Configuring Data Access - Extreme Networks Altitude 4700 Series Product Reference Manual

Software version 4.1
Hide thumbs Also See for Altitude 4700 Series:
Table of Contents

Advertisement

Enable AP-
Controller Tunnel
Keep-alive Period
Current Controller
AP Adoption State
3 Refer to the 12 available Controller IP Addresses to review the addresses the Access Point uses to
adopt with a controller.
The Access Point contacts each controller on the list (from top to bottom) until a viable controller
adoption is made. The Access Point first populates the list with the IP addresses received from its
DHCP resource. If DHCP is not able to obtain IP addresses, the Access Point attempts to resolve the
controller's Domain Name if provided within the Controller FQDN parameter. However, if the
Access Point receives one or more IP addresses from the DHCP server, it will not solicit an IP
address from a user provided domain name. Lastly, provide static (manually provided) IP addresses
to the list as long as there is room. The Access Point will defer to these addresses if DHCP and a
provided domain address fail to secure a controller adoption.
4 Click Apply to save any changes to the Adaptive AP Setup screen. Navigating away from the screen
without clicking the Apply button results in all changes to the screen being lost.
5 Click Undo Changes (if necessary) to undo any changes made. Undo Changes reverts the settings
displayed on the Adaptive AP Setup screen to the last saved configuration.
6 Click Logout to securely exit the access point applet. A prompt displays confirming the logout before
the applet is closed.

Configuring Data Access

Use the AP4700 Access screen to allow/deny management access to the Access Point from different
subnets (LAN1, LAN2 or WAN) using different protocols such as HTTPS, Telnet, SSH or SNMP. The
access options are either enabled or disabled. It is not meant to function as an ACL in routers or other
firewalls, where you can specify and customize specific IPs to access specific interfaces.
Use the Access screen checkboxes to enable or disable LAN1, LAN2 and/or WAN access using the
protocols and ports listed. If access is disabled, this effectively locks out the administrator from
configuring the access point using that interface. To avoid jeopardizing the network data managed by
the access point, Extreme Networks recommends enabling only those interfaces used in the routine
(daily) management of the network, and disabling all other interfaces until they are required.
The Access screen also has a new facility allowing customers to create a login message with customer
generated text. When enabled (using either the Access Point Web UI or CLI), the login message displays
when the user is logging into the Access Point. If the login message is disabled, the default login screen
displays with no message.
Altitude 4700 Series Access Point Product Reference Guide
This setting is required to enable an IPSec VPN from the
AAP to the Wireless Controller.
The Keepalive interval defines a period (in seconds) the
AAP uses to terminate its connection to the controller if no
data is received.
Displays the IP address of the connected controller. This is
the controller from which the Access Point receives its
adaptive configuration.
Displays whether the Access Point has been adopted by
the controller (whose IP address is listed in the Current
Controller parameter). The Access Point cannot receive its
adaptive configuration without association. A stand-alone
Access Point can be adopted by a wireless controller. A
stand-alone AP also supports operations without being
adopted by a controller.
87

Advertisement

Table of Contents
loading

Table of Contents