end-systems are already configured to
trust.
In addition, configure the AAA Trusted Certificate Authorities to designate which client
certificates can be trusted.
400 of 805
Certificate Configuration
Related Information
For information on related tasks:
l ExtremeControl
401 of 805
Configuring Extreme Management Center Behind a NAT Router
NOTE: The text in the nat_config.text file refers to a remote IP address and a local IP address. For
this configuration, the NAT IP address is the remote IP address and the real IP address is
the local IP address.
1. On the Extreme Management Center server, add the following entry to the <install
directory>/appdata/nat_config.text file.
<NAT IP address>=<real IP address>
2. Save the file.
3. Configure your ExtremeControl engines to use the NAT IP address for the IP
address of the Extreme Management Center server. For information on how to
configure or change your engine settings, refer to your ExtremeControl engine
Installation Guide.
If you have remote Extreme Management Center clients connecting to the NAT IP
address, perform the following additional steps.
402 of 805
Defining Interface Services
1. On the Extreme Management Center server, add the following text to the <install
directory>/appdata/NSJBoss.properties file. In the second to last line, specify the
hostname of the Extreme Management Center server.
# In order to connect to a NetSight server behind a NAT fi
rewall or a
# NetSight server with multiple interfaces you must define
these two
# variables on the NetSight server. The java.rmi.server.ho
stname
# should be the hostname
(not the IP) if multiple IPs are being used
# so that each client can resolve the hostname to the corr
ect IP that
# they want to use as the IP to connect to.
java.rmi.server.hostname=<hostname of Extreme Management
Center server>
java.rmi.server.useLocalHostname=true
2. Save the file.
3. Add the Extreme Management Center server hostname to your DNS server.
Related Information
For information on related windows:
l Interface Configuration Window
ExtremeControl Concepts
This Help topic explains some of the concepts you'll need to understand in order to
make the most effective use of Access Control tab.
403 of 805
Overview of the Access Control Tab
Information on:
l Overview of the Access Control Tab
l ExtremeControl Engines
l Use Scenario
l ExtremeControl VPN Deployment
l Access Control Tab Structure
l ExtremeControl Configuration
l Rule Components
l ExtremeControl Profiles
l AAA Configurations
l Portal Configurations
l Access Policies
l Registration
l Assessment
l Assessment Remediation
l End-System Zones
l Enforcing
l MAC Locking
l Notifications
404 of 805
ExtremeControl Engines
conjunction to implement network access control. The Access Control tab provides one
centralized interface for configuring the authentication, authorization, assessment, and
remediation parameters for your ExtremeControl engines. After these configurations are
enforced, the ExtremeControl engines can detect, authenticate, assess, authorize, and
remediate end-systems connecting to the network according to those configuration
specifications.
ExtremeControl Engines
The ExtremeControl engine is required for all Extreme Networks ExtremeControl
deployments. It provides the ability to detect, authenticate, and effect the authorization of
end devices attempting to connect to the network. It also integrates with, or connects to,
vulnerability assessment services to determine the security posture of end-systems
connecting to the network. Once authentication and assessment are complete, the
ExtremeControl engine effects the authorization of devices on the network by allocating
the appropriate network resources to the end-system based on authentication and/or
assessment results.
If authentication fails and/or the assessment results indicate a non-compliant end-
system, the ExtremeControl engine can either totally deny the end-system access to the
network or quarantine the end-system with a highly restrictive set of network resources,
depending on its configuration. The ExtremeControl engine also provides the
remediation functionality of the ExtremeControl solution by means of the remediation
web server that runs on the engine. Remediation informs end users when their end-
systems have been quarantined due to network security policy non-compliance, and
allows end users to safely remediate their non-compliant end-systems without
assistance from IT operations.
Use Scenario
The ExtremeControl Gateway engine provides out-of-band network access control for
networks where intelligent wired or wireless edge infrastructure devices are deployed as
the authorization point for connecting end-systems. End-systems are detected on the
network through their RADIUS authentication interchange. Based on the assessment
and authentication results for a connecting device, RADIUS attributes are
added/modified during the authentication process to authorize the end-system on the
authenticating edge switch. Therefore, the ExtremeControl Gateway may be positioned
anywhere in the network topology with the only requirement being that IP connectivity
between the authenticating edge switches and the ExtremeControl Gateways is
operational.
405 of 805
ExtremeControl Engines
It is important to note that if the wired edge of the network is non-intelligent (unmanaged
switches and hubs) and is not capable of authenticating and authorizing locally
connected end-systems, it is possible to augment the network topology to allow
implementation of inline ExtremeControl with the ExtremeControl Gateway. This can be
accomplished by adding an intelligent edge switch that possesses specialized
authentication and authorization features. The Extreme Networks K-, S-, or N-Series
switch is capable of authenticating and authorizing numerous end-systems connected
on a single port through its Multi-User Authentication (MUA) functionality, and may be
positioned upstream from non-intelligent edge devices to act as the intelligent edge on
the network. In this configuration, the K-, S-, or N-Series switch acts as the intelligent
edge switch on the network, although not physically located at the access edge.
For end-systems connected to EOS policy-enabled switches, a policy role is specified in
the Access Control tab (policy roles are defined and distributed to those switches by the
Policy tab) to authorize connecting end-systems with a particular level of network
access. For end-systems connected to RFC 3580-compliant switches (Enterasys and
third-party), a VLAN is specified in the Access Control tab to authorize connecting end-
systems with a particular level of network access, facilitated using dynamic VLAN
assignment via Tunnel RADIUS attributes.
When a user or device attempts to connect to the network, the end-system is
authenticated and assessed according to configurations defined in the Access Control
tab. The Access Control tab uses the results of the authentication and assessment to
determine if that device meets the requirements for a compliant end-system. If the results
of the authentication and security assessment are positive, Extreme Management Center
authorizes the end-system with network access by assigning a designated policy role or
VLAN on the switch port to which the end-system is connected. If the result of the
security assessment is negative, Extreme Management Center restricts network access
by assigning the user or device to a Quarantine policy role or VLAN on the switch port
until the end-system is remediated and brought into a compliant state. If the result of the
authentication is negative, Extreme Management Center can deny all network access for
the endpoint as an invalid device or user on the network, setting the switch port to the
unauthenticated state.
Depending on the engine model, the ExtremeControl Gateway provides either on-board
(integrated) vulnerability assessment server functionality and/or the ability to connect to
external assessment services, to determine the security posture of end-systems
connecting to the network. (On-board assessment requires a separate license.)
The number of ExtremeControl Gateways you deploy on the network depends on the
number of end-systems on the network. The following table displays the number of end-
systems supported per ExtremeControl Gateway model. Use this table to help determine
the number of gateways to deploy.
406 of 805
ExtremeControl Engines
Number of
End-Systems
Model Supported Notes
IA-A-20 6000 Configured ExtremeControl Features:
Authentication and OS/Device Fingerprinting, but
no Registration or Assessment.
4500 Configured ExtremeControl Features: All features
excluding Assessment.
3000 Configured ExtremeControl Features: All features
including Assessment.
IA-A-300 12000 Configured ExtremeControl Features:
Authentication and OS/Device Fingerprinting, but
no Registration or Assessment.
9000 Configured ExtremeControl Features: All features
excluding Assessment.
6000 Configured ExtremeControl Features: All features
including Assessment.
IA-V See Notes The IA-V is included with the Extreme
Management Center Advanced (NMS-ADV)
license and is ExtremeControlused in conjunction
with an ExtremeControl Enterprise license (IA-ES-
12K).
NAC-V-20 3000 The NAC-V-20 is a virtual engine and requires an
ExtremeControl VM license in the Extreme
Management Center Server.
NAC-A-20 3000
SNS-TAG-ITA 3000
SNS-TAG-HPA 3000
SNS-TAG-LPA 2000
407 of 805
ExtremeControl Engines
"ExtremeControl Gateway B" as the secondary, and the second half are configured with
"ExtremeControl Gateway B" as the primary and "ExtremeControl Gateway A" as the
secondary. In this way, ExtremeControl Gateways are configured in redundant active-
active operation on the network.
408 of 805
Access Control Tab Structure
the end-system. When the quarantined end user opens a web browser to any web site,
its traffic is dynamically redirected to a Remediation web page that provides steps for the
user to execute in order to achieve compliance. After executing the steps, the end user
can reattempt network access and start the process again.
ExtremeControl Configuration
The ExtremeControl Configuration lets you manage the end user connection experience
and control network access based on a variety of criteria. The Access Control tab comes
with a default ExtremeControl Configuration which is automatically assigned to your
ExtremeControl engines. You can use this default configuration as is, or make changes
to the default configuration, if desired.
The ExtremeControl Configuration determines what ExtremeControl Profile will be
assigned to an end-system connecting to the network. It contains an ordered list of rules
that are used by the configuration to assign an ExtremeControl Profile to a connecting
end-system based on rule criteria. It also specifies the Default Profile which serves as a
"catch-all" profile for any end-system that doesn't match one of the rules. By default, all
end-systems match the Default Profile.
When an end-system connects to the network, the rules are evaluated in a top-down
fashion, similar to the way an ACL would be evaluated. End-systems that do not match
any of the rules are assigned the Default Profile.
409 of 805
Access Control Tab Structure
Rule Components
The rules defined in an ExtremeControl Configuration provide very granular control over
how end-systems are treated as they come onto the network. The following criteria can
be used to define the rules used in your ExtremeControl Configuration:
l Authentication Type - for example, 802.1X or MAC authentication.
l End-System Groups - allow you to group together devices that have similar
network access requirements or restrictions. For example, a list of MAC addresses,
IP addresses, or hostnames.
l Device Type - allow you to group together end-systems based on their device type.
The device type can be an operating system family, an operating system, or a
hardware type, such as Windows, Windows 7, Debian 3.0, and HP Printers.
l Locations - allow you to specify network access requirements or restrictions based
on the network location where the end user is connecting. For example, a list of
switches, wireless devices, switch ports, or SSIDs.
l Time of Day - allow you to specify network access requirements or restrictions
based on the day and time when the end user is accessing the network. For
example, traditional work hours or weekend work hours.
l User Groups - allow you to group together end users having similar network
access requirements or restrictions. For example, a list of usernames, an LDAP
users group, or a RADIUS user group.
For more information, see the Manage Rule Groups window.
ExtremeControl Profiles
ExtremeControl Profiles specify the authorization and assessment requirements for the
end-systems connecting to the network. Profiles also specify the security policies
applied to end-systems for network authorization, depending on authentication and
assessment results.
The Access Control tab comes with ten system-defined ExtremeControl Profiles:
l Administrator
l Allow
l Default
l Guest Access
l Notification
l Pass Through
410 of 805
Access Policies
l Quarantine
l Registration Denied Access
l Secure Guest Access
l Unregistered
If desired, you can edit these profiles or you can define your own profiles to use for your
ExtremeControl Configurations. For more information, see the Manage ExtremeControl
Profiles window.
AAA Configurations
The AAA Configuration defines the RADIUS servers, LDAP configurations, and Local
Password Repository that provide the authentication and authorization services for all
end-systems connecting to your ExtremeControl engines. The Access Control tab
comes with a default Basic AAA Configuration that ships with each ExtremeControl
engine. You can use this default configuration as is, or make changes to the default
configuration, if desired. For more information, see the Edit Basic AAA Configurations
window.
Portal Configurations
If your network is implementing Registration or Assisted Remediation, the Portal
Configuration defines the branding and behavior of the website used by the end user
during the registration or remediation process. ExtremeControl engines are shipped with
a default Portal Configuration. You can use this default configuration as is, or make
changes to the default configuration, if desired. For more information, see the Portal
Configuration Help topic.
Access Policies
Access policies define the authorization level that the ExtremeControl assigns to a
connecting end-system based on the end-system's authentication and/or assessment
results. There are four access policies used in the Access Control tab: Accept policy,
Quarantine policy, Failsafe policy, and Assessment policy. In your ExtremeControl
Profiles, these access policies define a set of network access services that determine
exactly how an end-system's traffic is authorized on the network. How access policies
are implemented depends on whether your network utilizes ExtremeControl Controller
engines and/or ExtremeControl Gateway engines.
For end-systems connected to EOS policy-enabled switches, ExtremeControl Gateway
engines inform the switch to assign a policy role to a connecting end-system, as
411 of 805
Access Policies
specified by the access policy. These policy roles must be defined in Policy tab and
enforced to the EOS policy-enabled switches in your network.
For end-systems connected to RFC 3580-enabled switches, policy roles are associated
to a VLAN ID. This allows your ExtremeControl Gateways to send a VLAN ID instead of
a policy role to those switches using Tunnel RADIUS attributes.
For ExtremeControl Controller engines, authorization of the end-system is implemented
locally on the ExtremeControl Controller engine by assigning a policy role to the end-
system, as specified by the access policy. In this scenario, all policy roles must be
defined in the ExtremeControl Controller policy configuration.
Here is a description of each the Access Control tab access policy, and some guidelines
for creating corresponding policy roles in the Policy tab.
Accept Policy: The Accept access policy is applied to an end-system when it has been
authorized locally by the ExtremeControl Gateway and when an end-system has passed
an assessment (if an assessment was required), or if the Accept policy has been
configured to replace the Filter-ID information returned in the RADIUS authentication
messages. For EOS policy-enabled switches, a corresponding policy role (created in the
Policy tab) would allocate the appropriate set of network resources for the end-system
depending on their role in the enterprise. For example, you might associate the Accept
policy in the Access Control tab to the "Enterprise User" role that is defined in the Policy
tab demo.pmd file. For RFC 3580-compliant switches, the Accept access policy may be
mapped to the Production VLAN. ExtremeControl Controllers are shipped with a default
policy configuration that includes an Enterprise User policy role.
Quarantine Policy: The Quarantine access policy is used to restrict network access to
end-systems that have failed assessment. For EOS policy-enabled switches, a
corresponding Quarantine policy role (created in the Policy tab) should deny all traffic by
default while permitting access to only required network resources such as basic
network services (e.g. ARP, DHCP, and DNS) and HTTP to redirect web traffic for
Assisted Remediation. For RFC 3580-compliant switches, the Quarantine access policy
may be mapped to the Quarantine VLAN. ExtremeControl Controllers are shipped with a
default policy configuration that includes a Quarantine policy role.
Failsafe Policy: The Failsafe access policy is applied to an end-system when it is in an
Error connection state. An Error state results if the end-system's IP address could not be
determined from its MAC address, or if there was an assessment error and an
assessment of the end-system could not take place. For EOS policy-enabled switches, a
corresponding policy role (created in the Policy tab) allocates a nonrestrictive set of
network resources to the connecting end-system so it can continue its connectivity on
the network, even though an error occurred in the ExtremeControl Solution operation.
412 of 805
Registration
For RFC 3580-compliant switches, the Failsafe access policy may be mapped to the
Production VLAN. ExtremeControl Controllers are shipped with a default policy
configuration that includes a Failsafe policy role.
Assessment Policy: The Assessment access policy may be used to temporarily allocate
a set of network resources to end-systems while they are being assessed. For EOS
policy-enabled switches, a corresponding policy role (created in the Policy tab) should
allocate the appropriate set of network resources needed by the Assessment server to
successfully complete its end-system assessment, while restricting the end-system's
access to the network.
Typically, the Assessment access policy allows access to basic network services (e.g.
ARP, DHCP, and DNS), permits all IP communication to the Assessment servers so the
assessment can be successfully completed (using destination IP address "Permit"
classification rule), and HTTP to redirect web traffic for Assisted Remediation. For RFC
3580-compliant switches, the Assessment access policy may be mapped to the
Quarantine VLAN. ExtremeControl Controllers are shipped with a default policy
configuration that includes an Assessing policy role.
It is not mandatory to assign the Assessment policy to a connecting end-system while it
is being assessed. The policy role received from the RADIUS server or the Accept policy
can be applied to the end-system, allowing the end-system immediate network access
while the end-system assessment is occurring in the background. In this case, the policy
role or Accept policy (or the associated VLAN for RFC 3580-compliant switches) must
be configured to allow access to the appropriate network resources for communication
with the Assessment servers.
NOTE: The Assessment server sends an ICMP Echo Request (a "ping") to the end-system before
the server begins to test IP connectivity to the end-system. Therefore, the Assessment
policy role, the router ACLs, and the end-system's personal firewall must allow this type of
communication between end-systems and Assessment servers in order for the
assessment to take place. If the Assessment server cannot verify IP connectivity, the
Failsafe policy is assigned to the end-system.
For more information, refer to the How to Set Up Access Policies Help topic.
Registration
The Extreme Networks ExtremeControl Solution provides support for Registration, a
solution that forces any new end-system connected on the network to provide the user's
identity in a web page form before being allowed access to the network, without
requiring the intervention of network operations. This means that end users are
413 of 805
Registration
414 of 805
Registration
415 of 805
Assessment
Assessment
The Extreme Networks ExtremeControl Solution integrates with assessment services to
determine the security posture of end-systems connecting to the network. It uses
assessment servers to assess and audit connecting end-systems and provide details
about an end-system's patch levels, running processes, anti-virus definitions, device
type, operating system, and other information critical in determining an end-system's
security compliance. End-systems that fail assessment can be dynamically quarantined
with restrictive network access to prevent security threats from entering the network.
When an assessment is performed on an end-system, a Health Result is generated. For
each health result, there may be several Health Result Details. A health result detail is a
result for an individual test performed during the assessment. Each health result detail is
given a score ranging from 1 to 10, and based on this score, the health result is assigned
a risk level. The Access Control tab uses this risk level to determine whether or not the
end-system will be quarantined.
In addition, assessment tests are assigned a scoring mode which determines whether
the resulting health result detail is applied towards the quarantine decision, or is used
only for informational or warning purposes. Informational health result details can be
used to gather information about the security risks on your network, while warning health
result details allow you to notify end users when they have security risks that should be
remediated. Informational or warning health result details have scores, however these
health result details do not impact the end-system's overall risk level.
The Access Control tab lets you create multiple assessment configurations that can
define different assessment requirements for end-systems. Assessment configurations
define the following information:
416 of 805
Assessment
Test sets let you define what type of assessment to execute, what parameters to pass to
the assessment server, and which assessment server resources to use. The Access
Control tab provides three default test sets; one for each type of assessment agent that
is either supplied or supported by the Access Control tab. You can use these default test
sets "as is" or edit them, if desired.
When you define your assessment server resources for a test set, you can specify to
balance the assessment load between your all your assessment servers, or, you can
specify an assessment server pool. For example, if you have four Nessus assessment
servers, you can put server A and server B in server pool 1, and server C and server D in
server pool 2. Then, in your test set configuration you can specify which server pool that
test set should use.
You can use risk level and scoring override configurations to define how each
assessment configuration will interpret an end-system's health results. The risk level
configuration determines what risk level is assigned to an end-system (high, medium, or
low) based on the end-system's health result details score. The scoring override
configuration lets you override the default score and scoring mode assigned to a
particular assessment test ID.
Once you have defined your assessment configurations, they are available for selection
when creating your ExtremeControl Profiles. In addition, the Access Control tab
provides a default assessment configuration that is already set up with default
assessment parameters and is ready to use in your ExtremeControl Profiles.
Before beginning to configure assessment on your network, read through the following
information presented in the Access Control tab online Help.
417 of 805
Assessment
Assessment Remediation
Remediation is a process that informs end users when their end-systems have been
quarantined due to network security policy non-compliance, and allows end users to
safely remediate their non-compliant end-systems without assistance from IT operations.
The process takes place when an end-system connects to the network and assessment
is performed. End users whose systems fail assessment are notified that their systems
have been quarantined, and are instructed in how to perform self-service remediation
specific to the detected compliance violation. Once the remediation steps have been
successfully performed and the end-system is compliant with network security policy, the
418 of 805
Assessment
appropriate network resources are allocated to the end-system, again without the
intervention of IT operations.
The Extreme Networks ExtremeControl Solution implements local Remediation Web
Server functionality to provide web notification to end users indicating when their end-
systems are quarantined and what remediation steps the end user must take. The
Remediation Web Server is installed on the ExtremeControl engine.
There are specific network configuration steps that must be performed when using
assisted remediation in your ExtremeControl Solution. In addition, you must configure
assisted remediation in the Access Control tab. For more information, see How to Set up
Assessment Remediation and Portal Configuration Help topics.
419 of 805
End-System Zones
policy. If the end-system is not compliant, the Quarantine access policy is again
utilized to restrict the authorization level of the end-system and the process starts
again.
l After a specified number of attempts and/or maximum time to remediate have
expired, the end user may be redirected to a web page requiring them to contact
the helpdesk for further assistance, and a notification is sent to the helpdesk
system with information regarding the non-compliant end-system.
End-System Zones
The Access Control tab end-system zones allow you to group end-systems into zones,
and then limit an Extreme Management Center user’s access to Extreme Management
Center end-system information and configuration based on those zones.
End-system zones are configured and managed in the Access Control tab, and are
enforced for Extreme Management Center end-system information and configuration.
When an end-system authenticates to the network, ExtremeControl rules are used to
assign an ExtremeControl profile and an end-system zone to the end-system. This
allows you to use a variety of rule components (such as End-System Groups, Location
Groups, and User Groups) to determine which zone an end-system should be assigned
to.
You can create any number of end-system zones in your network. An end-system can
only be assigned to one zone (but does not have to be assigned to a zone). You can
view which zone an end-system is currently assigned to in the end-systems table in the
Access Control tab in Extreme Management Center.
A user's authorized zones are determined by their Extreme Management Center user
group membership. User groups are created and configured in the Extreme
Management Center Authorization/Device Access Tool (accessed from the Tool menu),
and authorized zones are assigned to each user group in the Access Control tab.
In addition to using end-system zones, you can also limit a user’s access to Extreme
Management Center operations by assigning authorized rule groups. Whenever a user
initiates a change to a rule group, such as adding or removing an end-system to or from
a group, a check is performed to verify that the user is authorized to change that rule
group. Similar to end-system zones, a user's authorized rule groups are determined by
their Extreme Management Center user group membership.
A third component that should be taken into consideration is the ability to limit user
access to Extreme Management Center using authorization group capabilities. For
example, you can assign a user group the Extreme Management Center End-Systems
420 of 805
Enforcing
Read Access capability to allow read-only access to Extreme Management Center end-
system information, and use end-system zones to limit which end-systems can be
viewed. You can assign a user group the Extreme Management Center End-Systems
Read/Write Access capability to allow the ability to modify rule groups, and use rule
group authorization to limit which rule groups the user can perform these operations on.
Capabilities are assigned to user groups using the Authorization/Device Access Tool.
The Extreme Management Center Administrator group is always assigned all
capabilities.
For more information, see Authorization Group Capabilities.
Enforcing
In the Access Control tab, enforcing means writing ExtremeControl configuration
information to one or more ExtremeControl engines. Any time you add or make a change
to the ExtremeControl Configuration, the engines need to be informed of the change
through an enforce, otherwise the changes do not take effect. When an engine needs to
be enforced, the Enforce icon appears on that engine in the left-panel tree.
421 of 805
Enforcing
To enforce, use the Enforce All button in the Enforce menu at the bottom of the left-
hand panel which writes the information to all the ExtremeControl engines. You can
enforce to an individual engine or engine group by clicking the Enforce menu and
selecting Selection.
The enforce operation is performed in two stages: first an engine configuration audit is
performed and then the actual enforce to engines is performed.
The configuration audit takes place automatically after you start the enforce operation. It
looks for a wide-range of engine configuration problems including a review of the
ExtremeControl Configuration, ExtremeControl Profile, rule configuration, AAA
configuration, and portal configuration. The audit results are displayed in the Enforce
window, allowing you to view any warning and error information. To see warning or error
details, use the + icon in the left column to expand the Details information (as shown
below) or click Show Details to open the information in a new window.
If you choose to correct any problems at this point, you must close the Audit Results
window. When you have made your changes, click the Enforce All button to start the
enforce operation and perform a new audit.
From the Enforce window, you can click the Enforce All button to enforce all engines, or
use the checkboxes in the Select column to select some of the engines to enforce and
click the Enforce button. In order for the enforce operation to be carried out, none of the
selected engines can have an error associated with it. Even if one of the selected engine
has passed the audit, it will not be enforced if other selected engines have errors.
If none of the selected engines have errors, but a selected engine has a warning
associated with it, you are given the option to acknowledge the warning and proceed
with the enforce anyway. Once you acknowledge the warning and click OK, the enforce
is performed.
TIP: If there are warning messages that are regularly displayed during Enforce engine audits, you
can use the Enforce Warning Settings to specify that these messages should be ignored and
not be displayed.
The Enforce window displays the enforce operation status, as shown below.
422 of 805
Notifications
NOTE: MAC Locking to a specific port on a switch is based on the port interface name (e.g. fe.5.1).
If a switch board is moved to a different slot in a chassis, or if a stack reorders itself, this
name will change and break the MAC Locking settings.
Notifications
Notifications provide the ability for the Identity and Access tab to notify administrators or
helpdesk personnel of important information through email, Trap, or Syslog messages.
These notifications help administrators understand what is going on in their system on a
real-time basis. For example, the Access Control tab could be configured to send a
423 of 805
Notifications
notification when a new end-system is learned on the network, when a MAC lock is
violated, or when a new MAC address is registered on the network.
424 of 805
Access Control Configurations
Expand the Access Control Configurations left-panel tree to access to the following
Access Control system components.
Portal Configurations
If your network is implementing Registration or Assisted Remediation, use the
Portal Configuration to define the branding and behavior of the website used by
the end user during the registration or remediation process.
AAA Configurations
AAA configurations define the RADIUS and LDAP configurations, and Local
Password Repository that provide the authentication and authorization services to
your ExtremeControl engines.
425 of 805
User Input
User Input
Enter the end-system data on which you are evaluating the Access Control configuration
in this tab.
426 of 805
Authorization Results Tab
427 of 805
Authorization Results Tab
Configuration. The results also factor in any RADIUS user attributes you enter on the
User Input tab when the evaluation is run.
428 of 805
Authorization Results Tab
Related Information
For information on related windows:
l Access Control Configurations
l End-Systems Tab
429 of 805
Accessing ExtremeControl Configuration Rules
430 of 805
Viewing Rules in the Table
TIP: Right click on a rule in the table to access a menu of options including the ability to edit the
ExtremeControl profile and any user groups included in the rule.
Enabled
This column displays whether the rule is enabled by displaying a checkmark icon
or disabled, with no checkmark. Click the Edit button to enable or disable the rule.
You cannot disable any of the system rules provided by Extreme Management
Center.
Rule Name
This column displays the rule name. Double-click on the rule to open the Edit Rule
window where you can edit the rule name, if desired. You cannot change the name of
the system rules provided by Extreme Management Center.
Conditions
This column displays the criteria an end-system must meet in order to be assigned
the rule, including the authentication method and rule groups that the end-system or
user must match. Double-click on the rule to open the Edit Rule window where you
can edit the rule criteria, if desired. You cannot change the criteria for the system
rules provided by Extreme Management Center. Click on a rule group name to open
a window where you can edit the group's parameters.
User Group
This column, hidden by default, displays the user group you configured. User groups
limit an Extreme Management Center user’s access based on the LDAP, RADIUS, or
Username group to which they are assigned. To edit the User Group, click the user
group in the Conditions column, which opens the Add/Edit User Group window.
Zone
This column displays the end-system zone you configured. End-system zones allow
you to group end-systems into zones, and then limit an Extreme Management Center
user’s access to end-system information and configuration based on those zones.
431 of 805
Creating and Editing Rules
Actions
This column displays the actions the rule takes when an end-system matches the
rule's criteria. This includes the profile assigned to the end-system and the portal
configuration the end user sees. Click on the profile or portal name to open a window
where you can make changes, if desired.
Add or remove a column by clicking the down arrow at the right of a column header and
selecting a checkbox associated with a column from the Columns menu.
TIP: To add a new rule at a specific location in the table, select the rule that you want the new rule
to follow, right-click and select Add Rule after Selection. When you create the new rule and
click OK, it is added after the selected rule. The selected rule must be a custom (user-
defined) rule, or it can be the Blacklist or Assessment Warning rule.
Edit Rule
Opens the Edit Rule window where you can edit the rule criteria for a selected rule.
Copy Rule
Opens the Copy Rule window where you can copy the rule criteria of an existing
rule for a new rule.
432 of 805
Creating and Editing Rules
Refresh
Updates the Rules details.
Related Information
For information on related windows:
433 of 805
Creating and Editing Rules
l AAA Configuration
l Portal Configuration
434 of 805
Creating and Editing Rules
Add/Edit Rule
Use this window to add a new rule or edit an existing rule in an ExtremeControl
configuration. End-systems that match the criteria selected for the rule are assigned the
ExtremeControl profile that is specified.
To access this window:
1. Open the Control tab in Extreme Management Center.
2. Select the ExtremeControl tab.
3. In the left-panel tree, select ExtremeControl Configurations > Default > Rules. A
table of rules for the ExtremeControl configuration is displayed in the right panel.
4. Select the Add button in the table toolbar to open the Create Rule window.
or
Select a rule in the table and select the Edit button in the toolbar to open the Edit
Rule window.
The image below shows a rule created to provide a different ExtremeControl profile for
authenticated registered users on mobile devices. Descriptions of the different fields and
options in the window are provided below.
435 of 805
Creating and Editing Rules
Name
Enter a name for a new rule or change the name of an existing rule, if desired.
Rule Enabled
Select this checkbox to enable this rule in the ExtremeControl configuration.
436 of 805
Creating and Editing Rules
Description
Enter a description of the rule.
Group Label
If this rule is part of a group, select the group name from the drop-down list or enter
a new group label here.
Authentication Method
Select the authentication method that end-systems must match for this rule.
User Group
Select the user group that the end user must be a member of to match this rule.
Select the Edit button to edit the selections available in this drop-down list.
End-System Group
Select the end-system group that the end-system must be a member of to match
this rule. Select the Edit button to edit the selections available in this drop-down
list.
Device Type Group
Select the device type group that the end-system must be a member of to match
this rule. Select the Edit button to edit the selections available in this drop-down
list.
Location Group
Select the network location (switch and interface) that the end-system must
originate from to match this rule.
Time Group
Select a time frame that the connection request must match for this rule.
Profile
Select the ExtremeControl profile assigned to any end-system matching this rule
from the drop-down list. Select New to add a new profile in the Create New Profile
window. Select Manage from the drop-down list to be redirected to the Engine
Group > Switches tab and allows you to make additions or edits to the switches in
this engine group.
