<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: Test wlan that will uses eap ms-chapv2  self-controller to authenticate in ExtremeWireless (WiNG)</title>
    <link>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26661#M2652</link>
    <description>So am I correct in thinking I need to use an external LDAP server with the Radius-onboard the RFS7k ?&lt;BR /&gt;
&lt;BR /&gt;
For this test I dont want to use certficates</description>
    <pubDate>Mon, 04 Sep 2017 16:26:00 GMT</pubDate>
    <dc:creator>Phil_storey</dc:creator>
    <dc:date>2017-09-04T16:26:00Z</dc:date>
    <item>
      <title>Test wlan that will uses eap ms-chapv2  self-controller to authenticate</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26643#M2634</link>
      <description>I have created on onboard Radius and role based firewall, ( sort of )&lt;BR /&gt;
so this is what I have done so far,&lt;BR /&gt;
&lt;BR /&gt;
from the CLI&lt;BR /&gt;
#conf&lt;BR /&gt;
# radius-server-policy RADIUS&lt;BR /&gt;
# commit write&lt;BR /&gt;
#radius-group Guest&lt;BR /&gt;
#guest&lt;BR /&gt;
#..&lt;BR /&gt;
radius-group Corp&lt;BR /&gt;
#..&lt;BR /&gt;
radius-user-pool CORP-USER&lt;BR /&gt;
User UKROI password #976301234 group corp&lt;BR /&gt;
#commit write&lt;BR /&gt;
#profile rfs7000 default-rfs7000&lt;BR /&gt;
#use radius-server--policy RADIUS&lt;BR /&gt;
#commit write&lt;BR /&gt;
&lt;BR /&gt;
# role-policy RBFW&lt;BR /&gt;
#user-role Guest precedence 1&lt;BR /&gt;
#assign vlan 999&lt;BR /&gt;
#ssid contains Guest&lt;BR /&gt;
#..&lt;BR /&gt;
#user-role Corp precedence 2&lt;BR /&gt;
#assign vlan 1000&lt;BR /&gt;
#group exact Corp&lt;BR /&gt;
#commit write&lt;BR /&gt;
#aaa-policy INTERNAL-AAA&lt;BR /&gt;
#authentication server 1 onboard-controller&lt;BR /&gt;
I have created a wlan and assigned the aaa-policy INTERNAL_AAA&lt;BR /&gt;
&lt;BR /&gt;
then in the ap profile under settings I have added the RBFW in the wireless client role policy&lt;BR /&gt;
&lt;BR /&gt;
The problem I have&lt;BR /&gt;
I only have two prodution vlan's  so I can not put the AAA server to these, but I need to get to a server on the main VLAN&lt;BR /&gt;
&lt;BR /&gt;
I can see the Dot1x wlan that is part of the test, If I use my mobile phone and try to connect it prompts for a usernsme and a password as it should, I then put thses details is &lt;BR /&gt;
select the ms-chapv2, then you have an option about certificate he I select none&lt;BR /&gt;
then under the username it show anonymous &lt;SKIP this="" as="" i="" have="" a="" password=""&gt;&lt;BR /&gt;
then drop to password enter this&lt;BR /&gt;
then it shows connecting then gives up. &lt;BR /&gt;
Now I think its due to the fact that Vlan 999 &amp;amp; 1000 do not have any dhcp server to give the device and IP&lt;BR /&gt;
&lt;BR /&gt;
So can I setup a dhcp server on the RFS7k ( wing 5.8.5 ) that will only dish out addresses on the dot1x wlan ? then route off to our main vlan to attach to atest server&lt;BR /&gt;
&lt;BR /&gt;
Lot of information and questions - but any help appreciated&lt;BR /&gt;
&lt;BR /&gt;&lt;/SKIP&gt;</description>
      <pubDate>Tue, 13 Jun 2017 19:40:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26643#M2634</guid>
      <dc:creator>Phil_storey</dc:creator>
      <dc:date>2017-06-13T19:40:00Z</dc:date>
    </item>
    <item>
      <title>RE: Test wlan that will uses eap ms-chapv2  self-controller to authenticate</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26644#M2635</link>
      <description>The RFS can act as a DHCP server quite easily&lt;BR /&gt;
&lt;BR /&gt;
For example:&lt;BR /&gt;
&lt;BR /&gt;
dhcp-server-policy RFS&lt;BR /&gt;
 dhcp-pool Guest&lt;BR /&gt;
  network 10.254.254.0/24&lt;BR /&gt;
  address range 10.254.254.10 10.254.254.254 &lt;BR /&gt;
  default-router 10.254.254.1&lt;BR /&gt;
  dns-server 8.8.8.8 8.8.4.4In the RFS's config you need to "use" the dhcp server policy to activate it.&lt;BR /&gt;
&lt;BR /&gt;
You also need to have a switch virtual interface vlan defined in the same subnet, and this same vlan # must be used in the WLAN config.&lt;BR /&gt;
&lt;BR /&gt;
You can use the "show ip dhcp status" command to verify that the DHCP server is actually running.&lt;BR /&gt;
&lt;BR /&gt;
Lastly, how do you plan on getting return traffic back to vlan 999 or 1000 ?    IE: if a host on vlan 999 communicates with server X, it will receive the packet just fine, but how is it going to know where to send the reply to? &lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 13 Jun 2017 20:01:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26644#M2635</guid>
      <dc:creator>Andrew_Webster</dc:creator>
      <dc:date>2017-06-13T20:01:00Z</dc:date>
    </item>
    <item>
      <title>RE: Test wlan that will uses eap ms-chapv2  self-controller to authenticate</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26645#M2636</link>
      <description>Hi Andrew&lt;BR /&gt;
    thanks for the very swift response,  So I have setup the test wlan the device that will connect via this is a tablet, all the test wlan is for is to prove that our device will support peap.&lt;BR /&gt;
so the devBod at our place has asked if its possible to&lt;BR /&gt;
connect to the dot1x network - with a username and passord that he has supplied me, then for it to connect to a test server on a different vlan ( vlan 1 )&lt;BR /&gt;
&lt;BR /&gt;
.&lt;BR /&gt;
so on the switch there is no DHCP server running.&lt;BR /&gt;
&lt;BR /&gt;
so the device will be on vlan 999 but the test server is on vlan 1. ( it looks like this might get complicated )&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 13 Jun 2017 20:23:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26645#M2636</guid>
      <dc:creator>Phil_storey</dc:creator>
      <dc:date>2017-06-13T20:23:00Z</dc:date>
    </item>
    <item>
      <title>RE: Test wlan that will uses eap ms-chapv2  self-controller to authenticate</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26646#M2637</link>
      <description>If you want to test proof of concept, I would suggest you make your test wlan terminate on vlan 1.  This will keep it simple and allow you to demonstrate the peap authentication without having to re-engineer your network.&lt;BR /&gt;
&lt;BR /&gt;
There is no restriction on having multiple WLANs with different security levels all connect to the same vlan.  &lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 13 Jun 2017 20:29:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26646#M2637</guid>
      <dc:creator>Andrew_Webster</dc:creator>
      <dc:date>2017-06-13T20:29:00Z</dc:date>
    </item>
    <item>
      <title>RE: Test wlan that will uses eap ms-chapv2  self-controller to authenticate</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26647#M2638</link>
      <description>I think I tried that, but I must have done something wrong, as all the users on the wifi were being prompted for a username and password, I must have done something wrong with regards the AAA server ? - there is no AAA server/service on vlan1.&lt;BR /&gt;</description>
      <pubDate>Tue, 13 Jun 2017 20:43:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26647#M2638</guid>
      <dc:creator>Phil_storey</dc:creator>
      <dc:date>2017-06-13T20:43:00Z</dc:date>
    </item>
