ECS-ExtremeWireless Cloud Student Guide v21.04
ECS-ExtremeWireless Cloud Student Guide v21.04
v21.04
1
Extreme uses Cloud Management, Machine Learning, and Artificial Intelligence to
radically simplify and secure the Access Network.
Our innovations and global cloud footprint radically simplify Access Network
operation for 30,000+ customers and 10+ million daily users.
2
Welcome
Facilities Discussion
Introductions
Extra Training Resources
Course Overview
Questions
3
Introductions
4
Extreme Dojo
5
Extreme Support Portal
6
The Hub
https://community.extremenetworks.com/
7
The Hub (mobile access)
8
Product Documentation
https://docs.aerohive.com/330000/docs/help/english/ng/Content/reference/docs/docs.htm
https://docs.aerohive.com/330000/docs/help/english/ng/Content/reference/docs/docs.ht
m
9
ExtremeCloud™ IQ Videos
10
Agenda – Part 1/3
Solution Overview Lab 3
Distributed Architecture Overview Managing Clients, Users and Client
Creating an ExtremeCloud Account 360
Predictive Modeling Lab 4
Lab 1 Managing devices
WLAN Design Concepts Lab 5
Device Discovery and Provisioning User Profiles
Lab 2 Secure WLAN using 802.1X/EAP
Switch Provisioning Lab 6
Guided Configuration & Object Troubleshooting 802.1X
Management Lab 7
Create a Network Policy
©2021 Extreme Networks, Inc. All rights reserved
11
Agenda – Part 2/3
12
Agenda – Part 2/3
Essentials Applications
ExtremeAirdefense Essentials
ExtremeGuest Essentials
ExtremeIOT Essentials
ExtremeLocation Essentials
ExtremeCloudIQ CoPilot
13
Solution Overview
14
ExtremeCloud™ IQ
15
ExtremeCloud™ IQ
16
ExtremeCloud™ IQ
17
ExtremeCloud™ IQ
18
ExtremeCloud™ IQ
19
ExtremeCloud™ IQ
20
ExtremeCloud™ IQ – Data Retention and Cloud Providers
21
EXTREME CLOUD IQ ARCHITECTURE
Monolithic vs Microservices
22
ExtremeCloud™ IQ
Data Security and Privacy
First major cloud-managed networking vendor to
attain ISO/IEC 27001 certification for its
Information Security Management Systems
(ISMS)
This has now been augmented by ISO/IEC 27017
and ISO/IEC 27701 for all cloud services AND
applications
ExtremeCloud™ IQ is equipped with features that
enables our customers to address full compliance
with the European Union’s General Data
Protection Regulation (GDPR)
In addition, ExtremeCloud™ IQ provides logging
and audit tools to track these actions so our
customers can better document them
23 ©2021 Extreme Networks, Inc. All rights reserved
23
ExtremeCloud™ IQ
Private Cloud
Extreme offers the broadest range
of Cloud Networking deployment
options for access network
management: Public Cloud –
Private Cloud – Virtual Appliance.
Extreme partners and customers
with large scale requirements
above five thousand devices can
deploy their own Private Cloud
instance of ExtremeCloud IQ,
capable of managing up to one
million connected access points,
switches, and routers.
24
ExtremeCloud™ IQ
Private Cloud
25
ExtremeCloud™ IQ
Local Cloud
It’s an on-premises version of
ExtremeCloud™ IQ , typically
deployed in the customer’s private
network
A ExtremeCloud™ IQ Virtual
Appliance can manage up to 5000
devices such as APs and switches
This solution is ideal for small and
mid-size enterprises or partners who
want the power of the Cloud in
addition to complete control over their
local deployment
26
Licensing
27
Multi-vendor management
Simplify Network
Management
ExtremeCloud™ IQ provides
management of 3rd party switches
from our technology partners to
unify and simplify your access
layer
28
Wi-Fi 6 (802.11ax)
What is new?
29
OFDMA
True multi-user communications
Resource Unit (RU)
Client 1
Client 2
Subcarriers
Client 3
Channel width
Client 4
Client 5
Client 6
Time
30
Cloud Managed Networking and Wi-Fi 6 Technical Resources
https://www.extremenetworks.com/resources/ebook/cloud-managed-networking-for-
dummies-concepts-architectures-benefits/https://www.extremenetworks.com/cloud-
technology
https://www.extremenetworks.com/resources/ebook/wi-fi-6-for-dummies
31
Dual 5 GHz Software Defined Radios (SDR)
32
Distributed Architecture Overview
Cooperative Control
33
The Evolution of Wi-Fi Architecture
1 No Control
NMS Autonomous AP
2 Centralized Controller
NMS Physical Thin AP
Controller
3 Hybrid Controller
5 Distributed Control
Cloud Distributed Control
Management
©2021 Extreme Networks, Inc. All rights reserved
Wi-Fi is continually evolving. Originally, we had access points that had no intelligence whatsoever,
and that was ok because there was limited need for co-ordination. However, as the years rolled on
and Wi-Fi was headed towards the primary access medium, things changed. We realized as an
industry that ‘control’ was required to enable a sustainable model for enterprise Wi-Fi.
This led to the development of the wireless LAN controller, a centralized box that acted as the brain
of the network. In an ideal world, we would have placed the intelligence directly into the access
points, however as the inventor of the controller stated, it would have been economically impossible
to do so with the cost of the chipsets in the day.
In recent years, as the shortfalls as controllers became widely acknowledged, speed, scale,
redundancy etc. vendors developed new methods of control functionality distribution.
First came the virtualized controller, the notion of having an access point become the controller for a
group of access points, or putting the controller into the cloud and telling the customer not to worry
about, out of sight out of mind kind of thing. All of these methods had shortcut written all over them
and each faced limitations. That lead to the acceptance of fully distributed control.
Through distributed control, the intelligence (control plane) is all placed into the access points
themselves, and the management remains centralized for ease of administration. The concept of
fully distributed control is a principle that the inventor of the controller had desired to achieve,
however it was only made possible some years later through the observance of moors law.
Distributed control combined with cloud networking increases speed, scale, and resiliency within the
network, without sacrificing the centralized design, deployment, and support of enterprise wireless
networks.
34
Why Distributed Control is important
35
Wireless LAN Control
“The brain of a WLAN”
Adaptive RF management
Enable fast and secure roaming for
clients across layer 2 (switched) and
layer 3 (routed) boundaries
Determine and enforce client
authentication and access control
policies
Client Load Balancing and
Band Steering
And Much More…
Dynamic RF management
Radio Channel Selection
Radio Power Selection
Load Balancing
Enable fast and secure roaming for clients across layer 2 (switched) and layer 3 (routed)
boundaries
Maintain IP and active sessions while roaming among APs
36
WLAN Control Plane
(Not Management)
APs with Centralized on-Premise
Wireless LAN Controllers (Cisco,
Aruba)
APs with mix of Cloud and on-
premise WLAN control functions
(Cisco/Meraki)
APs that use an elected AP as a
Controller and do some local AP
control exchange (Aruba Instant)
APs with Protocol-based Cooperative
Control and Flow-based Forwarding
(Extreme Networks)
Dynamic RF management
Radio Channel Selection
Radio Power Selection
Enable fast and secure roaming for clients across layer 2 (switched) and layer 3 (routed)
boundaries
Maintain IP and active sessions while roaming among APs
37
Extreme Distributed Architecture
------ Cooperative Control Messages
ExtremeCloud™ IQ
HQ
Network Centralized Configuration, AP OS
Management, Planning, Monitoring,
Dashboards, Analytics, and
Troubleshooting
WLAN control function with
WAN
Cooperative Control Protocols is
distributed among all APs
No centralized controller
No controller in the cloud
No controller in an AP
Branch No virtual controller
Networks
38 ©2021 Extreme Networks, Inc. All rights reserved
38
Extreme Distributed Architecture
HQ One Architecture
Network From one to thousands of APs
Same for one to thousands of offices
Flexible software update
Update one AP, or any number of APs
at any time at any location
WAN
Distributed Forwarding
Takes advantaged of the wired LAN
Uses same VLANs as those used by
wired users
Branch
Networks
39 ©2021 Extreme Networks, Inc. All rights reserved
39
APs perform all major functions
40
APs perform all major functions
…continued
OS Fingerprinting
QoS Policy enforcement – queuing and rate limiting
Fast and Secure Roaming
Voice enterprise 802.11 r/v/k and OKC
Multicast to unicast conversion
RADIUS Server, RADIUS Proxy, Cached Credentials
41
Distributed WLAN Architecture
Cooperative Control
Protocols
Exchanged among APs like
HQ
Network Routers OSPF for routers
L2 Switches
Redundancy
Built into the protocols
APs
No single point of failure
Routes around problems and
uses dynamic mesh failover
The APs can bring up a mesh to route around a problem, even if mesh is not being used by
default.
