Summit WM3000 Series Controller System Reference Guide
115
5
Refer to the
Configuration
field to define the following WLAN values
NOTE
For a Radius supported VLAN to function, the
Dynamic Assignment
checkbox must be enabled for the WLAN
supporting the VLAN.
NOTE
When configuring wireless settings for APs all configuration must be done through the controller and not from
the AP management console. Making changes directly in the AP management console can lead to unstable
operation of the AP.
6
Refer to the
Authentication
field to select amongst the following options:
7
Refer to the
Encryption
field to select amongst the following options:
ESSID
Displays the
Extended Service Set ID
(ESSID) associated with each
WLAN. If changing the ESSID, ensure the value used is unique.
Description
If editing an existing WLAN, ensure its description is updated accordingly
to best describe the intended function of the WLAN.
Independent Mode
Determines whether the WLAN is functioning as an independent or
extended WLAN. Select the checkbox to designate the WLAN as
independent and prevent traffic from being forwarded to the controller.
Independent WLANs behave like WLANs as used on a a standalone
Access Point. Leave this option unselected (as is by default) to keep this
WLAN an extended WLAN (a typical centralized WLAN created on the
controller).
Client Bridge
Backhaul
When the Independent Mode option is selected, this option becomes
available for selection. Enable Client Bridge Backhaul to make the WLAN
available to support mesh networking. Only WLANs defined for mesh
networking support should have this checkbox selected.
VLAN ID
Assign the revised VLAN ID for this WLAN. Select the
Dynamic
Assignment
checkbox for an user based VLAN assignment when 802.1x
EAP Authentication is used. Since the VLAN ID pertains to just this
VLAN, there is no tagging involved.
Dynamic Assignment
With any authentication method that involves a Radius server, the Radius
server may be configured to include a VLAN Id attribute in its "ACCESS
Accept" response. This VLAN, instead of the configured VLAN(s) on this
WLAN, will be assigned to the mobile unit. Enabling this check mark
will enable controller to take VLAN ID from Radius response. When
disabled, controller will ignore the VLAN ID from Radius response. Since
the VLAN ID pertains to just this VLAN, there is no tagging involved.
802.1X EAP
A Radius server is used to authenticate users. For detailed information on
configuring EAP for the WLAN, see
“Configuring 802.1x EAP” on
page 119
.
Hotspot
A Hotspot is used to authenticate users in a unique network segment
(hotspot). The attributes of both the hotspot and the Radius Server are
required. For more information, see
“Configuring Hotspots” on page 120
.
MAC Authentication
The controller uses a Radius server to see if a target MAC address is
allowed on the network. The attributes of the Radius Server are required.
For more information, see
“Configuring MAC Authentication” on page 132
No Authentication
When selected, no Authentication is used and transmissions are made (in
the open) without security unless an encryption scheme is used. This
setting is not recommended when data protection is important.
Summary of Contents for Summit WM3000 Series
Page 139: ...Summit WM3000 Series Controller System Reference Guide 139 ...
Page 478: ...Diagnostics Summit WM3000 Series Controller System Reference Guide 478 ...
Page 480: ...Customer Support Summit WM3000 Series Controller System Reference Guide 480 ...
Page 498: ...AP Management from Controller Summit WM3000 Series Controller System Reference Guide 498 ...
Page 512: ...Troubleshooting Information Summit WM3000 Series Controller System Reference Guide 512 ...
Page 513: ......