    <item>
      <title>RE: Test wlan that will uses eap ms-chapv2  self-controller to authenticate</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26648#M2639</link>
      <description>The AAA service is only used on the WLAN if you call for it to be used.  I suspect the role policy might have something to do with that.  In reality you don't really need the role policy here.  You're trying to change the vlan based on the name of the ssid, but that is something that you can define in a wlan.&lt;BR /&gt;
&lt;BR /&gt;
Consider the following:&lt;BR /&gt;
&lt;BR /&gt;
wlan corp&lt;BR /&gt;
ssid corp&lt;BR /&gt;
vlan 1&lt;BR /&gt;
encryption-type ccmp&lt;BR /&gt;
authentication-type none&lt;BR /&gt;
wpa-wpa2 psk 0 some-secret-key&lt;BR /&gt;
...&lt;BR /&gt;
wlan test&lt;BR /&gt;
ssid test&lt;BR /&gt;
vlan 1&lt;BR /&gt;
encryption-type ccmp&lt;BR /&gt;
authentication-type eap&lt;BR /&gt;
use aaa-policy your-aaa-server-policy&lt;BR /&gt;
...&lt;BR /&gt;
&lt;BR /&gt;
In the above scenario both corp and test are using vlan 1, but corp uses WPA2-PSK and test uses WPA2-Enterprise (dot1x).&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 13 Jun 2017 20:53:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26648#M2639</guid>
      <dc:creator>Andrew_Webster</dc:creator>
      <dc:date>2017-06-13T20:53:00Z</dc:date>
    </item>
    <item>
      <title>RE: Test wlan that will uses eap ms-chapv2  self-controller to authenticate</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26649#M2640</link>
      <description>Hi Andrew&lt;BR /&gt;
    I have set the wlan to use VLAN1 under the basic setting ( GUI ) - Bridging mode = Tunnel&lt;BR /&gt;
then in security its set to use Internal-AAA&lt;BR /&gt;
&lt;BR /&gt;
under Security &amp;gt; wireless Client Roles - my role - in the firewall roles I have set the Vlan ID to 1&lt;BR /&gt;
&lt;BR /&gt;
? What is the difference between onboard-controller and onboard-self - not there is no punch line to this one :-))&lt;BR /&gt;
&lt;BR /&gt;
It will not connect , tries but fails &lt;BR /&gt;
&lt;BR /&gt;
Looking at the logs, It is a tiimeout &lt;BR /&gt;
Radius server Internal-AAA timeout authenticating client xx:xx--95:D2 on wlan "Group-1-Dot1x&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 14 Jun 2017 13:25:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26649#M2640</guid>
      <dc:creator>Phil_storey</dc:creator>
      <dc:date>2017-06-14T13:25:00Z</dc:date>
    </item>
    <item>
      <title>RE: Test wlan that will uses eap ms-chapv2  self-controller to authenticate</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26650#M2641</link>
      <description>Hi Phil,&lt;BR /&gt;
&lt;BR /&gt;
With regards to the bridging mode, use the same mode that you are using on the existing wlan that is working.&lt;BR /&gt;
&lt;BR /&gt;
For the onboard question:&lt;BR /&gt;
&lt;BR /&gt;
Onboard-controller: The service runs on the controller that has adopted the APs&lt;BR /&gt;
&lt;BR /&gt;
Onboard-self: The service runs on the device (AP or controller)&lt;BR /&gt;
&lt;BR /&gt;
In your instance, you want to run it on the controller.&lt;BR /&gt;
&lt;BR /&gt;
You seem to be missing the radius server policy, this tells the radius server what groups to use, as well as what method of EAP you want to use.  In order for PEAP to function, there is also the question of certificates (server side only.  it can be a self signed certificate, but your clients won't trust it implicitly).   &lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Wed, 14 Jun 2017 19:43:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26650#M2641</guid>
      <dc:creator>Andrew_Webster</dc:creator>
      <dc:date>2017-06-14T19:43:00Z</dc:date>
    </item>
    <item>
      <title>RE: Test wlan that will uses eap ms-chapv2  self-controller to authenticate</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26651#M2642</link>
      <description>Hi Andrew, I have checked and it all seems to be there. this is from the running config&lt;BR /&gt;
&lt;BR /&gt;
role-policy RBFW&lt;BR /&gt;
 user-role GUEST precedence 1&lt;BR /&gt;
  assign vlan 1&lt;BR /&gt;
  ssid contains GUEST&lt;BR /&gt;
 user-role Corp precedence 2&lt;BR /&gt;
  assign vlan 1&lt;BR /&gt;
  group exact Corp&lt;BR /&gt;
&lt;BR /&gt;
profile ap71xx Mic71xxx&lt;BR /&gt;
 ip default-gateway 172.17.144.254&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 device-upgrade persist-images&lt;BR /&gt;
 use radius-server-policy RADIUS&lt;BR /&gt;
&lt;BR /&gt;
wlan Group-1-DOT1X&lt;BR /&gt;
 ssid Group-1-DOT1X&lt;BR /&gt;
 vlan 1&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type ccmp&lt;BR /&gt;
 authentication-type eap&lt;BR /&gt;
 radio-resource-measurement&lt;BR /&gt;
 radius vlan-assignment&lt;BR /&gt;
 use aaa-policy Internal-AAA&lt;BR /&gt;
 use ip-access-list out BROADCAST-MULTICAST-CONTROL&lt;BR /&gt;
 use mac-access-list out PERMIT-ARP-AND-IPv4&lt;BR /&gt;
&lt;BR /&gt;
!&lt;BR /&gt;
radius-group Corp&lt;BR /&gt;
 guest&lt;BR /&gt;
 policy vlan 1&lt;BR /&gt;
!&lt;BR /&gt;
radius-group GUEST&lt;BR /&gt;
 guest&lt;BR /&gt;
 policy vlan 1&lt;BR /&gt;
!&lt;BR /&gt;
&lt;BR /&gt;
Is there a password limit length  ? the oassword I have been sent to add into the system is 44 characters long with / and an = in it &lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 15 Jun 2017 12:30:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26651#M2642</guid>
      <dc:creator>Phil_storey</dc:creator>
      <dc:date>2017-06-15T12:30:00Z</dc:date>
    </item>
    <item>
      <title>RE: Test wlan that will uses eap ms-chapv2  self-controller to authenticate</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26652#M2643</link>
      <description>Hi Phil,&lt;BR /&gt;
&lt;BR /&gt;
Role-policy != Radius Policy.  You will need a radius policy to make it work.&lt;BR /&gt;
&lt;BR /&gt;
Please see section 11.6 in: &lt;A href="http://documentation.extremenetworks.com/WiNG/5.8.5/WING_5.8.5_SRG_MN-002942-01_A_EN.pdf" target="_blank" rel="nofollow noreferrer noopener"&gt;http://documentation.extremenetworks.com/WiNG/5.8.5/WING_5.8.5_SRG_MN-002942-01_A_EN.pdf&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 15 Jun 2017 18:14:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26652#M2643</guid>
      <dc:creator>Andrew_Webster</dc:creator>
      <dc:date>2017-06-15T18:14:00Z</dc:date>
    </item>
    <item>
      <title>RE: Test wlan that will uses eap ms-chapv2  self-controller to authenticate</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26653#M2644</link>
      <description>Hi Andrew&lt;BR /&gt;
       I have checked against 11.6, what I have looks the same  other than the LDAP group &lt;BR /&gt;
&lt;BR /&gt;
looking at the logs" Radius Server Internal-AAA:1 timeout authenticating client &lt;MAC address=""&gt;&lt;/MAC&gt;
I'm missing something, Maybe Monday will throw some light on it.&lt;BR /&gt;
&lt;BR /&gt;
Your help is appreciated very much it  helping me get this working  &lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Fri, 16 Jun 2017 17:26:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26653#M2644</guid>
      <dc:creator>Phil_storey</dc:creator>
      <dc:date>2017-06-16T17:26:00Z</dc:date>
    </item>
    <item>