42
Central vs. Distributed Processing
Features and Applications
WLAN Controller
AP Level
More APs with Clients > CPU More APs with Clients > CPU Capacity
Capacity Decreases on Controller Increases as APs are added
43
Cooperative Control Protocols defined
44
Cooperative Control Protocols defined
45
AMRP synchronizes client information between APs
Client Details
User Profile – Identifies access policy
A Operating System
Pre-Roam Sync of Client DNS Address and DHCP Lease Info
Roaming Cache Hostname and Domain Name
IP Address and VLAN
46
AMRP synchronizes client information between APs…
47
AMRP synchronizes client information between APs
48
Creating ExtremeCloudTM IQ Account
49
Getting started with ExtremeCloud™ IQ
https://www.extremenetworks.com/cloud-networking
50
Getting started with ExtremeCloud™ IQ
51
Register your ExtremeCloud™ IQ account
52
Register your ExtremeCloud™ IQ account
53
Welcome to your ExtremeCloud™ IQ
54
Get started
55
You are ready to go!
You can now use ExtremeCloud™ IQ to monitor and manage your network
56
WLAN Design Concepts
57
dBm and mW conversions
dBm Milliwatts Radio Signal
+30 dBm 1000 mW 1 Watt
+20 dBm 100 mW 1/10th of 1 Watt
+10 dBm 10 mW 1/100th of 1 Watt
0 dBm 1 mW 1/1,000th of 1 Watt
–10 dBm .1 mW 1/10th of 1 milliwatt Very Strong
–20 dBm .01 mW 1/100th of 1 milliwatt
–30 dBm .001 mW 1/1,000th of 1 milliwatt
–40 dBm .0001 mW 1/10,000th of 1 milliwatt
–50 dBm .00001 mW 1/100,000th of 1 milliwatt
–60 dBm .000001 mW 1 millionth of 1 milliwatt Great
–70 dBm .0000001 mW 1 ten-millionth of 1 milliwatt Weak
–80 dBm .00000001 mW 1 hundred-millionth of 1 milliwatt
Do not care
–90 dBm .000000001 mW 1 billionth of 1 milliwatt
–95 dBm .0000000002511 mW Noise Floor No Signal
58
Coverage Design
Received Signal Strength
59
Coverage Design
60
Coverage Design
Receive sensitivity…
Data Rate Receive
(2.4 GHz) Sensitivity
Please note that not all client devices are created equal.
Depending on the chipset vendor, the radios of various Wi-Fi clients have
different receive sensitivity thresholds, which are mapped to different data rates.
61 ©2021 Extreme Networks, Inc. All rights reserved
61
Coverage Design
Receive sensitivity…
Data Rate Receive
(2.4 GHz) Sensitivity
This means that two client radios receiving an RF signal with the same strength
may use a different data rate for modulation and demodulation. Despite
variances between devices and sensitivity, there is still a common denominator
62 ©2021 Extreme Networks, Inc. All rights reserved
62
Coverage Design
Receive sensitivity…
Data Rate Receive
(2.4 GHz) Sensitivity
A received signal of –70 dBm or higher usually guarantees that a client radio will
use one of the highest data rates that the client is capable of
63 ©2021 Extreme Networks, Inc. All rights reserved
63
Coverage Design
Signal-to-noise ratio (SNR)
Received signal
= -70 dBm
Received signal
= -88 dBm
SNR = 25 dB SNR = 7 dB
64
Coverage Design
Signal-to-noise ratio (SNR)
65
Coverage Design
Signal-to-noise ratio (SNR)
Recommendations:
20 dB or greater
25 dB or greater for voice-grade
WLAN
29 dB or greater to use 256 QAM
35dB or greater to use 1024 QAM
66
Coverage Design
Voice
When you are designing
for voice, SNR is the most
important RF metric.
Also keep in mind that as
a result of free space path
loss (FSPL), the effective
range for –67 dBm clients
will be less distance than
clients receiving a –70
-65 dBm received signal
25 dB SNR
dBm signal.
For every 3 dB of loss,
-70 dBm received signal
20 dB SNR the received signal is half
strength.
67 ©2021 Extreme Networks, Inc. All rights reserved
67
Coverage design
Dynamic rate switching
6 Mbps
68
Roaming
AP #1 AP #2
Primary Coverage: -70 dBm
BSSID #1 BSSID #2 Secondary coverage: -75 dBm
69
Roaming Threshold
https://support.apple.com/en-us/HT206207
https://support.apple.com/en-us/HT203068
70
Roaming Design
Fallacy of cell overlap
71
Primary and Secondary Coverage
72
Layer 2 retransmissions
CRC Passes
802.11 radios cannot transmit and receive at the same time and therefore cannot
detect collisions. So, if they cannot detect a collision, how do they know whether
one occurred?
73 ©2021 Extreme Networks, Inc. All rights reserved
73
Layer 2 retransmissions
74
Layer 2 retransmissions
Effects of…
Latency goes up
75
Layer 2 retransmissions
76
Layer 2 retransmissions
77
Layer 2 retransmissions
Causes
RF interference (Layer 1)
Low SNR (Layer 1) (bad design)
Adjacent cell interference (bad design)
Hidden Node (bad design)
78 ©2021 Extreme Networks, Inc. All rights reserved
78
Data Rates versus Throughput
79
Capacity design
Age old question
80
Capacity Design
Applications
Printing 1 Mbps
81
Capacity Design
Client Capabilities
82
Client Capabilities
Example
83
Capacity Design
84
Airtime Consumption
RF is a half-duplex medium
At any given time only one radio can
transmit on a frequency domain
(channel)
Everybody takes turns
85
Airtime Consumption
Multiple SSIDs
Beacon SSID #1
Beacon SSID #2
Beacon SSID #3
Multiple SSIDs create more layer two
802.11 management overhead
Beacon SSID #4 Extra set of beacons, probe
responses, etc… consume airtime
Beacon SSID #5
Beacon SSID #6
Beacon SSID #7
86
Airtime Consumption
SSID Overhead Calculator
Best Practice
Transmit maximum 3 - 4 SSIDs
87 ©2021 Extreme Networks, Inc. All rights reserved
https://apps.apple.com/us/app/revolution-wi-fi-ssid-overhead/id1041231876
87
Airtime Consumption
Consolidate SSIDs
Consolidate SSIDs:
Multiple User Profiles can be linked to
a single SSID
Different groups of users connected to
the same SSID can be assigned
different access control rules
The result is that different VLANs,
firewall policies, rate-limiting policies,
etc. can be assigned to different
groups of users
88
User Profiles
Assignment Rules
89
Airtime consumption
2.4 GHz data rates
Basic = 12 Mbps
Disabled: 11 Mbps ( Legacy
802.11b clients will not be able to
connect)
Disabled: 6 Mbps and 9 Mbps
OFDM rates
Default rates: Basic = 11 Mbps
90 ©2021 Extreme Networks, Inc. All rights reserved
90
Airtime consumption
2.4 GHz data rates
Basic = 24 Mbps
Disabled: 11 Mbps ( Legacy
802.11b clients will not be able to
connect)
Disabled: 6, 9, 12 and 18 Mbps
OFDM rates
Default rates: Basic = 11 Mbps
91 ©2021 Extreme Networks, Inc. All rights reserved
91
Improper channel reuse
Co-channel interference
If an AP on channel 1 is transmitting,
all nearby access points and clients
on the same channel within hearing
range will defer transmissions.
