User guide
Summit WM20 User Guide, Software Release 4.2 9
About this Guide
This guide describes how to install, configure, and manage the Summit
®
WM Controller, Access Points,
and Software.
Who Should Use This Guide
This guide is a reference for system administrators who install and manage the Summit WM Controller,
Access Points and Software system.
Any administrator performing tasks described in this guide must have an account with full
administrative privileges.
What Is in This Guide
This guide contains the following:
● “About this Guide”, describes the target audience and content of the guide, the formatting
conventions used in it, and how to provide feedback on the guide.
● Chapter 1, “Overview of the Summit WM Controller, Access Points and Software Solution,”
provides an overview of the product, its features and functionality.
● Chapter 2, “Configuring the Summit WM Controller,” describes how to perform the installation,
first-time setup and configuration of the Summit WM Controller, as well as configuring the data
ports and defining routing.
● Chapter 3, “Configuring the Wireless AP,” describes how to install the Wireless AP, how it discovers
and registers with the Summit WM Controller, how to view and modify the radio configuration, and
how to enable Dynamic Radio Frequency Management.
● Chapter 4, “WM Access Domain Services,”provides an overview of WM Access Domain Services
(WM-AD), the mechanism by which the Summit WM Controller, Access Points and Software
controls and manages network access.
● Chapter 5, “WM Access Domain Services Configuration,” provides detailed instructions in how to
configure a WM-AD, its topology, authentication, accounting, RADIUS policy, multicast, filtering
and privacy. Both Captive Portal and AAA types of WM-AD are described.
● Chapter 6, “Availability and Controller Functionality,”describes how to set up the features that
provide availability in the event of a controller failover.
● Chapter 7, “Working With Third-Party APs,” describes how to use the Summit WM Controller,
Access Points and Software features with third-party wireless access points.
● Chapter 8, “Working With the Summit WM Series Spy,” explains the security tool that scans for,
detects and reports on rogue APs.
● Chapter 9, “Working With Reports and Displays,” describes maintenance activities, such as software
upgrades on both the Summit WM Controller and the Wireless AP. This chapter also includes
information on the logs, traces, reports and displays available.