Portal
Select the portal configuration from the drop-down list to any end-system matching
this rule. Select New to add a new portal configuration in the Add New Portal
Configuration window. Select Manage from the drop-down list to be redirected to
the Engine Group > Switches tab and allows you to make additions or edits to the
switches in this engine group.
437 of 805
Creating and Editing Rules
Zone
This field only displays if you have displayed the Zone column in the
ExtremeControl Configuration Rules table. Select the end-system zone assigned
to any end-system matching this rule. Enter a new zone name if none exists. See
End-System Zones for more information.
Select Save to save your changes.
438 of 805
Creating and Editing Rules
Authentication Type
Select the authentication type that the end-system must match for this mapping.
Note that individual types of 802.1X authentication are not available for selection
because at this point in the authentication process, the fully qualified 802.1X
authentication type cannot be determined. Select Any if you don't want to require
an authentication match. Select 802.1X (TTLS-INNER-TUNNEL) or 802.1X
(PEAP-INNER-TUNNEL) to authenticate via another RADIUS server using an
inner tunnel to protect the authentication request.
439 of 805
Creating and Editing Rules
logs into a switch's CLI via the console connection, SSH, or Telnet. This allows
you to send management requests to a different authentication server than network
access requests go to. This authentication type can be used to authenticate users
locally, or proxy them to specific RADIUS or LDAP servers. Make sure that the
Management Login mapping is listed above the "Any" mapping in the list of
mappings in your Advanced AAA Configuration. In addition, you must set the Auth.
Access Type to either "Management Access" or "Any Access" in the Add/Edit
Switches window for this authentication type.
User/MAC/Host
Select the Pattern radio button and enter the username, MAC address, or
hostname that the end-system must match for this mapping. Or, select the Group
radio button and select a user group or end-system group from the drop-down list. If
you enter a MAC address, you can use a colon (:) or a dash (-) as an address
delimiter, but not a period (.).
Location
Select the location group that the end-system must match for this mapping, or
select "Any" if you don't want to require a location match. You can also add a new
location group or edit an existing one.
Authentication Method
Select the authentication method that the end-system must match for this mapping:
Proxy RADIUS, LDAP Authentication, or Local Authentication.
Primary RADIUS Server — Use the drop-down list to select the primary RADIUS
server for this mapping to use. You can also add or edit a RADIUS server, or
manage your RADIUS servers.
Secondary RADIUS Server — Use the drop-down list to select the backup
RADIUS server for this mapping to use. You can also add or edit a RADIUS
server, or manage your RADIUS servers.
3rd - 8th RADIUS Server — Use the drop-down list to select the backup RADIUS
server for this mapping to use. You can also add or edit a RADIUS server, or
manage your RADIUS servers.
Inject Authentication Attrs — Use the drop-down list to select attributes to inject
when proxying authentication requests to the back-end RADIUS servers. You can
also add or edit a RADIUS attribute configuration, or manage your RADIUS
attribute configurations. Select ExtremeGuest when configuring a Captive Portal
that redirects users to ExtremeGuest.
440 of 805
Creating and Editing Rules
Inject Accounting Attrs — Use the drop-down list to select attributes to inject when
proxying accounting requests to the back-end RADIUS servers. You can also add
or edit a RADIUS attribute configuration, or manage your RADIUS attribute
configurations. Select ExtremeGuest when configuring a Captive Portal that
redirects users to ExtremeGuest.
Local Authentication — If desired, select the option to configure a password for all
authentications that match the mapping. This option could be used with MAC
authentication where the password is not the MAC address. For example, you may
have MAC (PAP) authentication configured for all your switches, with the
exception of MAC (MsCHAP) authentication configured for a wireless controller.
For the wireless controller, you would add a new AAA mapping with the
authentication type set to MAC (MsCHAP), the location set to the wireless
controller location group, and the authentication method set to Local Authentication
with the password for all authentications set to the static password configured on
the wireless controller.
LDAP Configuration
Use the drop-down list to select the LDAP configuration for the LDAP servers on
your network that you want to use for this mapping. You can also add or edit an
LDAP configuration, or manage your LDAP configurations. You must specify an
LDAP configuration if you have selected LDAP Authentication as your
authentication method. However, you might also specify an LDAP configuration if
you use Proxy RADIUS to a Microsoft NPS server that is running on a domain
controller. The domain controller is also an LDAP server that can do RADIUS
requests and LDAP requests for users on that server.
441 of 805
Creating and Editing Rules
functionality only occurs for those rules on which the checkbox is selected and
only in the event the first authentication rule fails. When this checkbox is enabled
and an authentication rule fails, the Access Control engine continues checking the
end-user against the remaining rules until it finds a matching rule. If it does not find
a matching rule, authentication continues using the previous authentication
response.
Related Information
For information on related windows:
442 of 805
Creating and Editing Rules
Use these buttons to add, edit, or delete the AAA configurations. Click Add to add
a new configuration to the table. Then select the configuration in the table and click
Edit to open the Edit AAA Configurations panel. Use the Delete button to remove
any selected configuration(s).
Name
The name of the AAA Configuration.
Type
Whether the configuration is a Basic configuration or an Advanced configuration.
Local MAC Authentication
Indicates whether MAC authentication requests are handled locally by the
ExtremeControl engine and the type of MAC authentication that will be used.
Local Password Repository
The local password repository specified for this AAA configuration. Extreme
Management Center supplies a default repository that can be used to define
passwords for administrators and sponsors accessing the Registration
443 of 805
Creating and Editing Rules
administration web page and the sponsor administration web page. The default
password is Extreme@pp.
Related Information
l AAA Configurations
444 of 805
Accessing the AAA Configuration
AAA Configurations
The AAA Configuration defines the RADIUS and LDAP configurations that provide the
authentication and authorization services to your ExtremeControl engines. A AAA
Configuration can be a basic or advanced configuration. Basic AAA Configurations
define the authentication and authorization services for all end-systems connecting to
your ExtremeControl engines Advanced AAA configurations allow you to define different
authentication and authorization services for different end users based on end-system to
authentication server mappings.
This Help topic provides the following information for accessing and configuring the AAA
Configuration:
NOTE: Users with a AAA configuration using NTLM authentication to a back-end active directory
domain whose passwords expire are prompted via windows to change their domain
password.
445 of 805
Basic AAA Configuration
446 of 805
Advanced AAA Configuration
l authentication type
l username/user group
l MAC address/end-system group
l hostname/hostname group
l location group
l authentication method
l RADIUS user group
l LDAP user group
NOTE: LDAP User Group is only available with an Authentication Type of Registration.
For example, in a higher education setting, you may want faculty members
authenticating to one RADIUS server and students authenticating to another. You can
also create mappings specifically for authenticating management login requests, when
an administrator logs into a switch's CLI via the console connection, SSH, or Telnet.
Mappings are listed in order of precedence from the top down. If an end-system does not
match any of the listed mappings, the RADIUS request is dropped. Because of this, you
might want to use the "Any" mapping (created automatically when you add a new
advanced AAA configuration) as your last mapping in the list.
447 of 805
Advanced AAA Configuration
448 of 805
Advanced AAA Configuration
the ExtremeControl engine determine the domain. Auto Detect starts at the first
entry set to LDAP Authentication in the table and attempt to join that domain. If it
cannot join that domain, it goes to the next entry set to LDAP Authentication and
attempt to join that domain, and so on until one succeeds.
You can also join multiple Active Directory domains by selecting All Domains and
configuring multiple authentication rules with an Authentication Method of
LDAP Authentication in the Advanced AAA Configuration tab.
NOTE: There are configuration considerations when joining multiple Active Directory
Domains.
Related Information
For information on related windows:
l Add User to Authentication Mapping Window
449 of 805
Advanced AAA Configuration
Related Information
For information on related windows:
l Add/Edit LDAP Configuration window
450 of 805
Advanced AAA Configuration
451 of 805
Advanced AAA Configuration
NOTE: If you are using LDAPS, your Extreme Management Center/ExtremeControl environment
must be configured to accept the new LDAPS server certificate. For information, see
Server Certificate Trust Mode in the Secure Communications Help topic.
452 of 805
Advanced AAA Configuration
Configuration Name
Enter a name for the LDAP configuration.
LDAP Connection URLs
Use this table to add, edit, or delete connection URLs for the LDAP server and any
backup servers you have configured. (The backup servers are redundant servers
453 of 805
Advanced AAA Configuration
containing the same directory information.) Use the Up and Down arrows to
arrange the order that the URLs are listed.
The format for the connection URL is ldap://host:port where host equals
hostname or IP address, and the default port is 389. For example,
ldap://10.20.30.40:389. If you are using a secure connection, the format is
ldaps://host:port and the default port is 636. For example,
ldaps://10.20.30.40:636. If you are using LDAPS, your Extreme
Management Center/ExtremeControl environment must be configured to accept
the new LDAPS server certificate. For information, see Server Certificate Trust
Mode in the Secure Communications Help topic.
If you are creating an LDAP configuration for Novell eDirectory, be aware that the
eDirectory may require that the universal password lookup be done using LDAPS.
If you configure the URL for LDAP only, the lookup may fail.
Authentication Settings
Enter the administrator username and password that will be used to connect to the
LDAP server to make queries. The credentials only need to provide read access to
the LDAP server. The timeout field lets you specify a timeout value in seconds for
the LDAP server connection.
Search Settings
For the three fields, enter the root node of the LDAP server. To improve search
performance, you can specify a sub tree node to confine the search to a specific
section of the directory. The search root format should be a DN (Distinguished
Name).
Schema Definition
Provide information that describes how entries are organized in the LDAP server.
If the option is not selected, the domain name will be stripped off the
454 of 805
Advanced AAA Configuration
username prior to performing the lookup. For example, you should deselect
this option when using the User Search Attribute: sAMAccountName. Two
examples of the domain name being stripped off would be:
user@domain.com -> user
DOMAIN\user -> user
l User Authentication Type - Specify how the user is authenticated. There are
4 options:
o LDAP Bind – This is the easiest option to configure, but only works with
a plain text password. It is useful for authentication from the captive
portal but does not work with most 802.1x authentication types.
o NTLM Auth – This option is only useful when the backend LDAP server
is really a Microsoft Active Directory server. This is an extension to
LDAP bind that uses ntlm_auth to verify the NT hash challenge
responses from a client in MsCHAP, MsCHAPV2, and PEAP requests.
o NT Hash Password Lookup – If the LDAP server has the user’s
password stored as an NT hash that is readable by another system,
you can have ExtremeControl read the hash from the LDAP server to
verify the hashes within an MsCHAP, MsCHAPV2, and PEAP request.
o Plain Text Password Lookup – If the LDAP server has the user’s
password stored unencrypted and that attribute is accessible to be read
via an LDAP request, then this option reads the user’s password from
the server at the time of authentication. This option can be used with
any authentication type that requires a password.
l User Password Attribute - This is the name of the password used with the
NT Hash Password Lookup and Plain Text Password Lookup listed above.
l Host Object Class - enter the name of the class used for hostname.
l Host Search Attribute - enter the name of the attribute in the host object
class that contains the hostname.
l Use Fully Qualified Domain Name checkbox - use this checkbox to specify if
you want to use the Fully Qualified Domain Name (FQDN) or just hostname
without domain.
l OU Object Classes - the names of the classes used for organizational units.
Test Button
The connection to the LDAP server is tested and a report on connection test results
is provided. There is also a user/host search that lets you search on a user entry or
host entry value and display the attributes associated with those values.
455 of 805
Advanced AAA Configuration
Related Information
For information on related windows:
l Manage LDAP Configurations Window
456 of 805
Advanced AAA Configuration
NOTE: If you are using LDAPS, your Extreme Management Center/ExtremeControl environment
must be configured to accept the new LDAPS server certificate. For information, see
Server Certificate Trust Mode in the Secure Communications Help topic.
457 of 805
Advanced AAA Configuration
458 of 805
Advanced AAA Configuration
Configuration Name
The name for the LDAP configuration you defined.
LDAP Connection URLs
Use this table to add, edit, or delete connection URLs for the LDAP server and any
backup servers you have configured. (The backup servers are redundant servers
containing the same directory information.) Use the Up and Down arrows to
arrange the order that the URLs are listed.
The format for the connection URL is ldap://host:port where host equals
hostname or IP address, and the default port is 389. For example,
ldap://10.20.30.40:389. If you are using a secure connection, the format is
ldaps://host:port and the default port is 636. For example,
ldaps://10.20.30.40:636. If you are using LDAPS, your Extreme
Management Center/ExtremeControl environment must be configured to accept
the new LDAPS server certificate. For information, see Server Certificate Trust
Mode in the Secure Communications Help topic.
If you are creating an LDAP configuration for Novell eDirectory, be aware that the
eDirectory may require that the universal password lookup be done using LDAPS.
If you configure the URL for LDAP only, the lookup may fail.
Authentication Settings
Enter the administrator username and password that will be used to connect to the
LDAP server to make queries. The credentials only need to provide read access to
the LDAP server. The timeout field lets you specify a timeout value in seconds for
the LDAP server connection.
Search Settings
For the three fields, enter the root node of the LDAP server. To improve search
performance, you can specify a sub tree node to confine the search to a specific
section of the directory. The search root format should be a DN (Distinguished
Name).
Schema Definition
Provide information that describes how entries are organized in the LDAP server.
459 of 805
Advanced AAA Configuration
l Keep Domain Name for User Lookup - If selected, this option will allow the
full username to be used when looking up the user in LDAP. For example,
you should select this option when using the User Search Attribute:
userPrincipalName.
If the option is not selected, the domain name will be stripped off the
username prior to performing the lookup. For example, you should deselect
this option when using the User Search Attribute: sAMAccountName. Two
examples of the domain name being stripped off would be:
user@domain.com -> user
DOMAIN\user -> user
l User Authentication Type - Specify how the user is authenticated. There are
4 options:
o LDAP Bind – This is the easiest option to configure, but only works with
a plain text password. It is useful for authentication from the captive
portal but does not work with most 802.1x authentication types.
o NTLM Auth – This option is only useful when the backend LDAP server
is really a Microsoft Active Directory server. This is an extension to
LDAP bind that uses ntlm_auth to verify the NT hash challenge
responses from a client in MsCHAP, MsCHAPV2, and PEAP requests.
o NT Hash Password Lookup – If the LDAP server has the user’s
password stored as an NT hash that is readable by another system,
you can have ExtremeControl read the hash from the LDAP server to
verify the hashes within an MsCHAP, MsCHAPV2, and PEAP request.
o Plain Text Password Lookup – If the LDAP server has the user’s
password stored unencrypted and that attribute is accessible to be read
via an LDAP request, then this option reads the user’s password from
the server at the time of authentication. This option can be used with
any authentication type that requires a password.
l User Password Attribute - This is the name of the password used with the
NT Hash Password Lookup and Plain Text Password Lookup listed above.
l Host Object Class - enter the name of the class used for hostname.
l Host Search Attribute - enter the name of the attribute in the host object
class that contains the hostname.
460 of 805
Advanced AAA Configuration
l Use Fully Qualified Domain Name checkbox - use this checkbox to specify if
you want to use the Fully Qualified Domain Name (FQDN) or just hostname
without domain.
l OU Object Classes - the names of the classes used for organizational units.
Test Button
The connection to the LDAP server is tested and a report on connection test results
is provided. There is also a user/host search that lets you search on a user entry or
host entry value and display the attributes associated with those values.
Populate Default Values Button
Select from the defaults available from the drop-down list:
l Active Directory: User Defaults - Settings that allow user authentication
when ExtremeControl is set to proxy to LDAP and the server is an Active
Directory machine.
l Active Directory: Machine Defaults - Settings that allow machine
authentication when ExtremeControl is set to proxy to LDAP and the server is
an Active Directory machine.
l OpenLDAP Defaults - Settings that allow ExtremeControl to verify the user's
password via an OpenLDAP server. See the NAC Manager How to
Configure PEAP Authentication via OpenLDAP Help topic for information.
l Novell eDirectory Defaults - Settings that allow ExtremeControl to read the
universal password from Novell eDirectory. You must configure eDirectory to
allow that password to be read. See the NAC Manager How to Configure
PEAP Authentication via eDirectory Help topic for information.
Related Information
For information on related windows:
l Manage LDAP Configurations Window
461 of 805
Advanced AAA Configuration
RADIUS Server IP
The IP address of the RADIUS server.
Auth Port
The UDP port number (1-65535) on the RADIUS server to which the Extreme
Management Center server or ExtremeControl engine sends authentication
requests; 1812 is the default port number.
The TCP port number (1-65535) on the RADIUS server that the Extreme
Management Center server or ExtremeControlengine sends authentication
requests to; 1812 is the default port number.
The TLS port number (1-65535) on the RADIUS server that the Extreme
Management Center server or ExtremeControlengine sends authentication
requests to; 2083 is the default port number.
NOTE: For versions prior to Extreme Management Center Version 8.5, TCP and TLS
settings are not supported and cannot be enforced to ExtremeControl engines.
462 of 805
Advanced AAA Configuration
Acct Port
The UDP port number (1-65535) on the RADIUS server to which the
ExtremeControl engine sends accounting requests; 1813 is the default port
number.
The TCP port number (1-65535) on the RADIUS server that the ExtremeControl
engine sends accounting requests to; 1813 is the default port number.
The TLS port number (1-65535) on the RADIUS server that the ExtremeControl
engine sends accounting requests to; 2083 is the default port number.
NOTE: For versions prior to Extreme Management Center Version 8.5, TCP and TLS
settings are not supported and cannot be enforced to ExtremeControl engines.
Timeout Duration
The amount of time, in seconds, the Extreme Management Center server or
ExtremeControl engine waits for the RADIUS server to respond to an
authentication or accounting request. Valid values are 2-60 seconds.
Number of Retries
The number of times the Extreme Management Center server or ExtremeControl
engine resends an authentication or accounting request if the RADIUS server does
not respond. Valid values are 0-20.
Shared Secret
The shared secret used to encrypt and decrypt communication between the
Extreme Management Center server or ExtremeControl engine and the RADIUS
server. In ExtremeControl, this is also the shared secret used between the switch
and the RADIUS server if the ExtremeControl engine is bypassed or if you
configured the Management RADIUS Server options when you added the switch.
Show Shared Secrets
When checked, the shared secrets are shown in text. When unchecked, the shared
secrets are shown as a string of asterisks.
463 of 805
Advanced AAA Configuration
Used By Button
This button is only available when the panel is launched from ExtremeControl.
Opens the RADIUS Server(s) Used By window which shows where the selected
servers are in use by AAA configurations.
Add Button
Opens the Add RADIUS Server window where you can define a new RADIUS
server.
Edit Button
Opens the Edit RADIUS Server window where you can edit the values for the
selected RADIUS server.
Delete Button
Deletes the selected RADIUS server. You cannot delete servers currently in use.
Related Information
For information on related windows:
l Add/Edit RADIUS Server Window
464 of 805
Advanced AAA Configuration
RADIUS Server IP
The IP address of the RADIUS server.
Response Window
This setting is used by ExtremeControl when proxying a RADIUS request to a
backend RADIUS server. ExtremeControl keeps a status on all backend RADIUS
servers instead of going to the primary RADIUS server for every request. If a
RADIUS server does not respond in the amount of time specified here, that server
465 of 805
Advanced AAA Configuration
is marked as down until it can be verified as being up. See the Health Check
section of the Advanced RADIUS Server Configuration window for information on
how ExtremeControl determines the health of a RADIUS server.
NOTE: The ExtremeControl engine times out a RADIUS server if it takes more than "(retries +1) *
timeout" or 20 seconds, whichever is greater, for the server to respond. For example, if the
number of retries is set to 1 and the timeout duration is set to 2 (the default values), then the
engine times out a RADIUS server if it takes longer than 20 seconds to respond, because
that is the greater value (20 to 4). If the RADIUS server times out, then ExtremeControl
fails over to the backup RADIUS server until it determines that the primary server is back
up. At that point, ExtremeControl starts proxying RADIUS requests to the primary server
again.
Number of Retries
The number of times the Extreme Management Center server or ExtremeControl
engine resends an authentication or accounting request if the RADIUS server does
not respond. Valid values are 0-20. This setting is only used for logging into
Extreme Management Center via RADIUS or logging into the ExtremeControl
Captive Portal via RADIUS.
Configuration
UDP Button
Select the UDP button to configure the UDP port on the RADIUS server to receive
authentication and accounting requests.
466 of 805
Advanced AAA Configuration
NOTE: For versions prior to Extreme Management Center Version 8.5, TCP settings are
not supported and cannot be enforced to ExtremeControl engines.
RADSec Button
Select the RADSec button to configure the TLS (Transport Layer Security) port on
the RADIUS server to receive authentication and accounting requests.
NOTE: For versions prior to Extreme Management Center Version 8.5, TLS settings are not
supported and cannot be enforced to ExtremeControl engines.
467 of 805
Advanced AAA Configuration
Advanced Button
Use this button to open the Advanced RADIUS Server Configuration window,
where you can configure advanced RADIUS settings used by ExtremeControl
when proxying access requests to a backend RADIUS server.
Related Information
For information on related windows:
l Manage RADIUS Servers Window
l Advanced RADIUS Server Configuration Window
468 of 805
Advanced AAA Configuration
Add
Select the Add button to open the Create New RADIUS Attribute Settings window,
which allows you to create a new attribute configuration.
Edit
Select the Edit button to open the Edit RADIUS Attribute Settings window, which
allows you to edit an existing attribute configuration.
Delete
Select an attribute and click the Delete button to remove an existing attribute
configuration.
469 of 805
Advanced AAA Configuration
Related Information
For information on related windows:
l Add/Edit User To Authentication Mapping Window
l Create New RADIUS Attribute Settings Window
470 of 805
Advanced AAA Configuration
Username Format
This field is used by Extreme Management Center to determine what format to use
for the username when proxying a request to the backend RADIUS server. There
are two options:
l Strip Domain Name (default) - This option removes a domain name from the
username when proxying the request. Select this option unless the backend
RADIUS server requires the domain name to be included.
471 of 805
Health Check for UDP
l Keep Domain Name - This option keeps any domain names on the
username when proxying the request to the backend RADIUS server. If the
backend RADIUS server is a Microsoft IAS or NPS server, this option could
cause the RADIUS server to time out if a guest comes onto the network with
another domain. In that scenario, if the request is proxied to the backend
RADIUS server with the domain name, the server does not respond to the
request because it is from an unknown domain. Therefore, if you use this
option with a Microsoft IAS or NPS server, use an advanced AAA
configuration so that only requests for the desired domain(s) are sent to the
backend RADIUS server, and all unknown domains are processed locally so
they are rejected.
Require Message-Authenticator
Enable this checkbox if the backend RADIUS server requires a message
authenticator to be part of the request. If enabled, Extreme Management Center
adds the message authenticator when proxying the request.
NOTE: For backend RADIUS server options other than UDP (for example, TCP or RADSec), all
fields except Revive Interval in the Health Check for UDP are not available.
472 of 805
Health Check for UDP
Related Information
For information on related windows:
l Manage RADIUS Servers Window
l Add/Edit RADIUS Server Window
473 of 805
Health Check for UDP
Basic AAA Configurations define the RADIUS and LDAP configurations for all end-
systems connecting to your ExtremeControl engines.
474 of 805
Column Definitions
Column Definitions
Name
The policy mapping name.
Policy Role
The policy role assigned to this mapping. All policy roles used in your mappings
must be part of your ExtremeControl (ExtremeControl) Controller policy
configuration and/or defined in the Policy tab and enforced to the policy-enabled
switches in your network.
Location
Policy mapping locations allow authentication requests that match the same
ExtremeControl rule and corresponding ExtremeControl profile to be authorized to
different accept attributes (policy/VLAN/Custom Attribute) based on the location the
request originated from. For example, in the Policy Mapping Configuration
475 of 805
Column Definitions
screenshot above, the Administration policy mapping has five entries, with each
entry assigning a different VLAN (for RFC 3580-enabled switches) for
authentication requests matching the specified location. Requests originating from
the 1st floor South location will be authorized to VLAN 100, and requests
originating from the 2nd floor North location (matching the same ExtremeControl
rule) is authorized to VLAN 220. Using locations in this manner lets you authorize
end-systems to different access criteria using a single ExtremeControl rule,
whereas the alternative would be to create multiple location-based ExtremeControl
rules each with an ExtremeControl Profile that corresponds with the desired
access value.
When policy mapping locations are used in this manner, it is important to include a
catch-all policy mapping (the fifth Administration mapping in the example above)
that has a location of "any" and sets the access behavior for an authorization
originating from any other location. The access behavior could be a
policy/VLAN/Custom Attribute that grants some form of restricted access, or denies
access altogether. If a catch-all mapping is not included, a warning message may
appear on enforce indicating that there is no catch-all mapping configured, and
authorizations that match the policy but do not originate from a defined location,
may result in errors or unpredictable behavior.
VLAN Name
If you have RFC 3580-enabled switches in your network, this column displays the
VLAN name assigned to this mapping.
VLAN Egress
If you have RFC 3580-enabled switches in your network, this column displays the
VLAN ID assigned to this mapping.
Filter
This value is only displayed in Basic mode if ExtremeWireless Controllers have
been added to Extreme Management Center. The Filter column typically maps to
the Filter-Id RADIUS attribute. This value applies to ExtremeWireless Controllers
and other switches that support the Filter-Id attribute.
Login-LAT-Group
If your network devices require a Login-LAT-Group, it displays here.
Login-LAT-Port
If you have ExtremeWireless Controllers on your network, the Login-LAT-Port is an
attribute returned in the default RADIUS response. The Login-LAT-Port value is
used by the controller to determine whether the authentication is fully authorized. A
value of "1" indicates the authentication is authorized, where a value of "0"
476 of 805
Column Definitions
indicates that authorization is not complete. The value of "0" is used by the
controller to determine that additional authentication is required and is a signal for
the controller to engage its external captive portal and use HTTP redirection to
force HTTP traffic from the end-system to the defined ExtremeControl engine. This
is used in conjunction with the Registration and Assessment features of
ExtremeControl.
Management
The authorization attribute returned for successful administrative access
authentication requests that originate from network equipment configured to use
RADIUS as the authentication mechanism for remote management of switches,
routers, VPN concentrators, etc. Examples of management values for EOS devices
are: "mgmt=su:", "mgmt=rw:", or "mgmt=ro:". The management attribute determines
the level of access the administrator will have when authorized to access the
device: superuser, read/write, or read-only.
Custom
Some network devices require additional RADIUS response attributes in order to
provide authorization or define additional parameters for the authenticated session.
These additional attributes can be defined in the five available Custom option
fields.
Attribute List 1-3
The Attribute List fields display additional RADIUS response attributes in a single
mapping. For example, you can use each field to provide a complete ACL for a
different third-party vendor.
Related Information
For information on related windows:
l Add/Edit Policy Mapping Window
l How to Set Up Access Policies and Policy Mappings
477 of 805
Column Definitions
The fields in this window vary depending on whether you are using a basic or advanced
policy mapping configuration. For a definition of each field, see below.
478 of 805
Column Definitions
479 of 805
Column Definitions
Name
Enter a name for the policy mapping.
Map to Location
Allows you to specify a certain location for the mapping. You should first configure
your locations using the Location Group (Control tab > ExtremeControl >
ExtremeControl Configurations > Group Editor > Location Groups) or you can click
the Edit button to the right of the field to add a location group to the list. For more
information on using the Location option in Policy Mappings, see the Edit Policy
Mapping Configuration Window Help topic.
Policy Role
Use the drop-down list to select a policy role, or enter a policy role in the field. The
drop-down list displays any policy roles you have created and saved in the Policy
tab and/or all the policy roles contained in the ExtremeControl Controller policy
configuration. Roles from all your policy domains are listed; if there are duplicate
names, only one is listed. The list is not case sensitive, so "Enterprise User" and
"enterprise user" are considered duplicate policy names. All policy roles used in
your mappings must be part of your ExtremeControl) Controller policy configuration
and/or defined in Policy tab and enforced to the EOS policy-enabled switches in
your network.
NOTE: Entering a new policy role does not create a new role in the Policy tab.
VLAN Egress
Use the drop-down list to select the appropriate VLAN the egress forwarding state:
Tagged (frames are forwarded as tagged), Untagged (frames are forwarded as
untagged), Same as Ingress (frames are forwarded as specified by the VLAN
Ingress), or User Defined (you define how frames are forwarded).
Filter
If your network devices require a custom Filter-Id, enter it here. The Filter column
typically maps to the Filter-Id RADIUS attribute. This value applies to
ExtremeWireless Controllers and other switches that support the Filter-Id attribute.
480 of 805
Column Definitions
Port Profile
For ExtremeXOS devices on which legacy firmware is installed, this field indicates
the profile used by Extreme Policy.
Login-LAT-Group
If your network devices require a Login-LAT-Group, enter it here.
Login-LAT-Port
If you have ExtremeWireless Controllers on your network, the Login-LAT-Port is an
attribute returned in the default RADIUS response. The Login-LAT-Port value is
used by the controller to determine whether the authentication is fully authorized. A
value of "1" indicates the authentication is authorized, where a value of "0"
indicates that authorization is not complete. The value of "0" is used by the
controller to determine that additional authentication is required and is a signal for
the controller to engage its external captive portal and use HTTP redirection to
force HTTP traffic from the end-system to the defined ExtremeControl engine. This
is used in conjunction with the Registration and Assessment features of
ExtremeControl.
Custom
If your network devices require additional RADIUS response attributes in order to
provide authorization or define additional parameters for the authenticated session,
you can define them in the five available Custom option fields.
Organization 1-3
Enter additional RADIUS response attributes in a single mapping in the
Organization fields. For example, you can use each field to provide a complete
ACL for a different third-party vendor.
Management
Enter a management attribute used to authenticate requests for administrative
access to the selected switches, for example, "mgmt=su:", "mgmt=rw:", or
"mgmt=ro:". The management attribute determines the level of access the
administrator will have to the switch: superuser, read/write, or read-only. Be sure to
include the final colon (":") in the attribute, or the management access will not work.
Related Information
For information on related windows:
l Edit Policy Mapping Configuration Window
481 of 805
Column Definitions
482 of 805
Column Definitions
Add Button
Use this button to open the New ExtremeControl Profile window, where you can
add an ExtremeControl profile.