Channel 11 Channel 1
The result is that throughput is
adversely affected: Nearby APs and
clients have to wait much longer to
transmit because they have to take
their turn.
Channel 1 The unnecessary medium contention
Channel 6 overhead that occurs because all the
APs are on the same channel is
called co-channel interference (CCI).
92 ©2021 Extreme Networks, Inc. All rights reserved
92
Channel reuse
93
Co-channel interference (CCI)
Channel 1
Channel 6
94
Co-channel interference
Channel 1
Channel 6
95
5 GHz channel re-use scheme
100
104
108
112
116
120
124
128
132
136
140
144
36
40
44
48
52
56
60
64
20 MHz
U-NII-1 U-NII-2A U-NII-2C U-NII-3
36
116 140 40 104 64
44 136 112 36
96
High power is bad
97
Use the Environment
Concrete block
Reduces CCI
Drywall
Maximizes channel reuse
Brick
98
Use the Environment
99
Hallways are BAD!
100
One AP per room
101
One AP per room design
102
One AP per room
103
One AP per room
104
One AP per room design
Dual 5 GHz?
105
Dual 5 GHz WLAN design
106
Indoor antennas
Directional
107
Indoor antennas
Warehouse
108
Indoor antennas
Warehouse
Because many aisles are very long, directional antennas are often also
mounted from the ceiling.
As shown, the ceiling-mounted directional antennas are mounted in the center
of the aisles to provide coverage in combination with the directional antennas
mounted on the walls.
109 ©2021 Extreme Networks, Inc. All rights reserved
109
Indoor antennas
Directional
110
Predictive Modeling
111
Login to ExtremeCloud™ IQ
Students Number Assignment
https://extremecloudiq.com/login
112
Predictive Modeling
Create Top Level Map
113
Predictive Modeling
Create Top Level Map
114
Predictive Modeling
Instructor Creates Top Level Map
115
Predictive Modeling
Create Top Level Map
Notice the top level Tier 1 map name is called Global View
Three other tiers: Location, Building and Floor are automatically created
Admin has the ability to upload a floor plan or draw a floor plan
116
Predictive Modeling
Close pop-up
117
Predictive Modeling
Map tree controls
118
Lab 1: Predictive Modeling
119
Device Discovery and Provisioning
120
Device Redirection Services
For ExtremeCloud ™ IQ
Extreme Cloud Redirector at cloud.aerohive.com
150.136.193.180
Devices
121 ©2021 Extreme Networks, Inc. All rights reserved
121
AP and ExtremeCloud ™ IQ redirector workflow
AP calls home (redirector)
HM-Cloud initially
Redirector Redirector assigns AP to
CAPWAP master in its
designated HM-Cloud
1 2 regional data center.
AP calls the CAPWAP
3 master
CAPWAP
Master
CAPWAP master assigns
4
AP to a designated
CAPWAP
Server File Server CAPWAP server
5 AP talks with HM-Cloud
5 through CAPWAP server,
and file server
122 ©2021 Extreme Networks, Inc. All rights reserved
122
Device auto discovery of ExtremeCloud ™ IQ on-premises
On-Premises Virtual Appliance IP Address
123
Device auto discovery of ExtremeCloud ™ IQ on-premises
On-Premises Virtual Appliance IP Address
Devices
DHCP Request
Vendor Class Identifier “AEROHIVE”
Option 60
DNS Query
The device performs a DNS lookup for
hivemanager.yourdomain
DNS Server
Extreme Cloud
On-Premises DNS Response
IP address of Extreme Cloud On-Premises
124 ©2021 Extreme Networks, Inc. All rights reserved
124
Device auto discovery of ExtremeCloud ™ IQ on-premises
On-Premises Virtual Appliance IP Address
Devices
CAPWAP Response
IP address of Virtual Appliance on local subnet
CAPWAP Discovery
Extreme devices contact the redirector
redirector.aerohive.com
Extreme Cloud
On-Premises IP address of Virtual Appliance at your data
center
125 ©2021 Extreme Networks, Inc. All rights reserved
125
Device auto discovery of ExtremeCloud ™ IQ on-premises
On-Premises Virtual Appliance IP Address
Redirector at cloud.aerohive.com
Devices hivemanager.yourdomain
126 ©2021 Extreme Networks, Inc. All rights reserved
126
Management Protocols & Device Updates
ExtremeCloud ™ IQ to AP device
management traffic:
CAPWAP
UDP 12222
TCP 80 Note
RadSec Firewalls need to allow outbound traffic from
the management interfaces on these ports.
TCP 2083
Firmware Updates, File transfers and Switch
Management
TCP 443
(Cooperative
Control Protocols)
https://extremecloudiq.com/support/US_East.html
127
Add Devices
Quick Add
128
Add Devices
Quick Add
129
Device Serial Numbers
The most common method is to upload serial numbers using the CSV file option
It is recommended to upload serial numbers as soon as the CSV file arrives in
your email
The workflow for onboarding Dell N-Series Switches is nearly identical. Select
Other for the Device Make and use the Dell Service Tags and the Serial
Numbers.
130 ©2021 Extreme Networks, Inc. All rights reserved
130
Device Serial Numbers
131
Device Serial Numbers
132
Device Serial Numbers
APs with firmware older than HiveOS 6.4r1 cannot connect to HiveManager
APs with firmware below HiveOS 6.5r3a will automatically update.
We highly recommended that APs use IQEngine 10.0 firmware or higher
133 ©2021 Extreme Networks, Inc. All rights reserved
133
Device Serial Numbers
Once APs are connected the CAPWAP status icon will turn green
134 ©2021 Extreme Networks, Inc. All rights reserved
134
XIQ Mobile Onboarding App
Download from App Store or Google Play
135
Lab 2: Device Discovery and Provisioning
136
Switch Provisioning
137
EXOS/VOSS switches and XIQ - Principles
ExtremeCloud IQ
SSL/HTTPS (TCP port 443) is used
TESTE – OK
138
EXOS/VOSS switch : Redirection to XIQ
In your VIQ, when you add the serial number of your EXOS device, this will tell the redirector
(hac.extremenetworks.com) to redirect the EXOS switch to that particular VIQ.
Redirector
2
201908090001
201908090002
1 201908090003
201912310001
202003310001
hac.extremecloudiq.com 202004060001
202004060002
202004130001
202004130002
202004130003
ExtremeCloud IQ
TESTE – OK
139
EXOS/VOSS switch : IQ Agent
- XMOD modular applications can run in EXOS
ExtremeCloud IQ
ExtremeXOS Kernel
140
Guided Configuration & Object Management
141
Guided Configuration
142
Guided Configuration
143
Guided Configuration
144
Guided Configuration
145
Guided Configuration
146
Guided Configuration
147
Guided Configuration
148
Additional Settings
149
Additional Settings
Instructor will discuss some of the key objects such as LLDP, NTP server, Syslog
server, etc.
