Specifications
Extreme Networks Wireless Management Suite Reference Guide 11
NOTE
When Summit WMScanner is installed to your PC, you can use Summit WMScanner for 14 days without a license.
Once expired, Summit WMScanner can only be activated again with a valid license. For assistance, go to
https://esupport.extremenetworks.com.
Once a WMS defined device has been placed in a Summit WMScanner drawing, device attributes can
be modified using the Summit WMScanner interface. Each Summit WMScanner site drawing is
developed to support the actual physical dimensions of a specific radio coverage area. As a result,
device location coordinates can be accurately assessed using X, Y and Z coordinates on the Summit
WMScanner site drawing.
A Summit WMScanner session can be opened and saved directly from WMS. Summit WMScanner
sessions invoked from WMS are authenticated by Summit WMScanner before deployed. Summit
WMScanner can save and export device configurations back to WMS that include IP address, transmit
power, channel number, antenna pattern and orientation. Controller and AP information is also re-
populated in WMS using information provided by Summit WMScanner.
Modeling a Wireless Network with Summit WMScanner
The WLAN design process begins by modeling your deployment environment in Summit WMScanner.
This can be achieved through manually defining the building layout or by importing existing building
information from a variety of sources. Import formats include CAD files, scanned images, and digital
pictures. Next, you consider the environmental context by associating walls within the facility map with
material types (such as sheetrock or brick) from a library of common building materials. Summit
WMScanner is designed to provide advanced network modeling and verification utilities that allow a
user to visually display network coverage and performance within a site-specific map of their
deployment environment.
Using Summit WMScanner, network modelers can adjust their deployment design to address identified
coverage holes.
For information on using Summit WMScanner, refer to the Summit WMScanner User Guide available at
http://www.extremenetworks.com/go/documentation.
Sensor Support
WMS permits the optional deployment of the Wireless Intrusion Protection Software (WIPS), a third party
wireless security product by Motorola. as an application launched from within WMS. WIPS is
separately installed and launched as an independently licensed application within the WMS interface.
WIPS protects your wireless network, mobile devices and traffic from attacks and unauthorized access.
WIPS provides tools for standards compliance and around-the-clock 802.11a/b/g/n wireless network
security in a distributed environment. WIPS allows administrators to identify and accurately locate
attacks, rogue devices and network vulnerabilities in real time and permits both a wired and wireless
lockdown of wireless device connections upon acknowledgement of a threat.
WMS has the ability to launch WIPS and receive SNMP traps generated by the WIPS server. Therefore,
a WMS maintained site can be secured by the device detection capabilities resident to the WIPS
application. WMS also has the ability to define and deploy sensors used by WIPS as detecting radios to
locate the position of a potentially hostile device or devices with excessive association/authentication
requests.