Extreme Networks A3502A ALTITUDE 350-2 ACCESS POINT User Manual UserGuide
Extreme Networks ALTITUDE 350-2 ACCESS POINT UserGuide
Contents
- 1. USERS MANUAL
- 2. user manual 1
- 3. user manual 2
user manual 2
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 153
6Availability, mobility, and controller
functionality
This chapter describes the availability and mobility concepts, including:
●Availability overview
●Mobility manager
●Defining management users
●Configuring network time
●Configuring Check Point event logging
●Enabling SNMP
●Using controller utilities
●Configuring Web session timeouts
The Summit WM series switch provides additional functionality including:
●Availability – Maintains service availability in the event of a Summit WM series switch outage
●Mobility – Allows multiple Summit WM series switches on a network discover each other and
exchange information about a client session. A maximum of up to 8 controllers can be linked to
allow users to transparently roam across controllers in the mobility domain.
Availability overview
The Summit WM series switch, access points, and WLAN switch software system provides this feature
to maintain service availability in the event of a Summit WM series switch outage.
The availability feature links two Summit WM series switches as a pair, to share information about their
Altitude APs. If one controller fails, its Altitude APs are allowed to connect to the backup controller.
The second Summit WM series switch provides the wireless network and a pre-assigned WM Access
Domain Service (WM-AD) for the Altitude AP.
NOTE
The Summit WM series switch's mobility domain licence (MDL) limits the number of APs that are allowed to
connect to the controller. During a failover event, the maximum number of failover APs a backup controller can
accommodate is equal to the number of MDLs that are purchased for that system.
NOTE
Altitude APs that attempt to connect to a backup controller during a failover event are assigned to the WM-AD that
is defined in the system’s default AP configuration. If a system default AP configuration does not exist for the
controller, the failover AP will not be assigned to any WM-AD.
Also, the default AP configuration assignment is only applicable to new APs that failover to the backup controller.
Any AP that has previously failed-over and is already known to the backup system will receive the configuration
already present on that system.
For more information, see “Configuring the default AP settings” on page 66.
Availability, mobility, and controller functionality
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
154
From the viewpoint of an Altitude AP, if a Summit WM series switch or the connection to it fails, the
Altitude AP begins its discovery process. The Altitude AP is directed to the appropriate backup
controller of the pair. This connection may require the Altitude AP to reboot. Users on the Altitude AP
must log in again and be authenticated on the second Summit WM series switch.
NOTE
The availability feature provides APs with a list of interfaces to which the AP should attempt to automatically
connect to when a connection with an active controller link is lost. The provided list identifies the local active
interfaces (enabled on the primary and backup controllers) for the active controller as well as the active interfaces
for the backup controller. The list is sorted by top-down priority. If the active link is lost (poll failure), the AP
automatically scans (pings) all addresses in its availability interface list. The AP will then connect to the highest
priority interface that responds to its probe.
Availability prerequisites
Before you begin, ensure you have completed the following:
●Choose the primary and secondary Summit WM series switches.
●Verify the network accessibility for the TCP/IP connection between the two switches. The
availability link is established as a TCP session on port 13907.
●Set up a DHCP server for AP subnets to support Option 78 for SLP, so that it points to the IP
addresses of the physical interfaces on both Summit WM series switches.
Now set up each Summit WM series switch separately. One method is as follows:
1In the AP Registration screen, set up each Summit WM series switch in Stand-alone Mode and
Secure Mode (allow only approved Altitude APs to connect).
2In the Topolog y tab, define a WM-AD on each Summit WM series switch with the same SSID. The
IP addresses must be unique. For more information, “Topology for a WM-AD” on page 98. A
Summit WM series switch WM200/2000 VLAN Bridged WM-AD can permit two controllers to share
the same subnet (different IP addresses). This setup provides support for mobility users in a VLAN
Bridged WM-AD.
3On both Summit WM series switches, set the Registration Mode to Allow only approved so that no
more Altitude APs can register unless they are approved by the administrator.
4In the AP Registration screen, enable the two Summit WM series switches as an availability pair.
5On each Summit WM series switch, in the Access Approval screen, check the status of the Altitude
APs and approve any APs that should be connected to that controller.
System AP defaults can be used to assign a group of WM-ADs to the foreign APs:
●If the APs are not yet known to the system, the AP will be initially configured according to AP
default settings. To ensure better transition in availability, it is recommended that the AP default
settings match the desired WM-AD assignment for failover APs.
●AP assignment to WM-ADs according to the AP default settings can be overwritten by manually
modifying the AP WM-AD assignment. (For example, select and assign each WM-AD that the AP
should connect to.)
●If specific foreign APs have been assigned to a WM-AD, those specific foreign AP assignments
are used.
Availability overview
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 155
An alternate method to setting up APs includes:
1Add each Altitude AP manually to each Summit WM series switch.
2From the AP Properties screen, click Add Altitude AP.
3Define the Altitude AP and click Add Altitude AP.
Manually defined APs will inherit the default AP configuration settings.
WARNING!
If two Summit WM series switches are paired and one has the Allow All option set for Altitude AP registration,
all Altitude APs will register with that Summit WM series switch.
To set the primary or secondary Summit WM series switches for availability:
1From the main menu, click Altitude AP Configuration. The Altitude APs screen is displayed.
2In the left pane, click AP Registration. The Altitude AP Registration screen is displayed.
3To enable availability, select the Paired option.
4Do one of the following:
●For a primary controller, in the Summit Switch IP Address box, type the IP address of the
physical port of the secondary Summit WM series switch. This IP address must be on a routable
subnet between the two Summit WM series switches.
●For a secondary controller, in the Summit Switch IP Address box, type the IP address of the
Management port or physical port of the primary Summit WM series switch.
Availability, mobility, and controller functionality
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
156
5Do one of the following:
●To set this Summit WM series switch as the primary connection point, select the Current Summit
Switch is primary connect point checkbox.
●To set this Summit WM series switch as the secondary connection point, clear the Current
Summit Switch is primary connect point checkbox.
If the Current Wireless Switch is primary connect point checkbox is selected, the specified switch
waits for a request. If the Current Wireless Switch is primary connect point checkbox is cleared, the
specified switch sends a connection request. Confirm that one switch has this checkbox selected, and
the second switch has this checkbox cleared, since improper configuration of this option will result
in incorrect network configuration.
6To set the security mode for the Summit WM series switch, select one of the following options:
●Allow all Altitude APs to connect – If the Summit WM series switch does not recognize the
serial number, it sends a default configuration to the Altitude AP. Or, if the Summit WM series
switch recognizes the serial number, it sends the specific configuration (port and binding key) set
for that Altitude AP.
●Allow only approved Altitude APs to connect – If the Summit WM series switch does not
recognize the serial number, the operator is prompted to create a configuration. Or, if the Summit
WM series switch recognizes the serial number, it sends the configuration for that Altitude AP.
NOTE
During the initial setup of the network, it is recommended to select the Allow all Altitude APs to connect option.
This option is the most efficient way to get a large number of Altitude APs registered with the Summit WM
series switch.
Once the initial setup is complete, it is recommended that the security mode is reset to the Allow only approved
Altitude APs to connect option. This option ensures that no unapproved Altitude APs are allowed to connect. For
more information, see “Modifying Altitude AP settings” on page 64.
7To save your changes, click Save.
NOTE
When two Summit WM series switches have been paired as described above, each Summit WM series switch's
registered Altitude APs will appear as foreign on the other controller in the list of available Altitude APs when
configuring a WM-AD topology.
Viewing the Altitude AP availability display
For more information, see “Viewing the Altitude AP availability display” on page 193.
Viewing SLP activity
In normal operations, the primary Summit WM series switch registers as an SLP service called
ac_manager. The controller service directs the Altitude APs to the appropriate Summit WM series
switch. During an outage, if the remaining Summit WM series switch is the secondary controller, It
registers as the SLP service ru_manager.
Availability overview
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 157
To view SLP activity:
1From the main menu, click Altitude AP Configuration. The Altitude APs screen is displayed.
2In the left pane, click AP Registration. The Altitude AP Registration screen is displayed.
3To confirm SLP registration, click the View SLP Registration button. A pop-up screen displays the
results of the diagnostic slpdump tool, to confirm SLP registration.
Availability, mobility, and controller functionality
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
158
Events and actions during a failover
If one of the Summit WM series switches in a pair fails, the connection between the two Summit WM
series switches is lost. This triggers a failover mode condition, and a critical message is displayed in the
information log of the remaining Summit WM series switch.
After the Altitude AP on the failed Summit WM series switch loses its connection, it will try to connect
to all enabled interfaces on both controllers without rebooting. If the Altitude AP is unsuccessful, it will
begin the discovery process. If the Altitude AP is not successful in connecting to the Summit WM series
switch after five minutes of attempting, the Altitude AP will reboot.
If the AP is assigned to different WM-ADs on the two controllers, it will reboot. Because of the pairing
of the two Summit WM series switches, the Altitude AP will then register with the other Summit WM
series switch.
All user sessions using the AP that fails over will terminate unless the Maintain client sessions in
event of poll failure option is enabled on the AP Properties tab or AP Default Settings screen.
NOTE
An Altitude AP connects first to a Summit WM series switch registered as ac_manager and, if not found, then seeks
an ru_manager. If the primary Summit WM series switch fails, the secondary one registers as ru_manager. This
enables the secondary Summit WM series switch to be found by Altitude APs after they reboot.
Mobility manager
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 159
When the Altitude APs connect to the second Summit WM series switch, they will be assigned to the
WM-AD that is defined in the system’s default AP configuration. The wireless device users will log in
again and be authenticated on the second Summit WM series switch.
When the failed Summit WM series switch recovers, each Summit WM series switch in the pair goes
back to normal mode. They exchange information that includes the latest lists of registered Altitude
APs. The administrator must release the Altitude APs manually on the second Summit WM series
switch, so that they may re-register with their home Summit WM series switch. Foreign APs can now all
be released at once by using the Foreign button on the Access Approval screen to select all foreign APs,
and then clicking Released.
To support the availability feature during a failover event, administrators need to do the following:
1Monitor the critical messages for the failover mode message, in the information log of the remaining
Summit WM series switch (in the Reports and Displays section of the Summit WM series switch).
2After recovery, on the Summit WM series switch that did not fail, select the foreign Altitude APs and
click on the Release button on the Access Approval screen.
Mobility manager
The Summit WM series switch, access points, and WLAN switch software system allows multiple
Summit WM series switches (up to 8) on a network discover each other and exchange information
about a client session. This technique enables a wireless device user to roam seamlessly between
different Altitude APs on different Summit WM series switches.
The solution introduces the concept of a mobility manager, where one Summit WM series switch on the
network is designated as the mobility manager and all others are designated as mobility agents.
The wireless device keeps the IP address, WM-AD assignment, and filtering rules it received from its
home Summit WM series switch—the Summit WM series switch that it first connected to. The WM-AD
on each Summit WM series switch must have the same SSID and RF privacy parameter settings.
NOTE
For the mobility manager you have two options:
> Rely on SLP with DHCP Option 78.
> Define at the agent the IP address of the mobility manager. By explicitly defining the IP address, the agent and
the mobility manager are able to find each other directly without using the SLP discovery mechanisms. Direct IP
definition is recommended in order to provide tighter control of the registration steps for multi-domain installations.
The Summit WM series switch designated as the mobility manager:
●The mobility manager is explicitly identified as the manager for a specific mobility domain. Agents
will connect to this manager to establish a mobility domain.
●Defines at the agent the IP address of the mobility manager, which allows for the bypass of SLP.
Agents directly find and attempt to register with the mobility manager.