      <title>RE: Test wlan that will uses eap ms-chapv2  self-controller to authenticate</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26654#M2645</link>
      <description>Hi &lt;BR /&gt;
 This has raised its head again, I have gone through my notes and a guide from a student lab ( although this refers to the VX900 controller  ) I'm using the RFS7k with wing 5.8.5. In the guide I have it "Onboard Radius &amp;amp; Role Based Firewall "&lt;BR /&gt;
anyway when I try and connect I get a radius timeout&lt;BR /&gt;
&lt;P class="fancybox-image"&gt;&lt;A href="https://d1uyvls174j03l.cloudfront.net/extremenetworks-us/attachment/RackMultipart20170801-74295-11dn3mz-timeou.jpg_inline.jpg" rel="image" class="fancybox"&gt;&lt;IMG src="https://d1uyvls174j03l.cloudfront.net/extremenetworks-us/attachment/RackMultipart20170801-74295-11dn3mz-timeou.jpg_inline.jpg" /&gt;&lt;/A&gt;&lt;/P&gt;&lt;BR /&gt;
&lt;BR /&gt;
I have missed somthing but not sure what ?&lt;BR /&gt;
any advise / help please&lt;BR /&gt;
&lt;I&gt;&lt;/I&gt;</description>
      <pubDate>Tue, 01 Aug 2017 17:00:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26654#M2645</guid>
      <dc:creator>Phil_storey</dc:creator>
      <dc:date>2017-08-01T17:00:00Z</dc:date>
    </item>
    <item>
      <title>RE: Test wlan that will uses eap ms-chapv2  self-controller to authenticate</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26655#M2646</link>
      <description>Could someone offer advice to get this working  ?&lt;BR /&gt;</description>
      <pubDate>Thu, 31 Aug 2017 11:03:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26655#M2646</guid>
      <dc:creator>Phil_storey</dc:creator>
      <dc:date>2017-08-31T11:03:00Z</dc:date>
    </item>
    <item>
      <title>RE: Test wlan that will uses eap ms-chapv2  self-controller to authenticate</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26656#M2647</link>
      <description>I have been looking at the event history on the AP that I'm trying to connect too&lt;BR /&gt;
in the message i get&lt;BR /&gt;
Client "20-14-B0-7E-22-11" disassociated from wlan "Group-1-DOT1X2 Radio "ap7532-82BCF4-eap"R1" authentication rejected by radius server timeout (reason code:23 )&lt;BR /&gt;
the device associates then fails on the timeout authenticating.&lt;BR /&gt;
&lt;BR /&gt;
If anyone has a simplified guide to setting this this up, I would be very greatful, stating from scratch for just one user to test that eap works and that it can connect to the test server on vlan 1&lt;BR /&gt;
thanks&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 31 Aug 2017 13:08:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26656#M2647</guid>
      <dc:creator>Phil_storey</dc:creator>
      <dc:date>2017-08-31T13:08:00Z</dc:date>
    </item>
    <item>
      <title>RE: Test wlan that will uses eap ms-chapv2  self-controller to authenticate</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26657#M2648</link>
      <description>This is the DEBUG&lt;BR /&gt;
&lt;BR /&gt;
[ap7532-82BCF4-eap] 08:47:11.27: mgmt:rx auth-req from 20-14-B0-7E-22-11 on radio 0 (mgmt.c:3872)&lt;BR /&gt;
[ap7532-82BCF4-eap] 08:47:11.27: mgmt:tx auth-rsp to 20-14-B0-7E-22-11 on radio 0. status: success (mgmt.c:1302)&lt;BR /&gt;
[ap7532-82BCF4-eap] 08:47:11.31: mgmt:rx association-req from 20-14-B0-7E-22-11 on radio ap7532-82BCF4-eap:R1 signal-strength is -45dBm (mgmt.c:38&lt;BR /&gt;
[ap7532-82BCF4-eap] 08:47:11.31: client:MU 20-14-B0-7E-22-11 panBU enab_cap=00 00 00 00, supp_cap=00 00 00 00 (mgmt.c:3112)&lt;BR /&gt;
[ap7532-82BCF4-eap] 08:47:11.31: client:using cached vlan 1 for wireless client 20-14-B0-7E-22-11 (mgmt.c:3347)&lt;BR /&gt;
[ap7532-82BCF4-eap] 08:47:11.31: mgmt:Client 20-14-B0-7E-22-11 negotiated WPA2-EAP on wlan (Group-1-DOT1X) (mgmt.c:3412)&lt;BR /&gt;
[ap7532-82BCF4-eap] 08:47:11.31: mgmt:tx association-rsp success to 20-14-B0-7E-22-11 on wlan (Group-1-DOT1X) (ssid:RKOI) with ftie 0 (mgmt.c:3467&lt;BR /&gt;
[ap7532-82BCF4-eap] 08:47:11.31: client:no pmkid from client 20-14-B0-7E-22-11 (mgmt.c:1197)&lt;BR /&gt;
[ap7532-82BCF4-eap] 08:47:11.31: client:state MU_STATE_DOT1X for client 20-14-B0-7E-22-11 (mgmt.c:1206)&lt;BR /&gt;
[ap7532-82BCF4-eap] 08:47:11.31: client:wireless client 20-14-B0-7E-22-11 changing state from [Roaming] to [802.1x/EAP Auth] (mgmt.c:622)&lt;BR /&gt;
[ap7532-82BCF4-eap] 08:47:11.31: eap:sending eap-code-request code 1, type 1 to 20-14-B0-7E-22-11 (eap.c:963)&lt;BR /&gt;
[ap7532-82BCF4-eap] 08:47:11.31: eap:sending eap-id-req to 20-14-B0-7E-22-11 (eap.c:990)&lt;BR /&gt;
[ap7532-82BCF4-eap] 08:47:11.31: client:transmitting roam notification for 20-14-B0-7E-22-11 (mgmt.c:345)&lt;BR /&gt;
[ap7532-82BCF4-eap] 08:47:11.32: client:os-info in credcache for 20-14-B0-7E-22-11 (OS:Unknown/Browser:Unknown/Type:Unknown) (credcache.c:915)&lt;BR /&gt;
[ap7532-82BCF4-eap] 08:47:11.32: client:user-info in credcache for 20-14-B0-7E-22-11 (loyalty_app:0) (credcache.c:956)&lt;BR /&gt;
[ap7532-82BCF4-eap] 08:47:11.39: eap:rx eap id-response from 20-14-B0-7E-22-11 (eap.c:696)&lt;BR /&gt;
[ap7532-82BCF4-eap] 08:47:11.39: radius:aaa-policy INTERNAL-AAA user: DT-355856050632419 mac: 20-14-B0-7E-22-11 server_is_candidate: 1 0 0 0 0 0 (&lt;BR /&gt;
[ap7532-82BCF4-eap] 08:47:11.40: radius:access-req sent to wireless controller to be proxied to 127.0.0.1:1812. (attempt 1) for 20-14-B0-7E-22-11 &lt;BR /&gt;
[ap7532-82BCF4-eap] 08:47:14.54: radius:access-req sent to wireless controller to be proxied to 127.0.0.1:1812. (attempt 2) for 20-14-B0-7E-22-11 &lt;BR /&gt;
[ap7532-82BCF4-eap] 08:47:17.75: radius:access-req sent to wireless controller to be proxied to 127.0.0.1:1812. (attempt 3) for 20-14-B0-7E-22-11 &lt;BR /&gt;
[ap7532-82BCF4-eap] 08:47:20.94: eap:sending eap-failure to 20-14-B0-7E-22-11 (eap.c:1006)&lt;BR /&gt;
[ap7532-82BCF4-eap] %%%%&amp;gt;08:47:20.94: radius:no response from radius server INTERNAL-AAA:1 for wireless client 20-14-B0-7E-22-11 (eap.c:373)&lt;BR /&gt;
[ap7532-82BCF4-eap] %%%%&amp;gt;08:47:20.94: radius:alarm num_eap_s_tout ++ 1 (eap.c:394)&lt;BR /&gt;
[ap7532-82BCF4-eap] 08:47:20.94: mgmt:tx deauthentication [reason: radius server timeout (code:23)] to 20-14-B0-7E-22-11 (mgmt.c:1836)&lt;BR /&gt;
&lt;BR /&gt;
Hope this means somthing to someone&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Thu, 31 Aug 2017 13:51:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26657#M2648</guid>
      <dc:creator>Phil_storey</dc:creator>
      <dc:date>2017-08-31T13:51:00Z</dc:date>
    </item>
    <item>
      <title>RE: Test wlan that will uses eap ms-chapv2  self-controller to authenticate</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26658#M2649</link>
      <description>Phil, &lt;BR /&gt;
&lt;BR /&gt;
It appears as if you've set the aaa-policy to use onboard controller or onboard centralized-controller, but perhaps the controller isn't "using" the radius server policy hence the timeouts.&lt;BR /&gt;
Perhaps debug the controller side to see what its doing with the radius requests.&lt;BR /&gt;
&lt;BR /&gt;
Can you post a show running-config...&lt;BR /&gt;</description>
      <pubDate>Thu, 31 Aug 2017 18:13:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26658#M2649</guid>
      <dc:creator>Andrew_Webster</dc:creator>
      <dc:date>2017-08-31T18:13:00Z</dc:date>
    </item>
    <item>
