<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Local radius with LDAP and local users in ExtremeWireless (WiNG)</title>
    <link>https://community.extremenetworks.com/t5/extremewireless-wing/local-radius-with-ldap-and-local-users/m-p/70197#M6339</link>
    <description>Hello Daren,&lt;BR /&gt;
&lt;BR /&gt;
thank you very much. After changing the AAA policy auth. to "onboard self" the local database is used for authentication. It looks like you cannot have local auth. on AP (onboard self) and controller (onboard controller) at the same time. At least when LDAP is also configured.&lt;BR /&gt;
&lt;BR /&gt;
&lt;BR /&gt;
When clients connect to ssid Testcorp a certificate warning for each AP is shown up. On Windows 10 I can disable the radius server certificate validation on the client. As far as I know this is not possible on Apple iOS devices. We have more than 50 APs so users won't accept that solution.&lt;BR /&gt;
&lt;BR /&gt;
&lt;BR /&gt;
Is there a way to configure the same self-signed certificate for radius/802.1x auth. on all APs so users only have to accept the certificate once? Or alternatively can I import a public trusted certificate on all APs?&lt;BR /&gt;
&lt;BR /&gt;
I searched through the Wing CLI Reference Guide. It looks like I can import keypairs with that command.&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;crypto key import rsa RSA-KEYPAIR-NAME IMPORT-FROM-URL background|passphrase KEYPASSPHRASE&lt;BR /&gt;background on DEVICE-NAME&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
&lt;BR /&gt;
&lt;BR /&gt;
&lt;BR /&gt;
But I could not find any information where I can configure the radius server on AP/controller to use this certificate for radius/802.1x auth.&lt;BR /&gt;
&lt;BR /&gt;
Or does the Wing AP/controller automatically use the latest certificate automatically? If this is the case do I break something when all APs and the controller have the same certificate?&lt;BR /&gt;
&lt;BR /&gt;
Thank you in advance for your help&lt;BR /&gt;
Ned</description>
    <pubDate>Tue, 27 Aug 2019 22:36:59 GMT</pubDate>
    <dc:creator>Ned</dc:creator>
    <dc:date>2019-08-27T22:36:59Z</dc:date>
    <item>
      <title>Local radius with LDAP and local users</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/local-radius-with-ldap-and-local-users/m-p/70193#M6335</link>
      <description>Hello Community,&lt;BR /&gt;
&lt;BR /&gt;
I'm using WING VX controller version 5.9.3.0-018R.&lt;BR /&gt;
&lt;BR /&gt;
I try to configure a wifi network SSID Testcorp that uses the local radius server with the local user database Testcorp-User-Pool. LDAP authentication with local radius is configured and working for SSIDs Wifi01 and Wifi02.&lt;BR /&gt;
A guest network with captive portal is also configured and working as expected.&lt;BR /&gt;
&lt;BR /&gt;
I added the radius user pool policy and the authentication parameter local in the radius server policy for SSID Testcorp.&lt;BR /&gt;
&lt;BR /&gt;
When I connect to the Testcorp wifi, I get a certificate warning (self-signed certificate of controller) but LDAP authentication is used (found out by trial and error) and not the local user database.&lt;BR /&gt;
&lt;BR /&gt;
&lt;BR /&gt;
I read this post/how-to's &lt;A href="https://extreme.connectedcommunity.org/communities/community-home/digestviewer/viewthread?MessageKey=cdfefd13-e0ca-45d4-8d59-4c75d0fee10c&amp;amp;CommunityKey=ed4f7644-df2a-43b4-b20b-cfc3aba9834d&amp;amp;tab=digestviewer#bmcdfefd13-e0ca-45d4-8d59-4c75d0fee10c" target="_blank" rel="nofollow noreferrer noopener"&gt;using both LDAP and local radius server&lt;/A&gt;, &lt;A href="https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-configure-802-1x-authentication-with-internal-RADIUS-on-a-Summit-WM3000-series-controller" target="_blank" rel="nofollow noreferrer noopener"&gt;How to configure 802.1x authentication with internal RADIUS on a WiNG controller&lt;/A&gt; and &lt;A href="https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-configure-a-Summit-WM3000-for-802-1x-authentication-with-internal-RADIUS-using-LDAP-to-connect-to-a-Windows-Active-Directory-server" target="_blank" rel="nofollow noreferrer noopener"&gt;How to configure a WiNG controller for 802.1x authentication with internal RADIUS, using LDAP&lt;/A&gt; but I can't figure out why LDAP and not the local user database is used on SSID Testcorp.&lt;BR /&gt;
