Network Traffic Flow - Extreme Networks Summit WM User Manual

Table of Contents

Advertisement

Overview of the Controller, Access Points, and WM software solution
Availability
Mobility
Summit WM series Spy for detection of rogue access points
Some features also require the definition of static routes.
Web Browser - A browser provides access to the Summit WM Controller Management user interface
to configure the Controller, Access Points, and WM software.
SSH Enabled Device - A device that supports Secure Shell (SSH) is used for remote (IP) shell access
to the system.
Zone Integrity - The Zone integrity server enhances network security by ensuring clients accessing
your network are compliant with your security policies before gaining access. Zone Integrity Release
5 is supported.

Network traffic flow

Figure 3
illustrates a simple configuration with a single Summit WM Controller and two Wireless APs,
each supporting a wireless device. A RADIUS server on the network provides authentication, and a
DHCP server is used by the Wireless APs to discover the location of the Summit WM Controller during
the initial registration process. Network inter-connectivity is provided by the infrastructure routing and
switching devices.
20
Summit WM User Guide, Software Version 5.3

Advertisement

Table of Contents
loading

Table of Contents