Wireless GSG
Wireless GSG
ExtremeWireless Getting
Started Guide
Release V10.31.01
9035070
Legal Notice
Extreme Networks, Inc. reserves the right to make changes in specifications and other information
contained in this document and its website without prior notice. The reader should in all cases
consult representatives of Extreme Networks to determine whether any such changes have been
made.
The hardware, firmware, software or any specifications described or referred to in this document
are subject to change without notice.
Trademarks
Extreme Networks and the Extreme Networks logo are trademarks or registered trademarks of
Extreme Networks, Inc. in the United States and/or other countries.
All other names (including any product names) mentioned in this document are the property of
their respective owners and may be trademarks or registered trademarks of their respective
companies/owners.
For additional information on Extreme Networks trademarks, please see:
www.extremenetworks.com/company/legal/trademarks
Support
For product support, phone the Global Technical Assistance Center (GTAC) at 1-800-998-2408
(toll-free in U.S. and Canada) or +1-408-579-2826. For the support phone number in other
countries, visit: http://www.extremenetworks.com/support/contact/
For product documentation online, visit: https://www.extremenetworks.com/documentation/
Text Conventions
The following tables list text conventions that are used throughout this guide.
Providing Feedback to Us
We are always striving to improve our documentation and help you work better, so we want to hear
from you! We welcome all feedback but especially want to know about:
• Content errors or confusing or conflicting information.
• Ideas for improvements to our documentation so you can find the information you need faster.
• Broken links or usability issues.
If you would like to provide feedback to the Extreme Networks Information Development team about
this document, please contact us using our short online feedback form. You can also email us directly at
[email protected].
Getting Help
If you require assistance, contact Extreme Networks using one of the following methods:
• GTAC (Global Technical Assistance Center) for Immediate Support
• Phone: 1-800-998-2408 (toll-free in U.S. and Canada) or +1 408-579-2826. For the support
phone number in your country, visit: www.extremenetworks.com/support/contact
• Email: [email protected]. To expedite your message, enter the product name or
model number in the subject line.
• GTAC Knowledge — Get on-demand and tested resolutions from the GTAC Knowledgebase, or
create a help case if you need more guidance.
• The Hub — A forum for Extreme customers to connect with one another, get questions answered,
share ideas and feedback, and get problems solved. This community is monitored by Extreme
Networks employees, but is not intended to replace specific guidance from GTAC.
• Support Portal — Manage cases, downloads, service contracts, product licensing, and training and
certifications.
Before contacting Extreme Networks for technical support, have the following information ready:
• Your Extreme Networks service contract number and/or serial numbers for all involved Extreme
Networks products
• A description of the failure
• A description of any action(s) already taken to resolve the problem
• A description of your network environment (such as layout, cable type, other relevant environmental
information)
• Network load at the time of trouble (if known)
• The device history (for example, if you have returned the device before, or if this is a recurring
problem)
• Any related RMA (Return Material Authorization) numbers
Related Publications
ExtremeWireless and ExtremeWireless AP documentation can be found on Extreme Documentation
page at: http://documentation.extremenetworks.com
The Extreme Networks ExtremeWireless Software solution is an enterprise solution that consists of the
following components:
• ExtremeWireless Appliance
• Extreme Networks ExtremeWireless Software
• ExtremeWireless AP
• Extreme Management Center and Wireless Advanced Services
The ExtremeWireless Appliance is driven by the ExtremeWireless Software. The software resides on the
ExtremeWireless Appliance and provides an intuitive web-based interface — the ExtremeWireless
Assistant — to enable you to manage the entire wireless network from a laptop or a PC connected to
the network. A command line interface (CLI) is also available to manage the wireless network.
The ExtremeWireless Appliance is a fully functioning dynamic router/switch that aggregates and
coordinates all Wireless APs and manages client devices. Some key features of the ExtremeWireless
Appliance are described in the following sections.
Note
The word appliance is synonymous with controller. It refers to both controller devices and
virtual gateways.
Role (also known as policy) defines the station's topology (network segment), filtering (access
restrictions) and Class of Service definitions. A VNS definition consists of a WLAN Service bound to one
or two roles that are applied to stations by default. Until associated with a role definition, a WLAN
Service remains inactive.
When a user associates with a particular SSID (WLAN Service), the user's experience is shaped by the
corresponding role that the VNS defines as its default. The user is mapped to a specific segment, its
traffic access restricted by the role filters, and its network access rate correspondingly restricted as
defined in the role.
However, user authentication responses (such as ) or an explicit external API call may remap the user to
a different policy. The role reassignment may move the user to a completely different segment (),
access state (filters), and rate restriction setting.
Role assignment for a particular user session remains as the user roams across the mobility domain.
Role assignment is independent of the underlying characteristics of the transport network and the point
of presence of network devices, as well as access points.
In a properly coordinated mobility domain, the user's point of presence is retained, so as to provide an
ubiquitous coverage area to the user, wherever the intended SSID is available.
