Specifications

Table of Contents
Summit WM Technical Reference Guide, Software Version 5.34
Step 3: Configuring the Primary IAS Server..................................................................................40
Step 3a: Configuring IAS .....................................................................................................40
Step 3b: Configuring a Wireless Remote Access Policy ...........................................................43
Step 4: Configuring the secondary IAS server (if applicable) ..........................................................48
Step 5: Deploying and Configuring Wireless APs ..........................................................................49
Step 6: Configuring Wireless Network (IEEE 802.11) Policies Group Policy Settings .......................49
Step 7: Installing Computer Certificates on Wireless Client Computers for EAP-TLS.........................50
Step 8: Installing User Certificates on Wireless Client Computers for EAP-TLS................................51
Submit a user certificate request via the Web ........................................................................51
Request a certificate ...........................................................................................................51
Floppy Disk-Based Installation..............................................................................................52
Export a certificate ..............................................................................................................52
Import a certificate..............................................................................................................52
Step 9: Configuring Wireless Clients for EAP-TLS.........................................................................53
Step 10: Configuring Wireless Client Computers for PEAP-MS-CHAP v2 .........................................54
Additional Intranet Wireless Deployment Configurations................................................................56
Internet Access for Business Partners....................................................................................56
Using Guest Access .............................................................................................................56
Using Validated Access........................................................................................................56
Using a Third-Party CA ........................................................................................................57
Certificates on Wireless Client Computers ..............................................................................58
Configuring Proxy Server Settings ........................................................................................58
Chapter 5: Windows Recommendations and Best Practices ............................................................. 61
Security ...................................................................................................................................61
PKI..........................................................................................................................................61
Altitude APs .............................................................................................................................62
Wireless Network Adapters .........................................................................................................62
Active Directory ........................................................................................................................63
RADIUS ...................................................................................................................................63
Scalability ................................................................................................................................64
Using Computer-only Authentication ...........................................................................................64
Configuring Computer-only Authentication using the Wireless Network (IEEE 802.11) Policies Group
Policy Extension..................................................................................................................65
Enabling Computer-only Authentication Using the Registry......................................................65
Summary..................................................................................................................................66
Chapter 6: Summit WM Controller diagnostics ................................................................................ 67
Summit WM Controller WM200/2000 diagnostics ........................................................................67
Summit WM Controller WM200/2000 capacity ......................................................................67
Summit WM Controller WM200/2000 license capacity ...........................................................67
Summit WM Controller WM200/2000 LEDs...........................................................................68
System Startup ...................................................................................................................71
Summit WM Controller WM200/2000 application states.........................................................71
Summit WM Controller WM200/2000 protocols .....................................................................74
Summit WM Controller WM20 diagnostics ...................................................................................76
Summit WM Controller WM20 capacity .................................................................................76
Using the console port .........................................................................................................76
Summit WM Controller WM20 rescue procedure.....................................................................77