About this task
Use this task to create an LDAP server with AAA Server profiles for devices
configured as RADIUS servers. LDAP servers must first be created in the network
policy workflow, and will then appear in the table in this window. You can clone an
existing LDAP server profile and customize it using the following procedures.
Procedure
-
Select a server from the table.
Note
If the table is empty, you must first create an LDAP server inside of a
network policy workflow.
-
Select the clone icon.
-
Enter a name for the cloned
server.
-
Enter an IP Address or Host
Name.
-
Enter an optional description.
-
Enter the RADIUS user base distinguished name, or the starting point for
directory server searches, such as cn=visitors, and the point in the directory
tree structure under which the server stores user accounts in its
database.
Note
ExtremeCloud IQ supports up
to 2000 users per user group. For more than 2000 users, you must separate
the users into different user groups.
-
Enter the LDAP client distinguished name used during the authentication part
of an LDAP session, such as cn=users, cn=students, dc=southamerica, ou=student,
and ou=school.
-
Enter the LDAP client distinguished name password used during the
authentication part of an LDAP session.
-
Select LDAP or
LAPDS
for the required communication protocol.
-
Enter any required Filter Attribute for searching for
elements below the baseObject.
-
Enable or disable removing the
realm, which is commonly appended to a user name and delimited with an @ sign,
from the filter.
-
Enter the LDAP server Destination
Port.
-
Enable or disable
Transport Layer Security authentication and
encryption.
If you enabled it, fill in
these fields:
CA
Certificate File: Select the default certification authority
digital certificate type.
LDAP Client
Certificate: Select the default LDAP client digital
certificate type.
Client Key
File: Select the default client key digital certificate
type.
Key
File Password: Enter the client key file
password.
Verify
Server: Choose how often the Extreme Networks device checks the
relationship between a certificate and its server: Try (on first
authorization or authentication), Never, or
Demand (as required, on demand).
-
Select Save.