Note
NAI Routing cannot be enabled for a Local Onboarding AAA Policy. RADSEC and UDP enabled servers can be associated with realms. Dynamic Peer Discovery (RFC 7585) for the specific UDP Server within the realm entry must be Disabled.Identifies a group of access points. The Call Station ID is often configured in a large network using an external NAC or RADIUS server. Possible values are:
Note
Call Station ID allows for Zone authentication with a Centralized site.The appliance sends the accounting requests to a remote RADIUS server.
Note
Not applicable when NAI Routing is enabled.Select the availability behavior for RADIUS servers. Valid values are: Failover or Load Balance.
Note
Configure one server for both Accounting and Authentication purposes.Note
The RADIUS Status message (RFC 5997) indicates if the RADIUS server is accessible.Note
The RADIUS Status message (RFC 5997) indicates if the RADIUS server is accessible.Note
There is no correlation between the RADIUS server that is used for authentication and the RADIUS server that is used for accounting.Note
Not applicable when NAI Routing is enabled.Determines the server selection mode when accounting packets are sent to a single server. When the selected accounting server does not respond to the accounting requests, the accounting packets are sent to the next configured accounting server. The selection applies to all Services and to all sites on ExtremeCloud IQ Controller.
For controllers in an availability pair, the primary and backup servers must be synchronized when the WLAN Services are synchronized. (For more information, see Availability Pair Settings. If the primary server has failed resulting in a backup server being used for authentication, the controller periodically sends a "Health Check" to the primary server to see if it has recovered. If the primary server has recovered, the controller starts using the primary server for all new authentications. All authentications in progress continue to use the backup server.
Note
There is no correlation between the RADIUS server that is used for authentication and the RADIUS server that is used for accounting.Note
Not applicable when NAI Routing is enabled.Note
Mid-session requests and the Initial Server Request for Location as described in RFC5580 are not supported.Note
Site Location details are reported in LOCATION-DATA. For more information on Site Location information, see Site Location.Consecutive failed Authentications must be received at the ExtremeCloud IQ Controller in the Elapsed time for failed Authentications (Seconds) for the Quiet Timeout (Seconds) to start. After the quiet timeout expires, the client‘s RADIUS requests are forwarded to the RADIUS server again.
Note
In Failover mode, the Deny list is published to the peer ExtremeCloud IQ Controller.Note
Not applicable when NAI Routing is enabled.Note
Not applicable when NAI Routing is enabled.Note
Realm entries are available when NAI Routing is selected. Up to four realm entries are supported per AAA policy and each realm supports four Authentication servers and four Accounting servers.To add a new realm entry:
Configure the Realm Name in accordance with the user domain name.
Allow a realm entry to reference a UDP server. Note that for this configuration, NAI Realm Routing in AAA Policy needs to be Enabledand Dynamic Peer Discovery (RFC 7585)for the specific UDP Server within the realm entry needs to be Disabled.
Use the NAI Routing in the RADIUS packet to dynamically discover the RADIUS server for the realm. Enter an asterisk (*) as the realm name and enable Peer Discovery in the RADIUS Settings. Dynamic Discovery eliminates the need for static configuration of the server IP address.
When the realm name specifies an asterisk, it matches any realm specified in the
Username attribute. If the realm specifies a string, matching looks for an @ in the
Username RADIUS attribute and performs an exact, case insensitive match between what
comes after the @ and the name of the realm. For example, if the received Username
RADIUS attribute is anonymous@example.com
, then the lookup is for
example.com
. If the realm name starts with a /, the name is treated
as a regular expression. A case insensitive regular expression match is performed
using the regular expression on the value of the entire Username attribute. A trailing
/ indicates the end of the regular expression. A trailing / is optional.