●Uses SLP, if this method is preferred, to register itself with the SLP Directory Agent as ExtremeNet
Availability, mobility, and controller functionality
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
160
●Defines the registration behavior for a multi-controller mobility domain set:
●Open mode – A new agent is automatically able to register itself with the mobility manager and
immediately becomes part of the mobility domain
●Secure mode – The mobility manager does not allow a new agent to automatically register.
Instead, the connection with the new agent is placed in pending state until the administrator
approves the new device.
●Listens for connection attempts from mobility agents
●Establishes connection and sends a message to the mobility agent specifying the Heartbeat interval,
and the mobility manager's IP address if it receives a connection attempt from the agent
●Sends regular Heartbeat messages containing wireless device session changes and agent changes to
the mobility agents and waits for a returned update message
The Summit WM series switch designated as a mobility agent:
●Uses SLP or a statically configured IP address to locate the mobility manager
●Defines at the agent the IP address of the mobility manager, which allows for the bypass of SLP.
Agents directly find and attempt to register with the mobility manager.
●Attempts to establish a TCP/IP connection with the mobility manager
●Updates its tables, and sets up data tunnels to and between all Summit WM series switches it has
been informed of when it receives the connection-established message
●Uses the information from every Heartbeat message received to update its own tables and updates
the mobility manager with information on the wireless device users and data tunnels it is managing
If a controller configured as the mobility manager is lost, the following occurs:
●Agent to agent connections will remain active.
●Mobility agents will continue to operate based on the mobility information last coordinated before
the manager link was lost. The mobility location list remains relatively unaffected by the controller
failure. Only entries associated with the failed controller are cleared from the registration list, and
users that have roamed from the manager controller to other agents are terminated and required to
re-register as local users with the agent where they are currently located.
●Participant controllers are reset to nodal operation
●Any user sessions that roamed away from their home AP are terminated and must reconnect
●Users need to reconnect to network, re-authenticate, and obtain new IP address
●The data link between active controllers remains active after the loss of a mobility manager
●Mobility agents continue to use the last set of mobility location list to service known users
●Existing users:
●Existing users remain in mobility scenario, and if the users are known to mobility domain, they
continue to be able to roam between connected controllers
●New users:
●New users become local at attaching controller
●Roaming to another controller resets session
Mobility manager
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 161
To designate a mobility manager:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2In the left pane, click Mobility Manager. The Mobility Manager Settings screen is displayed.
3To enable mobility for this controller, select the Enable Mobility checkbox. The controller mobility
options appear.
4Select the This Summit Switch is a Mobility Manager option. The mobility manager options
appear.
5In the Port drop-down list, select the interface on the Summit WM series switch to be used for the
mobility manager process. Ensure that the selected interface is routable on the network.
6In the Heartbeat box, type the time interval (in seconds) at which the mobility manager sends a
Heartbeat message to a mobility agent. The default is 5 seconds.
7In the SLP Registration drop-down list, select whether to enable or disable SLP registration.
8In the Permission list, select the agent IP addresses you want to approve that are in pending state,
by selecting the agent and clicking Approve. New agents are only added to the domain if they are
approved.
You can also add or delete controllers that you want to be part of the mobility domain. To add a
controller, type the agent IP address in the box, and then click Add. To delete a controller, select the
controller in the list, and then click Delete.
Availability, mobility, and controller functionality
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
162
9Select the Security Mode option:
●Allow all mobility agents to connect – All mobility agents can connect to the mobility manager.
●Allow only approved mobility agents to connect – Only approved mobility agents can connect
to the mobility manager.
10 To save your changes, click Save.
NOTE
If you set up one Summit WM series switch on the network as a mobility manager, all other Summit WM series
switches must be set up as mobility agents.
To designate a mobility agent:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2In the left pane, click Mobility Manager. The Mobility Manager Settings screen is displayed.
3To enable mobility for this controller, select the Enable Mobility checkbox. The controller mobility
options appear,
4Select the This Summit Switch is a Mobility Agent option. The mobility agent options appear.
5In the Port drop-down list, select the port on the Summit WM series switch to be used for the
mobility agent process. Ensure that the port selected is routable on the network.
6In the Heartbeat box, type the time interval (in seconds) to wait for a connection establishment
response before trying again. The default is 60 seconds.
Defining management users
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 163
7From the Discovery Method drop-down list, select one of the following:
●SLPD – Service Location Protocol Daemon is a background process acting as a SLP server. It
provides the functionality of the Directory Agent and Service Agent for SLP. Use SLP to support
the discovery of extremeNET service to attempt to locate the area mobility manager controller.
●Static Configuration – Select Static Configuration if you want to enter the IP address of the
mobility manager manually. Defining a static configuration for a mobility manager IP address
bypasses SLP discovery.
8In the Mobility Manager Address box, type the IP address for the designated mobility manager.
9To save your changes, click Save.
Displays for the mobility manager
For more information, see “Viewing displays for the mobility manager” on page 196.
Defining management users
In this screen you define the login user names that have access to the Summit Wireless Assistant, either
for Summit WM series switch, access points, and WLAN switch software administrators with read/
write privileges, or users with read only privileges. For each user added, you can also define and
modify a user ID and password.
To add a Summit WM series switch management user:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
Availability, mobility, and controller functionality
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
164
2In the left pane, click the Management Users option. The Management Users screen is displayed.
The user_admin list displays Admin users who have read/write privileges. The user_read list is for
users who have read only privileges.
3From the Group pull-down list, select Admin or Read only.
4In the User ID box, type the user ID for the new user. A User ID can only be used once, in only one
category.
5In the Password box, type the password for the new user.
6In the Confirm Password, retype the password. The $ character is not permitted.
7Click on the Add User button. The new user is added to the appropriate user list.
To modify a Summit WM series switch management user:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2In the left pane, click the Management Users option. The Management Users screen is displayed.
3To select a user to be modified, click it.
4In the Password box, type the new password for the user.
5In the Confirm Password, retype the new password.
6To change the password, click Change Password.
Configuring network time
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 165
To remove a Summit WM series switch management user:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2In the left pane, click the Management Users option. The Management Users screen is displayed.
3To select a user to be removed, click it.
4To remove the user, click Remove user. The user if removed from the list.
Configuring network time
You can synchronize the elements on the network to a universal clock. This ensures accuracy in usage
logs. Network time is synchronized in one of two ways:
●using system time
●using Network Time Protocol (NTP), an Internet standard protocol that synchronizes client
workstation clocks.
Availability, mobility, and controller functionality
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
166
To apply time zone settings:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2In the left pane, click Network Time. The Network Time screen is displayed.
3From the Continent or Ocean drop-down list, select the appropriate large-scale geographic grouping
for the time zone.
4From the Country drop-down list, select the appropriate country for the time zone. The contents of
the drop-down list change based on the selection in the Continent or Ocean drop-down list.
5From the Time Zone Region drop-down list, select the appropriate time zone region for the selected
country.
6To apply your changes, click Apply Time Zone.
To set system time parameters:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2In the left pane, click Network Time. The Network Time screen is displayed.
3To use system time, select the Use System Time radio button.
4Type the time setting in the Use System TIme box, using the mm-dd-yyyy hh:mm format.
5To apply your changes, click Apply.
Configuring Check Point event logging
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 167
To set Network Time Protocol:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2In the left pane, click Network Time. The Network Time screen is displayed.
3To use Network Time Protocol, select the Use NTP radio button.
4In the Use System TIme box, type the time setting using the mm-dd-yyyy hh:mm format.
5In the Time Server 1 box, type the IP address or FQDN of a standard NTP Time Server. You can
repeat this step for the Time Server 2 and Time Server 3 boxes.
6To apply your changes, click Apply.
Configuring Check Point event logging
The Summit WM series switch can forward specified event messages to an ELA server using the OPSEC
ELA protocol - Event Logging API (Application Program Interface). On the ELA server, the event
messages are tracked and analyzed, so suspicious messages can be forwarded to a firewall application
that can take corrective action.
Check Point created the OPSEC (Open Platform for Security) alliance program for security application
and appliance vendors to enable an open industry-wide framework for inter operability.
When ELA is enabled on the Summit WM series switch, it forwards the specified event messages from
its internal event server to the designated ELA Management Station on the enterprise network.
NOTE
Before you set up the Summit WM series switch, you must first create OPSEC objects for Summit WM series switch
in the Check Point management software. The name and password you define must also be entered into the Summit
WM series switch Check Point configuration screen.
Availability, mobility, and controller functionality
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
168
To enable and configure Check Point:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2In the left pane, click Check Point. The Check Point Configuration screen is displayed.
3To enable check point logging, select the Enable Check Point Logging checkbox.
4Type the following information:
●Check Point Server IP – Specifies the IP address of the ELA Management Station
●ELA Port – Specifies the port to use for ELA. The default port is 18187.
●ELA Log Interval – Specifies the amount of time (in milliseconds) you want the system to wait
before attempting to log once there is a connection between Summit WM series switch and the
Check Point gateway. The default is 100 milliseconds.
●ELA Retry Interval – Specifies the amount of time (in milliseconds) you want the system to wait
before attempting a re-connection between Summit WM series switch and the Check Point
gateway. The default is 2000 milliseconds.
●ELA Message Queue Size – Specifies the number of messages the log queue holds if the Summit
WM series switch and the Check Point gateway become disconnected. The default is 1000 log
entries.
●SIC Name – Specifies the Secure Internal Communication (SIC) Name, your security-based ID.
●SIC Password – Specifies your Secure Internal Communication (SIC) password. You can use the
Unmask button to display the password.
5To save your changes, click Save.
Enabling SNMP
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 169
6To create the certificate to be sent to the ELA Management Station, click Generate Certificate button.
If the certificate is properly generated and the connection with the ELA Management Station is
made, the Connection Status section displays the following message:
OPSEC Connection OK
If there is an error in generating the certificate or establishing the connection, the Connection Status
section displays the following message:
OPSEC Connection Error
ELA Management Station events
The events for the ELA Management Station are grouped under Extreme Networks and are mapped as
info events and alert events. The alerts include:
●Altitude AP registration and/or authentication failed
●Authentication User Request unsuccessful
●RADIUS server rejected login (Access Rejected)
●An unknown AP has attempted to connect. AP authentication failure.
●A connection request failed to authenticate with the CM messaging server. This may indicate port-
scanning of the Summit WM series switch, or a back-door access attempt.
●Unauthorized client attempting to connect
Enabling SNMP
The Summit WM series switch, access points, and WLAN switch software system supports Simple
Network Management Protocol (SNMP), Version 1 and 2c. SNMP, a set of protocols for managing
complex networks, is used to retrieve Summit WM series switch statistics and configuration
information.
SNMP sends messages, called protocol data units (PDUs), to different parts of a network. Devices on
the network that are SNMP-compliant, called agents, store data about themselves in Management
Information Bases (MIBs) and return this data to the SNMP requesters.
MIB support
The Summit WM series switch, access points, and WLAN switch software system accepts SNMP Get
commands and generates Trap messages. Support is provided for the retrieval information from the
router MIB-II (SNMP_GET) as well as SNMP traps. The supported MIBs include:
●SNMPv2-MIB
●IF-MIB
●IEEE802dot11-MIB
●RFC1213-MIB
NOTE
The Summit WM series switch is not fully compliant with MIB II. For example, esa/IXP ports only provide interface
statistics.
Availability, mobility, and controller functionality
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
170
The Extreme Networks Enterprise MIB includes:
●EXTREME-SUMMIT-WM-MIB.my
●EXTREME-SUMMIT-WM-SMI
●EXTREME-SUMMIT-DOT11-EXTNS-MIB
●EXTREME-SUMMIT-WM-BRANCH-OFFICE-MIB
The MIB is provided for compilation into an external NMS. No support has been provided for
automatic device discovery by an external NMS.
The Summit WM series switch is the only point of SNMP access for the entire system. In effect, the
Summit WM series switch proxies sets, gets, and alarms from the associated Altitude APs.
