Extreme GuestEssentials v9.0 User Guide
Extreme GuestEssentials v9.0 User Guide
Version 9.0
9037483-00 Rev AA
May 2022
Copyright © 2022 Extreme Networks, Inc. All rights reserved.
Legal Notice
Extreme Networks, Inc. reserves the right to make changes in specifications and other information
contained in this document and its website without prior notice. The reader should in all cases
consult representatives of Extreme Networks to determine whether any such changes have been
made.
The hardware, firmware, software or any specifications described or referred to in this document
are subject to change without notice.
Trademarks
Extreme Networks and the Extreme Networks logo are trademarks or registered trademarks of
Extreme Networks, Inc. in the United States and/or other countries.
All other names (including any product names) mentioned in this document are the property of
their respective owners and may be trademarks or registered trademarks of their respective
companies/owners.
For additional information on Extreme Networks trademarks, see: www.extremenetworks.com/
company/legal/trademarks
Monitor........................................................................................................................................................15
Summary......................................................................................................................................................................... 15
Map View Controls.............................................................................................................................................17
Summary Details............................................................................................................................................... 20
Dashboard...................................................................................................................................................................... 21
Creating a New Dashboard.......................................................................................................................... 22
Dwell Charts.........................................................................................................................................................26
Dashboard Basics..............................................................................................................................................28
Available Dashboard Widgets.................................................................................................................... 30
Configure................................................................................................................................................... 32
Settings...........................................................................................................................................................................32
Authorization Policy........................................................................................................................................ 32
Access Groups....................................................................................................................................................36
Deployment.................................................................................................................................................................. 39
Location................................................................................................................................................................ 40
Network.................................................................................................................................................................. 41
Devices................................................................................................................................................................... 42
Notification................................................................................................................................................................... 44
Policy...................................................................................................................................................................... 44
Onboarding...................................................................................................................................................................47
Onboarding Policy............................................................................................................................................47
Onboarding Rules.............................................................................................................................................. 51
Splash Templates....................................................................................................................................................... 53
User Templates................................................................................................................................................... 57
Configure Users.......................................................................................................................................................... 79
Create Users..........................................................................................................................................................81
Create Bulk Vouchers......................................................................................................................................83
Create Users and Bulk Vouchers from ExtremeCloud IQ............................................................. 84
Configure Clients....................................................................................................................................................... 86
Create Clients......................................................................................................................................................87
Analyze...................................................................................................................................................... 89
Analyze Clients........................................................................................................................................................... 89
Clients Details Table........................................................................................................................................ 90
Clients Detail....................................................................................................................................................... 90
Filter Client Results........................................................................................................................................... 91
Reports.............................................................................................................................................................................91
Create and Schedule a Report................................................................................................................... 92
Work with Existing Reports......................................................................................................................... 93
Report Settings..................................................................................................................................................94
Analyze Users..............................................................................................................................................................96
System Level....................................................................................................................................................... 96
Site Level............................................................................................................................................................... 97
Filtering User Results...................................................................................................................................... 98
Index......................................................................................................................................................... 105
Glossary................................................................................................................................................... 100
Text Conventions
Unless otherwise noted, information in this document applies to all supported environments for the
products in question. Exceptions, like command keywords associated with a specific software version,
are identified in the text.
When a feature, function, or operation pertains to a specific hardware product, the product name is
used. When features, functions, and operations are the same across an entire product family, such as
ExtremeSwitching switches or SLX routers, the product is referred to as the switch or the router.
Table 2: Text
Convention Description
screen displays This typeface indicates command syntax, or represents information as
it is displayed on the screen.
The words enter and type When you see the word enter in this guide, you must type something,
and then press the Return or Enter key. Do not press the Return or
Enter key when an instruction simply says type.
Key names Key names are written in boldface, for example Ctrl or Esc. If you must
press two or more keys simultaneously, the key names are linked with a
plus sign (+). Example: Press Ctrl+Alt+Del
Words in italicized type Italics emphasize a point or denote new terms at the place where they
are defined in the text. Italics are also used when referring to
publication titles.
New information. In a PDF, this is searchable text.
Send Feedback
The Information Development team at Extreme Networks has made every effort to ensure that this
document is accurate, complete, and easy to use. We strive to improve our documentation to help you
in your work, so we want to hear from you. We welcome all feedback, but we especially want to know
about:
• Content errors, or confusing or conflicting information.
• Improvements that would help you find relevant information.
• Broken links or usability issues.
Provide the publication title, part number, and as much detail as possible, including the topic heading
and page number if applicable, as well as your suggestions for improvement.
Before contacting Extreme Networks for technical support, have the following information ready:
• Your Extreme Networks service contract number, or serial numbers for all involved Extreme
Networks products
• A description of the failure
• A description of any actions already taken to resolve the problem
• A description of your network environment (such as layout, cable type, other relevant environmental
information)
• Network load at the time of trouble (if known)
• The device history (for example, if you have returned the device before, or if this is a recurring
problem)
• Any related RMA (Return Material Authorization) numbers
1. Go to The Hub.
2. In the list of categories, expand the Product Announcements list.
3. Select a product for which you would like to receive notifications.
4. Select Subscribe.
5. To select additional products, return to the Product Announcements list and repeat steps 3 and 4.
Extreme Networks offers product training courses, both online and in person, as well as specialized
certifications. For details, visit www.extremenetworks.com/education/.
ExtremeGuest Essentials is a robust and comprehensive guest management and engagement solution
that personalizes engagement by understanding customer behavior and interest, and then tailoring
services based on those insights. For example, the number of customers that enter a store, how often
they visit, and how much time they spend are all metrics that can be measured through ExtremeGuest
Essentials.
ExtremeGuest Essentials can take advantage of social networking behavior to increase patronage,
expand brand exposure, and understand client demographics and preferences in a more comprehensive
and personal way. Guest onboarding with sponsor approval is supported, allowing a sponsor to approve
or deny guest access with a single click.
ExtremeGuest Essentials supports all access point models that are supported with ExtremeCloud IQ,
including the AP4000/U — 2.4 and 5 GHz radio bands only.
For documentation on each access point, refer to the AP model number under Extreme Documentation
at extremenetworks.com/documentation.
To get started, go to the ExtremeCloud IQ Dashboard and select the Essentials icon from the list.
Then select ExtremeGuest Essentials. The ExtremeGuest Essentials Connection Status launches in
ExtremeCloud IQ.
Select the to access the ExtremeCloud IQ HelpDesk feature, which provides you with access to
several additional functions in the drop-down list:
Note
You can configure ExtremeGuest Essentials bulk vouchers using the HelpDesk feature in
ExtremeCloud IQ. Or refer to ExtremeGuest Essentials instructions under Create Bulk
Vouchers on page 83.
Select the More Insights button at the top right corner of the Overview to launch ExtremeGuest
Essentials and open the ExtremeGuest Essentials Dashboard.
Related Topics
User Management on page 11
Create Bulk Vouchers on page 83
User Management
Select Global Settings > Account Management to review and edit ExtremeCloud IQ Admin Account
information. To add a new Admin account, select the Add icon in the top left corner of the Admin
Accounts page to open the Add New Admin page:
Monitor role has the ability to view dashboards, view active users (with block access) including
devices. Monitor role can create and execute reports based on assigned location and create
vouchers. Monitor role does not have access to configuration dialogs including templates.
