Overview
Summit WM3000 Series Controller System Reference Guide
32
Authorized AP Lists
Configure a list of authorized Access Points based on their MAC addresses. The controller evaluates the
APs against the configured authorized list after obtaining Rogue AP information from one of the 2
mechanisms as mentioned in
“Rogue AP Detection” on page 31
.
Rogue AP Report
After determining which are authorized APs and which are Rogue, the controller prepares a report.
Extreme Networks WMS Support
The controller can provide rogue device detection data to the Extreme Networks Wireless LAN
Controller Wireless Management Suite application (or Extreme Networks WMS). Extreme Networks
WMS uses this data to refine the position and display the rogue on a site map representative of the
physical dimensions of the actual radio coverage area of the controller. This is of great assistance in the
quick identification and removal of unauthorized devices.
ACLs
ACLs control access to the network through a set of rules. Each rule specifies an action taken when a
packet matches a set of rules. If the action is deny, the packet is dropped. If the action is permit, the
packet is allowed. If the action is to mark, the packet is tagged for priority. The controller supports the
following types of ACLs:
NOTE
An ACL is located at the AP for locally bridged traffic and at the controller for tunneled traffic.
●
IP Standard ACLs
●
IP Extended ACLs
●
MAC Extended ACLs
●
Wireless LAN ACLs
For information on creating an ACL, see
“Configuring Firewalls and Access Control Lists” on page 319
.
Local Radius Server
Radius is a common authentication protocol utilized by the 802.1x wireless security standard. Radius
improves the WEP encryption key standard, in conjunction with other security methods such as EAP-
PEAP. The controller has one internal Radius server. For information on configuring the controller’s
resident Radius Server, see
“Configuring the Radius Server” on page 396
.
IPSec VPN
IP Sec is a security protocol providing authentication and encryption over the Internet. Unlike SSL
(which provides services at layer 4 and secures two applications), IPsec works at Layer 3 and secures
the network. Also unlike SSL (which is typically built into the Web browser), IPsec requires a client
installation. IPsec can access both Web and non-Web applications, whereas SSL requires workarounds
for non-Web access such as file sharing and backup.
Содержание Summit WM3000 Series
Страница 42: ...Controller Web UI Access and Image Upgrades Summit WM3000 Series Controller System Reference Guide 42 ...
Страница 139: ...Summit WM3000 Series Controller System Reference Guide 139 ...
Страница 478: ...Diagnostics Summit WM3000 Series Controller System Reference Guide 478 ...
Страница 480: ...Customer Support Summit WM3000 Series Controller System Reference Guide 480 ...
Страница 498: ...AP Management from Controller Summit WM3000 Series Controller System Reference Guide 498 ...
Страница 512: ...Troubleshooting Information Summit WM3000 Series Controller System Reference Guide 512 ...
Страница 513: ......