Wireless Commands - Extreme Networks ExtremeWare Command Reference Manual

Version 7.7
Hide thumbs Also See for ExtremeWare:
Table of Contents

Advertisement

14

Wireless Commands

The Alpine switches, Summit series switches and the Altitude 300 wireless port extend network service
to wireless 802.11a/b/g clients within a fully integrated network infrastructure. Ports on the Summit
switch handle all of the management functions typically associated with an access point. The Altitude
300 wireless port serves a-s the radio transmitter and receiver, inheriting configuration information as
soon as it is attached to the switch and as changes are made to the wireless profiles after the system is
deployed.
Summary of Wireless Features
The Alpine and Summit series switches support the following wireless features:
• Simultaneous support for 802.11a, 802.11b, and 802.11g
• EAP authentication for 802.1X devices—Protected Extensible Authentication Protocol (PEAP), EAP
Tunneled TLS Authentication Protocol (EAP-TTLS), and Extensible Authentication Protocol
Transport Layer Security (EAP-TLS)
• Wi-Fi Protected Access (WPA) using Temporal Key Integrity Protocol (TKIP) and Advanced
Encryption Standard (AES)
• Per-user VLAN classification
• AccessAdapt™ management
• Remote troubleshooting
• Easy upgrading of wireless ports
• Detailed reports and logging
Wireless Devices
You configure ports on the Summit or Alpine switch with the "personality" of the device to be
connected. Each port contains separately configurable interfaces for each of its two radios (a and g).
Physical security for the wireless networks ceases to be a problem at the wireless access location
because the Altitude 300 wireless port does not store any security settings. Information is not stored in
the Altitude 300 wireless port, but loaded as needed from the switch. Even if the Altitude 300 wireless
port is physically moved, it can only be reconnected to another Extreme switch.
You can set network policies at layers 2 and 3 to cover both the wired and wireless networks. In this
way you can block access to individuals suspected of intrusion across the entire network infrastructure.
ExtremeWare 7.7 Command Reference Guide
1289

Advertisement

Table of Contents
loading

This manual is also suitable for:

Extremeware 7.7

Table of Contents