      <title>RE: Test wlan that will uses eap ms-chapv2  self-controller to authenticate</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26659#M2650</link>
      <description>Hi Andrew&lt;BR /&gt;
   here is the running config, Its not pretty ( have have removed some IP and other info )&lt;BR /&gt;
I wnat to set this on only one AP, for the test&lt;BR /&gt;
!&lt;BR /&gt;
! Configuration of RFS7000 version 5.8.5.0-016R&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
version 2.5&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
client-identity Android-X&lt;BR /&gt;
 dhcp 1 message-type request option 55 exact hexstring 012103060f1c333a3b&lt;BR /&gt;
 dhcp 2 message-type request option 60 exact ascii dhcpcd-5.5.6&lt;BR /&gt;
 dhcp-match-message-type request&lt;BR /&gt;
!&lt;BR /&gt;
client-identity Motorola-Android&lt;BR /&gt;
 dhcp 1 message-type request option 55 starts-with hexstring 012103060f1c2c333a3b&lt;BR /&gt;
 dhcp-match-message-type request&lt;BR /&gt;
!&lt;BR /&gt;
client-identity Windows-10&lt;BR /&gt;
 dhcp 1 message-type request option 55 exact hexstring 01002710792c78&lt;BR /&gt;
 dhcp 5 message-type request option 60 exact ascii "MSFT 5.0"&lt;BR /&gt;
 dhcp-match-message-type request&lt;BR /&gt;
!&lt;BR /&gt;
client-identity iPhone-iPad&lt;BR /&gt;
 dhcp 4 message-type request option 55 exact hexstring 017903060f77fc&lt;BR /&gt;
 dhcp 10 message-type request option 55 exact hexstring 0103060f77fc&lt;BR /&gt;
 dhcp 1 message-type request option-codes exact hexstring 3537393d32330c&lt;BR /&gt;
 dhcp 2 message-type request option-codes exact hexstring 3537393d32360c&lt;BR /&gt;
 dhcp 3 message-type request option-codes exact hexstring 3537393d3233&lt;BR /&gt;
 dhcp 6 message-type request option-codes exact hexstring 3537393d330c&lt;BR /&gt;
 dhcp-match-message-type request&lt;BR /&gt;
!&lt;BR /&gt;
ip access-list BROADCAST-MULTICAST-CONTROL&lt;BR /&gt;
 permit tcp any any rule-precedence 10 rule-description "permit all TCP traffic"&lt;BR /&gt;
 permit udp any eq 67 any eq dhcpc rule-precedence 11 rule-description "permit DHCP replies"&lt;BR /&gt;
 deny udp any range 137 138 any range 137 138 rule-precedence 20 rule-description "deny windows netbios"&lt;BR /&gt;
 permit ip any 224.0.0.0/4 rule-precedence 21 rule-description "Allow IP multicast for Chromecast and Apple TV Boxes to work"&lt;BR /&gt;
 permit ip any host 255.255.255.255 rule-precedence 22 rule-description "allow IP local broadcast for Chromecast and Apple TV Boxes to work"&lt;BR /&gt;
 permit ip any any rule-precedence 100 rule-description "permit all IP traffic"&lt;BR /&gt;
 permit proto 254 any any rule-precedence 101 rule-description Sip traffic&lt;BR /&gt;
 permit tcp any eq 5061 any rule-precedence 102 rule-description sip traffic&lt;BR /&gt;
 permit ip any xxx.245.xx.0/21 rule-precedence 103 rule-description RC Network&lt;BR /&gt;
 permit ip any xxx.23.xxx.0/22 rule-precedence 104 rule-description RC Network&lt;BR /&gt;
 permit ip any xxx.255.xxx.0/22 rule-precedence 106 rule-description RC Network&lt;BR /&gt;
 permit ip any xxx.68.xxx.0/22 rule-precedence 107 rule-description RC Network&lt;BR /&gt;
 permit tcp any range 8008 8009 any range 8008 8009 rule-precedence 108 &lt;BR /&gt;
 permit udp any eq 53 any rule-precedence 110 &lt;BR /&gt;
 permit udp any eq 1900 any rule-precedence 111 &lt;BR /&gt;
 permit tcp any xxx.236.xxx.128/2x eq https rule-precedence 113 &lt;BR /&gt;
 permit tcp any xxx.241.xxx.192/2x eq https rule-precedence 114 &lt;BR /&gt;
 permit tcp any xxx.246.xxx.128/2x eq https rule-precedence 115 &lt;BR /&gt;
 permit tcp any xxx.207.xxx.192/2x eq https rule-precedence 116 &lt;BR /&gt;
 permit tcp any xxx.58.xxx.160/2x eq https rule-precedence 117 &lt;BR /&gt;
 permit tcp any xxx.11.xxx.96/2x eq https rule-precedence 118 &lt;BR /&gt;
 permit tcp any xxx.153.xxx.160/2x eq https rule-precedence 119 &lt;BR /&gt;
 permit tcp any xxx.249.xxx.128/2x eq https rule-precedence 121 &lt;BR /&gt;
 permit tcp any xxx.22xxx.112/2x eq https rule-precedence 122 &lt;BR /&gt;
 permit tcp any 54.175.63.64/26 eq https rule-precedence 123 &lt;BR /&gt;
 permit tcp any 54.93.127.192/26 eq https rule-precedence 124 &lt;BR /&gt;
 permit tcp any xxx.209.xxx.64/2x eq https rule-precedence 125 &lt;BR /&gt;
 permit tcp any xxx.241.xxx.64/2x eq https rule-precedence 126 &lt;BR /&gt;
 permit tcp any xxx.219.xxx.192/2x eq https rule-precedence 127 &lt;BR /&gt;
 permit tcp any xxx.4.xxx.128/2x eq https rule-precedence 128 &lt;BR /&gt;
 permit tcp any xxx.233.xxx.192/2x eq https rule-precedence 129 &lt;BR /&gt;
 permit tcp any xxx.219.xxx.64/2x eq https rule-precedence 130 &lt;BR /&gt;
 permit tcp any xxx.175.xxx.192/2x eq https rule-precedence 131 &lt;BR /&gt;
 permit tcp any xxx.250.xxx.0/2x eq https rule-precedence 132 &lt;BR /&gt;
 permit tcp any xxx.171.xxx.192/2x eq https rule-precedence 133 &lt;BR /&gt;
 permit tcp any xxx.93.xxx.192/x eq https rule-precedence 134 &lt;BR /&gt;
 permit udp any range 5060 5061 any range 5060 5061 rule-precedence 135 &lt;BR /&gt;
!&lt;BR /&gt;
mac access-list PERMIT-ARP-AND-IPv4&lt;BR /&gt;
 permit any any type ip rule-precedence 10 rule-description "permit all IPv4 traffic"&lt;BR /&gt;
 permit any any type arp rule-precedence 20 rule-description "permit all ARP traffic"&lt;BR /&gt;
 deny host 00-1F-3B-26-02-A5 host 00-1F-3B-26-02-A5 rule-precedence 30 &lt;BR /&gt;
!&lt;BR /&gt;
ip snmp-access-list Mic_HQ&lt;BR /&gt;
 permit host xxx.17.1xx.xxx&lt;BR /&gt;
!&lt;BR /&gt;
ip snmp-access-list default&lt;BR /&gt;
 permit any&lt;BR /&gt;
!&lt;BR /&gt;
firewall-policy default&lt;BR /&gt;
 no ip dos tcp-sequence-past-window&lt;BR /&gt;
 storm-control multicast log warnings&lt;BR /&gt;
 ip-mac conflict log-and-drop log-level debugging &lt;BR /&gt;
 no ipv6 firewall enable&lt;BR /&gt;
 no stateful-packet-inspection-l2&lt;BR /&gt;
!&lt;BR /&gt;
role-policy RBFW&lt;BR /&gt;
 user-role Guest precedence 1&lt;BR /&gt;
  assign vlan 1&lt;BR /&gt;
  ssid contains RKOI&lt;BR /&gt;
 user-role Corp precedence 2&lt;BR /&gt;
  assign vlan 1&lt;BR /&gt;
  group exact Corp&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
mint-policy global-default&lt;BR /&gt;
!&lt;BR /&gt;
meshpoint-qos-policy default&lt;BR /&gt;
 accelerated-multicast autodetect classification voice&lt;BR /&gt;
!&lt;BR /&gt;
wlan-qos-policy default&lt;BR /&gt;
 classification normal&lt;BR /&gt;
 classification non-unicast normal&lt;BR /&gt;
 qos trust dscp&lt;BR /&gt;
 qos trust wmm&lt;BR /&gt;
!&lt;BR /&gt;
radio-qos-policy default&lt;BR /&gt;
 no admission-control implicit-tspec&lt;BR /&gt;
 admission-control voice&lt;BR /&gt;
 admission-control video&lt;BR /&gt;
 admission-control video max-airtime-percent 15&lt;BR /&gt;
 accelerated-multicast max-streams 60&lt;BR /&gt;
!&lt;BR /&gt;
aaa-policy INTERNAL-AAA&lt;BR /&gt;
 authentication server 1 onboard controller&lt;BR /&gt;
!&lt;BR /&gt;
association-acl-policy Mic_Ban&lt;BR /&gt;
 deny 4C-0B-BE-04-F1-04 4C-0B-BE-04-F1-04 precedence 1&lt;BR /&gt;
!&lt;BR /&gt;
wlan 1&lt;BR /&gt;
 description Guest&lt;BR /&gt;
 ssid HOTSPOT&lt;BR /&gt;
 vlan 10&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type tkip-ccmp&lt;BR /&gt;
 authentication-type none&lt;BR /&gt;
 no answer-broadcast-probes&lt;BR /&gt;
 radio-resource-measurement&lt;BR /&gt;