150 ©2021 Extreme Networks, Inc. All rights reserved
150
Additional Settings:
Management and Native VLAN
151
Additional Settings:
Management and Native VLAN
Best Practice
Although the default MGT VLAN setting is 1, a good security best practice is to change the setting for the
MGT VLAN to a non-default value.
152 ©2021 Extreme Networks, Inc. All rights reserved
152
Object Management Menu
Centralized object
management
Admin has the ability to
create, edit or delete
objects outside of the
guided configuration
Click Configure
Click Common Objects
Dependencies can also be
viewed
Note
Some complex objects like the SSID object cannot be created in the object management menu
153 ©2021 Extreme Networks, Inc. All rights reserved
153
Clone Tool
154
Clone Tool
155
Create a Network Policy
156
Create Network Policy with a PSK SSID
Add Network Policy
157
Additional Settings
Management and Native VLAN
Best Practice
Although the default MGT VLAN setting is 1, a good security best practice
is to change the setting for the MGT VLAN to a non-default value.
158 ©2021 Extreme Networks, Inc. All rights reserved
158
Create Network Policy with a PSK SSID
Create User Profile and define user VLAN
159
Create Network Policy with a PSK SSID
Verify SSID Profile
Note
Verify that your SSID Profile has been saved
We will discuss Device Templates in
Select Additional Settings detail later in class.
160 ©2021 Extreme Networks, Inc. All rights reserved
160
Create Network Policy with a PSK SSID
Additional Settings - DNS
161
Create Network Policy with a PSK SSID
Additional Settings – Device Time Zone
162
Multiple Time Zones
Best Practice
It is highly recommended that all managed
devices be configured for the correct time zone.
This ensures that timestamps in log files are
accurate.
APs in different time zones can be assigned via
classification and Cloud Config Groups (CCGs).
Classification and CCGs are discussed in day
two.
163 ©2021 Extreme Networks, Inc. All rights reserved
163
Create Network Policy with a PSK SSID
Deploy Policy
Select the Deploy Policy tab and click the Eligible button
Select your AP - (The access point/device whose name begins with your
student number X)
Click Upload
Note
Please only select your AP. Do not upload your policy to other APs during class
164 ©2021 Extreme Networks, Inc. All rights reserved
164
Create Network Policy with a PSK SSID
Device Update
165
Create Network Policy with a PSK SSID
Upload the Network Policy
166
Overview of Update
Best Practice
Should a Delta update ever fail, best practice is to select a Complete update and force a reboot. Also,
a Complete Update is recommended if there are ever complex configuration changes to the Network
Policy.
167 ©2021 Extreme Networks, Inc. All rights reserved
167
Lab 3: Create Network Policy
168
Managing Clients, Users & Client 360
169
Manage Clients
Adjustable Timelines
Multiple sortable Columns
Multiple filters
170 ©2021 Extreme Networks, Inc. All rights reserved
170
Manage Clients
Note
Click the Edit icon to choose available columns
171 ©2021 Extreme Networks, Inc. All rights reserved
171
Manage Clients
172
Manage Clients
173
Manage Clients
174
Manage Clients
175
Manage Clients
176
Manage Clients
Blue column displays the Current Connection Status info of the client
Adjustable timeline view changes the visual display up to 30 days of
client performance and behavior data
177 ©2021 Extreme Networks, Inc. All rights reserved
177
Manage Clients
178
Manage Clients
Client Trail displays a detailed view into the roaming history of the client
179 ©2021 Extreme Networks, Inc. All rights reserved
179
Manage Clients
180
Manager Clients
Manage>Users
Based on unique credentials
View number of client devices connected from a single user
181 ©2021 Extreme Networks, Inc. All rights reserved
181
Manage Clients
182
Lab 4: Manage Clients
183
Managing Devices
184
Manage Devices
185
Manage Devices
186
Manage Devices
☞
Click and hold on any column header
Drag the column header to desired location
Release the header and the column order changes
Columns can be moved left or right
187 ©2021 Extreme Networks, Inc. All rights reserved
187
Manage Devices
188
Manage Devices
189
Filters
190
Filters
191
Manage Devices
Status Column
192
Monitor Devices
Status Column
193
Configuration Audit
194
Configuration Audit
195
Device Monitor View
196
Device Monitor View
197
Device Monitor View
198
Device Monitor View
199
Device Monitor View
200
Device View
201
Lab 5: Managing Devices
202
User Profiles
203
User Profiles
204
User Profiles
Note
Note: Instructor can now demo creating a User Profile. Instructor can also have students create a simple
User Profile.
205 ©2021 Extreme Networks, Inc. All rights reserved
205
User Profiles
206
User Profiles
207
User Profiles
VLANs
208
User Profiles
VLANs
Best Practice
VLAN object naming conventions: For a single VLAN, give the object the same name as the VLAN
number.
209 ©2021 Extreme Networks, Inc. All rights reserved
209
User Profiles
VLANs
Best Practice
VLAN object naming conventions: If multiple VLANs are defined via classification, give the object a
logical name.
210 ©2021 Extreme Networks, Inc. All rights reserved
210
User Profiles
Firewall
211
User Profiles
Tunneling
212
User Profiles
Rate Limiting
213
User Profiles
Availability Schedule
214
User Profiles
Client SLA
215
User Profiles
Data/Time Limit
216
802.1X with External RADIUS
217
Authentication 802.1X/EAP
218
802.1X with External RADIUS
WLAN users should have secure access to the wireless network. The most
secure method is to use 802.1X EAP
In the next lab, you are going to build an 802.1X EAP solution using an existing
RADIUS server
RADIUS attributes will be leveraged to assign different types of users to VLANs
and user traffic settings by assigning them to the appropriate User Profiles
219
Assignment Rules
220
Assignment Rules
221
Review: User Profile Assignment via RADIUS attributes
222
Review: User Profile Assignment via RADIUS attributes
Best Practice
Leveraging RADIUS attributes for User Profile
assignment means you only need to have a single
SSID for all your employees. Although you can
transmit as many as 16 SSIDs per radio, best
practices dictate no more than 3-4. Excessive
SSIDs create L2 overhead and degrades
performance. A common strategy is to have three
SSIDs: Employees, Voice and Guests.
223
Review: User Profile Assignment via RADIUS attributes
User Profiles can be assigned based upon any returned RADIUS attribute value
pairs
The attributes can be standard or custom
224 ©2021 Extreme Networks, Inc. All rights reserved
224
Lab 6: 802.1X with External RADIUS
225
Troubleshooting 802.1X
226
IEEE 802.1X with EAP
Access Calculating key for user…
Please! Calculating
Supplicant my key…
802.11 association Access
Authenticator (AP) RADIUS
Denied
EAPoL-start
EAP-request/identity
Access Granted
227
802.1X Troubleshooting
228
802.1X Troubleshooting
External RADIUS server could not accept the access request from the
client. Possible causes:
Expired password or user account
Wrong password
User does not exist in LDAP
User authentication or machine authentication
229 ©2021 Extreme Networks, Inc. All rights reserved
229
RADIUS Test Tool
1. Test your AP
230
RADIUS Test Tool
2. Enter test parameters
RADIUS Server
Enter a Server: IP address
(Located in the Appendix)
Extreme Networks RADIUS Client:
(Your AP)
User Name: faculty
Password: training
Click Test
231
802.1X Troubleshooting with the RADIUS Test Tool
RADIUS Test tool messages
RADIUS working:
You can also verify the
RADIUS Attributes
232 ©2021 Extreme Networks, Inc. All rights reserved
232
Lab 7: Troubleshooting 802.1X
233
Network 360
234
Network 360º
Monitor View
235
Network 360º
Monitor View
236
Network 360º
Device Health
Timeline display of the Device Health
of the APs
Flags for Channel Change Events,
DFS Events and Power Mode
Change Events
Other info includes:
Reboots,
CPU Utilization
Memory Utilization
Availability
Uptime
Alarms
237
Network 360º
Client Health
238
Network 360º
Client Health
239
Network 360º
Wi-Fi Health
240
Network 360º
Network Health
241
Network 360º
Services Health
242
Network 360º
Application Health
243
Network 360º
Security Health
244
Network 360º
Where’s My Data?
