Specifications
Summit WM20 Technical Reference Guide, Software Version 4.2 7
About this Guide
This guide describes how to install, configure, and manage the Summit
®
WM20 Controller, Access
Points and Software system.
Who should use this guide
This guide is a reference for system administrators who install and manage the Summit WM20
Controller, Access Points and Software system.
Any administrator performing tasks described in this guide must have an account with full
administrative privileges.
What is in this guide
This guide contains the following chapters:
● “About this Guide” describes the target audience and content of the guide, the formatting
conventions used in it, and how to provide feedback on the guide.
● Chapter 1, “Configuration of Dynamic Host Configuration Protocol (DHCP)” describes the
configurations the Wireless AP uses to identify which Summit WM Controllers are available to
provide service in it's local area.
● Chapter 2, “Rogue Access Point Detection” describes the Summit WM Controllers’ capabilities that
allow Wireless APs to periodically scan the RF space and report suspect devices.
● Chapter 3, “Creating the Windows Security Infrastructure” provides the information necessary for
the Deployment of Wireless Intranet Wireless.
● Chapter 4, “Windows Recommendations and Best Practices” provides recommendations and best
practices for deploying an IEEE 802.11 WLAN in a large enterprise.
● Chapter 5, “Diagnostics” provides information on hardware constraints and system diagnostics.
● Chapter 6, “Hardware Maintenance” provides hardware descriptions and maintenance information.
● Chapter 7, “MAC Based Authentication” provides information on controlling access to the network
resources for the wireless clients over the Summit WM Software system.
● Chapter 8, “FreeRADIUS and Security” provides information on FreeRADIUS options for RADIUS
authentication and accounting.
● Chapter 9, “RADIUS Attributes” provides a reference list of the RADIUS Attributes that are
supported by the Summit WM20 Controller, Access Points and Software.
● Chapter 10, “SNMP MIBs” provides a reference to the subset of MIB-II, as well as proprietary MIBs
used in the repository of configuration and statistical data.
● Chapter 11, “DRM - Dynamic Radio Management” information about Dynamic Radio Management
(DRM).
● “Glossary” provides a list of acronyms used throughout this document.