 no radio-resource-measurement channel-report&lt;BR /&gt;
 fast-bss-transition&lt;BR /&gt;
 wpa-wpa2 psk 0 6hbZ5r5sYJ&lt;BR /&gt;
 wpa-wpa2 handshake timeout 200 300 400 500&lt;BR /&gt;
 wpa-wpa2 handshake attempts 5&lt;BR /&gt;
 use ip-access-list out BROADCAST-MULTICAST-CONTROL&lt;BR /&gt;
 use mac-access-list out PERMIT-ARP-AND-IPv4&lt;BR /&gt;
!&lt;BR /&gt;
wlan 2&lt;BR /&gt;
 description Microlise WLAN&lt;BR /&gt;
 ssid WLANBG&lt;BR /&gt;
 vlan 1&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type tkip-ccmp&lt;BR /&gt;
 authentication-type none&lt;BR /&gt;
 no answer-broadcast-probes&lt;BR /&gt;
 fast-bss-transition&lt;BR /&gt;
 wpa-wpa2 psk 0 xxxxxxxxxx&lt;BR /&gt;
 wpa-wpa2 handshake timeout 200 300 400 500&lt;BR /&gt;
 wpa-wpa2 handshake attempts 5&lt;BR /&gt;
 accounting syslog host xxx.17.154.xx port 514 proxy-mode through-controller&lt;BR /&gt;
 data-rates 2.4GHz gn&lt;BR /&gt;
 data-rates 5GHz an&lt;BR /&gt;
 ip arp trust&lt;BR /&gt;
 ip dhcp trust&lt;BR /&gt;
 use ip-access-list out BROADCAST-MULTICAST-CONTROL&lt;BR /&gt;
 use mac-access-list out PERMIT-ARP-AND-IPv4&lt;BR /&gt;
!&lt;BR /&gt;
wlan 3&lt;BR /&gt;
 description ICT Test&lt;BR /&gt;
 ssid DOMTEST&lt;BR /&gt;
 vlan 10&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type tkip-ccmp&lt;BR /&gt;
 authentication-type none&lt;BR /&gt;
 no answer-broadcast-probes&lt;BR /&gt;
 radio-resource-measurement&lt;BR /&gt;
 fast-bss-transition&lt;BR /&gt;
 wpa-wpa2 psk 0 Dxuxles1x&lt;BR /&gt;
 wpa-wpa2 handshake timeout 200 300 400 500&lt;BR /&gt;
 wpa-wpa2 handshake attempts 5&lt;BR /&gt;
 wing-extensions ft-over-ds-aggregate&lt;BR /&gt;
 no client-load-balancing allow-single-band-clients 5ghz&lt;BR /&gt;
!&lt;BR /&gt;
wlan 4&lt;BR /&gt;
 description Company Mobile Phone&lt;BR /&gt;
 ssid VoipT&lt;BR /&gt;
 vlan 10&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type tkip-ccmp&lt;BR /&gt;
 authentication-type none&lt;BR /&gt;
 no answer-broadcast-probes&lt;BR /&gt;
 radio-resource-measurement&lt;BR /&gt;
 fast-bss-transition&lt;BR /&gt;
 wpa-wpa2 psk 0 Un1fyxxx&lt;BR /&gt;
 wpa-wpa2 handshake timeout 200 300 400 500&lt;BR /&gt;
 wpa-wpa2 handshake attempts 5&lt;BR /&gt;
 data-rates 2.4GHz gn&lt;BR /&gt;
 data-rates 5GHz an&lt;BR /&gt;
 use ip-access-list out BROADCAST-MULTICAST-CONTROL&lt;BR /&gt;
 use mac-access-list out PERMIT-ARP-AND-IPv4&lt;BR /&gt;
!&lt;BR /&gt;
wlan Group-1-DOT1X&lt;BR /&gt;
 description PEAP-TEST&lt;BR /&gt;
 shutdown&lt;BR /&gt;
 ssid RKOI&lt;BR /&gt;
 vlan 1&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type ccmp&lt;BR /&gt;
 authentication-type eap&lt;BR /&gt;
 radio-resource-measurement&lt;BR /&gt;
 fast-bss-transition&lt;BR /&gt;
 use aaa-policy INTERNAL-AAA&lt;BR /&gt;
 registration device-OTP group-name tesco expiry-time 4320&lt;BR /&gt;
 service monitor aaa-server&lt;BR /&gt;
!&lt;BR /&gt;
meshpoint link&lt;BR /&gt;
 meshid link&lt;BR /&gt;
 beacon-format mesh-point&lt;BR /&gt;
 control-vlan 1&lt;BR /&gt;
 allowed-vlans 1-4094&lt;BR /&gt;
 neighbor inactivity-timeout 60&lt;BR /&gt;
 security-mode none&lt;BR /&gt;
 wpa2 psk 0 hellomoto&lt;BR /&gt;
 no root&lt;BR /&gt;
!&lt;BR /&gt;
smart-rf-policy Wood2&lt;BR /&gt;
 channel-width 5GHz auto&lt;BR /&gt;
 channel-width 2.4GHz auto&lt;BR /&gt;
!&lt;BR /&gt;
radius-group Corp&lt;BR /&gt;
 policy ssid RKOI&lt;BR /&gt;
!&lt;BR /&gt;
radius-group Guest&lt;BR /&gt;
 guest&lt;BR /&gt;
!&lt;BR /&gt;
radius-group Test-eap&lt;BR /&gt;
 policy vlan 1&lt;BR /&gt;
 policy ssid RKOI&lt;BR /&gt;
!&lt;BR /&gt;
radius-user-pool-policy CORP-USER&lt;BR /&gt;
 user John password 0 doe group Corp&lt;BR /&gt;
!&lt;BR /&gt;
radius-user-pool-policy Test-eap&lt;BR /&gt;
 user DT-355856050632419 password 0 Pa55w0rd group Corp Test-eap&lt;BR /&gt;
!&lt;BR /&gt;
radius-server-policy RADIUS&lt;BR /&gt;
 use radius-user-pool-policy Test-eap&lt;BR /&gt;
 no ldap-group-verification&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
management-policy default&lt;BR /&gt;
 no telnet&lt;BR /&gt;
 no http server&lt;BR /&gt;
 https server&lt;BR /&gt;
 no ftp&lt;BR /&gt;
 ssh&lt;BR /&gt;
 user admin password 1 ab38cb210d7336ec17bcad7b2d0d7fa644e98f9fcd32c691c5ac1875f5858854 role superuser access all&lt;BR /&gt;
 allowed-location MHQ locations MHQ&lt;BR /&gt;
 snmp-server manager v1&lt;BR /&gt;
 snmp-server manager v2&lt;BR /&gt;
 no snmp-server manager v3&lt;BR /&gt;
 snmp-server community 0 public ro ip-snmp-access-list Mic_HQ&lt;BR /&gt;
 snmp-server user snmptrap v3 encrypted des auth md5 0 admin123&lt;BR /&gt;
 snmp-server user snmpmanager v3 encrypted des auth md5 0 admin123&lt;BR /&gt;
 snmp-server enable traps&lt;BR /&gt;
 snmp-server host xxx.xx.146.1x v2c 161 community 0 public&lt;BR /&gt;
 t5 snmp-server community public ro 192.168.0.1&lt;BR /&gt;
 t5 snmp-server community private rw 192.168.0.1&lt;BR /&gt;
!&lt;BR /&gt;
event-system-policy Mesh&lt;BR /&gt;
 event mesh meshpoint-loop-prevent-on email off&lt;BR /&gt;
 event mesh meshpoint-eap-server-timeout email off&lt;BR /&gt;
 event mesh mp-rescan email off&lt;BR /&gt;
 event mesh mesh-link-down email on&lt;BR /&gt;
 event mesh mpr-chan-change email off&lt;BR /&gt;
 event mesh meshpoint-eap-failed email off&lt;BR /&gt;
 event mesh meshpoint-root-change email off&lt;BR /&gt;
 event mesh meshpoint-down email off&lt;BR /&gt;
 event mesh meshpoint-eap-success email off&lt;BR /&gt;
 event mesh meshpoint-eap-client-timeout email off&lt;BR /&gt;
 event mesh meshpoint-up email off&lt;BR /&gt;
 event mesh meshpoint-path-change email off&lt;BR /&gt;
 event mesh meshpoint-loop-prevent-off email off&lt;BR /&gt;
 event mesh mp-chan-change email off&lt;BR /&gt;
 event mesh mesh-link-up email on&lt;BR /&gt;
!&lt;BR /&gt;
ex3500-management-policy default&lt;BR /&gt;
 snmp-server community public ro&lt;BR /&gt;
 snmp-server community private rw&lt;BR /&gt;
 snmp-server notify-filter 1 remote 127.0.0.1&lt;BR /&gt;
 snmp-server view defaultview 1 included&lt;BR /&gt;
!&lt;BR /&gt;
ex3500-qos-class-map-policy default&lt;BR /&gt;
!&lt;BR /&gt;
ex3500-qos-policy-map default&lt;BR /&gt;
!&lt;BR /&gt;
l2tpv3 policy default&lt;BR /&gt;
!&lt;BR /&gt;
profile rfs7000 default-rfs7000&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 use radius-server-policy RADIUS&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto remote-vpn-client&lt;BR /&gt;
 interface me1&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
 interface ge2&lt;BR /&gt;
 interface ge3&lt;BR /&gt;
 interface ge4&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 use role-policy RBFW&lt;BR /&gt;
 cluster member ip 172.xxx.146.105 level 1&lt;BR /&gt;
 cluster member ip 172.xxx.146.106 level 1&lt;BR /&gt;
 cluster member vlan 1&lt;BR /&gt;
 logging on&lt;BR /&gt;
 logging syslog debugging&lt;BR /&gt;
 logging host 1xx.xxx.154.4x &lt;BR /&gt;
 no logging forward&lt;BR /&gt;
 no lldp run&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
 router ospf&lt;BR /&gt;
!&lt;BR /&gt;
profile ap7532 AP7532_De&lt;BR /&gt;
 dscp-mapping 46 priority 7&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 led flash-pattern&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto load-management&lt;BR /&gt;
 crypto remote-vpn-client&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  wlan 1 bss 1 primary&lt;BR /&gt;
