Table of Contents
Summit WM3000 Series Controller System Reference Guide
9
Defining the IPSec Configuration ................................................................................................................375
Editing an Existing Transform Set ........................................................................................................377
Adding a New Transform Set................................................................................................................379
Defining the IPSec VPN Remote Configuration ..........................................................................................380
Configuring IPSEC VPN Authentication .....................................................................................................382
Configuring Crypto Maps.............................................................................................................................384
Crypto Map Entries ...............................................................................................................................385
Crypto Map Peers ..................................................................................................................................387
Crypto Map Manual SAs.......................................................................................................................389
Crypto Map Transform Sets ..................................................................................................................392
Crypto Map Interfaces ...........................................................................................................................393
Viewing IPSec Security Associations ..........................................................................................................394
Configuring the Radius Server ............................................................................................................................396
Radius Overview ..........................................................................................................................................396
User Database ........................................................................................................................................398
Authentication of Terminal/Management User(s).................................................................................398
Access Policy.........................................................................................................................................398
Proxy to External Radius Server ...........................................................................................................398
LDAP.....................................................................................................................................................398
Accounting ............................................................................................................................................398
Using the Controller’s Radius Server Versus an External Radius ...............................................................398
Defining the Radius Configuration...............................................................................................................399
Radius Client Configuration..................................................................................................................400
Radius Proxy Server Configuration.......................................................................................................401
Configuring Radius Authentication and Accounting ...................................................................................402
Configuring Radius Users.............................................................................................................................404
Configuring Radius User Groups .................................................................................................................407
Viewing Radius Accounting Logs................................................................................................................410
Creating Server Certificates .................................................................................................................................411
Using Trustpoints to Configure Certificates.................................................................................................412
Creating a Server / CA Root Certificate................................................................................................413
Configuring Trustpoint Associated Keys .....................................................................................................419
Adding a New Key ................................................................................................................................420
Transferring Keys ..................................................................................................................................421
Chapter 8: Controller Management ...................................................................................................... 423
Displaying the Management Access Interface.....................................................................................................423
Configuring Access Control ................................................................................................................................424
Configuring SNMP Access..................................................................................................................................426
Configuring SNMP v1/v2 Access ................................................................................................................426
Editing an Existing SNMP v1/v2 Community Name............................................................................427
Configuring SNMP v3 Access......................................................................................................................428
Editing a SNMP v3 Authentication and Privacy Password...................................................................430
Setting SNMP Access Message Parameters .................................................................................................430
Accessing SNMP v2/v3 Statistics ................................................................................................................431
Configuring SNMP Traps ....................................................................................................................................433
Enabling Trap Configuration ........................................................................................................................433
Configuring E-mail Notifications..........................................................................................................435
Configuring Trap Thresholds .......................................................................................................................436
Wireless Trap Threshold Values ...........................................................................................................438
Configuring SNMP Trap Receivers.....................................................................................................................439
Editing SNMP Trap Receivers .....................................................................................................................441
Summary of Contents for Summit WM3000 Series
Page 139: ...Summit WM3000 Series Controller System Reference Guide 139 ...
Page 478: ...Diagnostics Summit WM3000 Series Controller System Reference Guide 478 ...
Page 480: ...Customer Support Summit WM3000 Series Controller System Reference Guide 480 ...
Page 498: ...AP Management from Controller Summit WM3000 Series Controller System Reference Guide 498 ...
Page 512: ...Troubleshooting Information Summit WM3000 Series Controller System Reference Guide 512 ...
Page 513: ......