Extreme Networks Summit WM Technical Reference Manual page 5

Version 5.1
Hide thumbs Also See for Summit WM:
Table of Contents

Advertisement

Summit WM Controller WM20 LEDs......................................................................................76
Summit WM Controller WM20 protocols ................................................................................77
Chapter 7: Hardware maintenance ................................................................................................. 79
Summit WM Controller WM200/2000 maintenance......................................................................79
Summit WM Controller WM200/2000 power supply ...............................................................80
Power FRUs........................................................................................................................81
Fan Tray.............................................................................................................................81
HME ..................................................................................................................................82
SME card ...........................................................................................................................83
NPE 2411 card ..................................................................................................................84
Summit WM Controller WM20 maintenance.................................................................................89
Summit WM Controller WM20 power and maintenance procedures ..........................................91
Chapter 8: WDS - Wireless Distribution Service.............................................................................. 93
Summit WM LAN WDS solution overview.....................................................................................93
Using WDS ...............................................................................................................................97
Using WDS to fill coverage gaps ...........................................................................................97
Using WDS to connect two Ethernet networks ......................................................................101
Chapter 9: AP as 802.1X supplicant............................................................................................. 103
Credential management ...........................................................................................................103
Transferring credentials from the Summit WM Controller to AP..............................................104
Storing credentials on the AP .............................................................................................105
TLS credential management ...............................................................................................105
TLS certificate expiration ...................................................................................................106
TLS server authentication ..................................................................................................107
Authentication with 802.1X .....................................................................................................107
EAP-TLS authentication.....................................................................................................108
EAP-PEAP authentication ..................................................................................................109
Configuring APs for .1X authentication ......................................................................................109
General configuration ........................................................................................................109
EAP-PEAP configuration ....................................................................................................109
EAP-TLS configuration with the Summit WM Controller as proxy............................................110
Bulk EAP-TLS configuration ...............................................................................................111
Bulk EAP-PEAP configuration.............................................................................................112
Verifying the AP .1X configuration ............................................................................................112
Limits and technical data ........................................................................................................113
Chapter 10: MAC Based Authentication ........................................................................................ 115
How MAC-based authentication works .......................................................................................115
Roaming ................................................................................................................................116
Radius redundancy..................................................................................................................116
Rejection and failure ...............................................................................................................116
Additional RADIUS attributes ...................................................................................................116
Assumptions/recommendations.................................................................................................117
Summit WM Technical Reference Guide, Software Version 5.1
Table of Contents
5

Advertisement

Table of Contents
loading

Table of Contents