  wlan 2 bss 2 primary&lt;BR /&gt;
  wlan 3 bss 3 primary&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  wlan 1 bss 1 primary&lt;BR /&gt;
  wlan 2 bss 2 primary&lt;BR /&gt;
  wlan 3 bss 3 primary&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
  ip address dhcp&lt;BR /&gt;
  ip address zeroconf secondary&lt;BR /&gt;
  ip dhcp client request options all&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 logging on&lt;BR /&gt;
 no lldp run&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
 router ospf&lt;BR /&gt;
 traffic-shape total-bandwidth 20 Mbps&lt;BR /&gt;
 traffic-shape enable&lt;BR /&gt;
!&lt;BR /&gt;
profile ap7532 Mic_7532&lt;BR /&gt;
 dscp-mapping 46 priority 7&lt;BR /&gt;
 ip default-gateway xxx.xxx.xxx.xxx&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 led flash-pattern&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto load-management&lt;BR /&gt;
 crypto remote-vpn-client&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  data-rates gn&lt;BR /&gt;
  wlan 1 bss 1 primary&lt;BR /&gt;
  wlan 2 bss 2 primary&lt;BR /&gt;
  wlan 4 bss 4 primary&lt;BR /&gt;
  antenna-mode 3x3&lt;BR /&gt;
  antenna-diversity&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  wlan 1 bss 1 primary&lt;BR /&gt;
  wlan 2 bss 2 primary&lt;BR /&gt;
  wlan 4 bss 4 primary&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  switchport mode trunk&lt;BR /&gt;
  switchport trunk native vlan 1&lt;BR /&gt;
  no switchport trunk native tagged&lt;BR /&gt;
  switchport trunk allowed vlan 1,10&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
  ip address dhcp&lt;BR /&gt;
  ip address zeroconf secondary&lt;BR /&gt;
  ip dhcp client request options all&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 ntp server xxx.xxx.144.1xx prefer version 3 &lt;BR /&gt;
 ntp server xxx.xxx.144.xxx version 3 &lt;BR /&gt;
 use role-policy RBFW&lt;BR /&gt;
 logging on&lt;BR /&gt;
 no cdp run&lt;BR /&gt;
 no lldp run&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
 router ospf&lt;BR /&gt;
 traffic-shape total-bandwidth 20 Mbps&lt;BR /&gt;
 traffic-shape enable&lt;BR /&gt;
!&lt;BR /&gt;
profile ap7532 default-ap7532&lt;BR /&gt;
 dscp-mapping 46 priority 7&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 led flash-pattern&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto load-management&lt;BR /&gt;
 crypto remote-vpn-client&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  wlan 1 bss 1 primary&lt;BR /&gt;
  wlan 2 bss 2 primary&lt;BR /&gt;
  wlan 3 bss 3 primary&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  wlan 1 bss 1 primary&lt;BR /&gt;
  wlan 2 bss 2 primary&lt;BR /&gt;
  wlan 3 bss 3 primary&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
  ip address dhcp&lt;BR /&gt;
  ip address zeroconf secondary&lt;BR /&gt;
  ip dhcp client request options all&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 ntp server xxx.xxx.144.1xx prefer version 3 &lt;BR /&gt;
 ntp server xxx.xxx.144.1xx version 3 &lt;BR /&gt;
 logging on&lt;BR /&gt;
 no cdp run&lt;BR /&gt;
 no lldp run&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
 router ospf&lt;BR /&gt;
 traffic-shape total-bandwidth 20 Mbps&lt;BR /&gt;
 traffic-shape enable&lt;BR /&gt;
!&lt;BR /&gt;
profile ap7532 mic-mesh&lt;BR /&gt;
 no autoinstall configuration&lt;BR /&gt;
 no autoinstall firmware&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto load-management&lt;BR /&gt;
 crypto remote-vpn-client&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
  meshpoint link bss 1&lt;BR /&gt;
  non-unicast tx-rate lowest-basic&lt;BR /&gt;
  no dynamic-chain-selection&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  switchport mode trunk&lt;BR /&gt;
  switchport trunk native vlan 1&lt;BR /&gt;
  no switchport trunk native tagged&lt;BR /&gt;
  switchport trunk allowed vlan 1-4094&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use event-system-policy Mesh&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 email-notification host dom02 sender WifiBridge@microlise.com port 25&lt;BR /&gt;
 email-notification recipient support@microlise.com&lt;BR /&gt;
 no cdp run&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
 router ospf&lt;BR /&gt;
!&lt;BR /&gt;
profile ap7532 wood_2&lt;BR /&gt;
 no autoinstall configuration&lt;BR /&gt;
 no autoinstall firmware&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto load-management&lt;BR /&gt;
 crypto remote-vpn-client&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 use role-policy RBFW&lt;BR /&gt;
 no cdp run&lt;BR /&gt;
 no lldp run&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
 router ospf&lt;BR /&gt;
!&lt;BR /&gt;
profile ap71xx Mic71xxx&lt;BR /&gt;
 ip default-gateway xxx.xxx.144.xxx&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 device-upgrade persist-images&lt;BR /&gt;
 load-balancing balance-ap-loads&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto remote-vpn-client&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  data-rates custom basic-5.5 basic-11 basic-12 basic-18 basic-24 basic-36 basic-48 basic-54 basic-mcs-1s mcs-2s&lt;BR /&gt;
  rate-selection opportunistic&lt;BR /&gt;
  wlan 1 bss 1 primary&lt;BR /&gt;
  wlan 2 bss 2 primary&lt;BR /&gt;
  wlan 3 bss 3 primary&lt;BR /&gt;
  wlan 4 bss 4 primary&lt;BR /&gt;
  preamble-short&lt;BR /&gt;
  no dynamic-chain-selection&lt;BR /&gt;
  no adaptivity recovery&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  data-rates custom basic-12 basic-18 basic-24 basic-36 basic-48 basic-54 basic-mcs-1s mcs-2s&lt;BR /&gt;
  rate-selection opportunistic&lt;BR /&gt;
  wlan 1 bss 1 primary&lt;BR /&gt;
  wlan 2 bss 2 primary&lt;BR /&gt;
  wlan 3 bss 3 primary&lt;BR /&gt;
  wlan 4 bss 4 primary&lt;BR /&gt;
  no dynamic-chain-selection&lt;BR /&gt;
  no adaptivity recovery&lt;BR /&gt;
 interface radio3&lt;BR /&gt;
  shutdown&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
 interface ge2&lt;BR /&gt;
  shutdown&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
  ip address dhcp&lt;BR /&gt;
  ip address zeroconf secondary&lt;BR /&gt;
  ip dhcp client request options all&lt;BR /&gt;
 interface wwan1&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 ntp server xxx.xxx.144.150 prefer version 3 &lt;BR /&gt;
 ntp server xxx.xxx.144.151 version 3 &lt;BR /&gt;
 logging on&lt;BR /&gt;
 no lldp run&lt;BR /&gt;
 no auto-learn staging-config&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
 traffic-shape enable&lt;BR /&gt;
!&lt;BR /&gt;
profile ap71xx default-ap71xx&lt;BR /&gt;
 no autoinstall configuration&lt;BR /&gt;
 no autoinstall firmware&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto remote-vpn-client&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
 interface radio3&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
 interface ge2&lt;BR /&gt;
 interface wwan1&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
!&lt;BR /&gt;
profile ap650 default-ap650&lt;BR /&gt;
 ip default-gateway xxx.xxx.144.xxx&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 no device-upgrade auto&lt;BR /&gt;
 load-balancing balance-ap-loads&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto load-management&lt;BR /&gt;
 crypto remote-vpn-client&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  power 20&lt;BR /&gt;
