EasyManua.ls Logo

Extreme Networks Summit WM - About this guide

Extreme Networks Summit WM
222 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Summit WM Technical Reference Guide, Software Version 5.1 9
About this guide
This guide describes how to install, configure, and manage Extreme Networks
®
Summit
®
WM
Controller, Access Points, and WM software.
Who should use this guide
This guide is a reference for system administrators who install and manage the Summit WM Controller,
Access Points, and WM software system.
Any administrator performing tasks described in this guide must have an account with full
administrative privileges.
What is in this guide
This guide contains the following chapters:
“About this guide” describes the target audience and content of the guide, the formatting
conventions used in it, and how to provide feedback on the guide.
Chapter 1, “System Capacities” provides the supported limits and capacities of the Summit WM
Controller software system.
Chapter 2, “Configuration of Dynamic Host Configuration Protocol (DHCP)” describes the
configurations the Wireless AP uses to identify which Summit WM Controllers are available to
provide service in it's local area.
Chapter 3, “Rogue Access Point Detection” describes the Summit WM Controllers’ capabilities that
allow Wireless APs to periodically scan the RF space and report suspect devices.
Chapter 4, “Creating the Windows Security Infrastructure” provides the information necessary for
the Deployment of Wireless Intranet Wireless.
Chapter 5, “Windows Recommendations and Best Practices” provides recommendations and best
practices for deploying an IEEE 802.11 WLAN in a large enterprise.
Chapter 6, “Summit WM Controller diagnostics” provides information on hardware constraints and
system diagnostics.
Chapter 7, “Hardware maintenance” provides hardware descriptions and maintenance information.
Chapter 8, “WDS – Wireless Distribution Service” provides information on the Wireless Distribution
Service (WDS) feature.
Chapter 9, “AP as 802.1X supplicant” provides information on the 802.1X authentication protocol.
Chapter 10, “MAC Based Authentication” provides information on controlling access to the network
resources for the wireless clients over the Summit WM Controller, Access Points, and WM software
system.
Chapter 12, “FreeRADIUS and Security” provides information on FreeRADIUS options for RADIUS
authentication and accounting.

Table of Contents

Other manuals for Extreme Networks Summit WM

Related product manuals