&lt;BR /&gt;
Excerpt of running config&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;aaa-policy Testcorp_local_radius&lt;BR /&gt;authentication server 1 onboard controller&lt;BR /&gt;&lt;BR /&gt;aaa-policy CaptivePortal&lt;BR /&gt;authentication server 1 onboard self&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;wlan Testcorp&lt;BR /&gt;description Testcorp&lt;BR /&gt;ssid Testcorp&lt;BR /&gt;vlan 201&lt;BR /&gt;bridging-mode local&lt;BR /&gt;encryption-type ccmp&lt;BR /&gt;authentication-type eap&lt;BR /&gt;no answer-broadcast-probes&lt;BR /&gt;use wlan-qos-policy Testcorp&lt;BR /&gt;use aaa-policy Testcorp_local_radius&lt;BR /&gt;&lt;BR /&gt;wlan Guest&lt;BR /&gt;ssid Guest-Wifi&lt;BR /&gt;vlan 200&lt;BR /&gt;bridging-mode local&lt;BR /&gt;encryption-type none&lt;BR /&gt;authentication-type none&lt;BR /&gt;no answer-broadcast-probes&lt;BR /&gt;no client-client-communication&lt;BR /&gt;use wlan-qos-policy Guest&lt;BR /&gt;use captive-portal Guest&lt;BR /&gt;captive-portal-enforcement&lt;BR /&gt;use ip-access-list out BROADCAST-MULTICAST-CONTROL&lt;BR /&gt;use mac-access-list out PERMIT-ARP-AND-IPv4&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;radius-group Testcorp-Users&lt;BR /&gt;policy vlan 201&lt;BR /&gt;policy ssid Testcorp&lt;BR /&gt;&lt;BR /&gt;radius-group Guest&lt;BR /&gt;guest&lt;BR /&gt;policy vlan 200&lt;BR /&gt;policy ssid Guest-Wifi&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;radius-user-pool-policy Testcorp-User-Pool&lt;BR /&gt;user john-test password 0 testpassword group Testcorp-Users&lt;BR /&gt;&lt;BR /&gt;radius-user-pool-policy Guest&lt;BR /&gt;$GUEST_USERS&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;radius-server-policy RADIUS-Policy&lt;BR /&gt;use radius-user-pool-policy Guest&lt;BR /&gt;use radius-user-pool-policy Testcorp-User-Pool&lt;BR /&gt;authentication data-source ldap ssid Wifi01 precedence 1&lt;BR /&gt;authentication data-source ldap ssid Wifi02 precedence 2&lt;BR /&gt;authentication data-source local ssid Guest-Wifi precedence 3&lt;BR /&gt;authentication data-source local ssid Testcorp precedence 4&lt;BR /&gt;authentication data-source ldap fallback&lt;BR /&gt;authentication eap-auth-type peap-mschapv2&lt;BR /&gt;ldap-server primary host $IP port 389 login $LDAP_PARAMETERS net-timeout 3&lt;BR /&gt;ldap-agent primary domain-name $DOMAIN domain-admin-user $DOMAIN_USER domain-admin-password 0 $PASSWORD&lt;BR /&gt;use radius-group GROUP1&lt;BR /&gt;use radius-group GROUP2&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
&lt;BR /&gt;
Anybody has a similar setup working or an idea why it is not working as expected?&lt;BR /&gt;
&lt;BR /&gt;
Thanks in advance&lt;BR /&gt;
Ned</description>
      <pubDate>Fri, 23 Aug 2019 11:05:24 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/local-radius-with-ldap-and-local-users/m-p/70193#M6335</guid>
      <dc:creator>Ned</dc:creator>
      <dc:date>2019-08-23T11:05:24Z</dc:date>
    </item>
    <item>
      <title>Re: Local radius with LDAP and local users</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/local-radius-with-ldap-and-local-users/m-p/70194#M6336</link>
      <description>Hi Ned,&lt;BR /&gt;
&lt;BR /&gt;
Some important info is messing from the post.&lt;BR /&gt;
Please advise where radius server policy are mapped.&lt;BR /&gt;
Captive portal AAA policy is not the same as Corp.</description>
      <pubDate>Fri, 23 Aug 2019 20:39:26 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/local-radius-with-ldap-and-local-users/m-p/70194#M6336</guid>
      <dc:creator>Daren_E</dc:creator>
      <dc:date>2019-08-23T20:39:26Z</dc:date>
    </item>
    <item>
      <title>Re: Local radius with LDAP and local users</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/local-radius-with-ldap-and-local-users/m-p/70195#M6337</link>