  wlan 1 bss 1 primary&lt;BR /&gt;
  wlan 2 bss 2 primary&lt;BR /&gt;
  wlan 3 bss 3 primary&lt;BR /&gt;
  wlan 4 bss 4 primary&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  power 20&lt;BR /&gt;
  wlan 1 bss 1 primary&lt;BR /&gt;
  wlan 2 bss 2 primary&lt;BR /&gt;
  wlan 3 bss 3 primary&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
  ip address dhcp&lt;BR /&gt;
  ip address zeroconf secondary&lt;BR /&gt;
  ip dhcp client request options all&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 logging on&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
!&lt;BR /&gt;
rf-domain Wood_2&lt;BR /&gt;
 location ML_HQ&lt;BR /&gt;
 timezone Europe/London&lt;BR /&gt;
 country-code gb&lt;BR /&gt;
 use smart-rf-policy Wood2&lt;BR /&gt;
!&lt;BR /&gt;
rf-domain default&lt;BR /&gt;
 no country-code&lt;BR /&gt;
!&lt;BR /&gt;
rfs7000 00-15-70-38-0A-F9&lt;BR /&gt;
 use profile default-rfs7000&lt;BR /&gt;
 use rf-domain Wood_2&lt;BR /&gt;
 hostname rfs7000-Backup&lt;BR /&gt;
 layout-coordinates 145.5 212.5&lt;BR /&gt;
 no mint mlcp ipv6&lt;BR /&gt;
 no mint tunnel-across-extended-vlan&lt;BR /&gt;
 no spanning-tree mst enable bridge-forward&lt;BR /&gt;
 spanning-tree portfast bpduguard default&lt;BR /&gt;
 spanning-tree portfast bpdufilter default&lt;BR /&gt;
 spanning-tree mst region RFS_ML&lt;BR /&gt;
 spanning-tree mst revision 2&lt;BR /&gt;
 ip name-server xxx.xxx.144.1xx&lt;BR /&gt;
 ip name-server xxx.xxx.144.xxx&lt;BR /&gt;
 ip domain-name l.local&lt;BR /&gt;
 area "Mez Floor"&lt;BR /&gt;
 ip default-gateway xxx.xxx.144.xxx&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  speed 1000&lt;BR /&gt;
  duplex full&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
  ip address xxx.xxx.xxx.106/2x&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  ip address dhcp&lt;BR /&gt;
 cluster name M_HQ_Cluster&lt;BR /&gt;
 cluster mode standby&lt;BR /&gt;
 cluster member vlan 1&lt;BR /&gt;
 cluster master-priority 100&lt;BR /&gt;
 cluster handle-stp&lt;BR /&gt;
 cluster force-configured-state&lt;BR /&gt;
!&lt;BR /&gt;
rfs7000 00-15-70-81-BE-8E&lt;BR /&gt;
 use profile default-rfs7000&lt;BR /&gt;
 use rf-domain Wood_2&lt;BR /&gt;
 hostname rfs7000-Primary&lt;BR /&gt;
 layout-coordinates 481.5 9.5&lt;BR /&gt;
 license AP baa10e1a4916c4f89b2c620c20ab86b72fd7aefe10c9d75c90cfe595682b28cc0cff4e7c66e1796b&lt;BR /&gt;
 timezone Europe/London&lt;BR /&gt;
 country-code gb&lt;BR /&gt;
 channel-list 2.4GHz 1,2,3,4,5,7,8,10,11,12,13,14&lt;BR /&gt;
 no mint mlcp ipv6&lt;BR /&gt;
 no mint tunnel-across-extended-vlan&lt;BR /&gt;
 ip igmp snooping&lt;BR /&gt;
 ip igmp snooping querier&lt;BR /&gt;
 no spanning-tree mst enable bridge-forward&lt;BR /&gt;
 spanning-tree portfast bpduguard default&lt;BR /&gt;
 spanning-tree portfast bpdufilter default&lt;BR /&gt;
 spanning-tree mst region RFS_ML&lt;BR /&gt;
 spanning-tree mst revision 2&lt;BR /&gt;
 ip name-server xxx.xxx.144.1xx&lt;BR /&gt;
 ip name-server xxx.xxx.144.1xx&lt;BR /&gt;
 ip domain-name m.local&lt;BR /&gt;
 area "B4 SRm"&lt;BR /&gt;
 floor GF&lt;BR /&gt;
 ip default-gateway xxx.xxx.144.xxx&lt;BR /&gt;
 no use radius-server-policy&lt;BR /&gt;
 interface me1&lt;BR /&gt;
  ip address 10.10.10.10/24&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  speed 1000&lt;BR /&gt;
  duplex full&lt;BR /&gt;
  switchport mode trunk&lt;BR /&gt;
  switchport trunk native vlan 1&lt;BR /&gt;
  switchport trunk native tagged&lt;BR /&gt;
  switchport trunk allowed vlan 1,10-11&lt;BR /&gt;
  no ipv6 nd raguard&lt;BR /&gt;
  no ip arp trust&lt;BR /&gt;
  ip arp header-mismatch-validation&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
  description Ron&lt;BR /&gt;
  ip address xxx.xxx.146.1xx/20&lt;BR /&gt;
  use ip-access-list in BROADCAST-MULTICAST-CONTROL&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
  ip address dhcp&lt;BR /&gt;
  ip dhcp client request options all&lt;BR /&gt;
 ntp server xxx.xxx.144.1xx prefer version 3 &lt;BR /&gt;
 ntp server xxx.xxx.144.1xx version 3 &lt;BR /&gt;
 cluster name M_HQ_Cluster&lt;BR /&gt;
 cluster member vlan 1&lt;BR /&gt;
 cluster master-priority 200&lt;BR /&gt;
 cluster handle-stp&lt;BR /&gt;
 cluster force-configured-state&lt;BR /&gt;
 traffic-shape class 1 rate 70 Mbps&lt;BR /&gt;
 traffic-shape total-bandwidth 70 Mbps&lt;BR /&gt;
 traffic-shape enable&lt;BR /&gt;
!&lt;BR /&gt;
ap7532 84-24-8D-80-C3-AC&lt;BR /&gt;
 use profile Mic_7532&lt;BR /&gt;
 use rf-domain Wood_2&lt;BR /&gt;
 hostname ap7532-2-Delivery&lt;BR /&gt;
 area HR-Accounts-CEO&lt;BR /&gt;
 floor B4-First-Floor&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  wlan 1 bss 1 primary&lt;BR /&gt;
  wlan 2 bss 2 primary&lt;BR /&gt;
  wlan 4 bss 3 primary&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  wlan 1 bss 1 primary&lt;BR /&gt;
  wlan 2 bss 2 primary&lt;BR /&gt;
  wlan 4 bss 3 primary&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  switchport mode trunk&lt;BR /&gt;
  switchport trunk native vlan 1&lt;BR /&gt;
  no switchport trunk native tagged&lt;BR /&gt;
  switchport trunk allowed vlan 1,10&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
  ip address dhcp&lt;BR /&gt;
!&lt;BR /&gt;
ap7532 84-24-8D-80-C5-F4&lt;BR /&gt;
 use profile Mic_7532&lt;BR /&gt;
 use rf-domain Wood_2&lt;BR /&gt;
 hostname AP7532-ICT-B4a&lt;BR /&gt;
 location B4a-Sdesk&lt;BR /&gt;
 contact ICT&lt;BR /&gt;
 ip name-server xxx.xx.144.xx&lt;BR /&gt;
 ip name-server xxx.xx.144.xxx&lt;BR /&gt;
 ip domain-name m.local&lt;BR /&gt;
 ip default-gateway xxx.xxx.144.1.xxx&lt;BR /&gt;
 no ip default-gateway failover&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  wlan 1 bss 1 primary&lt;BR /&gt;
  wlan 2 bss 2 primary&lt;BR /&gt;
  wlan 3 bss 3 primary&lt;BR /&gt;
  wlan 4 bss 4 primary&lt;BR /&gt;
  no adaptivity recovery&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  wlan 1 bss 1 primary&lt;BR /&gt;
  wlan 2 bss 2 primary&lt;BR /&gt;
  wlan 3 bss 3 primary&lt;BR /&gt;
  wlan 4 bss 4 primary&lt;BR /&gt;
  antenna-mode 3x3&lt;BR /&gt;
  antenna-diversity&lt;BR /&gt;
  no adaptivity recovery&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
  ip address dhcp&lt;BR /&gt;
  ip address zeroconf secondary&lt;BR /&gt;
!&lt;BR /&gt;
ap7532 84-24-8D-80-C6-24&lt;BR /&gt;
 use profile Mic_7532&lt;BR /&gt;
 use rf-domain Wood_2&lt;BR /&gt;
 hostname AP7532-Reception-Landing&lt;BR /&gt;
 layout-coordinates -72.5 -198.5&lt;BR /&gt;
 area B4&lt;BR /&gt;
 floor First-floor-Theatre&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  wlan 1 bss 1 primary&lt;BR /&gt;
  wlan 2 bss 2 primary&lt;BR /&gt;
  wlan 4 bss 4 primary&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  wlan 1 bss 1 primary&lt;BR /&gt;
  wlan 2 bss 2 primary&lt;BR /&gt;
  wlan 4 bss 4 primary&lt;BR /&gt;
!&lt;BR /&gt;
ap7532 84-24-8D-82-BC-78&lt;BR /&gt;
 use profile mic-mesh&lt;BR /&gt;
 use rf-domain Wood_2&lt;BR /&gt;
 hostname ap7532-Remote-Bridge&lt;BR /&gt;
 layout-coordinates -179.5 -291.5&lt;BR /&gt;
 geo-coordinates 53.0151 -1.3156&lt;BR /&gt;
 ip igmp snooping&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  shutdown&lt;BR /&gt;
  power smart&lt;BR /&gt;
  no mesh&lt;BR /&gt;
  mesh psk 0 RUc6UnarePa&amp;amp;&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  power smart&lt;BR /&gt;
  no mesh&lt;BR /&gt;
