Summit WM3000 Series Controller System Reference Guide
483
Securing a Configuration Channel Between Controller and AP
Once an access point obtains a list of available controllers, it begins connecting to the controller
according to the priority list.
The controller is discovered by the access point through several L3 discovery mechanisms even though
the controller can be either on the same L2 network as the AP's or on the different network segment
(L3). This provides flexibility in wireless network deployment. If the controller is on the access point’s
LAN, ensure the LAN subnet is on a secure channel. The AP will connect to the controller and request a
configuration.
AP WLAN Topology
An AP can be deployed in the following WLAN topologies:
●
Extended WLANs
- Extended WLANs are centralized WLANs created on the controller All wireless
client traffics are tunneled to the controller.
●
Independent WLANs
- Independent WLANs are local to an AP and can be configured from the
controller. You must specify a WLAN as independent to stop traffic from being forwarded to the
controller. All wireless data traffics are locally bridged at the AP. Management traffic is forwarded to
the controller.
●
Both
- Extended and independent WLANs are configured from the controller and operate
simultaneously.
Содержание Summit WM3000 Series
Страница 42: ...Controller Web UI Access and Image Upgrades Summit WM3000 Series Controller System Reference Guide 42 ...
Страница 139: ...Summit WM3000 Series Controller System Reference Guide 139 ...
Страница 478: ...Diagnostics Summit WM3000 Series Controller System Reference Guide 478 ...
Страница 480: ...Customer Support Summit WM3000 Series Controller System Reference Guide 480 ...
Страница 498: ...AP Management from Controller Summit WM3000 Series Controller System Reference Guide 498 ...
Страница 512: ...Troubleshooting Information Summit WM3000 Series Controller System Reference Guide 512 ...
Страница 513: ......