      <description>Hello Daren,&lt;BR /&gt;
&lt;BR /&gt;
the radius server policy is mapped on the AP profiles. Here is one example of a profile. The Employee Wifi uses an external radius server to authenticate users.&lt;BR /&gt;
&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;profile anyap Corpsite-any-internal&lt;BR /&gt;no mint mlcp vlan&lt;BR /&gt;no mint mlcp ipv6&lt;BR /&gt;no autoinstall configuration&lt;BR /&gt;no autoinstall firmware&lt;BR /&gt;use radius-server-policy RADIUS-Policy&lt;BR /&gt;crypto ikev1 policy ikev1-default&lt;BR /&gt;isakmp-proposal default encryption aes-256 group 2 hash sha&lt;BR /&gt;crypto ikev2 policy ikev2-default&lt;BR /&gt;isakmp-proposal default encryption aes-256 group 2 hash sha&lt;BR /&gt;crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ikev1 remote-vpn&lt;BR /&gt;crypto ikev2 remote-vpn&lt;BR /&gt;crypto auto-ipsec-secure&lt;BR /&gt;crypto load-management&lt;BR /&gt;crypto remote-vpn-client&lt;BR /&gt;interface radio1&lt;BR /&gt;wlan Wifi01 bss 1 primary&lt;BR /&gt;wlan Wifi02 bss 2 primary&lt;BR /&gt;wlan Guest bss 3 primary&lt;BR /&gt;wlan Employee bss 4 primary&lt;BR /&gt;wlan Testcorp bss 5 primary&lt;BR /&gt;interface radio2&lt;BR /&gt;wlan Wifi01 bss 1 primary&lt;BR /&gt;wlan Wifi02 bss 2 primary&lt;BR /&gt;wlan Mitarbeiter bss 3 primary&lt;BR /&gt;wlan Employee bss 4 primary&lt;BR /&gt;wlan Testcorp bss 5 primary&lt;BR /&gt;interface radio3&lt;BR /&gt;interface bluetooth1&lt;BR /&gt;shutdown&lt;BR /&gt;mode bt-sensor&lt;BR /&gt;interface up1&lt;BR /&gt;interface ge1&lt;BR /&gt;switchport mode trunk&lt;BR /&gt;switchport trunk allowed vlan 200-204&lt;BR /&gt;switchport trunk native vlan 100&lt;BR /&gt;interface ge2&lt;BR /&gt;interface fe1&lt;BR /&gt;interface fe2&lt;BR /&gt;interface fe3&lt;BR /&gt;interface fe4&lt;BR /&gt;interface vlan100&lt;BR /&gt;ip address dhcp&lt;BR /&gt;ip dhcp client request options all&lt;BR /&gt;interface vlan200&lt;BR /&gt;ip address dhcp&lt;BR /&gt;interface wwan1&lt;BR /&gt;interface pppoe1&lt;BR /&gt;use firewall-policy default&lt;BR /&gt;use captive-portal server Guest&lt;BR /&gt;configuration-persistence&lt;BR /&gt;service pm sys-restart&lt;BR /&gt;router ospf&lt;BR /&gt;adoption-mode controller&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
My goal is to authenticate users on the Testcorp Wifi to local radius server and local username and password database. The only thing that is not working as expected is that the Testcorp Wifi uses LDAP, instead of local authentication. Once authenticated I can ping the default gateway and have internet access.</description>
      <pubDate>Sun, 25 Aug 2019 05:16:06 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/local-radius-with-ldap-and-local-users/m-p/70195#M6337</guid>
      <dc:creator>Ned</dc:creator>
      <dc:date>2019-08-25T05:16:06Z</dc:date>
    </item>
    <item>
      <title>Re: Local radius with LDAP and local users</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/local-radius-with-ldap-and-local-users/m-p/70196#M6338</link>
      <description>Hi Ned,&lt;BR /&gt;
&lt;BR /&gt;
Going off info provided, can you test by changing policy to following:&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;aaa-policy Testcorp_local_radius&lt;BR /&gt;authentication server 1 onboard self&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
Previous configuration is telling AP auth requests should be sent to controller.</description>
      <pubDate>Mon, 26 Aug 2019 20:18:25 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/local-radius-with-ldap-and-local-users/m-p/70196#M6338</guid>
      <dc:creator>Daren_E</dc:creator>
      <dc:date>2019-08-26T20:18:25Z</dc:date>
    </item>
    <item>
      <title>Re: Local radius with LDAP and local users</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/local-radius-with-ldap-and-local-users/m-p/70197#M6339</link>
      <description>Hello Daren,&lt;BR /&gt;
&lt;BR /&gt;