  mesh psk 0 RUc6UnarePa&amp;amp;&lt;BR /&gt;
  antenna-gain 0.0&lt;BR /&gt;
  antenna-mode 3x3&lt;BR /&gt;
  antenna-diversity&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
  ip address 172.17.148.252/20&lt;BR /&gt;
  ip address zeroconf secondary&lt;BR /&gt;
!&lt;BR /&gt;
ap7532 84-24-8D-82-BC-F4&lt;BR /&gt;
 use profile Mic_7532&lt;BR /&gt;
 use rf-domain Wood_2&lt;BR /&gt;
  ap7532-82BCF4-eap&lt;BR /&gt;
 layout-coordinates 159.5 -1hostname86.5&lt;BR /&gt;
 area TBC&lt;BR /&gt;
 floor TBC&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  wlan Group-1-DOT1X bss 1 primary&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  wlan Group-1-DOT1X bss 1 primary&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  switchport mode trunk&lt;BR /&gt;
  switchport trunk native vlan 1&lt;BR /&gt;
  no switchport trunk native tagged&lt;BR /&gt;
  switchport trunk allowed vlan 1,10&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
  ip address dhcp&lt;BR /&gt;
  ip address zeroconf secondary&lt;BR /&gt;
!&lt;BR /&gt;
ap7532 84-24-8D-82-BD-80&lt;BR /&gt;
 use profile Mic_7532&lt;BR /&gt;
 use rf-domain Wood_2&lt;BR /&gt;
 hostname ap7532-Reception&lt;BR /&gt;
 layout-coordinates 214.5 -155.5&lt;BR /&gt;
 area Reception-by-Lift&lt;BR /&gt;
 floor Ground-Floor&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  wlan 1 bss 1 primary&lt;BR /&gt;
  wlan 2 bss 2 primary&lt;BR /&gt;
  wlan 4 bss 4 primary&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  wlan 1 bss 1 primary&lt;BR /&gt;
  wlan 2 bss 2 primary&lt;BR /&gt;
  wlan 4 bss 4 primary&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  no cdp receive&lt;BR /&gt;
  no cdp transmit&lt;BR /&gt;
  no lldp receive&lt;BR /&gt;
  no lldp transmit&lt;BR /&gt;
!&lt;BR /&gt;
ap7532 84-24-8D-82-BF-18&lt;BR /&gt;
 use profile m-mesh&lt;BR /&gt;
 use rf-domain Wood_2&lt;BR /&gt;
 hostname ap7532-HQ-Bridge&lt;BR /&gt;
 layout-coordinates 258.5 -298.5&lt;BR /&gt;
 geo-coordinates xx.0137 -1.3146&lt;BR /&gt;
 bridge vlan 1&lt;BR /&gt;
 ip default-gateway xxx.xxx.144.1.xxx&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  shutdown&lt;BR /&gt;
  data-rates gn&lt;BR /&gt;
  placement outdoor&lt;BR /&gt;
  no mesh&lt;BR /&gt;
  antenna-gain 0.0&lt;BR /&gt;
  antenna-mode default&lt;BR /&gt;
  no antenna-diversity&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  power smart&lt;BR /&gt;
  no mesh&lt;BR /&gt;
  mesh psk 0 RUc6UnarePa&amp;amp;&lt;BR /&gt;
  antenna-gain 0.0&lt;BR /&gt;
  antenna-mode 3x3&lt;BR /&gt;
  antenna-diversity&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
  ip address xxx.17.xx.251/2x&lt;BR /&gt;
  ip address zeroconf secondary&lt;BR /&gt;
 meshpoint-device link&lt;BR /&gt;
  root&lt;BR /&gt;
!&lt;BR /&gt;
ap7532 84-24-8D-82-C7-88&lt;BR /&gt;
 use profile Mic_7532&lt;BR /&gt;
 use rf-domain Wood_2&lt;BR /&gt;
 hostname ap7532-1-Delivery&lt;BR /&gt;
 layout-coordinates x48.5 -201.5&lt;BR /&gt;
 area Delivery&lt;BR /&gt;
 floor B4-First-Floor-Kitchen-Sec-end&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  wlan 1 bss 1 primary&lt;BR /&gt;
  wlan 2 bss 2 primary&lt;BR /&gt;
  wlan 4 bss 3 primary&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  wlan 1 bss 1 primary&lt;BR /&gt;
  wlan 2 bss 2 primary&lt;BR /&gt;
  wlan 4 bss 3 primary&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  switchport mode trunk&lt;BR /&gt;
  switchport trunk native vlan 1&lt;BR /&gt;
  no switchport trunk native tagged&lt;BR /&gt;
  switchport trunk allowed vlan 1,10&lt;BR /&gt;
  no cdp receive&lt;BR /&gt;
  no cdp transmit&lt;BR /&gt;
  no lldp receive&lt;BR /&gt;
  no lldp transmit&lt;BR /&gt;
!&lt;BR /&gt;
ap71xx 00-15-70-EB-7C-A8&lt;BR /&gt;
 use profile Mic71xxx&lt;BR /&gt;
 use rf-domain Wood_2&lt;BR /&gt;
 hostname ap7131-7-PC01&lt;BR /&gt;
 layout-coordinates -396.5 -39.4&lt;BR /&gt;
 area "PortaCabin- Embedded Team"&lt;BR /&gt;
 floor B4a-GF&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  no shutdown&lt;BR /&gt;
  channel smart&lt;BR /&gt;
  power smart&lt;BR /&gt;
  data-rates default&lt;BR /&gt;
  wlan 1 bss 1 primary&lt;BR /&gt;
  wlan 2 bss 2 primary&lt;BR /&gt;
  wlan 4 bss 5 primary&lt;BR /&gt;
  non-unicast tx-rate lowest-basic&lt;BR /&gt;
  no antenna-diversity&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  no shutdown&lt;BR /&gt;
  channel smart&lt;BR /&gt;
  power smart&lt;BR /&gt;
  data-rates an&lt;BR /&gt;
  wlan 1 bss 1 primary&lt;BR /&gt;
  wlan 2 bss 2 primar</description>
      <pubDate>Fri, 01 Sep 2017 12:22:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26659#M2650</guid>
      <dc:creator>Phil_storey</dc:creator>
      <dc:date>2017-09-01T12:22:00Z</dc:date>
    </item>
    <item>
      <title>RE: Test wlan that will uses eap ms-chapv2  self-controller to authenticate</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26660#M2651</link>
      <description>Phil,&lt;BR /&gt;
I don't see any mention of trustpoints in your config, so I'm guessing you didn't do any certificate setup as part of the Radius setup.&lt;BR /&gt;
EAP-&lt;I&gt;anything&lt;/I&gt; requires a radius server-side certificate in order to function.  It cannot use the default built-in trustpoint.&lt;BR /&gt;
&lt;BR /&gt;
I found this video to be very informative, although the presenter is setting up EAP-TLS, EAP-PEAP is similar, and you should be able to derive the correct config from there. &lt;BR /&gt;
&lt;A href="https://www.youtube.com/watch?v=-f0R9tNwRX4" target="_blank" rel="nofollow noreferrer noopener"&gt;https://www.youtube.com/watch?v=-f0R9tNwRX4&lt;/A&gt;&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Fri, 01 Sep 2017 21:51:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26660#M2651</guid>
      <dc:creator>Andrew_Webster</dc:creator>
      <dc:date>2017-09-01T21:51:00Z</dc:date>
    </item>
    <item>
      <title>RE: Test wlan that will uses eap ms-chapv2  self-controller to authenticate</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26661#M2652</link>
      <description>So am I correct in thinking I need to use an external LDAP server with the Radius-onboard the RFS7k ?&lt;BR /&gt;
&lt;BR /&gt;
For this test I dont want to use certficates</description>
      <pubDate>Mon, 04 Sep 2017 16:26:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26661#M2652</guid>
      <dc:creator>Phil_storey</dc:creator>
      <dc:date>2017-09-04T16:26:00Z</dc:date>
    </item>
    <item>
      <title>RE: Test wlan that will uses eap ms-chapv2  self-controller to authenticate</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26662#M2653</link>
      <description>You can't NOT use certificates.  EAP-PEAP-MS-CHAPv2 stipulates at a minimum that you must have server-side certificates on the RADIUS server.&lt;BR /&gt;
&lt;BR /&gt;
If you want to use an external LDAP that's fine, but the RADIUS server still needs a certificate.&lt;BR /&gt;
Similarly, if you used an external RADIUS server, it would need to have a certificate.&lt;BR /&gt;
&lt;BR /&gt;</description>
      <pubDate>Tue, 05 Sep 2017 00:37:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/test-wlan-that-will-uses-eap-ms-chapv2-self-controller-to/m-p/26662#M2653</guid>
      <dc:creator>Andrew_Webster</dc:creator>
      <dc:date>2017-09-05T00:37:00Z</dc:date>
    </item>
  </channel>
</rss>

