Download Print this page

Acls; Local Radius Server; Ipsec Vpn - Extreme Networks Summit WM3000 Series Reference Manual

Summit wm3000 series controller system software version 4.0

Advertisement

Overview
Authorized AP Lists
Configure a list of authorized Access Points based on their MAC addresses. The controller evaluates the
APs against the configured authorized list after obtaining Rogue AP information from one of the 2
mechanisms as mentioned in
Rogue AP Report
After determining which are authorized APs and which are Rogue, the controller prepares a report.
Extreme Networks WMS Support
The controller can provide rogue device detection data to the Extreme Networks Wireless LAN
Controller Wireless Management Suite application (or Extreme Networks WMS). Extreme Networks
WMS uses this data to refine the position and display the rogue on a site map representative of the
physical dimensions of the actual radio coverage area of the controller. This is of great assistance in the
quick identification and removal of unauthorized devices.

ACLs

ACLs control access to the network through a set of rules. Each rule specifies an action taken when a
packet matches a set of rules. If the action is deny, the packet is dropped. If the action is permit, the
packet is allowed. If the action is to mark, the packet is tagged for priority. The controller supports the
following types of ACLs:
NOTE
An ACL is located at the AP for locally bridged traffic and at the controller for tunneled traffic.
IP Standard ACLs
IP Extended ACLs
MAC Extended ACLs
Wireless LAN ACLs
For information on creating an ACL, see

Local Radius Server

Radius is a common authentication protocol utilized by the 802.1x wireless security standard. Radius
improves the WEP encryption key standard, in conjunction with other security methods such as EAP-
PEAP. The controller has one internal Radius server. For information on configuring the controller's
resident Radius Server, see

IPSec VPN

IP Sec is a security protocol providing authentication and encryption over the Internet. Unlike SSL
(which provides services at layer 4 and secures two applications), IPsec works at Layer 3 and secures
the network. Also unlike SSL (which is typically built into the Web browser), IPsec requires a client
installation. IPsec can access both Web and non-Web applications, whereas SSL requires workarounds
for non-Web access such as file sharing and backup.
32
"Rogue AP Detection" on page
"Configuring Firewalls and Access Control Lists" on page
"Configuring the Radius Server" on page
31.
396.
Summit WM3000 Series Controller System Reference Guide
319.

Hide quick links:

Advertisement

loading

This manual is also suitable for:

Summit wm3600Summit wm3700