EasyManua.ls Logo

Extreme Networks Summit WM3000 Series - Page 9

Extreme Networks Summit WM3000 Series
513 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Table of Contents
Summit WM3000 Series Controller System Reference Guide 9
Defining the IPSec Configuration ................................................................................................................375
Editing an Existing Transform Set ........................................................................................................377
Adding a New Transform Set................................................................................................................379
Defining the IPSec VPN Remote Configuration..........................................................................................380
Configuring IPSEC VPN Authentication.....................................................................................................382
Configuring Crypto Maps.............................................................................................................................384
Crypto Map Entries ...............................................................................................................................385
Crypto Map Peers..................................................................................................................................387
Crypto Map Manual SAs.......................................................................................................................389
Crypto Map Transform Sets..................................................................................................................392
Crypto Map Interfaces...........................................................................................................................393
Viewing IPSec Security Associations ..........................................................................................................394
Configuring the Radius Server ............................................................................................................................396
Radius Overview ..........................................................................................................................................396
User Database........................................................................................................................................398
Authentication of Terminal/Management User(s).................................................................................398
Access Policy.........................................................................................................................................398
Proxy to External Radius Server ...........................................................................................................398
LDAP.....................................................................................................................................................398
Accounting ............................................................................................................................................398
Using the Controller’s Radius Server Versus an External Radius ...............................................................398
Defining the Radius Configuration...............................................................................................................399
Radius Client Configuration..................................................................................................................400
Radius Proxy Server Configuration.......................................................................................................401
Configuring Radius Authentication and Accounting ...................................................................................402
Configuring Radius Users.............................................................................................................................404
Configuring Radius User Groups .................................................................................................................407
Viewing Radius Accounting Logs................................................................................................................410
Creating Server Certificates.................................................................................................................................411
Using Trustpoints to Configure Certificates.................................................................................................412
Creating a Server / CA Root Certificate................................................................................................413
Configuring Trustpoint Associated Keys .....................................................................................................419
Adding a New Key................................................................................................................................420
Transferring Keys..................................................................................................................................421
Chapter 8: Controller Management ......................................................................................................423
Displaying the Management Access Interface.....................................................................................................423
Configuring Access Control ................................................................................................................................424
Configuring SNMP Access..................................................................................................................................426
Configuring SNMP v1/v2 Access ................................................................................................................426
Editing an Existing SNMP v1/v2 Community Name............................................................................427
Configuring SNMP v3 Access......................................................................................................................428
Editing a SNMP v3 Authentication and Privacy Password...................................................................430
Setting SNMP Access Message Parameters.................................................................................................430
Accessing SNMP v2/v3 Statistics ................................................................................................................431
Configuring SNMP Traps....................................................................................................................................433
Enabling Trap Configuration........................................................................................................................433
Configuring E-mail Notifications..........................................................................................................435
Configuring Trap Thresholds .......................................................................................................................436
Wireless Trap Threshold Values ...........................................................................................................438
Configuring SNMP Trap Receivers.....................................................................................................................439
Editing SNMP Trap Receivers .....................................................................................................................441