Documentation
  • Getting Started
  • WiFi Integration
    • Summary of supported WiFi vendors
      • Cisco Meraki
        • Meraki oAuth integration
      • Cisco Catalyst WLC (IOS-XE)
      • Cisco Meraki Easy PSK
      • Aruba - Unbound MPSK
      • Fortinet (FortiGate Secure Wireless Controller)
      • Extreme Networks
      • Ruckus SmartZone
      • Cambium cnMaestro
      • Juniper (Mist)
      • TP-Link Omada
      • Huawei - iMaster NCE-Campus
  • Service management
    • Dashboard
    • Managing Accounts
    • Groups
    • Managing Networks
      • Network Managers
    • Units
    • General options
      • Personal Area Networks (PAN)
      • Service Options
      • Organization details
    • Network Policies
    • WiFi Portal & Onboarding
      • Access Control options
      • WiFi Portal options
      • IoT Devices Authentication
      • WiFi Portal distribution
    • Visitors (beta)
    • Admins
      • Multi Organizations
    • Account settings
    • My Profile
    • Support platforms integrations
    • Service Monitoring and Assurance
      • Anomalies
      • Activity Logs
      • Network Health
  • Cloud Identity Platforms integrations
    • Coworking management platforms
      • Optix
      • Office RnD
      • Nexudus
      • Andcards
    • Property Management Systems
      • Oracle Opera Cloud
      • Mews
      • Cloudbeds
      • Apaleo
    • Enterprise cloud IdPs
      • Microsoft Entra ID (SAML)
      • Microsoft Entra ID (oAuth)
      • Google Workspace (oAuth)
      • Shibboleth
      • Group mapping
    • Passwordless SSO
      • Custom HTTP Request
  • MSP Operations
    • MSP Dashboard
    • MSP Account settings
  • Add-ons
    • Billing
    • White label
    • Passpoint
    • SMS Services - via Twilio
  • APIs
    • Getting Started
    • Account management
  • PRODUCT
    • Coming soon...
      • Engenius Cloud
      • Zyxel Nebula (Pro)
    • Changelog
    • Datasheet
  • Solution guides
    • Student living
      • Sample FAQ: WiFi for the Resident Hall
    • BYOD
Powered by GitBook
On this page
  • Account preparation
  • Account integration
  • Operating Cusna
  • Creating Networkd
  • Creating Accounts

Was this helpful?

  1. WiFi Integration
  2. Summary of supported WiFi vendors

Extreme Networks

PreviousFortinet (FortiGate Secure Wireless Controller)NextRuckus SmartZone

Last updated 6 months ago

Was this helpful?

Account preparation

To get started, you need to create a Network Policy.

To lear more about restrictions and guidelines on how to use PCGs, please refer to the and watch this .

Go to Configure, Network Policies and click Add Network Policy. Give the Policy a name, for example one that recalls the name of the Network.

Then, go to the Wireless Networks tab and create a new Wireless Network clicking on the icon "+". Give the network an SSID name, such as Residents.

As SSID Authentication, select Private Pre-Shared Key. Leave all the other fields as per the default settings.

You can optionally set a maximum number of devices per resident by enabling Set the maximum number of clients per private PSK.

Select the option Private Client Group Option and select Key-based as a sub-type.

Account integration

To connect Cusna to your Extreme Cloud IQ account, you need to generate an API Access Token.

Option 1. Connect it directly from Cusna.

Go to Setting, Integration and select Extreme form the vendor selection menu. Click the Generate an access token now button.

A dialog opens and asks for your ExtremeCloudIQ username and password. Make sure to use an account with admin permissions.

Click Login. If the credentials are correct, an Access Token will be generated. If your accoutn has access to multple Organizations, a dropdown will appear to let you select the the Organization.

Click Save to finalize the setup.

Option 2: manually generate a Token in ExtremeCloudIQ (requires an Extreme Networks Developer Portal account)

In your ExtremeIQ dashboard, click on your avatar on the top bar and select Global Settings. Go to API Token Management and click the icon "+" to create a new token.

The Client ID is the Credentials value from My Profile > Your API Developer Application in the Extreme Networks Developer Portal.

Open your Cusna dashboard and go to Setting, expand the WiFi setup card, select Extreme, enter your API Access Token and click Save.

Operating Cusna

Once you have configured your Network Policy and Wireless Network, you can start operating your Cusna account.

Creating Networkd

When you create or edit a Network in the Cusna dashboard, in the WiFi configuration section, you have to pick the Network Policy and SSID related to the Network.

This operation will create a dedicate Use Group in Extreme CloudIQ and enable it to the selected Network Policy.

Roaming configuration

If you want users to be able to connect with the same PPSK across multiple Network you simply need to assign the same Network policy to the Network you want to federate.

Creating Accounts

When you create a new Account, a new PSK user will be created in your ExtremeCloud IQ Pilot account with a predefined WiFi Passphrase. The Account of type Tenant and Visitors receives an activation email with the default passphrase and QR code, and a link to the WiFi Portal where can change the passphrase.

To avoid synchronization problems, do not manage manually the PPSKs in the ExtremeCloud IQ Pilot interface


Under the hood

Cusna automates many configuration and processes on the Extreme dashboard.

  1. When setting up the integration, Cusna initializes a User Group with a default name (Cusna-Default-PCG). All users will be created in the same user group

  2. When initializing a Location in Cusna, the default User Group is automatically enabled on the Network Policy associated to the Location

  3. When enabling an Account in Cusna, it creates a User in the default User Group

ExtremeCloudIQ documentation
short video about PCGs