Table of Contents
Summit WM3000 Series Controller System Reference Guide 9
Defining the IPSec Configuration ................................................................................................................375
Editing an Existing Transform Set ........................................................................................................377
Adding a New Transform Set................................................................................................................379
Defining the IPSec VPN Remote Configuration..........................................................................................380
Configuring IPSEC VPN Authentication.....................................................................................................382
Configuring Crypto Maps.............................................................................................................................384
Crypto Map Entries ...............................................................................................................................385
Crypto Map Peers..................................................................................................................................387
Crypto Map Manual SAs.......................................................................................................................389
Crypto Map Transform Sets..................................................................................................................392
Crypto Map Interfaces...........................................................................................................................393
Viewing IPSec Security Associations ..........................................................................................................394
Configuring the Radius Server ............................................................................................................................396
Radius Overview ..........................................................................................................................................396
User Database........................................................................................................................................398
Authentication of Terminal/Management User(s).................................................................................398
Access Policy.........................................................................................................................................398
Proxy to External Radius Server ...........................................................................................................398
LDAP.....................................................................................................................................................398
Accounting ............................................................................................................................................398
Using the Controller’s Radius Server Versus an External Radius ...............................................................398
Defining the Radius Configuration...............................................................................................................399
Radius Client Configuration..................................................................................................................400
Radius Proxy Server Configuration.......................................................................................................401
Configuring Radius Authentication and Accounting ...................................................................................402
Configuring Radius Users.............................................................................................................................404
Configuring Radius User Groups .................................................................................................................407
Viewing Radius Accounting Logs................................................................................................................410
Creating Server Certificates.................................................................................................................................411
Using Trustpoints to Configure Certificates.................................................................................................412
Creating a Server / CA Root Certificate................................................................................................413
Configuring Trustpoint Associated Keys .....................................................................................................419
Adding a New Key................................................................................................................................420
Transferring Keys..................................................................................................................................421
Chapter 8: Controller Management ......................................................................................................423
Displaying the Management Access Interface.....................................................................................................423
Configuring Access Control ................................................................................................................................424
Configuring SNMP Access..................................................................................................................................426
Configuring SNMP v1/v2 Access ................................................................................................................426
Editing an Existing SNMP v1/v2 Community Name............................................................................427
Configuring SNMP v3 Access......................................................................................................................428
Editing a SNMP v3 Authentication and Privacy Password...................................................................430
Setting SNMP Access Message Parameters.................................................................................................430
Accessing SNMP v2/v3 Statistics ................................................................................................................431
Configuring SNMP Traps....................................................................................................................................433
Enabling Trap Configuration........................................................................................................................433
Configuring E-mail Notifications..........................................................................................................435
Configuring Trap Thresholds .......................................................................................................................436
Wireless Trap Threshold Values ...........................................................................................................438
Configuring SNMP Trap Receivers.....................................................................................................................439
Editing SNMP Trap Receivers .....................................................................................................................441