Extreme Networks
CONFIGURATION GUIDE
The purpose of the following manual is to describe the necessary configuration of Extreme network equipment for integration with Octopus Platform
1- Pre-requisites
If there is a firewall in the network that might block the traffic, you will need to allow access to some domains to enable user's authentication:
Radius Servers:
Primary:Â <IP_Radius_1>Â 1812 and 1813 UDP ports
Secondary:Â <IP_Radius_2>Â 1812 and 1813 UDP ports
Splash Portal server:Â
Domain <captive_portal_domain>Â 80 and 443 TCP ports
For the operation of the Guest and Enterprise modules configuration, it will be necessary to previously contract the Octopus platform licenses with the respective modules.
2- Guest module configuration
2.1 Radius Server
The first step to configure the Extreme Networks equipment will be to add the Radius Servers for both user authentication and for sending Accounting packets.
To do this access the equipment via SSH and after accessing the configuration mode run the following commands:
aaa-policy WIFI
authentication server 1 host <IP_Radius_1> secret 0 <secret>
accounting server 1 host <IP_Radius_1> secret 0 <secret>
accounting interim interval 600
accounting type start-interim-stop
commit
2.2 Â Walled Garden
Once the Radius Server configuration is done, it is necessary to add the domains that the users will be able to visit without being authenticated in the captive portal. Please, find an example of the commands that you will have to execute to add any domains to the DNS Whitelist.
dns-whitelist WIFI
permit google-analytics.com suffix
permit doubleclick.net suffix
Add all the required domains to make the captive portal works properly in the dns-whitelist created before. Use the command permit domain suffix
If you wish to add extra domains (Social Networks, Paypal, etc...) they can be consulted from the following link.
2.3 Â Captive Portal
The next step is to add the external captive portal configuration and link the Radius Server and the DNS Whitelist to this captive portal. Please, execute the following commands to create the profile:
captive-portal WIFI
server host https://<dominio_captive_portal>/login/hotspot/extreme
webpage-location external
accounting radius
use aaa-policy WIFI
use dns-whitelist WIFI
exit
commit
write memory    Â
2.4 WLAN Settings
After adding the Captive Portal configuration, the WiFi service must be created and the different services previously created must be associated. To do so, execute the following commands, modifying the SSID name that the APs will radiate and the vlan associated to said SSID.
After having configured the WLAN in the command line interface, it is necessary to use the user interface to update the configuration.
To do this, once inside the equipment, go to Configuration > Wireless and access the WLAN configuration created earlier.
Â
Â
Set up the following parameters in the Web Pages section:
Welcome URL: Enter the redirection URL found in Octopus Platform, in the WLAN section of the Location:Â https://<captive_portal_domain>/login/hotspot/landing/wifiarea/<WIFIAREA_ID>/<WLAN_ID>
Welcom Back URL: https://<captive_portal_domain>/login/hotspot/extreme/?client_mac=WING_TAG_CLIENT_MAC&client_ip=WING_TAG_CLIENT_IP&ap_mac=WING_TAG_AP_MAC&ssid=WING_TAG_WLAN_SSID&site=WING_TAG_RF_DOMAIN
Fail URL: https://<captive_portal_domain>/hotspot/extreme/?client_mac=WING_TAG_CLIENT_MAC&client_ip=WING_TAG_CLIENT_IP&ap_mac=WING_TAG_AP_MAC&ssid=WING_TAG_WLAN_SSID&site=WING_TAG_RF_DOMAIN&error=1
Login URL: https://<captive_portal_domain>/login/hotspot/extreme/?client_mac=WING_TAG_CLIENT_MAC&client_ip=WING_TAG_CLIENT_IP&ap_mac=WING_TAG_AP_MAC&ssid=WING_TAG_WLAN_SSID&site=WING_TAG_RF_DOMAIN
Agreement URL: https://<captive_portal_domain>/login/hotspot/extreme/?client_mac=WING_TAG_CLIENT_MAC&client_ip=WING_TAG_CLIENT_IP&ap_mac=WING_TAG_AP_MAC&ssid=WING_TAG_WLAN_SSID&site=WING_TAG_RF_DOMAIN
Registration URL: https://<captive_portal_domain>/login/hotspot/extreme/?client_mac=WING_TAG_CLIENT_MAC&client_ip=WING_TAG_CLIENT_IP&ap_mac=WING_TAG_AP_MAC&ssid=WING_TAG_WLAN_SSID&site=WING_TAG_RF_DOMAIN
No service URL: https://<captive_portal_domain>/login/hotspot/extreme/?client_mac=WING_TAG_CLIENT_MAC&client_ip=WING_TAG_CLIENT_IP&ap_mac=WING_TAG_AP_MAC&ssid=WING_TAG_WLAN_SSID&site=WING_TAG_RF_DOMAIN
**Request the full URL.
Â
To obtain the WIFIAREA_ID and the WLAN_ID parameters to complete the URL above, please access to the WIFI platform and go to the Locations configuration menu. In the WLAN configuration tab, you will be able to check the URL that must be configured to redirect the users after their successful authentication.
2.5Â AP Profile
Finally, it is necessary to enable the SSID created in the section before. To do that, execute the following commands to associate the WLAN Profile to the AP Profile. Don't forget to replace the AP Profile name by the one associated to your access points:
2.6 Â Authorized MAC Addresses
For user validation to work correctly, it is necessary to identify the NAS that will be able to make authentication requests to the Radius Server. All the MAC addresses of the Access Points that will radiate the configured SSID must be added, as well as the MAC address of the WiFi interface or BSSID associated to each Access Point.
These Radio MAC addresses can be obtained from the Monitor menu. Access to Monitor > Radios and you will be able to see them in the Access Point Radio Details section .
On the other hand, to obtain the MAC Address of each AP access to Configuration > Access Points and access to the information of each AP individually.
For information on how to add the MAC address of each AP as an authorized NAS on the platform, please refer to the following link Locations
3- Â Enterprise module configuration
In order to integrate the configurations of this module with the platform, it is necessary to contract the Octopus Wifi Enterprise Module.
3.1 Â MAC Authentication
To enable MAC Authentication it is necessary to make some changes in the created WLAN Profile. To perform the configuration, please execute the following commands replacing the profile names by the ones configured before.Â
Â