EasyManua.ls Logo

Extreme Networks Summit WM3000 Series - Controller Security

Extreme Networks Summit WM3000 Series
513 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Summit WM3000 Series Controller System Reference Guide 309
7 Controller Security
This chapter describes the security mechanisms available to the controller. This chapter describes the
following security configuration activities:
Displaying the Main Security Interface on page 309
AP Intrusion Detection on page 310
Configuring Firewalls and Access Control Lists on page 319
Configuring NAT Information on page 356
Configuring IKE Settings on page 366
Configuring IPSec VPN on page 374
Configuring the Radius Server on page 396
Creating Server Certificates on page 411
Displaying the Main Security Interface
Refer to main Security interface for a high level overview of device intrusion and controller access
permission options.
NOTE
When the controller’s configuration is successfully updated (using the Web UI), the affected screen is closed without
informing the user their change was successful. However, if an error were to occur, the error displays within the
affected screen’s Status field remains displayed. In the case of file transfer operations, the transfer screen remains
open during the transfer operation and remains open upon completion (with status displayed within the Status field).
To view main menu security information: