User guide
WM Access Domain Services configuration
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
142
Defining a WM-AD with no authentication
You can set up a WM-AD that will bypass all authentication mechanisms and run Summit WM series
switch, access points, and WLAN switch software with no authentication of a wireless device user.
A WM-AD with no authentication can still control network access using filtering rules. For more
information on how to set up filtering rules that allow access only to specified IP addresses and ports,
see “Defining non-authenticated filters” on page 126.
To define a WM-AD with no authentication:
1 From the main menu, click WM Access Domain Configuration. The WM Access Domain
Configuration screen is displayed.
2 In the left pane WM Access Domains list, click the WM-AD you want to configure with no
authentication. The Top ol og y tab is displayed.
3 From the Assignment by drop-down list, select SSID.
4 Configure the topology for this WM-AD, then click Save. For more information, see “Configuring
topology for a WM-AD for Captive Portal” on page 98. You must save your changes before moving
to the next tab.
5 Click the Auth & Acct tab.
6 Click Configure Captive Portal Settings. The Captive Portal Configurations subscreen is displayed.
7 Select No Captive Portal Support. You must save your changes before moving to the next tab.
8 Click the Filtering tab.
9 Define a default filter that will control specific network access for any wireless device users on this
WM-AD. For more information, see “Configuring filtering rules for a WM-AD” on page 123.
These rules should be very restrictive and the final rule should be a Deny All rule. The
non-authenticated filter for a WM-AD with no authentication will not have a Captive Portal page for
login.
10 To save your changes, click Save.
Defining priority level and service class for WM-AD
traffic
Voice over Internet Protocol (VoIP) using 802.11 wireless local area networks are enabling the integration
of internet telephony technology on wireless networks. Various issues including Quality-of-Service
(QoS), call control, network capacity, and network architecture are factors in VoIP over 802.11 WLANs.
Wireless voice data requires a constant transmission rate and must be delivered within a time limit. This
type of data is called isochronous data. This requirement for isochronous data is in contradiction to the
concepts in the 802.11 standard that allow for data packets to wait their turn, in order to avoid data
collisions. Regular traffic on a wireless network is an asynchronous process in which data streams are
broken up by random intervals.
To reconcile the needs of isochronous data, mechanisms are added to the network that give voice data
traffic or another traffic type priority over all other traffic, and allow for continuous transmission of
data.