UI Overview
ExtremeGuest Essentials is a comprehensive solution that customizes engagement by analyzing
customer behavior and interest, and then tailoring services based on those insights. For example, using
ExtremeGuest Essentials, you can track how many customers use the guest network, how often they
visit, and how much time they spend on the guest network.
ExtremeGuest Essentials offers the following main options. Select each option to display the
ExtremeGuest Essentials tools and configuration settings:
Monitor on page 15
Configure on page 32
Analyze on page 89
On a narrow browser, such as a phone or tablet, the menu displays as three horizontal lines. Selecting
the lines produces a pull down navigation menu with the following items:
• Monitor on page 15
• Dashboard on page 21
• Configure on page 32
• Analyze on page 89
The Monitor workbench includes ExtremeGuest Essentials Summary information and Dashboard
information.
The Summary screen displays map-based views and active user summaries.
The Dashboard screen displays reports to help you manage ExtremeGuest Essentials.
Summary
The Summary screen displays map-based views and active user summaries.
The Summary is divided into to two sections: The left-panel tree and the right-panel Summary Details
on page 20 panel. Use the left-panel tree to navigate to sites within your networks. Expand the tree
and select a site to display user information specific to that site location.
The Map View is divided into to two sections: The left-panel tree and the right-panel map.
Use the left-panel tree to navigate to sites within your networks. Expand the tree and select a site to
refocus the map to that site location.
The bar at the top of the screen provides information about the total number of users and the total
number of users online.
If social media authentication is enabled, the bar will also display the number of users authenticated
using Facebook, Facebook Checkin, Google Plus, or LinkedIn.
A map view is generated using Google Maps based on site locations. Place your cursor over a site to
display key user metrics for that location.
Top-right corner of the Use to open the map in full-screen mode. Select
map the [Esc] button to exit full-screen mode.
Top-left corner of the Use to toggle between map view and satellite
map view. You can also add Terrain details to the map
view and labels to the satellite view.
The bar at the top of the window displays information about the total number of users and the total
number of users online.
If social media authentication is enabled, the number of users authenticated using Facebook, Google
Plus or LinkedIn also displays. The Summary Details on page 20 panel displays additional summary
information.
Summary Details
The User Walk In graph displays the number of users entering a location over a 24-hour time
period, with data points at each hour. Data is further separated between Total Users, Return Users,
and New Users.
Dwell Time
The Dwell time graph displays the amount of time users stayed at a location over a 24-hour time
period, with data points at each hour. Data is further separated into the following time durations:
• < 30 Minutes
• 30-60 Minutes
• 1-2 Hours
• 2-4 Hours
• 4-7 Hours
• > 7 Hours
Note
Use the Show Grouped /Show Stacked icons to display user data grouped into
categories or stacked into separate categories for each of the time durations.
Today
The Today chart displays data from the last two days and a comparison of Visitors and New Users
data in percentages. The Visitors graph displays the total number of users over time. The New Users
graph displays the number of first-time users over time. The Conversion graph displays the number
and percentage of users who converted from Connected to Onboarded customers. The information
displayed in all three graphs starts at midnight of the previous day and goes through the current
time. The data resets each day at midnight.
Gender
The Gender chart displays the percentage of users by gender.
Age
Use the Show Bar Chart /Show Pie Chart icons to display user data as a bar chart or pie chart
respectively. The Age chart displays the total number of users, separated into the following age
ranges:
• > 55
• 45-55
• 35-44
• 25-34
• 15-24
• < 15
Dashboard
Dashboard provides a holistic view of user data at the entity level or for individual sites. The Dashboard
menu offers customizable widgets and layout themes. Use these widgets and themes to create
customized dashboards providing a comprehensive overview of user trends and engagement.
Select Dashboard from the main menu, to view existing dashboards and to access the create dashboard
option. For more information, refer to the following sections:
• Creating a New Dashboard on page 22
• Available Dashboard Widgets on page 30
Note
Dashboards can be created based on the selected location.
You can create customized ExtremeGuest Essentials dashboards with specific theme and widget
layouts. Themes define the number of data fields displayed in respect to the number of data items
(widgets) trended. ExtremeGuest Essentials features a flexible dashboard design where the dashboard
widgets can be added individually and freely resized once added to the dashboard.
Note
The new dashboard screen displays with no themes or widgets selected.
2. Drag and drop a theme from the Select Theme menu onto the main window.
To change the layout, drag another theme in place of the current one.
The dashboard layout displays the theme outline.
Note
Once a widget is placed it displays the data associated with that widget. For information
on the widget types available, see Available Dashboard Widgets on page 30.
5. Select Save to commit your changes or select Cancel to cancel dashboard creation.
When saving a new dashboard provide the following information:
Name
Enter a name that uniquely identifies the dashboard and defines its purpose. Once added, this
dashboard name displays in the Dashboard menu.
Note
This value is mandatory.
Description
Enter a brief description of the newly created dashboard.
Note
This value is optional.
Public
Select this option to make the dashboard available to all ExtremeGuest management interface
users.
6. Select Save to save and exit.
Dwell Charts
Dwell Charts
The Dwell tab displays two User Distribution Dwell charts that provide detailed dwell time information:
• User Distribution - User Walk-In
• User Distribution - Dwell Time
• 4-7 Hours
• > 7 Hours
Dashboard Controls
Filter data in the charts using the following Dashboard controls:
• 1 Month
• 3 Months
Dashboard Basics
Dashboard Components
The Dashboard includes several components:
• Location
• Main
• Controls
• Report Duration Filter
Location
The left-panel includes your networks. Expand your networks to display the locations within each
network. Select a locationa and the widgets you select in the Main panel displays client and usage data
from those locations.
Main
The Main Dashboards area displays the following:
• Themes - define the layout of the dashboard page and control the number of widgets that can be
displayed.
• Widgets - control the type of information that is displayed in the dashboard. For more information
on what dashboard widgets are available see: Available Dashboard Widgets on page 30.
Dashboard Controls
Filter data or change the view of a widget using the controls available on the dashboard. Not all controls
are available for each widget. The following table describes the widget controls:
• 1 Week
• 1 Month
• 3 Months
Users Distribution - User Graph displaying the number of users entering a location over a filtered
Walk In time period. Filter the User Walk In information into the following time
periods:
• 1 hour: with data points each minute
• 8 hours: with data points each hour
• 1 day: with data points each hour
• 1 week: with data points each day
Data is further separated between Total Users, Return Users, and New
Users.
Usage Data Usage Chart Graph displaying upstream and downstream bandwidth usage over time.
Usage Data Usage Graph displaying upstream, downstream, and total bandwidth usage.
Summary
Usage Key Metrics Infographic displaying user information about online status, device, and
social media sign in status.
Miscellaneous Label Custom label for creating Dashboard titles.
The Configure workbench provides sub-menus that define the various aspects of your ExtremeGuest
Essentials captive portal. For more information, refer to the following sections:
• Settings on page 32
• Network on page 41
• Location on page 40
• Devices on page 42
• Notification on page 44
• Onboarding on page 47
• Splash Templates on page 53
Settings
Configure → Settings
Settings includes detailed information about your network's Authorization Policy on page 32 and
Access Groups on page 36. Use these tabs to add, modify, or review access profile and group
information.
