Network Login
ExtremeWare XOS 11.3 Concepts Guide
364
â—Ź Web-Based Network Login Configuration Example on page 365
â—Ź Web-Based Authentication User Login on page 367
Enabling and Disabling Web-Based Network Login
To enable web-based network login on the switch, use the following command:
enable netlogin web-based
Any combination of types of authentication can be enabled on the same switch. At least one of the
authentication types must be specified on the CLI.
To disable web-based network login on the switch, use the following command:
disable netlogin web-based
To enable web-based network login on one or more ports, use the following command:
enable netlogin ports <portlist> web-based
Network Login must be disabled on a port before you can delete a VLAN that contains that port. To
disable web-based network login on one or more ports, use the following command:
disable netlogin ports <portlist> dot1x
Configuring the Base URL
To configure the network login base URL, use the following command:
configure netlogin base-url <url>
Where <url> is the DNS name of the switch. For example, configure netlogin base-url network-
access.ne
t makes the switch send DNS responses back to the netlogin clients when a DNS query is
made for
network-access.net.
Configuring the Redirect Page
To configure the network login redirect page, use the following command:
configure netlogin redirect-page <url>
Where <url> defines the redirection information for the users once logged in. You must configure a
complete URL starting with
http:// or https://
By default, the redirect URL value is “http://www.extremenetworks.com”.
This redirection information is used only in case the redirection info is missing from RADIUS server.
For example,
configure netlogin base-url http://www.extremenetworks.com redirects all users
to this URL after they get logged in.
To support https, you must first download and install the separate Extreme Networks SSH software
module (ssh.xmod). This additional module allows you to configure both SSH2 and SSL on the switch.
For more information about SSH2, see Chapter 16, “Security.” For information about installing the SSH
module, see Appendix A, “Software Upgrade and Boot Options.”