Specifications
System Configuration
Altitude 3500 Series Access Point Product Reference Guide
98
3 Configure the Minimum Packets field to define a minimum packet throughput value for trap
generation.
4 Click Apply to save any changes to the SNMP RF Traps screen. Navigating away from the screen
without clicking the Apply button results in all changes to the screen being lost.
5 Click Undo Changes (if necessary) to undo any changes made. Undo Changes reverts the settings
displayed on SNMP RF Traps screen to the last saved configuration.
6 Click Logout to securely exit the AP35xx Access Point applet. A prompt displays confirming the
logout before the applet is closed.
Configuring Network Time Protocol (NTP)
Network Time Protocol (NTP) manages time and/or network clock synchronization in the AP35xx-
managed network environment. NTP is a client/server implementation. The AP35xx (an NTP client)
periodically synchronizes its clock with a master clock (an NTP server). For example, the AP35xx resets
its clock to 07:04:59 upon reading a time of 07:04:59 from its designated NTP server.
Time synchronization is recommended for the access point’s network operations. For sites using
Kerberos authentication, time synchronization is required. Use the Date and Time Settings screen to
enable NTP and specify the IP addresses and ports of available NTP servers.
NOTE
The current time is not set accurately when initially connecting to the AP35xx. Until a server is defined to
provide the AP35xx the correct time, or the correct time is manually set, the AP35xx displays 1970-01-01 00:00:00
as the default time.
CAUTION
If using the RADIUS time-based authentication feature to authenticate access point user permissions,
ensure UTC has been selected from the Date and Time Settings screen’s Time Zone field. If UTC is not selected,
time based authentication will not work properly. For information on configuring RADIUS time-based authentication,
see “Defining User Access Permissions by Group” on page 226.
% Undecryptable Define a maximum threshold for the total percentage of
packets undecryptable for each device. Undecryptable
packets can be the result of corrupt packets, bad CRC
checks or incomplete packets.
Associated MUs Set a maximum threshold for the total number of MUs
associated with each device.
Minimum number
of packets required
for a trap to fire
Enter the minimum number of packets that must pass
through the device before an SNMP rate trap is sent.
Extreme Networks recommends using the default setting of
1000 as a minimum setting for the field.