EasyManua.ls Logo

Extreme Networks Summit WM3000 Series User Manual

Extreme Networks Summit WM3000 Series
513 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
Extreme Networks, Inc.
3585 Monroe Street
Santa Clara, California 95051
(888) 257-3000
(408) 579-2800
http://www.extremenetworks.com
Published: December 2009
Part Number: 100352-00 Rev 01
Summit
®
WM3000 Series Controller System
Reference Guide, Software Version 4.0
Question and Answer IconNeed help?

Do you have a question about the Extreme Networks Summit WM3000 Series and is the answer not in the manual?

Extreme Networks Summit WM3000 Series Specifications

General IconGeneral
CategoryController
Interface TypesGigabit Ethernet
Power over Ethernet (PoE)No
RedundancyYes
VLAN SupportYes
QoS SupportYes
Wireless Standards802.11a/b/g/n
Wireless SecurityWPA, WPA2, 802.1X
Ports4 x 10/100/1000 Ethernet
Power SupplyInternal
ManagementWeb-based, CLI, SNMP
Operating Temperature0°C to 40°C (32°F to 104°F)
Storage Temperature-20°C to 70°C (-4°F to 158°F)
ModelSummit WM3000 Series

Summary

Overview

Wireless Switching

Details the features related to managing wireless traffic and connectivity.

Wired Switching

Covers the features for managing wired network connections and ports.

Security Features

Outlines the wireless and wired security mechanisms available on the controller.

Controller Web UI Access and Image Upgrades

Accessing the Summit WM Controller for the First Time

Guides the initial connection and access to the controller via a web-enabled laptop.

Defining Basic Controller Settings

Guides the initial setup of essential controller parameters like country code and location.

Upgrading the Controller Image

Explains the process for updating the controller's firmware to the latest version.

Controller Information

Updating the Controller Firmware

Explains the process for updating the controller's firmware via Web UI, FTP, or TFTP.

Network Setup

Viewing and Configuring Layer 2 Virtual LANs

Explains how to view and configure VLANs by port and ports by VLAN information.

Configuring Controller Virtual Interfaces

Details the setup and configuration of virtual interfaces (CVIs) for Layer 3 access and routing.

Viewing and Configuring Controller WLANs

Covers the configuration and monitoring of wireless LANs, including assignments and security schemes.

Configuring Authentication Types

Configuring Hotspots

Explains how to configure hotspot functionality for user authentication via a web page.

Configuring Different Encryption Types

Details the configuration of WLAN encryption options like WEP, WPA, and WPA2.

Configuring the NAC Inclusion List

Configuring the NAC Exclusion List

Viewing Access Point Information

Configuring Access Point Radios

Covers viewing and configuring radio settings for Access Points.

Editing AP Settings

Modifies existing radio properties like placement, channel, and power settings for APs.

Configuring WLAN Assignment

Manages how WLANs are assigned to AP radios and BSSIDs.

Configuring WMM

Viewing Access Point Adoption Defaults

Editing Default Access Point Adoption Settings

Modifies default radio settings for AP adoption.

Configuring Access Points

Configuring AP Firmware

Manages firmware images for adopted Access Points.

Configuring IGMP Snooping

Controller Services

DHCP Server Settings

Details activities related to configuring DHCP server settings.

Configuring Secure NTP

Covers the configuration of Secure Network Time Protocol for time synchronization.

Configuring Controller Redundancy and Clustering

Explains how to set up redundancy groups and clusters for high availability.

Layer 3 Mobility

Details the mechanism for maintaining Layer 3 addresses during roaming across subnets.

Configuring Controller Discovery

Describes the process of discovering devices on the network using SNMP.

Controller Security

AP Intrusion Detection

Configures settings to detect potentially hostile Access Points.

Configuring Firewalls and Access Control Lists

Details the setup and configuration of firewalls and access control lists.

Configuring NAT Information

Explains Network Address Translation for IP address translation.

Configuring IKE Settings

Covers the configuration of IKE parameters for IPSec security.

Configuring IPSec VPN

Details the process of defining secure tunnels for virtual private networks.

Configuring the Radius Server

Explains how to set up and manage the Radius server for authentication.

Creating Server Certificates

Covers the creation and management of server certificates.

Controller Management

Configuring Access Control

Controls management access to the controller via various protocols.

Diagnostics

AP Management from Controller

Troubleshooting Information