Defining A Wm-Ad With No Authentication - Extreme Networks Summit WM User Manual

Table of Contents

Advertisement

WM Access Domain Services configuration
7 To enable re-keying after a time interval, select Broadcast re-key interval.
If this checkbox is not selected, the Broadcast encryption key is never changed and the Altitude AP
will always use the same broadcast key for Broadcast/Multicast transmissions. This will reduce the
level of security for wireless communications.
8 In the Broadcast re-key interval box, type the time interval after which the broadcast encryption key
is changed automatically. The default is 3600.
9 To save your changes, click Save.

Defining a WM-AD with no authentication

You can set up a WM-AD that will bypass all authentication mechanisms and run Controller, Access
Points and Convergence Software with no authentication of a wireless device user.
A WM-AD with no authentication can still control network access using filtering rules. For more
information on how to set up filtering rules that allow access only to specified IP addresses and ports,
see
"Defining non-authenticated filters" on page
To define a WM-AD with no authentication:
1 From the main menu, click WM Access Domain Configuration. The WM Access Domain
Configuration page is displayed.
2 In the left pane, type a name that will identify the new WM-AD in the Add subnet box.
3 Click Add subnet. The name is displayed in the WM Access Domains list. The Topology tab is
displayed.
4 From the Assignment by drop-down list, click SSID.
5 Configure the topology for this WM-AD, and then click Save. For more information, see
"Configuring topology for a WM-AD for Captive Portal" on page
You must save your changes before moving to the next tab.
6 Click the Auth & Acct tab.
7 Click Configure Captive Portal Settings. The Captive Portal Configurations window is displayed.
8 Select No Captive Portal Support. You must save your changes before moving to the next tab.
9 Click the Filtering tab.
10 Define a default filter that will control specific network access for any wireless device users on this
WM-AD. For more information, see
These rules should be very restrictive and the final rule should be a Deny All rule. The non-
authenticated filter for a WM-AD with no authentication will not have a Captive Portal page for
login.
11 To save your changes, click Save.
202
183.
"Configuring filtering rules for a WM-AD" on page
157.
181.
Summit WM User Guide, Software Version 5.3

Advertisement

Table of Contents
loading

Table of Contents