Edit Button
Use this button to open the Edit ExtremeControl Profile window, where you can
edit an existing ExtremeControl profile.
Delete Button
Use this button to add an ExtremeControl profile.
The Access Control Profiles table includes the following columns:
Name
The name of the ExtremeControl profile.
Accept Policy
The Accept policy defined for this profile. An Accept policy is applied to an end-
system when
l an end-system has been authorized locally by the ExtremeControl engine
and has passed an assessment (if assessment in enabled).
l authentication is configured to replace the attributes returned from the
RADIUS server with the Accept policy.
NOTE: If your Accept policy is "Use User/Host LDAP Policy Mappings," an Accept Policy will be
assigned, based on the end-system information in the LDAP database and the LDAP
Policy Mappings configured in the Authentication Mapping.
Reject Policy
Indicates whether all authentication requests are rejected.
Failsafe Policy
The Failsafe policy defined for this profile. A Failsafe policy is applied to an end-
system if the end-system's IP address cannot be determined from its MAC address,
or if there has been a scanning error and a scan of the end-system could not take
place.
Assessment Configuration
The assessment configuration defined for this profile. The configuration define the
assessment requirements for end-systems
Assessment Interval
If assessment is required, this defines the interval between required assessments
for an end-system.
483 of 805
Column Definitions
Quarantine Policy
The Quarantine policy defined for this profile. A Quarantine policy is applied to an
end-system if the end-system fails an assessment.
Assessment Policy
The Assessment policy defined for this profile. An Assessment policy is applied to
an end-system while it is being assessed.
Hide Assessment/Remediation Details
Denotes whether the option to hide assessment or remediation information on the
Remediation Web Page has been selected.
Related Information
For information on related windows:
l New/Edit ExtremeControl Profile Window
484 of 805
Column Definitions
To create a new profile, click the Add button in the Manage ExtremeControl Profiles
window. To edit an existing profile, select a profile in the Manage ExtremeControl
Profiles window and click the Edit button or select it from the left-panel.
485 of 805
Authorization
Name
Enter a name for a new profile. If you are editing a profile, the name of the profile is
displayed and cannot be edited. To change the name of a profile, right-click on the
profile name in the ExtremeControl Profiles left-hand panel navigation tree and
select Rename from the menu.
Reject Authentication Requests
If you select this checkbox, all authentication requests are rejected.
Authorization
Accept Policy
Use the drop-down list to select the Accept policy you want to use in this
ExtremeControl profile. An Accept policy is applied to an end-system when:
l an end-system has been authorized locally (MAC authentication) by the
ExtremeControl engine and has passed an assessment (if assessment in
enabled).
l you have selected the Replace RADIUS Attributes with Accept Policy
option.
If you select "No Policy," then the ExtremeControl engine does not include a Filter
ID or VLAN Tunnel Attribute in the RADIUS attributes returned to the switch, and
486 of 805
Authorization
the default role configured on the port is assigned to the end-system. This option is
necessary when configuring single user plus IP phone authentication supported on
C2/C3 and B2/B3 devices.
If you select "Use User/Host LDAP Policy Mappings," an Accept Policy will be
assigned, based on the end-system information in the LDAP database and the
LDAP Policy Mappings configured in the Authentication Mapping.
Replace RADIUS Attributes with Accept Policy
When this option is checked, the attributes returned from the RADIUS server are
replaced by the policy designated as the Accept policy. If the RADIUS server does
not return a Filter ID or VLAN Tunnel attribute, the Accept policy is inserted. When
this option is unchecked, the attributes returned from the RADIUS server are
forwarded back "as is" and the Accept Policy would only be used to locally
authorize MAC authentication requests. If the RADIUS server does not return a
Filter ID or VLAN Tunnel attribute, no attributes are returned to the switch.
Use Quarantine Policy
Select this checkbox if you want to specify a Quarantine policy. The Quarantine
policy is used to restrict network access for end-systems that have failed the
assessment. You must have the Enable Assessment checkbox selected to
activate this checkbox.
If a Quarantine policy is not specified and you have configured RADIUS in your
AAA configuration, then the policy from the RADIUS attributes would be applied
(unless Replace RADIUS Attributes with Accept Policy has been selected, in
which case the Accept policy would be used.) If Authorize Authentication
Requests Locally has been selected in your AAA configuration, then the Accept
policy would be applied to those end-systems that are authorized locally. This
allows an end-system onto the network with its usual network access even though
the end-system failed the assessment.
Use Failsafe Policy on Error
Select this checkbox if you want to specify a Failsafe policy to be applied to an
end-system when it is in an Error connection state. An Error state results if the end-
system's IP address could not be determined from its MAC address, or if there was
a scanning error and a scan of the end-system could not take place. A Failsafe
policy should allocate a nonrestrictive set of network resources to the connecting
end-system so it can continue its work, even though an error occurred in
ExtremeControl operation.
If a Failsafe policy is not specified and you have configured RADIUS in your AAA
configuration, then the policy from the RADIUS attributes would be applied (unless
487 of 805
Assessment
Replace RADIUS Attributes with Accept Policy has been selected, in which case
the Accept policy would be used.) If Authorize Authentication Requests Locally
has been selected in your AAA configuration, then the Accept policy would be
applied to those end-systems that are authorized locally. This allows end-systems
onto the network with their usual network access when an error occurs in
ExtremeControl operation.
Assessment
Enable Assessment
Select the Enable Assessment checkbox if you want to require that end-systems
are scanned by an assessment server.
The ExtremeControl engine restarts when you enforce if Enable Assessment is selected
the first time in an ExtremeControl profile. The ExtremeControl engine also restarts when
you enforce when Enable Assessment is deselected for all ExtremeControl profiles.
Assessment Configuration
Use the drop-down list to select the assessment configuration you would like to
use in this ExtremeControl Profile. Use the Edit button to add a new assessment
configuration or edit a configuration, if needed. Once an assessment configuration
has been created, it becomes available for selection in the list.
Assessment Interval
Enter an assessment interval that defines the interval between required
assessments:
l Minutes - 30 to 120
l Hours - 1 to 48
l Days - 1 to 31
l Weeks - 1 to 52
l None
488 of 805
Assessment
Related Information
For information on related windows:
l Manage Identity and Access Profiles Window
l Manage Assessment Settings Window
l Edit Assessment Configuration Window
489 of 805
Assessment
490 of 805
Assessment
491 of 805
Assessment
Name
The name of the assessment configuration. This is the name that is entered when
you add an assessment configuration in the Edit Assessment Configuration
window.
Scoring Override Config
The scoring override configuration for this assessment configuration. The scoring
override configuration lets you override the default scoring assigned by the
assessment server to a particular assessment test ID.
Risk Level Config
The risk level configuration for this assessment configuration. The risk level
configuration determines what risk level is assigned to an end-system (high,
medium, or low) based on the end-system's health result details score.
Test Sets
The test sets that runs for this assessment configuration. Test sets define which
type of assessment to launch against the end-system, what parameters to pass to
the assessment server, and what assessment server resources to use.
492 of 805
Assessment
Related Information
For information on related windows:
l Edit Assessment Configuration
493 of 805
Accessing the Portal Configuration
Network Settings
Use this panel to configure common network web page settings that are shared by both
the Assessment / Remediation and the Registration portal web pages.
Administration
Use this panel to configure settings for the Registration Administration web page and
grant access to the page for administrators and sponsors.
494 of 805
Default Portal Configuration
Website Configuration
Use this tab to configure the common settings used by the different registration web
pages, including selecting guest access, authentication settings, and whether
assessment and remediation is supported.
495 of 805
External Captive Portal
Authenticated Registration
Authenticated Registration provides a way for existing corporate end users to access the
network on end-systems that don't run 802.1X (such as Linux systems) by requiring them
to authenticate to the network using the registration web page. After successful
registration, the end-system is permitted access until the registration expires or is
administratively revoked.
Assessment / Remediation
Use this panel to configure settings for the Assessment / Remediation portal web page.
Related Information
l Portal Configuration Network Settings
l Portal Configuration Administration
l Portal Configuration Look and Feel
l Portal Configuration Guest Access
l Portal Configuration Guest Registration
l Portal Configuration Authentication
l Portal Configuration Assessment / Remediation
l Portal Configuration Website Configuration
Use this panel to configure common network web page settings that are shared by both
the Assessment / Remediation and the Registration portal web pages.
496 of 805
Portal Configuration Network Settings
497 of 805
Portal Configuration Network Settings
NOTE: If using the portal for an ExtremeControl Advanced Location, all portal
configurations are inherited from the ExtremeControl base portal.
Redirection
There are three Redirection options that specify where the end user is redirected
following successful registration or remediation, when the end user is allowed on
498 of 805
Portal Configuration Administration
the network:
l To URL — This option lets you specify the URL for the web page where the
end user is redirected. When selected, the Destination field displays,
allowing you to indicate the URL of the web page.
l Disabled — This option disables redirection. The end user stays on the same
web page where they were accepted onto the network.
l To User's Requested URL — This option redirects the end user to the web
page they originally requested when they connected to the network.
Related Information
l Portal Configuration Overview
Administration
Use this panel to configure settings for the Registration Administration web page and
grant access to the page for administrators and sponsors.
499 of 805
Portal Configuration Administration
500 of 805
Portal Configuration Website Configuration
Images window for your selection. To add a new image, access the Look & Feel
panel.
Limit Sponsor's View to Own Users
Select this checkbox if you want to limit a sponsor's view to only the users they
have sponsored. This option is valid only if you configure LDAP or RADIUS
authentication of your sponsors. If you select this checkbox, you must enter the
LDAP Email Address Attribute Name or RADIUS Email Address Attribute Name
so a sponsor's login name can be matched to their email address, and only the
registered users for that sponsor are displayed.
Related Information
l Portal Configuration Overview
Use this tab to configure the common settings used by the different registration web
pages, including selecting guest access, authentication settings, and whether
assessment and remediation is supported. The options selected in this panel change the
panels displayed in the left-panel Website Configuration tree.
501 of 805
Portal Configuration Look and Feel
Guest Settings
Select the behavior of the web site for users with guest access and the level of
access to your network. For additional information, see the Guest Web Access,
Guest Registration, and Secure Guest Access sections.
Authentication Settings
Select the behavior of the web site for users with authentication credentials and
their level of access to your network. For additional information, see the
Authenticated Web Access and Authenticated Registration sections.
Enable Survivable Registration
This feature provides temporary Registration for unregistered end-systems when
the Extreme Management Center server is unreachable. If you select this
checkbox, unregistered users that try to register while the Extreme Management
Center server is unreachable are redirected to the Registration web page. After
entering the required information, users are assigned the Failsafe policy and
allowed on the network. Once the connection to the Extreme Management Center
server is reestablished, the users are reassigned the Unregistered policy and
forced to re-register. If you enable Survivable Registration, make sure that the
Failsafe policy provides the appropriate network services for unregistered users.
Assessment/Remediation
Allows you to configure the behavior of the Assessment/Remediation web portal.
Related Information
l Portal Configuration Overview
Use this panel to configure common web page settings shared by both the
Assessment/Remediation and the Registration portal web pages.
502 of 805
Portal Configuration Look and Feel
503 of 805
Portal Configuration Look and Feel
image is configured as the Extreme Networks logo acting as a link to the Extreme
Networks website. Text entered in this window can be formatted in HTML.
Footer
Click on the Edit button to open a window where you can configure the footer
displayed at the bottom of all portal web pages. By default, the footer is configured
with generalized information concerning an organization. Change the example text
in this section to customize the footer to your own organization. Text entered in this
window can be formatted in HTML.
Helpdesk Information
Click on the Edit button to open a window where you can configure the Helpdesk
contact information provided to end users in various scenarios during the
assessment/remediation and registration process (e.g. an end-system exceeded
the maximum number of remediation attempts). By default, this section is
configured with generalized Helpdesk information, such as contact URL, email
address, and phone number. Change the example text to customize the Helpdesk
information for your own organization. Text entered in this window can be
formatted in HTML. In addition, the entire contents of the Helpdesk Information
section are stored in the variable "HELPDESK_INFO". By entering "HELPDESK_
INFO" (without the quotation marks) in any section that accepts HTML in the
Common Page Settings (or any other settings), all information configured in this
section will be displayed in place of "HELPDESK_INFO".
Title
Click on the Edit button to open a window where you can modify the text that
appears in the title bar of the registration and web access page browser tabs. The
default page title is "Enterprise Registration."
Welcome Message
Click on the Edit button to open a window where you can modify the message
displayed to users on the menu bar of any registration or web access page. The
default welcome message is "Welcome to the Enterprise Network's Registration
Center."
User Registration Success
Click the Edit button to open a window where you can edit the message displayed
to the end user after successfully registering their end-system to the network.
Images
Using the dropdown menus, you can specify the image files used in the portal web
pages. All image files used for Assessment/Remediation and Registration portal
web pages must be defined in this list. The image files defined here are sent to the
ExtremeControlengine along with the web page configuration. Use the Add button
504 of 805
Portal Configuration Look and Feel
to select an image file to add to the list. You can select an image in the list and use
the Preview button to preview the image.
Once an image file is defined here, it is available for selection from the
configuration drop-down lists (for example, when you configure the Access
Granted Image), and may be referenced in the sections supporting HTML.
Available drop-down lists include:
l Header Image
Select the image displayed at the top of all portal web pages. The drop-
down list displays all the images defined in the Images window for your
selection. To add a new image, select Add to open the Images window.
l Favorites Icon
Select the image displayed as the Favorites icon in the web browser
tabs. The drop-down list displays all the images defined in the Images
window for your selection. To add a new image, select Add to open the
Images window.
l Access Granted Image
Select the image displayed when the end user is granted access to the
network either based on compliance with the network security policy or
upon successful registration to the network. The drop-down list displays
all the images defined in the Images window for your selection. To add
a new image, select Add to open the Images window.
l Access Denied Image
Select the image you would like displayed when the end user has been
denied access to the network. The drop-down selection list displays all
the images defined in the Images window for your selection. To add a
new image, select Manage Images to open the Images window.
l Error Image
Select the image displayed when there is a communication error with
the Extreme Management Center Server. The drop-down list displays
all the images defined in the Images window for your selection. To add
a new image, select Add to open the Images window.
505 of 805
Portal Configuration Look and Feel
l Busy Image
Select the progress bar image displayed to the end user when the web
page is busy processing a request. The drop-down list displays all the
images defined in the Images window for your selection. To add a new
image, select Add to open the Images window.
Colors
Click on the Background or Text color box corresponding to each item to open the
Choose Color window, displayed below, where you can define the colors used in
the portal web pages:
l Page — Define the background color and the color of all primary text on the
web pages.
l Header Background Color — Define the background color displayed behind
the header image.
l Menu Bar — Define the background color and text color for the menu bar.
l Menu Bar Highlight — Define the background color and text color used for the
menu bar highlights in the Administration pages.
l Footer — Define the background color and text color for the footer.
l Table Header — Define the background color and text color for the table
column headers in the Administrative web pages.
l In-Progress — Define the background color and text color for task in-progress
images.
l Hyperlink — Define the color used for hyperlinks on the web pages.
l Hyperlink Highlight — Define the color of a hyperlink when it is highlighted.
l Accent — Define the color used for accents on various parts of the web pages.
506 of 805
Portal Configuration Look and Feel
Style Sheets
Click on the Desktop or Mobile buttons to open the Edit Style Sheet window where
you can create a style sheet that adds to or overwrites the formatting styles for the
portal, or mobile version of the portal web pages, respectively.
Locales
This field lists the locales (languages) presented as options to the user in the
captive portal, in addition to the default locale.
You can also define the default locale (language), displayed to any captive portal
user unless the client locale detected from their browser matches one of the
defined supplemental locales. The list of available locales includes the current
default locale and any supplemental defined locales.
Related Information
l Portal Configuration Overview
507 of 805
Authenticated Web Access
NOTE: The Authentication and Redirection settings are shared by the Authenticated Web
Access and Authenticated Registration access types. Changing them for one type
also changes them for the other.
508 of 805
Authenticated Web Access
Authentication
AAA Configuration
This section displays the name of the AAA configuration being used by the Access
Control configuration and provides a link to open the AAA Configuration window
where you can make changes to the AAA Configuration, if desired. If the portal
configuration is shared between multiple ExtremeControl Configurations using
different AAA configurations, the different AAA configurations are listed here
(maximum of 3), allowing you to open the appropriate AAA configuration.
The section also displays the method(s) utilized for validating the credentials
entered during registration (LDAP, RADIUS, and/or a Local Password Repository)
as specified in the AAA configuration(s).
l Authentication to End-System Group — Click the Change button to open the
User Group to End-System Group Map window where you can map the
LDAP/RADIUS/Local User Group to the appropriate end-system group to
specify end user access levels. Once an end-system group has been
mapped to a user group, the icon for the end-system group changes to
display a key indicating that it is no longer available for general use. You can
509 of 805
Authenticated Web Access
use the Move Up/Move Down arrows to set the precedence order for the
mappings, allowing you to change the authentication order that takes place
during the user authenticated registration.
l Local Password Repository — If you are using a local repository,
authenticated end users are assigned to the Web Authenticated Users group.
Click the Default button to open a window where you can edit the Local
Password Repository. Multiple links may be listed if there are different
repositories associated with different AAA configurations.
Max Failed Logins
Select this checkbox to specify the maximum consecutive number of times an end
user can attempt to authenticate on an end-system and fail. You can specify a
lockout period that must elapse before the user can attempt to log in again on that
end-system.
Redirection
Redirection
There are four Redirection options that specify where the end user is redirected
following successful registration, when the end user is allowed on the network.
The option selected here overrides the Redirection option specified on the
Network Settings.
l Use Network Settings Redirection — Use the Redirection option specified on
the Network Settings panel.
l Disabled — This option disables redirection. The end user stays on the same
web page where they were accepted onto the network.
l To User's Requested URL — This option redirects the end user to the web
page they originally requested when they connected to the network.
l To URL — This option lets you specify the URL of the web page to which the
end user is redirected. This is typically the home page for the enterprise
website, for example, "http://www.ExtremeNetworks.com."
510 of 805
Authenticated Registration
login is useful for shared access end-systems running an agent because it prompts
for a login dialog and also provides a logout option. Login credentials are limited to
username/password and an Acceptable Use Policy is not displayed.
You can customize the messages in the Agent Login window using the Message
Strings Editor available in the Look and Feel Settings. Use the
agentLoginMessage string to change the message. Any changes you make in the
Message Strings Editor override the internationalized messages used in the Agent
Login window.
Authenticated Registration
Authenticated registration provides a way for existing corporate end users to access the
network on end-systems that don't run 802.1X (such as Linux systems) by requiring them
to authenticate to the network using the registration web page. After successful
registration, the end-system is permitted access until the registration expires or is
administratively revoked.
It is recommended that the Force Captive Portal HTTPS option is enabled if
authenticated registration is required for security reasons.
NOTE: If you configure both guest registration and authenticated registration for an area on your
network, the end user is presented with a choice on the registration web page whether or
not to authenticate.
511 of 805
Authenticated Registration
Authentication
These settings are shared by the Authenticated Web Access and Authenticated
Registration access types. Changing them for one type also changes them for the other.
AAA Configuration
This section displays the name of the AAA configuration being used by the Access
Control configuration and provides a link to open the AAA Configuration window
where you can make changes to the AAA Configuration, if desired. If the portal
configuration is shared between multiple ExtremeControl Configurations using
different AAA configurations, the different AAA configurations are listed here
(maximum of 3), allowing you to open the appropriate AAA configuration.
The section also displays the method(s) utilized for validating the credentials
entered during registration (LDAP, RADIUS, and/or a Local Password Repository)
as specified in the AAA configuration(s).
l Authentication to End-System Group — Click the Change button to open the
User Group to End-System Group Map window where you can map the
LDAP/RADIUS/Local User Group to the appropriate end-system group to
512 of 805
Authenticated Registration
specify end user access levels. Once an end-system group has been
mapped to a user group, the icon for the end-system group changes to
display a key indicating that it is no longer available for general use. You can
use the Move Up/Move Down arrows to set the precedence order for the
mappings, allowing you to change the authentication order that takes place
during the user authenticated registration.
l Local Password Repository — If you are using a local repository,
authenticated end users are assigned to the Web Authenticated Users group.
Click the Default button to open a window where you can edit the Local
Password Repository. Multiple links may be listed if there are different
repositories associated with different AAA configurations.
Max Failed Logins
Select this checkbox to specify the maximum consecutive number of times an end
user can attempt to authenticate on an end-system and fail. You can specify a
lockout period that must elapse before the user can attempt to log in again on that
end-system.
Redirection
These settings are shared by the Authenticated Web Access and Authenticated
Registration access types. Changing them for one type also changes them for the other.
Redirection
There are four Redirection options that specify where the end user is redirected
following successful registration, when the end user is allowed on the network.
The option selected here overrides the Redirection option specified on the
Network Settings.
l Use Network Settings Redirection — Use the Redirection option specified on
the Network Settings.
l Disabled — This option disables redirection. The end user stays on the same
web page where they were accepted onto the network.
l To User's Requested URL — This option redirects the end user to the web
page they originally requested when they connected to the network.
l To URL — This option lets you specify the URL of the web page to which the
end user is redirected. This is typically the home page for the enterprise
website, for example, "http://www.ExtremeNetworks.com."
513 of 805
Authenticated Registration
Registration Settings
The Generate Password Character and Generate Password Length settings are shared
by Authenticated Registration and Secure Guest Access.
Default Maximum Registered Devices
Specify the maximum number of MAC addresses each authenticated end user is
allowed to register on the network. If a user attempts to register an additional MAC
address that exceeds this count, an error message is displayed in the Registration
web page stating that the maximum number of MAC addresses is registered to the
network and to call the Helpdesk for further assistance. The default value for this
field is 2.
Default Expiration
Enter a value and select a unit of time to configure the amount of time before an
end user's registration automatically expires. When the registration expires, the
end user is either suspended (registration must be manually approved by
administrator/sponsor) or permanently deleted from the registration list. If a
registration is deleted, the end-user must re-enter all their required personal
information the next time they attempt to access the network. Individual registration
expiration time can also be set by the administrator/sponsor through the
Registration Administration web page.
Delete Expired Users
Select this checkbox to delete a user from the Registered users list in the
Registration Administration web page when their registration expires. If a
registration is deleted, the end-user must re-enter all their required personal
information the next time they attempt to access the network.
Delete Local Password Repository Users
If you select Delete Expired Users, then selecting this checkbox also deletes the
expired user from the local password repository.
Enable Self-Registration Portal
This checkbox allows an authenticated and registered user to be directed to a URL
(provided by an administrator) to self-register additional devices that may not
support authentication (such as Linux machines) or may not have a web browser
(such as game systems). For example, a student may register to the network using
their PC. Then, using a self-registration URL provided by the system administrator,
they can register their additional devices. Once the additional devices have been
registered, the student can access the network using those devices. The URL for
the Self Registration web page is
https://<ExtremeControlEngineIP>/self_registration. You can
514 of 805
Authenticated Registration
change the instructions displayed on this web page using the Message Strings
Editor on the Look and Feel Settings; select the selfRegIntro message string.
Enable Pre-Registration Portal
Select this checkbox to enable pre-registration functionality. With pre-registration,
guest users can be registered in advance, allowing for a more streamlined and
simple registration process when the guest user connects to the network. This is
useful in scenarios where guest users are attending a company presentation, sales
seminar, or a training session. From the drop-down list, select whether you want to
pre-register a single user (when you want to pre-register one user at time) or
multiple users (when you have a larger group of users to pre-register) or both. For
more information, see How to Configure Pre-Registration.
Pre-Registration Expiration at First Login
Select this checkbox to set the Default Expiration of a pre-registered user to begin
when the user first registers a device, instead of setting it the moment the pre-
registered user is created (added via the pre-registration administration process).
Select Enable Pre-Registration Portal to enable this option. For more information,
see How to Configure Pre-Registration.
NOTE: This option is only valid when importing a CSV file to pre-register multiple
users in the Pre-Registration Portal and not when entering information for a
single user.
Related Information
l Portal Configuration Overview
515 of 805
Authenticated Registration
Introduction Message
Click the Edit button to open a window where you can edit the introductory
message displayed to end users when gaining web access as guests. It may
include an introduction to the network and information stating that the end user is
agreeing to the Acceptable Use Policy (AUP) for the network upon registering their
device. A link to the URL that contains the full terms and conditions of the
network's AUP can be provided from this introductory message. Note that the URL
for this link must be added as an Allowed URL in the Allowed Web Sites window
accessed from the Network Settings. By configuring the introductory message with
516 of 805
Authenticated Registration
this information, end users can be held accountable for their actions on the network
in accordance with the terms and conditions set forth by the network's AUP. This
message is shared by Guest Web Access and Guest Registration. Changing it for
one access type also changes it for the other.
Customize Fields
Click the Open Editor button to open the Manage Custom Fields window where
you can manage the fields displayed in the Guest Web Access login page. These
settings are shared by Guest Web Access, Guest Registration, and Secure Guest
Access. Changing them for one access type also changes them for the others.
Redirection (Shared)
There are four Redirection options that specify where the end user is redirected
following successful access, when the end user is allowed on the network. The
option selected here overrides the Redirection option specified on the Network
Settings. This setting is shared by Guest Web Access, Guest Registration, and
Secure Guest Access. Changing it for one access type also changes it for the
others.
l Use Network Settings Redirection — Use the Redirection option specified on
the Network Settings.
l Disabled — This option disables redirection. The end user stays on the same
web page where they were accepted onto the network.
l To User's Requested URL — This option redirects the end user to the web
page they originally requested when they connected to the network.
l To URL — This option lets you specify the URL for the web page where the
end user will be redirected. This would most likely be the home page for the
enterprise website, for example, "http://www.ExtremeNetworks.com."
Registration Settings
Verification Method
User verification requires that guest end users registering to the network enter a
verification code that is sent to their email address or mobile phone (via SMS text)
before gaining network access. This ensures that network administrators have at
least one way to contact the end user. For more information and complete
instructions, see How to Configure Verification for Guest Registration.
517 of 805
Authenticated Registration
login page. The Email Address field must be set to Required in the Manage
Custom Fields window.
l SMS Gateway — The end user must enter a mobile phone number in the
Guest Web Access login page. The Phone Number field must be set to
Required in the Manage Custom Fields window.
l SMS Gateway or Email — The end user must enter a mobile phone number
or email address in the Guest Web Access login page. The Phone Number
and Email Address fields must be set to Visible in the Manage Custom Fields
window.
l SMS Text Message — The end user must enter a mobile phone number in
the Guest Web Access login page. The Phone Number field must be set to
Required in the Manage Custom Fields window.
l SMS Text or Email — The end user must enter either a mobile phone number
or email address in the Guest Web Access login page. The Phone Number
and Email Address fields must be set to Visible in the Manage Custom Fields
window.
If you have selected the "SMS Text Message" or the "SMS Text or Email"
Verification method: click the Service Providers Edit button (below the verification
method) to configure the list of mobile service providers from which end users can
select on the Registration web page. This setting allows ExtremeControl to
correctly format the email address to which to send an email. This email is then
received by the service provider and converted to an SMS text which is sent the
user. The default configuration provides lists of the major US cellular service
providers.
NOTE: Not all cellular service providers provide a way to send SMS text messages via
email.
If you have selected the "SMS Gateway" or "SMS Gateway or Email" method:
enter the SMS Gateway Email address provided by the SMS Gateway provider.
For all methods: use the Message Strings Edit button (below the verification
method) to open the Message Strings Editor and modify the registration verification
messages displayed to the user during the verification process. For example, if you
have selected Email, you need to modify the
"registrationVerificationEmailSentFromAddress" message string to be the
appropriate email address for your company.
For all methods: set the Verify Pin Characters and Verify Pin Length options to
518 of 805
Secure Guest Access
define the characteristics and length of the verification code that is sent to the guest
end user. This setting is shared by Guest Registration and Guest Web Access.
Changing it for one access type also changes it for the other.
519 of 805
Secure Guest Access
Introduction Message
Click the Edit button to open a window where you can edit the introductory
message displayed to end users when registering as guests. It may include an
introduction to the network and information stating that the end user is agreeing to
the Acceptable Use Policy (AUP) for the network upon registering their device. A
link to the URL that contains the full terms and conditions of the network's AUP can
be provided from this introductory message. Note that the URL for this link must be
added as an Allowed URL in the Allowed Web Sites window accessed from the
Network Settings. By configuring the introductory message with this information,
end users can be held accountable for their actions on the network in accordance
with the terms and conditions set forth by the network's AUP. This message is
shared by Guest Web Access and Guest Registration. Changing it for one access
type also changes it for the other.
520 of 805
Secure Guest Access
Customize Fields
Click the Open Editor button to open the Manage Custom Fields window where
you can manage the fields displayed in the Registration web page. These settings
are shared by Guest Web Access, Guest Registration, and Secure Guest Access.
Changing them for one access type also changes them for the others.
521 of 805
Secure Guest Access
NOTE: Not all cellular service providers provide a way to send SMS text messages via
email.
If you have selected the "SMS Gateway" or "SMS Gateway or Email" method:
enter the SMS Gateway Email address provided by the SMS Gateway provider.
For all methods: use the Message Strings Edit button (below the verification
method) to open the Message Strings Editor and modify the registration verification
messages displayed to the user during the verification process. For example, if you
have selected "Email", you need to modify the
"secureGuestAccessEmailSentFromAddress" message string to be the
appropriate email address for your company.
Default Expiration
Enter a value and select a unit of time to configure the amount of time before an
end user's registration automatically expires. When the registration expires, the
end user is either suspended (registration must be manually approved by
administrator/sponsor) or permanently deleted from the guest registration list. If a
registration is deleted, the end-user must re-enter all their personal information the
next time they attempt to access the network. Individual expiration time can also be
set by the sponsor.
Default Max Registered Devices
Specify the maximum number of MAC addresses each authenticated end user is
allowed to register on the network. If a user attempts to register an additional MAC
address that exceeds this count, an error message is displayed in the Registration
web page stating that the maximum number of MAC addresses has already been
registered to the network and to call the Helpdesk for further assistance. The
default value for this field is 2.
Enable Pre-Registration Portal
Use this checkbox to enable Pre-Registration functionality. With pre-registration,
guest users can be registered in advance, allowing for a more streamlined and
simple registration process when the guest user connects to the network. This can
be particularly useful in scenarios where guest users will be attending a company
presentation, sales seminar, or a training session. From the drop-down list, select
whether you want to pre-register a single user (when you want to pre-register one
user at time) or multiple users (when you have a larger group of users to pre-
register) or both. For more information, see How to Configure Pre-Registration.
