Do you have a question about the Extreme Networks Summit WM and is the answer not in the manual?
Brand | Extreme Networks |
---|---|
Model | Summit WM |
Category | Software |
Language | English |
Outlines critical safety warnings and dangers related to equipment operation and maintenance.
Guides through the initial setup process, including IP address configuration and access.
Explains how to configure the physical data ports and their functions (host, router, 3rd party AP).
Explains the default IP address and the initial configuration process for Altitude APs.
Outlines the process by which Altitude APs discover and register with the Summit WM Controller.
Explains DRM features like Auto Channel Selection and Dynamic Channel Selection for optimal radio config.
Describes how to configure Altitude APs with static IP addresses for branch office deployments.
Explains how to configure 802.1X authentication using PEAP or EAP-TLS methods.
Explains how to define WM-AD topology, including network assignment and DHCP options.
Describes authentication mechanisms like SSID, Captive Portal, MAC-based, and AAA (802.1X).
Explains how to define filter ID values and group IDs for controlling network access.
Details how to configure filtering rules for network access control within a WM-AD.
Explains how to configure Quality of Service policies for traffic prioritization.
Describes the feature for maintaining service availability during Summit WM Controller outages.
Explains how to maintain user sessions during failover by enabling session availability.
Provides the steps to configure the fast failover feature for optimal availability.
Guides on designating a mobility manager and mobility agents for the domain.
Outlines the steps to configure third-party APs, including data port and WM-AD setup.
Explains how to create and configure a WM-AD specifically for third-party APs.
Covers setting up authentication and RAD policy for third-party AP WM-ADs.
Details how to define exception filters for third-party APs to control network access.
Guides on enabling the Analysis and data collector engines for the Summit WM series Spy.
Explains how to perform scans for rogue APs and view scan activities.
Describes how the Analysis Engine processes RF data to identify rogue APs.
Covers managing wireless clients, including disassociating and blacklisting devices.
Details the procedure to cut the connection with a specific wireless device from an AP.
Explains how to add MAC addresses to a blacklist to prevent client association.
Guides on defining login user names, IDs, and passwords for Summit WM GUI access.
Explains the meaning of LED states and SSD codes during firmware and application initialization.
Details how to configure QoS policies, including Legacy, WMM, and Turbo Voice for SpectraLink.