245
RF Heat Maps
246
Network 360º
Plan View
Earlier, we used the Network 360º Plan View for predictive modeling
Floorplans can also be used to view real-time RF Heat Maps
Requires real APs to be linked to the floorplans
247 ©2021 Extreme Networks, Inc. All rights reserved
247
Database Cleanup
Warning
Please make sure that no real APs are selected or else they will be deleted in the next step
248 ©2021 Extreme Networks, Inc. All rights reserved
248
Database Cleanup
249
Database Cleanup
Warning
Verify that you did not accidently delete the real APs
250 ©2021 Extreme Networks, Inc. All rights reserved
250
RF Heat Maps
251
RF Heat Maps
252
RF Heat Maps
Select Floor 1
View Heat Map
Your AP should be displayed
Click and drag your AP to different
locations on the map. Notice the
changes
In a live deployment, they should be
positioned in the location where the APs
are mounted
253
Topology Maps
Best practices
Best Practice
It is a highly recommended to link real APs to
floorplan maps
254 ©2021 Extreme Networks, Inc. All rights reserved
254
Topology Maps
Best practices
When linking real APs to floorplan maps, make sure they are positioned on the
map where the APs are actually mounted
Make sure maps/floorplans are to scale
For best RF visualization results, draw walls and set attenuation values
Best Practice
It is a highly recommended to link real APs to
floorplan maps
255 ©2021 Extreme Networks, Inc. All rights reserved
255
Lab 8: RF Heat Maps
256
Extreme’s Private Pre-shared Key (PPSK)
257
Private
Private Pre-Shared KeyPre Shared Key Overview
To put Extreme Private Pre-shared Key (PPSK) into context, we will first review a
standard Pre-shared Key and 802.1X
258 ©2021 Extreme Networks, Inc. All rights reserved
258
WPA2 Personal
Static PSK Security
259
WPA2 Personal
Static PSK Security
SSID:
SSID:
SSID: Corp-Wi-Fi
Corp-Wi-Fi Authentication:
SharedKey:
Shared Key: WPA2 Personal
bEtteRkeY
oUrKey Shared Key:
oUrKey
bEtteRkeY
SSIDs with preshared keys have several advantages. They are easy to set up, are widely
supported by clients, and do not require authentication servers, certificates, or extra
configurations on the clients. Despite these benefits, the fact that all users on the same
SSID must use the same key creates a few problems. If one user leaves or loses his or her
wireless client, the preshared keys on the access points and all clients must be changed to
protect the wireless LAN from unauthorized access.
260
WPA2 Personal
Static PSK Security
SSID:
SSID: Corp-Wi-Fi
VLAN 10 and
Corp-Wi-Fi
Authentication:
WPA2 Personal
FW-Policy-5
Also, all users on the SSID must belong to the same user profile and, therefore, share the
same QoS rate control and queuing policy, VLAN, tunnel policy, firewall policies, and
schedules. It is not possible to provide different network policies to different users on the
same SSID when applying PSK-based authentication.
261
802.1X/EAP Security
SSID: Corp-Wi-Fi
Authentication:
AP WPA2 Enterprise (802.1X)
Password: 87fe@#$%a
User 1 password: d6#$%^98f
User 2 password: 87fe@#$%a
Password: 90)356*&f User 3 password: 90)356*&f
RADIUS
262
802.1X/EAP Security
SSID: Corp-Wi-Fi
VLAN 10, FW-Policy-5
VLAN 10, FW-Policy-5
User Profile-B: AP User Profile-B:
VLAN 20, FW-Policy-6 VLAN 20, FW-Policy-6
User Profile-C: User Profile-C:
VLAN 30, FW-Policy-7 VLAN 30, FW-Policy-7
RADIUS
263
802.1X/EAP Security
EAP EAP
264
Private Pre-Shared Key (PPSK)
Password: d6#$%^98f
SSID: Corp-Wi-Fi
SSID: Corp-Wi-Fi
AP Authentication: Private PSK
Password: 87fe@#$%a PPSK1: d6#$%^98f
PPSK2: 87fe@#$%a
PPSK3: 90)356*&f
Password: 90)356*&f
RADIUS
265
Private Pre-Shared Key (PPSK)
SSID: Corp-Wi-Fi
VLAN 10, FW-Policy-5
VLAN 10, FW-Policy-5
User Profile-B: AP User Profile-B:
VLAN 20, FW-Policy-6 VLAN 20, FW-Policy-6
User Profile-C: User Profile-C:
VLAN 30, FW-Policy-7 VLAN 30, FW-Policy-7
RADIUS
266
Map User Profiles to User Groups
You also have the option to link multiple User Profiles to a single SSID
You can map different PPSK User Groups to different User Profiles
267 ©2021 Extreme Networks, Inc. All rights reserved
267
Private Pre Shared Key (PPSK)
268
PPSK Use Cases
Guest Access: Provide guest users with unique and secure credentials
BYOD: Onboarding personal and/or company issued mobile devices with unique
and secure credentials
IoT Devices: Provide unique and secure credentials for IoT devices. Many IoT
devices and/or devices only support WPA2 Personal (PSK)
269
User Groups
270
User Groups
PPSK local device storage
271
User Groups
Cloud storage
272
PPSK Credentials
Local device storage
273
PPSK Credentials
Local device storage
User DB
274
PPSK Cloud Storage
PPSK Data
Big Data
Processing
Store
AP RADSEC Authentication
Services
CAPWAP Server
Option 2: Cloud
PPSK credentials are sourced from cloud servers
RadSec needs to be permitted between Extreme AP and ExtremeCloud™ IQ
RadSec uses TLS encryption
TCP port 2083 needs to be open in outbound firewall policies
275 ©2021 Extreme Networks, Inc. All rights reserved
275
RadSec Proxies
PPSK Data
Big Data
Processing
Store
RADSEC Authentication
AP Services
CAPWAP Server
Proxies
276
Secure Access with Cloud PPSK
Internet
RadSec
Proxy AP
PPSK
Client
277
Secure Access with Cloud PPSK
Internet
RadSec
Proxy AP
Client
278
Secure Access with Cloud PPSK
Internet
RadSec
4
Proxy AP
Client
279
Identity APIs
280
RadSec Proxy troubleshooting
The RadSec Proxy icon indicates APs that are proxies: Monitor > Devices
Also, CLI command can be used from any AP to see which of the RadSec
proxies is being used by that AP: show idm
281 ©2021 Extreme Networks, Inc. All rights reserved
281
RadSec Proxy troubleshooting
282
PPSK Advanced Settings
Selecting fewer than 3 devices can prevent users from connecting essential devices (laptop,
tablet, phone) whereas more than 3 can allow unauthorized key sharing among users
283
Monitor Users
Manage>Users:
Locate your User Name in the list and click it
Because PPSK offers unique credentials we can monitor clients at the user
level as well as the device level
284 ©2021 Extreme Networks, Inc. All rights reserved
284
View Details
Take a minute and explore the information, including location, devices and
application reported for your user
Click X to close this window
285 ©2021 Extreme Networks, Inc. All rights reserved
285
Lab 9: Create a PPSK SSID
286
Lab 10: Create Guest Users
287
Radio Profiles
288
Object Power
AP Device Template
5Ghz 2.4Ghz
In the following later sections of the courseware, you will learn about AP Device
Templates and their relationship to Radio and SDR Profiles
289 ©2021 Extreme Networks, Inc. All rights reserved
289
Default Radio Profiles
290
Radio Profiles
291
Radio Profiles
292
Radio Profiles
293
Radio Profiles
294
Radio Profiles
Modes
295
Radio Profiles
Transmission power floor and Max Drop - ACSP Thresholds
296
Background Scan
Best Practice
In most cases, the default settings for
background scanning are recommended
By default, all APs perform background scans every 10 minutes to evaluate the
RF environment for the ACSP adaptive channel & power protocol
Background scanning is also used for WIPS
297 ©2021 Extreme Networks, Inc. All rights reserved
297
Manual Channel Selection and Manual Power Setting
Limit Channel Selection
Best Practice
298
Channel Selection
Limit Channel Selection
Best Practice
With some rare exceptions, the default
channels of 1, 6 and 11 should always be
used for channel selection in the 2.4 GHz
frequency band.