Enabling SNMP on the Summit WM series switch
You can enable SNMP on the Summit WM series switch to retrieve statistics and configuration
information.
To enable SNMP Parameters:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2In the left pane, click SNMP. The Simple Network Management Protocol screen is displayed.
Using controller utilities
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 171
3Type: the following information:
●Contact Name – Specifies the name of SNMP administrator.
●Location – Specifies the location of the SNMP administration machine.
●Read Community Name – Specifies the community name for users with read privileges.
●Read/Write Community Name – Specifies the community name for users with read and write
privileges.
●SNMP Trap Port – Specifies the destination port for SNMP traps. The industry standard is 162. If
left blank, no traps are generated.
●Forward Traps – Specifies the security level of the traps to be forwarded. From the drop-down
list, select Informational, Minor, Major, or Critical.
●Manager A – Specifies the IP address of the specific machine on the network where the SNMP
traps are monitored.
●Manager B – Specifies the IP address of a second machine on the network where the SNMP traps
are monitored, if Manager A is not available.
NOTE
For security purposes, it is recommended that you immediately change the Read Community Name (public) and
the Read/Write Community Name (private) to names that are less obvious and more secure.
Using controller utilities
You can use Summit WM series switch utilities to test a connection to the target IP address or to record
the route through the Internet between your computer and the target IP address.
To test or record IP address connections:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2In the left pane, click Utilities. The Summit Switch Utilities screen is displayed.
3In the Target IP Address box, type the IP address of the destination computer.
4To test a connection to the target IP address, click Ping.
Availability, mobility, and controller functionality
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
172
5To record the route through the Internet between your computer and the target IP address, click
Trace Route.
The following is an example of a screen after clicking the Trace Route button.
Configuring Web session timeouts
You can configure the time period to allow Web sessions to remain inactive before timing out.
Configuring Web session timeouts
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 173
To configure Web session timeouts:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2In the left pane, click Web Settings. The Summit Switch Web Management Settings screen is
displayed.
3In the Web Session Timeout box, type the time period to allow the Web session to remain inactive
before it times out. This can be entered as hour:minutes, or as minutes. The range is 1 minute to 168
hours.
4Select the Show WM-AD names on the Altitude AP SSID list checkbox to allow the names of the
WM-ADs to appear in the SSID list for Altitude APs.
5To save your settings, click Save.
NOTE
Screens that auto-refresh will time out, unless a manual action takes place prior to the end of the timeout
period.
Availability, mobility, and controller functionality
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
174
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 175
7Working with third-party APs
You can set up the Summit WM series switch to handle wireless device traffic from third-party access
points, providing the same policy and network access control. This process requires the following steps:
●Step 1 – Define a data port as a third party AP port:
●Step 2 – Define a WM-AD for the third-party AP port:
●Step 3 – Define authentication by Captive Portal and RAD policy for the third-party AP WM-AD:
●Step 4 – Define filtering rules for the third-party APs:
To set up third-party APs:
Step 1 – Define a data port as a third party AP port:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2From the left pane, click IP Address. The Management Port Settings and Interfaces screen is
displayed.
3Highlight the appropriate port, and in the Function box, select 3rd-party AP from the drop-down
list. Make sure that Management Traffic and SLP are disabled for this port.
Working with third-party APs
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
176
4Connect the third-party access point to this port, via a switch.
Step 2 – Define a WM-AD for the third-party AP port:
1From the main menu, click WM-AD Configuration. The WM-AD Configuration screen is displayed.
2In the left pane, type a name that will identify the new WM-AD in the Add subnet box, and then
click Add subnet. The name is displayed in the WM Access Domains list. The Top olog y tab is
displayed.
3In the Assignment by drop-down list, click SSID.
4To define a WM-AD for a third-party AP, select the Use 3rd Party AP checkbox.
5Continue configuring your WM-AD as described in “Configuring topology for a WM-AD for
Captive Portal” on page 98.
NOTE
Bridge Traffic at AP and MAC-based authentication are not available for Third Party WM-ADs.
Step 3 – Define authentication by Captive Portal and RAD policy for the third-party AP
WM-AD:
1Click the Auth & Acct tab.
2In the Authentication Configuration screen, click Configure Captive Portal Settings.
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 177
3In the Captive Portal Settings screen, define the Captive Portal configuration.
4Click the RAD Policy tab.
5Define the filter IDs to match those in RADIUS server.
Step 4 – Define filtering rules for the third-party APs:
1Because the third-party APs are mapped to a physical port, you must define the Exception filters on
the physical port, using the Port Exception Filters screen. For more information, see “Configuring
filtering rules for a WM-AD” on page 123.
2Define filtering rules that allow access to other services and protocols on the network such as HTTP,
FTP, Telnet, SNMP.
In addition, modify the following functions on the third-party access point:
●Disable the access point's DHCP server, so that the IP address assignment for any wireless device on
the AP is from the DHCP server at the Summit WM series switch with WM-AD information.
●Disable the third-party access point's layer-3 IP routing capability and set the access point to work as
a layer-2 bridge.
Here are the differences between third-party access points and Altitude APs on the Summit WM series
switch, access points, and WLAN switch software system:
●A third-party access point exchanges data with the Summit WM series switch's data port using
standard IP over Ethernet protocol. The third-party access points do not support the tunnelling
protocol for encapsulation.
●For third-party access points, the WM-AD is mapped to the physical data port and this is the default
gateway for mobile units supported by the third-party access points.
●A Summit WM series switch cannot directly control or manage the configuration of a third-party
access point.
●Third-party access points are required to broadcast an SSID unique to their segment. This SSID
cannot be used by any other WM-AD.
●Roaming from third-party access points to Altitude APs and vice versa is not supported.
Working with third-party APs
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
178
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 179
8Working with the Summit WM Series Spy
This chapter describes Summit spy concepts, including:
●Summit spy overview
●Enabling the Analysis and data collector engines
●Running Summit Spy scans
●Analysis engine overview
●Working with Summit spy scan results
●Working with friendly APs
●Viewing the Summit spy list of third-party APs
●Maintaining the Summit spy list of APs
●Viewing the Scanner Status report
Summit spy overview
The Summit spy is a mechanism that assists in the detection of rogue APs. Summit spy functionality
does the following:
Altitude AP:
●Runs a radio frequency (RF) scanning task.
●Alternating between scan functions, providing its regular service to the wireless devices on the
network.
Summit WM series switch:
●Runs a data collector application that receives and manages the RF scan messages sent by the
Altitude AP. RF data collector data includes lists of all connected Altitude APs, third-party APs, and
the RF scan information that has been collected from the Altitude APs selected to perform the scan.
●Runs an Analysis Engine that processes the scan data from the data collector through algorithms that
make decisions about whether any of the detected APs or clients are rogue APs or are running in an
unsecure environment (for example, ad-hoc mode).
NOTE
In a network with more than one Summit WM series switch, it is not necessary for the data collector to be
running on the same controller as the Analysis Engine. One controller can be a dedicated Analysis Engine while
the other controllers run data collector functionality. No more than one Analysis Engine can be running at a time.
You must ensure that the controllers are all routable.
Working with the Summit WM Series Spy
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
180
Enabling the Analysis and data collector engines
Before using the Summit spy, you must enable and define the Analysis and data collector engines.
To enable the Analysis engine:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2In the left pane, click Summit Spy. The Summit Spy Configuration screen is displayed.
3To enable the Summit Spy Analysis Engine, select the Enable Summit Spy Analysis Engine
checkbox.
4To enable the Summit Spy Data Collection Engine on this Summit WM series switch, select the
Enable Local Summit Spy Data Collection Engine checkbox.
5To identify the remote RF Data Collector Engine that the Analysis Engine will poll for data, type the
IP address of the Summit WM series switch on which the remote Data Collector resides in the IP
Address box.
6For the data collection engine:
●In the Poll interval box, type (in seconds) the interval that the Analysis Engine will poll the RF
Data Collector to maintain connection status. The default is 30 seconds.
●In the Poll retry count box, type the number of times the Analysis Engine will attempt to poll the
RF Data Collector to maintain connection status, before it stops sending requests. The default is 2
attempts.
Running Summit Spy scans
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 181
7Click Add. The IP address of the Data Collection Engine, with its Poll Interval and Poll Retry
parameters is displayed in the list.
NOTE
For each remote RF Data Collection Engine defined here, you must:
> Enable it by selecting the Enable Summit Spy Analysis Engine checkbox on the remote Summit WM series
switch
> Ensure that the controllers are routable by whatever means you use (for example, static routes, or OSPF).
8To add a new collection engine, click Add Collection Engine.
9Repeat steps 4 to 7.
10 To save your changes, click Apply.
Running Summit Spy scans
The Summit Spy feature allows you to view the following:
●Scan Groups
●Friendly APs
●Third-party APs
●AP Maintenance
NOTE
A scan will not run on an inactive AP, even though it is displayed as part of the Scan Group. If it becomes
active, it will be sent a scan request during the next periodic scan.
Working with the Summit WM Series Spy
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
182
To run the Summit Spy scan task mechanism:
1From the main menu, click Summit Spy. The Summit Spy screen is displayed.
2Click the Scan Groups tab.
3In the Scan Group Name box, type a unique name for this scan group.
4In the Altitude APs list, select the checkbox corresponding to the Altitude APs you want included in
the new scan group, which will perform the scan function.
NOTE
An Altitude AP can participate in only one Scan Group at a time. It is recommended that the Scan Groups
represent geographical groupings of Altitude APs.
5In the Radio drop-down list, select one of the following:
●Both – The a and b/g radios both perform the scan function.
●a – Only the a radio performs the scan function.
●b/g – Only the b/g radio performs the scan function.
6In the Channel List drop-down list, select one of the following:
●All – Scanning is performed on all channels.
●Current – Scanning is performed on only the current channel.
7In the Scan Type drop-down list, select one of the following:
●Active – The Altitude AP sends out ProbeRequests and waits for ProbeResponse messages from
any access points.
Analysis engine overview
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 183
●Passive – The Altitude AP listens for 802.11 beacons.
8In the Channel Dwell Time box, type the time (in milliseconds) for the scanner to wait for a
response from either 802.11 beacons in passive scanning, or ProbeResponse in active scanning.
9In the Scan Time Interval box, type the time (in minutes) to define the frequency at which an
Altitude AP within the Scan Group will initiate a scan of the RF space. The range is from one minute
to 120 minutes.
10 To initiate a scan using the periodic scanning parameters defined above, click Start Scan.
11 To initiate an immediate scan that will run only once, click Run Now.
NOTE
If necessary, you can stop a scan by clicking Stop Scan. A scan must be stopped before modifying any
parameters of the Scan Group, or before adding or removing an Altitude AP from a Scan Group.
12 The Scan Activity box displays the current state of the scan engine.
13 To view a pop-up report showing the timeline of scan activity and scan results, click Show Details.
14 To save your changes, click Save.
Analysis engine overview
The Analysis engine relies on a database of known devices on the Summit WM series switch, access
points, and WLAN switch software system. The Analysis engine compares the data from the RF Data
Collector with the database of known devices.
This database includes the following:
●Altitude APs – Registered with any Summit WM series switch with its RF Data Collector enabled
and associated with the Analysis Engine on this Summit WM series switch.
●Third-party APs – Defined and assigned to a WM-AD.
●Friendly APs – A list created in the Summit spy user interface as potential rogue access points are
designated by the administrator as Friendly.
●Wireless devices – Registered with any Summit WM series switch that has its RF Data Collector
enabled and has been associated with the Analysis Engine on this Summit WM series switch.