522 of 805
Secure Guest Access
Sponsorship
Use this section to configure sponsorship for Secure Guest Access registration. Select
the Sponsorship Mode required. Additional settings are displayed if you select optional
or required sponsorship. For information on each option, see How to Configure
Sponsorship for Guest Registration.
With sponsored registration, end users are only allowed to register to the network when
approved by a "sponsor," an internal trusted user to the organization. Sponsorship can
provide the end user with a higher level of access than just guest access and allows the
sponsor to fine-tune the level of access for individual end users. The end user registers
and declares a sponsor's email address. The sponsor is notified and approves the
registration, and can assign an elevated level of access, if desired.
Related Information
l Portal Configuration Overview
523 of 805
Secure Guest Access
524 of 805
Secure Guest Access
525 of 805
Secure Guest Access
526 of 805
Secure Guest Access
527 of 805
Secure Guest Access
Remediation Links
This table lists the links displayed on the Assessment/Remediation web page for the
end users to use to remediate their end-system violations. There are two default
remediation links: Microsoft Support and MAC OS Support. Use this tab to add
additional links such as an internal website for patches. Links must contain a valid
protocol prefix (http://, https://, ftp://).
Click Add to open a window where you can define a new link's name and URL. Select a
link and click Edit to edit the link's information. Click Delete to remove a URL from the
table.
528 of 805
Portal Web Page URLs
To copy a custom action to another portal configuration, select the action in the table and
click the Copy To button. A window opens where you can select the portal
configurations where you want to copy the action, and whether you want it to overwrite
any existing custom remediation actions already defined for that test case ID.
529 of 805
Portal Web Page URLs
Related Information
l Portal Configuration Overview
530 of 805
Portal Web Page URLs
NOTES: If you configure both Guest Registration and Authenticated Registration for
an area on your network, the end user is presented with a choice on the
registration web page whether or not to authenticate.
The Network Settings and Look and Feel panels provide you access to
common settings that are shared by the Registration portal web page.
531 of 805
Portal Web Page URLs
Introduction Message
Click the Edit button to open a window where you can edit the introductory
message displayed to end users when registering as guests. It may include an
introduction to the network and information stating that the end user is agreeing to
the Acceptable Use Policy (AUP) for the network upon registering their device. A
link to the URL that contains the full terms and conditions of the network's AUP can
be provided from this introductory message. Note that the URL for this link must be
added as an Allowed URL in the Allowed Web Sites window accessed from the
Network Settings. By configuring the introductory message with this information,
end users can be held accountable for their actions on the network in accordance
with the terms and conditions set forth by the network's AUP. This message is
shared by Guest Web Access and Guest Registration. Changing it for one access
type also changes it for the other.
Customize Fields
Click the Open Editor button to open the Manage Custom Fields window where
you can manage the fields displayed in the Registration web page. These settings
are shared by Guest Web Access, Guest Registration, and Secure Guest Access.
Changing them for one access type also changes them for the others.
Redirection
There are four Redirection options that specify where the end user is redirected
following successful registration, when the end user is allowed on the network.
The option selected here overrides the Redirection option specified on the
532 of 805
Portal Web Page URLs
Network Settings. This setting is shared by Guest Web Access, Guest Registration,
and Secure Guest Access. Changing it for one access type also changes it for the
others.
l Use Network Settings Redirection — Use the Redirection option specified on
the Network Settings.
l Disabled — This option disables redirection. The end user stays on the same
web page where they were accepted onto the network.
l To User's Requested URL — This option redirects the end user to the web
page they originally requested when they connected to the network.
l To URL — This option lets you specify the URL for the web page where the
end user is redirected. This would most likely be the home page for the
enterprise website, for example, "http://www.ExtremeNetworks.com."
Registration Settings
Verification Method
User Verification requires that guest end users registering to the network enter a
verification code sent to their email address or mobile phone (via SMS text) before
gaining network access. This ensures that network administrators have at least
one way to contact the end user.
533 of 805
Portal Web Page URLs
Email Address fields must be set to Visible in the Manage Custom Fields
window.
If you have selected the "SMS Text Message" or the "SMS Text or Email"
Verification method: click the Service Providers link (below the verification
method) to configure the list of mobile service providers from which end users can
select on the Registration web page. This setting allows Extreme Management
Center to correctly format the email address to which to send an email. This email
is then received by the service provider and converted to an SMS text which is sent
the user. The default configuration provides lists of the major US cellular service
providers. NOTE: Not all cellular service providers provide a way to send SMS text
messages via email.
If you have selected the "SMS Gateway" or "SMS Gateway or Email" method:
enter the SMS Gateway Email address provided by the SMS Gateway provider.
For all methods: use the Message Strings link (below the verification method) to
open the Message Strings Editor and modify the registration verification messages
displayed to the user during the verification process. For example, if you have
selected Email, you need to modify the
"registrationVerificationEmailSentFromAddress" message string to be the
appropriate email address for your company.
For all methods: set the Verify Pin Characters and Verify Pin Length options to
define the characteristics and length of the verification code sent to the guest end
user. This setting is shared by Guest Registration and Guest Web Access.
Changing it for one access type also changes it for the other.
Default Expiration
Enter a value and select a unit of time to configure the amount of time before an
end user's registration automatically expires. When the registration expires, the
end user is either suspended (registration must be manually approved by
administrator/sponsor) or permanently deleted from the guest registration list. If a
registration is deleted, the end-user must re-enter all their personal information the
next time they attempt to access the network. Individual expiration time can also be
set by a sponsor.
Registration
The Registration checkboxes indicate the providers from which ExtremeControl
can gather registration information: Facebook, Google, Microsoft, Yahoo, and
Salesforce. You can configure these providers or configure additional OpenID
Connect providers using the Provider Registration fields.
534 of 805
Portal Web Page URLs
Sponsorship
Use this section to configure sponsorship for Guest Registration. Select the Sponsorship
Mode required. Additional settings display if you select optional or required sponsorship.
With sponsored registration, end users are only allowed to register to the network when
approved by a "sponsor," an internal trusted user to the organization. Sponsorship can
provide the end user with a higher level of access than just guest registration and allows
the sponsor to fine-tune the level of access for individual end users. The end user
registers and declares a sponsor's email address. The sponsor is notified and approves
the registration, and can assign an elevated level of access, if desired.
535 of 805
Portal Configuration Provider Registration
Related Information
l Portal Configuration Overview
The Registration Section includes a list of providers from which ExtremeControl can
gather registration information. Configure registration using these providers or configure
other OpenID Connect providers using the Provider 1 Registration and Provider 2
Registration options.
NOTE: Guest OAuth (for example, Google, Yahoo) may not support native mobile browsers and
display a “user agent” error. To access the network, use a standard browser application
(e.g. Google Chrome).
536 of 805
Portal Configuration Provider Registration
Facebook Registration
1. Select the Facebook Registration checkbox if you are implementing guest
registration using Facebook as a way to obtain end user information. In this
scenario, the Guest Registration portal provides the end user with an option to log
into Facebook in order to complete the registration process.
2. Enter the Facebook App ID – When you create an application you are given a
Facebook App ID to enter here.
3. Enter the Facebook App Secret – When you create an application you are given a
Facebook App Secret to enter here.
4. Enter the Facebook Redirect URI – This information allows you to configure the
provider as fb_oauth.
5. Press OK to save your changes.
Google Registration
1. Select the Google Registration checkbox if you are implementing guest registration
using Google as a way to obtain end user information. In this scenario, the Guest
537 of 805
Portal Configuration Provider Registration
Registration portal provides the end user with an option to log into Google in order
to complete the registration process.
2. Enter the Google Discovery URI – (a benefit of Open ID Connect) - This url gives
you access to all the end-points you need to complete authorizations of user data.
3. Enter the Google App ID – When you create an application you are given a Google
App ID to enter here.
4. Enter the Google App Secret – When you create an application you are given a
Google App Secret to enter here.
5. Enter the Google Redirect URI – This information allows you to configure the
provider as google_oauth.
6. Press OK to save your changes.
Microsoft Registration
1. Select the Microsoft Registration checkbox if you are implementing guest
registration using Microsoft as a way to obtain end user information. In this
scenario, the Guest Registration portal provides the end user with an option to log
into Microsoft in order to complete the registration process.
2. Enter the Microsoft Discovery URI – (a benefit of Open ID Connect) - This url gives
you access to all the end-points you need to complete authorizations of user data.
3. Enter the Microsoft App ID – When you create an application you are given a
Microsoft App ID to enter here.
4. Enter the Microsoft App Secret – When you create an application you are given a
Microsoft App Secret to enter here.
5. Enter the Microsoft Redirect URI – This information allows you to configure the
provider as ms_oauth.
6. Press OK to save your changes.
Yahoo Registration
1. Select the Yahoo Registration checkbox if you are implementing guest registration
using Yahoo as a way to obtain end user information. In this scenario, the Guest
Registration portal provides the end user with an option to log into Yahoo in order
to complete the registration process.
2. Enter the Yahoo Discovery URI – (a benefit of Open ID Connect) - This url gives
you access to all the end-points you need to complete authorizations of user data.
538 of 805
Portal Configuration Provider Registration
3. Enter the Yahoo App ID – When you create an application you are given a Yahoo
App ID to enter here.
4. Enter the Yahoo App Secret – When you create an application you are given a
Yahoo App Secret to enter here.
5. Enter the Yahoo Redirect URI – This information allows you to configure the
provider as yahoo_oauth.
6. Press OK to save your changes.
Salesforce Registration
1. Select the Salesforce Registration checkbox if you are implementing guest
registration using Salesforce as a way to obtain end user information. In this
scenario, the Guest Registration portal provides the end user with an option to log
into Salesforce in order to complete the registration process.
2. Enter the Salesforce Discovery URI – (a benefit of Open ID Connect) - This url
gives you access to all the end-points you need to complete authorizations of user
data.
3. Enter the Salesforce App ID – When you create an application you are given a
Salesforce App ID to enter here.
4. Enter the Salesforce App Secret – When you create an application you are given a
Salesforce App Secret to enter here.
5. Enter the Salesforce Redirect URI – This information allows you to configure the
provider as salesforce_oauth.
6. Press OK to save your changes.
539 of 805
Portal Configuration Provider Registration
5. Provider 1 Image – You can add an image or a logo by selecting New from the
drop-down list. Drag and drop a file or select a file using the browser to add an
image for this provider.
6. Provider 1 Text – Press the Text button to open the Localized Message String
Editor window. Use the box to add text. Press OK to save your changes.
7. Provider 1 Redirect URI - This information allows you to configure the provider as
genprovider_oauth.
The Enterprise Registration Center will include logos buttons for providers in Register as
Guest panel. Click each logo to be redirected to the provider's website for user
authentication. You will then be redirected back to complete Open ID access
authorization.
Related Information
l Portal Configuration Overview
540 of 805
Portal Configuration Provider Registration
Portal Configurations
The Portal Configurations panel in the Control > ExtremeControl tab lets you view and
edit all the portal configurations defined in Extreme Management Center.
To access the Portal Configurations panel, select ExtremeControl Configurations >
Portal from the left-menu tree. If you expand the Portal tree, the Default portal
configuration plus any other configurations you have defined are displayed.
Related Information
l Portal Configuration
l AAA Configuration
l ExtremeControl Configuration Rules
541 of 805
Portal Configuration Provider Registration
542 of 805
Portal Configuration Provider Registration
For each field, use the drop-down list to select whether the field is:
l Visible - the field is displayed in the login/registration web page for the end user. If
you want the field information to be required (the end user must enter the
information), select the "Required" checkbox.
l Not Visible - the field is not displayed in the login/registration web page for the end
user.
l Admin Only - the field is visible to network administrators only, in the Add/Edit
User web page accessed from the Registration System Administration web page.
The end user is not able to see or edit the field.
543 of 805
Portal Configuration Provider Registration
NOTES: For Guest Registration and Guest Web Access: If you are configuring a Verification
Method, the Email Address field and/or the Phone Number field are required (depending
on the verification method you have selected) and must be set to Visible/Required. For
more information, see How to Configure Verification for Guest Access Registration.
For Secure Guest Access: The Credential Delivery method requires the Email Address
field and/or the Phone Number field (depending on the delivery method you have
selected) to be set to Visible/Required. For more information, see Credential Delivery
Method in the Edit Portal Configuration panel.
For Facebook Registration: Only the First Name, Last Name, and Email Address fields are
filled using Facebook data. These fields and the Acceptable Use Policy (AUP) option are
the only fields that apply to Facebook registration. If the display AUP option is selected, the
captive portal verifies that the AUP is acknowledged before redirecting the user to
Facebook.
Use the Custom fields to add additional fields to the login/registration web page. Set the
field to Visible, and then add the text to display by adding a display string. Here are
some examples of how to use custom fields:
l In a higher education environment a custom field display string may be set to
"Student ID Number" or "Dorm Room Number" to record additional information
about students registering to the network.
l In a corporate environment, a custom field display string may be set to "Company
Name" to obtain information about organization to which a partner or guest
belongs. Or, you might want the end user to enter a device description, such as an
asset tag number.
l In a convention deployment, the field may be set to "Booth Number" to record the
booth to which a registering end-system is associated.
Select the Acceptable Use Policy checkbox if you would like the web page to display
your organization's Acceptable Use Policy (AUP) and click the Edit button to open a
window where you can add the AUP text.
NOTE: The Pre-Registration web page always displays the First Name and Last Name fields even
if they are not selected as visible/required in the Manage Custom Fields window. If they are
selected as required, they are displayed as required on the Pre-Registration web page,
otherwise they are displayed as optional. This is because it is important to prompt for a first
and last name to be included on the pre-registration voucher printed out.
Related Information
l Edit Portal Configuration Panel
544 of 805
Portal Configuration Provider Registration
Keywords
The Custom Arguments field is used to specify the arguments passed to a program.
Each argument is delimited by spaces. An argument can be a literal, passed to the
program exactly as typed, or a variable, specified as $keyword. A group of literals and
variables can be combined into a single argument by using double quotes. The value
"all" is a special value that tells Extreme Management Center to pass all variable values
to the program as individual arguments. See below for a list of available keywords, along
with their definitions.
Keyword Definitions
There are certain "keywords" that you can use in your email, syslog, and trap messages
to provide specific information. These $keywords are replaced with information from the
notification when the notification action is executed.
Following is a list of available keywords for ExtremeControl notifications, along with the
value the keyword return. The keywords are organized according to the notification type
they pertain to (End-System, Registration, Health Result, User Group, or End-System
Group), and can only be used when that specific type of notification action is being
edited. The Default keywords can be used with any notification type.
545 of 805
Portal Configuration Provider Registration
546 of 805
Portal Configuration Provider Registration
547 of 805
Portal Configuration Provider Registration
548 of 805
Portal Configuration Provider Registration
549 of 805
Portal Configuration Provider Registration
550 of 805
Portal Configuration Provider Registration
551 of 805
Portal Configuration Provider Registration
552 of 805
Portal Configuration Provider Registration
553 of 805
Portal Configuration Provider Registration
Related Information
For information on related windows:
l ExtremeControl Options Panel
554 of 805
Allowed URLs
Allowed URLs
This tab lists the URLs that end-systems can access while the end-system is being
assessed, when the end-system is quarantined, or when the end-system is not
registered on the network. The ExtremeControl engine proxies these HTTP connections
to the allowed URLs as long as the engine is configured with an appropriate DNS
server.
Any URLs that you may have referenced in the captive portal configuration must be
entered into this tab so an end-system with restricted access to the network is permitted
to communicate to the URL. For example, a URL entered in the Helpdesk Information
section should be entered here so a quarantined end-system may access the Helpdesk
web site while quarantined.
Enter the URL you want to add to the list and click Add. URLs must be entered without
"http://www". For example, if "http://www.apple.com" is an allowed website, then enter
"apple.com" as the allowed URL.
You can use the Import button to import a file of URLs to the list. Files must be formatted
to contain one URL per line. Lines starting with "#" or "//" are ignored.
NOTE: It is not necessary to enter URLs that are accessed over secure HTTP (HTTPS). To restrict
access to these URLs, you must configure network policy to allow or disable HTTPS traffic
all together or restrict it to specific IP ranges.
When an allowed URL is added, all web pages located within the directory are also
allowed. For example, if apple.com is configured as an allowed URL, then HTTP
connections for the following URLs are also permitted:
www.apple.com/downloads
www.apple.com/downloads/macosx
555 of 805
Allowed Domains
HTTP connections to URLs located on different hosts than that of the allowed URL entry
are not permitted. These HTTP connections are redirected to the Assisted Remediation
or MAC Registration web page. Using the same example, if apple.com is configured as
an allowed URL, HTTP connections for the following URLs are not allowed:
store.apple.com
store.apple.com/download
Images on the web page may not be displayed properly if the images are served on a
separate HTTP connection at a different URL. For example, the web page
http://www.apple.com/support/downloads/ contains images downloaded
from http://images.apple.com. Therefore, if
apple.com/support/downloads/ is configured as an allowed URL, all of the text
on the web page would be displayed properly, but the images would not be displayed on
the web page unless images.apple.com is also entered as an Allowed URL.
Allowed Domains
This tab lists the domains to which end users can browse while the end-system is being
assessed, the end-system is quarantined, or when the end-system is not registered on
the network. The ExtremeControl engine proxies these HTTP connections to the
allowed domains as long as the engine is configured with an appropriate DNS server.
The higher-level domain information not explicitly specified in an allowed domain entry
are also permitted for an end-system as well as any web pages served from within the
domain. For example, if apple.com is configured as an allowed domain, then HTTP
connections for the following URLs are also permitted:
www.apple.com
www.info.apple.com
store.apple.com
store.apple.com/info
images.apple.com
www.apple.com/software
apple.com/software
HTTP connections not matching the specified domain level information in an allowed
domain entry are not permitted. These HTTP connections are redirected to the Assisted
Remediation or Registration web page. Using the same example, if apple.com is
configured as an allowed domain, HTTP connections for the following URLs are not
allowed:
www.apple2.com
store.apple-chat.com
www.msn.com
556 of 805
Allowed Domains
If multiple allowed domain entries are configured with overlapping first-level and second-
level domain information, then the allowed domain entry that is more specific takes
precedence. For example, if apple.com and store.apple.com are configured as
allowed domain entries, then the apple.com entry is effectively disabled. Therefore,
HTTP connections for the following URLs are allowed:
store.apple.com
store.apple.com/info
www.store.apple.com/info
The following HTTP connections are not allowed:
www.apple.com
www.apple.com/support
images.apple.com
The following is a list of default allowed domains that are pre-configured for
ExtremeControl remediation. These allowed domains are provided as part of the
assisted remediation assessment functionality, which allows end-users limited Internet
access to update patches, antivirus definitions, and to upgrade vulnerable software in
order to comply with the network security policy. The ExtremeControl engine proxies
traffic to these allowed domains when an end user clicks on a remediation link
presented on the violations page.
A default allowed domain should only be deleted if it is determined that a quarantined
user should not be able to access it. In some cases, you may need to add additional
URLs or domains. If a quarantined user selects a remediation link to resolve an issue
and is redirected back to the remediation web page, the domain or URL needs to be
added to provide access to that site.
557 of 805
Web Proxy Servers
Related Information
For information on related help topics:
l Edit Portal Configuration Panel
558 of 805
Web Proxy Servers
Click the down arrow in the right corner of the column header to filter and sort information
in the table, and add or remove columns from the table.
Edit Message
Select a message in the table and click this button (or double-click the message) to
open the Modify Localized Entry window where you can modify the text for the
message. Use the Next/Previous buttons in the window to cycle through all the
message strings for easy editing.
NOTE: To change the Message Key for a user-defined message, you must delete and recreate the
message using the new key.
559 of 805
Web Proxy Servers
Related Information
For information on related help topics:
l Portal Configuration
560 of 805
Web Proxy Servers
Manage Notifications
This tab in the Access Control tab lists all the notifications you create, and lets you
enable, add, edit, and test specific notification rules. Notifications allow you to create
alert actions performed when specific events or triggers take place in Extreme
Management Center. Notification actions include sending an email, creating a syslog
entry, sending an SNMP trap, and launching a custom program or script.
To access this window, expand Configuration in the left-panel and select Notifications.
ExtremeControl comes with four default notifications you can enable and use as is, or
edit.
To enable a default notification, perform the following steps:
1. Select the notification in the table and click the Edit button to open the Edit
Notification window.
2. Use the Edit Email Lists button and change the default address to an address
specific to your network.
561 of 805
Web Proxy Servers
outside.
l Send a trap if an end-system fails registration.
l Send a syslog message if an end-system reports a high risk assessment result.
l Send an email if an end-system that is reported as a stolen laptop authenticates on
the network.
l Send an email if someone logs into the network after normal work hours.
l Send an email when an end-system is added or removed from an end-system
group, such as the Blacklist end-system group or other defined end-system group.
l Send an email when a user is added or removed from a user group, such as an
Administrator or Help Desk user group.
Enabled
The checkbox indicates whether the notification is enabled. When a notification is
enabled, the defined action takes place when the trigger occurs and the conditions
are met.
Name
The name of the notification.
Type
The notification type defines the source of the event triggering the notification: End-
System Group, End-System, User Group, Health Result, or Registration.
Trigger
The trigger determines when a notification action occurs, based on filtering for a
specific event.
Action
The actions that take place when a notification is triggered.
Override Content
Specifies whether Override Content is enabled or disabled for the notification.
Notes
A short description of the notification rule. This description is created when a new
notification is added.
Related Information
For information on related windows:
l Edit Notification
562 of 805
Web Proxy Servers
563 of 805
Web Proxy Servers
Add/Edit Notification
The Add/Edit Notification window lets you edit an existing notification or create a new
one. In the window, you can enable or disable the notification, specify the notification
type and trigger, define the required conditions, and configure the actions that occur
when the notification is activated. At the bottom of the window, provide a summary
description of the notification's properties.
To create a new notification, click the Add button on the Notifications tab. To edit a
notification, select a notification on the Notifications tab and click the Edit button.
564 of 805
Web Proxy Servers
Enable
Select the checkbox to enable the notification. When a notification is enabled, then
the defined action takes place when the trigger occurs and the conditions are met.
Name
Enter a name for the notification.
Notes
Enter notes for the notification that describe the notification action or other
notification details. This information is displayed on the Notifications tab.
Type
The notification type defines the source of the event that activates the notification.
Use the drop-down list to select one of the following notification types:
l End-System
l Captive Portal Registration
l Guest and IoT Manager Provisioning
l End-System Group
l User Group
l Health Result
Trigger
Triggers allow you to determine when a notification action occurs based on filtering
for a specific event. Use the drop-down list to select the event for which you want to
filter. The list of triggers changes according to the notification type you have
selected. Selecting "Any" or "Any Change" means that no filtering occurs.
l End-System - the actions are performed based on:
o an end-system being added, deleted, or moved
o an end-system state or a state change
o an authentication type or device type change
o a custom field change
o whether the end-system is registered
o an end-system IP address change. An event is generated when an
end-system is added with a static IP, the end-system IP changes after
IP resolution, or the end-system IP changes due to DHCP rediscover.
o when an end-system is added to a MAC-based end-system group. Note
that a notification is not generated if the end-system is already a
565 of 805
Conditions
Conditions
This section lets you define additional conditions that, in addition to the trigger,
determines when actions occur. Conditions can be used to limit the scope of events that
trigger a notification action. The list of conditions changes according to the notification
type you have selected.
Access Control Engines
Filter end-system notifications based on the engines you select here. Only end-
systems being managed by the selected engines trigger the notification actions.
Profile
End-System events are filtered based on the ExtremeControl profile assigned to
the end-system. Use the drop-down list to select the desired profile.
Device Type Group
Specify a device type group to use as a filter for the End-System, Health Result,
and Registration notification types. When the end-system's device type matches
the device type group, then the notification actions are performed.
End-System Group
Select an end-system group to use as a filter for the End-System Group notification
type. When the end-system is a member of this end-system group, then the
notification actions are performed. If you don't select this checkbox and specify a
group, then the notification is sent if any end-system group is matched.
566 of 805
Actions
Location Group
Specify a location group to use as a filter for the End-System, Health Result, and
Registration notification types. When the location where the end-system (the
source of the event) connects to the network matches the location group, then the
notification actions are performed.
Time Group
Specify a time group to use as a filter for the End-System, Health Result, and
Registration notification types. When the day and time that the end-system (the
source of the event) connects to the network matches the time group, then the
notification actions are performed.
User Group
Select a user group to use as a filter for the User Group notification type. When the
end-system is a member of this user group, then the notification actions are
performed. If you don't select this checkbox and specify a group, then the
notification is sent if any user group is matched.
Guest and IoT Manager Domain
Select the GIM Domain or Domains in which the Trigger must occur for the Actions
to be invoked.
Guest and IoT Manager Onboarding Templates
NOTE: Before you can select an onboarding template, you must select
a GIM Domain. The GIM Domain contains a list of templates.
Select the GIM Onboarding Template or Templates to which the Provisioner
performing the event defined in the Trigger must be assigned for the Actions to be
invoked.
Actions
Use the checkboxes to specify the actions you want to take place when a notification is
triggered and the conditions are met. You can test a notification by clicking the Test
button. (A notification must be saved before it can be tested.)
If an action depends on details from the triggered notification, the Test button triggers the
notification, but the action may not complete successfully.
For example, if the action is to execute a Script or Workflow, clicking the Test button may
not successfully complete the action if the script or workflow is using variables from the
notification itself because the notification does not contain the details of the variables.
567 of 805
Result
Email
Select this checkbox if you want an email sent when the notification is triggered.
Use the drop-down list to select one of your pre-defined email lists. If no lists have
been defined, the menu is empty and you can click the Edit Email Lists button to
define a list.
Syslog to Server(s)
Select this checkbox if you want to create a syslog message when the notification
is triggered. Enter the IP address or hostname for each syslog server where the
message is sent. Multiple syslog servers can be listed, separated by either a
comma or a space.
Trap Server
Select this checkbox if you want to send an SNMP trap when the notification is
triggered. Enter the IP address for a trap receiver where the trap is sent. Valid trap
receivers are systems running an SNMP Trap Service. From the Credential drop-
down list, select the appropriate SNMP credential used when sending the trap to
the trap receiver. Credentials are defined in the Profiles/Credentials tab in the
Authorization/Device Access window (Tools > Authorization/Device Access).
Execute Program
Select this checkbox to specify a custom program or script run on the Extreme
Management Center Server when the notification is triggered. In the Workflow
field, select the workflow from the drop-down list. Click the Test button to run the
workflow.
Access Control Events Workflow
Select this checkbox if you want an Access Control event workflow run when the
notification is triggered. To configure Access Control event workflows, create a
workflow on the Workflows tab and select Access Control Events in the Menus
drop-down list on the Menus tab of the Workflow Details section.
Override Content
Select this checkbox if you want to override the default content contained in the
action message. Use the Edit Content button to open the Edit Action Overrides
window, where you can change the defaults for this specific notification only.
Additionally, select the Show Keywords button in the Edit Action Overrides
window to view the keywords available for the overrides.
Result
This section summarizes the notification type, trigger, conditions, and specified actions.
568 of 805
Result
Related Information
For information on related windows:
l Notifications Tab
569 of 805
Result
NOTE: MAC Locking to a specific port on a switch is based on the port interface name (e.g. fe.5.1).
If a switch board is moved to a different slot in a chassis, or if a stack reorders itself, this
name changes and breaks the MAC Locking settings.
MAC Address
The locked MAC address.
Switch IP
The IP address of the switch on which the MAC address is locked.
Port
The port on the switch for which the MAC address is locked.
Lock to Switch and Port
Indicates whether the MAC address is locked to a specific port on the switch, and
enter the port interface name.
Failed Action
The action Extreme Management Center takes when this MAC address tries to
authenticate on a different port and/or switch:
l Reject - The authentication request is rejected.
l Use Policy - Use the drop-down list to select the policy that you want applied.
This policy must exist in the Policy tab and be enforced to the switches in
your network.
Related Information
For information on related windows:
l End-Systems Tab
570 of 805
Result
MAC to IP Mappings
Use the MAC to IP Mappings tab to view MAC to IP address mappings for devices with
statically assigned IP addresses. You can also import a file of MAC to IP mappings to
the list.
The MAC to IP mappings are sent to the ExtremeControl engines in the configuration
enforce. The ExtremeControl engines use this table to resolve IP addresses.
MAC Address
The MAC address mapped to the static IP address.
IP Address
The statically assigned IP address.
Description
A description of the mapping; for example, a description of the device with the
statically assigned IP address.
Add Button
Opens the Add MAC to IP Mapping window where you can add a new mapping
and description to the table.
Edit Button
Opens the Edit MAC to IP Mapping window where you can edit the IP address and
description for a mapping.
Delete Button
Deletes the selected MAC to IP mapping.
Import Button
Use the Import button to import a file of MAC to IP mappings to the list. In the file,
MAC to IP mappings must be listed in CSV format, with one mapping per line. For
example:
02.0A.40.0B.01.44, 122.111.45.66, description of mapping
34.34.34.44.44.48, 122.111.45.48, description of mapping
MAC addresses can be delimited with colons (:), periods (.), or dashes (-), but they
display in the table with colons. Lines starting with "#" or "//" are ignored.
571 of 805
Credentials
NOTE: To access status and diagnostic information for an ExtremeControl engine, launch the
ExtremeControl Engine administration web page by right-clicking on the ExtremeControl
engine in the left-panel tree and selecting WebView. You can also access the
administration web page using the following URL:
https://<ExtremeControlEngineIP>:8444/Admin. The default user name and password for
access to this web page is "admin/Extreme@pp." The username and password can be
changed in the Web Service Credentials field on the Credentials Tab in the Engine Setting
window.
Credentials
Use this tab to configure various parameters for your network engines including switch
configuration, web service credentials, and EAP-TLS configuration.
572 of 805
Credentials
Switch Configuration
Enter the shared secret that switches uses when communicating with ExtremeControl
engines.
Shared Secret
A string of alpha-numeric characters used to encrypt and decrypt communications
between the switch and the ExtremeControl engine. The shared secret is shown
as a string of asterisks. Click the Eye icon to reveal the Shared Secret.
