Specifications

Summit WM20 Technical Reference Guide, Software Version 4.2 3
Table of Contents
About this Guide.............................................................................................................................. 7
Who should use this guide ...........................................................................................................7
What is in this guide ...................................................................................................................7
Formatting conventions................................................................................................................8
Documentation feedback .............................................................................................................8
Protocols and standards...............................................................................................................8
Chapter 1: Configuration of Dynamic Host Configuration Protocol (DHCP) ........................................... 9
Service Location Protocol (SLP) (RFC2608)...................................................................................9
DHCP Options for Service Location Protocol (RFC2610) ...............................................................10
SLP Directory Agent Option (Option 78) ......................................................................................10
SLP Service Scope Option (Option 79) ........................................................................................11
Dynamic Host Configuration Protocol – Summit WM Controller and AP Discovery and other Services.12
DHCP setup using the internal DHCP server.................................................................................14
DHCP setups for relayed WM-ADs and AP deployment networks ....................................................14
DHCP configuration example: OSC dhcpd on Linux ......................................................................15
General options.........................................................................................................................17
Summit Wireless Access Point Discovery mechanism....................................................................17
Wireless AP DHCP Registration Setup (WINDOWS).................................................................18
Create a New DHCP Scope and Configure Option 78 ..............................................................18
DNS Settings for Wireless AP Discovery.................................................................................19
Static Wireless AP Addressing ..............................................................................................20
Chapter 2: Rogue Access Point Detection ....................................................................................... 21
Chapter 3: Creating the Windows Security Infrastructure................................................................. 23
Intranet Wireless Deployment Steps ............................................................................................24
Step 1: Configuring the Certificate Infrastructure .........................................................................25
Step 1a: Installing a Certificate Infrastructure........................................................................26
Step 1b: Installing Computer Certificates ..............................................................................28
Step 1c: Installing User Certificates ......................................................................................28
Step 2: Configuring Active Directory for Accounts and Groups .......................................................30
Step 3: Configuring the Primary IAS Server..................................................................................30
Step 3a: Configuring IAS .....................................................................................................30
Step 3b: Configuring a Wireless Remote Access Policy ...........................................................33
Step 4: Configuring the secondary IAS server (if applicable)..........................................................37
Step 5: Deploying and Configuring Wireless APs ..........................................................................38
Step 6: Configuring Wireless Network (IEEE 802.11) Policies Group Policy Settings .......................39
Step 7: Installing Computer Certificates on Wireless Client Computers for EAP-TLS.........................40
Step 8: Installing User Certificates on Wireless Client Computers for EAP-TLS................................40
Submit a user certificate request via the Web ........................................................................41
Request a certificate ...........................................................................................................41