ExtremeWireless Appliances can support the following number of VNSs, topologies, roles, and rate
control profiles:
An 802.1x mechanism in conjunction with RADIUS and pre-shared key authentication allow only
authorized users to access the network. Other features include Captive Portal for redirected web-based
authentication.
Radar WIDS-WIPS
ExtremeWireless Radar is a set of advanced, intelligent, Wireless-Intrusion-Detection-Service and
Wireless-Intrusion-Prevention-Service (WIDS-WIPS) features that are integrated into the Wireless
Controller, its APs, and the Convergence Software. Radar provides a basic solution for discovering
unauthorized devices within the wireless coverage area. Radar performs basic RF network analysis to
identify unmanaged APs and personal ad-hoc networks. The Radar feature set includes: dynamic
channel and frequency selection support, location visualization (requires Extreme Management Center),
interference classification and adaptation, and wireless intrusion detection and protection.
The full Radar feature requires a license, but a non-licensed subset of Radar functions is provided in the
base Convergence Software package.
For detailed information about Radar WIDS-WIPS features and how to configure them, see the
ExtremeWireless User Guide.
Web Authentication
The ExtremeWireless Appliance has a built-in Captive Portal capability that allows web authentication
(web redirection) to take place. The ExtremeWireless Appliance is also capable of working with an
external captive portal.
Wireless APs
The ExtremeWireless APs are enterprise-class access points that deliver secure wireless access via the
Layer 3 tunnel for enterprise deployments. They provide advanced RF capabilities, security, reliability,
and scalability. Individual services may also be configured to be handled locally.
The Wireless provide an unmatched level of flexibility and performance for complex, time-sensitive
functions including , encryption, and network intrusion and detection.
The Wireless AP physically connects to a LAN infrastructure and establishes an IP connection with the
ExtremeWireless Appliance. You configure and manage global or individual functions on Wireless APs
using the Extreme Networks ExtremeWireless Software, which runs on the ExtremeWireless Appliance.
All communication between the ExtremeWireless Appliance and the Wireless AP is carried out using a
UDP-based protocol. The IP traffic coming from the Wireless AP is encapsulated and directed to the
ExtremeWireless Appliance. The ExtremeWireless Appliance exposes the packets and forwards or
bridges them to the appropriate destinations, while managing sessions and applying roles (policies).
For more information about ExtremeWireless APs, and the firmware supported, see ExtremeWireless
Hardware Firmware Support Matrix.
Note
The configuration process for all Wireless APs is identical, unless otherwise specified.
For detailed information on a specific AP, see the User Guide and appropriate AP Installation Guide.
• Wireless Advanced Services: Wireless Advanced Services is a separately licensed application that
enables you to monitor the wireless network, locate wireless devices on maps, configure sensors,
generate security compliance reports, and use wireless forensic analysis tools.
• Monitoring – 2.4 GHz and 5 GHz, all channel association activity
• Identification – Detects all Wi-Fi activity and correlates information from multiple sensors
• Auto-Classification – Limits user intervention to maximize the protection of all devices from all
threats
• Visualization – Visualizes measured coverage for service, detection, and prevention
• Location – Identifies rogue APs and clients on the floor-plan for permanent removal
An authentication server that assigns and manages ID and password protection throughout the
network. The RADIUS server system can be set up for certain standard attributes such as Filter ID,
which can be used to provide policy assignment indications for a specific user, and for the vendor
specific attributes (VSAs). The appliance does not implement its own RADIUS server but rather
depends on the interaction with infrastructure (customer) available servers. This facilitates the
centralization of user policy for wireless and other access methods.
• DHCP server (Dynamic Host Configuration Protocol)
A server that assigns the IP addresses, gateways, and subnet masks dynamically. The external DHCP
server, depicted in Figure 1-1, is used to provide addresses to infrastructure equipment such as APs. If
you do not have a DHCP server, you can configure the appliance's built-in DHCP server to provide
the IP addresses to infrastructure equipment, including the APs (if the APs are connected on the
same segment as the corresponding controller port on which the service is enabled). In addition, the
IP addresses to the mobile devices are provided by the built-in DHCP server of the appliance. You
can also configure the appliance to relay DHCP requests to the external DHCP server.
• SLP (Service Location Protocol)
A service discovery protocol that allows computers and other devices to find services in a local area
network without prior configuration. The client applications are user agents and services that are
advertised by a service agent. In larger installations, a directory agent collects information from
service agents and creates a central repository. SLP is one of several modes that the Wireless APs
use to discover the appliance.
