EasyManua.ls Logo

Extreme Networks Summit WM3000 Series - Page 10

Extreme Networks Summit WM3000 Series
513 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Table of Contents
Summit WM3000 Series Controller System Reference Guide10
Adding SNMP Trap Receivers.....................................................................................................................441
Configuring Management Users..........................................................................................................................442
Configuring Local Users...............................................................................................................................442
Creating a New Local User ...................................................................................................................443
Modifying an Existing Local User........................................................................................................445
Creating a Guest Admin and Guest User ..............................................................................................447
Configuring Controller Authentication.........................................................................................................448
Modifying the Properties of an Existing Radius Server........................................................................450
Adding an External Radius Server........................................................................................................452
External Radius Server Settings............................................................................................................453
Chapter 9: Diagnostics............................................................................................................................455
Displaying the Main Diagnostic Interface...........................................................................................................455
Controller Environment................................................................................................................................455
CPU Performance.........................................................................................................................................457
Controller Memory Allocation.....................................................................................................................458
Controller Disk Allocation ...........................................................................................................................459
Controller Memory Processes.......................................................................................................................460
Other Controller Resources ..........................................................................................................................460
Configuring System Logging...............................................................................................................................461
Log Options..................................................................................................................................................461
File Management..........................................................................................................................................463
Viewing the Entire Contents of Individual Log Files ...........................................................................464
Transferring Log Files...........................................................................................................................466
Reviewing Core Snapshots..................................................................................................................................467
Transferring Core Snapshots ........................................................................................................................468
Reviewing Panic Snapshots.................................................................................................................................468
Viewing Panic Details .................................................................................................................................470
Transferring Panic Files................................................................................................................................470
Debugging the Applet..........................................................................................................................................471
Configuring a Ping...............................................................................................................................................472
Modifying the Configuration of an Existing Ping Test................................................................................474
Adding a New Ping Test...............................................................................................................................475
Viewing Ping Statistics.................................................................................................................................476
Appendix A: Customer Support.............................................................................................................479
Registration..........................................................................................................................................................479
Documentation.....................................................................................................................................................479
Appendix B: AP Management from Controller ...................................................................................481
Where to Go From Here...............................................................................................................................481
AP Management ...........................................................................................................................................482
Licensing.......................................................................................................................................................482
Controller Discovery ....................................................................................................................................482
Auto Discovery using DHCP ................................................................................................................482
Securing a Configuration Channel Between Controller and AP..................................................................483
AP WLAN Topology....................................................................................................................................483
Configuration Updates..................................................................................................................................484
Securing Data Tunnels between the Controller and AP...............................................................................484
Managing an AP’s Controller Failure...........................................................................................................484
If a new controller is located, the AP synchronizes its configuration with the located controller once adopted.