Extreme Networks Summit WM20 User Manual page 5

Version 4.2
Hide thumbs Also See for Summit WM20:
Table of Contents

Advertisement

Assigning Wireless AP Radios to a WM-AD.................................................................................106
Authentication for a WM-AD .....................................................................................................108
Vendor-Specific Attributes .................................................................................................108
Defining Authentication for a WM-AD for Captive Portal ........................................................109
Defining Authentication for a WM-AD for AAA ......................................................................116
Defining MAC-Based Authentication for a WM-AD ................................................................118
Defining Accounting Methods for a WM-AD................................................................................120
Defining RADIUS Filter Policy for WM-ADs and WM-AD Groups ...................................................121
Configuring Filtering Rules for a WM-AD....................................................................................122
Filtering Rules for an Exception Filter .................................................................................123
Defining Non-authenticated Filters......................................................................................124
Filtering Rules for a Filter ID group .....................................................................................128
Filtering Rules for a Default Filter .......................................................................................130
Enabling Multicast for a WM-AD ...............................................................................................132
Configuring Privacy for a WM-AD ..............................................................................................134
Privacy for a WM-AD for Captive Portal ................................................................................134
Privacy for a WM-AD for AAA ..............................................................................................137
Defining a WM-AD With No Authentication ................................................................................140
Defining Priority Level and Service Class for WM-AD Traffic ........................................................141
Defining the Service Class for the WM-AD............................................................................142
Configuring the Priority Override .........................................................................................142
Working with Quality of Service (QoS) .......................................................................................143
QoS Modes .......................................................................................................................143
Configuring the QoS Policy on a WM-AD....................................................................................145
Bridging Traffic Locally............................................................................................................148
Chapter 6: Availability and Controller Functionality ....................................................................... 151
Availability Overview................................................................................................................151
Availability Prerequisites ....................................................................................................152
Viewing the Wireless AP Availability Display.........................................................................154
Viewing SLP Activity..........................................................................................................155
Events and Actions During a Failover...................................................................................156
Defining Management Users.....................................................................................................157
Configuring Network Time ........................................................................................................158
Configuring Check Point Event Logging .....................................................................................160
ELA Management Station Events ........................................................................................162
Enabling SNMP ......................................................................................................................162
MIB Support.....................................................................................................................162
Enabling SNMP on the Summit WM Controller.....................................................................163
Using Controller Utilities..........................................................................................................164
Configuring Web Session Timeouts ...........................................................................................166
Chapter 7: Working With Third-Party APs ..................................................................................... 169
Chapter 8: Working With the Summit WM Series Spy .................................................................... 173
Summit WM Series Spy Overview..............................................................................................173
Enabling the Analysis and Data Collector Engines ......................................................................174
Running Summit WM Series Spy Scans.....................................................................................175
Summit WM20 User Guide, Software Release 4.2
Table of Contents
5

Advertisement

Table of Contents
loading

Table of Contents