Specifications
Summit WM Technical Reference Guide, Software Version 5.3 9
About this guide
This guide describes how to install, configure, and manage Extreme Networks
®
Summit
®
WM
Controller, Altitude
™
Access Points, and WM software.
Who should use this guide
This guide is a reference for system administrators who install and manage the Summit WM Controller,
Access Points, and WM software system.
Any administrator performing tasks described in this guide must have an account with full
administrative privileges.
What is in this guide
This guide contains the following chapters:
● “About this guide” describes the target audience and content of the guide, the formatting
conventions used in it, and how to provide feedback on the guide.
● Chapter 1, “System Capacities” describes the supported limits and capacities of the Summit WM
Controller software system.
● Chapter 2, “Configuration of Dynamic Host Configuration Protocol (DHCP)” describes the
configurations the Wireless AP uses to identify which Summit WM Controllers are available to
provide service in it's local area.
● Chapter 3, “Rogue Access Point Detection” describes the Summit WM Controllers’ capabilities that
allow Wireless APs to periodically scan the RF space and report suspect devices.
● Chapter 4, “Creating the Windows Security Infrastructure” provides the information necessary for
the Deployment of Intranet Wireless.
● Chapter 5, “Windows Recommendations and Best Practices” provides recommendations and best
practices for deploying an IEEE 802.11 WLAN in a large enterprise.
● Chapter 6, “Summit WM Controller diagnostics” provides information on hardware constraints and
system diagnostics.
● Chapter 7, “Hardware maintenance” provides hardware descriptions and maintenance information.
● Chapter 8, “Altitude AP antenna selection” provides information on the antennas that can be used
by each radio for the Wireless 802.11n AP model 3610
● Chapter 9, “AP as 802.1X supplicant” provides information on the 802.1X authentication protocol.
● Chapter 10, “MAC-Based Authentication” provides information on controlling access to the network
resources for the wireless clients over the Summit WM Software system.
● Chapter 11, “FreeRADIUS and Security”provides information on FreeRADIUS options for RADIUS
authentication and accounting.
● Chapter 12, “RADIUS Attributes” provides a reference list of the RADIUS Attributes that are
supported by the Summit WM Controller, Access Points, and WM software.