EasyManua.ls Logo

Extreme Networks Summit WM - Page 5

Extreme Networks Summit WM
222 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Table of Contents
Summit WM Technical Reference Guide, Software Version 5.1 5
Summit WM Controller WM20 LEDs......................................................................................76
Summit WM Controller WM20 protocols ................................................................................77
Chapter 7: Hardware maintenance .................................................................................................79
Summit WM Controller WM200/2000 maintenance......................................................................79
Summit WM Controller WM200/2000 power supply ...............................................................80
Power FRUs........................................................................................................................81
Fan Tray.............................................................................................................................81
HME ..................................................................................................................................82
SME card ...........................................................................................................................83
NPE 2411 card ..................................................................................................................84
Summit WM Controller WM200/2000 power and maintenance procedures ...............................85
Summit WM Controller WM20 maintenance.................................................................................89
Summit WM Controller WM20 power and maintenance procedures ..........................................91
Chapter 8: WDS – Wireless Distribution Service.............................................................................. 93
Summit WM LAN WDS solution overview .....................................................................................93
Using WDS...............................................................................................................................97
Using WDS to fill coverage gaps ...........................................................................................97
Using WDS to extend coverage in an area that does not have Ethernet infrastructure .................99
Using WDS to connect two Ethernet networks ......................................................................101
Chapter 9: AP as 802.1X supplicant............................................................................................. 103
Credential management ...........................................................................................................103
Transferring credentials from the Summit WM Controller to AP..............................................104
Storing credentials on the AP .............................................................................................105
TLS credential management ...............................................................................................105
TLS certificate expiration ...................................................................................................106
TLS server authentication ..................................................................................................107
Authentication with 802.1X .....................................................................................................107
EAP-TLS authentication.....................................................................................................108
EAP-PEAP authentication ..................................................................................................109
Configuring APs for .1X authentication ......................................................................................109
General configuration ........................................................................................................109
EAP-PEAP configuration ....................................................................................................109
EAP-TLS configuration with the Summit WM Controller as proxy ............................................110
EAP-TLS configuration with the Summit WM Controller as pass-through .................................111
Bulk EAP-TLS configuration ...............................................................................................111
Bulk EAP-PEAP configuration.............................................................................................112
Verifying the AP .1X configuration ............................................................................................112
Limits and technical data ........................................................................................................113
Chapter 10: MAC Based Authentication ........................................................................................ 115
How MAC-based authentication works .......................................................................................115
Roaming ................................................................................................................................116
Radius redundancy..................................................................................................................116
Rejection and failure ...............................................................................................................116
Additional RADIUS attributes ...................................................................................................116
Assumptions/recommendations.................................................................................................117

Table of Contents

Other manuals for Extreme Networks Summit WM

Related product manuals