Specifications
Table of Contents
Summit WM Technical Reference Guide, Software Version 5.3 5
Summit WM Controller WM20 capacity .................................................................................78
Summit WM Controller WM20 LEDs......................................................................................78
Summit WM Controller WM20 protocols ................................................................................79
Chapter 7: Hardware maintenance .................................................................................................81
Summit WM Controller WM200/2000 maintenance......................................................................81
Summit WM Controller WM200/2000 power supply ...............................................................82
Power FRUs........................................................................................................................83
Fan Tray.............................................................................................................................83
MF1000 Media Flash Card...................................................................................................84
NP4000 Network Processor Card..........................................................................................85
SC1100 Supervisory Card ....................................................................................................86
Summit WM Controller WM200/2000 power and maintenance procedures ...............................87
Summit WM Controller WM20 maintenance.................................................................................91
Summit WM Controller WM20 power and maintenance procedures ..........................................93
Chapter 8: Altitude AP antenna selection........................................................................................95
Chapter 9: AP as 802.1X supplicant............................................................................................... 97
Credential management .............................................................................................................97
Transferring credentials from the Summit WM Controller to AP ................................................98
Storing credentials on the AP ...............................................................................................99
TLS credential management.................................................................................................99
TLS certificate expiration ...................................................................................................100
TLS server authentication ..................................................................................................101
Authentication with 802.1X .....................................................................................................101
EAP-TLS authentication.....................................................................................................102
EAP-PEAP authentication ..................................................................................................103
Configuring APs for .1X authentication ......................................................................................103
General configuration ........................................................................................................103
EAP-PEAP configuration ....................................................................................................103
EAP-TLS configuration with the Summit WM Controller as proxy............................................104
EAP-TLS configuration with the Summit WM Controller as pass-through .................................105
Bulk EAP-TLS configuration ...............................................................................................105
Bulk EAP-PEAP configuration.............................................................................................106
Verifying the AP .1X configuration ............................................................................................106
Limits and technical data ........................................................................................................107
Chapter 10: MAC-Based Authentication ........................................................................................ 109
How MAC-based authentication works .......................................................................................109
Roaming ................................................................................................................................110
Radius redundancy..................................................................................................................110
Rejection and failure ...............................................................................................................110
Additional RADIUS attributes ...................................................................................................110
Assumptions/recommendations.................................................................................................111
Use Cases ..............................................................................................................................111
Vendor Interoperability ............................................................................................................111
Chapter 11: FreeRADIUS and Security .......................................................................................... 113
Overview ................................................................................................................................113