Defines the default channels used by the ACSP protocol for assigning channels
299
Exclude Channels 2.4Ghz
Limit Channel Selection
Best Practice
With some rare exceptions, the default of
all available channels should always be
used for channel selection in the 2.4 GHz
frequency band.
Defines the default channels used by the ACSP protocol for assigning channels
300
Exclude Channels 5Ghz
Limit Channel Selection
Best Practice
Defines the default channels used by the ACSP protocol for assigning channels
301
Exclude Channels from Auto Selection
Some older client devices do not support channel 144. Channel 144 can be
excluded from plan.
Channels 149 and 153 might be other 5 GHz channels to exclude to avoid
interference with Apple TVs using AirPlay. See QR Code
302 ©2021 Extreme Networks, Inc. All rights reserved
302
Transmit Power Control (TPC)
802.11h
Warning
TPC must also be supported by the client devices
Warning
Some legacy clients may have connectivity issues
when TPC is enabled
303 ©2021 Extreme Networks, Inc. All rights reserved
303
Transmit Power Control (TPC) 802.11h
Limit Channel Selection
TPC is disabled by
default. Two options
auto or manual
Best Practice
304
Channel Selection
Dynamic Switching - ACSP
Channel 1
By default, Extreme APs use the
Channel 11
Channel 6
cooperative-control protocol, ACSP, to
dynamically change channels if RF
conditions change
Channel
Channel11
6 Channel 11
Channel 6 Channel 1 This is true for both 2.4 GHz or 5 GHz
Adaptive channels channel changes
can be scheduled based on a variety
of RF conditions and/or based on a
percentage of corrupted traffic
305
Channel Selection
Dynamic Switching - ACSP
This is an example some of the costs and thresholds used in the ACSP protocol
The inner workings of the protocol are beyond the scope of this class
CLI command: show acsp channel-info detail
306 ©2021 Extreme Networks, Inc. All rights reserved
306
Channel Selection
Dynamic Switching - ACSP
This is an example some of the costs and thresholds used in the ACSP protocol
The inner workings of the protocol are beyond the scope of this class
CLI command: show acsp channel-info detail
307 ©2021 Extreme Networks, Inc. All rights reserved
307
Channel Selection
Dynamic Switching
308
Channel Selection
Dynamic Switching
Best Practice
Use this setting carefully so as not to
encourage excessive channel-flapping.
309
Band Steering Animation
2.4GHz Client
2.4GHz Connected
Probe @ 2.4GHz
2.4GHz
Response
The 5 GHz band has more available channels and is generally used less than the 2.4 GHz
band.
310
Band Steering Animation
Connected
2.4GHz & 5GHz at 2.4GHz
Probe
By steering some clients with 5 GHz radio support to that band, APs can provide
opportunities for better throughput to those clients operating in the quieter 5 GHz
spectrum while also easing congestion for other clients remaining in the 2.4 GHz spectrum.
Neighboring members perform band steering by suppressing responses to probe and
association requests on their 2.4 GHz radios to clients that are also probing in the 5 GHz
band. When the number of clients associated with all neighbors on their 5 GHz radios
reaches their load limits, the APs suspend band steering. They automatically resume it
again when their 5 GHz radios are no longer overloaded.
311
Band Steering Animation
Connected
2.4GHz & 5GHz at 5GHz
Probe
5GHz
Response
The APs also allow you to load balance clients between 2.4 GHz and 5 GHz, if so desired, by
using band steering in the balance-band mode.
312
Load Balancing
313
Load Balancing
314
Radio Profile
Load Balancing Use Case
Warning
If roaming is a requirement, Load Balancing
should NEVER be used
Best Practice
Use this setting only in the environment described in this slide
315 ©2021 Extreme Networks, Inc. All rights reserved
315
Radio Profile
Load Balancing Use Case – Provide WiFi capacity for a large lecture hall
316
Radio Profiles
Advanced Radio Settings
317
Radio Profiles, 5 GHz
Note
We will now discuss settings that may be
unique to 5 GHz
318 ©2021 Extreme Networks, Inc. All rights reserved
318
5 GHz Channels
5.850
5.150 5.250 5.350 5.470 5.725 5.825
100
104
108
112
116
120
124
128
132
136
140
144
149
153
157
161
165
36
40
44
48
52
56
60
64
20 MHz
319
5 GHz Radio Profiles
Channel Bonding
Best Practice
20 MHz channels should normally be used
40 MHz channels can sometimes be used if the dynamic frequency selection (DFS) channels are enabled
320 ©2021 Extreme Networks, Inc. All rights reserved
The 40 MHz channels used by HT and VHT radios are essentially two 20 MHz OFDM
channels that are bonded together. Each 40 MHz channel consists of a primary and
secondary 20 MHz channel. The primary and secondary 20 MHz channels must be adjacent
20 MHz channels in the frequency in which they operate
320
5 GHz Radio Profiles
Channel Width
Best Practice
80 MHz wide channels should only be used as a home solution with one AP and never in an enterprise
where high capacity coverage and roaming is a goal
For enterprise deployments, select 20 MHz (or 40 MHz at most)
321 ©2021 Extreme Networks, Inc. All rights reserved
321
Bond, Channel Bond
Best Practice
322
Disable the UNII-3 Channels
5.850
5.150 5.250 5.350 5.470 5.725 5.825
100
104
108
112
116
120
124
128
132
136
140
144
149
153
157
161
165
36
40
44
48
52
56
60
64
In EU many legacy clients cannot support the channels in the UNII-3 band
This is a quick and easy way to disable all the UNII-3 channels from being
selected for use by the ACSP protocol
323 ©2021 Extreme Networks, Inc. All rights reserved
323
Dynamic Frequency Selection (DFS)
1/2
Weather 5.850
5.15 5.25 5.35 5.47 radar 5.725 5.825
100
104
108
112
116
120
124
128
132
136
140
144
149
153
157
161
165
36
40
44
48
52
56
60
64
The channels in the U-NII-2 & UNII-2e band are known as the dynamic
frequency selection (DFS) channels.