Authorization Policy
Configure → Settings → Authorization Policy
GuestAccessPolicy
This policy is applicable for already registered guest users. It authenticates the user, applies the
Guest Access role/group and provides network access.
UnregisteredPolicy
Registers a first-time guest user and applies the Unregistered role to the user.
TempAccessPolicy
Provides temporary guest access to your network. Note, temporary guest users are not applied to
any role/group.
Note
This setting is mandatory.
Description
Note
This setting is mandatory.
Inactivity Timeout
Set an inactivity timeout from 60 - 86,400 seconds. If a frame is not received from a client within
the set time, the current session is terminated.
Session Timeout
Enable this option to set a client session timeout from 5 - 144,000 minutes. This is the session time a
client is granted upon successful authentication. Upon expiration, the RADIUS session is terminated.
4. Select Save to save your changes or select Cancel to discard the new authorization policy.
Access Groups
Configure → Settings → Access Groups
This is the default group applied for guests who have temporary access to your network. The
Authorization Policy associated with this group is TempAccess Policy.
Unregistered
This is the default group applied to users before registration. The Authorization Policy associated
with this group is UnregisteredPolicy.
GuestAccess
This is the default group applied to users after they have registered. The Authorization Policy
associated with this group is GuestAccessPolicy
DenyAccess
This is the default group applied to users who are already registered but are unauthorized to use the
network. The Authorization Policy associated with this group is DenyAccessPolicy
Note
This setting is mandatory.
Description
Enter a description for the new Access Group.
Note
This setting is mandatory.
Access Profile
Select the Access Profile policy from the pull down menu. Available policy types are
DenyAccessPolicy, GuestAccessPolicy, TempAccessPolicy, and
UnregisteredPolicy.
4. Select Save to save your changes, or select Cancel to discard the new Access Group.
Deployment
Configure → Deployment
Deployment includes detailed user access information related to your locations, network, and devices..
Location
Configure > Deployment > Location
The Location screen lists sites attached to ExtremeGuest Essentials. It provides description and location
information for sites.
1. From the main menu, go to Configure > Deployment > Location.
A list of existing sites displays. Sites that are enabled display a green icon. Disabled sites display a
gray icon. APs connected to disabled sites do not count against the licenses in use.
Note
To filter by name or portion of a name, enter the string in the box at the top of the
Name column. The screen updates with sites having names matching the specified
string. To clear the filter select the icon.
Building
Note
To filter by city name or portion of a city name, enter the string in the box at the top of
the City column. The screen updates with sites having city configuration matching the
specified string. To clear the filter select the icon.
Latitude
Displays the latitude of the location.
Longitude
Displays the longitude of the location.
Network
The Network screen provides status and management for networks attached to the ExtremeGuest
Essentials application.
1. From the main menu, go to Configure > Deployment > Network.
A list of existing networks displays.
Devices
The Devices screen provides name, MAC address, location and network information for devices on
networks attached to the ExtremeGuest Essentials application.
Note
To filter by device name or portion of a device name, enter the string in the box at the
top of the Name column. The screen updates with devices having name matching the
specified string. To clear the filter select the icon.
MAC
Displays the MAC address for each known device.
Note
To filter by MAC address or portion of a MAC address, enter the string in the box at the
top of the MAC column. The screen updates with devices having MAC address
matching the specified string. To clear the filter select the icon.
Location
Displays the site name associated with each device.
Note
To filter by site name or portion of a site name, enter the string in the box at the top of
the Site Name column. The screen updates with devices having site configuration
matching the specified string. To clear the filter select the icon.
Network
Note
To filter by network name or portion of a network name, enter the string in the box at
the top of the Network column. The screen updates with sites having network
configuration matching the specified string. To clear the filter select the icon.
Notification
The Notification screens allows you to configure and implement notification policies and rules.
Notification policies specify the method used for all types of communication with guest user, such as
communicating the pass code to newly registered guest users or sending a report to specified guest
users. Refer to the following for more information:
• Policy on page 44
Policy
The Policy screen displays existing notification policies and their basic configuration. Double-click each
policy to view the detailed configuration. Review the configuration details to determine if the policy
warrants modification or removal.
Displays the description entered when the notification policy was created.
Policy Type
Displays the policy type entered when the notification policy was created.
Action
Deletes a notification policy. To delete a policy, select the check box next to it and then select the
icon associated with the policy.
Notification policies specify the method used to communicate the passcode to newly registered guest
users.
This screen allows you to specify the mode by which the passcode is communicated. The options are:
• SMS - Uses a third-party SMS service provider.
• Email - Uses an SMTP server.
3. Provide a name for the policy uniquely identifying its mode and purpose.
Note
This setting is mandatory.
(In the actual message, the tags are replaced with the user's name, username, and passcode.)
For example (Sponsor Policy Type):
(In the actual message, the tags are replaced with the user's name, username, and passcode.)
Note
The prefix [EXTR] (optional) in the message field is a filter to prevent notifications
from being interpreted as spam, causing them to be blocked .
c. In the Message field, configure the content of the email sent to the guest user notifying them of a
pass code (should not exceed 1024 characters).
8. Select Save to save your changes or select Cancel to discard the notification policy.
Onboarding
Guest onboarding is the process used to register a wired or wireless client when they join a hotspot
network. Onboarding enables hotspot network providers to collect client information, send client
passcodes and set up external approval for guest access using rules and policies.
Onboarding Policy
Onboarding policies are used by ExtremeGuest Essentials to give flexibility when determining hotspot
user access. Policies are matched to the hotspot user based on onboarding rules. Then the matching
policy with the highest precedence number is used to onboard the hotspot user.
3. Select the icon to update the data in the onboarding policy table.
Adding an Onboarding Policy
4. To add a new onboarding policy, select the icon.
5. Provide the following information:
Policy Name
Enter a name for the onboarding policy.
Policy Description
Enter a description for the onboarding policy.
Adding Match Criteria to the Onboarding Policy
6. In the Criteria #1 field, add the match criteria rule details. An onboarding policy consists of one or
more match criteria that are used to filter guests and apply an action.
Description
Enter a description for this criteria uniquely identifying its purpose.
Condition(s)
Select one or more of the following conditions to match:
• User Email Domain If you select this condition, an additional Value condition field displays.
Enter the domain in the Value field.
Note
Enter "Any" (case sensitive) in the Value field to indicate any email address,
regardless of domain. Use "Any" when you want to allow or deny all users to access
the network.
• Sponsor Email Domain If you select this condition, an additional Value condition field
displays. Enter the domain in the Value field.
• Social Type If you select this condition, an additional condition field displays. Select the type
of social media (Facebook, Google, LinkedIn) from the drop-down list.
• User Type If you select this condition, an additional condition field displays. Select the user
type (Employee, Vendor, Guest) from the drop-down list.
• User's Device Count an additional condition field displays. Select the number of devices
being used from the drop-down list.
• Any
These conditions determine when the corresponding Action is triggered. Adding multiple
conditions requires all conditions be met before the action is triggered. Multiple conditions can
be specified to enact different policies based on matching conditions.
Action
Select an Action from the menu. The Action is triggered when all of the Condition(s) are met.
Select from the following:
Deny Access
Denies network access to any guests matching the configured Condition(s).
Register Device
Registers guests matching the configured Condition(s).
Note
Specify the Validity for guest access in Days, Hours, and Minutes. Select a Group
for the guest user to join.