RADIUS Timeout
The amount of time (in seconds) that a switch waits before re-sending a RADIUS
request to the ExtremeControl engine. The default is 15 seconds and the maximum
is 60 seconds. Note that the time specified should be long enough to allow the
ExtremeControl engine to receive a response from the RADIUS server.
573 of 805
Credentials
NOTE: Although this option allows a maximum of 60 seconds, the actual maximum time
allowed varies depending on the switch model. If a switch does not support the
timeout value specified here, then the value is not set on the switch and an error
message displays in the ExtremeControl engine log. Check your switch
documentation to verify supported values.
NOTE: When SNMP requests are redirected through the server, all SNMP timeouts are
extended by a factor of four (timeout X 4) to allow for the delays incurred by
redirecting requests through the server.
574 of 805
Network Settings
EAP-TLS Configuration
Server Private Key Passphrase
The Server Private Key Passphrase is used to encrypt the private key created
during certificate request generation of server certificates for use by
ExtremeControl engines during Local EAP-TLS Authentication. The passphrase
must be identical for all ExtremeControl engines, and must be configured properly,
or Local EAP-TLS Authentication does not operate successfully.
Network Settings
Use this tab to configure the following network services for the ExtremeControl engine:
DNS, NTP, SSH, and SNMP.
575 of 805
Network Settings
576 of 805
Network Settings
NTP Servers
A list of NTP servers. You can enter multiple servers for redundancy. Use the Up
and Down arrows to list the servers in the order they should be used.
577 of 805
Network Settings
Port
The port field allows you to configure a custom port to be used when launching
SSH to the engine. The standard default port number is 22.
Disable Remote root Access
Select this option to disable remote root access via SSH to the engine and force a
user to first log in with a real user account and then su to root (or use sudo) to
perform an action. When remote root access is allowed, there is no way to
determine who is accessing the engine. With remote root access disabled, the
/var/log/message file displays users who log in and su to root. The log messages
looks like these two examples:
sshd[19735]: Accepted password for <username> from
10.20.30.40 port 36777 ssh2
su[19762]: + pts/2 <username>-root
Enabling this option does not disable root access via the console. Do not disable
root access unless you have configured RADIUS authentication or this disables
remote access to the ExtremeControl engine.
RADIUS Authentication
This option lets you specify a centralized RADIUS server to manage user login
credentials for users that are authorized to log into the engine using SSH. Select a
primary and backup RADIUS server to use, and use the table below to create a list
of authorized RADIUS users.
Authorized Users Table
Use the toolbar buttons to create a list of users allowed to log in to the
ExtremeControlengine using SSH. You can add Local and RADIUS users and
grant the user Administrative privileges, if appropriate. A user that is granted
administrative rights can run sudo commands and commands that only a root user
would be able to run. For example, some commands that require administrative
rights to run would be:
sudo nacctl restart
sudo reboot
sudo nacdb
If a user is not granted administrative rights, they can log in, view files, and run
some commands such a ping and ls.
SNMP Configuration
The SNMP configuration section allows you to deploy SNMP credentials for the
ExtremeControl engine. The credentials can include different read/write credentials, for
578 of 805
Device Type Detection
example, the read credential can be "public" and the write credential can be "private". In
addition, basic host traps can be enabled from the ExtremeControl engine. Select the
Manage SNMP Configuration checkbox and provide the following SNMP information.
Profile
Use the drop-down list to select a device access profile (or multiple profiles) to use
for the ExtremeControl engine.
Trap Mode
Set the trap mode.
Trap Community Name
Supply the trap community name.
System Contact
Allows you to specify contact information for the person maintaining the device.
Additionally, enter a backslash "\" between contacts to create a device group in a
tiered tree structure. For example, to move the device into a device group called
"John's Devices" within a device group called "Quality Assurance Testing", enter
Quality Assurance Testing\John's Devices in this field.
System Location
The physical location of the device. Additionally, enter a backslash "\" between
locations to create a device group in a tiered tree structure. For example, to move
the device into a device group called "London" within a device group called
"Europe", enter Europe\London in this field.
579 of 805
Device Type Detection
580 of 805
Device Type Detection
581 of 805
IP Address Resolution
IP Address Resolution
The IP Address Resolution tab is used to define how and when ExtremeControl resolves
an end-system's MAC address to an IP address for the end-system. These parameters
are applicable for ExtremeControl Gateways and L2 ExtremeControl Controllers, but not
L3 ExtremeControl Controllers.
582 of 805
IP Address Resolution
Resolve IP Address
Specify when an ExtremeControl engine resolves the IP address for end-systems:
l Always - (Default) Resolve the IP address for every end-system that
ExtremeControl sees.
l Only for Assessment - Resolve the IP address for end-systems that need to
be assessed (scanned).
IP Address Resolution Timeout
Enter the maximum time an ExtremeControl engine waits trying to resolve an IP
address from an end-system's MAC address before giving up and returning the
Error state (MAC to IP Resolution Timed Out) for that end-system.
Allowed Retries on Failure
The number of attempts made to resolve the IP address after the first attempt fails.
The default setting is 2 retries, which means that ExtremeControl retries a timed-
out request two times, making a total of three attempts to resolve the IP address.
Enter the amount of delay time in seconds that ExtremeControl waits before
retrying to resolve the IP address.
Delay Between Failures
Enter the amount of time an ExtremeControl engine waits after failing to resolve an
IP address before attempting again.
DHCP Resolution Delay Time
The number of seconds an ExtremeControl engine should wait after learning about
an end-system before attempting to resolve the end-system's IP address. This
delay is used to allow the end-system to negotiate its DHCP IP address. If Port
Link Control is enabled, this delay is used after the ExtremeControl engine links
down/up the port to force the end-system to request a new IP address on the new
VLAN.
NOTE: If the delay time specified here is less than the amount of time the end-system needs
to renew its IP address, then the ExtremeControl engine may resolve the end-
system's IP address incorrectly. This is a problem when assessment is enabled and
may cause the engine to scan the incorrect IP address. Be sure to take into account
the amount of time required for an end-system to get a new IP address when setting
the delay time value.
583 of 805
IP Address Resolution
l Always - Always consider the IP address learned from a DHCP request for
an end-system's IP, after all more reliable methods have been exhausted.
l Never - Never consider an IP address learned from a DHCP request when
resolving an end-system's IP address. In a situation where the
ExtremeControl Gateway receives DHCP packets from both the client and
server, the gateway uses this IP when these packets are received during the
IP resolution process. With subsequent authentications for which there is no
additional DHCP exchange, ExtremeControl uses the enabled resolution
options to resolve the IP address but does not use any previously learned
DHCP information to resolve the IP.
l For Non-VLAN Switches Only - (Default) Only consider IP addresses learned
from DHCP request packets when the NAS switch the end-system was
authenticated for does not use VLANs for access control. The IP addresses
from request packets in a VLAN environment is always incorrect, because as
an end-system transitions through VLANs, it always requests the IP from the
previous VLAN.
Rediscover IP on DHCP Request
When this option is selected, ExtremeControl re-runs IP resolution on an
authenticated end-system if a DHCP request causes its IP address to change. In
this instance, the ExtremeControl policy applies to the new IP address and
removed from the old IP address, and assessment scans and port resolution are
not performed.
Always Use Fully Trusted DCHP IPs
When this options is selected, the ExtremeControl engine runs a DHCP table
lookup to see if DHCP IP address is fully trusted for the end-system. If the address
is fully trusted in the table, ExtremeControl resolves the IP address for the end-
system without attempting additional resolution processes. If the address is not
fully trusted or not found, the ExtremeControl engine attempts to resolve the IP
address as normal. When this option is not selected, there is no fast IP resolution
using DHCP IP packets.
Use Agent-based Assessment IPs
Specify when, if ever, an IP address reported by a connected agent could be used
when resolving an end-system's IP address. This process looks for the end-
system’s MAC address in the list of MAC addresses from known connected
agents. If an agent is connected and heartbeats during the IP Resolution process,
then ExtremeControl uses the IP address of that agent.
l Always - Always consider the IP address reported by a connected agent for
an end-system's IP, after all more reliable methods have been exhausted.
584 of 805
IP Address Resolution
585 of 805
IP Address Resolution
You can add, edit, or delete IP subnets using the toolbar buttons at the top of the
table. There is also a File Import button that lets you import a file of IP subnets; see
the File Import window for the file format that must be used.
The Global IP subnets option is used to create a global list of IP ranges used for
the purpose of IP Resolution. The IP Resolution process ignores any IP address
586 of 805
Hostname Resolution
outside the configured ranges. The checkbox is disabled unless there is at least
one subnet configured.
Hostname Resolution
The tab is used to define how and when ExtremeControl resolves an end-system's
hostname and an end-system's username. These parameters are engine for
ExtremeControl Gateways, L2 ExtremeControl Controllers, and L3 ExtremeControl
Controllers.
Hostname Resolution
Use this checkbox to enable or disable hostname resolution for ExtremeControl
engines. Hostname resolution is only performed for end-systems for which
ExtremeControl has an IP address.
DNS Hostname Resolution
This option allows the use of reverse DNS lookup on the ExtremeControl engine to
resolve an end-system's hostname. In order for this option to work, a valid DNS
server IP address must have been specified when the ExtremeControl engine was
installed. Use the DNS Timeout field to specify the amount of time in seconds that
587 of 805
Username Resolution
the ExtremeControl engine waits after making a reverse DNS lookup prior to giving
up and moving on to the next hostname resolution mechanism.
NetBIOS Hostname Resolution
This option allows the ExtremeControl engine to make a NetBIOS request to the
end-system to query the end-system for its hostname. See NetBIOS Timeout and
NetBIOS Timeout Retry Count on the Miscellaneous tab.
Kerberos Hostname Resolution
This options allows the ExtremeControl engine to do a lookup in the table of data
learned from Kerberos snooping, to resolve the end-system's host name.
DHCP Hostname Resolution
This options allows the ExtremeControl engine to do a lookup in the table of data
learned from DHCP snooping, to resolve the end-system's host name.
Username Resolution
The tab is used to define how and when ExtremeControl resolves an end-system's
hostname and an end-system's username. These parameters are engine for
ExtremeControl Gateways, L2 ExtremeControl Controllers, and L3 ExtremeControl
Controllers.
588 of 805
Reauthentication
Username Resolution
Use this checkbox to enable or disable username resolution, which allows the
ExtremeControl engine to try resolve the name of a user currently on an end-
system when the username was not part of the authentication request. MAC
authentication and L3 ExtremeControl Controller authentication are the two cases
where username resolution can currently be used.
Registration Username Resolution
This options causes ExtremeControl to use the username used for authenticated
registration or the user's full name for unauthenticated registration in the format:
Last Name, First Name.
Kerberos Username Resolution
This options allows the ExtremeControl engine to do a lookup in the table of data
learned from Kerberos snooping, to resolve the name of the user currently logged
into the end-system.
Ignored Kerberos Usernames
The table is used to define usernames for which Kerberos data is ignored. This is
useful when applications running on an end-system use a global user over the
Kerberos protocol to pass information for a program. Two known cases of this
would be Sophos Anti-Virus software and the IBM Rational ClearCase source
control system. You can add, edit, or delete entries using the toolbar buttons at the
top of the table.
Reauthentication
This tab is used to define global session-timeout behavior for L2 ExtremeControl
Controllers and ExtremeControl Gateways, and how ExtremeControl Gateways
reauthenticates end-systems on various NAS switches. This tab is not applicable for L3
ExtremeControl Controllers.
589 of 805
Reauthentication
590 of 805
Reauthentication
l Enabled for All Switches - The timeout is applied to any accepted end-
system (not considered by ExtremeControl to be unregistered) on any switch.
591 of 805
Miscellaneous
If you've deleted or edited any of the default configurations, the Restore Defaults
button restores them to their original state and add back any that are missing. Any
custom entries you added are retained unless they have the same sysObjectId as
a default configuration. Following a restore, you need to save the configurations.
Miscellaneous
Use this tab to configure various parameters for your network engines including port link
control, NetBIOS, Kerberos, and Microsoft NAP.
592 of 805
Miscellaneous
Be aware that when multiple devices are connected to a switch port where
authentication is enabled (such as an IP phone cascaded with a PC on a single
port), port link down disconnects all devices. In this scenario, you may want to
disable port link control, set the ExtremeControl profile to "Use Assessment Policy
593 of 805
Miscellaneous
During Initial Assessment Only," and set the DHCP lease time for the IP address
pools that correspond to the VLAN(s) associated to the Quarantine and
Assessment access policies to a low value (e.g. 1 minute).
This setting is ignored for ExtremeControl Controllers and EOS equipment with
multi-authentication enabled. The option must be manually disabled for third-party
environments with multi-authentication.
In the Port Down Time field, enter the amount of time in seconds that the engine
waits before linking up the port. The time must be sufficient to cause the end-
system to make the DHCP request.
In the Enable for Authentication Types field, you can enable port link control for
only specific authentication types, depending on the checkboxes you select. For
example, you can disable port link control for 802.1x, but have it enabled for MAC
authentication so that a port is only linked down when a MAC authentication
session changes VLANs.
NetBIOS
This section controls the timeout and retries that an ExtremeControl engine uses when
making NetBIOS requests for IP resolution, MAC resolution, or hostname resolution.
NetBIOS Timeout
The amount of time in seconds that an ExtremeControl engine waits for a response
to a NetBIOS request to an end-system, before giving up on that request and
retrying.
NetBIOS Timeout Retry Count
The number of times an ExtremeControl engine retries making a NetBIOS request
to an end-system, if the end-system does not respond.
Kerberos
Controls how an ExtremeControl engine deals with data it receives from Kerberos
snooping.
Allow Use of MAC Resolution for Kerberos Data Processing
When end-systems are behind a router, the ExtremeControl engine uses MAC
resolution to resolve an end-system's MAC address from its IP address. This is
because when end-systems are behind a router (not in the local network), the
Kerberos packets carry the MAC address of the router instead of the end-system.
594 of 805
Miscellaneous
This option allows you to turn off the use of MAC resolution for Kerberos
processing, if desired.
Allow Use of Data from Kerberos Request Packets
This option allows the use of data such as username and hostname, from Kerberos
request packets. The data in the request packet is provided by the user, and is not
guaranteed to be accurate, since it is not authenticated.
Reauthenticate Users on Kerberos Username Change Detected
This option causes the ExtremeControl engine to reauthenticate a user if the
username in the Kerberos packet changes.
Reset Authentication Type on Kerberos Login for MAC and IP Authentication
This option is supported for ExtremeControl deployments with inline
ExtremeControl Controllers that can capture the end user login. When a user logs
in via Kerberos, (for example, a user logs into a Windows domain,) the
ExtremeControl Controller resets the authentication type from MAC (for an L2
ExtremeControl Controller) or IP (for an L3 ExtremeControl Controller) to Kerberos.
The Kerberos authentication type can then be used by rules to give elevated
access to users that have successfully logged into a Windows domain.
Kerberos Age Out Time
This option provides a way to disable the aging out of Kerberos authentication
data. This authentication data is used by ExtremeControl to provide elevated
access to end-systems. By default, the authentication data is automatically aged
out every 12 hours. During that 12-hour period, any time the end-system
reauthenticates with ExtremeControl, the user would receive their elevated access
privileges. After the 12 hours is exceeded and the authentication data is aged out,
the end-system must log in again to get their elevated access. You can use this
option to change the age out time or disable the aging altogether. For example,
you might want to change the 12 hours to 8 hours, based on a shorter 8-hour
workday.
WARNING: Keep in mind that disabling the age out would create a potential security
hole. Elevated access is tied to the end-system, so if it isn't aged out, the
elevated access is always available. For example, if a user leaves their
laptop and someone logs them out and then logs in as a local user, that
person continues to have the elevated access privileges of the original user.
Also, a person could spoof someone else's MAC address and receive their
elevated access, if the access isn't aged out.
595 of 805
Auditing
Microsoft NAP
This section provides options related to Microsoft NAP for Windows.
Reset Authentication Type for NAP Enabled End-Systems
When this option is enabled, the ExtremeControl engine resets the authentication
type from 802.1x to MS NAP (Microsoft NAP), if the end-system authenticating is
NAP-enabled (Windows XP SP2 or higher) and the 802.1x authentication request
was proxied to a NAP-enabled server. The MS NAP (Microsoft NAP)
authentication type can then be used by rules to assign a different ExtremeControl
profile. To configure ExtremeControl to perform as it did in ExtremeControl version
3.1.x, you can create a rule that maps the MS NAP (Microsoft NAP) authentication
type to the Pass Through ExtremeControl Profile. With this profile, ExtremeControl
does not assess the end-system, and uses the NAP determination of whether or
not to quarantine a user.
Override Quarantine Policy for NAP Enabled End-Systems
This option allows ExtremeControl to replace the quarantine policy for NAP-
enabled end-systems, using the quarantine policy defined in the profile's Use
Quarantine Policy field. Be aware that when this NAP option is enabled, the Use
Quarantine Policy checkbox becomes active for all ExtremeControl profiles, even if
assessment is disabled. However, you can deselect the checkbox for an individual
profile, in which case the policy from the RADIUS attributes is applied.
Proxy NAP Attributes to Switch
This option is disabled by default. When disabled, the following attributes are not
proxied to the switch if they are present in the response from the backend RADIUS
server:
l MS-Machine-Name
l MS-Extended-Quarantine-State
l MS-RNAP-Not-Quarantine-Capable
l MS-Quarantine-State
If the option is enabled, the attributes are proxied to the switch.
Auditing
Use this tab to enable auditing of users connected to the ExtremeControl engine CLI via
SSH.
596 of 805
Auditing
Enable Auditing
Selecting the Enable Auditing option enables the Auditing Rules field, where you
can configure Extreme Management Center to store all commands entered by a
user connected to the ExtremeControl engine CLI via SSH in the engine's local
syslog file.
Auditing Rules
Remove the # symbol from the beginning of a command line to enable the
command and store user commands entered using the ExtremeControl engine
CLI.
Related Information
For information on related windows:
l Engine Settings
597 of 805
Auditing
The ExtremeControl Engine Groups panel is displayed in the right panel when you
select the ExtremeControl Engine Groups folder in the left panel. (The ExtremeControl
Engine Groups folder is only displayed if you have created engine groups.) The tab
displays a table of information about the engine groups in the folder.
Use the table options and tools to filter, sort, and customize table settings. You can
access the options by clicking the down arrow in the right corner of any column header.
Name
The name of the engine group.
ExtremeControl Configuration
The ExtremeControl Configuration currently selected for this engine group.
Portal Configuration
If your network is implementing Registration or Assisted Remediation, the Portal
Configuration that defines the branding and behavior of the website used by the
end user during the registration or remediation process.
AAA Configuration
The AAA Configuration used by this engine group.
Policy Mapping
The Default policy mapping can be viewed in the ExtremeControl Configurations
tree (under ExtremeControl Profiles) or accessed from the Edit ExtremeControl
Profile window.
Engine Settings
The Engine Settings configured for the group. Use the Edit Engine Settings
window to specify and configure engine settings.
Related Information
For information on related windows:
598 of 805
ExtremeControl Access Control Group Editor
This panel lists the various rule groups used to define the criteria for the rules used in
your ExtremeControl configuration. You can use this window to view and edit the
defined rule groups and also to add new rule groups for use in your ExtremeControl
configuration. Any changes made in this window are written immediately to the Extreme
Management Center database.
Extreme Management Center comes with system-defined rule groups. Extreme
Management Center also contains system-defined end-system groups that automatically
populate. The Assessment Warning end-system group includes end-systems that have
assessment warnings and must acknowledge them before being granted access to the
network. The Blacklist end-system group includes end-systems denied access to the
network. The other system-defined groups are populated as the end-systems register
through the Registration portal.
Select from the following rule group categories when you create a new rule group:
599 of 805
ExtremeControl Access Control Group Editor
The following buttons are included in the rule group detail table:
600 of 805
ExtremeControl Access Control Group Editor
Add
Use this button to add rule groups or to import MAC entries from a file for viewing
and assigning to various end-system groups.
Edit
Use this button to edit existing rule groups.
Copy
Use this button to copy a selected rule group.
Delete
Use this button to delete existing rule groups.
Refresh
Use this button to reload group entries in the table.
Reset
Use this button to clear the search field and any filters, and to update the data in
the table.
The following columns display in the rule group detail table:
Name
The name of the rule group.
Type
The type selected for the specific rule group; for example, an end-system group
could have a type of MAC.
Used By
The name of the Identity and Access configuration using this rule group.
Description
A description of the rule group.
Related Information
For information on related windows:
l Create Rule Window
601 of 805
ExtremeControl Access Control Group Editor
NOTE: Changes to rule groups do not require an enforce. Changes are automatically
synchronized with engines on the next status update. Changes do not affect end-systems
until the next authentication and/or assessment occurs.
To access the Add New Group window, click Add ( ) in the Device Type Groups
right panel.
Name
Enter a new name for the device type group. Once a group is created, you cannot
edit the name of the group.
602 of 805
ExtremeControl Access Control Group Editor
Description
Enter a description of the device type group.
Type
To create a new device type group, select Device Type from the drop-down list.
Click the Create button to open the Device Type Entry Editor section of the
window.
Click the Select from Existing Types button ( ) to open the Select Device Types
window from which you can choose a list of predefined entries. Click the Add
button in the Device Type Entry Editor section of the window to open the Add Entry
window.
Use this window to add a new entry by entering a device type or a wildcard, such
as Google Pixel or *pixel. Alternately, you can select a type from a list of entries
that already appear in existing device type groups from the Select Device Types
window. This window can be accessed by clicking the Select from Existing Types
button. This list allows you to multi-select entries, and each entry appears as a
separate row in the table. The list also allows you to select Unknown that matches
against any device that does not have an operating system name, either due to
failed detection or because detection hasn't happened yet.
All entries selected from the list are assigned the same description. If you would
like a separate description for each type, you need to add each entry individually.
603 of 805
ExtremeControl Access Control Group Editor
Related Information
For information on related windows:
l Create Rule Window
l Manage Rule Groups Window
604 of 805
ExtremeControl Access Control Group Editor
NOTE: Changes to rule components do not require an enforce. Changes are automatically
synchronized with engines on the next status update. Changes do not affect end-systems
until the next authentication and/or assessment occurs.
Name
Enter a new name for the end-system group. You cannot edit the name of a group.
Description
Enter a description of the end-system group. If you are using Data Center Manager
(DCM), the end-system group description contains the DCM specific settings as
key/value pairs.
605 of 805
ExtremeControl Access Control Group Editor
Type
Specify whether the end-system group be based on:
l MAC - a list of MAC addresses, MAC OUI, or MAC Masks.
l IP - a list of IP addresses or subnets.
l Hostname - a list of hostnames: exact match or wild card (for example,
*.extremenetworks.com).
l LDAP Host Group - a way to group hosts by doing an LDAP lookup on the
resolved hostname of the end-system detected on the network. Note for the
standard use with Active Directory, the Engine Settings > Hostname
Resolution must be configured to use DNS Hostname Resolution so Extreme
Management Center can resolve the Fully Qualified Domain Name. In the
LDAP configuration, you must also have the "Use Fully Qualified Domain
Name" checkbox selected.
Click Create to display the End-System Entry Editor section of the window. This section
varies depending on the Type selected.
Value
The MAC address, IP address, Hostname, or Attribute value of the end-system.
Description
The description of the end-system group.
Mode
For LDAP Host Groups, the mode option lets you specify whether to match any or
match all of the LDAP attributes listed below. You can also use "Exists" to just
check to see if a host is present in LDAP.
606 of 805
ExtremeControl Access Control Group Editor
Add Button
Click the Add button to open the Add Entry window, from which you can add an
entry to the Entry Editor section.
Edit Button
Select an entry in the Entry Editor section of the window and click the Edit button to
open the Edit Entry window, from which you can edit an existing entry.
Delete Button
Select an entry in the Entry Editor section of the window and click the Delete
button to delete an existing entry.
Save Button
Click the Save button to save the location group.
Use the Multiple MAC OUI Entries button to open a window where you can select
MAC OUI vendors.
Filter
Use the Filter functions to filter for a specific entry based on a numeric value or text.
Custom 1
This column allows you to add additional information. To add or edit custom
information, right-click on the table entry and select Edit Custom Information. You
can add information for up to four Custom columns. The columns for Custom 2,
Custom 3, and Custom 4 are hidden by default. To display these columns, click the
down arrow next to the Custom 1 column header and select Columns > Custom 2,
Custom 3, or Custom 4.
Related Information
For information on related windows:
l Create Rule Window
l Manage Rule Groups Window
607 of 805
Access Profile Tab
End-System Details
The End-System Details window provides connection state and assessment information
for a single end-system. It is launched from the End-Systems View in the Control tab, by
double-clicking any end-system in the table or selecting an end-system and then
selecting Show Details from the Tools menu.
The End-System Details window has four tabs. The Access Profile tab provides end-
system summary information. The End-System tab provides end-system connection
state information. The End-System Event tab displays end-system event information.
The Health Results tab displays end-system assessment result information.
608 of 805
Access Profile Tab
Access Type
Displays the switch IP address, port index, and port that the end-system is
connected to. Click to open a PortView for the switch in a new tab.
Top Application Flows
Lists the top five applications and flow counts for the end-system, listed in
descending order by flow count. Click to open the Applications Dashboard in a
new tab.
Device Family
Displays the end-system's operating system (OS) family (for example: Windows,
Linux, Android) and OS name. Use the device family icon to quickly determine the
end-system type. Click to open the End-System tab where you can view additional
end-system details.
Health
Displays health data from the latest scan, including risk level, total score, and last
scan time. Use the health icon to quickly determine risk level by color. Click to
open the Health Results tab where you can view additional health result
information and details.
Registration
Displays the end-system's registration state, user name, and sponsor. Click to
open the End-System tab where you can view additional registration information.
609 of 805
End-System Tab
Activity
Displays the last seen and first seen times for the end-system. Click to open the
End-System tab where you can view additional end-system details.
Location
Displays location summary information, including end-system zone membership,
access point information, engine group, and engine IP address. Click to open the
End-System tab where you can view additional location information.
Physical Device Identity
Displays the end-system's MAC address, IP address, and host name. The device
icon displays the end-system's physical device type with a small OS-based icon in
the corner. Click to open the End-System tab where you can view additional end-
system details.
End-System Tab
This tab presents detailed information on the selected end-system's connection,
authentication, and registration. Expand the sections using the arrow buttons to see
additional information.
610 of 805
End-System Events Tab
For a definition of various fields, see the column definitions included in the End-Systems
topic.
Changes to group membership do not require an enforce and will be synchronized with
engines immediately. Changes will not affect the end-system until the next
authentication or assessment occurs.
611 of 805
Health Results Tab
You can manipulate the table data in this window in several ways to customize the view
for your own needs:
l Click on the column headings to perform an ascending or descending sort on the
column data.
l Hide or display different columns by clicking on a column heading and selecting
the column options from the menu.
l Rearrange columns by dragging a column heading to the desired position.
l Filter the data in each column in the table.
Health Results
This table presents health results for all the scans performed on the end-system.
612 of 805
Health Results Tab
Risk
The overall risk level assigned to the end-system based on the health result of the
scan:
l Red - High Risk
l Orange - Medium Risk
l Yellow - Low Risk
l Green - No Risk
l Gray - Unknown
Start Scan
The date and time the scan started.
MAC Address
The end-system's MAC address.
Reason
The reason the health result was placed into the specified risk level. This is based
on the risk level configuration that was used for the assessment, for example, if
there was one or more health result detail with a score greater than 7. If the end-
system is NAP capable, then this is based on the values returned from NAP.
Summary
A list of all the test cases that were run against the device during assessment. The
test case name will be listed, or if that is not available, the test case ID will be
listed.
Test Sets
The list of test sets that were run during assessment, for example, Default Nessus,
Default Agent-less, and Default Agent-based. Test sets are defined as part of the
assessment configuration. If the end-system is NAP capable, then this column
displays Microsoft NAP indicating that NAP performed the assessment.
Total Score
The total sum of the scores for all the health details that were included as part of
the quarantine decision, followed by the actual score in parenthesis. The actual
score is what the total score would be if all the health details were included as part
of the quarantine decision. It includes all scores, including those marked
Informational and Warning. If the total score and the actual score are the same,
only one score is shown.
Top Score
The highest score received for a health detail that was included as part of the
quarantine decision. Scores that are marked as Informational or Warning are not
613 of 805
Health Results Tab
considered.
IP Address
The end-system's IP address.
End Scan
The date and time the scan ended.
Server Name
The name of the assessment server. For on-board assessment servers, the name
is determined by the name of the ExtremeControl engine. For example, if you
create an ExtremeControl engine and name it MyAccessControlengine, then the
on-board assessment server name will be listed as MyAccessControlengine as
well.
Server IP
The IP address of the assessment server. For on-board assessment servers, the IP
address is determined by the address of the ExtremeControl engine. For example,
if you create an ExtremeControl engine with an IP address of 10.20.80.8, then the
on-board assessment server IP address is listed as 10.20.80.8 as well.
Server Port
The port number on the assessment server to which the ExtremeControl engine
sends assessment requests.
Host Unreachable
Displays whether the end-system was unreachable and could not be scanned: Yes
or No.
Warning Count
The total number of health result details that are marked as Warnings.
614 of 805
Health Results Tab
Scoring Mode
The scoring mode that was used at the time the test was performed.
l Applied - The score returned by this test was included as part of the
quarantine decision.
l Informational - The score returned by this test was reported, but did not apply
toward a quarantine decision.
l Warning - The score returned by this test was only used to provide end user
assessment warnings via the Notification portal web page.
CVE ID
The CVE (Common Vulnerability and Exposures) ID assigned to the security
vulnerability or exposure. For more information on CVE IDs, refer to the following
URL: http://www.cve.mitre.org/.
Description
This column lists information about the health result detail.
Solution
A solution for the problem found in the health result detail.
Port ID
The port on the end-system that the security risk was detected on.
Protocol ID
The well-known number (ID) assigned to the IP Protocol Type.
Value
What this specific test case is testing or checking for on the end-system.
615 of 805
Buttons and Paging Toolbar
Assessment Type
The type of assessment server used in the test set.
Remediation Success
For agent-based assessment, this column lists the results of remediation attempts:
Remediation Successful, Remediation Failed, or Not Applicable.
