About this guide
Summit WM User Guide, Software Version 5.310
● Chapter 7, "Mobility" describes how to set up the mobility domain that provides mobility for a
wireless device user when the user roams from one Altitude AP to another in the mobility domain.
● Chapter 8, "Working with third-party APs," describes how to use the Controller, Access Points, and
WM software features with third-party wireless access points.
● Chapter 9, "Working with the Summit WM series Spy," describes the security tool that scans for,
detects, and reports on rogue APs.
● Chapter 10, "Working with reports and displays," describes the various reports and displays
available in the Summit WM Controller, Access Points, and WM software system.
● Chapter 11, "Performing system administration," describes system administration activities, such as
performing Altitude AP client management, defining management users, configuring the network
time, and configuring Web session timeouts.
● "Glossary" contains a list of terms and definitions for the Summit WM Controller and the Wireless
AP as well as standard industry terms used in this guide.
● Appendix A, "Summit WM Controller's physical description," describes the physical description and
LED states of the Summit WM Controller.
● Appendix B, "Regulatory information," provides the regulatory information for the Summit WM100/
WM1000/WM20/WM200/WM2000 Wireless LAN Controllers and the Altitude
™
Access Points
(APs).
● Appendix C, "SpectraLink Wireless Telephones," describes how to configure NetLink Wireless
Telephones and WLAN infrastructure products.
Formatting conventions
The Summit WM Controller, Access Points, and WM software documentation uses the following
formatting conventions to make it easier to find information and follow procedures:
● Bold text is used to identify components of the management interface, such as menu items and
section of pages, as well as the names of buttons and text boxes.
For example: Click Logout.
● Monospace font is used in code examples and to indicate text that you type.
For example: Type
https://<wm-address>[:mgmt-port>]
● The following notes are used to draw your attention to additional information:
NOTE
Notes identify useful information, such as reminders, tips, or other ways to perform a task.
CAUTION
Cautionary notes identify essential information, which if ignored can adversely affect the operation of your
equipment or software.
WARNING!
Warning notes identify essential information, which if ignored can lead to personal injury or harm.