LogoLogo
LogoLogo
  • Welcome
  • Details
  • Configuration
    • Getting Started
      • Generic Guide
      • Scenario-based Guides
        • Microsoft Cloud PKI
        • SCEPman PKI
    • Access Point Setup
      • RadSec
        • Aruba
        • FortiNet
        • Juniper Mist
        • Meraki
        • MikroTik
        • Ruckus
        • UniFi
      • RADIUS
        • ExtremeCloud IQ CoPilot
        • Meraki
        • Sophos UTM
        • UniFi
    • Server Certificate Renewal
  • Admin Portal
    • Home
    • Insights
      • Rule Engine
      • Logs
    • Users
    • Settings
      • Server Settings
      • Trusted Certificates
      • Proxy Settings
      • Permissions
      • User Settings
      • Rules
        • General Structure
        • WiFi
        • LAN
        • VPN
      • Log Exporter
        • Teams
        • Log Analytics
        • Generic Webhook
        • Examples
    • My Invited Users
  • Profile Deployment
    • Microsoft Intune
      • Server Trust
      • WiFi Profile
        • Windows
        • iOS/iPadOS & macOS
        • Android
      • Wired Profile
        • Windows
        • macOS
    • Jamf Pro
      • Server Trust
      • WiFi Profile
      • Wired Profile
    • Google Workspace
      • Server Trust
      • WiFi Profile
  • Other
    • Troubleshooting
    • FAQs
      • General
      • Log & Common Errors
      • MAC Authentication
      • Blast-RADIUS Vulnerability
      • OCSP Soft-fail Consequences
      • Security & Privacy
    • REST API
      • External Monitoring
    • Changelog
  • Licensing
    • Azure Marketplace
  • Support & Service Level
  • RADIUSaaS Website
Powered by GitBook
On this page

Was this helpful?

  1. Configuration
  2. Access Point Setup
  3. RADIUS

ExtremeCloud IQ CoPilot

Unfortunately only `ExtremeCloud IQ SiteManager` is able to speak RadSec(as far we know). This site handles CoPilot

Last updated 6 months ago

Was this helpful?

ExtremeCloud IQ CoPilot configuration

  1. Go to Configure > Common Objects > Authentication > External Radius Servers and click Add

  2. Enter the IP Object and give everything a descriptive name

  3. Set the Shared secret which is displayed on your RaaS website and save the changes

  1. Go to Configure > Network Policies > Add Network Policy

  2. After the policy has been created, you're able to create a SSID. Click Add on Wireless Networks

  3. Choose your preferred SSID Name and select Enterprise for SSID Authentication

  4. Under Authentication Settings add the radius server which we've added in step 3 and save everything

  5. Deploy the Network Policy to the Access Points