Type
A "type" is assigned to each security risk found on a port during an assessment,
and is used to determine whether to Quarantine an end-system. Types are
configurable on the assessment agent. There are three types:
l Hole - The port is vulnerable to attack.
l Warning - The port may be vulnerable to attack.
l Note - There may be a security risk on the port.
Lets you add the selected end-system to a specific end-system or user group. After
adding an end-system to a group, any rules that have been created that involved
that group will now apply to the end-system as well. Changes to end-system group
membership do not require an enforce and will be synchronized with engines
immediately. Changes will not affect the end-system until the next authentication or
assessment occurs.
Opens the Add MAC Lock window where you can lock the MAC address of the
selected end-system to a switch or switch and port.
Opens a window where you can edit the expiration time and maximum registered
device count for the end user.
Refresh
Use the refresh button to update the data in the table.
616 of 805
Buttons and Paging Toolbar
Paging Toolbar
The paging toolbar provides four buttons that let you easily page through the table:
first, previous, next, and last page.
Reset
The reset button clears the search field and search results, clears all filters, and
refreshes the table.
Use the bookmark button to save the search, sort, and filtering options you have
currently set.
Related Information
For information on related tabs:
l End-Systems Tab
617 of 805
Buttons and Paging Toolbar
NOTE: Changes to rule components do not require an enforce. Changes are automatically
synchronized with engines on the next status update. Changes do not affect end-systems
until the next authentication and/or assessment occurs.
Name
Enter a name for a new location group. You cannot edit the name of a group.
Description
Enter a description of the location group.
Type
Select Location to create a Location group.
Click Create to display the Entry Editor section of the window. This section varies
depending on the Type selected.
618 of 805
Buttons and Paging Toolbar
Switch
The IP address of the switches added to the location.
Port/SSID
The port or port range for a wired switch or the SSIDs for a wireless switch.
AP ID
The access point identifiers for a wireless switch.
Description
The description of the location group.
Add Button
Click the Add button to open the Add Entry window, from which you can add an
entry to the Entry Editor section.
Edit Button
Select an entry in the Entry Editor section of the window and click the Edit button to
open the Edit Entry window, from which you can edit an existing entry.
Delete Button
Select an entry in the Entry Editor section of the window and click the Delete
button to delete an existing entry.
Save Button
Click the Save button to save the location group.
Related Information
For information on related windows:
619 of 805
Buttons and Paging Toolbar
620 of 805
Buttons and Paging Toolbar
NOTE: Changes to rule components do not require an enforce. Changes will be automatically
synchronized with engines on the next status update. Changes will not affect end-systems
until the next authentication and/or assessment occurs.
Name
Enter a name for a new time group. You cannot edit the name of an existing group.
If you want to change the name, you must create a new time group with a new
name and then delete the old time group.
Description
Enter a description of the time group. This description displays in the Manage Rule
Groups window.
621 of 805
Buttons and Paging Toolbar
Calendar
Use the calendar to select the desired weekly time periods. Click to select a
specific day and time, or click and drag to quickly select a time sequence or series
of days. For example, you can click on Monday at 8 AM and drag down to select
that hour for Monday through Friday. The click and drag feature makes it easy to
select an entire week or chunk of time with just one action. Right click on a
selected square to access menu options that let you select all or clear all squares,
and undo the last action. If a square is the first or last in a series, right click to
access the Refine Time Range Start/End options that let you specify hourly
increments for the start and end times.
Related Information
For information on related windows:
l Create Rule Window
l Manage Rule Groups Window
622 of 805
Buttons and Paging Toolbar
NOTE: Changes to rule components do not require an enforce. Changes are automatically
synchronized with engines on the next status update. Changes do not affect end-systems
until the next authentication and/or assessment occurs.
Name
Enter a name for a new user group. You cannot edit the name of a group.
Description
Enter a description of the user group.
Type
Select User to create an end-system group. Specify whether the user group is
based on:
l Username — a list of usernames which can be based on an exact match or a
wild card.
l LDAP User Group — a list imported from an LDAP Server, organized by
Organization Unit (OU), or a custom attribute lookup for any user or MAC
address if they match a AAA configuration entry that assigns the request a
valid LDAP Configuration.
l RADIUS User Group — a list of attributes returned by the RADIUS server.
Click Create to display the Entry Editor section of the window. This section varies
depending on the Type selected.
623 of 805
Buttons and Paging Toolbar
Match Mode
For LDAP and RADIUS user groups, the Match Mode option lets you select
whether to match any or match all of the LDAP or RADIUS User Group entries
(attribute names) listed below.
For LDAP User Groups, you can also select Exists, as the username can be used
to verify this criteria after the initial authentication (i.e., using Registration). The
Exists mode is not available for RADIUS User Groups because they cannot be
verified after an initial registration as the user credentials are not stored on the
ExtremeControl engine for re-verification.
Attribute Name
The name of the LDAP or RADIUS Attribute.
Value
The Attribute value of the user group or username.
Add Button
Click the Add button to open the Add Entry window, from which you can add an
entry to the Entry Editor section.
Edit Button
Select an entry in the Entry Editor section of the window and click the Edit button to
open the Edit Entry window, from which you can edit an existing entry.
Delete Button
Select an entry in the Entry Editor section of the window and click the Delete
button to delete an existing entry.
Tools
Use the Tools menu button to either open a window where you can select a file for
importing usernames (if you are creating username entries) or open a window
624 of 805
Buttons and Paging Toolbar
where you can configure an LDAP OU import (if you are creating an LDAP user
group).
Filter
Use the Filter functions to filter for a specific entry based on a numeric value or text.
Related Information
For information on related windows:
l Create Rule Window
l Manage Rule Groups Window
625 of 805
Buttons and Paging Toolbar
Name
Enter a name for a new user group. You cannot edit the name of a group.
Description
Enter a description of the user group.
Type
Specify the criteria on which the user group is based:
l Username - a list of usernames which can be based on an exact match or a
wild card.
l LDAP User Group - a list imported from an LDAP Server, organized by
Organization Unit (OU), or a custom attribute lookup for any user or MAC
626 of 805
Buttons and Paging Toolbar
address if they match a AAA configuration entry that assigns the request a
valid LDAP Configuration.
l RADIUS User Group - a list of attributes returned by the RADIUS server.
Match Mode
For LDAP and RADIUS user groups, the Match Mode option lets you select
whether to match any or match all of the LDAP or RADIUS User Group entries
(attribute names) listed below.
For LDAP User Groups, you can also select "Exists", since the username can be
used to verify this criteria after the initial authentication (i.e., using Registration).
The "Exists" mode is not available for RADIUS User Groups because they cannot
be verified after an initial registration as the user credentials are not stored on the
ExtremeControl engine for re-verification.
Username Entry Editor
Use the buttons to add, edit, or delete entries in the group. Usernames can be an
exact match or use wildcards.
Filter
Use the Filter functions to filter for a specific entry based on a numeric value or text.
Related Information
For information on related windows:
l Add/Edit Rule Window
l Group Editor
Switches
627 of 805
Buttons and Paging Toolbar
Switch IP Address
The switch's IP address.
Switch Nickname
The nickname assigned to the switch when it is added to the Extreme
Management Center database.
Switch Status
The current operational status of the switch, based on the Extreme Management
Center device poll. If the device poll did not update the status of a switch, and a
Verify RADIUS Configuration operation is performed on that switch, the switch
status in the Switches tab may differ from the switch status in the Verify RADIUS
Configuration window.
Switch System Name
The assigned name of the device as stored in the device's sysName MIB object.
Primary Gateway
The name and IP address of the switch's primary ExtremeControl Gateway. If load
balancing has been configured for the engine group, the Extreme Management
Center server determines the primary and secondary gateways at Enforce, and this
field displays "Determined by Load Balancer."
Secondary Gateway
The name and IP address of the switch's secondary ExtremeControl Gateway. If
load balancing has been configured for the engine group, the Extreme
Management Center server determines the primary and secondary gateways at
Enforce, and this field displays "Determined by Load Balancer."
Policy/VLAN
The RADIUS attributes included as part of the RADIUS response.
Policy Domain
The Policy Manager domain the switch is assigned to (if any). You can populate
this field by right-clicking on a switch and selecting Policy > Verify Domain. This
information does not automatically update if there are domain assignment
changes. You need to re-select the menu option to update the domain information.
628 of 805
Buttons and Paging Toolbar
629 of 805
Buttons and Paging Toolbar
Related Information
For information on related windows:
l Add Switches to an ExtremeControl Engine Group Window
l Edit Switches in ExtremeControl Engine Group Window
630 of 805
Buttons and Paging Toolbar
Use this window to change a switch's primary and secondary ExtremeControl Gateway,
and also edit other switch parameters including the switch's authentication access type
and the RADIUS attributes to send, if desired.
You can access this window by selecting an engine or engine group in the left-panel
tree. Then, in the right-panel Switches tab, select the switches you wish to edit and click
the Edit button.
Switch Type
Use the drop-down list to change the type of switch:
l Layer 2 Out-Of-Band — A switch that will do authentication on layer 2 traffic
via RADIUS to an out-of-band ExtremeControl gateway.
l Layer 2 Out-Of-Band Data Center — A switch within a data center where
virtualization and mobility are a factor. If an end-system changes location but
does not move to a different ExtremeControl engine, Extreme Management
Center removes the end-system authentication from their prior port/switch.
This allows VMs that quickly move from one server to another and then back
again to still have their location updated in Extreme Management Center,
because only one authenticated session is allowed per end-system within
Extreme Management Center.
631 of 805
Buttons and Paging Toolbar
l Layer 2 RADIUS Only — In this mode, ExtremeControl does not require any
information from the switch other than the end-system MAC address (from
Calling-Station-Id or User-Name). The NAS-Port does not need to be
specified. If the switch supports RFC 3576, you can set the Reauthentication
Behavior in the Advanced Switch Settings window. IP resolution and
reauthentication may not work in this mode.
l VPN — A VPN concentrator being used in an ExtremeControl VPN
deployment. In this case, you should specify one or more Policy Enforcement
Points below. If you do not specify a Policy Enforcement Point, then
ExtremeControl is unable to apply policies to restrict access after the user is
granted access.
Primary Gateway
Use the drop-down list to select the primary ExtremeControl Gateway for the
selected switches. If load balancing has been configured for the switch, this field is
not displayed.
Secondary Gateway
Use the drop-down list to select the secondary ExtremeControl Gateway for the
selected switches. If load balancing has been configured for the switch, this field is
not displayed.
Auth Access Type
Use the drop-down list to select the type of authentication access allowed for these
switches. This feature allows you to have one set of switches for authenticating
management access requests and a different set for authenticating network access
requests.
632 of 805
Buttons and Paging Toolbar
l Any Access — the switch can authenticate users originating from any access
type.
l Management Access — the switch can only authenticate users that have
requested management access via the console, Telnet, SSH, or HTTP, etc.
l Network Access - the switch can only authenticate users accessing the
network via the following authentication types: MAC, PAP, CHAP, and
802.1X. If RADIUS accounting is enabled, then the switch also monitors Auto
Tracking, CEP (Convergence End Point), and Switch Quarantine sessions. If
there are multiple sessions for a single end-system, the session with the
highest precedence will be displayed to provide the most accurate access
control information for the user. The ExtremeControl authentication type
precedence from highest to lowest is: Switch Quarantine, 802.1X, CHAP,
PAP, Kerberos, MAC, CEP, RADIUS Snooping, Auto Tracking.
l Monitoring - RADIUS Accounting — the switch will monitor Auto Tracking,
CEP (Convergence End Point), and Switch Quarantine sessions. Extreme
Management Center learns about these session via RADIUS accounting.
This allows Extreme Management Center to be in a listen mode, and to
display access control, location information, and identity information for end-
systems without enabling authentication on the switch. If there are multiple
sessions for a single end-system, the session with the highest precedence
displays to provide the most accurate access control information for the user.
The ExtremeControl authentication type precedence from highest to lowest
633 of 805
Buttons and Paging Toolbar
is: Switch Quarantine, 802.1X, CHAP, PAP, Kerberos, MAC, CEP, RADIUS
Snooping, Auto Tracking.
l Manual RADIUS Configuration — Extreme Management Center does not
perform any RADIUS configurations on the switch. Select this option if you
want to configure the switch manually using the Policy tab or CLI.
Virtual Router Name
Select the checkbox to enter the name of the Virtual Router. The default value for
this field is VR-Default.
WARNING: For ExtremeXOS devices only. If Extreme Management Center has not
detected and populated this field, enter the Virtual Router Name
carefully. Incorrectly entering a value in this field causes the
RADIUS configuration to fail, which is not reported when enforcing the
configuration to the switch.
634 of 805
Buttons and Paging Toolbar
Policy Domain
Use this option to assign the switch to a Policy tab domain and enforce the domain
configuration to the switch. The switch must be an Extreme Networks switch.
NOTE: Selecting -- Do Not Set -- for an ExtremeControl engine on which a Policy Domain is
configured does not unassign the Policy Domain. To unassign a Policy Domain, use
the Policy tab.
Advanced Settings
Select this button to open the Advanced Switch Settings window.
Related Information
For information on related windows:
l Switches Tab
l Add Switches to an Engine Group Window
l Advanced Switch Settings Window
Use this window to add switches to a gateway engine or engine group. The window
allows you to select one or more switches from the device tree, and set the primary and
secondary ExtremeControl Gateways for the switches. It also lets you set other
parameters including the authentication access type for the switches and the RADIUS
attributes to send.
NOTE: If desired, you can set only the primary ExtremeControl Gateway for the switches; Extreme
Management Center does not require the secondary ExtremeControl Gateway to be set. If
only the primary ExtremeControl Gateway is set, then by default that gateway uses its
primary proxy RADIUS server as a secondary direct RADIUS server to the switch. This
allows for redundancy without the requirement for a secondary ExtremeControl Gateway.
In this scenario, if contact with the ExtremeControl Gateway fails, authentication traffic
would bypass the ExtremeControl gateway, but normal authentication would continue in
the network, and still provide some security.
You can access this window by selecting an engine or engine group and clicking the
Add Switch button in the right-panel Switches tab.
635 of 805
Buttons and Paging Toolbar
Device Tree
This area displays the device tree. Expand the tree and select the switches you
want to add to the engine or engine group.
Add Device
Opens the Add Device window where you can add a device to the Extreme
Management Center database. The device is displayed in the My Network folder in
the device tree.
Switch Type
Use the drop-down list to select the type of switch you are adding:
l Layer 2 Out-Of-Band — A switch that authenticates on layer 2 traffic via
RADIUS to an out-of-band ExtremeControl gateway.
l Layer 2 Out-Of-Band Data Center — A switch within a data center where
virtualization and mobility are a factor. If an end-system changes location but
does not move to a different ExtremeControl engine, ExtremeControl
removes the end-system authentication from their prior port/switch. This
allows VMs that quickly move from one server to another and then back
again to still have their location updated in Extreme Management Center,
because only one authenticated session is allowed per end-system in
Extreme Management Center.
l Layer 2 RADIUS Only — In this mode, Extreme Management Center does not
require any information from the switch other than the end-system MAC
636 of 805
Buttons and Paging Toolbar
637 of 805
Buttons and Paging Toolbar
l Any Access - the switch can authenticate users originating from any access
type.
l Management Access - the switch can only authenticate users that have
requested management access via the console, Telnet, SSH, or HTTP, etc.
l Network Access - the switch can only authenticate users that are accessing
the network via the following authentication types: MAC, PAP, CHAP, and
802.1X. If RADIUS accounting is enabled, then the switch also monitors Auto
Tracking, CEP (Convergence End Point), and Switch Quarantine sessions. If
there are multiple sessions for a single end-system, the session with the
highest precedence displays to provide the most accurate access control
information for the user. The ExtremeControl authentication type precedence
from highest to lowest is: Switch Quarantine, 802.1X, CHAP, PAP, Kerberos,
MAC, CEP, RADIUS Snooping, Auto Tracking.
l Monitoring - RADIUS Accounting - the switch monitors Auto Tracking, CEP
(Convergence End Point), and Switch Quarantine sessions. Extreme
Management Center learns about these session via RADIUS accounting.
This allows Extreme Management Center to be in a listen mode, and to
display access control, location information, and identity information for end-
systems without enabling authentication on the switch. If there are multiple
sessions for a single end-system, the session with the highest precedence
displays to provide the most accurate access control information for the user.
The ExtremeControl authentication type precedence from highest to lowest
638 of 805
Buttons and Paging Toolbar
is: Switch Quarantine, 802.1X, CHAP, PAP, Kerberos, MAC, CEP, RADIUS
Snooping, Auto Tracking.
l Manual RADIUS Configuration - Extreme Management Center does not
perform any RADIUS configurations on the switch. Select this option if you
want to configure the switch manually using the Policy tab or CLI.
Virtual Router Name
Enter the name of the Virtual Router. The default value for this field is VR-Default.
WARNING: For ExtremeXOS devices only. If Extreme Management Center has not
detected and populated this field, enter the Virtual Router Name
carefully. Incorrectly entering a value in this field causes the
RADIUS configuration to fail, which is not reported when enforcing the
configuration to the switch.
639 of 805
Buttons and Paging Toolbar
Related Information
For information on related windows:
l Switches Tab
l Edit Switches in Engine Group Window
This window allows you to configure settings for switches that require a different
configuration than your standard switch settings set in the Engine Settings window.
You can access the window from the Add Switch to ExtremeControl Engine Group
window or from the Edit Switches in ExtremeControl Engine Group window.
640 of 805
Buttons and Paging Toolbar
Related Information
For information on related windows:
641 of 805
Buttons and Paging Toolbar
The All ExtremeControl Engines tab is displayed in the right panel when you select the
All ExtremeControl Engine tree in the left panel or when you select the ExtremeControl
Engines tab when an ExtremeControl Engine Group is selected. The panel displays a
table of information about the engines in the folder or group. Right-click an engine for a
menu of options.
Use the table options and tools to filter, sort, and customize table settings. You can
access the options by clicking the down arrow in the right corner of any column header.
NOTE: The ExtremeControl Engine administration web page allows you to access status and
diagnostic information for an ExtremeControl engine. Access the administration web page
using the following URL: https://ExtremeControlEngineIP:8444/Admin. The default user
name and password for access to this web page is "admin/Extreme@pp."
Name
The name of the ExtremeControl engine (assigned when the engine is created).
IP Address
The ExtremeControl engine's IP address.
Engine Type
The ExtremeControl engine type: ExtremeControl Gateway, ExtremeControl Layer
2 (L2) Controller, or ExtremeControl Layer 3 (L3) Controller.
Primary Count
The number of switches for which the ExtremeControl engine is the primary
engine.
642 of 805
Buttons and Paging Toolbar
Secondary Count
The number of switches for which the ExtremeControl engine is the secondary
engine.
Model
The ExtremeControl engine's model number.
Version
The ExtremeControl engine's version number.
CPU Load (0-100%)
The percentage of the engine's CPU currently being used. This value gives you an
indication of how busy the engine is and helps you determine if your network
needs additional engines, or if you need to change your network configuration so
that the load is more evenly distributed among your existing engines.
Memory Used
The amount of memory used by the engine.
Memory Available
The amount of memory available on the engine.
Connected Agents
The number of assessment agents connected to the engine.
Capacity
The engine's current capacity, which is the number of end-systems that have
authenticated within the last 24 hours out of the maximum number of authenticating
end-systems supported for the engine.
Related Information
For information on related windows:
l End-Systems Tab
643 of 805
Credentials
l Credentials Tab
l Network Tab
l Auditing Tab
NOTE: To access status and diagnostic information for an ExtremeControl engine, launch the
ExtremeControl Engine administration web page by using the following URL:
https://<ExtremeControlEngineIP>:8444/Admin. The default user name and password for
access to this web page is "admin/Extreme@pp." The username and password can be
changed in the Web Service Credentials field on the Credentials Tab in the Engine
Settings window.
Credentials
Use this tab to configure various parameters for your network engines including switch
configuration, web service credentials, and EAP-TLS configuration.
644 of 805
Credentials
Switch Configuration
Enter the shared secret that switches uses when communicating with ExtremeControl
engines.
645 of 805
Credentials
Shared Secret
A string of alpha-numeric characters used to encrypt and decrypt communications
between the switch and the ExtremeControl engine. The shared secret is shown
as a string of asterisks. Click the Eye icon to view the shared secret.
RADIUS Timeout
The amount of time (in seconds) that a switch waits before re-sending a RADIUS
request to the ExtremeControl engine. The default is 15 seconds and the maximum
is 60 seconds.
NOTES: The time specified should be long enough to allow the ExtremeControl engine to
receive a response from the RADIUS server.
Although this option allows a maximum of 60 seconds, the actual maximum time
allowed varies depending on the switch model. If a switch does not support the
timeout value specified here, then the value is not set on the switch and an error
message displays in the ExtremeControl engine log. Check your switch
documentation to verify supported values.
646 of 805
Network Settings
EAP-TLS Configuration
Server Private Key Passphrase
The Server Private Key Passphrase is used to encrypt the private key created
during certificate request generation of server certificates for use by
ExtremeControl engines during Local EAP-TLS Authentication. The passphrase
must be identical for all ExtremeControl engines, and must be configured properly,
or Local EAP-TLS Authentication does not operate successfully.
Network Settings
Use this tab to configure the following network services for the ExtremeControl engine:
DNS, NTP, SSH, and SNMP.
647 of 805
Network Settings
Search Domains
A list of search domains used by the ExtremeControl engine when doing lookups by
hostname. When an attempt to resolve a hostname is made, these domain suffixes
are appended to the hostname of the device. For example, if someone does a ping to
server1, NAC Manager appends the search domains in an attempt to resolve the
name: server1.domain1 server1.domain2, and so on.
DNS Servers
A list of DNS servers the ExtremeControl engine sends DNS lookups to for name
resolution. The list is used by both hostname resolution and by the DNS proxy. You
can enter multiple servers for redundancy. Use the Up and Down arrows to list the
servers in the order they should be used.
648 of 805
Network Settings
Time Zone
Select the appropriate time zone. This allows NAC Manager to manage all date/time
settings.
NTP Servers
A list of NTP servers. You can enter multiple servers for redundancy. Use the Up and
Down arrows to list the servers in the order they should be used.
Port
The port field allows you to configure a custom port to be used when launching SSH
to the engine. The standard default port number is 22.
649 of 805
Network Settings
RADIUS Authentication
This option lets you specify a centralized RADIUS server to manage user login
credentials for users that are authorized to log into the engine using SSH. Select a
primary and backup RADIUS server to use, and use the table below to create a list of
authorized RADIUS users.
SSH Users Table
Use the toolbar buttons to create a list of users allowed to log in to the
ExtremeControl engine using SSH. You can add Local and RADIUS users and grant
the user Administrative privileges, if appropriate. A user that is granted administrative
rights can run sudo commands and commands that only a root user would be able to
run. For example, some commands that require administrative rights to run would be:
sudo nacctl restart
sudo reboot
sudo nacdb
If a user is not granted administrative rights, they can log in, view files, and run some
commands such a ping and ls.
SNMP Configuration
The SNMP configuration section allows you to deploy SNMP credentials for the
ExtremeControl engine. The credentials can include different read/write credentials, for
example, the read credential can be "public" and the write credential can be "private". In
addition, basic host traps can be enabled from the ExtremeControl engine.
Select the Manage SNMP Configuration checkbox and provide the following SSH
information.
650 of 805
Auditing
Profile
Use the drop-down list to select a device access profile to use for the
ExtremeControl engine.
Trap Mode
Set the trap mode.
Trap Community Name
Supply the trap community name.
System Contact
Enter the name of the system contact.
System Location
Enter the location of the system.
Auditing
Use this tab to enable auditing of users connected to the ExtremeControl engine CLI via
SSH.
651 of 805
Auditing
Enable Auditing
Selecting the Enable Auditing option enables the Auditing Rules field, where you
can configure Extreme Management Center to store all commands entered by a
user connected to the ExtremeControl engine CLI via SSH in the engine's local
syslog file.
Auditing Rules
Remove the # symbol from the beginning of a command line to enable the
command and store user commands entered using the ExtremeControl engine
CLI.
Related Information
For information on related windows:
l All ExtremeControl Engines
652 of 805
Auditing
The window displays details of the changes you are making on the ExtremeControl
engine.
Click the Export button to export the results to a text file.
Related Information
For information on related windows:
l Access Control
l ExtremeControl Concepts
653 of 805
Auditing
General Information
This section displays general information about the ExtremeControl engine,
including its name, IP address, type (ExtremeControl Gateway or Layer 2/Layer 3
ExtremeControl Controller), the engine version, the IP address of the Extreme
Management Center Management server, and the ExtremeControl engine status.
End-System Capacity
This field lists the engine's current capacity, which is the number of end-systems
that authenticated within the last 24 hours out of the maximum number of
authenticating end-systems supported for the engine.
ExtremeControl Configuration
Displays the ExtremeControl Configuration assigned to the engine. The
ExtremeControl Configuration determines the ExtremeControl Profile assigned to
654 of 805
Auditing
655 of 805
Auditing
NOTES: If you have disabled ExtremeControl authentication processing and then enforce
with new switches, the new switches are configured to send RADIUS packets
directly to the primary and secondary RADIUS servers. These switches are
reconfigured to talk to the RADIUS proxy when you enable ExtremeControl; a
second enforce is not necessary.
The Status fields provide the current status of the ExtremeControl authentication or
assessment process. The authentication status field also includes a link to the
Verify RADIUS Configuration on Switches feature. This feature is available for
ExtremeControl Gateway engines and Layer 2 ExtremeControl Controllers, and
can be used to alert you to any RADIUS configurations that are out of sync and
could cause RADIUS authentication problems on the network.
This tab provides information about the ExtremeControl Details being used by your
ExtremeControl engines.
To access this tab, select an engine group from within the Engine Group tree in the left-
panel tree, then click the Details tab in the right panel.
656 of 805
Auditing
657 of 805
Auditing
Default Profile
The name of the Default Profile specified in the ExtremeControl Configuration. The
Default Profile serves as a "catch-all" profile for any end-system that doesn’t match
one of the rules listed in the ExtremeControl Configuration.
Registration
Whether a registration/web access feature is enabled or disabled for the
ExtremeControl Configuration.
Assessment/Remediation
Whether the assessment/remediation feature is enabled or disabled for the
ExtremeControl Configuration.
Portal Configuration
The name of the Portal Configuration specified in the ExtremeControl
Configuration. If your network is implementing Registration or Assisted
Remediation, the Portal Configuration defines the branding and behavior of the
website used by the end user during the registration or remediation process.
AAA Configuration
The name of the AAA Configuration specified in the ExtremeControl Configuration.
Load Balancing
This section allows you to configure load balancing for the engine group. Extreme
Management Center provides two different load balancing configuration options:
either ExtremeXOS/EOS firmware on S-Series and K-Series devices, or utilizing
external load balancers. Load balancing allows you to evenly distribute
authentication requests and switch configuration ownership among your
ExtremeControl gateway engines. This can be useful in ExtremeControl
deployments with a large number of switches, where manual delegation of switch
resources would be cumbersome.
658 of 805
Interface Modes
Interfaces Window
Use this Extreme Management Center window to configure the interfaces on an
ExtremeControl engine. Interface configuration allows you to separate management
traffic from end-system traffic, providing another layer of protection for sensitive data. It
also provides the ability to snoop mirrored traffic on other ports.
This window is accessed from the Control > ExtremeControl tab by selecting an
ExtremeControl engine, opening the Details tab, and clicking the Edit button in the
Interface Summary section.
Interface Modes
There are five different modes that can be configured for an interface: Management,
Registration & Remediation, Management Only, Registration & Remediation Only,
Listening Only, Advanced Configuration, and Off. The mode determines the type of traffic
allowed on the interface and the services provided by the interface.
You can configure all the interfaces on an engine; however, you cannot change the
management interface and you are only allowed to configure one interface to allow
management traffic.
659 of 805
Interface Modes
Listen Only – In this mode, the engine allows DHCP and Kerberos snooping to be
performed on the interface. No IP address or hostname can be assigned to the interface.
Advanced Configuration - This mode allows you to configure the services that are
provided by the selected interface, using the link in the Services field. This is useful for
ExtremeControl deployments in MSP or MSSP environments.
Off – The interface is disabled and not used in any way.
660 of 805
Services
Services
The Services field displays the services that are provided by the ExtremeControl engine
interface, as determined by the selected interface mode. Each mode provides a different
set of services on the interface.
If the mode is set to Advanced Configuration, the services list becomes a link that
launches an Edit window where you can select or deselect the services provided by the
interface. This granularity is useful for ExtremeControl deployments in MSP or MSSP
environments.
The following list describes the various services that are provided by the different
modes:
661 of 805
DHCP/Kerberos Snooping
DHCP/Kerberos Snooping
Use the DHCP/Kerberos Snooping option to enable or disable DHCP and Kerberos
snooping on the interface. DHCP snooping is used for IP resolution and OS detection.
Kerberos snooping is used for user name detection and elevated access.
Tagged VLANs
If the mirrored traffic includes an 802.1Q VLAN tag, then the list of VLANs to capture
must be explicitly stated in this field by entering a comma-separated list of VLAN IDs
from 1 to 4094. If the mirrored traffic is not tagged then this field can be left blank.
662 of 805
Captive Portal HTTP Mirroring
Interface
The ExtremeControl engine interface used for the static route.
Destination
The IP address used to define the subnet or individual device whose traffic is
assigned to the route.
Gateway IP
The IP address of the device where traffic matching the Network value is sent.
Metric
A number used to configure route precedence. The lower the number, the higher the
precedence.
663 of 805
Captive Portal HTTP Mirroring
664 of 805
Device Profiling Use Case
NOTE: Assessment provides the most accurate determination of device type. If the initial device
type determination is not based on assessment results, it may be less reliable. For that
reason, device type rule groups should be based on broad families of device types.
Here are some examples of how device type profiling can be used to determine network
access:
l When an end user with valid credentials logs in to the network on a registered iPad
versus a registered Windows 10 machine, they receive a lower level of network
access.
l When an end user registers a Windows machine using its MAC address, another
user cannot spoof that MAC address using a Linux system. (Device profiling does
not resolve this issue in environments with dual boot machines.)
l If an end user exports a certificate from a corporate PC to an iPad and successfully
authenticates with 802.1x, the iPad is not allowed full network access.
665 of 805
Device Profiling Use Case
3. Create a rule that assigns the Default ExtremeControl Profile to all Registered
Guests using Windows devices as shown below.
