Before you can perform this task, you must create a network policy with an SSID with
Enterprise (WPA/WPA2 802.1X) access security, and a default RADIUS server group.
Extreme Networks devices can serve as RADIUS authentication servers and respond to
802.1X requests from other Extreme Networks RADIUS authenticators. The Extreme
Networks RADIUS server can store user accounts locally or check user login
credentials against user accounts stored externally on Active Directory or LDAP
(lightweight directory access protocol) user database servers. Use the following
steps to configure an AAA server profile.
-
Enter a profile name.
-
Enter an optional description.
-
Select the User Database type.
- Active Directory: Select to enable an Extreme
Networks RADIUS server to interoperate with an Active Directory
server.
- LDAP Server: Select to direct user account
look-ups to one or more LDAP servers.
- Local Database: Select to enable an Extreme
Networks device to support authentication for local user groups.
-
In the Additional
Settings section, enter the number of seconds for each response
scenario.
-
Select Enable Caching
of Credentials to improve performance across WAN links.
-
Select the number of seconds to retain this credential cache.
-
For Active Directory, select an
existing Active Directory user database, or select the plus sign to add a new
one.
-
For LDAP Server, select an
existing LDAP server, or select the plus sign to add a new one.
-
For the Approved
RADIUS Clients section, see Add Approved RADIUS Clients.
-
For Security Options, see Configure AAA Server Security Options.
Continue configuring the server.