Note
Specify the Validity for guest access in Days, Hours, and Minutes. Select a Group
for the guest user to join. Select a user Notification Policy for sending the One-
Time-Passcode to the guest.
Note
Specify the Validity for guest access in Days, Hours, and Minutes. Select a Group
for the guest user to join. Select a configured user Notification Policy for sending
the One-Time-Passcode to the guest.
Note
Specify the Validity for guest access in Days, Hours, and Minutes. Select a Group
for the guest user to join. Select a sponsor Notification Policy for sending the
approval request to the sponsor.
Note
Specify the Validity for guest access in Days, Hours, and Minutes. Select a Group
for the guest user to join. Select a configured sponsor Notification Policy for
sending the One-Time-Passcode to the guest.
Note
The sponsor can then provide the single-use passcode to the guest. Specify the
Validity for guest access in Days, Hours, and Minutes. Select a Group for the guest
user to join. Select a sponsor Notification Policy for sending the approval request
to the sponsor.
Note
The sponsor can then provide the passcode to the guest. Specify the Validity for
guest access in Days, Hours, and Minutes. Select a Group for the guest user to join.
Select a sponsor Notification Policy for sending the approval request to the
sponsor.
7. Select Update User to send status to a user's email or mobile when registration is pending approval
or is rejected.
Selecting the Update User option enables the Notification Policies field. Select a notification policy
to specify how the user is notified.
8. To remove multiple onboarding policies from ExtremeGuest Essentials, select the boxes for each
policy then select the icon.
Onboarding Rules
Onboarding rules are used in conjunction with onboarding policies to give flexibility when determining
hotspot user access. Policies are matched to the hotspot user based on onboarding rules. Then the
matching policy with the highest precedence number is used to onboard the hotspot user. Create
onboarding policies before creating onboarding rules.
Precedence
Displays the precedence number for each onboarding rule. Precedence determines which order
rules are applied in with the higher precedence rules matched first.
Action
Select the icon to remove the associated onboarding rule from ExtremeGuest Essentials.
2. Select the icon to update the data in the onboarding rules list.
3. Select the icon to add a new onboarding rule.
4. Use the Network pull-down menu to select the networks that the onboarding rule applies to. The
default value is All Networks, which applies the rule to all networks.
5. Use the Location pull-down menu to navigate the system tree and select the location(s) to which
the onboarding rule will apply.
Starting with this release onboarding rule can be applied at any point on the location tree. You can
either select the endpoint of the location tree (representing an RF Domain) or a node higher up in
the tree. In the following screen shot, selecting 'Extremenetworks-CA107' applies the rule to
both RF Domains 'CA107-SJC' and 'CA107-SJC-1'.
In the following screen shot the rule has been applied only to the 'CA107-SJC' RF Domain.
When a client registration request is received from the network specified in Step 4 above, the
onboarding rule is applied only if the client's RF Domain matches the locations specified here. In the
above scenario the match criteria is only 'CA107-SJC', whereas in the previous scenario it is 'CA107-
SJC' and 'CA107-SJC-1'. Once the 'Network' and 'Location' criteria match, the onboarding policy
associated with the rule is applied.
6. Use the Precedence Level spinner control to assign a precedence to the rule. The precedence value
of a rule determines its priority.
Note
The lower the precedence value, the higher the priority. Rules with lower precedence will
be applied first.
Splash Templates
The Splash Template screen has the following sub-screens: System Templates and User Templates.
The System Templates tab displays a summary of available captive portal splash screen templates. You
can perform the following actions:
• Download a system template and customize it to suit your requirements.
• Clone a system template.
• View a summary of networks to splash templates mapping.
2. Select a pre-made System Template from the screen. The available options are:
Accept_and_Connect
Splash template to use for free Wi-Fi access with a simple Accept & Connect button. Selecting
this button provides internet access and also registers the device with ExtremeGuest Essentials.
Accept_and_Connect_with_terms_and_agreement
Splash template to use for free Wi-Fi access with a simple Accept & Connect button and a
hyperlink to view terms and conditions. Selecting this button provides internet access and also
registers the device with ExtremeGuest Essentials.
Device_Registration_with_Social_WiFi
Splash template to use for free Wi-Fi access with a customizable registration form and social
sign-in options. Guest users' devices are registered along with their registration or social profile
details with ExtremeGuest Essentials.
Email_Access
Splash template to use for free Wi-Fi access with an option to capture guest users' Email
Addresses or Mobile Numbers. Guest users' devices are registered along with their email
addresses or mobile numbers with ExtremeGuest Essentials.
Social_WiFi_with_Facebook_and_GooglePlus
Splash template to use for free Wi-Fi access with Facebook or GooglePlus social sign-in options.
Guest users' devices are registered along with their social profile details with ExtremeGuest
Essentials.
Social_WiFi_with_all
Splash template to use for free Wi-Fi access with customizable Facebook/GooglePlus/LinkedIn
social sign-in options. Guest users' devices are registered along with their social profile details
with ExtremeGuest Essentials.
Sponsored_Guest_Access
Splash template to use for sponsored Wi-Fi access for different category of users. For example,
employees can self-register their devices, and guests and vendors can request the sponsor to
approve the Wi-Fi access.
User_Registration_with_Social_WiFi
Splash template to use for free Wi-Fi access with a customizable user registration form and
social sign-in options. Guest user registration details or social media profile details are registered
with ExtremeGuest Essentials. Each guest user receives a One-Time-Passcode/Passcode to sign-
in to the network.
User_Registration_with_Social_WiFi_and_Forgot_Passcode
Splash template to use for free Wi-Fi access with a customizable user registration form and
social sign-in options. Guest user registration details or social media profile details are registered
with ExtremeGuest Essentials. Each guest user receives a One-Time-Passcode/Passcode to sign-
in to the network. The template includes a Forgot Passcode button for users to recover forgotten
passcodes.
3. Select the icon to download the template locally.
4. Edit the company name and logo, where applicable, and use the User Templates tab to upload the
edited template.
For information on uploading the template, see User Templates on page 57.
5. Select the icon, at the bottom, right corner of a template, to clone it.
The selected template opens in the edit mode.
In the Summary View, the ExtremeGuest Hosted templates are listed. These templates are hosted
directly on ExtremeGuest Essentials.
9. Select the icon and select a network from the drop-down menu displayed. The screen updates to
display templates associated with the selected network.
For each template, the Name and Status is displayed.
10. You can perform the following actions on the Splash Template Mapping Summary screen:
Check Template Status
Select the icon to display troubleshooting and log information for
a template.
This information includes network reachability, configuration validity
and splash template verification. It also displays log entries for this
template. Use the filter field to filter log entries. Download or copy
the log using the Save to Disk and Copy to Clipboard buttons
respectively.
Re-Apply Select the or icons to clear and re-apply the splash template
to its associated site.
Delete Select the icon to remove the splash template from ExtremeGuest
Essentials.
User Templates
The User Templates screen displays a summary of captive portal splash templates hosted by
ExtremeGuest Essentials.
These splash templates are of two types: customized-system templates and user-defined templates.
The User Templates screen allows you to:
• upload a splash template from your local file system.
• apply splash template to a network.
• edit an existing splash template.
• create a new splash template.
• view splash template to network mapping summary.
Follow the steps below to upload, edit, create a splash template or get a summary view of existing
templates.
