Download Print this page

Extreme Networks Summit WM3000 Series Reference Manual page 9

Summit wm3000 series controller system software version 4.0

Advertisement

Defining the IPSec Configuration ................................................................................................................375
Editing an Existing Transform Set ........................................................................................................377
Adding a New Transform Set................................................................................................................379
Defining the IPSec VPN Remote Configuration ..........................................................................................380
Configuring IPSEC VPN Authentication .....................................................................................................382
Configuring Crypto Maps.............................................................................................................................384
Crypto Map Entries ...............................................................................................................................385
Crypto Map Peers ..................................................................................................................................387
Crypto Map Manual SAs.......................................................................................................................389
Crypto Map Transform Sets ..................................................................................................................392
Crypto Map Interfaces...........................................................................................................................393
Viewing IPSec Security Associations ..........................................................................................................394
Configuring the Radius Server ............................................................................................................................396
Radius Overview ..........................................................................................................................................396
User Database........................................................................................................................................398
Authentication of Terminal/Management User(s).................................................................................398
Access Policy.........................................................................................................................................398
Proxy to External Radius Server ...........................................................................................................398
LDAP.....................................................................................................................................................398
Accounting ............................................................................................................................................398
Using the Controller's Radius Server Versus an External Radius ...............................................................398
Defining the Radius Configuration...............................................................................................................399
Radius Client Configuration..................................................................................................................400
Radius Proxy Server Configuration.......................................................................................................401
Configuring Radius Authentication and Accounting ...................................................................................402
Configuring Radius Users.............................................................................................................................404
Configuring Radius User Groups .................................................................................................................407
Viewing Radius Accounting Logs................................................................................................................410
Creating Server Certificates.................................................................................................................................411
Using Trustpoints to Configure Certificates.................................................................................................412
Creating a Server / CA Root Certificate................................................................................................413
Configuring Trustpoint Associated Keys .....................................................................................................419
Adding a New Key ................................................................................................................................420
Transferring Keys..................................................................................................................................421
Chapter 8: Controller Management ...................................................................................................... 423
Displaying the Management Access Interface.....................................................................................................423
Configuring Access Control ................................................................................................................................424
Configuring SNMP Access..................................................................................................................................426
Configuring SNMP v1/v2 Access ................................................................................................................426
Editing an Existing SNMP v1/v2 Community Name............................................................................427
Configuring SNMP v3 Access......................................................................................................................428
Editing a SNMP v3 Authentication and Privacy Password...................................................................430
Setting SNMP Access Message Parameters .................................................................................................430
Accessing SNMP v2/v3 Statistics ................................................................................................................431
Configuring SNMP Traps ....................................................................................................................................433
Enabling Trap Configuration........................................................................................................................433
Configuring E-mail Notifications..........................................................................................................435
Configuring Trap Thresholds .......................................................................................................................436
Wireless Trap Threshold Values ...........................................................................................................438
Configuring SNMP Trap Receivers.....................................................................................................................439
Editing SNMP Trap Receivers .....................................................................................................................441
Summit WM3000 Series Controller System Reference Guide
Table of Contents
9

Hide quick links:

Advertisement

loading

This manual is also suitable for:

Summit wm3600Summit wm3700