EasyManua.ls Logo

Extreme Networks Summit WM3000 Series - AP Management from Controller

Extreme Networks Summit WM3000 Series
513 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Summit WM3000 Series Controller System Reference Guide 481
B AP Management from Controller
The management of an adopted AP is conducted by the controller, once the AP connects to an Extreme
Networks Summit WM3600 or Summit WM3700 wireless LAN controller and receives its configuration.
An adopted AP provides:
local 802.11 traffic termination
local encryption/decryption
local traffic bridging
the tunneling of centralized traffic to the wireless controller
An AP’s controller connection can be secured using IP/UDP or IPSec depending on whether a secure
WAN link from a remote site to the central site already exists.
The controller can be discovered using one of the following mechanisms:
DHCP
Controller fully qualified domain name (FQDN)
Static IP addresses
The benefits of a controller managed AP deployment include:
Centralized Configuration Management & Compliance - Wireless configurations across distributed sites
can be centrally managed by the wireless controller or cluster.
Controller Link Survivability - Local WLAN services at a remote sites are unaffected in the case of a
controller link failure.
Securely extend corporate WLAN's to remote sites - Small home or office deployments can utilize the
feature set of a corporate WLAN from their remote location.
Maintain local WLAN's for local applications - WLANs created and supported locally can be
concurrently supported with your existing infrastructure.
Where to Go From Here
Refer to the following for a further understanding of AP operation:
AP Management on page 482
Licensing on page 482
Controller Discovery on page 482
Securing a Configuration Channel Between Controller and AP on page 483
AP WLAN Topology on page 483
Securing a Configuration Channel Between Controller and AP on page 483
Securing Data Tunnels between the Controller and AP on page 484
Managing an APs Controller Failure on page 484
Remote Site Survivability (RSS) on page 484