Overview of the Controller, Access Points, and WM software solution
Summit WM User Guide, Software Version 5.320
z Availability
z Mobility
z Summit WM series Spy for detection of rogue access points
Some features also require the definition of static routes.
z Web Browser - A browser provides access to the Summit WM Controller Management user interface
to configure the Controller, Access Points, and WM software.
z SSH Enabled Device - A device that supports Secure Shell (SSH) is used for remote (IP) shell access
to the system.
z Zone Integrity - The Zone integrity server enhances network security by ensuring clients accessing
your network are compliant with your security policies before gaining access. Zone Integrity Release
5 is supported.
Network traffic flow
Figure 3 illustrates a simple configuration with a single Summit WM Controller and two Wireless APs,
each supporting a wireless device. A RADIUS server on the network provides authentication, and a
DHCP server is used by the Wireless APs to discover the location of the Summit WM Controller during
the initial registration process. Network inter-connectivity is provided by the infrastructure routing and
switching devices.