• Domain Name Server (DNS)
A server that translates the domain names into IP addresses. The DNS is used as an alternative
mechanism for the automatic discovery process. In addition to an end-user’s usage of DNS to obtain
IP references to common internet resources (web-sites), it may also be used as an alternative
method for AP-Controller discovery. The ExtremeWireless Appliance, its software, and the APs rely
on the DNS for Layer 3 deployments. In addition, appliances use DNS to discover their controller. The
appliance can be registered in DNS as controller.<domain> to provide DNS-assisted discovery by
APs
• SLP-DA with Option 78 – The mobility agent on each ExtremeWireless Appliance discovers the
address of the mobility manager. SLP-DA is a normal network function. If your network already
deploys such a device, the controllers will promptly register their services with it (assuming that the
controllers can identify the device via DHCP Option78 query on its locally attached segments). If
your deployment does not have an existing SLP-DA, each controller has that function enabled by
default (and will correspondingly register with itself). In order for other controllers or APs to find the
preferred SLP-DA for the network, simply provision DHCP Option 78 on each of the required
networks to refer to the IP address of the selected controller.
• Direct IP address option – Defined while configuring the mobility agent. By explicitly defining the
manager’s IP address while configuring the agents, this enables the manager and agents to find
each other directly without using the SLP discovery mechanism.
Note
All three DHCP configurations are available for Bridged@Controller topologies. For
Bridged@Controller topologies, the controller may be configured as the DHCP server for the
corresponding . In this configuration, the controller bridges all the received traffic from a
connected mobile user to the corresponding VLAN. The VLAN IP assignment must already
have been configured for DHCP service. The wireless user joins that VLAN as a normal wired
user. The address for the user is provided by the corresponding server. The controller learns
the assigned IP address from a user based on IP inspection.
Use the following table to document all the pertinent information about the ExtremeWireless Appliance
before starting the installation process.
Some of the information listed in the table may not be relevant to your network configuration. Only
record the information that is pertinent to your network configuration.
Domain name for devices Domain name – Your organization’s domain name.
on this network segment
RADIUS Server’s IP IP address – The IP address of the RADIUS server.
address
SLP DA’s IP address Hexadecimal values of SLP DA’s IP address – The
Wireless APs use the SLP DA to discover the
ExtremeWireless Appliance.
The mobility agents use the SLP DA to discover the
mobility manager.
SLP-DA is configured in hexadecimal on the target
DHCP server (this element is not provisioned on the
controller). The value is configured in relation to option
78 on the segment definitions of the DHCP server that
provides the IP addresses of the APs or that the
controller can query to determine the selected SLP-DA
service in the network. This provisioning is done per
such segment.
Internet Protocol • Static IP address – The DNS server’s static IP
configuration for DNS address.
service server • Subnet Mask – Subnet mask of the DNS server’s
static IP address.
• Gateway – The DNS server’s gateway.
• ISP’s IP address – Your ISP’s (Internet Service
Provider) IP address.
• IP address – ExtremeWireless Appliance’s IP address.
The values must match what you define in the Acc &
Acct tab.
Next Hop Routing for An optional configuration element that allows the
Routed VNS customer to define an explicit next hop router via which
all the segment's traffic should be forwarded. If left
unspecified, the traffic is forwarded in accordance to the
system's routing table.
• Next hop IP address – The next-hop IP identifies the
target device to which all VNS (user traffic) is
forwarded. Next-hop definition supersedes any other
possible definition in the routing table.
• OSPF routing cost – The OSPF cost value provides a
relative cost indication to allow upstream routers to
calculate whether or not to use the ExtremeWireless
Appliance as a better fit, or lowest cost path to reach
the devices in a particular network. The higher the
cost, the less likely that the ExtremeWireless
Appliance is chosen as a route for traffic, unless that
ExtremeWireless Appliance is the only possible route
for that traffic.
VLAN ID for Bridge traffic VLAN ID – The VLAN ID to which traffic is bridged
locally at AP topology directly at AP. The AP tags traffic for users associated
with this topology to the specified VLAN ID. The VLAN
must be configured/trunked on the switch port to which
the AP is connected.
Authentication and • Port – Used to access the RADIUS server. The default
Accounting information for authentication is 1812 and for accounting is 1813.
for captive portal • # of Retries – The number of times the
configuration ExtremeWireless Appliance attempts to access the
RADIUS server.
• Timeout – The maximum time for which
ExtremeWireless Appliancereless Appliance waits for
a response from the RADIUS server before making a
re-attempt.
• NAS Identifier – A RADIUS attribute that identifies
the controller to the RADIUS server for purposes of a
specific WLAN service. This is optional.
External Captive Portal Select the type of captive portal configuration to provide
(ECP) Type authentication services for the WLAN Service:
• No captive portal
• Internal captive portal – Controller provides the web
server that operates as the authentication portal. The
controller is also responsible for the credential's
verification with a specified RADIUS server.
• External captive portal – You provide the web server
that hosts the authentication website. This option
provides the most flexible approach in terms of
customization of the authentication service. Web
server interfaces provide alternate methods of user
authentication, such as payment systems. Or,
provide the web service but rely on the controller to
perform the credential authentication via RADIUS.
