EasyManua.ls Logo

Extreme Networks Summit WM - Intranet Wireless Deployment Steps

Extreme Networks Summit WM
222 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Creating the Windows Security Infrastructure
Summit WM Technical Reference Guide, Software Version 5.132
issuer of the IAS server computer certificates, you might also have to install root CA certificates on each
wireless client.
Wireless remote access policy:
A remote access policy is configured for wireless connections so that employees can access the
organization intranet.
Multiple wireless APs:
Multiple third-party wireless APs provide wireless access in different buildings of an enterprise. The
wireless APs must support IEEE 802.1X, RADIUS, and Wi-Fi Protected Access (WPA™) or WPA2™.
Wired Equivalent Privacy (WEP) is recommended only for temporary use when transitioning to WPA or
WPA2.
Figure 5: Typical enterprise wireless configuration
Intranet Wireless Deployment Steps
For this configuration, complete the following steps:
Step 1: Configuring the Certificate Infrastructure
Step 2: Configuring Active Directory for Accounts and Groups
Step 3: Configuring the Primary IAS Server
Step 4: Configuring the secondary IAS server (if applicable)
Step 5: Deploying and Configuring Wireless APs.
Step 6: Configuring Wireless Network (IEEE 802.11) Policies Group Policy Settings
Step 7: Installing Computer Certificates on Wireless Client Computers for EAP-TLS
WM Controller
Primary IAS server
Secondary IAS server
Certification authority
(CA)
Wireless AP
Wireless AP
Client
devices

Table of Contents

Other manuals for Extreme Networks Summit WM

Related product manuals