![Extreme Networks Altitude 3500 Series Скачать руководство пользователя страница 15](http://html1.mh-extra.com/html/extreme-networks/altitude-3500-series/altitude-3500-series_product-reference-manual_2454764015.webp)
Altitude 3500 Series Access Point Product Reference Guide
15
Apache Certificate Management
Apache certificate management allows the update and management of security certificates for an
Apache HTTP server. This allows users to upload a trusted certificate to their AP. When a client attaches
to it with a browser, a warning message pertaining to the certificate no longer displays.
Apache certificate management utilizes the access point’s existing Certificate Manager for the creation of
certificates and keys. The certificate can then be loaded into the Apache file system using a command.
For information on defining the Apache certificate management configuration, see
“Apache Certificate
Management” on page 84
.
Adaptive AP
An
adaptive AP
(AAP) is an Altitude 35xx access point that can adopt like an Altitude 4600 access point
(L3). The management of an AAP is conducted by a controller, once the access point connects to an
Extreme Networks controller and receives its AAP configuration.
An AAP provides:
●
local 802.11 traffic termination
●
local encryption/decryption
●
local traffic bridging
●
the tunneling of centralized traffic to the wireless controller
For a information overview of the adaptive AP feature as well as how to configure it, refer to
“Adaptive AP Overview” on page 551
.
Rogue AP Detection Enhancement
The access point now has the option to scan for rogues over all channels on both of the access point’s
11a and 11bg radio bands. The switching of radio bands is based on a timer with no user intervention
required.
For information on configuring the access point for Rogue AP support, see
“Configuring Rogue AP
Detection” on page 210
.
RADIUS Time-Based Authentication
An external server maintains a users and groups database used by the access point for access
permissions. Various kinds of access policies can be applied to each group. Individual groups can be
configured with their own time-based access policy. Each group’s policy has a user defined interval
defining the days and hours access is permitted. Authentication requests for users belonging to the
group are honored only during these defined hourly intervals.
For more information on defining access point access policies by group, see
“Defining User Access
Permissions by Group” on page 226
.
Содержание Altitude 3500 Series
Страница 10: ...Altitude 3500 Series Access Point Product Reference Guide 10...
Страница 34: ...Introduction Altitude 3500 Series Access Point Product Reference Guide 34...
Страница 66: ...Getting Started Altitude 3500 Series Access Point Product Reference Guide 66...
Страница 112: ...System Configuration Altitude 3500 Series Access Point Product Reference Guide 112...
Страница 168: ...Network Management Altitude 3500 Series Access Point Product Reference Guide 168...
Страница 230: ...Configuring Access Point Security Altitude 3500 Series Access Point Product Reference Guide 230...
Страница 258: ...Monitoring Statistics Altitude 3500 Series Access Point Product Reference Guide 258...
Страница 537: ...Altitude 3500 Series Access Point Product Reference Guide 537 3 Define a mesh supported WLAN...
Страница 539: ...Altitude 3500 Series Access Point Product Reference Guide 539 5 Define a channel of operation for the 802 11a radio...
Страница 570: ...Adaptive AP Altitude 3500 Series Access Point Product Reference Guide 570...
Страница 592: ...Altitude 3500 Series Access Point Product Reference Guide 592...
Страница 594: ...Altitude 3500 Series Access Point Product Reference Guide 594...