Specifications
Table of Contents
Summit WM20 Technical Reference Guide, Software Version 4.24
Floppy Disk-Based Installation..............................................................................................42
Export a certificate ..............................................................................................................42
Import a certificate..............................................................................................................42
Step 9: Configuring Wireless Clients for EAP-TLS.........................................................................43
Step 10: Configuring Wireless Client Computers for PEAP-MS-CHAP v2 .........................................44
Additional Intranet Wireless Deployment Configurations................................................................45
Internet Access for Business Partners....................................................................................46
Using Guest Access .............................................................................................................46
Using Validated Access........................................................................................................46
Using a Third-Party CA ........................................................................................................47
Certificates on Wireless Client Computers ..............................................................................48
Configuring Proxy Server Settings ........................................................................................48
Chapter 4: Windows Recommendations and Best Practices ............................................................. 51
Security ...................................................................................................................................51
PKI..........................................................................................................................................51
Wireless APs.............................................................................................................................52
Wireless Network Adapters .........................................................................................................52
Active Directory ........................................................................................................................53
RADIUS ...................................................................................................................................53
Scalability ................................................................................................................................54
Using Computer-only Authentication ...........................................................................................54
Configuring Computer-only Authentication using the Wireless Network (IEEE 802.11) Policies Group
Policy Extension..................................................................................................................55
Enabling Computer-only Authentication Using the Registry......................................................55
Summary..................................................................................................................................56
Chapter 5: Diagnostics .................................................................................................................. 57
Summit WM20 Controller Diagnostics .........................................................................................57
Summit WM20 Controller Filesystem Constraints ...................................................................57
Using the console port .........................................................................................................58
Summit WM20 Rescue Procedure.........................................................................................58
Summit WM20 Controller Capacity .......................................................................................59
Summit WM20 Controller LED Indicators ..............................................................................59
Protocols used in the Summit WM20 Controller .....................................................................61
Chapter 6: Hardware Maintenance .................................................................................................63
Summit WM20 Controller ..........................................................................................................63
Power and maintenance procedures for the Summit WM20 Controller ......................................64
Chapter 7: MAC Based Authentication ............................................................................................ 69
How MAC-based authentication works .........................................................................................69
Roaming ..................................................................................................................................70
Radius redundancy....................................................................................................................70
Rejection and failure .................................................................................................................70
Additional RADIUS attributes ....................................................................................................70
Assumptions/recommendations...................................................................................................71
Use Cases ................................................................................................................................71
Vendor Interoperability ..............................................................................................................71