3. Enter a name for the template, select Browse and navigate your local file system to locate and select
the splash template file.
4. Select Upload.
The selected splash template is uploaded to ExtremeGuest Essentials from your local system.
Applying Splash Templates to Networks
Splash templates displayed on the User Templates screen can be applied to networks.
5. Select to apply the captive portal template to a network.
Note
The icon indicates that the template is already applied to a network. The icon
indicates that the template has been changed after it has been applied to a network.
Location Map the captive portal page with one or more locations. When
mapped, the APs within one or more locations serve the captive
portal pages to guest users, either directly or through the
ExtremeGuest Essentials web server.
Expand the Location tree to view the locations (RF Domains)
defined within your network. Drill down to the last node and select
a site. Or, select any one of the upper nodes (country, state, region,
or campus) to apply the captive portal pages to multiple sites.
Network Select the icon to view available networks. Select the network to
which this captive portal provides access.
When selected, guest users attempting access to the specified
network are required to authenticate with the captive portal and are
allowed access only if successfully authenticated.
Apply Select to activate the captive portal template.
Note
If editing a template, go to Creating/Editing Splash Templates for more information.
Note
For information about this screen and its content, see Viewing a Summary of Available
Splash Templates.
The User Templates screen provides a robust, easy-to-use splash template builder wizard. Use the
wizard's 'drag & drop' elements, color, text and language customization tools and logo upload options
to create your branded captive portal web pages.
11. To create a new splash template, select the icon.
To edit an existing template, select the icon below the template. The template opens in the edit
mode.
The Create Splash Template screen opens.
12. Enter a name for the splash template. Provide a name that uniquely identifies its purpose.
13. Select the type of web pages your users will be served.
Note
Below the Name field is the splash template page tabs. By default the following three tabs
are displayed: Landing, Welcome and Failure.
Note
You can remove all other splash template pages except the Landing page. To remove a
page, place the cursor on the tab and select the icon.
15. Select a splash template tab to add or edit the page contents.
Note
The add/edit page screen is divided into a bigger, main pane and a right-hand panel. Each
splash page type has its own collection of themes, widgets and page settings options that
are displayed in the right-hand panel. These options are the building components that you
will use to build your page content.
Note
When creating the page layout, take into consideration the various elements (text, image,
buttons, login options, etc.) that you plan at add to the page.
Note
You can use multiple layouts or templates or a combination of layouts and templates to
divide the page into sections. The height of these sections can be adjusted by dragging
the bottom margins.
17. Once the themes are added, you can perform following actions:
a. Change background color of a layout or template. Select the icon to open the built-in color
palette. Select the background color and select OK .
The Color Palette displays.
b. Reset background color. Select the icon to reset background color to transparent.
c. Remove a layout or template. Select the icon to remove the layout or template.
19. Drag and drop a widget into the layouts/templates on the splash page. The following are the
available widget types:
Text Widget Adds text to the page.
Image Widget Adds image to the page.
HTML Widget Adds HTML content to the page. Use this widget to design your
web page from scratch, without using any of the system-provided
themes or widgets.
Slide Show Widget Adds a slide-show component to the page, using the images
available in the gallery.
Video Content Widget Adds video to the page.
Button Widget Adds any button with a per-defined hyperlink to a page.
Registration Form Widget Adds a registration form to the page. Users are served an internal
(or) externally hosted registration page where they have to
complete the registration process if not previously registered.
Login Options Widget Adds buttons that enable “Accept and Connect” action or go to
“Login” page action
Note
Each of the above widgets has two icon tools on the top, right corner of the widget bar.
Use the icon to edit the widget settings, use the icon to remove the widget.
Use this widget to insert content/text in the web page. The ExtremeGuest Essentials text widget
provides a pop-up, HTML editor to add text.
20.Select the icon to open the HTML text editor.
The Text widget - HTML Editor window displays.
21. Enter your text and use the HTML editor tools to set the font style, size, color and text alignment.
22. Use the tool to preview the content. Make changes if necessary.
23. Select Save Contents to save and exit the editor.
Editing Image Widget
Note
The Image widget not available for the 'Failure' web page.
Upload Image Select Browse and navigate your local file system to locate and
select the image file. Select Upload. The image is uploaded to the
Gallery .
Note: The following image file types are supported: .jpg, .jpeg,
and .png.
Alignment Use the alignment buttons to set the alignment of the image within
the layout cell.
Width and Height Use these options to change the image size. By default, an image
auto-resizes to fit in the layout cell.
Gallery The gallery displays user-uploaded images. Drag and drop an image
into the image widget. Select icon to remove an image.
Editing HTML Widget
The HTML widget allows you to design the content of the selected section of the web page using HTML
or JavaScript. Use this widget, to create the content of a specific section of the web page from scratch
instead of using the system-provided widget content.
Note
Both HTML and JavaScript is supported.
26. Enter your HTML code or JavaScript and select Save HTML Contents to save and exit the editor.
Editing Slide Show Widget
Image slide-shows are an excellent means of enhancing user engagement and experience. Use this
widget to add slide shows of images to the splash pages.
27. Select the icon to open the Slide Show Settings panel.
The Slide Show Settings panel displays.
Drag and drop images from the Gallery to create a slide show. You can upload and delete images
from the gallery as described in Step 20: Editing Image Widget.
Editing Video Content Widget
Videos enhance user engagement and experience. Make your web pages informative and attractive by
adding didoes to your web pages.
28. Select the icon to open the Video Settings panel.
The Video Settings panel displays.
The Video Settings panel has the Upload Video and Video gallery options, similar to the
Image Settings panel. Upload your video to the gallery, then drag and drop the video file into the
widget.
Note
This widget uses HTML5 Video tag. The following image file types are
supported: .mp4, .ogv and .webm. To ensure cross-browser compatibility, upload your
video file in all three formats. For example, save the video 'test' as 'test.mp4', test.ogv', and
'test.webm'. Upload all three files to the video gallery at the same time.
Button Widget is a simple and effective tool for inserting a button with hyper link to a web page. Use
this widget to create a button that directs users to a predefined URL.
29. Select the icon to open the Button Settings panel.
The Button Settings panel displays.
Url field Use this widget to insert a button that is hyperlinked to a pre-
defined page. In the URL field, enter the URL of the page the user is
directed to on clicking the button.
Text field Enter the text displayed on the button.
Font Size (in px) Set the font size in pixels.
Border Radius (in px) Set the button's border radius in pixels.
Size Use the slider to set the button size.
Alignment Set the button's alignment within the layout cell.
Text Use this tab to set the color of the text appearing on the button.
Button Use this tab to set the color of the button itself.
Editing Registration Form Widget
Use the Registration Form widget to insert a form where guest users enter specific information in order
to register with your captive portal.
Note
The Registration Form widget is available only for the 'Landing' web page.
Insert a registration form for first-time users. First-time users are required to enter information in the
fields displayed on the page. The available field options are: Full Name, Email, Mobile
Number, Gender, Birth Day, Terms & Conditions. Each field has an associated Enable and
Optional checkbox. Select Enable to add the field to the form. Select Optional to make the field
optional.
Note
The Terms & Conditions option adds the Terms & Conditions Widget at the end of the
page.
Use the Login Options Widget if you wish to enforce a 'Accept and Connect' or go to 'Login' page
action.
31. Select the icon to open the Login Options Settings panel.
Alignment Set the alignment of the button/link within the layout cell.