• Internal Guest Portal Splash Screen
• Internal Guest Portal
Shared Secret Password ECP privacy – Whether to require traffic sent between
for external captive portal the controller and the external captive portal host to be
configuration encrypted and if so with or AES.
Password – When using ECP, define a Shared Secret
(password) that can be used to perform MD5 encryption
of sensitive information on the exchange between the
authentication server and the controller (such as during
credentials exchange for authentication). This password
encrypts the information exchanged between the
ExtremeWireless Appliancereless Appliance and the
external captive portal server.
Use the following table to document pertinent WLAN service wireless privacy information about the
ExtremeWireless Appliance before starting the installation process.
Dynamic WEP privacy Broadcast re-key interval – The time interval (in seconds)
information after which you want the broadcast encryption key to be
changed automatically. The default is 3600.
Optionally, you can select whether the availability configuration is to be set to use standard or fast
failover operations. If fast-failover is enabled, session-availability is automatically enabled.
You are given the choice to enable automatic configuration synchronization. Once enabled, a
modification to service configuration on one controller (such as services, topologies, and policies) is
automatically coordinated and synchronized with the peer. You may be requested to provide
information details pertaining to the representation of the entity on the other controller, such as the IP
address (layer 3 configuration) of the interface on the other controller.
Note
Automatic synchronization is strongly recommended when either fast-failover or session-
availability is enabled.
This section provides a high-level overview of the steps involved in the initial configuration of your
system:
Perform the first time setup of the ExtremeWireless Appliance on the physical network, which includes
configuring the IP addresses of the interfaces on the ExtremeWireless Appliance. For more information
on the following topics, see the “System Configuration Overview” section in the User Guide.
1 Begin by determining the type of connectivity required between the controller and the switch
infrastructure.
a Determine which physical interfaces (L2 Port) are going to be connected.
b Determine which s are associated with the physical interfaces.
c Determine which Service (Virtual) Topologies are going to be offered by the service and which
physical interface(s) will carry those VLANs into the switch infrastructure. Ensure that the
corresponding switch ports are provisioned to trunk the same set of VLANs. The L2 Port
Summary view provides a listing of which VLAN IDs are configured on which port.
2 The topologies corresponding directly to physical (L2) port connectivity are explicitly identified via
the “Physical” tag as their mode.
Note
If defining tagged VLANs for topologies, please verify that the same tagged VLAN
reference is defined on the connecting switch port.
3 To manage the ExtremeWireless Appliance through the interface, select the Mgmt checkbox on the
corresponding Topology profile.
4 Configure the data port interfaces to be on separate VLANs. Ensure also that the tagged versus
untagged state is consistent with the switch port configuration.
5 Configure the ExtremeWireless Appliance for remote access, which includes:
a Setting up an administration station (laptop) on subnet 192.168.10.0/24. By default, the
ExtremeWireless Appliance's Management interface is configured with the static IP address
192.168.10.1.
b If you intend to connect the controller to a dedicated management segment, then the default
shipping settings of the Admin port (192.168.10.1/24) need to be modified with the correct
address. A default gateway to which management traffic associated with the Admin port is
forwarded may be specified. See Accessing the Wireless Appliance for the First Time on page
36.
6 Configure the ExtremeWireless Virtual Gateway V2110, which includes:
a Determining the IP address range of the virtual switch to which the V2110 management port is
connected.
b Using the vSphere Client Console window to assign the controller's management port an
available IP address on the subnet
c Logging onto the V2110 through its web GUI and use the installation wizard to complete the
initial setup. See Accessing the Wireless Appliance for the First Time on page 36.
• Provides the controller with information as to the regulatory domain on which the controller
provides service. The regulatory domain restricts the set of operational countries that are available
for AP configurations.
• Is registered to the management MAC address of the controller.
• Provides a basic set of operational capacities (dependent on platform). The customer can upgrade
the system's base capacity by purchasing additional Capacity Upgrade licenses.
With ExtremeWireless v10.01 and later each controller is licensed in a specific domain. The domain
licenses include:
• FCC
• ROW
• MNT
• EGY
The user interface reflects the domain of the controller. The following are use cases for each domain:
• A wireless controller with an FCC license can manage Access Points deployed in the United States,
Puerto Rico, or Colombia.
• wireless controller with a ROW license can manage Access Points deployed in any country except
A
the United States, Puerto Rico, Egypt, or Colombia.
• A wireless controller with a EGY license will continue to require ROW hardware, but the license will
restrict country selection to Egypt only.
• wireless controller with a EGY license can manage Access Points deployed in Egypt.
A
Note
If upgrading from v10.21 with an EGY license, call customer support for assistance.
• A wireless controller with a MNT license can manage only domain-locked Access Points, which are
the AP39xx-FCC and the AP39xx-ROW only. The AP39xx-FCC must be deployed in the United
States, Puerto Rico, or Colombia. The AP39xx-ROW must be deployed in any country except the
United States, Puerto Rico, or Colombia.