4. Create a rule that assigns the Windows10 Profile to all Windows 10 registered
devices. To do this, you need to create a new Windows 10 device type group.
a. From the ExtremeControl Configurations left-panel tree, expand the Group
Editor tree.
666 of 805
Device Profiling Use Case
b. Select Device Type Groups and click the Add button in the right panel.
c. Create a new device type group with the name Windows 10.
667 of 805
Device Profiling Use Case
f. Click the Select from Existing Types button and in the Select Device Types
window, select Windows 10.
668 of 805
Device Profiling Use Case
l. Enter the name Windows10 in the Name field and click the Create button.
o. Click Save.
5. Create a rule that assigns the Default ExtremeControl Profile to all Linux registered
devices and add the SuperLinux version to the Linux family device type. To do this,
you need to create a new Linux device type group that includes SuperLinux.
a. Create the My Linux device type group to include the devices in the Linux
device type group using the Select from Existing Types button in the Add
Entry window as discussed in step 4f above.
669 of 805
Device Profiling Use Case
b. Click the Add button and in the Add Entry window, create the SuperLinux
Device Type as shown below.
c. Click Add to save the SuperLinux device type to the My Linux device type
group.
d. Click the Save & Close button on the Add New Group window.
6. Create a rule that assigns the HP Printer Profile to all HP printers on the network.
To do this, create a new HP Printers device type group.
a. Open the Add New Group window by clicking the Add button on the
ExtremeControl Configurations > Group Editor > Device Type Groups panel.
670 of 805
Device Profiling Use Case
671 of 805
Device Profiling Use Case
i. Click Save.
7. Your ExtremeControl Configuration now contains the following rules used to
determine network access and assessment requirements based on device type.
Related Information
l Add/Edit Device Type Group Window
l Create Rule Window
l Manage Rule Groups Window
672 of 805
Device Profiling Use Case
3. Click the Add button in the AAA Configuration panel create a new AAA
Configuration.
4. Click LDAP Configuration in the left-panel tree to open the LDAP Configuration
window.
5. Create an LDAP configuration for use with end users that authenticate to the
network using the sample below as a guide. Click Save.
673 of 805
Device Profiling Use Case
674 of 805
Device Profiling Use Case
675 of 805
Device Profiling Use Case
6. Open the Add LDAP Configuration window to add another LDAP configuration that
will be used for host machines that authenticate to the network using the sample
below as a guide. Note that the only difference between the two LDAP
configurations is the User Search Attribute. Click Save.
676 of 805
Device Profiling Use Case
677 of 805
Device Profiling Use Case
678 of 805
Device Profiling Use Case
10. Create your second mapping rule to capture end user authentications using the
sample below as a guide. In the example below, *@nac2003.com captures all
users logging in to the NAC2003 active directory domain when they authenticate
with their username in the format <username>@<domain>. Be sure to select the
679 of 805
Device Profiling Use Case
11. Create your third mapping rule to capture other end user authentications using the
sample below as a guide. In the example below, NAC2003\* captures all users
logging in to the NAC2003 active directory domain when they authenticate with
their username in the format <domain>\<username>. Be sure to select the end user
LDAP Configuration you create. Click OK.
680 of 805
Device Profiling Use Case
12. In the left-panel tree, click an AAA Configuration to open the Advanced
AAA Configuration window. Use the Up and Down buttons ( ) to
move your new mappings above the "Any" mappings in the list of mappings. Click
Save.
You can configure your LDAP policy mappings and/or LDAP user groups based on the
attributes from either your host or user LDAP configurations.
Related Information
For information on related windows:
681 of 805
Device Profiling Use Case
682 of 805
Device Profiling Use Case
This password must match the password specified in the ExtremeControl Options as the
Assessment Agent Adapter Credentials (Administration > Options > Identity and Access
> Assessment Server). If you change the password on the assessment agent adapter,
change assessment agent adapter credentials in the ExtremeControl options as well, or
connection between the engine and assessment servers is lost and assessments is not
performed.
To change the assessment agent adapter password:
1. Go to the install directory for the assessment agent adapter on the assessment
server. This can be a Nessus server or the ExtremeControl engine if you are using
on-board agent-less assessment. On an ExtremeControl engine, the install
directory is /opt/nac/saint.
2. Run the sha1.sh script (on an ExtremeControl engine, the script is located in
located in /opt/nac/saint/util) using the new password as the argument. The script
produces a hash string that looks something like:
9ba2db465ff11b0bdfd188f7ee87b10fc3a145dc
3. Open the users.properties file (on an ExtremeControl engine, the file is located in
/opt/nac/saint/users.properties) and replace the existing hash string with the new
one:
admin=<new string>
4. Restart the assessment agent adapter. On an ExtremeControl engine, the
command is aglsctl restart.
Related Information
For information on related tasks:
683 of 805
Device Profiling Use Case
684 of 805
Advanced Settings
Advanced Settings
Use the Advanced Settings panel to configure advanced settings for ExtremeControl.
These settings apply to all users on all clients.
685 of 805
Assessment Server
Assessment Server
Use the Assessment Server view to provide assessment agent adapter credentials. The
options apply to all users on all clients.
The assessment agent adapter credentials are used by the ExtremeControl engine
when attempting to connect to network assessment servers, including Extreme Networks
Agent-less, Nessus, or a third-party assessment server (an assessment server that is not
supplied or supported by Extreme Management Center). The password is used by the
assessment agent adapter (installed on the assessment server) to authenticate
assessment server requests. ExtremeControl provides a default password you can
change, if desired. However, if you change the password here, you need to change the
password on the assessment agent adapter as well, or connection between the engine
and assessment agent adapter is lost and assessments are not performed. For
instructions, see How to Change the Assessment Agent Adapter Password.
1. Select Administration > Options. The Options window opens.
2. In the left-panel tree, expand the ExtremeControl folder and select Assessment
Server.
3. Specify the assessment agent adapter credentials.
4. Click Save or select the Autosave checkbox.
686 of 805
Data Persistence
Data Persistence
Use the Data Persistence view to customize how Extreme Management Center ages-out
or deletes end-systems, end-system events, and end-system health results (assessment
results) from the tables and charts in the End-Systems tab. These settings apply to all
users on all clients.
1. Select Administration > Options. The Options window opens.
2. In the left-panel tree, expand the ExtremeControl folder and select Data
Persistence.
3. In the Age End-Systems section, enter the number of days the Data Persistence
Check uses as criteria for aging end-systems. Each day, when the Data
Persistence check runs, it searches the database for end-systems Extreme
Management Center has not received an event for in the number of days specified
(90 days by default). It removes those end-systems from the tables in the End-
Systems tab.
4. If you select the Remove Associated MAC Locks and Occurrences in Groups
checkbox, the aging check also removes any MAC locks or group memberships
associated with the end-systems being removed. The Remove Associated
Registration Data checkbox is selected by default, so the aging check also
removes any registration data associated with the end-systems being removed.
5. In the End-System Event Persistence section, select the checkbox if you want
Extreme Management Center to store non-critical end-system events, which are
events caused by an end-system reauthenticating. End-system events are stored
in the database. Each day, when the Data Persistence check runs, it removes end-
system events which are older than the number of days specified (90 days by
default).
6. In the End-System Information Event section, select the checkbox if you want
Extreme Management Center to generate an ExtremeControl event when end-
system information is modified.
7. In the Health Result Persistence section, specify how many health result
(assessment results) summaries and details are saved and displayed in the End-
Systems tab for each end-system. By default, the Data Persistence check saves
the last 30 health result summaries for each end-system along with detailed
information for the last five health result summaries per end-system.
There are two additional options:
687 of 805
End-System Event Cache
l You can specify to only save the health result details for quarantined end-
systems (with the exception of agent-based health result details, which are
always saved for all end-systems).
l You can specify to save duplicate health result summaries and detail. By
default, duplicate health results obtained during a single scan interval are not
saved. For example, if the assessment interval is one week, and an end-
system is scanned five times during the week with identical assessment
results each time, the duplicate health results are not saved (with the
exception of administrative scan requests such as Force Reauth and Scan,
which are always saved). This reduces the number of health results saved to
the database. If you select this option, all duplicate results are saved.
8. Set the time you would like the Data Persistence Check to be performed each day.
9. In the Transient End-Systems section, configure the number of days to keep
transient end-systems in the database before they are deleted as part of the nightly
database cleanup task. The default value is 1 day. A value of 0 disables the
deletion of transient end-systems. Transient end-systems are Unregistered end-
systems and have not been seen for the specified number of days. End-systems
are not deleted if they are part of an End-System group or there are MAC locks
associated with them. Select the Delete Rejected End-Systems checkbox if you
want end-systems in the Rejected state to be deleted as part of the cleanup. You
can also delete transient end-systems using the Tools > End-System Operations >
Data Persistence option.
10. Click Save or select the Autosave checkbox.
688 of 805
Enforce Warning Settings
End-System Events tab.) The search is ended when any one of the parameters is
reached.
l Maximum number of days to go back when searching
l Maximum number of results to return from search
l Maximum time to spend searching for events
4. Specify the number of events to cache. Keep in mind the more events you cache,
the faster data is returned, but caching uses more memory.
5. The End-System Event Cache also keeps a secondary cache of events by MAC
address. This means a particular end-system's events can be more quickly
accessed in subsequent requests. Specify the number of MAC addresses kept in
the secondary cache. Keep in mind that the more MAC addresses you cache, the
more memory used. Also, note the secondary cache may includes events not in the
main cache, but were retrieved by scanning the database outside the cache
boundary.
6. Click Save or select the Autosave checkbox.
These settings allow you to select specific warning messages that you do not want to
have displayed in the audit results. This allows you to proceed with the Enforce without
having to acknowledge the warning message. For example, you may have an
ExtremeControl configuration that always results in one of these warning messages. By
selecting that warning here, it is ignored in future audit results and you no longer have to
acknowledge it before proceeding with the Enforce.
1. Select Administration > Options in the menu bar. The Options window opens.
2. In the left-panel tree, expand the ExtremeControl folder and select Enforce
Warnings. The Enforce Warnings view opens.
3. Select the checkbox in the Ignore column next to the warning messages you don't
689 of 805
Setting Features Options
want displayed.
4. Click Save or select the Autosave checkbox.
690 of 805
Policy Defaults
3. Use the fields to define the default content contained in notification action
messages. For a definition of each field, see the Notification Engine view Help
topic.
4. In the Advanced section, set parameters for the Action and Event queues
processed by the Notification engine.
5. Click Save or select the Autosave checkbox.
Policy Defaults
Use the Policy Defaults view to specify a default policy role for each of the four access
policies. These default policy roles display as the first selection in the drop-down lists
when you create an ExtremeControl profile. For example, if you specify an Assessment
policy called "New Assessment" as the Policy Default, then "New Assessment"
automatically displays as the first selection in the Assessment Policy drop-down list in
the New ExtremeControl Profile window.
Extreme Management Center supplies seven policy role names from which you can
select. You can add more policies in the Edit Policy Mapping window, where you can
also define policy to VLAN associations for RFC 3580-enabled switches. Once a policy
is added, it becomes available for selection in this view.
1. Select Administration > Options. The Options window opens.
2. In the left-panel tree, expand the ExtremeControl folder and select Policy Defaults.
3. Select the desired policies.
l The Accept policy is applied to an end-system when an end-system has
been authorized locally by the ExtremeControl Gateway and has passed an
assessment (if an assessment was required), or the "Replace RADIUS
Attributes with Accept Policy" option is used when authenticating the end-
system.
l The Assessment policy is applied to an end-system while it is being
assessed (scanned).
l The Failsafe policy is applied to an end-system when it is in an Error
connection state. An Error state results if the end-system's IP address could
not be determined from its MAC address, or if there was a scanning error and
an assessment of the end-system could not take place.
l The Quarantine policy is applied to an end-system if the end-system fails an
assessment.
4. Click Save or select the Autosave checkbox.
691 of 805
Status Polling and Timeout
Related Information
For information on related windows:
692 of 805
Status Polling and Timeout
l ExtremeControl Options
693 of 805
Status Polling and Timeout
NOTE: For important information on web browser requirements for end-systems connecting
through Extreme Management Center, refer to the ExtremeControl Configuration
Considerations Help topic.
This Help topic describes the specific steps that must be performed when deploying
Registration on your network. The steps vary depending on whether you are using
ExtremeControl Gateway engines and/or Layer 2 ExtremeControl Controller engines on
your network. (Registration is not supported on the Layer 3 ExtremeControl Controller
engines.)
For ExtremeControl Gateway engines you must:
l Identify the location in your network topology for the ExtremeControl Gateway
installation.
l Define the access policy for authorizing unregistered end-systems.
l Configure policy-based routing on your network.
l Configure Registration parameters in Extreme Management Center.
NOTE: It is important to add a DNS entry from the Fully Qualified Domain Name (FQDN) of the
ExtremeControl engine (both ExtremeControl Gateways and ExtremeControl Controllers)
into the DNS servers deployed on the network so that the device running Extreme
Management Center is able to resolve queries to these DNS servers. Otherwise, a short
delay occurs in returning the Registration web page to end users on the network.
694 of 805
ExtremeControl Gateway Configuration
695 of 805
ExtremeControl Gateway Configuration
Note that an end-system group may be configured to exempt certain devices from having
to register to the network, based on authentication type, MAC address, or user name. For
example, an end-system group for the MAC OUI of the printer vendor for the network can
be configured to exempt printers from having to register for network access.
696 of 805
ExtremeControl Gateway Configuration
NOTE: The Extreme Management Center Default Policy Domain includes an ExtremeControl Web
Redirect Class of Service you can use. Make sure that the ToS rewrite value is set to the
appropriate value for your network. If you already created a Class of Service with ToS
rewrite functionality for Assisted Remediation, you may use that same Class of Service for
Registration and start with step number 3 below.
1. In Extreme Management Center, access the Administration > Options tab and
select Policy Manager in the left-panel.
2. In the Default Class of Service Mode section, select Role-Based Rate
Limits/Transmit Queue Configuration to enable the Role-based Class of Service
mode on your network devices.
3. Create a new Class of Service that implements the ToS rewrite functionality:
a. Open the Class of Service left-panel (Control > Policy tab > Class of
Service).
b. Right-click the Class of Service navigation tree and select Create CoS.
The Create CoS window opens.
c. Enter a name for the class of service (for example, "Web Redirection").
d. Select OK.
e. Select the 802.1p Priority checkbox and use the drop-down list to select the
802.1p priority to associate with the class of service.
f. Select the Edit button next to the ToS field and enter a value (hex).
g. The new Class of Service is automatically saved.
4. Create an "Allow HTTP" rule to a service currently included in your Unregistered
policy role.
697 of 805
ExtremeControl Gateway Configuration
b. Enter a name for the rule (for example, "Allow HTTP") and select All Devices
in the Rule Type(s) drop-down list.
c. Select OK.
d. Select the new rule in the left-panel to display the rule details in the right
panel.
e. Enter a Description for the rule.
f. Select Enabled in the Rule Status drop-down list.
g. In the Traffic Description section, select the Edit button.
698 of 805
ExtremeControl Gateway Configuration
Now that you have defined the Unregistered policy role for EOS policy-enabled switches
and/or the VLAN assigned to unregistered end-systems for RFC 3580-compliant
switches, you must associate this policy role to the appropriate VLAN on the Access
Control tab.
1. In Extreme Management Center, access the Control > Access Control tab.
2. Select the Unregistered NAC Profile entry in the Configuration > Profiles left-panel
menu.
3. In the Accept Policy drop-down list, select Manage Policy Mappings.
699 of 805
ExtremeControl Gateway Configuration
700 of 805
ExtremeControl Gateway Configuration
rewrites the ToS field in the HTTP traffic to a value of 0x40 (or 64 base 10), equivalent to
a DSCP value of 16. (The DSCP is the value defined in the six most significant bits of
the 8-bit ToS field.) Furthermore, the Unregistered access policy is associated to VLANs
10, 20, and 30 on RFC 3580-enabled switches on the network which map to subnets
10.1.10.0/24, 10.1.20.0/24, and 10.1.30.0/24, respectively. The following steps describe
how to configure policy-based routing on an N-Series router or Cisco IOS-based router
when Registration is deployed for EOS policy-enabled access layer switches.
1. Configure an entry in the access-list 102 to identify HTTP traffic with a DSCP of 16.
701 of 805
Configuring the Access Control Tab (for ExtremeControl Gateways and Controllers)
702 of 805
Configuring the Access Control Tab (for ExtremeControl Gateways and Controllers)
ExtremeControl engines are initially assigned a default portal configuration. Use this tab
to view and edit the default configuration or create new configurations. Once you define
your portal configuration, enforce the Access Control configuration to your engine(s).
Use the following steps to define your portal configuration and enforce it to the engine:
1. In Extreme Management Center, access the Control > Access Control tab.
2. In the left panel, expand the Configuration section and select Captive Portals.
3. Select an existing captive portal and select Edit or select Add to create a new
portal.
4. Select the portal configuration settings for your network using the Network
Settings, Administration, and Website Configuration tabs, available in the left
panel:
a. Network Settings — view network web page parameters. These parameters
are shared by both the Remediation and the Registration web pages. Be
aware that if you deploy both the assessment/remediation and registration
features, any changes will affect the web pages for both features.
b. Administration — configure settings for the registration administration web
page and grant access to the page for administrators and sponsors.
c. Website Configuration — configure Guest Settings, Authentication Settings,
Survivable Registration, and Assessment/Remediation. Additionally, use this
to configure the Look & Feel of the website.
5. When you have finished making your changes to the portal configuration, select
Save.
6. Enforce the Access Control configuration to the engine group.
7. To exempt certain end-systems or end users from having to register to the network,
you can configure end-system groups based on authentication type, MAC address,
or user name. For example, an end-system group for the MAC OUI of the printer
vendor for the network can be configured to exempt printers from having to register
for network access.
Registration is now enabled for all end-systems connecting to this engine group, with the
exception of those end-systems and end users that have been exempted based on
group membership.
Related Information
l Registration Concepts
l Portal Configuration
703 of 805
Configuring Pre-Registration
Configuring Pre-Registration
Following are instructions for configuring pre-registration in your portal configuration.
NOTE: If neither panel is available in the Website Configuration navigation tree, click
Website Configuration in the left-panel and select the appropriate configuration.
704 of 805
Configuring Pre-Registration
705 of 805
Configuring Pre-Registration
706 of 805
Configuring Pre-Registration
9. At the top of the portal web page are instructions for the people performing the pre-
registrations. To modify and edit these instructions:
a. In the Control > Access Control tab, select I&A Configurations > Portal in the
left-panel navigation tree.
b. Select a Portal Configuration and select Website Configuration > Look &
Feel to open the Look & Feel panel.
707 of 805
Configuring Pre-Registration
c. Click on the Message Strings Launch Message Strings Editor button. The
Message Strings Editor window opens.
d. Scroll down to the "preregIntroMulti" or "preregIntroSingle" message key and
double-click that line. The Modify Localized Entry window opens.
708 of 805
Pre-Registering Guest Users
e. Enter any changes or modifications you wish to make to the instructions, and
click OK to close the window.
f. Enforce the changes to your engines.
g. Refresh the browser window to see the new instructions in the Pre-
Registration Portal.
10. The following sections provides information on how to pre-register a single user
(when you want to pre-register one user at time) or multiple users (when you have
a larger group of users to pre-register).
709 of 805
Pre-Registering Guest Users
The following sections provide steps for pre-registering single or multiple users in the
Pre-Registration Portal.
1. Enter the information for the guest user you want to pre-register. Fields with a red
asterisk are required.
l User Name — Enter the user name for the guest user when connecting to the
network. Usernames must be unique and cannot already exist in the local
password repository. Usernames are case sensitive. For example, "JSmith"
and "jsmith" would be considered two different usernames.
l First Name/Last Name — Enter the guest user's first and last name. The name
is printed on the voucher along with their registration credentials.
l Password/Confirm Password — Enter and confirm the password for the guest
user connecting to the network. Select the Generate Password checkbox if
you want Extreme Management Center to automatically generate a password
for you.
l Password Repository — When you pre-register the user, their credentials are
automatically added to the local password repository specified here. Local
Password Repositories are configured in the AAA Configuration window.
(You only see this field if you have multiple repositories.)
710 of 805
Pre-Registering Guest Users
l Expires Time — Select a registration expiration date from the calendar. The
time is automatically set to 0:00:00, which is midnight. You can enter a
specific time, if desired.
NOTE: You can add additional fields to be displayed here using the Manage Custom Fields
window accessed from the Customize Fields link in the Edit Portal Configuration
window's Authenticated Registration view or Secure Guest Access view. However
the Pre-Registration web page always displays the First Name and Last Name fields
even if they are not selected as visible/required in the Manage Custom Fields
window. This is because it is important for the first and last name to be included on
the pre-registration voucher printed out.
2. Click the Pre-Register User button to register the user. The user is added to the
local password repository and added to the Registration Administration web page.
3. A voucher (see example below) is generated that provides registration instructions
and the guest user's registration credentials. Print out this voucher to give to the
guest user.
IMPORTANT: The voucher must be printed out immediately, as there is no way to go back
and print out a voucher once you leave the web page. If you do not print out
the voucher, the voucher needs to be created by hand. In the event that the
"Generate Password" option was used, you need to modify the guest user
password using the registration administration page or local repository
administration.
4. To register another user, you must re-access the Pre-Registration page by using
the browser's back button or re-entering the URL.
711 of 805
Pre-Registering Guest Users
1. Click the CSV Template link to open a template CSV file where you create your list
of guest users to pre-register. You can use a CSV template that includes password
and password repository fields or not, depending on your network requirements.
Do not change any of the column headings in the file.
Following is an explanation of the columns that need to be filled in for each user,
depending on the template you selected.
l User Name — Enter the username for the guest user connecting to the
network. Usernames must be unique and cannot already exist in the local
password repository. Usernames are case sensitive. For example, "JSmith"
and "jsmith" would be considered two different usernames. (If you do try to
pre-register existing usernames along with new usernames, you are notified
of the error and given the option to continue registering the new names.)
l Password — Enter the password for the guest user connecting to the network.
If you want Extreme Management Center to automatically generate end user
passwords, leave the password column blank and select the Generate
Passwords checkbox on the Multiple Users panel.
l Password Repository — When you pre-register the user, their credentials are
automatically be added to the local password repository specified here. Local
Password Repositories are configured in the AAA Configuration window. If
you are using the Default repository, you can use the Password Repository
712 of 805
Pre-Registering Guest Users
drop-down list (in the Multiple Users section) to select Default, and then you
don't have to enter the Password Repository for each entry.
l First Name/Last Name — Enter the guest user's first and last name. The name
is printed on the voucher along with their registration credentials.
NOTE: You can add additional columns to be included in the template using the
Manage Custom Fields window accessed from the Customize Fields link in
the Edit Portal Configuration window's Authenticated Registration view and
Secure Guest Access view, however, the template always displays the First
Name and Last Name fields even if they are not selected as visible/required in
the Manage Custom Fields window. This is because it is important for the first
and last name to be included on the pre-registration voucher you print.
2. When you have finished entering the guest user information, save and close the
file.
3. Back in the Multiple Users panel, enter the path and filename for the CSV file by
using the Browse button to browse to the file on your system.
4. If your CSV file includes a Password Repository, use the Password Repository
drop-down list to specify whether to use the default repository or the repository
specified in the file.
5. Click the Upload button. Users are added to the local password repository and to
the Registration Administration web page.
6. Individual vouchers (see an example below) are generated that provide
registration instructions and the guest user's registration credentials for each guest
user. Print out these vouchers to give to the guest users.
IMPORTANT: Vouchers must be printed out immediately, as there is no way to go back and
print out a voucher once you leave the web page. If you do not print out the
vouchers, the vouchers have to be created by hand. In the event that the
"Generate Password" option is used, you need to modify the guest user
passwords using the registration administration page or local repository
administration.
7. To register another user, you must re-access the Pre-Registration Portal by using
the browser's back button or re-entering the URL.
713 of 805
Pre-Registering Guest Users
Related Information
l Portal Configuration
714 of 805
Pre-Registering Guest Users
715 of 805
Considerations for Fixed Switching Devices
716 of 805
Considerations for ExtremeXOS Devices
NOTE: These considerations do not apply to A4, B5, and C5 devices running firmware version 6.81
and higher. Those devices support RADIUS accounting configuration using SNMP.
l The devices must be assigned a Device Access profile that provides Write access
and includes CLI credentials for Telnet or SSH. Profiles and CLI credentials are
configured using the Authorization/Device Access tool's Profiles tab.
l Before you enforce a new RADIUS server configuration to your fixed switching
devices, you should verify that your CLI credentials are configured according to the
settings in your new configuration. This is because the Enforce process first writes
the RADIUS server configuration to the switch using SNMP, and then writes the
RADIUS accounting configuration to the switch using Telnet or SSH. If CLI
credentials are not configured according to the new RADIUS server configuration,
then the RADIUS accounting configuration are not written to the switches.
For example, by default you can Telnet to a fixed switching device using
username=admin (with no password or a blank password). But, if you configure a
new RADIUS configuration with an Auth Access Type (or Realm Type)=Any, then
you may need to change the Device Access for the switches to use the IAS
credentials, in order for Extreme Management Center to successfully write the
RADIUS accounting information to the switches during Enforce.
Fixed switches only allow one accounting server to be configured. If a primary and
secondary ExtremeControl gateway are configured for the switch, only the primary
gateway's accounting configuration is written to the switch. If a secondary gateway is
configured, a warning is displayed.
717 of 805
Considerations for ExtremeXOS Devices
Related Information
l Add Switches to ExtremeControl Engine Group Window
l Edit Switches in ExtremeControl Engine Group Window
718 of 805
Connecting GIM to ExtremeControl
NOTE: Beginning in Extreme Management Center 8.5, GIM performs a version compatibility check
as it connects to Extreme Management Center. If you are attempting to connect to an
incompatible version of Extreme Management Center, GIM displays an error message.
Non-IT personnel who are designated as provisioners can provide limited access to
other guest users for a specified amount of time for specific purposes. For example, your
company is conducting product training for customers at one of your offices. You provide
the front desk employee at the site provisioner access so he or she can provide
participating customers limited guest user access to your system for that day only. Refer
to Extreme Control Guest and IoT Manager Configuration for more information about
provisioner and guest user access.
719 of 805
Configuring the RADIUS Protocol for GIM Authentication
NOTE: Select either the Read access to the Guest and IoT Management REST API
capability or Read/Write access to the Guest and IoT Management REST API
capability, depending on whether the users added to the group require write access.
3. Click Save.
4. Create users and add them to the new Authorization Group.
5. Click Save.
6. Access the Administrator Application of GIM.
7. Open the Administration > Access Control Engine tab in GIM.
8. Open the Engine Details tab.
9. Enter the information for the Access Control engine you are using for GIM. For
additional information, see Configuring Engine Details on page 49 of the Extreme
Control Guest and IoT Manager Configuration document.
NOTE: Enter the credentials of the user or users added to the GIM REST API Authorization
Group in the XMC Admin Username and XMC Admin Password fields.
720 of 805
Creating and Configuring a GIM Domain
NOTE: The shared secret functions as a password, allowing GIM and the RADIUS server
(the Access Control engine) to communicate. Use a strong shared secret difficult for
others to guess.
721 of 805
Configuring GIM Authentication
9. Click Create.
NOTE: While the domain is stored in Extreme Management Center, the only part of the GIM domain
configured in Extreme Management Center is the authentication method used by GIM
provisioners and users.
LDAP
Provisioners can also authenticate via Active Directory associated with an LDAP
Configuration in Extreme Management Center. For provisioners for which both LDAP
and a local password repository are available as authentication methods, the methods
722 of 805
Configuring GIM Authentication
can be independent or work in conjunction with each other (for example, if LDAP
authentication fails, Extreme Management Center checks the local password repository
for valid credentials).
To configure LDAP as an authentication method:
1. Access GIM as the Administrator.
2. Open the Onboarding Template tab and click Add.
3. Open the Advanced tab.
4. Enter the Active Directory field against which authentication is verified (for
example, cn=gimGroup1,dc=extremenetworks,dc=com). The entire path
must match for authentication to be successful.
723 of 805
Configuring GIM Authentication
both authentication methods, ensure the authentication method you want to take
precedence is listed first in the table.
16. Click Save.
The Access Control Engine now authenticates GIM users based on the Access Control
Configuration.
IMPORTANT: Via the legacy NAC Manager java application, ensure Manual Set (Accurate) is
listed first in the Device Type Detection Source Precedence Order in the Edit
Appliance Settings window on the Device Type Detection tab. This is the default
precedence, and is required for GIM-assigned device types to affect
authentication.
Once GIM is fully connected to Extreme Management Center and Access Control, follow
the steps outline in the Extreme Control Guest and IoT Manager Configuration
document.
Related Information
724 of 805
Requirements
Requirements
Prior to configuring multiple AD domains:
l Ensure all AD servers communicate using DNS name.
l Validate multi-domain functionality works for your network.
725 of 805
Joining Multiple Active Directory Domains
NOTE: If multiple Active Directory domains are configured, ExtremeControl attempts to join
them all.
3. Click Add in the Authentication Rules section to open the Add/Edit User to
Authentication Mapping window.
4. Configure multiple authentication rules with an Authentication Method of
LDAP Authentication in the Authentication Rules section.
5. Click the Fall-through if Authentication Failed checkbox if you want to allow
ExtremeControl to attempt to authenticate a user against the next AAA
authentication rule in the table if the current authentication rule fails or times out. If
this checkbox is not selected and authentication fails, the user is not authenticated
and Extreme Management Center does not attempt to authenticate using any other
rules in the table.
6. Click OK.
7. Click Save.
ExtremeControl attempts to join to all Domains you configure in the AAA authentication
rules. If ExtremeControl is not able to join to any Domains, then a timer runs and
attempts to keeps trying to rejoin. Once ExtremeControl joins a particular domain, then a
separate health check timer runs to ensure AD server is reachable.
Multiple AD domains are configured and if you enabled fall-through for your rules,
ExtremeControl automatically attempts to authenticate against the next rule in the table.
Important Note
If duplicate users exist in multiple Active Directory domains with the same password, the
AAA rule(s) with user pattern (for example, Domain\*) needs to be configured for the user
to match the domain name and use the AAA rule correctly.