Button Select to insert a button.
Link Select to insert a hyperlink.
Text If selecting the 'Button' option, specify the text on the button. If
selecting the 'Link' option, specify the hyperlink text.
Font Size (in px) Set the font size in pixels.
Border Radius (in px) Set the button's border radius in pixels.
Text/Button Selecting the 'Button' option, enables these tabs. Use these tabs to
set the color of the text on the button and the color of the button
itself.
Font Size/Font Color Selecting the 'Link' option, enables these tabs. Use these tabs to set
the font size and color of the hyperlink text.
Editing Social Options Widget
Use this widget to add user authentication through social media applications. Guest users can use their
Facebook, Google or LinkedIn account credentials to authenticate and access the internet.
32. Select the icon to open the Social Options Settings panel.
Note
The Social Options Settings widget is available only for the 'Landing' and 'Login' web
pages.
Note
Ensure that the social media is added as an authenticator on the portal.
Social Type Use this drop-down menu to select the social media sign-in options.
Use this widget to insert 'Terms and Conditions' and 'Privacy Policy' hyperlinks with pop-up texts.
Note
The Terms and Conditions widget is available only for the 'Landing' web page.
33. Select the icon to open the Terms and Conditions Settings panel.
The Terms and Conditions Settings panel displays.
Figure 45: Create Splash Template - Terms And Conditions Settings Panel
Terms And Conditions Text Select the Edit Text button to open the HTML editor. Enter the
terms and conditions that the captive portal user views on clicking
the Terms And Conditions link.
Privacy Policy Select the Edit Text button to open the HTML editor. Enter your
company's privacy policies that the captive portal user views on
clicking the Privacy Policy link.
Alignment Set the alignment of the links within the layout cell.
Font Color Set the link text font color.
Font Size (in px) Set the link text font size in pixels.
Separator Text Set the separator between the two links.
Separator Space Use the slider to set the space between the separator and the links
on either side.
Editing Login Form Widget
Use this option to insert a simple login form. A login form is an easy and simple mode of authenticating
already registered guest users.
34. Select the icon to open the Login Form Settings panel.
The Login Form Settings panel displays.
The login form allows guest users to enter their username and passcode registered with the
ExtremeGuest Essentials database. The form has two fields. Each of these fields has two parameters:
The field label and the text displayed within the field placeholder. Customize the field labels and the
prompt-text displayed within the placeholder.
Editing WiFi Logout Widget
Use this option to insert a WiFi-Logout button. This option allows successfully authenticated guest
users to logout from the connected WiFi.
35. Select the icon to open the WiFi Logout Settings panel.
The WiFi Logout Settings panel displays.
Use the WiFi Logout Settings panel to customize the logout button as per your requirement. This
panel provides settings similar to the Button Settings panel with one exception, there is no URL field
in the WiFi Logout Settings panel. For more information, click here.
Editing Redirect Widget
Use this option to redirect the guest user to another web page. Since the redirect widget takes the user
to another page, you cannot use it in combination with other widgets. If your page layout has space for
more than one widget, you will be prompted to provide permission to delete other widgets on the web
page.
Note
The Redirect widget is available only for the 'Welcome', 'Failure' and 'No Service' web pages.
36. In the Edit Redirect URL box, specify the URL of the web page to which your users are to be
redirected.
The Edit Redirect URL window displays.
37. Select Page Settings. Use the page settings fields to either upload a background image or select a
background color for the remainder of the web page that lies outside of the Theme or Widget pane.
The Page Settings window displays.
Color
Use the built-in color palette to select the background color of the splash template. This
background color can be viewed in the Preview mode.
Upload Image
Use this option to upload and insert a background image. Select Browse and navigate your local
file system to locate and select the image. Select Upload. A thumbnail of the uploaded image is
added to the Gallery section. You can upload multiple images, however, only one image can be
used as the background image at a time.
No Repeat/Repeat/Horizontal Repeat/Vertical Repeat
This button changes the background image repeat status. If the image is small and does not
cover the entire page, you can repeat the image as multiple tiles in the background. No Repeat
prevents the image from displaying as tiles. Repeat makes the image repeat horizontally and
vertically. Horizontal Repeat makes the image repeat horizontally. Vertical Repeat
makes the image repeat vertically.
Scrolling/Fixed
This button changes the background image scrolling state. If the page is long and scrolls, you
can set the image to scroll along with the page content by setting the image state to
Scrolling. In the Fixed state, the background image remains still while the content scrolls.
Alignment
These buttons align the image horizontally (left, center and right) and vertically (top, middle and
bottom).
Reset Background
This button removes background image and color.
38. Select the preview icon to review your page design.
The splash page displays in the preview mode.
Figure 50: Create Splash Template - Device Type and Orientation Settings
Use the device orientation icons at the bottom of the screen to preview the splash page as seen on
different devices and orientation. The following viewing options are available for:
• Large screen devices like laptops (960 px wide)
• Tablets and other wide screen devices (768 px wide)
• Mobile devices with landscape orientation (568 px wide)
• Mobile devices with portrait orientation (320 px wide)
39. Exit the preview mode. Make changes to the page design if needed.
40.Select Save to save and exit.
41. Select Cancel to exit without saving.
Configure Users
The Users table displays detailed information about the users in your network.
Create Users
Configuration → Users → Create Users
You can create new users and add them to your network from the Configuration → Users → Create
Users tab.
Note
You can also configure ExtremeGuest Essentials Users using the HelpDesk Feature in
ExtremeCloud IQ.
To create a user:
1. Navigate to Configuration → Users from the main menu.
2. Select the Add icon at the top right corner of the page.
3. Select Create Users.
The Create Users tab displays.
Enter a telephone number for the voucher user. To set the telephone number as the username
and password select Use as username/password. This will remove the Username and Password
fields from the form.
Organization
Optionally, enter an organization to associate the voucher user with. This can used to specify a
company or organizational group for the voucher user.
Reason
Optionally, enter a reason why the voucher user was created. This can be helpful when there are
multiple administrators adding users.
Username
Enter a login username for the voucher user.
Note
If Use as username/password is selected in the Email or Telephone fields, the
Username field is not present.
Password
Enter a login password for the voucher user.
Note
If Use as username/password is selected in the Email or Telephone fields, the
Password field is not present.
Access Group
Optionally, select an access group from the list to associate the voucher user to that group.
Location
Select a location from the list to associate the voucher user with that location.
Start Date / Time
Use the calendar and pull-down menu to specify the starting date and time to activate the
voucher user.
Expiry Date / Time
Use the calendar and pull-down menu to specify the ending date and time that the voucher user
will be deactivated.
5. When all mandatory fields have been completed, select Create to complete voucher creation.
To discard any changes made to the form select Clear.
Related Topics
Create Bulk Vouchers on page 83
Create Users and Bulk Vouchers from ExtremeCloud IQ on page 84
Note
You can also configure ExtremeGuest Essentials bulk vouchers using the HelpDesk feature in
ExtremeCloud IQ.
Number of Vouchers
Enter a value or user the spinner control to specify the number of vouchers to create.
ExtremeGuest supports creating between 2 and 20,000 vouchers at a time.
Description
Optionally, enter a description that will apply to the group of bulk vouchers.
Location
Select a location from the list to associate it to the group of bulk vouchers.