Note
The AP37xx and AP38xx will NOT be able to connect to a controller licensed in the MNT
domain.
Caution
Whenever the licensed region changes on the ExtremeWireless Appliance, all Wireless APs
are changed to Auto Channel Select to prevent possible infractions to local RF regulatory
requirements. If this occurs, all manually configured radio channel settings are lost.
Installing the new license key (other than EGY) before upgrading prevents the
ExtremeWireless Appliance from changing the licensed region, and in addition, manually
configured channel settings are maintained. For more information, see the Maintenance
Guide.
EGY License exception: If an appliance that is licensed with ROW or MNT Regulatory Keys is
hosting APs inside Egypt or APs outside Egypt, upon upgrade to v10.31.01, the AP radios are
disabled. If upgrading from v10.21 with an EGY license, call customer support for assistance.
Routing configuration for the system is therefore strongly recommended and in most cases necessary.
At a minimum the next hop default gateway that the controller interacts with to access these services
should be defined.
Policies define the level of access that users are granted, whether users are restricted in the amount of
bandwidth available to the user and the specification on which topology represents the user's point and
method of network interface. Policies are implicitly assigned by a VNS by way of authentication and
default states, or may be explicitly assigned by way of responses to user's authentication ( ACCESS-
ACCEPT message).
The VNS Creation Wizard on the controller steps you through the service creation and its necessary
subcomponents, resulting in a fully resolved set of elements and an active service.
1 Research the service types the system is expected to provide, such as wireless services, encryption
types, infrastructure mapping (s), and connectivity points such as switch ports (switch port VLAN
configuration and trunks must match the controller’s configuration. Then configure the traffic
topologies your network must support in order to provide wireless user connectivity to
infrastructure resources.
2 You can run the Basic Configuration Wizard to setup controller services such as NTP, Routing, DNS,
and RADIUS servers, or you can define necessary infrastructure components such as the RADIUS
servers, if CP or AAA services are to be used for user authentication. RADIUS servers are defined via
the “VNS Configuration/Global/Authentication” tab.
3 Define the Topologies: Topologies represent the controller point of network attachment, therefore
VLANS and port assignments must be coordinated with the corresponding switch ports.
4 Define Policies: Policies are typically bound to topologies. Policy application assigns user traffic to
the corresponding network point. Policies define user access rights and reference a user’s rate
control profile. New definitions can be created in place.
5 Define the : CoS refers to a set of attributes that define the importance of a frame while it is
forwarded through the network relative to other packets, and to the maximum throughput per time
unit that a station or port assigned to the policy is permitted. The CoS defines actions to be taken
when rate limits are exceeded.
6 Define the WLAN service:
a Select the set of APs/Radios on which the service is present
b Configure the method of wireless user credential authentication for this service (None, Internal,
CP, External CP, Guest Portal, or 802.1x[EAP]
7 Create a VNS that binds the WLAN service to the policies that are used for default assignment upon
user network attachment.
For each Bridge Traffic Locally at EWC topology that is created, a tagged or untagged VLAN needs
to be specified. In addition, the network port on which the VLAN is assigned must be configured on
the switch, and the corresponding ExtremeWireless Appliance interface must match the correct
VLAN.
8 Set up one or more virtual subnetworks on the ExtremeWireless Appliance. For each VNS, configure
the following:
• Topology – Select the Topology type and perform the following steps:
Type Steps
Bridged @ Controller Specify the VLAN for the interface.
Select physical port on which VLAN is trunked.
If L3 presence is desired, specify the IP address and subnet mask.
Determine whether the controller is the server for the segment; if so, configure
DHCP range parameters.
Determine if the controller provides the DHCP relay for the segment; if so,
configure the IP address of DHCP server.
Routed Specify the IP address and subnet mask.
Specify the DHCP settings for segment; If this controller is the DHCP server for
segment, configure DHCP range parameters. If the controller is providing the
DHCP relay for segment, configure the IP address of the DHCP Server
Bridged Configure as untagged, or specify a tag in the range 1-4094.
Specify the VLAN ID for tagging at the AP.
• Policy – Select the topology that represents the network point of attachment associated with the
policy and configure filtering:
• Define user network access policy.
• Privacy: Select and configure the wireless security method for the service (None, WEP, WPA-
PSK, DynWep, WPA/EAP).
• : Configure QoS behavior definitions related to remapping of packet priority.
• VNS
• Select the WLAN service that the VNS represents.
• Configure the Default Non-Auth Policy by selecting the policy to which users are initially
assigned upon association to the service.
• Configure the Default Auth Policy by selecting the policy to which users are re-assigned upon
successful completion of authentication steps (default behavior simply maps to Default
Policy, so no specific transition occurs on straight authentication). The policy referenced by
this setting is applied unless the RADIUS server provides a specific indication of a more
specific policy via Login-Lat-Group and/or FilterID attributes.
