Intranet Wireless Deployment Steps - Extreme Networks Summit WM Technical Reference Manual

Version 5.1
Hide thumbs Also See for Summit WM:
Table of Contents

Advertisement

Creating the Windows Security Infrastructure
issuer of the IAS server computer certificates, you might also have to install root CA certificates on each
wireless client.
Wireless remote access policy:
A remote access policy is configured for wireless connections so that employees can access the
organization intranet.
Multiple wireless APs:
Multiple third-party wireless APs provide wireless access in different buildings of an enterprise. The
wireless APs must support IEEE 802.1X, RADIUS, and Wi-Fi Protected Access (WPA™) or WPA2™.
Wired Equivalent Privacy (WEP) is recommended only for temporary use when transitioning to WPA or
WPA2.
Figure 5: Typical enterprise wireless configuration
Client
devices

Intranet Wireless Deployment Steps

For this configuration, complete the following steps:
Step 1: Configuring the Certificate Infrastructure
Step 2: Configuring Active Directory for Accounts and Groups
Step 3: Configuring the Primary IAS Server
Step 4: Configuring the secondary IAS server (if applicable)
Step 5: Deploying and Configuring Wireless
Step 6: Configuring Wireless Network (IEEE 802.11) Policies Group Policy Settings
Step 7: Installing Computer Certificates on Wireless Client Computers for EAP-TLS
32
Wireless AP
Primary IAS server
Wireless AP
APs.
WM Controller
Secondary IAS server
Certification authority
(CA)
Summit WM Technical Reference Guide, Software Version 5.1

Advertisement

Table of Contents
loading

Table of Contents