thank you very much. After changing the AAA policy auth. to "onboard self" the local database is used for authentication. It looks like you cannot have local auth. on AP (onboard self) and controller (onboard controller) at the same time. At least when LDAP is also configured.&lt;BR /&gt;
&lt;BR /&gt;
&lt;BR /&gt;
When clients connect to ssid Testcorp a certificate warning for each AP is shown up. On Windows 10 I can disable the radius server certificate validation on the client. As far as I know this is not possible on Apple iOS devices. We have more than 50 APs so users won't accept that solution.&lt;BR /&gt;
&lt;BR /&gt;
&lt;BR /&gt;
Is there a way to configure the same self-signed certificate for radius/802.1x auth. on all APs so users only have to accept the certificate once? Or alternatively can I import a public trusted certificate on all APs?&lt;BR /&gt;
&lt;BR /&gt;
I searched through the Wing CLI Reference Guide. It looks like I can import keypairs with that command.&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;crypto key import rsa RSA-KEYPAIR-NAME IMPORT-FROM-URL background|passphrase KEYPASSPHRASE&lt;BR /&gt;background on DEVICE-NAME&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
&lt;BR /&gt;
&lt;BR /&gt;
&lt;BR /&gt;
But I could not find any information where I can configure the radius server on AP/controller to use this certificate for radius/802.1x auth.&lt;BR /&gt;
&lt;BR /&gt;
Or does the Wing AP/controller automatically use the latest certificate automatically? If this is the case do I break something when all APs and the controller have the same certificate?&lt;BR /&gt;
&lt;BR /&gt;
Thank you in advance for your help&lt;BR /&gt;
Ned</description>
      <pubDate>Tue, 27 Aug 2019 22:36:59 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/local-radius-with-ldap-and-local-users/m-p/70197#M6339</guid>
      <dc:creator>Ned</dc:creator>
      <dc:date>2019-08-27T22:36:59Z</dc:date>
    </item>
    <item>
      <title>Re: Local radius with LDAP and local users</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/local-radius-with-ldap-and-local-users/m-p/70198#M6340</link>
      <description>Hi Ned,&lt;BR /&gt;
&lt;BR /&gt;
It may be a better option to have Radius service run from the controller instead of each AP if trusted cert is already imported into controller.&lt;BR /&gt;
&lt;BR /&gt;
If you need certs to be pushed to all the APs, see article below:&lt;BR /&gt;
&lt;BR /&gt;
&lt;A href="https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-synchronize-custom-trustpoint-across-WiNG-deployment" target="_blank" rel="nofollow noreferrer noopener"&gt;https://gtacknowledge.extremenetworks.com/articles/How_To/How-to-synchronize-custom-trustpoint-across-WiNG-deployment&lt;/A&gt;</description>
      <pubDate>Tue, 27 Aug 2019 22:50:12 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/local-radius-with-ldap-and-local-users/m-p/70198#M6340</guid>
      <dc:creator>Daren_E</dc:creator>
      <dc:date>2019-08-27T22:50:12Z</dc:date>
    </item>
    <item>
      <title>Re: Local radius with LDAP and local users</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/local-radius-with-ldap-and-local-users/m-p/70199#M6341</link>
      <description>Hello Daren,&lt;BR /&gt;
&lt;BR /&gt;
I agree with you that the radius server on the controller is a better solution. But when I change the aaa policy settings from AP based&lt;BR /&gt;
&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;aaa-policy Testcorp_local_radius&lt;BR /&gt;authentication server 1 onboard self&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
back to controller based&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;aaa-policy Testcorp_local_radius&lt;BR /&gt;authentication server 1 onboard controller&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
I'm back to the point where I started. The radius runs on controller but does LDAP auth instead of local authentication.&lt;BR /&gt;
&lt;BR /&gt;
If you could confirm this problem is related to have LDAP auth with local radius (Wifi01 and Wifi02) and local authentication on controller (Testcorp), I could authenticate Wifi01 and Wifi02 on an external radius server (like the SSID Employee) and use the local radius on the controller exclusively for SSID Testcorp.&lt;BR /&gt;