The Analysis Engine looks for access points with one or more of the following conditions:
●Unknown MAC address and unknown SSID (critical alarm)
●Unknown MAC, with a valid SSID - a known SSID is being broadcast by the unknown access point
(critical alarm)
●Known MAC, with an unknown SSID - a rogue may be spoofing a MAC address (critical alarm)
●Inactive Altitude AP with valid SSID (critical alarm)
●Inactive Altitude AP with unknown SSID (critical alarm)
●Known Altitude AP with an unknown SSID (major alarm)
●In ad-hoc mode (major alarm)
Working with the Summit WM Series Spy
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
184
NOTE
In the current release, there is no capability to initiate a DoS attack on the detected rogue access point.
Containment of a detected rogue requires an inspection of the geographical location of its Scan Group area, where
its RF activity has been found.
Working with Summit spy scan results
When viewing the Summit spy scan results you can delete all or selected Access Points from the scan
results. You can also add Access Points from the scan results to the Friendly AP list.
To view Summit Spy scan results:
1From the main menu, click Summit Spy. The Summit Spy screen is displayed.
2Click the Rogue Detection tab.
3To modify the screen’s refresh rate, type a time (in seconds) in the Refresh every __ seconds box.
4Click Apply. The new refresh rate is applied.
5To view the Rogue Summary report, click Rogue Summary. The Rogue Summary report is displayed
in a pop-up window.
Working with Summit spy scan results
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 185
6To clear all detected rogue devices from the list, click Clear Detected Rogues.
NOTE
To avoid the Summit spy's database becoming too large, it is recommended that you either delete Rogue APs or add
them to the Friendly APs list, rather than leaving them in the Rogue list.
To add an AP from the Summit spy scan results to the list of friendly APs:
1From the main menu, click Summit Spy. The Summit Spy screen is displayed.
2Click the Rogue Detection tab.
3To add an Altitude AP to the Friendly APs list, click Add to Friendly List. The AP is removed from
this list and is displayed in the Friendly AP Definitions section of the Friendly AP’s tab.
To delete an AP from the Summit spy scan results:
1From the main menu, click Summit Spy. The Summit Spy screen is displayed.
2Click the Rogue Detection tab.
3To delete a specific AP from the Summit spy scan results, click the corresponding Delete button. The
AP is removed from the list.
4To clear all rogue access points from the Summit spy scan results, click Clear Detected Rogues. All
APs are removed from the list.
Working with the Summit WM Series Spy
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
186
Working with friendly APs
To view the friendly APs:
1From the main menu, click Summit Spy. The Summit Spy screen is displayed.
2Click the Friendly AP’s tab.
To add friendly APs manually:
1From the main menu, click Summit Spy. The Summit Spy screen is displayed.
2Click the Friendly AP’s tab.
3To add friendly access points manually to the Friendly AP Definitions list, type the following:
●MAC Address – Specifies the MAC address for the friendly AP
●SSID – Specifies the SSID for the friendly AP
●Channel – Specifies the current operating channel for the friendly AP
●Description – Specifies a brief description for the friendly AP
4Click Add. The new access point is displayed in the list above.
Working with friendly APs
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 187
To delete a friendly AP:
1From the main menu, click Summit Spy. The Summit Spy screen is displayed.
2Click the Friendly AP’s tab.
3To select an access point from the Friendly AP Definitions list to delete, click it.
4Click Delete. The selected access point is removed from the Friendly AP Definitions list.
5To save your changes, click Save.
To modify a friendly AP:
1From the main menu, click Summit Spy. The Summit Spy screen is displayed.
2Click the Friendly AP’s tab.
3To select an access point from the Friendly AP Definitions list to modify, click it.
4Modify the access point by making the appropriate changes.
5To save your changes, click Save.
Working with the Summit WM Series Spy
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
188
Viewing the Summit spy list of third-party APs
To view known third-party access points connected to local/remote RF data
collectors:
1From the main menu, click Summit Spy. The Summit Spy screen is displayed.
2Click the 3rd Party AP’s tab.
Maintaining the Summit spy list of APs
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 189
Maintaining the Summit spy list of APs
To maintain the Altitude APs:
1From the main menu, click Summit Spy. The Summit Spy screen is displayed.
2Click the WAP Maintenance tab. Inactive APs and known third-party APs are displayed.
3Select the applicable APs.
4To delete the selected APs, click Delete marked WAPs.
NOTE
The selected APs are deleted from the Summit spy database, not from the Summit WM series switch database.
You can delete the APs from the Summit WM series switch database after you delete them from the Altitude AP
Configuration Access Approval screen of the corresponding RF Data Collector Engine. You can also delete the
selected third-party APs if they are removed from the corresponding WM-AD in the RF Collector Engine, or if that
WM-AD has been deleted from the WM-AD list.
Working with the Summit WM Series Spy
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
190
Viewing the Scanner Status report
When the Summit spy is enabled, you can view a report on the connection status of the RF Data
Collector Engines with the Analysis Engine.
To view the Summit spy scanner engine status display:
1From the main menu, click Summit Spy. The Summit Spy screen is displayed.
2Click the Scanner Status link. The Scanner Status report is displayed, as shown in the example
below.
The boxes display the IP address of the Data Collector engine. The status of the Data Collector engine is
indicated by one of the following colors:
●Green – The Analysis Engine has connection with the Data Collector on that Summit WM series
switch.
●Yellow – The Analysis Engine has connected to the communication system of the other controller,
but has not synchronized with the Data Collector. Ensure that the Data Collector is running on the
remote controller.
●Red – The Analysis Engine is aware of the Data Collector and attempting connection.
If no box is displayed, the Analysis Engine is not attempting to connect with that Data Collector Engine.
NOTE
If the box is displayed red and remains red, ensure your IP address is correctly set up to point to an active
controller. If the box remains yellow, ensure the Data Collector is running on the remote controller.
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 191
9Working with reports and displays
This chapter describes the various reports and displays available in the Summit WM series switch,
access points, and WLAN switch software system.
Viewing the displays
The following displays are available in the Summit WM series switch, access points, and WLAN switch
software system:
●Active Altitude APs
●Active Clients by Altitude AP
●Active Clients by WM-AD
●Port & WM-AD Filter Statistics
●WM-AD Interface Statistics
●Summit Switch Port Statistics
●Altitude AP Availability
●Wired Ethernet Statistics by Altitude AP
●Wireless Statistics by Altitude AP
●Client Location in Mobility Zone
●Mobility Tunnel Matrix
Working with reports and displays
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
192
To view reports and displays:
1From the main menu, click Reports & Displays. The Summit Reports & Displays screen is
displayed.
NOTE
The two displays on the right-hand side of the screen only appear if the mobility manager function has been
enabled for the controller.
2In the List of Displays, click the display you want to view (some examples will follow):
NOTE
Statistics are expressed in relation to the AP. Therefore, Packets Sent means the AP has sent that data to a
client and Packets Rec’d means the AP has received packets from a client.
Viewing the displays
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 193
Viewing the Altitude AP availability display
This display reports the active connection state of an Altitude AP (availability to the Summit WM series
switch for service). Depending on the state of the Altitude AP, the following is displayed:
Green – Altitude AP is configured on the Summit WM series switch and is presently connected.
Red – Altitude AP is configured on the Summit WM series switch but is presently not connected (not
available to service this Summit WM series switch).
In normal operations, when the Summit WM series switch Availability feature is enabled, the local
Altitude APs are green, and the foreign Altitude APs are red. If the other Summit WM series switch
fails, and the foreign Altitude APs connect to the current Summit WM series switch, the display will
show all Altitude APs as green. If the Altitude APs are not connected they show up as red.
Viewing statistics for Altitude APs
Two displays are snapshots of activity at that point in time on a selected Altitude AP:
●Wired Ethernet Statistics by Altitude AP
●Wireless Statistics by Altitude AP
The statistics displayed are those defined in the 802.11 MIB, in the IEEE 802.11 standard.
Working with reports and displays
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
194
To view wired Ethernet statistics by Altitude AP:
1From the main menu, click Reports & Displays. The Summit Reports & Displays screen is
displayed.
2Click the Wired Ethernet Statistics by Altitude AP display option. The Wired Ethernet Statistics by
Altitude APs display opens in a new browser window.
3In the Wired Ethernet Statistics by Altitude APs display, click a registered Altitude AP to display its
information.
Viewing the displays
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 195
To view Wireless Statistics by Altitude AP:
1From the main menu, click Reports & Displays. The Summit Reports & Displays screen is
displayed.
2Click the Wireless Statistics by Altitude AP display option. The Wireless Statistics by Altitude APs
display opens in a new browser window.
3In the Wired Statistics by Altitude APs display, click a registered Altitude AP to display its
information.
4Click the appropriate tab to display information for each radio on the Altitude AP.
5To view information on selected associated clients, click View Client. The Associated Clients display
opens in a new browser window.
Working with reports and displays
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
196
To view Active Clients by Altitude AP statistics:
1From the main menu, click Reports & Displays. The Summit Reports & Displays screen is
displayed.
2Click the Active Clients by Altitude APs display option. The Active Clients by Altitude APs
display opens in a new browser window.
●Statistics are expressed in respect of the AP. Therefore, Packets Sent means the AP has sent that data
to a client and Packets Rec’d means the AP has received packets from a client.
●If the client is authenticated, a green check mark icon is displayed in the first column of the display.
●Time Conn is the length of time that a client has been on the system, not just on an AP. If the client
roams from one AP to another, the session stays, therefore Time Conn does not reset.
●A client is displayed as soon as the client connects (or after refresh of screen). The client disappears
as soon as it times out.
Viewing displays for the mobility manager
When a Summit WM series switch has been configured as a mobility manager, two additional displays
appear as options in the Summit Reports & Displays screen:
●Client Location in Mobility Zone – Displays the active wireless clients and their status
Viewing the displays
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 197
●Mobility Tunnel Matrix – Displays a cross-connection view of the state of inter-controller tunnels, as
well as relative loading for user distribution across the mobility domain
To view mobility manager displays:
1From the main menu, click Reports & Displays. The Summit Reports & Displays screen is
displayed.
2Click the appropriate mobility manager display:
●Client Location in Mobility Zone
●Mobility Tunnel Matrix
The colored status indicates the following:
●Green – The mobility manager is in communication with an agent and the data tunnel has been
successfully established.
●Yellow – The mobility manager is in communication with an agent but the data tunnel is not yet
successfully established.
●Red – The mobility manager is not in communication with an agent and there is no data tunnel.
Client Location in Mobility Zone
You can do the following:
●Sort this display by home or foreign controller
Working with reports and displays
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
198
●Search for a client by MAC address, user name, or IP address, and typing the search criteria in the
box
●Define the refresh rates for this display
●Export this information as an xml file
Mobility Tunnel Matrix
●Provides connectivity matrix of mobility state
●Provides a view of:
●Tunnel state
●If a tunnel between controllers is reported down, it is highlighted in red
●If only a control tunnel is present, it is highlighted in yellow
●If data and control tunnels are fully established, it is highlighted in green
●Tunnel Uptime
●Number of clients roamed (Mobility loading)
●Local controller loading
●Mobility membership list
A Summit WM series switch is only removed from the mobility matrix if it is explicitly removed by the
administrator from the Mobility permission list. If a particular link between controllers, or the controller
is down, the corresponding matrix connections are identified in red color to identify the link.
The Active Clients by WM-AD report for the controller on which the user is home (home controller)
will display the known user characteristics (IP, statistics, etc.). On the foreign controller, the Clients by
WM-AD report does not show users that have roamed from other controllers, since the users remain
associated with the home controller's WM-AD.
The Active Clients by AP report on each controller will show both the loading of local and foreign users
(users roamed from other controllers) that are taking resources on the AP
NOTE
The statistics from the mobility manager are updated every thirty seconds, regardless of the refresh period for the
displays.
