EasyManua.ls Logo

Extreme Networks Summit WM - Authentication for a WM-AD

Extreme Networks Summit WM
380 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
WM Access Domain Services configuration
Summit WM User Guide, Software Version 5.3166
7 To save your changes, click Save.
You can view the WM-ADs that each radio is assigned to by clicking the radio tabs from the
Altitude AP Configuration page.
Deleting a WM-AD
You can delete the WM-ADs that are not in use.
To delete the WM-AD:
1 From the main menu, click WM Access Domain Configuration. The WM Access Domain
Configuration page is displayed.
2 From the list of WM Access Domains, click the WM-AD.
3 To delete the WM-AD, click Delete subnet.
Authentication for a WM-AD
The next step in configuring a WM-AD is to set up the authentication mechanism. There are various
authentication combinations available:
z If network assignment is by SSID, authentication can be:
z none
z by Captive Portal using internal Captive Portal
z by Captive Portal using external Captive Portal
z by MAC-based authentication
z If network assignment is by AAA (802.1X), authentication can be:
z by 802.1X authentication, the wireless device user must be authenticated before gaining network
access
z by MAC-based authentication
The first step for any type of authentication is to select RADIUS servers for:
z Authentication
z Accounting
z MAC-based authentication
MAC-based authentication enables network access to be restricted to specific devices by MAC address.
In addition to the other types of authentication, when MAC-based authentication is employed the
Summit WM Controller queries a RADIUS server to determine if the wireless client's MAC address is
authorized to access the network.
Vendor Specific Attributes
In addition to the standard RADIUS message, you can include Vendor Specific Attributes (VSAs). The
Controller, Access Points and Convergence Software authentication mechanism provides six VSAs for
RADIUS and other authentication mechanisms.

Table of Contents

Other manuals for Extreme Networks Summit WM

Related product manuals