&lt;BR /&gt;
Is it a supported setup to have local authentication on AP (onboard self) and local auth on controller (onboard controller) at the same time for different SSIDs?</description>
      <pubDate>Wed, 28 Aug 2019 20:56:22 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/local-radius-with-ldap-and-local-users/m-p/70199#M6341</guid>
      <dc:creator>Ned</dc:creator>
      <dc:date>2019-08-28T20:56:22Z</dc:date>
    </item>
    <item>
      <title>Re: Local radius with LDAP and local users</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/local-radius-with-ldap-and-local-users/m-p/70200#M6342</link>
      <description>Hi Ned,&lt;BR /&gt;
&lt;BR /&gt;
Its not supported to have same radius service mapped to both AP and controller (you might have issue).&lt;BR /&gt;
But we do support local radius with LDAP on either AP or controller.&lt;BR /&gt;
 Something my be wrong with the config somewhere.&lt;BR /&gt;
&lt;BR /&gt;
I would suggest opening a case with GTAC so we can review the tech-support from the AP and the controller.</description>
      <pubDate>Wed, 28 Aug 2019 22:22:12 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/local-radius-with-ldap-and-local-users/m-p/70200#M6342</guid>
      <dc:creator>Daren_E</dc:creator>
      <dc:date>2019-08-28T22:22:12Z</dc:date>
    </item>
    <item>
      <title>Re: Local radius with LDAP and local users</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/local-radius-with-ldap-and-local-users/m-p/70201#M6343</link>
      <description>Hello Daren,&lt;BR /&gt;
&lt;BR /&gt;
I think I have this issue:&lt;BR /&gt;
&lt;BLOCKQUOTE&gt;Its not supported to have same radius service mapped to both AP and controller.&lt;/BLOCKQUOTE&gt;&lt;BR /&gt;
&lt;BR /&gt;
I leave the Guest Wifi auth. on APs and authenticate the Testcorp Wifi with LDAP on the controller.&lt;BR /&gt;
&lt;BR /&gt;
Thank you very much for your help.</description>
      <pubDate>Wed, 04 Sep 2019 22:51:07 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/local-radius-with-ldap-and-local-users/m-p/70201#M6343</guid>
      <dc:creator>Ned</dc:creator>
      <dc:date>2019-09-04T22:51:07Z</dc:date>
    </item>
    <item>
      <title>Re: Local radius with LDAP and local users</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/local-radius-with-ldap-and-local-users/m-p/70202#M6344</link>
      <description>Hi Ned ,&lt;BR /&gt;
&lt;BR /&gt;
I'm using WING VX9000 version 5.9.4.0-020R , And have similar setup working as yours,&lt;BR /&gt;
&lt;BR /&gt;
 The client wants to receive front-end authentication using-both , ldap-and-external-radius-server.&lt;BR /&gt;
Authentication with eap-auth-type peap-mschapv2&lt;BR /&gt;
And later on in the project to add captive-portal Geast&lt;BR /&gt;
I before on-site testing and created In a test environment a local radius server with the local user database&lt;BR /&gt;
&lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;code:&lt;/B&gt;&lt;BR /&gt;
&lt;DIV class="threadCode"&gt;&lt;B&gt;code:&lt;/B&gt;&lt;PRE spellcheck="false"&gt;aaa-policy MedTech_local_radius&lt;BR /&gt;authentication server 1 onboard controller&lt;BR /&gt;authentication protocol mschapv2&lt;BR /&gt;&lt;BR /&gt;radius-server-policy RADIUS-Policy&lt;BR /&gt;use radius-user-pool-policy Med-User-Pool&lt;BR /&gt;authentication eap-auth-type peap-mschapv2&lt;BR /&gt;authentication data-source ldap ssid Wifi87 precedence 1&lt;BR /&gt;&lt;/PRE&gt;&lt;/DIV&gt;&lt;BR /&gt;
&lt;BR /&gt;
Is the correct authentication of DEFAULT SOURCE  local / LDAP ?&lt;BR /&gt;
Do i Need Ldap Agent?&lt;BR /&gt;
&lt;BR /&gt;
Will you be able to share the Config you have created and working.&lt;BR /&gt;
&lt;BR /&gt;
Thank you for your advice,&lt;BR /&gt;
Chen</description>
      <pubDate>Thu, 03 Oct 2019 22:02:30 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/local-radius-with-ldap-and-local-users/m-p/70202#M6344</guid>
      <dc:creator>Chen</dc:creator>
      <dc:date>2019-10-03T22:02:30Z</dc:date>
    </item>
  </channel>
</rss>

