Overview of the Summit WM Controller, Access Points and Software Solution
Summit WM20 User Guide, Software Release 4.2
26
Figure 3: Traffic Flow Diagram
Each wireless device sends IP packets in the 802.11 standard to the Wireless AP. The Wireless AP uses a
UDP (User Datagram Protocol) based tunnelling protocol to encapsulate the packets and forward them
to the Summit WM Controller. In a typical configuration, access points can be configured to locally
bridge traffic (to a configured VLAN) directly at their network point of attachment. The Summit WM
Controller decapsulates the packets and routes these to destinations on the network.
The Summit WM Controller functions like a standard router, except that it is configured to route only
network traffic associated with wireless connected users. The Summit WM Controller can also be
configured to simply forward traffic to a default or static route if dynamic routing is not preferred.
Network Security
The Summit WM Controller, Access Points and Software system provides features and functionality to
control network access. These are based on standard wireless network security practices.
Current wireless network security methods provide protection. These methods include:
●
Shared Key authentication that relies on Wired Equivalent Privacy (WEP) keys
●
Open System that relies on Service Set Identifiers (SSIDs)
●
802.1x that is compliant with Wi-Fi Protected Access (WPA)
●
Captive Portal based on Secure Sockets Layer (SSL) protocol
DHCP
Server
RADIUS
Server
External
CP Server
External Web
Authentication
Server
Summit WM
Controller
Router
Wireless AP
Wireless AP
Wireless Device
Wireless Device
Packet Transmission
Control and Routing
• WM Authenticates wireless
user
Tunneling
• AP sends data traffic to WM
through UDP tunnel called
CTP
• Using WASSP tunnels, WM
allows wireless clients to
roam to Wireless APs on
different WMs
802.11 Packet Transmission
• 802.11 beacon and probe,
wireless device associates
with a Wireless AP by its
SSID
Summary of Contents for Summit WM20
Page 8: ...Table of Contents Summit WM20 User Guide Software Release 4 2 8 ...
Page 20: ...About this Guide Summit WM20 User Guide Software Release 4 2 20 ...
Page 54: ...Configuring the Summit WM Controller Summit WM20 User Guide Software Release 4 2 54 ...
Page 96: ...WM Access Domain Services Summit WM20 User Guide Software Release 4 2 96 ...
Page 150: ...WM Access Domain Services Configuration Summit WM20 User Guide Software Release 4 2 150 ...
Page 168: ...Availability and Controller Functionality Summit WM20 User Guide Software Release 4 2 168 ...
Page 172: ...Working With Third Party APs Summit WM20 User Guide Software Release 4 2 172 ...
Page 184: ...Working With the Summit WM Series Spy Summit WM20 User Guide Software Release 4 2 184 ...
Page 194: ...Working With Reports and Displays Summit WM20 User Guide Software Release 4 2 194 ...
Page 216: ...Performing System Maintenance Summit WM20 User Guide Software Release 4 2 216 ...