WLAN radios operating in these 5 GHz bands must support DFS to protect
WLAN communications from interfering with military or weather radar systems.
324 ©2021 Extreme Networks, Inc. All rights reserved
324
Dynamic Frequency Selection (DFS)
2/2
Weather 5.850
5.15 5.25 5.35 5.47 radar 5.725 5.825
100
104
108
112
116
120
124
128
132
136
140
144
149
153
157
161
165
36
40
44
48
52
56
60
64
If radar pulses are detected in any of these DFS channels, access points
and clients are not allowed to transmit on the same channel
325 ©2021 Extreme Networks, Inc. All rights reserved
325
Radio Profiles, 5 GHz
Radio Load Balancing
326
Radio Profiles
Radio Load Balancing
Best Practice
When APs are configured for Dual 5 GHz, it is highly recommended to enable Radio Load Balancing to
evenly distribute clients across both 5 GHz radios
327 ©2021 Extreme Networks, Inc. All rights reserved
327
Radio Profiles and AP Device Templates
Best Practice
The best way to assign Radio Profiles to multiple APs is with AP Device Templates
Cloud Config Groups and classification rules can also be used to assign different AP Templates and
different Radio Profiles to different groups of APs
328 ©2021 Extreme Networks, Inc. All rights reserved
328
Tying it all together
AP Device Template
5Ghz 2.4Ghz
In the following later sections of the courseware, you will learn about AP Device Templates and their
relationship to Radio and SDR Profiles
329 ©2021 Extreme Networks, Inc. All rights reserved
329
Lab 11: Radio Profiles
330
Device Templates
331
AP Device Templates
332
AP Device Templates
Radio Settings
Each AP device template has a visual representation of the WiFi 0 and WiFi 1
radio interfaces
An administrator can then define ”template” radio settings
333 ©2021 Extreme Networks, Inc. All rights reserved
333
AP Device Templates
334
AP Device Templates
Ethernet Settings
335
AP Device Templates
Ethernet Settings
336
AP Port Types
Configured under Device Templates or locally on the device
Uplink Port
Use this option when connecting the AP
to the WAN.
Access Port
Use this option when the AP is working in
client access mode and is connected to a
forwarding device like a switch that
supports multiple VLANs.
Trunk Port
Use this option when connecting the AP
in bridge mode to a forwarding device
such as a switch that supports multiple
VLANs
337
AP Device Templates
Radio Settings
338
Individual AP Radio Settings
339
AP Device Templates
Radio Settings
Note
The best way to assign radio profiles is with
AP templates
340
AP Device Templates
Radio Usage
341
Mesh
Mesh portals
Mesh portals
Wireless user traffic can be routed to the wired network via a mesh
backhaul, reducing installation cost and providing fault tolerance.
342 ©2021 Extreme Networks, Inc. All rights reserved
342
342
Mesh
343
343
Mesh
The channel map shows two Extreme APs meshed together using
channel 153 and two Extreme APs meshed together using channel 161
344 ©2021 Extreme Networks, Inc. All rights reserved
344
344
Mesh
Best Practice
When configuring mesh it is highly
recommended to use static channel and
power settings
Note
345
345
AP Device Templates
Radio Usage
346
AP Device Templates
Channel and Power
347
AP Device Templates
SDR Profiles
348
AP Device Templates
Wired Interfaces
349
AP Device Templates
Wired Interfaces
350
AP Device Templates
Wired Interfaces
AP Ethernet ports are, by default Uplink Ports which function as Trunk ports
The ‘all’ option does not mean that you are allowing all possible VLANs from 1
to 4095 on the trunk ports. Instead, it means that all VLANs that are configured
in the network policy are allowed for eg, if the network policy uses VLANs 1 (the
native VLAN), 110, 120, and 200, then only traffic for VLANs 1, 110, 120, and
200 will traverse across the trunk link
351 ©2021 Extreme Networks, Inc. All rights reserved
351
AP Device Templates
Advanced
352
AP Device Templates
Tying it all together
AP Device Template
5Ghz 2.4Ghz
In the next lab you will link your Radio Profiles to AP Device Templates
353 ©2021 Extreme Networks, Inc. All rights reserved
353
Lab 12: AP Device Template
354
Software Defined Radio (SDR)
355
Multi-room Design
356
Software Defined Radio
Dual Band APs
Non-Dual 5 GHz APs – 2.4 GHz radios may power off automatically
357 ©2021 Extreme Networks, Inc. All rights reserved
357
Dual 5 GHz WLAN design
358
Software Defined Radio
Dual 5 GHz APs
359
Software Defined Radio
Dual 5 GHz APs
360
Dual 5 GHz WLAN design
361
Dual 5 GHz WLAN design
362
SDR Radio Profile
Initial ACSP Process
WiFi0:
2.4GHz
RF
WiFi1: 5Ghz
ACSP SDR Redundancy Above WiFi0 stays
Channels STARTS threshold?
STARTS Detection on 2.4GHz
are
Algorithm
assigned to YES NO
both radios
ACSP-SDR
COMPLETES
363 ©2021 Extreme Networks, Inc. All rights reserved
363
SDR for APs for Dual 5 GHz
364
Lab 13: SDR Profile for Dual 5 GHz
365
Cloud Config Groups (CCG) & Classification Rules
366
Cloud Config Groups (CCG)
367
Cloud Config Groups
368
Cloud Config Groups
369
Cloud Config Groups
370
Classification Rules
371
Classification Rules
372
Classification Rules
373
Cloud Config Groups and Classification Rules
374
Classification Use Cases
VLAN Objects
Area1 Area2
Router
L2-Switch L2-Switch
375
Classification Use Cases
Captive Web Portals
Rule 1 = SJC
Rule 2 = SFO
376
Classification Use Cases
Time Zone objects
377
Classification Use Cases
Server objects
378
Classification Use Cases
AP Device Templates
379
Classification Use Cases
AP Device Templates
380
Classification Use Cases
SSIDs
381
Cloud Config Groups
From Manage>Devices select the CCG from the Column picker tool to the
right to view or assign
382 ©2021 Extreme Networks, Inc. All rights reserved
382
Classification Use Cases
VLAN Objects
10.5.8.0/24 10.5.10.0/24
User VLANS 8, 16 User VLANs 10, 20
Group 1 Group 2
Router
L2-Switch L2-Switch
SSID = CCG-X
10.5.8.99 10.5.10.99
383
Lab 14: CCG & Classification Rule
384
Deployment Optimization
385
Additional Settings
Management and Native VLAN
Best Practice
Although the default MGT VLAN setting is 1, a good security best practice
is to change the setting for the MGT VLAN to a non-default value.
386 ©2021 Extreme Networks, Inc. All rights reserved
386
Using Trunked Ports and VLANs
802.1Q trunk:
VLAN 1 – Native VLAN
VLAN 2 – Management VLAN
VLAN 5,10,20 – User VLANs
802.1Q
SSIDs:
Employee 802.1X VLAN 5
Device PPSK VLAN 10
Multiple user VLANs will require 802.1Q tagging Guest PPSK VLAN 20
387
Extreme APs and VLANs guidelines
The AP native VLAN (untagged) must match the native VLAN setting on the
switch
The Native VLAN is for untagged traffic
388 ©2021 Extreme Networks, Inc. All rights reserved
388
Example
Wrong Settings – Native VLAN mismatch
Traffic from the AP management interface to the LAN will be untagged. The
switch will drop or dump the AP management traffic in an incorrect VLAN.
