EasyManua.ls Logo

Extreme Networks Summit WM - Page 4

Extreme Networks Summit WM
222 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Table of Contents
Summit WM Technical Reference Guide, Software Version 5.14
Step 3a: Configuring IAS .....................................................................................................38
Step 3b: Configuring a Wireless Remote Access Policy ...........................................................41
Step 4: Configuring the secondary IAS server (if applicable)..........................................................46
Step 5: Deploying and Configuring Wireless APs ..........................................................................47
Step 6: Configuring Wireless Network (IEEE 802.11) Policies Group Policy Settings .......................47
Step 7: Installing Computer Certificates on Wireless Client Computers for EAP-TLS.........................48
Step 8: Installing User Certificates on Wireless Client Computers for EAP-TLS................................49
Submit a user certificate request via the Web ........................................................................49
Request a certificate ...........................................................................................................49
Floppy Disk-Based Installation..............................................................................................50
Export a certificate ..............................................................................................................50
Import a certificate..............................................................................................................50
Step 9: Configuring Wireless Clients for EAP-TLS.........................................................................51
Step 10: Configuring Wireless Client Computers for PEAP-MS-CHAP v2 .........................................52
Additional Intranet Wireless Deployment Configurations................................................................54
Internet Access for Business Partners....................................................................................54
Using Guest Access .............................................................................................................54
Using Validated Access........................................................................................................54
Using a Third-Party CA ........................................................................................................55
Certificates on Wireless Client Computers ..............................................................................56
Configuring Proxy Server Settings ........................................................................................56
Chapter 5: Windows Recommendations and Best Practices ............................................................. 59
Security ...................................................................................................................................59
PKI..........................................................................................................................................59
Wireless APs.............................................................................................................................60
Wireless Network Adapters .........................................................................................................60
Active Directory ........................................................................................................................61
RADIUS ...................................................................................................................................61
Scalability ................................................................................................................................62
Using Computer-only Authentication ...........................................................................................62
Configuring Computer-only Authentication using the Wireless Network (IEEE 802.11) Policies Group
Policy Extension..................................................................................................................63
Enabling Computer-only Authentication Using the Registry......................................................63
Summary..................................................................................................................................64
Chapter 6: Summit WM Controller diagnostics ................................................................................ 65
Summit WM Controller WM200/2000 diagnostics ........................................................................65
Summit WM Controller WM200/2000 capacity ......................................................................65
Summit WM Controller WM200/2000 license capacity ...........................................................65
Summit WM Controller WM200/2000 LEDs...........................................................................66
System Startup ...................................................................................................................69
Summit WM Controller WM200/2000 application states.........................................................69
Summit WM Controller WM200/2000 protocols .....................................................................72
Summit WM Controller WM20 diagnostics ...................................................................................73
Summit WM Controller WM20 capacity .................................................................................73
Using the console port .........................................................................................................74
Summit WM Controller WM20 rescue procedure.....................................................................75
Summit WM Controller WM20 capacity .................................................................................75

Table of Contents

Other manuals for Extreme Networks Summit WM

Related product manuals