Provisioning the VNS mapping between the WLAN service and the default policies enables the
service to be advertised (unless WLAN service explicitly provisioned in disabled state).
Configuring the Wireless Appliance’s management port is an optional step. If you do not intend to
connect your enterprise network to the controller management port, you can skip the following
procedure and instead retain the default IP address of the controller’s management port.
Change the controller's management port and Gateway IP addresses using the Command Line Interface
(CLI) so that the GUI can be accessed from a browser on the administrator's workstation. After that, the
controller or V2110 can be accessed via CLI (ssh) or GUI (ssl) for configuration.
For more information about CLI commands and syntax, see the CLI Guide.
For more information about CLI commands and syntax, see the CLI Guide.
2 Connect the ExtremeWireless Appliance’s management port to the web-enabled laptop computer
with a cross-over RJ45 Ethernet cable.
Note
The IP address of the ExtremeWireless Appliance’s management port is 192.168.10.1.
3 Launch your web browser and type https://192.168.10.1:5825 in the address bar.
The Wireless Assistant login screen displays.
Password: abc123
5 Click Login.
The Wireless Assistant Home screen displays.
Administrators can use the basic installation wizard to quickly configure the ExtremeWireless Appliance
for deployment, and then once the installation is complete, continue to revise the ExtremeWireless
Appliance configuration accordingly.
The basic installation wizard is automatically launched when an administrator logs on to the
ExtremeWireless Appliance for the first time, including if the system has been reset to the factory
default settings. In addition, the basic installation wizard can also be launched at any time from the left
pane of the ExtremeWireless Appliance Configuration screen.
To use the ExtremeWireless Appliance as the NTP time server, select Run local NTP Server. In
the Server field, enter the IP address or Domain Name for the NTP server.
• To use NTP to set the ExtremeWireless Appliance time, select Use NTP, and then type the IP
address of an NTP time server that is accessible on the enterprise network.
The Network Time Protocol is a protocol for synchronizing the clocks of computer systems over
packet-switched data networks.
Note
The Server Address field supports both IPv4 and IPv6 addresses.
5 You can configure up to three DNS servers. The Server Address field supports both IPv4 and IPv6
addresses. In the Topology Configuration section, the physical interface of the Wireless Appliance
data port, the IP Address and Netmask values for the data port, and the ID display as read-only
values.
For information on how to obtain a temporary IP address from the network, click How to obtain a
temporary IP address.
6 Click Next.
The Management screen displays.
7 In the AP Password section, enter a password for the AP. Click Unmask to display the password
characters as you type. Access Points are shipped with default passwords. You must create a new
SSH Access Password here.
Note
Passwords can include the following characters: A-Z a-z 0-9 ~!@#$%^&*()_+|-=\{}[];<>?,.
Password cannot include the following characters: / ` ' " : or a space.
8 In the Management Port section, confirm the port configuration values that were defined when the
Wireless Appliance was physically deployed on the network. If applicable, edit these values:
• Static IP Address — Displays the IPv4 address for the ExtremeWireless Appliance's management
port. Revise this as appropriate for the enterprise network.
• Netmask — Displays the appropriate subnet mask for the IP address to separate the network
portion from the host portion of the address.
• Gateway — Displays the default gateway of the network.
• Static IPv6 Address — Displays the IPv6 address for the ExtremeWireless Appliance's
management port. Revise this as appropriate for the enterprise network.
• Prefix Length — Length of the IPv6 prefix. Maximum is 64 bits.
• Gateway — Displays the default gateway of the network.
9 In the section, click V2c or V3 in the Mode drop-down list to enable SNMP, if applicable.
If you selected V2c, the Community options display:
• Read Community — Type the password used for read-only SNMP communication.
• Write Community — Type the password used for write SNMP communication.
• Trap Destination — Type the IP address of the server used as the network manager that receives
SNMP messages.
13 In the section, select the Enable checkbox to enable RADIUS login authentication, if applicable.
RADIUS login authentication uses a RADIUS server to authenticate user login attempts. RADIUS is a
client/server authentication and authorization access protocol used by a network access server
(NAS) to authenticate users attempting to connect to a network device.
• Server Alias — Type a name that you want to assign to the RADIUS server.
• IP Address — Type the RADIUS server’s IP address.
• Shared Secret — Type the password that is used to validate the connection between the Wireless
Appliance and the RADIUS server.
14 In the Mobility section, select the Enable checkbox to enable the ExtremeWireless Appliance
mobility feature, if applicable. Mobility allows a wireless device user to roam seamlessly between
different Wireless APs on different appliances.
A dialog displays, informing you that NTP is required for the mobility feature and prompting you to
confirm you want to enable mobility.
Note
If the Wireless Appliance is configured as a mobility agent, it acts as an NTP client and
uses the mobility manager as the NTP server. If the Wireless Appliance is configured as a
mobility manager, the Wireless Appliance’s local NTP is enabled for the mobility domain.
17 Click Next.
The Success screen displays.
