Table of Contents
Summit WM3000 Series Controller System Reference Guide10
Adding SNMP Trap Receivers.....................................................................................................................441
Configuring Management Users..........................................................................................................................442
Configuring Local Users...............................................................................................................................442
Creating a New Local User ...................................................................................................................443
Modifying an Existing Local User........................................................................................................445
Creating a Guest Admin and Guest User ..............................................................................................447
Configuring Controller Authentication.........................................................................................................448
Modifying the Properties of an Existing Radius Server........................................................................450
Adding an External Radius Server........................................................................................................452
External Radius Server Settings............................................................................................................453
Chapter 9: Diagnostics............................................................................................................................455
Displaying the Main Diagnostic Interface...........................................................................................................455
Controller Environment................................................................................................................................455
CPU Performance.........................................................................................................................................457
Controller Memory Allocation.....................................................................................................................458
Controller Disk Allocation ...........................................................................................................................459
Controller Memory Processes.......................................................................................................................460
Other Controller Resources ..........................................................................................................................460
Configuring System Logging...............................................................................................................................461
Log Options..................................................................................................................................................461
File Management..........................................................................................................................................463
Viewing the Entire Contents of Individual Log Files ...........................................................................464
Transferring Log Files...........................................................................................................................466
Reviewing Core Snapshots..................................................................................................................................467
Transferring Core Snapshots ........................................................................................................................468
Reviewing Panic Snapshots.................................................................................................................................468
Viewing Panic Details .................................................................................................................................470
Transferring Panic Files................................................................................................................................470
Debugging the Applet..........................................................................................................................................471
Configuring a Ping...............................................................................................................................................472
Modifying the Configuration of an Existing Ping Test................................................................................474
Adding a New Ping Test...............................................................................................................................475
Viewing Ping Statistics.................................................................................................................................476
Appendix A: Customer Support.............................................................................................................479
Registration..........................................................................................................................................................479
Documentation.....................................................................................................................................................479
Appendix B: AP Management from Controller ...................................................................................481
Where to Go From Here...............................................................................................................................481
AP Management ...........................................................................................................................................482
Licensing.......................................................................................................................................................482
Controller Discovery ....................................................................................................................................482
Auto Discovery using DHCP ................................................................................................................482
Securing a Configuration Channel Between Controller and AP..................................................................483
AP WLAN Topology....................................................................................................................................483
Configuration Updates..................................................................................................................................484
Securing Data Tunnels between the Controller and AP...............................................................................484
Managing an AP’s Controller Failure...........................................................................................................484
If a new controller is located, the AP synchronizes its configuration with the located controller once adopted.