EasyManua.ls Logo

Extreme Networks ExtremeWare - Chapter 29 Wireless Commands

Extreme Networks ExtremeWare
2254 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
ExtremeWare Software 7.3.0 Command Reference Guide 1989
29 Wireless Commands
The Alpine 3800 series of switches and the Altitude 300 wireless port extend network service to wireless
802.11a/b/g clients within a fully integrated network infrastructure. Ports on the Alpine 3800 handle all
of the management functions typically associated with an access point. The Altitude 300 wireless port
serves as the radio transmitter and receiver, inheriting configuration information as soon as it is
attached to the switch and as changes are made to the wireless profiles after the system is deployed.
Summary of Wireless Features
The Alpine 3800 series supports the following wireless features:
Simultaneous support for 802.11a, 802.11b, and 802.11g
EAP authentication for 802.1X devices—Protected Extensible Authentication Protocol (PEAP), EAP
Tunneled TLS Authentication Protocol (EAP-TTLS), and Extensible Authentication Protocol
Transport Layer Security (EAP-TLS
Wi-Fi Protected Access (WPA) using Temporal Key Integrity Protocol (TKIP) and Advanced
Encryption Standard (AES)
Per-user VLAN classification
AccessAdapt™ management
Remote troubleshooting
Easy upgrading of wireless ports
Detailed reports and logging
Wireless Devices
You configure ports on the Alpine 3800 with the “personality” of the device to be connected. Each port
contains separately configurable interfaces for each of its two radios (A and G).
Physical security for the wireless networks ceases to be a problem at the wireless access location
because the Altitude 300 wireless port does not store any security settings. Information is not stored in
the Altitude 300 wireless port, but loaded as needed from the switch. Even if the Altitude 300 wireless
port is physically moved, it can only be reconnected to another Alpine 3800 model.
You can set network policies at layers 2 and 3 to cover both the wired and wireless networks. In this
way you can block access to individuals suspected of intrusion across the entire network infrastructure.

Table of Contents

Related product manuals