Viewing reports
The following reports are available in the Summit WM series switch, access points, and WLAN switch
software system:
●Forwarding Table (routes defined in the Summit WM series switch Routing Protocols screen)
●OSPF Neighbor (if OSPF is enabled in the Routing Protocols screen)
●OSPF Linkstate (if OSPF is enabled in the Routing Protocols screen)
●AP Inventory (a consolidated summary of Altitude AP setup)
Viewing reports
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 199
To view reports:
1From the main menu, click Reports & Displays. The Reports & Displays screen is displayed.
2In the Reports list, click the report you want to view:
●Forwarding Table
●OSPF Neighbor
●OSPF Linkstate
●AP Inventory
NOTE
The AP Inventory report opens in a new browser window. All other reports appear in the current browser window.
The following is an example of a Forwarding Table report:
NOTE
If you open only automatically refreshed reports, the Web management session timer will not be updated or reset.
Your session will eventually timeout.
Working with reports and displays
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
200
The following is an example of the AP Inventory report:
The following is a description of the column names and abbreviations found in the AP Inventory
report:
●Rdo – Radio
●Ra – 802.11a radio. The data entry for an Altitude AP indicates whether the a radio is on or off.
●Rb – 802.11b protocol enabled. Possible values are on or off.
●Rg – 802.11g protocol enabled. Possible values are on or off.
●DP – DTIM period
●BP – Beacon Period
●SRL – Short Retry Limit
●LRL – Long Retry Limit
●RT – RTS Threshold
●FT – Fragmentation Threshold
●Ch – Channel served by the corresponding radio.
●PL – Power Level (Defined in the Altitude AP radio properties pages.)
●BR – Basic Rate (Only applies to Altitude APs running 3.1 or earlier.)
●ORS – Operational Rate Set (Only applies to Altitude APs running 3.1 or earlier.)
●MnBR – Minimum Basic Rate (For more information, see the Altitude AP radio configuration tabs.)
●MxBR – Maximum Basic Rate
●MxOR – Maximum Operational Rate
●RxDV – Receive Diversity
●TxDV – Tx Diversity
●Pmb – Preamble (long, short)
●PM – Protection Mode
●PR – Protection Rate
●PT – Protection Type
●BSS – Basic Service Set
●MAC – MAC address
●BSS: MAC – Also called BSSID, this is the MAC address of a (virtual) wireless interface on which
the Altitude AP serves a BSS/WM-AD. There could be 8 per radio.
Viewing reports
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 201
●Port – Ethernet Port and associated IP address of the interface on the Summit WM series switch
through which the Altitude AP communicates.
●HW – Hardware version of the Altitude AP.
●SW – Software version executing on the Altitude AP.
●TA – Telnet access (enabled or disabled).
●BD – Broadcast disassociation (enabled or disabled). If enabled, whenever the Altitude AP is going
offline in a controlled fashion it will send the disassociation frame to all its clients as a broadcast.
●DV – Diversity
●P/To – Poll timeout. If polling is enabled, a numeric value.
●P/I – Poll interval. If polling is enabled, a numeric value.
●Wired MAC – The physical address of the Altitude AP's wired Ethernet interface.
●Description – As defined on the AP Properties screen.
●Failure Maintn. – Maintain MU sessions on Altitude AP when the Altitude AP loses the connection
to the Summit WM series switch.
●Assn – Assignment (address assignment method)
●Static Cfg – Altitude AP's IP address if statically configured (same as the Static Values radio button
on the AP Static Configuration screen).
●Static Cfg IP – Statically Configured IP. If the Altitude AP's IP address is configured statically, the IP
address is displayed.
●Netmask – If the Altitude AP's IP address is configured statically, the netmask that is statically
configured for the Altitude AP.
●Gateway – If the Altitude AP's IP address is configured statically, the IP address of the gateway
router that the Altitude AP will use.
●HWC Search List – The list of IP addresses that the Altitude AP is configured to try to connect to in
the event that the current connection to the Summit WM series switch is lost.
To export and save a report in XML:
1On the report screen, click Export. A Windows File Download dialog is displayed.
2Click the Save button. A Windows Save As dialog is displayed.
NOTE
If your default XML viewer is Internet Explorer or Netscape, clicking Open will open the exported data to your
display screen. You must right-click to go back to the export display. The XML data file will not be saved to your
local drive.
3Browse to the location where you want to save the exported XML data file, and in the File name box
enter an appropriate name for the file.
4Click Save. The XML data file is saved in the specified location.
Working with reports and displays
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
202
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 203
10 Performing system maintenance
This chapter describes system maintenance processes, including:
●Performing Altitude AP client management
●Resetting the AP to its factory default settings
●Performing system maintenance tasks
●Performing Summit WM series switch software maintenance
●Configuring Summit WM series switch, access points, and WLAN switch software logs and traces
Performing Altitude AP client management
There are times when for service reasons or security issues, you want to cut the connection with a
particular wireless device. You can view all the associated wireless devices, by MAC address, on a
selected Altitude AP. You can do the following:
●Disassociate a selected wireless device from its Altitude AP.
●Add a selected wireless device's MAC address to a blacklist of wireless clients that will not be
allowed to associate with the Altitude AP.
●Backup and restore the Summit WM series switch database. For more information, see “Performing
Summit WM series switch software maintenance” on page 210.
Disassociating a client
In addition to the following procedure below, you can also disassociate wireless users directly from the
Active Clients by WM-AD screen. For more information, see Chapter 9, “Working with reports and
displays.”
Performing system maintenance
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
204
To disassociate a wireless device client:
1From the main menu, click Altitude AP Configuration. The Altitude AP Configuration screen is
displayed.
2From the left pane, click Client Management. The Disassociate tab is displayed.
3In the Select AP list, click the AP you want to disassociate.
4In the Select Client(s) list, select the checkbox next to the client you want to disassociate, if
applicable.
NOTE
You can search for a client by MAC Address, IP Address or User ID, by selecting the search parameters from the
drop-down lists and typing a search string in the Search box and clicking Search. You can also use the Select All
or Clear All buttons to help you select multiple clients.
5Click Disassociate. The client's session terminates immediately.
Blacklisting a client
The Blacklist tab displays the current list of MAC addresses that are not allowed to associate. A client is
added to the blacklist by selecting it from a list of associated APs or by entering its MAC address.
Performing Altitude AP client management
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 205
To blacklist a wireless device client:
1From the main menu, click Altitude AP Configuration. The Altitude AP Configuration screen is
displayed.
2From the left pane, click Client Management. The Disassociate tab is displayed.
3In the Select AP list, click the AP you want to disassociate.
4In the Select Client(s) list, select the checkbox next to the client you want to disassociate, if
applicable.
NOTE
You can search for a client by MAC Address, IP Address or User ID, by selecting the search parameters from the
drop-down lists and typing a search string in the Search box and clicking Search. You can also use the Select All
or Clear All buttons to help you select multiple clients.
5Click Add to Blacklist. The selected wireless client's MAC address is added to the blacklist.
To blacklist a wireless device client using its MAC address:
1From the main menu, click Altitude AP Configuration. The Altitude AP Configuration screen is
displayed.
2From the left pane, click Client Management. The Disassociate tab is displayed.
Performing system maintenance
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
206
3Click the Blacklist tab.
4To add a new MAC address to the blacklist, in the MAC Address box enter the client’s MAC
address.
5Click Add. The client is displayed in the MAC Addresses list.
NOTE
You can use the Select All or Clear All buttons to help you select multiple clients.
6To save your changes, click Save.
To clear an address from the blacklist:
1From the main menu, click Altitude AP Configuration. The Altitude AP Configuration screen is
displayed.
2From the left pane, click Client Management. The Disassociate tab is displayed.
3Click the Blacklist tab.
4To clear an address from the blacklist, select the corresponding checkbox in the MAC Addresses list.
5Click Remove Selected. The selected client is removed from the list.
NOTE
You can use the Select All or Clear All buttons to help you select multiple clients.
Resetting the AP to its factory default settings
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 207
6To save your changes, click Save.
To import a list of MAC addresses for the blacklist:
1From the main menu, click Altitude AP Configuration. The Altitude AP Configuration screen is
displayed.
2From the left pane, click Client Management. The Disassociate tab is displayed.
3Click the Blacklist tab.
4Click Browse and navigate to the file of MAC addresses you want to import and add to the blacklist.
5Select the file, and then click Import. The list of MAC addresses is imported.
To export a list of MAC addresses for the blacklist:
1From the main menu, click Altitude AP Configuration. The Altitude AP Configuration screen is
displayed.
2From the left pane, click Client Management. The Disassociate tab is displayed.
3Click the Blacklist tab.
4To export the current blacklist, use the browser’s save option to save the file as a text (.txt) file. It is
recommend that a descriptive file name is used.
5Click Export. The saved blacklist file is exported.
Resetting the AP to its factory default settings
You can reset the Altitude AP to its factory default settings. The AP boot-up sequence includes a
random delay interval, followed by a vulnerable time interval. During the vulnerable time interval (2
seconds), the LEDs flash in a particular sequence to indicate that the Summit WM series switch is in the
vulnerable time interval. For more information, see “Understanding the Altitude AP LED status” on
page 58.
If you power up the AP and interrupt the power during the vulnerable time interval three consecutive
times, the next time the AP reboots, it will restore its factory defaults including the user password and
the default IP settings.
WARNING!
The restoration of factory default settings does not erase the non-volatile log.
To reset the AP to its factory default settings:
1Reboot the AP.
2Depower and repower the AP during the vulnerable time interval.
3Repeat Step 2 two more times.
When the AP reboots for the fourth time, after having its power supply interrupted three
consecutive times, it restores its factory default settings. The AP then reboots again to put the default
settings into effect.
Performing system maintenance
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
208
Performing system maintenance tasks
You can perform various maintenance tasks, including:
●Changing the log level
●Setting a poll interval for checking the status of the Altitude APs (Health Checking)
●Enabling and defining parameters for Syslog event reporting
●Forcing an immediate system shutdown, with or without reboot
Syslog event reporting uses the syslog protocol to relay event messages to a centralized event server on
your enterprise network. In the protocol a device generates messages, a relay receives and forwards the
messages, and a collector (a syslog server) receives the messages without relaying them.
To change the log levels:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2In the System Log Level section, from the Summit Switch Log Level drop-down list, select the least
severe log level for the Controller that you want to receive: Information, Minor, Major, Critical. For
example, if you select Minor, you receive all Minor, Major and Critical messages. If you select
Major you receive all Major and Critical messages. The default is Information.
3Click Apply.
Performing system maintenance tasks
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 209
4From the Altitude AP Log Level drop-down list, select the least severe log level for the AP that you
want to receive: Information, Minor, Major, Critical. The default is Critical.
5Click Apply.
To set a poll interval:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2From the left pane, click System Maintenance. The System Maintenance screen is displayed.
3In the Health Checking section, in the Poll Timer box, type the time interval (in seconds) for the
Summit WM series switch to check that each Altitude AP is connected. The default is 60 seconds.
4Click Apply.
To enable and define parameters for Syslog:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2From the left pane, click System Maintenance. The System Maintenance screen is displayed.
3In the Syslog section, to enable the Syslog function for up to three syslog servers, select the
appropriate checkboxes.
4For each enabled syslog server, in the IP box, type a valid IP address for the server on the network.
5For each enabled syslog server, in the Port # box, type a valid port number to connect on. The
default port for syslog is 514.
6To include all system messages, select the Include all service messages checkbox. If the box is not
selected, only component messages (logs and traces) are relayed. This setting applies to all three
servers. The additional service messages are:
●DHCP messages reporting users receiving IP addresses
●Startup Manager Task messages reporting component startup and failure
7To include audit messages, select the Include audit messages checkbox.
8From the Application Logs drop-down list, select the log level (local.0 - local.6) to be sent to the
syslog server. This setting applies all three servers.
