EasyManua.ls Logo

Extreme Networks Summit 300-48 - Security Configuration Examples

Extreme Networks Summit 300-48
244 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
116 Summit 300-48 Switch Software User Guide
Unified Access Security
2 Remove the wireless port from the default VLAN.
config vlan default delete ports 1:5
NOTE
NOTE: Following warning message may be displayed as a result of the above command. This will
not prevent the port from being deleted from the default vlan:
WARNING: Security profile applied to port 1:5 refers to the VLAN Default. Removing
the port from the VLAN will cause incorrect behavior
3 Add the wireless port to the management VLAN as an untagged port.
config vlan manage-wireless add ports 1:5 untagged.
4 Assign an IP address to the VLAN.
config vlan manage-wireless ipaddress 10.211.37.1/24
5 Configure this VLAN as the management VLAN.
config wireless management-vlan manage-wireless
NOTE
Following warning message may occur as a result of the above command. This will not prevent the
command from executing.
Warning: Changing the management VLAN can cause access points to loose contact with
LAC.
6 Assign a management IP address for each wireless port (port 1:5 in the example). Be sure that the
address is in the same network as the wireless management-vlan.
config wireless port 1:5 ip-address 10.211.37.105
7 Create an RF profile for the A interfaces by copying from the default profile.
create rf-profile RF_A copy DEFAULT_A
8 Create an RF profile for the G interfaces by copying from the default profile.
create rf-profile RF_G copy DEFAULT_G
Security Configuration Examples
Refer to the examples in this section when configuring any of the available wireless security options for
the Summit 300-48 switch. The examples encompass most typical security scenarios.
NOTE
Because of the requirement to add potential wireless ports to the wireless management-vlan as
untagged ports, adding a wireless port to a data/client vlan requires that the port be added as a tagged
port.
NOTE
The “default-user-vlan” parameter is NOT used as a destination vlan in the case of an authentication
failure. For this parameter, if the client authentication succeeds, the client will be placed into the VLAN

Table of Contents

Related product manuals