For example, a user administrator exists in 2 Active Directory domain servers and the
following is configured in AAA rule:
l All LDAP Authentication using Domain_A.com server - fall through enabled
l All LDAP Authentication using Domain_B.com server
When administrator joined, the Domain_B domain tries to authenticate the user. The
administrator user is successfully authenticated to the Domain_A.com server because
the user does exist in Domain_A.com server. To avoid this, configure the AAA rule with
user pattern as seen below:
726 of 805
Joining Multiple Active Directory Domains
Related Information
For information on related windows:
l Add User to Authentication Mapping
727 of 805
Joining Multiple Active Directory Domains
728 of 805
Setting Up Your Access Policies
If your network utilizes ExtremeControl Gateway engines, the access policies specified
in ExtremeControl profiles are mapped to policy roles that must be created and defined
in the Policy tab and enforced to the policy-enabled switches in your network. If you
have RFC 3580-enabled switches in your network, Extreme Management Center lets
you associate your policy roles to a VLAN ID or VLAN Name using the Policy Mappings
panel. This allows your ExtremeControl Gateway engines to send the appropriate VLAN
attribute instead of a policy role to those switches that are RFC 3580-enabled.
Policy mappings have a Location option that allows different VLAN IDs to be returned for
a policy based on the location the authentication request originated from. This is useful
in networks that may have a VoIP/voice VLAN that is defined on multiple switches, but
that VLAN maps to a unique VLAN ID on each switch. (For more information, see the
section on Location in the Edit Policy Mapping Configuration Window Help topic.)
NOTE: If you have RFC 3580-enabled switches in your network, be sure to verify that the DHCP
Resolution Delay Time option is set correctly in your Appliance Settings (Tools > Manage
Advanced Configurations> Global and Appliance Settings). This option specifies the
number of seconds an ExtremeControl engine waits after an authentication completes
before attempting to resolve the end-system's IP address. When modifying this delay, keep
in mind that for RFC 3580 devices, the engine links down/up a port to force the end-system
to get a new IP address when Extreme Management Center determines that the VLAN
has changed. If the delay time specified is less than the amount of time the end-system
needs to renew its IP address, then the ExtremeControl engine may resolve the end-
system's IP address incorrectly (to the previously held IP), or additional delay may be
introduced as the resolution process attempts to resolve the address based on the
configured retry interval. This is a problem when either registration or assessment is
enabled: the registration process may never complete or may take an unacceptable
amount of time to complete, or the ExtremeControl engine could attempt to scan the
incorrect IP address. Be sure to take into account the amount of time required for an end-
system to get a new IP address when setting the delay time value.
729 of 805
Setting Up Your Access Policies
policy, and some guidelines for creating corresponding policy roles, see the
section on Access Policies in the Concepts file.
NOTE: If your network uses ExtremeControl Gateway engines with only RFC 3580-enabled
switches, instead of listing policy roles, simply create a list of policy names that
correspond to the VLANs you are using in your network. One tip is to use policy
names that identify the corresponding VLAN name for ease of selection when you are
creating your ExtremeControl profiles.
2. For ExtremeControl Controllers, use the Policy tab to verify that the policy
configuration contains the required policy roles, and that the configuration has
been enforced to the ExtremeControl Controller. See the instructions above.
3. For ExtremeControl Gateways, verify each policy role listed on your worksheet is
created in Extreme Management Center's Policy tab and enforced to the policy-
enabled switches in your network. If you have RFC 3580-enabled switches in your
network, verify that your VLANs have been created on the switches in your
network.
4. Define the policy mappings that map each access policy to the appropriate policy
role as specified in your worksheet.
a. Select a policy mapping configuration from the ExtremeControl
Configurations > ExtremeControl Profiles > Policy Mappings left-panel
option.
730 of 805
Setting Up Your Access Policies
731 of 805
Setting Up Your Access Policies
732 of 805
Setting Up Your Access Policies
733 of 805
Setting Up Your Access Policies
For the new policy mapping, enter a mapping name and specify a policy role
(created in the Policy tab) and other required RADIUS attributes included in
the RADIUS response to a switch. Click OK to add the mapping. Note that
the required RADIUS attributes for your switches are defined in the Gateway
RADIUS Attributes to Send field configured in the Edit Switch window, as
shown below.
e. Click OK to close the Edit Policy Mapping Configuration window.
5. In your ExtremeControl profile, your policy mappings are available for selection
when you define your Accept, Quarantine, Failsafe, or Assessment access policy.
Related Information
For information on related windows:
l Edit Policy Mapping Configuration Window
l Add/Edit Policy Mapping window
l Access Policies, Concepts
734 of 805
Configuration Steps
Configuration Steps
The Credential Delivery method is configured in your portal configuration. Depending on
the method you specify, the appropriate custom fields must be configured for display on
the Registration web page, so that end users can enter the required information.
The following table provides a description of each credential delivery method and lists
their custom field requirements.
Custom Field
User Verification Method Description Requirement
Captive Portal The credential information is displayed There are no
on the Registration web page. Custom Field
requirements.
Email The end user must enter a valid email The Email
address on the Registration web page. Address
Custom Field
must be set
to Required.
SMS Gateway The SMS Gateway provider must The Phone
support SMTP API. The SMS Gateway Number
provider converts the email to an Custom Field
SMS text message. The end user must must be set
enter a mobile phone number on the to Required.
Registration web page.
735 of 805
Configuration Steps
Custom Field
User Verification Method Description Requirement
SMS Gateway or Email The SMS Gateway provider must The Phone
support SMTP API. The SMS Gateway Number and
provider converts the email to an Email
SMS text message. The end user must Address
enter a mobile phone number or email Custom
address on the Registration web page. Fields must
be set to
Visible.
SMS Text Message The mobile provider converts the email The Phone
to an SMS text message. The end user Number
must enter a valid mobile phone Custom Field
number on the Registration web page. must be set
to Required.
SMS Text or Email The mobile provider converts the email The Phone
to an SMS text message. The end user Number and
must enter a valid mobile phone Email
number or email address on the Address
Registration web page. Custom
Fields must
be set to
Visible.
Use the following steps to configure credential delivery for Secure Guest Access in your
portal configuration.
1. In the Access Control tab, access the Portal Configuration. Click on the Secure
Guest Access selection in the Portal Configuration tree. (If you don't see this
selection, click Features in the tree and enable the Secure Guest Access feature.)
2. In the Secure Guest Access panel, use the drop-down list to select the desired
Credential Delivery Method (refer to the table above).
736 of 805
Configuration Steps
3. If you selected the SMS Text Message or the SMS Text or Email Credential
Delivery method, click the Service Providers Edit button to configure the list of
mobile service providers from which end users can select on the Registration web
page. The Mobile Service Provider List provides a default list of providers that can
be edited to include the appropriate service providers for your geographic location.
737 of 805
Configuration Steps
You can comment out entries by preceding each line with either a # or // to allow
temporary editing of the file without removing the text.
The list requires one service provider entry per line, using the following format:
<Provider>:phonenumber@<specificdomain>.
When the end user registers, they only see the <Provider> portion in the drop-
down list of providers on the Registration web page.
738 of 805
Configuration Steps
5. For all methods, click on the Message Strings Edit button to open the Message
Strings Editor where you can customize the text displayed on the Registration web
page and the messages sent to the end user.
You need to modify different message strings sent to the end user, depending on
the delivery method or methods you selected. Double-click on the message to
open a window where you can edit the message text.
739 of 805
Configuration Steps
NOTE: When customizing message strings for text messaging (SMS Gateway or SMS Text
Message) it is best to keep the message length as short as possible (under the
maximum 160 characters limit). Some providers break long messages into multiple
messages and other providers truncate the message, which could cause important
information to be missing from the text message the guest receives.
6. Click the Customize Fields Open Editor button to open the Manage Custom Fields
window.
740 of 805
Configuration Steps
7. Set the appropriate custom fields to display on the Registration web page,
depending on the delivery method you selected (refer to the table above). If you do
not set these fields, ExtremeControl automatically sets them for you based on your
delivery method.
These settings are shared by Guest Web Access, Guest Registration, and Secure
Guest Access. Changing them for one access type also changes them for the
others. For more information, see the Manage Custom Fields Window.
741 of 805
How Secure Guest Access Works
742 of 805
How Secure Guest Access Works
When they click the Complete Registration button, they see the following screen that
notifies them to check their email or phone for instructions on how to gain access to the
network.
743 of 805
How Secure Guest Access Works
They are sent a username, password, and access instructions via an email or a phone
text message.
744 of 805
How Secure Guest Access Works
When they connect to the Secure Wireless network, they will enter their username and
password in this screen to gain access to the network.
Related Information
For information on related help topics:
l Portal Configuration
745 of 805
Configuration Steps
Configuration Steps
The verification feature is supported for both Guest Registration and Guest Web Access,
and is configured using the Verification Method options in your portal configuration.
Depending on the verification method you specify, the appropriate custom fields must be
configured for display on the Registration web page, so that end users can enter the
required information.
The following table provides a description of each verification method and lists their
custom field requirements.
Custom
Field
User Verification Method Description Requirement
Email The end user must enter a valid email The Email
address on the Registration web page Address
or Guest Web Access login page. Custom Field
must be set
to Required.
746 of 805
Configuration Steps
Custom
Field
User Verification Method Description Requirement
SMS Gateway The SMS Gateway provider must The Phone
support SMTP API. The SMS Gateway Number
provider converts the email to an Custom Field
SMS text message. The end user must must be set
enter a mobile phone number on the to Required.
Registration web page or Guest Web
Access login page.
SMS Gateway or Email The SMS Gateway provider must The Phone
support SMTP API. The SMS Gateway Number and
provider converts the email to an Email
SMS text message. The end user must Address
enter a mobile phone number or email Custom
address on the Registration web page Fields must
or Guest Web Access login page. be set to
Visible.
SMS Text Message The mobile provider converts the email The Phone
to an SMS test message. The end user Number
must enter a valid mobile phone Custom Field
number on the Registration web page must be set
or Guest Web Access login page. to Required.
SMS Text or Email The mobile provider converts the email The Phone
to an SMS test message. The end user Number and
must enter a valid mobile phone Email
number or email address on the Address
Registration web page or Guest Web Custom
Access login page. Fields must
be set to
Visible.
747 of 805
Configuration Steps
3. If you selected the SMS Text Message or the SMS Text or Email User
Verification method, click the Service Providers link to configure the list of mobile
service providers from which end users can select on the Registration web page or
Guest Web Access login page. The Mobile Service Provider List provides a default
list of providers that can be edited to include the appropriate service providers for
your geographic location.
You can comment out entries by preceding each line with either a # or // to allow
temporary editing of the file without removing the text.
The list requires one service provider entry per line, using the following format:
<Provider>:phonenumber@<specificdomain>.
When the end user registers, they will see only the <Provider> portion in the drop-
down list of providers on the Registration web page.
748 of 805
Configuration Steps
Editor where you can customize the text displayed on the Registration web page or
Guest Web Access login page, and the messages sent to the end user.
You need to modify different message strings sent to the end user, depending on
the verification method or methods you selected. Double-click on the message to
open a window where you can edit the message text.
l Email - This method uses the following strings:
l registrationVerificationEmailMsgBody - the default message shouldn't
need to be changed.
l registrationVerificationEmailSentFromAddress - you need to change
the default message to the appropriate email address for your
company.
l registrationVerificationEmailSentFromName - the default message
shouldn't need to be changed.
l registrationVerificationEmailSubject - the default message shouldn't
need to be changed.
l SMS Gateway - Depending on your SMS Gateway provider and their
required format, modify the following message strings using appropriate
variables to customize the dynamic data such as phone number.
l registrationVerificationSMSMsgBody
l registrationVerificationSMSSubject
l SMS Text Message - This method uses the following strings. The default
messages shouldn't need to be changed.
l registrationVerificationSMSMsgBody
l registrationVerificationSMSSubject
749 of 805
How User Verification Works
When they click the Complete Registration button, they are sent a verification code via
an email or a phone text message.
750 of 805
How User Verification Works
The web page then prompts them for the code. When they enter the correct code that
was generated for them and click the Complete Registration button, they are allowed
access to the network. The verification code is valid for 15 minutes and cannot be
reused once it is validated.
Related Information
For information on related help topics:
751 of 805
How User Verification Works
l Portal Configuration
752 of 805
How User Verification Works
753 of 805
How User Verification Works
754 of 805
How User Verification Works
l Do Not Display - The field is not displayed, and the end user is not required
to enter a sponsor email address. In this case, only the admin/sponsor email
address (defined above) is notified when the end user registers.
l Display Predefined Sponsor List - The end user must select a sponsor email
from a list of predefined sponsors (defined below). The end user sees a drop-
down list of sponsor email addresses and select the appropriate sponsor.
l User Specifies Any Email as Sponsor - The end user can enter any email
address as a sponsor's email address.
l User Must Specify Predefined Sponsor Email - The end user must enter an
email address that matches one of the predefined sponsors (defined below).
7. Predefined Sponsors - Enter one or more sponsor email addresses. If you have
selected Display Predefined Sponsor List as your Sponsor Email Field option
(above), these addresses are presented to the end user as a drop-down list,
allowing them to select a sponsor email address. If you have selected User Must
Specify Predefined Sponsor Email as your Sponsor Email Field option, then the
sponsor email address entered by the end user must match an email address
listed here. Email addresses can be separated by semi-colons (;) or commas (,) for
example, jdoe@CompanyA.com;rsmith@CompanyA.com. Because commas are
accepted separators, they should not be used in actual email addresses.
8. In the Portal Configuration window, click Save to save your changes. You need to
enforce the new portal configuration to your engine(s).
Related Information
For information on related help topics:
l Portal Configuration
755 of 805
Requirements
NOTE: Guest OAuth (for example, Google, Yahoo) may not support native mobile browsers and
display a “user agent” error. To access the network, use a standard browser application
(e.g. Google Chrome).
Requirements
These are the configuration requirements for Facebook Registration.
756 of 805
Creating a Facebook Application
l The ExtremeControl engine must have Internet access in order to retrieve user
information from Facebook.
l The ExtremeControl Unregistered access policy must allow access to the
Facebook site (either allow all SSL or make allowances for Facebook servers).
l A Unique Facebook application must be created on the Facebook Developers
page (see instructions below).
l The Portal Configuration must have Facebook Registration enabled and include
the Facebook Application ID and Secret (see instructions below).
757 of 805
Creating a Facebook Application
The Display Name is the name of the app presented to the end-user when they
grant Extreme Management Center access to their Facebook information and
should clearly indicate what its purpose is, for example, Extreme Networks Guest
Registration.
758 of 805
Creating a Facebook Application
The Dashboard panel opens and displays information about the new app including
an App ID and an App Secret.
7. Enter in a valid domain name for the ExtremeControl engines in the App Domains
field. For example, if the ExtremeControl engine to which users are connecting is
ExtremeControl engine.AbcCompany.com, enter "abccompany.com" in the App
Domains field.
8. Click Add Platform.
759 of 805
Creating a Facebook Application
9. Select Website.
10. Enter the domain name you added in the App Domains field in step 7 in the Site
URL field.
11. Click Save Changes.
12. Click Add Product in the left panel.
760 of 805
Creating a Facebook Application
761 of 805
Creating a Facebook Application
14. Enter the Valid OAuth redirect URIs. A redirect URI is required to redirect the user
back to the engine with an Access Token Extreme Management Center uses to
access the user account and retrieve the user data. The Redirection URI should be
in the following format:
https://<ExtremeControlengineFQDN>/fb_oauth
A Redirection URI must be added for each ExtremeControl engine where end
users can register via Facebook.
15. Click Save Changes.
16. Select App Review in the left panel.
762 of 805
Portal Configuration
17. Click the No button in the Make <Display Name> public field to change the button
to Yes.
The Approved Items section displays a list of default permissions that provide
access to end user data. (For more information on setting permissions, see
https://developers.facebook.com/docs/facebook-login/permissions#reference.)
You need to add the App ID and App Secret to your portal configuration.
Portal Configuration
The Application ID and Application Secret assigned during the creation of the Facebook
application must be provided in the Portal Configuration in order for the entire process to
complete properly.
763 of 805
Portal Configuration
3. In the Customize Fields section, click the Open Editor button to open the Manage
Custom Fields window where you can change registration portal fields. Facebook
registration uses only the First Name, Last Name, and Email Address fields, and
the Display Acceptable Use Policy (AUP) option. All other fields only apply to
regular guest registration. If the Display AUP option is selected, the captive portal
verifies that the AUP has been acknowledged before redirecting the user to
Facebook.
4. Select the Facebook Registration checkbox.
5. Enter the Facebook App ID and Facebook App Secret.
6. Click Save. Warning messages display stating that Verification Method and
Sponsorship are not used for Facebook registration, and that an FDQN is required
will be enabled.
7. Enforce the new configuration to your engines.
764 of 805
How Facebook Registration Works
Wireless Clients
To allow traffic to your network via a wireless connection, create an L7 host record for
the Unregistered Role on your Wireless Controller for facebook.com. This domain is
subject to change and may vary based on location.
765 of 805
Special Deployment Considerations
Related Information
l Portal Configuration
766 of 805
Requirements
NOTE: Guest OAuth (for example, Google, Yahoo) may not support native mobile browsers and
display a “user agent” error. To access the network, use a standard browser application
(e.g. Google Chrome).
Requirements
These are the configuration requirements for Google Registration.
767 of 805
Creating a Google Application
l The ExtremeControl engine must have Internet access in order to retrieve user
information from Google.
l The ExtremeControl Unregistered access policy must allow access to the Google
site (either allow all SSL or make allowances for Google servers).
l The ExtremeControl Unregistered access policy must allow access to HTTPS
traffic to the Google OAuth servers.
l A Unique Google application must be created on the Google Developers page
(see instructions below).
l The Portal Configuration must have Google Registration enabled and include the
Google Application ID and Secret (see instructions below).
768 of 805
Creating a Google Application
769 of 805
Creating a Google Application
7. Click Configure consent screen to open the OAuth consent screen panel.
8. Select your email address, enter your product name, and enter the URL to any of
the applicable resources for your company, then click Save.
770 of 805
Creating a Google Application
10. Enter a name for the application in the Name field. Use a name that clearly
indicates what its purpose is, for example, Extreme Networks Guest Registration.
11. Enter an Authorized redirect URI in the following format
https://<AccessControlengineFQDN>/google_oauth. Google uses the
Authorized redirect URI to redirect the user back to the engine with an Access
Token.
NOTES: Google OAuth APIs require your engine's FQDN resolves to a top level domain
(.com, .net, .edu, .org, .mil, .gov, or .int. You cannot use a domain not classified as
top level (e.g. MyGateway.MyCompany.Local) or the engines IP address, which
may require you to reclassify your domain and hosts.
Use only lowercase when entering the host and domain suffix (e.g. .com).
12. Enter the Authorized redirect URI for any additional ExtremeControl engines
registering end-users via Google.
13. Click Create.
The OAuth client window appears, displaying your client ID and secret.
771 of 805
Portal Configuration
You need to add the client ID and client secret to your portal configuration.
Portal Configuration
The client ID and client secret assigned during the creation of the Google application
must be provided in the Portal Configuration in order for the entire process to complete
properly.
1. Open the Control > Access Control tab.
2. In the left-panel tree, expand the Configuration > Captive Portals > Website
Configuration > and select Guest Registration.
772 of 805
Portal Configuration
3. In the Customize Fields section, click the Open Editor button to open the Manage
Custom Fields window where you can change registration portal fields. Google
registration uses only the First Name, Last Name, and Email Address fields, and
the Display Acceptable Use Policy (AUP) option. All other fields only apply to
regular guest registration. If the Display AUP option is selected, the captive portal
verifies that the AUP has been acknowledged before redirecting the user to
Google.
4. Select the Google Registration checkbox.
5. Click Edit.
6. Enter the client ID in the Google App ID field and the client secret in the App
Secret field.
7. Click Save. Warning messages display stating that Verification Method and
Sponsorship are not used for Google registration, and that an FDQN is required
will be enabled.
8. Enforce the new configuration to your engines.
773 of 805
How Google Registration Works
774 of 805
Special Deployment Considerations
In order for Google Registration to work properly with DNS Proxy, all domains/URLs
necessary to properly load the Google web page must be added to the Allowed
URLs/Allowed Domains section of the captive portal configuration. Otherwise, the
ExtremeControl engine resolves DNS queries for these components to the
ExtremeControl engine IP causing the page to not load properly.
As of February 2017, you must add the following domains in order for Google
registration to work with DNS Proxy. This domain is subject to change and may vary
based on location.
Accounts.google.com
Related Information
l Portal Configuration
775 of 805
Requirements
NOTE: Guest OAuth (for example, Google, Yahoo) may not support native mobile browsers and
display a “user agent” error. To access the network, use a standard browser application
(e.g. Google Chrome).
Requirements
These are the configuration requirements for Microsoft Registration.
776 of 805
Creating a Microsoft Application
l The ExtremeControl engine must have Internet access in order to retrieve user
information from Microsoft.
l The ExtremeControl Unregistered access policy must allow access to the Microsoft
site (either allow all SSL or make allowances for Microsoft servers).
l The ExtremeControl Unregistered access policy must allow access to HTTPS
traffic to the Microsoft OAuth servers.
l A Unique Microsoft application must be created on the Microsoft Developers page
(see instructions below).
l The Portal Configuration must have Microsoft Registration enabled and include the
Microsoft Application ID and Secret (see instructions below).
777 of 805
Creating a Microsoft Application
778 of 805
Creating a Microsoft Application
6. Click Web.
Additional fields display under Platforms allowing you to configure a web platform.
NOTE: Microsoft applications can only use a limited set of redirect URI values.
8. Click Add Url to enter the Redirect URI for any additional ExtremeControl engines
registering end-users via Microsoft.
779 of 805
Creating a Microsoft Application
780 of 805
Creating a Microsoft Application
IMPORTANT: Ensure you copy the password accurately. After the window is closed, you
cannot access the password again.
You need to add the Application Id and application password to your portal
configuration.
781 of 805
Portal Configuration
Portal Configuration
The Application Id and application password assigned during the creation of the
Microsoft application must be provided in the Portal Configuration in order for the entire
process to complete properly.
1. Open the Control > Access Control tab.
2. In the left-panel tree, expand the ExtremeControl Configurations > Portal tree and
select Guest Registration.
3. In the Customize Fields section, click the Open Editor button to open the Manage
Custom Fields window where you can change registration portal fields. Microsoft
registration uses only the First Name, Last Name, and Email Address fields, and
the Display Acceptable Use Policy (AUP) option. All other fields only apply to
regular guest registration. If the Display AUP option is selected, the captive portal
verifies that the AUP has been acknowledged before redirecting the user to
Microsoft.
782 of 805
How Microsoft Registration Works
783 of 805
Special Deployment Considerations
To allow traffic to your network via a wireless connection, create an L7 host record for
the Unregistered Role on your Wireless Controller for login.live.com and
auth.gfx.ms. These domains are subject to change and may vary based on location.
Related Information
l Portal Configuration
784 of 805
Requirements
NOTE: Guest OAuth (for example, Google, Yahoo) may not support native mobile browsers and
display a “user agent” error. To access the network, use a standard browser application
(e.g. Google Chrome).
Requirements
These are the configuration requirements for Yahoo Registration.
785 of 805
Creating a Yahoo Application
l The ExtremeControl engine must have Internet access in order to retrieve user
information from Yahoo.
l The ExtremeControl Unregistered access policy must allow access to the Yahoo
site (either allow all SSL or make allowances for Yahoo servers).
l The ExtremeControl Unregistered access policy must allow access to HTTPS
traffic to the Yahoo OpenID servers.
l A Unique Yahoo application must be created on the Yahoo Developers page (see
instructions below).
l The Portal Configuration must have Yahoo Registration enabled and include the
Yahoo Application ID and Secret (see instructions below).
786 of 805
Creating a Yahoo Application
3. Enter a name for the application in the Application Name field. Use a name that
clearly indicates what its purpose is, for example, Extreme Networks Guest
Registration.
4. Select Web Application for the Application Type.
5. Enter an Callback Domain in the following format
https://<AccessControlengineFQDN>. Yahoo uses the Callback Domain
to redirect the user back to the engine with an Access Token.
787 of 805
Portal Configuration
NOTES: Yahoo OAuth APIs require your engine's FQDN resolves to a top level domain
(.com, .net, .edu, .org, .mil, .gov, or .int. You cannot use a domain not classified as
top level (e.g. MyGateway.MyCompany.Local) or the engines IP address, which
may require you to reclassify your domain and hosts.
Use only lowercase when entering the host and domain suffix (e.g. .com).
The Client ID and Client Secret display at the top of the window.
You need to add the client ID and client secret to your portal configuration.
Portal Configuration
The client ID and client secret assigned during the creation of the Yahoo application
must be provided in the Portal Configuration in order for the entire process to complete
properly.
1. Open the Control > Access Control tab.
2. In the left-panel tree, expand the Configuration > Captive Portals > Website
Configuration > and select Guest Registration.
788 of 805
Portal Configuration
3. In the Customize Fields section, click the Open Editor button to open the Manage
Custom Fields window where you can change registration portal fields. Yahoo
registration uses only the First Name, Last Name, and Email Address fields, and
the Display Acceptable Use Policy (AUP) option. All other fields only apply to
regular guest registration. If the Display AUP option is selected, the captive portal
verifies that the AUP has been acknowledged before redirecting the user to Yahoo.
4. Select the Yahoo Registration checkbox.
5. Click Edit.
6. Enter the Client ID in the App ID field and the Client Secret in the App Secret field.
7. Click Save. Warning messages display stating that Verification Method and
Sponsorship are not used for Yahoo registration, and that an FDQN is required will
be enabled.
8. Enforce the new configuration to your engines.
789 of 805
How Yahoo Registration Works
790 of 805
Special Deployment Considerations
In order for Yahoo Registration to work properly with DNS Proxy, all domains/URLs
necessary to properly load the Yahoo web page must be added to the Allowed
URLs/Allowed Domains section of the captive portal configuration. Otherwise, the
ExtremeControlengine resolves DNS queries for these components to the
ExtremeControlengine IP causing the page to not load properly.
As of February 2017, you must add the following domains in order for Yahoo registration
to work with DNS Proxy. This domain is subject to change and may vary based on
location.
login.yahoo.com
Related Information
l Portal Configuration
791 of 805
Requirements
NOTE: Guest OAuth (for example, Google, Yahoo) may not support native mobile browsers and
display a “user agent” error. To access the network, use a standard browser application
(e.g. Google Chrome).
Requirements
These are the configuration requirements for Salesforce Registration.
792 of 805
Creating a Salesforce Application
l The ExtremeControl engine must have Internet access in order to retrieve user
information from Salesforce.
l The ExtremeControl Unregistered access policy must allow access to the
Salesforce site (either allow all SSL or make allowances for Salesforce servers).
l The ExtremeControl Unregistered access policy must allow access to HTTPS
traffic to the Salesforce OpenID servers.
l A Unique Salesforce application must be created on the Salesforce Developers
page (see instructions below).
l The Portal Configuration must have Salesforce Registration enabled and include
the Salesforce Application ID and Secret (see instructions below).
793 of 805
Creating a Salesforce Application
794 of 805
Creating a Salesforce Application
795 of 805
Creating a Salesforce Application
796 of 805
Creating a Salesforce Application
The API (Enable OAuth Settings) section of the window expands to display
additional fields.
10. Select Enable OAuth Settings.
11. Enter a Callback URL in the following format
https://<AccessControlengineFQDN>/Salesforce_oauth. Salesforce
uses the Authorized redirect URI to redirect the user back to the engine with an
Access Token.
797 of 805
Creating a Salesforce Application
NOTES: Salesforce OpenID APIs require your engine's FQDN resolves to a top level
domain (.com, .net, .edu, .org, .mil, .gov, or .int. You cannot use a domain not
classified as top level (e.g. MyGateway.MyCompany.Local) or the engines IP
address, which may require you to reclassify your domain and hosts.
Use only lowercase when entering the host and domain suffix (e.g. .com).
12. Select Access your basic information (id, profile, email, address, phone), Full
access (full), and Allow access to your unique identifier (openid), then click the
Add icon in the Selected OAuth Scopes section of the window to add the scopes to
the Selected OAuth Scopes list.
13. Select the Require Secret for Web Server Flow, Include ID Token and Include
Standard Claims checkboxes.
798 of 805
Creating a Salesforce Application
799 of 805
Creating a Salesforce Application
You need to add the Consumer Key and Consumer Secret to your portal
configuration.
800 of 805
Portal Configuration
Portal Configuration
The client ID and client secret assigned during the creation of the Salesforce application
must be provided in the Portal Configuration in order for the entire process to complete
properly.
1. Open the Control > Access Control tab.
2. In the left-panel tree, expand the ExtremeControl Configurations > Portal tree and
select Guest Registration.
3. In the Customize Fields section, click the Open Editor button to open the Manage
Custom Fields window where you can change registration portal fields. Salesforce
registration uses only the First Name, Last Name, and Email Address fields, and
the Display Acceptable Use Policy (AUP) option. All other fields only apply to
regular guest registration. If the Display AUP option is selected, the captive portal
verifies that the AUP has been acknowledged before redirecting the user to
Salesforce.
801 of 805
How Salesforce Registration Works
802 of 805
Special Deployment Considerations
To allow traffic to your network via a wireless connection, create an L7 host record for
the Unregistered Role on your Wireless Controller for login.Salesforce.com. This
domain is subject to change and may vary based on location.
Related Information
l Portal Configuration
803 of 805
Special Deployment Considerations
NOTE: MAC Locking to a specific port on a switch is based on the port interface name (e.g. fe.5.1).
If a switch board is moved to a different slot in a chassis, or if a stack reorders itself, this
name changes and breaks the MAC Locking settings.
MAC Address
Enter the MAC address that you want to lock.
Switch IP
Enter the IP address of the switch on which you want to lock the MAC address.
Lock to Switch and Port
Select this checkbox if you want to lock the MAC address to a specific port on the
switch, and enter the port interface name.
804 of 805
Special Deployment Considerations
Failed Action
Select the action to take when this MAC address tries to authenticate on a different
port and/or switch:
l Reject - The authentication request is rejected.
l Use Policy - Use the drop-down list to select the policy that you want applied.
This policy must exist in the Policy tab and be enforced to the switches in
your network.
Related Information
For information on related windows:
l End-Systems Tab
805 of 805