
Summary :
Retrieve needed information from Cloudi-Fi admin UI
Create Radius Server in Extreme CloudIQ
Enable Supplemental CLI and configure Custom NAS-ID
Create Guest SSID and CWP profile
Deploy your policy

Go to Cloudi-Fi administration interface and note the following information in a notepad.
You will need them for the following steps:
Location URL : this URL will be used in CloudIQ in the CWP profile (Captive Web portal). You will need to create a dedicated CWP profile.
Cloudi-Fi administration > Locations > Click on the menu button of the location and select "Copy Splash page URI"
Copy this URI in the notepad
Change the URI just like this :
Company Key :
This value will be used as Custom NAS-ID in the Radius request.
Go to Settings and copy the Company Key in your notepad:

Now we can start the configuration in your Extreme CloudIQ account.

In Extreme CloudIQ, go to Configure > Common Objects > External Radius Server
Click on + to add a new server.
Name: Cloudi-Fi Radius Server
IP/Hostname : radius.cloudi-fi.net
Authentication : Checked, port 1812
Accounting : Checked, port 1813
Secret : Will be provided by Cloudi-Fi Support team
Click on Save External Radius

In this section, we will need to configure a supplemental CLI in order to send the Cloudi-Fi Company Key as NAS-ID in the Radius request sent by the Access Point.
First we need to enable Supplemental CLI in your account.
Go to your CloudIQ profile in the top-right corner, then:
Global Settings > VIQ Management > Supplemental CLI : ON

Once done, you can go to Configure > Common Objects > Supplemental CLI Objects:
Click + to add a new Supplemental CLI, then:
Name : Cloudi-Fi Custom NAS-ID
CLI Command : aaa attribute NAS-Identifier <Paste your Cloudi-Fi Company Key>
Click Save

Connect to your Extreme Cloud IQ administration interface.
Go to Configure > Network Policies > Create or edit an existing one
In the Policy Details tab:
- Select Wireless
In the Wireless Networks tab:
- Click on "+" and select "All other network (standard)"
- Name (SSID) : Provide a name
- Broadcast Name : WLAN name visible by clients
- SSID Authentication : Open
- Enable Captive Web Portal : On and select User Auth on Captive Web Portal
- Authentication type : Redirect to External URL
- Send Client's requested URL in clear text : Checked
- Default Web Portal : Add.
New Captive Web Portal window
Captive Web Portal Settings
- Name : Cloudi-Fi location name
- Login URL : Copy the <URI of your Cloudi-Fi location>
- Password encryption : Plaintext
- Authentication method : PAP
- Success page : Off
- Redirect client after a successful login : Checked
- To a specific URL : https://login.cloudi-fi.net/success.phpAdvanced settings
- Web Servers registration period : This timer must be equal to Cloudi-Fi session lifetime (Cloudi-Fi UI > Portals > Session lifetime)
- Use HTTP 302 : CheckedWalledGarden
- Click + and select the Service Type : Web
- Add this URL:
*.cloudi-fi.net
If you use social media connector on your captive portal, Cloudi-Fi support team will provde you extra URL to add in the walledgarden.
Click Save CWP
In the Wireless settings tab, you will now configure the
Authentication settings section:
Click + and add the Cloudi-Fi Radius Server created at step 2
Save

Click Save
Go to Additional Settings tab :
In the addtional settings, we will activate the Custom NAS-ID configured by applying the Complemental CLI created previously.

Click Save
Go to Deploy Policy tab
Select the devices where you want to deploy this policy.
Click "Deploy" and select "Complete Configuration Update"