EasyManua.ls Logo

Extreme Networks Summit WM - Configuring Topology for a WM-AD for Captive Portal

Extreme Networks Summit WM
380 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Summit WM User Guide, Software Version 5.3 157
save the topology settings. Once your topology is saved, you can then access the remaining WM-AD
tabs and continue configuring your WM-AD.
There are two options for network assignment:
z SSID - The SSID determines the WM-AD to which a user profile will be assigned (user topology/IP,
filters):
z Has Captive Portal authentication, or no authentication (as well as MAC-based authentication).
z Requires restricted filtering rules before authentication and, after authentication, filtering rules for
group filter IDs.
z Is used for a WM-AD supporting wireless voice traffic (QoS).
z Is used for a WM-AD supporting third-party APs.
z Has WEP and WPA-PSK privacy.
z AAA (Authentication, Authorization and Accounting):
z has 802.1X authentication (as well as MAC-based authentication).
z requires filtering rules for group filter IDs and default filter.
z has Dynamic WEP and WPA (WPA v.1 and WPA v.2) privacy.
Configuring topology for a WM-AD for Captive Portal
The section describes how to set up a WM-AD for Captive Portal. The RF tab, where you assign APs to
WM-ADs, is not accessible until the topology for the WM-AD has been configured and saved.

Table of Contents

Other manuals for Extreme Networks Summit WM

Related product manuals