9If the Include all service messages checkbox is selected, the Service Logs drop-down list becomes
selectable. Select the log level (local.0 - local.6) to be sent to the syslog server. This setting applies all
three servers.
10 If you selected the Include audit messages checkbox, the Audit Logs drop-down list becomes
available. Select the log level (local.0 - local.6) to be sent to the syslog server. This setting applies all
three servers.
11 To apply your changes, click on the Apply button.
NOTE
The syslog daemon must be running on both the Summit WM series switch and on the remote syslog server
before the logs can be synchronized. If you change the log level on the Summit WM series switch, you must also
modify the appropriate setting in the syslog configuration on remote syslog server.
Performing system maintenance
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
210
Table 17 shows Syslog and Summit WM series switch, access points, and WLAN switch software event
log mapping.
To force an immediate system shutdown:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2From the left pane, click System Maintenance. The System Maintenance screen is displayed.
3To shut down the system, including associated Altitude APs, select the appropriate shut down
option:
●Halt system: reboot
●Halt system: reset database to factory default and reboot – Restores all aspects of the system
configuration to the initial settings. However, the Management IP address and license key are
preserved. This permits the user to remain connected through the Management interface.
●Halt system: reset to factory default and reboot – Resets the entire system configuration to the
factory shipping state. The Management IP address reverts to 192.168.10.1 and the license key is
removed.
●Halt system – The system enters the halted state, which stops all functional services and the
application. To restart the system, the power to the system must be reset.
4Click Apply Now. The system is immediately halted.
Performing Summit WM series switch software
maintenance
You can update the core Summit WM series switch software files, and the Operating System (OS)
software using the Software Maintenance function. A facility to backup and restore the Summit WM
series switch database is also available. The maintenance interface also includes the product key
maintenance, for first-time setup and upgrades, if appropriate. For more information, see “Applying the
product license key” on page 41.
WARNING!
During a system upgrade from v3.1 to v4 R0.x.x, it is recommended that you install your new v4 license key
BEFORE upgrading the software if you have manually configured radio channels.
Table 17: Syslog and Summit WM series switch, access points, and WLAN switch software event log
mapping
Syslog Event
Summit WM series switch, access points, and
WLAN switch software Event
LOG_CRIT Critical
LOG_ERR Major
LOG_WARNING Minor
LOG_INFO Information
LOG_DEBUG Trace
Performing Summit WM series switch software maintenance
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 211
If your Summit WM series switch has a v3.1 license key when it is upgraded, the key will be rejected and the
Summit WM series switch will revert to a factory default DEMO region setting. Whenever the licensed region changes
on the Summit WM series switch, all Altitude APs are changed to Auto Channel Select to prevent possible infractions
to local RF regulatory requirements. If this occurs, all manually configured radio channel settings will be lost.
Installing the new license key before upgrading will prevent the Summit WM series switch from changing the
licensed region, and in addition, manually configured channel settings will be maintained.
Updating Summit WM series switch software
You can update the core Summit WM series switch software files using the Software Maintenance
function.
To upgrade Summit WM series switch software:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2From the left pane, click Software Maintenance. The SWM Software tab is displayed.
The Available SWM Images section displays the list of software versions that have been
downloaded and are available.
3In the Upgrade section, select an image from the Select an image to use drop-down list.
Performing system maintenance
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
212
NOTE
It is recommended that the Bypass checks for compatible upgrade RPM and OS patch and the Skip backup
during RPM un-install options remain disabled.
4To launch the upgrade with the selected image, click on the Upgrade Now button.
5In the dialog box that is displayed, confirm the upgrade.
At this point, all sessions are closed. The previous software is uninstalled automatically. The new
software is installed. The Summit WM series switch reboots automatically. The database is updated
and migrated.
To download a new Summit WM series switch software image:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2From the left pane, click Software Maintenance. The SWM Software tab is displayed.
3To download a new image to be added to the list, in the Download Image section type the
following:
●FTP Server – The IP of the FTP server to retrieve the image file from.
●User ID – The user ID that the controller should use when it attempts to log in to the FTP server.
●Password – The corresponding password for the user ID.
●Confirm – The corresponding password for the user ID to confirm it was typed correctly.
●Directory – The directory on the server in which the image file that is to be retrieved is stored.
●Filename – The name of the image file to retrieve.
●Platform – The AP hardware type to which the image applies. The are several types of AP and
they require different images.
4Click Download. The image is downloaded and added to the list.
To delete a Summit WM series switch software image:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2From the left pane, click Software Maintenance. The SWM Software tab is displayed.
3To delete a software image from the list, in the Available SWM Images list, click the image.
4Click Delete. The image is removed from the list.
Updating operating system software
You can update the Operating System (OS) software using the Software Maintenance function.
Performing Summit WM series switch software maintenance
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 213
To upgrade operating system software:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2From the left pane, click Software Maintenance. The SWM Software tab is displayed.
3Click the OS Software tab.
The Available OS Images section displays the list of software versions that have been downloaded
and are available.
4In the Upgrade section, select an image from the Select an image to use drop-down list.
5To launch the upgrade with the selected image, click Upgrade Now.
6In the dialog box that is displayed, confirm the upgrade.
At this point, all sessions are closed. The previous software is uninstalled automatically. The new
software is installed. The Summit WM series switch reboots automatically.
To download a new operating system software image:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2From the left pane, click Software Maintenance. The SWM Software tab is displayed.
3Click the OS Software tab.
Performing system maintenance
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
214
4To download a new image to be added to the list, in the Download Image section type the
following:
●FTP Server – The IP of the FTP server to retrieve the image file from.
●User ID – The user ID that the controller should use when it attempts to log in to the FTP server.
●Password – The corresponding password for the user ID.
●Confirm – The corresponding password for the user ID to confirm it was typed correctly.
●Directory – The directory on the server in which the image file that is to be retrieved is stored.
●Filename – The name of the image file to retrieve.
●Platform – The AP hardware type to which the image applies. The are several types of AP and
they require different images.
5Click Download. The image is downloaded and added to the list.
To delete a Summit WM series switch software image:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2From the left pane, click Software Maintenance. The SWM Software tab is displayed.
3Click the OS Software tab.
4To delete a software image from the list, in the Available OS Images list, click the image.
5Click Delete. The image is removed from the list.
Backing up Summit WM series switch software
You can backup the Summit WM series switch database. You can also schedule the backups to occur.
When a scheduled backup is defined, you can configure to have the scheduled backup copied to an FTP
server when the backup is complete.
To back up the Summit WM series switch software:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2From the left pane, click Software Maintenance. The SWM Software tab is displayed.
Performing Summit WM series switch software maintenance
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 215
3Click the Backup tab.
The Available Backups section displays the list items that have been backed up and are available.
4In the Backup section, select an item from the Select what to backup drop-down list.
5To launch the backup with the selected items, click on the Backup Now button.
6In the dialog box that is displayed, confirm the backup. The items are backed up.
To upload a new backup:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2From the left pane, click Software Maintenance. The SWM Software tab is displayed.
3Click the Backup tab.
4To upload a new backup, which will be added to the list, in the Upload Backup section type the
following:
●FTP Server – The IP of the FTP server to retrieve the image file from.
●User ID – The user ID that the controller should use when it attempts to log in to the FTP server.
●Password – The corresponding password for the user ID.
●Confirm – The corresponding password for the user ID to confirm it was typed correctly.
●Directory – The directory on the server where the image file will be stored.
●Filename – The name that will be given to the image file when it is stored on the FTP server.
Performing system maintenance
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
216
●Platform – The AP hardware type to which the image applies. The are several types of AP and
they require different images.
5Click Upload. The backup is uploaded and added to the list.
To delete a backup:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2From the left pane, click Software Maintenance. The SWM Software tab is displayed.
3Click the Backup tab.
4To delete a backup from the list, in the Available Backups list, click the backup.
5Click Delete. The backup is removed from the list.
To schedule a backup:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2From the left pane, click Software Maintenance. The SWM Software tab is displayed.
3Click the Backup tab.
4Click Schedule Backup. The Schedule Backups screen is displayed.
5In the What to backup drop-down list, select what you want to backup:
●Config’s, CDRs, Logs, Audit and Rogue
●Configurations only
●CDRs only
●Logs only
●Audit only
●Rogue only
Performing Summit WM series switch software maintenance
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 217
6In the Schedule task drop-down list, select the frequency of the backup:
●Daily
●Weekly
●Monthly
●Never
7In the FTP settings section, type the following:
●FTP Server – The IP of the FTP server to where the scheduled backup will be copied to.
●User ID – The user ID that the controller should use when it attempts to log in to the FTP server.
●Password – The corresponding password for the user ID
●Confirm – The corresponding password for the user ID to confirm it was typed correctly.
●Directory – The directory on the server where the image file will be stored.
8To save your changes, click Save.
Restoring Summit WM series switch software
You can restore the Summit WM series switch database.
To restore the Summit WM series switch software:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2From the left pane, click Software Maintenance. The SWM Software tab is displayed.
Performing system maintenance
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
218
3Click the Restore tab.
The Available Backups section displays the list items that have been backed up and are available.
4In the Restore section, select an item from the Select an image to use drop-down list.
5To launch the backup with the selected items, click on the Restore Now button.
6In the dialog box that is displayed, confirm the restore. The image is restored.
To download for restore:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2From the left pane, click Software Maintenance. The System Maintenance screen is displayed.
3Click the Restore tab.
4To download an image for restore, which will be added to the list, in the Download for Restore
section type the following:
●FTP Server –The FTP server to retrieve the image file from.
●User ID – The user ID that the controller should use when it attempts to log in to the FTP server.
●Password – The corresponding password for the user ID.
●Confirm – The corresponding password for the user ID to confirm it was typed correctly.
●Directory – The directory on the server in which the image file that is to be retrieved is stored.
●Filename – The name of the image file to retrieve.
Performing Summit WM series switch software maintenance
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 219
●Platform – The AP hardware type to which the image applies. The are several types of AP and
they require different images.
5Click Download. The image is downloaded and added to the list.
To delete a backup available for restore:
1From the main menu, click Summit Switch Configuration. The Summit Switch Configuration
screen is displayed.
2From the left pane, click Software Maintenance. The System Maintenance screen is displayed.
3Click the Restore tab.
4To delete a backup from the list, in the Available Backups list, click the backup.
5Click Delete. The backup is removed from the list.
Upgrading a Summit WM series switch using SFTP
You can upload an image file to the Summit WM series switch using Secure FTP (SFTP). The Summit
WM series switch supports any SFTP client.
NOTE
You must enable management traffic before you try to connect with a SFTP client. Specify the exact image path for
the corresponding SW package (see directory information below). Otherwise, the Summit WM series switch cannot
locate them for SW upgrades/updates.
To upload an image file:
1Launch the SFTP client, point it to the Summit WM series switch and login in. The exact details of
how to do this will depend on the client used. The following uses putty as an example:
mp
Performing system maintenance
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
220
2Change to the directory to receive the uploaded file:
●For AP images change to: /var/tftp/chantry
●For Summit WM series switch images change to: /var/controller/upgrade
●For OS archives change to: /var/controller/osupgrade
3Upload the image file using the SFTP client upload feature.
4To complete a Summit WM series switch upgrade or an AP upgrade go to the appropriate Software
Maintenance screen. For more information, see “Updating Summit WM series switch software” on
page 211 or “Updating operating system software” on page 212.
Configuring Summit WM series switch, access points, and WLAN
switch software logs and traces
The system stores configuration data and log files. These files include:
●event and alarm logs (triggered by events)
●trace logs (triggered by component activity)
●accounting files (created every 30 minutes, to a maximum of six files)
The files are stored in the operating system and have a maximum size of one GB. The accounting files
are stored in flat files in a directory that is created every day. Eight directories are maintained in a
circular buffer (when all are full, the most recent replaces the earliest).
