Extreme wm100 Guía Del Usuario

Descargar
Página de 140
Summit WM-Series WLAN Switch Software Solution
HWC_GSG_Chapter 1_Overview.fm
Conceptual model
 120385-00 Rev 01, March 2007
12
Summit WM, Getting Started Guide
   
   
  
2.1.1.1  Web-based centralized management of Altitude APs
The Summit WM Switch enables you to monitor and manage Altitude APs from a 
centralized web-based interface called the Extreme Networks Summit WM-
Series Console. You can separately configure, enable, or disable each Altitude 
AP from the Summit WM Switch using the Extreme Networks Summit WM-Series 
Console.
The Extreme Networks Summit WM-Series Console also allows you to group the 
APs of similar attributes into one of ten upgrade profiles for the purpose of 
deploying software upgrades.You can initiate the software updates on a profile 
and the updates will be deployed to each AP in the profile. This saves you from 
the cumbersome task of deploying the updates to each AP individually.
2.1.1.2  Virtualized user segmentation
The Summit WM Switch allows you to create and manage unique WM Access 
Domain that enables you to group specific mobile users, devices and applications 
on the basis of policy class in order to provide unique levels of service, access 
permissions, encryption, and device authorization.
A WM-AD segment is a virtual network and each Altitude Access Points can 
support multiple WM-AD segments. 
WM-AD optimizes the dynamic nature of WLAN mobility as WM-AD groups can 
follow users without depending on the physical configuration of the network. 
The following is the list of Summit WM Switches and the number of WM-ADs they 
can support.
Summit Switch WM2000: 64 WM-ADs
Summit Switch WM200: 32 WM-ADs
Summit Switch WM1000: 50 WM-ADs 
2.1.1.3  
Summit Switch WM100: 32 WM-ADs
Authentication and 
encryption
The Summit WM Switch and Altitude AP work together to support comprehensive 
authentication, encryption, and intrusion detection capabilities. A range of robust 
security features based upon the 802.11 and WPA2 standards ensure that your 
network stays protected. 
802.1X mechanism in conjunction with RADIUS and pre-shared key 
authentication ensure that only authorized users can access the network. 
Other features include Captive Portal for redirected web-based authentication.