Specifications

Altitude 3500 Series Access Point Product Reference Guide
15
NOTE
WIPS support requires a Motorola AirDefense WIPS Server on the network. WIPS functionality is not
provided by the access point alone. The access point works in conjunction with a dedicated WIPS server.
For use in configuring the access point for WIPS support, see “Configuring WIPS Server Settings” on
page 161.
Trusted Host Management
Trusted subnet management restricts Altitude 35xx Access Point LAN1, LAN2 and WAN interface
access (via SNMP, HTTP, HTTPS, Telnet and SSH) to a set of user defined trusted host or subnets. Only
hosts with matching subnet (or IP) addresses are able to access the access point. Enabling the feature
denies access from any subnet not defined as trusted. Once a set of trusted hosts is defined and applied,
the settings can be imported and exported as a part of the access point’s configuration import/export
functionality.
For information on defining a set of trusted hosts for exclusive access point access, see “Defining
Trusted Hosts” on page 76.
Apache Certificate Management
Apache certificate management allows the update and management of security certificates for an
Apache HTTP server. This allows users to upload a trusted certificate to their AP. When a client attaches
to it with a browser, a warning message pertaining to the certificate no longer displays.
Apache certificate management utilizes the access point’s existing Certificate Manager for the creation of
certificates and keys. The certificate can then be loaded into the Apache file system using a command.
For information on defining the Apache certificate management configuration, see “Apache Certificate
Management” on page 84.
Adaptive AP
An adaptive AP (AAP) is an Altitude 35xx access point that can adopt like an Altitude 4600 access point
(L3). The management of an AAP is conducted by a controller, once the access point connects to an
Extreme Networks controller and receives its AAP configuration.
An AAP provides:
local 802.11 traffic termination
local encryption/decryption
local traffic bridging
the tunneling of centralized traffic to the wireless controller
For a information overview of the adaptive AP feature as well as how to configure it, refer to
“Adaptive AP Overview” on page 547.