Viewing log, alarm and trace messages
The Summit WM series switch generates three types of messages:
●Logs (including alarms) – Messages that are triggered by events
●Audits – Files that record administrative changes made to the system (the GUI Audit displays
changes to the Graphical User Interface on the Summit WM series switch)
●Traces – Messages that display activity by component, for system debugging, troubleshooting and
internal monitoring of software
NOTE
In order for the Debug Info option on the Altitude AP Traces screen to return Trace messages, this option must
enabled while Altitude AP debug commands are running. To do so, you need to run an Altitude AP CLI command
to turn on a specific Altitude AP debug. Once the CLI command is run, select the Debug Info option, and then
click Retrieve Traces. For more information, see the Summit WM series switch, access points, and WLAN switch
software CLI Reference Guide.
Because Altitude AP debugging can affect the normal operation of Altitude AP service, enabling debugging is not
recommended, unless specific instructions are provided.
Performing Summit WM series switch software maintenance
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 221
Logs including alarms
The log messages contain the time of event, severity, source component and any details generated by
the source component. The messages are classified at four levels of severity:
●Informational, the activity of normal operation
●Minor (alarm)
●Major (alarm)
●Critical (alarm)
The alarm messages (minor, major or critical log messages) are triggered by activities that meet certain
conditions that should be known and dealt with.
Examples of events on the Summit WM series switch that generate an alarm message:
●Reboot due to failure
●Software upgrade failure on the Summit WM series switch
●Software upgrade failure on the Altitude AP
●Detection of rogue access point activity without valid ID
If SNMP is enabled on the Summit WM series switch, alarm conditions will trigger a trap in SNMP
(Simple Network Management Protocol). An SNMP trap is an event notification sent by the managed
agent (a network device) to the management system to identify the occurrence of conditions.
Performing system maintenance
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
222
To view logs:
1From the main menu, click Logs & Traces. The Logs & Traces screen is displayed.
2Click one of the Log tabs. The following is an example of the Summit WM series switch logs:
The events are displayed in chronological order, sorted by the Timestamp column.
3To sort the display by Type or Component, click the appropriate column heading.
4To filter the logs by severity, in order to display only Info, Minor, Major, or Critical logs, click the
appropriate Log tab at the top of the screen.
5To refresh the information in any display, click Refresh.
6To export information from a display as an HTML file, click the Export button.
The component called “Langley” is the term for the inter-process messaging infrastructure on the
Summit WM series switch.
Performing Summit WM series switch software maintenance
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 223
To view traces:
1From the main menu, click Logs & Traces. The Logs & Traces screen is displayed.
2Click one of the Tra c e s tabs. The following is an example of the Summit WM series switch traces:
The events are displayed in chronological order, sorted by the Timestamp column.
3To sort the display by Type or Component, click the appropriate column heading.
4To filter the traces by severity, in order to display only Info, Minor, Major, or Critical traces, click
the appropriate Tra ces tab at the top of the screen.
5To refresh the information in any display, click Refresh.
6To export information from a display as an HTML file, click the Export button.
Performing system maintenance
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
224
To view audits:
1From the main menu, click Logs & Traces. The Logs & Traces screen is displayed.
2Click the Audit: GUI tab. The Audit screen is displayed.
The events are displayed in chronological order, sorted by the Timestamp column.
3To sort the display by User, Section, Page, or Audit Message, click the appropriate column heading.
4To clear the audits from the list, click Clear Audits.
5To refresh the information in any display, click Refresh.
6To export information from a display as an HTML file, click the Export button.
Performing Summit WM series switch software maintenance
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 225
To clear logs:
1From the main menu, click Logs & Traces. The Logs & Traces screen is displayed.
2Click one of the Log tabs. The following is an example of the Summit WM series switch logs:
The events are displayed in chronological order, sorted by the Timestamp column.
3To clear the logs, click Clear Log Messages.
Performing system maintenance
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
226
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 227
Glossary
Networking terms and abbreviations
A
AAA Authentication, Authorization and Accounting. A system in IP-based
networking to control what computer resources users have access to
and to keep track of the activity of users over a network.
Access Point (AP) A wireless LAN transceiver or “base station” that can connect a wired
LAN to one or many wireless devices.
Ad-hoc mode An 802.11 networking framework in which devices or stations
communicate directly with each other, without the use of an access
point (AP). (Compare Infrastructure Mode)
AES Advanced Encryption Standard (AES) is an algorithm for encryption
that works at multiple network layers simultaneously. As a block
cipher, AES encrypts data in fixed-size blocks of 128 bits. AES was
created by the National Institute of Standards and Technology (NIST).
AES is a privacy transform for IPSec and Internet Key Exchange (IKE).
AES has a variable key length - the algorithm can specify a 128-bit key
(the default), a 192-bit key, or a 256-bit key.
For the WPA2/802.11i implementation of AES, a 128 bit key length is
used. AES encryption includes 4 stages that make up one round. Each
round is then iterated 10, 12 or 14 times depending upon the bit-key
size. For the WPA2/802.11i implementation of AES, each round is
iterated 10 times.
AES-CCMP AES uses the Counter-Mode/CBC-MAC Protocol (CCMP). CCM is a
new mode of operation for a block cipher that enables a single key to
be used for both encryption and authentication. The two underlying
modes employed in CCM include Counter mode (CTR) that achieves
data encryption and Cipher Block Chaining Message Authentication
Code (CBC-MAC) to provide data integrity.
ARP Address Resolution Protocol. A protocol used to obtain the physical
addresses (such as MAC addresses) of hardware units in a network
environment. A host obtains such a physical address by broadcasting
an ARP request, which contains the IP address of the target hardware
unit. If the request finds a unit with that IP address, the unit replies
with its physical hardware address.
Association A connection between a wireless device and an Access Point.
asynchronous Asynchronous transmission mode (ATM). A start/stop transmission in
which each character is preceded by a start signal and followed by one
or more stop signals. A variable time interval can exist between
characters. ATM is the preferred technology for the transfer of images.
Glossary
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
228
B
BSS Basic Service Set. A wireless topology consisting of one Access Point
connected to a wired network and a set of wireless devices. Also
called an infrastructure network. See also IBSS.
C
Captive Portal A browser-based authentication mechanism that forces
unauthenticated users to a Web page. Sometimes called a “reverse
firewall”.
CDR Call Data (Detail) Record
In Internet telephony, a call detail record is a data record that contains
information related to a telephone call, such as the origination and
destination addresses of the call, the time the call started and ended,
the duration of the call, the time of day the call was made and any toll
charges that were added through the network or charges for operator
services, among other details of the call.
In essence, call accounting is a database application that processes call
data from your switch (PBX, iPBX, or key system) via a CDR (call
detail record) or SMDR (station message detail record) port. The call
data record details your system's incoming and outgoing calls by
thresholds, including time of call, duration of call, dialing extension,
and number dialed. Call data is stored in a PC database
CHAP Challenge-Handshake Authentication Protocol. One of the two main
authentication protocols used to verify a user's name and password
for PPP Internet connections. CHAP is more secure than PAP because
it performs a three-way handshake during the initial link
establishment between the home and remote machines. It can also
repeat the authentication anytime after the link has been established.
CLI Command Line Interface.
Collision Two Ethernet packets attempting to use the medium simultaneously.
Ethernet is a shared media, so there are rules for sending packets of
data to avoid conflicts and protect data integrity. When two nodes at
different locations attempt to send data at the same time, a collision
will result. Segmenting the network with bridges or switches is one
way of reducing collisions in an overcrowded network.
D
Datagram A datagram is “a self-contained, independent entity of data carrying
sufficient information to be routed from the source to the destination
computer without reliance on earlier exchanges between this source
and destination computer and the transporting network.” (RFC1594).
The term has been generally replaced by the term packet. Datagrams
or packets are the message units that the Internet Protocol deals with
and that the Internet transports.
Decapsulation See tunnelling.
D
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 229
Device Server A specialized, network-based hardware device designed to perform a
single or specialized set of server functions. Print servers, terminal
servers, remote access servers and network time servers are examples
of device servers.
DHCP Dynamic Host Configuration Protocol. A protocol for assigning
dynamic IP addresses to devices on a network. With dynamic
addressing, a device can have a different IP address every time it
connects to the network. In some systems, the device's IP address can
even change while it is still connected. DHCP also supports a mix of
static and dynamic IP addresses.
DHCP consists of two components: a protocol for delivering host-
specific configuration parameters from a DHCP server to a host and a
mechanism for allocation of network addresses to hosts. (IETF
RFC1531.)
Option 78 specifies the location of one or more SLP Directory Agents.
Option 79 specifies the list of scopes that a SLP Agent is configured to
use.(RFC2610 - DHCP Options for Service Location Protocol)
Directory Agent (DA) A method of organizing and locating the resources (such as printers,
disk drives, databases, e-mail directories, and schedulers) in a
network. Using SLP, networking applications can discover the
existence, location and configuration of networked devices.
With Service Location Protocol, client applications are 'User Agents'
and services are advertised by 'Service Agents'. The User Agent issues
a multicast 'Service Request' (SrvRqst) on behalf of the client
application, specifying the services required. The User Agent will
receive a Service Reply (SrvRply) specifying the location of all services
in the network which satisfy the request.
For larger networks, a third entity, called a 'Directory Agent', receives
registrations from all available Service Agents. A User Agent sends a
unicast request for services to a Directory Agent (if there is one) rather
than to a Service Agent.
(SLP version 2, RFC2608, updating RFC2165)
Diversity antenna and
receiver
The AP has two antennae. Receive diversity refers to the ability of the
AP to provide better service to a device by receiving from the user on
which ever of the two antennae is receiving the cleanest signal.
Transmit diversity refers to the ability of the AP to use its two antenna
to transmit on a specific antenna only, or on a alternate antennae. The
antennae are called diversity antennae because of this capability of the
pair.
DNS Domain Name Server
DSSS Direct-Sequence Spread Spectrum. A transmission technology used in
Local Area Wireless Network (LAWN) transmissions where a data
signal at the sending station is combined with a higher data rate bit
sequence, or chipping code, that divides the user data according to a
spreading ratio. The chipping code is a redundant bit pattern for each
bit that is transmitted, which increases the signal's resistance to
interference. If one or more bits in the pattern are damaged during
transmission, the original data can be recovered due to the
redundancy of the transmission. (Compare FHSS)
D (Continued)
Glossary
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
230
DTIM DTIM delivery traffic indication message (in 802.11 standard)
Dynamic WEP The IEEE introduced the concept of user-based authentication using
per-user encryption keys to solve the scalability issues that
surrounded static WEP. This resulted in the 802.1X standard, which
makes use of the IETF's Extensible Authentication Protocol (EAP),
which was originally designed for user authentication in dial-up
networks. The 802.1X standard supplemented the EAP protocol with a
mechanism to send an encryption key to an Altitude AP. These
encryption keys are used as dynamic WEP keys, allowing traffic to
each individual user to be encrypted using a separate key.
E
EAP-TLS
EAP-TTLS
EAP-TLS Extensible Authentication Protocol - Transport Layer
Security. A general protocol for authentication that also supports
multiple authentication methods, such as token cards, Kerberos, one-
time passwords, certificates, public key authentication and smart cards.
IEEE 802.1x specifies how EAP should be encapsulated in LAN frames.
In wireless communications using EAP, a user requests connection to a
WLAN through an access point, which then requests the identity of the
user and transmits that identity to an authentication server such as
RADIUS. The server asks the access point for proof of identity, which
the access point gets from the user and then sends back to the server to
complete the authentication.
EAP-TLS provides for certificate-based and mutual authentication of
the client and the network. It relies on client-side and server-side
certificates to perform authentication and can be used to dynamically
generate user-based and session-based WEP keys.