18 Change the factory default administrator password. Enter the new password and confirm it, and
then click Save.
19 Click OK, and then Close.
The ExtremeWireless Assistant main menu screen displays.
Note
The appliance reboots after you click Save if the time zone is changed during the Basic Install
Wizard. If the IP address of the management port is changed during the configuration with
the Basic Install Wizard, the ExtremeWireless Assistant session is terminated and you will
have to log back in with the new IP address.
Although the basic installation wizard has already configured some aspects of the Wireless Appliance
deployment, you can continue to revise the ExtremeWireless Appliance configuration according to your
network needs.
For more information on the following topics, see the User Guide.
• Changing the administrator passwords
• Configuring the network time
• Applying license keys
• Configuring physical topology
• Configuring Wireless APs
• Configuring the list of servers
• Configuring DNS settings/list of DNS servers (if necessary)
• Configuring Syslog server (if necessary to dynamically upload log messages/event occurrences on
the controller)
• If required, configuring Agent access parameters
• Configuring controller network identification, including hostname and domain
• Configuring VNSs
• Configuring topologies the controller services represent
• Configuring policy parameters for user network access
• Configuring services and AP membership
• Configuring the set of VNSs mapping WLAN services to policies for default assignment
• Configuring availability
• Configuring mobility
This chapter describes how to configure and DNS (Domain Name System) services on a Windows
Server 2012 R2 or Linux server for use by ExtremeWireless Appliance and APs. In addition, the chapter
explains how to configure Network Policy Server (NPS) service on Windows Server 2012 R2. Use the
configuration processes in this chapter as a reference when configuring services.
Note
Windows Server 2012 R2 or Linux server may have a different configuration process than
what is described here. Refer to your manufacturer’s documentation for the configuration
process that is specific to your server.
When you configure DHCP for ExtremeWireless LAN () solution, you can include 078 SLP DA Option.
You must enable 078 SLP DA Option for every scope you define. A scope is a collection of IP addresses
meant to be distributed by the DHCP server to the client devices on a subnet. The SLP DA is used by:
• The Wireless APs to discover the ExtremeWireless Appliance.
Note
You may visit http://support.microsoft.com for instructions on how to install DHCP.
Configure DHCP option 43 for ExtremeWireless Appliance discovery when there is a need for a specific
AP platform to connect to a specific controller.
Creating Option 78
To create option 78 as a byte array, perform the following steps:
Configuring Option 78
To configure on Windows Server 2012 R2:
4 In the Name and Description text boxes, type the scope name and description.
This can be any name that you want, but it should be descriptive enough so that you can identify the
purpose of the scope on your network.
5 Click Next.
The IP Address Range window is displayed.
6 In the Start IP address and the End IP address text boxes, type the start and end of the IP address
range that you want to be distributed to the network.
You must use the range provided by your network administrator.
7 In the Length text box, type the numeric value of the subnet mask bits, or in the Subnet mask text
box, type the subnet mask IP address.
A subnet mask defines how many bits of an IP address to use for the network/subnet IDs and how
many bits to use for the host ID. You can specify the subnet mask by length or as an IP address. You
must use the Length (or the Subnet mask) provided by your network administrator.
8 Click Next.
The Add Exclusions window displays.
9 In the Start IP address and the End IP address text boxes, type the start and end of the IP address
range that you want to exclude from the distribution.
You must use the exclusion range provided by your network administrator.
10 Click Next.
The Lease Duration window displays.
The DHCP server assigns a client an IP address for a given amount of time. The amount of time for
which the IP address can be leased is defined in the Lease Duration window.
11 In the Days, Hours and Minutes text box, type the lease duration.
You must use the Lease Duration as specified by your network administrator.
12 Click Next.
The Configure DHCP Options window displays.
13 Select Yes, I want to configure these options now, and then click Next.
The Router (Default Gateway) window displays.
14 In the IP address text box, type the network’s default gateway and click Add.
You must use the default gateway provided by your network administrator.
15 Click Next.
The Domain Name and DNS Servers window displays.
16 In the Parent domain text box, type your company’s domain name.
You must use the Parent Domain provided by your network administrator.
17 In the Server name text box, type your server name.
You must use the server name provided by your network administrator.
18 In the IP address text box, type your server’s IP address, and then click Add.
19 Click Next.
The WINS Servers window displays.
20 Click Next.
The Activate Scope window displays.
21 Select Yes, I want to activate this scope now, and click Next.
The wizard displays the following message:
You have successfully completed the New Scope wizard.
22 Click Finish.
23 Click Start > Administrative Tool > DHCP.
The DHCP console tree displays.
The mobility agents use the SLP DA to discover the mobility manager.
Note
If there is no SLP deployment on the enterprise network, the ExtremeWireless Appliance is
configured to act as a DA by default. If you put the appliance's IP address(es) in a DHCP
server for Option 78, Wireless APs will interact with the appliance for discovery.