To correct this, the native VLAN on the Extreme AP must match the native
VLAN on the switch
389 ©2021 Extreme Networks, Inc. All rights reserved
389
Configuration Rollback Timer
390
Configuration Rollback Timer
391
Configuration Rollback Timer
392
Configuration Rollback Timer
After a new configuration (NC) update, the main cause of APs not being able to
reach ExtremeCloud™ IQ via CAPWAP is that the management VLAN of the
AP does not match the switch management VLAN
This will trigger the rollback timer.
CAPWAP traverses via the management VLAN
393 ©2021 Extreme Networks, Inc. All rights reserved
393
Diagnostic Tools
394
Device Diagnostic Tools
395
Device Diagnostic Tools
Manage>Tools>Utilities
396
Device Diagnostic Tools
397
Device Diagnostic Tools
Ping
398
Device Diagnostic Tools
Ping
You can perform a remote ping from the AP’s management interface
Type 8.8.8.8
Click PING
399 ©2021 Extreme Networks, Inc. All rights reserved
399
Scenario
Client cannot get an IP address
802.1Q
Switch Router IP Helper DHCP Server
169.254.255.202
VLANS 2, 8, 10 10.5.1.10 10.5.1.10
400
Scenario
Client cannot get an IP address
DHCP request
Lease offer
NAK
802.1Q
Switch Router IP Helper DHCP Server
169.254.255.202
VLANS 2, 8, 10 10.5.1.10 10.5.1.10
401
Points of failure
802.1Q
Switch Router IP Helper DHCP Server
169.254.255.202
VLANS 2, 8, 10 10.5.1.10 10.5.1.10
402
VLAN Probe
Manage>Tools>Utilities
Select VLAN Probe
403 ©2021 Extreme Networks, Inc. All rights reserved
403
VLAN Probe
Select your AP
Click VLAN Probe
404 ©2021 Extreme Networks, Inc. All rights reserved
404
VLAN Probe
405
VLAN Probe
406
Common CLI Commands
show capwap client
CAPWAP client: Enabled
CAPWAP transport mode: UDP
RUN state: Connected securely to the CAPWAP server
CAPWAP client IP: 192.168.255.135
CAPWAP server IP: 34.253.190.204
ExtremeCloud™ IQ Primary Name:cloud-ie-cws-
2.aerohive.com
Used to verify that the AP is
ExtremeCloud™ IQ Backup Name: hmng-prd-ie-cwpm- communicating with
01.aerohive.com
CAPWAP Default Server Name: redirector.aerohive.com
ExtremeCloud™ IQ via the
Virtual ExtremeCloud™ IQ Name: VHM-IQJNIDWE CAPWAP management protocol
Server destination Port: 12222
CAPWAP send event: Enabled
CAPWAP DTLS state: Enabled
CAPWAP DTLS negotiation: Disabled
DTLS next connect status: Enable
DTLS always accept bootstrap passphrase:
Enabled
DTLS session status: Connected ...
407
Common CLI Commands
show station
show interface
show acsp neighbor
show version detail
408
ML Insights and Reports
409
ML Insights
410
ML Insights
Network Scorecard
411
ML Insights
Comparative Analytics
412
ML Insights
Proximity
413
ML Insights
Presence
414
Reports
415
Diagnostics
Diagnostics
Top APs by:
Channel Utilization
CPU Usage %
Retries
416
Inventory
Inventory
Device Count Rollup
Configuration Status
User Profiles & Groups
Device Count by
Model
OS Version
Location
417
Lab 15: ML Insights and Reports
418
Administration
419
ExtremeCloud™ IQ Administration
Global Settings
Make changes that affect your account and your entire enterprise
Switch ExtremeCloud™ IQ account
Change from one ExtremeCloud™ IQ account to another if you
have more than one associated with your login credentials.
About ExtremeCloud™ IQ
Version information and regional datacenter names.
Communications
What’s new & planned for the near future in ExtremeCloud™ IQ
ISO 27001 Certificate
Logout
End your current session
420
ExtremeCloud™ IQ Administration
Communications
The communications link
contains information about
what is New in
ExtremeCloud™ IQ, news
about features that are coming,
previews, and any important
notifications such as upgrade
windows
421
ExtremeCloud™ IQ Administration
Communications
422
Global Settings
Account Management
423
Account Management
Administrator Accounts
424
Account Management
Internal Admin Account
425
Account Management
Internal Admin Account
Email Address: Enter internal
company email address
Name: Enter name
Idle Session Timeout: Enter a value
between 5 and 240 minutes
426
Account Management
Internal Admin Account
427
Account Management
Internal Admin Account
428
Account Management
External Admin Account
Access can also be granted to outside users: Admin / Users from outside the
organization (resellers, distributors…)
To create an external admin account, select ⦿ Grant access to outside users
Important: Outside users must have existing ExtremeCloud™ IQ Cloud admin
accounts
Admin Accounts are checked against their email address
429 ©2021 Extreme Networks, Inc. All rights reserved
429
Account Management
External Admin Account
430
Role Based Access Control (RBAC)
431
Role Based Access Control
432
Role Based Access Control
433
Role Based Access Control
434
Role Based Access Control
435
Role Based Access Control
436
Global Settings
License Management
437
Global Settings
Device Management Settings
438
Global Settings
ExtremeCloud™ IQ Logs
439
Firmware Updates
440
Device Update
IQEngine Firmware
441
Device Update
IQ Engine Firmware
442
Device Update
IQEngine Firmware
show version detail
443
Device Update
IQEngine Firmware
444
Essentials Applications
445
ExtremeAirDefense Essentials
446
ExtremeAirdefense Essentials
44
©2021 Extreme Networks, Inc. All rights reserved
7
447
ExtremeAirdefense Essentials
44
©2021 Extreme Networks, Inc. All rights reserved
8
448
ExtremeGuest Essentials
449
ExtremeGuest Essentials
45
0
©2021 Extreme Networks, Inc. All rights reserved
450
ExtremeGuest Essentials
45
©2021 Extreme Networks, Inc. All rights reserved
1
451
ExtremeIOT Essentials
452
ExtremeIOT Essentials
45
©2021 Extreme Networks, Inc. All rights reserved
3
453
ExtremeIOT Essentials
45
4
©2021 Extreme Networks, Inc. All rights reserved
454
ExtremeLocation Essentials
455
ExtremeLocation Essentials
45
©2021 Extreme Networks, Inc. All rights reserved
6
456
ExtremeLocation Essentials
457
ExtremeCloudIQ CoPilot
458
ExtremeCloudIQ CoPilot
45
9
©2021 Extreme Networks, Inc. All rights reserved
459
ExtremeCloudIQ CoPilot
CoPilot proactively eliminates the noise, significantly reducing the number of false alarms that can
consume IT administrators’ time. CoPilot delivers clear insights and recommendations, that lead to fewer
hours wasted, less risk, and an enhanced user experience.
EXPLAINABLE ML/AI
CoPilot provides explainable recommendations which enable you to see, verify, and trust the data behind
every recommendation. By validating network data with human intelligence, CoPilot learns and evolves,
resulting in constant optimization and fast troubleshooting
CoPilot reduces risk by proactively detecting anomalies before they become outages. It gathers and
analyses data in real time, correlates it with other information, identifies patterns and provides human-like
guidance on how to address a problem even before it arises
46
0
©2021 Extreme Networks, Inc. All rights reserved
460
ExtremeCloudIQ CoPilot
46
1
©2021 Extreme Networks, Inc. All rights reserved
461
ExtremeCloudIQ CoPilot
46
2
©2021 Extreme Networks, Inc. All rights reserved
462
Questions?
Any
Questions?
46
©2021 Extreme Networks, Inc. All rights reserved
3
463
Survey
464
46
©2021 Extreme Networks, Inc. All rights reserved
5
465