Extreme Networks Summit WM Technical Reference Manual page 4

Version 5.1
Hide thumbs Also See for Summit WM:
Table of Contents

Advertisement

Table of Contents
Step 3a: Configuring IAS .....................................................................................................38
Step 3b: Configuring a Wireless Remote Access Policy ...........................................................41
Step 4: Configuring the secondary IAS server (if applicable) ..........................................................46
Step 5: Deploying and Configuring Wireless APs ..........................................................................47
Submit a user certificate request via the Web ........................................................................49
Request a certificate ...........................................................................................................49
Floppy Disk-Based Installation..............................................................................................50
Export a certificate ..............................................................................................................50
Import a certificate..............................................................................................................50
Step 9: Configuring Wireless Clients for EAP-TLS.........................................................................51
Step 10: Configuring Wireless Client Computers for PEAP-MS-CHAP v2 .........................................52
Additional Intranet Wireless Deployment Configurations................................................................54
Internet Access for Business Partners....................................................................................54
Using Guest Access .............................................................................................................54
Using Validated Access........................................................................................................54
Using a Third-Party CA ........................................................................................................55
Certificates on Wireless Client Computers ..............................................................................56
Configuring Proxy Server Settings ........................................................................................56
Chapter 5: Windows Recommendations and Best Practices ............................................................. 59
Security ...................................................................................................................................59
PKI..........................................................................................................................................59
Wireless APs.............................................................................................................................60
Wireless Network Adapters .........................................................................................................60
Active Directory ........................................................................................................................61
RADIUS ...................................................................................................................................61
Scalability ................................................................................................................................62
Using Computer-only Authentication ...........................................................................................62
Policy Extension..................................................................................................................63
Enabling Computer-only Authentication Using the Registry......................................................63
Summary..................................................................................................................................64
Chapter 6: Summit WM Controller diagnostics ................................................................................ 65
Summit WM Controller WM200/2000 diagnostics ........................................................................65
Summit WM Controller WM200/2000 capacity ......................................................................65
Summit WM Controller WM200/2000 license capacity ...........................................................65
Summit WM Controller WM200/2000 LEDs...........................................................................66
System Startup ...................................................................................................................69
Summit WM Controller WM200/2000 application states .........................................................69
Summit WM Controller WM200/2000 protocols .....................................................................72
Summit WM Controller WM20 diagnostics ...................................................................................73
Summit WM Controller WM20 capacity .................................................................................73
Using the console port .........................................................................................................74
Summit WM Controller WM20 rescue procedure.....................................................................75
Summit WM Controller WM20 capacity .................................................................................75
4
Summit WM Technical Reference Guide, Software Version 5.1

Advertisement

Table of Contents
loading

Table of Contents