Similarly, the mobility agents also interact with the ExtremeWireless Appliance to discover
the mobility manager.
For example, the VCI for the Extreme Networks AP3965e is HiPath AP3965. The following table lists
the Vendor Class Identifiers for each Extreme Networks AP model.
• Option 43 sub-option code — The option 43 sub-option code for the Extreme Networks APs is type
1 (0x1).
• IP addresses of ExtremeWireless Appliances
Configuring Option 43
To configure option 43 using the Windows Server 2012 R2 DHCP, IPv4 server utility:
1 In the DHCP server utility, right-click the DHCP server icon and choose Define Vendor Classes.
You will create a new vendor class to program the DHCP server to recognize the VCI
ExtremeWireless <AP model name>.
3 In the Display name field, enter a name. In this example, AP3965 is used as the display name.
4 In the Description field, enter a short description of the vendor class: AP3965.
5 Add the Vendor Class Identifier string. Click the ASCII field, and enter the appropriate value (for
example, AP3965).
6 Click OK.
The new class is created.
7 Click Close.
8 In the DHCP server, IPv4 utility, right-click the server icon and select Set Predefined Options to add
an entry for the controller sub-option for the newly created vendor class.
The sub-option code type and the data format is used to deliver the vendor specific information to
the APs.
9 In the Option class field, select the value you configured for the vendor class and click Add.
The Option Type window displays.
1 In the server utility, right-click the Server Options folder under the DHCP scope, and select
Configure Options.
3 Click OK.
DHCP Option 43 is now configured. This DHCP option is available for all the DHCP scopes that are
configured in the DHCP server. When an AP requests vendor specific information, the DHCP server
sends the ExtremeWireless Appliance IP addresses in Option 43 to the AP.
DHCP also uses the file /var/lib/dhcp/dhcpd.leases to store the client lease database.
The first step in configuring a DHCP server is to create the configuration file that stores the network
information for the clients. Global options can be declared for all clients, or options can be declared for
each client system.
The configuration file can contain any extra tabs or blank lines for easier formatting. The keywords are
not case-sensitive and lines beginning with a hash mark (#) are considered comments.
To use the recommended mode, add the following line to the top of the configuration file:
ddns-update-style interim;
Read the dhcpd.conf man page for details about the different modes.
Some parameters must start with the option keyword and are referred to as options. Options configure
DHCP options; whereas, parameters configure values that are not optional or control how the DHCP
server behaves.
Parameters (including options) declared before a section enclosed in curly brackets {} are considered
global parameters. Global parameters apply to all the sections below it.
Note
If you change the configuration file, the changes will not take effect until you restart the DHCP
daemon with the command service dhcpd restart.
1 Click Resolve.
You can opt to enter a Shared Secret manually or have NPS generate the Shared Secret.
• Manual. Type a password that both the NPS server and the ExtremeWireless Appliance will
use to mutually authenticate. This password is case-sensitive. You can use alpha-numeric
characters. You must configure the same shared secret password for Global Settings. For
more information, see the User Guide.
• Generate. Click Generate to have NPS generate the password. Not all servers support long
generated secrets.
4 Click OK.
Related Links
Create Condition: Client IPv4 Addresses on page 66
Create Condition: Windows Groups on page 68
4 Click Next.
5 On the Specify Access Permission screen, select Access granted and click Next.
6 On the Configure Authentication Methods screen, click Add and select Microsoft: Smart
Card or other certificate. Then, click OK.
7 Click Next.
8 Configure the Idle Timeout and click Next.
9 Configure the Radius Attributes and click Next.
10 Click Finish.
9 On the Configure Authentication Methods screen, click Add and select one or more EAP
methods. Then, click OK.
10 Click Next.
11 Configure the Idle Timeout and click Next.
12 Configure the Radius Attributes. As an example, you can set the Filter-Id attribute to a wireless
controller role. This will override the default role. The following procedure illustrates how to set the
Filter-Id:
13 Click Add, select the Filter-Id attribute.
14 Click Add.
15 Click Add again and type the attribute name. The Attribute name is case sensitive and must match
the Role on the wireless controller.
16 Click OK.
17 Click Close to close the RADIUS Attribute dialog.
18 Click Next.
19 Click Finish.
You must install DNS on Windows Server 2012 R2 according to the server documentation. Visit http://
support.microsoft.com to learn how to install and configure DNS on Windows Server 2012 R2.
The instructions here are limited to Configuring DNS for Wireless APs Discovery.
For configuration on Linux, see Configuring DNS on a Linux Server on page 72.
You must now configure the Wireless APs via the ExtremeWireless Assistant.
1 Configure the Linux server to include DNS information. In the /etc/dhcp.conf file, add domain-
name-servers and domain-name DHCP options.
subnet 10.2.221.0 netmask 255.255.255.0 {
range 10.2.221.30 10.2.221.130;
Name: Controller.Availability-221.com
Address: 10.2.221.2