Start Date / Time
Use the calendar and pull-down menu to specify the starting date and time to activate the group
of bulk created vouchers.
Expiry Date / Time
Use the calendar and pull-down menu to specify the ending date and time that the bulk created
vouchers will be deactivated.
5. When all mandatory fields have been completed, select Create to complete bulk voucher creation.
To discard any changes made to the form select Clear.
Related Topics
Create Users on page 81
Create Users and Bulk Vouchers from ExtremeCloud IQ on page 84
1. From the ExtremeCloud IQ page, select the icon in the top right corner to access the
ExtremeCloud IQ HelpDesk feature, which provides you with access to several additional functions in
the drop-down list:
4. To create the Guest Management role, select the Add icon at the top left corner of the Admin
Accounts window.
5. You can select an existing admin role or grant access to an external admin from this window.
The Add New Admin window opens.
6. Select Guest Management from the list of roles.
10. Select the Add icon from the top right corner to Create Users or Create Bulk Vouchers on page 83.
Configure Clients
Network
The network to which the client end point is included.
Location
The location to which the client end point is associated.
Expiry Time
The date and time that the client end point was no longer active.
Create Clients
Configuration → End Points → Create End Points
Network
Select a network from the list to associate it to the client end point.
Location
Select a location from the list to associate it to the client end point.
Expiry Date/Time
Use the calendar to specify the ending date and time that the client end point will be
deactivated.
4. When all mandatory fields have been completed, select Create.
To discard any changes made to the form select Clear.
The Analyze workbench provides reports and key-metrics about users and clients.
Analyze Clients
Analyze → Clients
Note
Before locating a client device, you must enable ExtremeLocation Essentials and
configure a floor map for each location.
Clients Detail
Select an entry in the Clients Summary table to open the Clients Details table.
Use the filter functionality to distill client data based on specific criteria.
NEW! Reports
Note
The time period selected for the dashboard is used when generating the report.
• Guest Visit — A summary and history of guest visits. This information is stored for up to three
months. It consists of email, location, user name, and MAC address information.
To create a report or manage a list of available reports, go to Analyze > Reports > Manage.
Create and Delete reports functionality is made available to users at the Admin, Monitor, and Operator
roles. Users at the Monitor and Operator role can view reports that are generated for the root location
when they have access to all the locations under the root location. Otherwise, the generated report is
not displayed.
Note
Root location is at the top of the location tree. If a user is granted access to the root location,
they inherit all locations below the root.
Related Topics
Create and Schedule a Report on page 92
Work with Existing Reports on page 93
Report Settings on page 94
Related Topics
Report Settings on page 94
Related Topics
Report Settings on page 94
Download a Report
When configuring the report settings, select the generated report format. Once the report is generated,
it is added to the Generated Report List.
To open and view a report online in a browser window, select the report link.
Delete a Report
You can delete generated reports and report templates. To delete an existing report:
• Select the check box next to one or more reports that you want to delete. Then, select at the
top of the screen.
• Select next to the report row that you want to delete.
Related Topics
Reports on page 91
Create and Schedule a Report on page 92
Report Settings on page 94
After selecting Custom, provide a Start Date and Time and an End Date and Time to
create a custom time period.
• Dashboard Report
Dashboard Name
Select from a list of configured dashboards. Configure the dashboard before you run the
report.
Format
The output format for the generated report. Valid values are:
• PDF
• CSV
Schedule
Select Schedule to schedule a report generation. Configure the following scheduling parameters:
• Start Date and Time
• End Date and Time
• Frequency — The report is generated once over a particular period of time. Valid values are:
◦ Daily
◦ Weekly
◦ Monthly
• Time — Specific time the report is generated. This value corresponds to the selected Frequency
value.
◦ Daily:
▪ Single time of day
◦ Weekly:
▪ Single day of the week
▪ Single time of day
◦ Monthly:
▪ Single day of the month
▪ Single time of day
Related Topics
Dashboard on page 21
Analyze Users
Analyze → Users
System Level
You can view user details for the entire network or drill down to the site level to view user details for a
specific site. The system-level user details displayed are:
Location
Displays the location or RF Domain name for each configured site.
Online Users
Displays the number of users currently connected to the network for each Location.
Blocked Users
Displays the number of users that are currently blocked from accessing the networks for each
Location.
Offline Users
Displays the number of users that are not currently connected to the network for each Location.
Total Users
Displays the number of users, both online and offline, known to the system.
Site Level
Drill down to the site level to view online and blocked user details for a specific site.
Site Level information is displayed when a site is selected from the navigation pane.
User
The User column displays the user icon associated with each online user.
Name
The Name column displays the user name associated with each online user. If using social media
authentication, the name is provided by the social media source.
Email
The Email column displays the email address associated with each online user. If using social media
authentication, the email address is provided by the social media source.
Gender
The Gender column displays an icon representing the gender of each online user.
Source
The Source column displays the method that each online user used to authenticate. When social
media authentication is enabled this will include Facebook, Google Plus, and LinkedIn.
Last Login
The Last Login column displays the full date and time when the user last authenticated on the
network.
Action
From the Action column perform one of the following actions on a user. Select
Disconnect to end a user's session on the network. Select Block to stop a user from using the
network for 24 hours. The user may reconnect if they re-authenticate. Select Delete to remove a
user from the database. If the user connects again they will be treated as new user.
Filters provide the ability to distill user data based on specific criteria.
4. When all filters have been configured select Show Table to display the filtered results.
To remove any text entered into the search fields, select Clear.
ARP
Address Resolution Protocol is part of the TCP/IP suite used to dynamically associate a device's physical
address (MAC address) with its logical address (IP address). The system broadcasts an ARP request,
containing the IP address, and the device with that IP address sends back its MAC address so that traffic
can be transmitted.
ATM
Asynchronous Transmission Mode is a start/stop transmission in which each character is preceded by a
start signal and followed by one or more stop signals. A variable time interval can exist between
characters. ATM is the preferred technology for the transfer of images.
BSS
Basic Service Set is a wireless topology consisting of one access point connected to a wired network
and a set of wireless devices. Also called an infrastructure network. See also IBSS (Independent Basic
Service Set).
Chalet
Chalet is a web-based user interface for setting up and viewing information about a switch, removing
the need to enter common commands individually in the CLI.
CHAP
Challenge-Handshake Authentication Protocol is one of the two main authentication protocols used to
verify a user's name and password for PPP Internet connections. CHAP is more secure because it
performs a three-way handshake during the initial link establishment between the home and remote
machines. It can also repeat the authentication any time after the link has been established.
CLI
Command Line Interface. The CLI provides an environment to issue commands to monitor and manage
switches and wireless appliances.
DoS attack
Denial of Service attacks occur when a critical network or computing resource is overwhelmed so that
legitimate requests for service cannot succeed. In its simplest form, a DoS attack is indistinguishable
from normal heavy traffic. ExtremeXOS software has configurable parameters that allow you to defeat
DoS attacks.
DSSS
Direct-Sequence Spread Spectrum is a transmission technology used in Local Area Wireless Network
(LAWN) transmissions where a data signal at the sending station is combined with a higher data rate bit
sequence, or chipping code, that divides the user data according to a spreading ratio. The chipping
code is a redundant bit pattern for each bit that is transmitted, which increases the signal's resistance to
interference. If one or more bits in the pattern are damaged during transmission, the original data can
be recovered due to the redundancy of the transmission. (Compare with FHSS (Frequency-Hopping
Spread Spectrum).)
EAP-TLS/EAP-TTLS
EAP-TLS Extensible Authentication Protocol - Transport Layer Security. A general protocol for
authentication that also supports multiple authentication methods, such as token cards, Kerberos, one-
time passwords, certificates, public key authentication and smart cards.
EAP-TLS provides for certificate-based and mutual authentication of the client and the network. It relies
on client-side and server-side certificates to perform authentication and can be used to dynamically
generate user-based and session-based WEP keys.
ESRP
Extreme Standby Router Protocol is an Extreme Networks-proprietary protocol that provides redundant
Layer 2 and routing services to users.
ExtremeCloud Appliance has been rebranded to Extreme Campus Controller. The new Extreme Campus
Controller supports Campus/Centralized sites only. Support for Distributed sites remains in
ExtremeCloud Appliance v4.76.02 and later.
The Extreme Campus Controller is a next generation orchestration application offering all the mobility
services required for modern unified access deployments. The Extreme Campus Controller extends the
simplified workflows of the ExtremeCloud public cloud application to on-prem/private cloud
deployments.
The Extreme Campus Controller includes comprehensive critical network services for wireless and wired
connectivity, wireless device secure onboarding, distributed and centralized data paths, role-based
access control through the Application Layer, integrated location services, and IoT device onboarding
through a single platform.
Built on architecture with the latest technology, the embedded operating system supports application
containers that enable future expansion of value added applications for the unified access edge.
Glossary
The solution is comprised of the Extreme Defender Application Software and the Defender Adapter
(SA201) or AP3912i access point. Extreme Campus Controller™ is the supported platform for the
Extreme Defender Application.
ExtremeAnalytics
ExtremeAnalytics™, formerly Purview™, is a network powered application analytics and optimization
solution that captures and analyzes context-based application traffic to deliver meaningful intelligence
about applications, users, locations, and devices. ExtremeAnalytics provides data to show how
applications are being used. This can be used to better understand customer behavior on the network,
identify the level of user engagement, and assure business application delivery to optimize the user
experience. The software also provides visibility into network and application performance allowing IT
to pinpoint and resolve performance issues in the infrastructure whether they are caused by the
network, application, or server. Learn more about ExtremeAnalytics at http://
www.extremenetworks.com/product/extremeanalytics/.
ExtremeCloud™ IQ
ExtremeCloud™ IQ is an industry-leading and visionary approach to cloud-managed networking, built
from the ground up to take full advantage of the Extreme Networks end-to-end networking solutions.
ExtremeCloud IQ delivers unified, full-stack management of wireless access points, switches, and
routers and enables onboarding, configuration, monitoring, troubleshooting, reporting, and more. Using
innovative machine learning and artificial intelligence technologies, ExtremeCloud IQ analyzes and
interprets millions of network and user data points, from the network edge to the data center, to power
actionable business and IT insights, and deliver new levels of network automation and intelligence.
Learn more about ExtremeCloud IQ at https://www.extremenetworks.com/support/documentation/
extremecloud-iq/.
ExtremeControl
ExtremeControl, formerly Extreme Access Control™ (EAC), is a set of management software tools that
use information gathered by a hardware engine to control policy to all devices on the network. The
software allows you to automate and secure access for all devices on the network from a central
dashboard, making it easier to roll out security and identity policies across the wired and wireless
Glossary
ExtremeSwitching
ExtremeSwitching is the family of products comprising different switch types: Modular (X8 and 8000
series [formerly BlackDiamond] and S and K series switches); Stackable (X-series and A, B, C, and 7100
series switches); Standalone (SSA, X430, and D, 200, 800, and ISW series); and Mobile Backhaul (E4G).
Learn more about ExtremeSwitching at http://www.extremenetworks.com/products/switching-
routing/.
ExtremeWireless
ExtremeWireless products and solutions offer high-density Wi-Fi access, connecting your organization
with employees, partners, and customers everywhere they go. The family of wireless products and
solutions includes APs, wireless appliances, and software. Learn more about ExtremeWireless at http://
www.extremenetworks.com/products/wireless/.
ExtremeXOS
ExtremeXOS, a modular switch operating system, is designed from the ground up to meet the needs of
large cloud and private data centers, service providers, converged enterprise edge networks, and
everything in between. Based on a resilient architecture and protocols, ExtremeXOS supports network
virtualization and standards-based SDN capabilities like VXLAN gateway and OpenStack Cloud
orchestration. ExtremeXOS also supports comprehensive role-based policy.
FHSS
Frequency-Hopping Spread Spectrum is a transmission technology used in Local Area Wireless
Network (LAWN) transmissions where the data signal is modulated with a narrowband carrier signal
that 'hops' in a random but predictable sequence from frequency to frequency as a function of time
over a wide band of frequencies. This technique reduces interference. If synchronized properly, a single
logical channel is maintained. (Compare with DSSS (Direct-Sequence Spread Spectrum).)
IBSS
An IBSS is the 802.11 term for an ad hoc network. See ad hoc mode.
MIC
Message Integrity Check (or Code), also called ‘Michael’, is part of WPA and TKIP. The MIC is an
additional 8-byte code inserted before the standard 4-byte ICV appended in by standard WEP to the
802.11 message. This greatly increases the difficulty in carrying out forgery attacks.
Both integrity check mechanisms are calculated by the receiver and compared against the values sent
by the sender in the frame. If the values match, there is assurance that the message has not been
tampered with.
netmask
A netmask is a string of 0s and 1s that mask, or screen out, the network part of an IP address, so that
only the host computer part of the address remains. A frequently-used netmask is 255.255.255.0, used
for a Class C subnet (one with up to 255 host computers). The ".0" in the netmask allows the specific
host computer address to be visible.
PEAP
Glossary
Protected Extensible Authentication Protocol is an IETF draft standard to authenticate wireless LAN
clients without requiring them to have certificates. In PEAP authentication, first the user authenticates
the authentication server, then the authentication server authenticates the user. If the first phase is
successful, the user is then authenticated over the SSL tunnel created in phase one using EAP-Generic
Token Card (EAP-GTC) or Microsoft Challenged Handshake Protocol Version 2 (MSCHAP V2). (See also
EAP-TLS/EAP-TTLS.)
SSL
Secure Socket Layer is a protocol for transmitting private documents using the Internet. SSL works by
using a public key to encrypt data that is transferred over the SSL connection. SSL uses the public-and-
private key encryption system, which includes the use of a digital certificate.
syslog
A protocol used for the transmission of event notification messages across networks, originally
developed on the University of California Berkeley Software Distribution (BSD) TCP/IP system
implementations, and now embedded in many other operating systems and networked devices. A
device generates a messages, a relay receives and forwards the messages, and a collector (a syslog
server) receives the messages without relaying them.
syslog uses the UDP as its underlying transport layer mechanism. The UDP port that has been assigned
to syslog is 514. (RFC 3164)
Index
A U
announcements 7 user management 11
C W
conventions warnings 5
notice icons 5
text 5
D
documentation
feedback 6
location 8
F
feedback 6
N
notices 5
P
product announcements 7
R
reports
create 92, 93
delete 94
download 94
modify 94
report settings 94, 95
schedule 92, 93
view online 94
S
support, see technical support
T
technical support
contacting 7