EAP-TTLS (Tunneled Transport Layer Security) is an extension of EAP-
TLS to provide certificate-based, mutual authentication of the client
and network through an encrypted tunnel, as well as to generate
dynamic, per-user, per-session WEP keys. Unlike EAP-TLS, EAP-TTLS
requires only server-side certificates.
(See also PEAP)
ELA (OPSEC) Event Logging API (Application Program Interface) for OPSEC, a
module in Check Point used to enable third-party applications to log
events into the Check Point VPN-1/FireWall-1 management system.
Encapsulation See tunnelling.
ESS Extended Service Set (ESS). Several Basic Service Sets (BSSs) can be
joined together to form one logical WLAN segment, referred to as an
extended service set (ESS). The SSID is used to identify the ESS. (See
BSS and SSID.)
D (Continued)
F
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 231
F
FHSS Frequency-Hopping Spread Spectrum. A transmission technology
used in Local Area Wireless Network (LAWN) transmissions where
the data signal is modulated with a narrowband carrier signal that
“hops” in a random but predictable sequence from frequency to
frequency as a function of time over a wide band of frequencies. This
technique reduces interference. If synchronized properly, a single
logical channel is maintained. (Compare DSSS)
Fit, thin and fat APs A thin AP architecture uses two components: an access point that is
essentially a stripped-down radio and a centralized management
controller that handles the other WLAN system functions. Wired
network switches are also required.
A fit AP, a variation of the thin AP, handles the RF and encryption,
while the central management controller, aware of the wireless users'
identities and locations, handles secure roaming, quality of service,
and user authentication. The central management controller also
handles AP configuration and management.
A fat (or thick) AP architecture concentrates all the WLAN intelligence
in the access point. The AP handles the radio frequency (RF)
communication, as well as authenticating users, encrypting
communications, secure roaming, WLAN management, and in some
cases, network routing.
FQDN Fully Qualified Domain Name. A “friendly” designation of a
computer, of the general form
computer.[subnetwork.].organization.domain. The FQDN names must
be translated into an IP address in order for the resource to be found
on a network, usually performed by a Domain Name Server.
FTM Forwarding Table Manager
FTP File Transfer Protocol
G
Gateway In the wireless world, an access point with additional software
capabilities such as providing NAT and DHCP. Gateways may also
provide VPN support, roaming, firewalls, various levels of security,
etc.
Gigabit Ethernet The high data rate of the Ethernet standard, supporting data rates of 1
gigabit (1,000 megabits) per second.
GUI Graphical User Interface
Glossary
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
232
H
Heartbeat message A heartbeat message is a UDP data packet used to monitor a data
connection, polling to see if the connection is still alive.
In general terms, a heartbeat is a signal emitted at regular intervals by
software to demonstrate that it is still alive. In networking, a heartbeat
is the signal emitted by a Level 2 Ethernet transceiver at the end of
every packet to show that the collision-detection circuit is still
connected.
Host (1) A computer (usually containing data) that is accessed by a user
working on a remote terminal, connected by modems and telephone
lines.
(2) A computer that is connected to a TCP/IP network, including the
Internet. Each host has a unique IP address.
HTTP Hypertext Transfer Protocol is the set of rules for transferring files
(text, graphic images, sound, video, and other multimedia files) on the
World Wide Web. A Web browser makes use of HTTP. HTTP is an
application protocol that runs on top of the TCP/IP suite of protocols.
(RFC2616: Hypertext Transfer Protocol -- HTTP/1.1)
HTTPS Hypertext Transfer Protocol over Secure Socket Layer, or HTTP over
SSL, is a Web protocol that encrypts and decrypts user page requests
as well as the pages that are returned by the Web server. HTTPS uses
Secure Socket Layer (SSL) as a sublayer under its regular HTTP
application layering. (HTTPS uses port 443 instead of HTTP port 80 in
its interactions with the lower layer, TCP/IP.) SSL uses a 40-bit key
size for the RC4 stream encryption algorithm, which is considered an
adequate degree of encryption for commercial exchange.
I
IBSS Independent Basic Service Set. See BSS. An IBSS is the 802.11 term for
an adhoc network. See adhoc network.
ICMP Internet Control Message Protocol, an extension to the Internet
Protocol (IP) defined by RFC792. ICMP supports packets containing
error, control, and informational messages. The PING command, for
example, uses ICMP to test an Internet connection.
ICV ICV (Integrity Check Value) is a 4-byte code appended in standard
WEP to the 802.11 message. Enhanced WPA inserts an 8-byte MIC just
before the ICV. (See WPA and MIC)
IE Internet Explorer.
IEEE Institute of Electrical and Electronics Engineers, a technical
professional association, involved in standards activities.
IETF Internet Engineering Task Force, the main standards organization for
the Internet.
I
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 233
Infrastructure Mode An 802.11 networking framework in which devices communicate with
each other by first going through an Access Point (AP). In
infrastructure mode, wireless devices can communicate with each
other or can communicate with a wired network. (See ad-hoc mode
and BSS.)
Internet or IP telephony IP or Internet telephony are communications, such as voice, facsimile,
voice-messaging applications, that are transported over the Internet,
rather than the public switched telephone network (PSTN). IP
telephony is the two-way transmission of audio over a packet-
switched IP network (TCP/IP network).
An Internet telephone call has two steps: (1) converting the analog
voice signal to digital format, (2) translating the signal into Internet
protocol (IP) packets for transmission over the Internet. At the
receiving end, the steps are reversed. Over the public Internet, voice
quality varies considerably. Protocols that support Quality of Service
(QoS) are being implemented to improve this.
IP Internet Protocol is the method or protocol by which data is sent from
one computer to another on the Internet. Each computer (host) on the
Internet has at least one IP address that uniquely identifies it. Internet
Protocol specifies the format of packets, also called datagrams, and the
addressing scheme. Most networks combine IP with a higher-level
protocol called Transmission Control Protocol (TCP), which establishes
a virtual connection between a destination and a source.
IPC Interprocess Communication. A capability supported by some
operating systems that allows one process to communicate with
another process. The processes can be running on the same computer
or on different computers connected through a network.
IPsec
IPsec-ESP
IPsec-AH
Internet Protocol security (IPSec)
Internet Protocol security Encapsulating Security Payload (IPsec-ESP).
The encapsulating security payload (ESP) encapsulates its data,
enabling it to protect data that follows in the datagram. Internet
Protocol security Authentication Header (IPsec-AH). AH protects the
parts of the IP datagram that can be predicted by the sender as it will
be received by the receiver. IPsec is a set of protocols developed by
the IETF to support secure exchange of packets at the IP layer. IPsec
has been deployed widely to implement Virtual Private Networks
(VPNs). IPsec supports two encryption modes: Transport and Tunnel.
Transport mode encrypts only the data portion (payload) of each
packet, but leaves the header untouched. The more secure Tunnel
mode encrypts both the header and the payload. On the receiving
side, an IPSec-compliant device decrypts each packet. For IPsec to
work, the sending and receiving devices must share a public key. This
is accomplished through a protocol known as Internet Security
Association and Key Management Protocol/Oakley (ISAKMP/
Oakley), which allows the receiver to obtain a public key and
authenticate the sender using digital certificates.
I (Continued)
Glossary
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
234
isochronous Isochronous data is data (such as voice or video) that requires a
constant transmission rate, where data must be delivered within
certain time constraints. For example, multimedia streams require an
isochronous transport mechanism to ensure that data is delivered as
fast as it is displayed and to ensure that the audio is synchronized
with the video. Compare: asynchronous processes in which data
streams can be broken by random intervals, and synchronous
processes, in which data streams can be delivered only at specific
intervals.
ISP Internet Service Provider.
IV IV (Initialization Vector), part of the standard WEP encryption
mechanism that concatenates a shared secret key with a randomly
generated 24-bit initialization vector. WPA with TKIP uses 48-bit IVs,
an enhancement that significantly increases the difficulty in cracking
the encryption. (See WPA and TKIP)
L
LAN Local Area Network.
License installation
LSA Link State Advertisements received by the currently running OSPF
process. The LSAs describe the local state of a router or network,
including the state of the router's interfaces and adjacencies. See also
OSPF.
M
MAC Media Access Control layer. One of two sublayers that make up the
Data Link Layer of the OSI model. The MAC layer is responsible for
moving data packets to and from one Network Interface Card (NIC) to
another across a shared channel.
MAC address Media Access Control address. A hardware address that uniquely
identifies each node of a network.
MIB Management Information Base is a formal description of a set of
network objects that can be managed using the Simple Network
Management Protocol (SNMP). The format of the MIB is defined as
part of the SNMP. A MIB is a collection of definitions defining the
properties of a managed object within a device. Every managed device
keeps a database of values for each of the definitions written in the
MIB. Definition of the MIB conforms to RFC1155 (Structure of
Management Information).
I (Continued)
N
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 235
MIC Message Integrity Check or Code (MIC), also called “Michael”, is part
of WPA and TKIP. The MIC is an additional 8-byte code inserted
before the standard 4-byte integrity check value (ICV) that is
appended in by standard WEP to the 802.11 message. This greatly
increases the difficulty in carrying out forgery attacks.
Both integrity check mechanisms are calculated by the receiver and
compared against the values sent by the sender in the frame. If the
values match, there is assurance that the message has not been
tampered with. (See WPA, TKIP and ICV).
MTU Maximum Transmission Unit. The largest packet size, measured in
bytes, that a network interface is configured to accept. Any messages
larger than the MTU are divided into smaller packets before being
sent.
MU Mobile Unit, a wireless device such as a PC laptop.
multicast, broadcast,
unicast
Multicast: transmitting a single message to a select group of recipients.
Broadcast: sending a message to everyone connected to a network.
Unicast: communication over a network between a single sender and a
single receiver.
N
NAS Network Access Server, a server responsible for passing information
to designated RADIUS servers and then acting on the response
returned. A NAS-Identifier is a RADIUS attribute identifying the NAS
server. (RFC2138)
NAT Network Address Translator. A network capability that enables a
group of computers to dynamically share a single incoming IP
address. NAT takes the single incoming IP address and creates new IP
address for each client computer on the network.
Netmask In administering Internet sites, a netmask is a string of 0's and 1's that
mask or screen out the network part of an IP address, so that only the
host computer part of the address remains. A frequently-used netmask
is 255.255.255.0, used for a Class C subnet (one with up to 255 host
computers). The “.0” in the “255.255.255.0” netmask allows the specific
host computer address to be visible.
NIC Network Interface Card. An expansion board in a computer that
connects the computer to a network.
NMS Network Management System. The system responsible for managing a
network or a portion of a network. The NMS talks to network
management agents, which reside in the managed nodes.
M (Continued)
Glossary
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
236
NTP Network Time Protocol, an Internet standard protocol (built on top of
TCP/IP) that assures accurate synchronization to the millisecond of
computer clock times in a network of computers. Based on UTC, NTP
synchronizes client workstation clocks to the U.S. Naval Observatory
Master Clocks in Washington, DC and Colorado Springs CO. Running
as a continuous background client program on a computer, NTP sends
periodic time requests to servers, obtaining server time stamps and
using them to adjust the client's clock. (RFC1305)
O
OFDM Orthogonal frequency division multiplexing, a method of digital
modulation in which a signal is split into several narrowband
channels at different frequencies. OFDM is similar to conventional
frequency division multiplexing (FDM). The difference lies in the way
in which the signals are modulated and demodulated. Priority is given
to minimizing the interference, or crosstalk, among the channels and
symbols comprising the data stream. Less importance is placed on
perfecting individual channels.
OFDM is used in European digital audio broadcast services. It is also
used in wireless local area networks.
OID Object Identifier.
OPSEC OPSEC (Open Platform for Security) is a security alliance program
created by Check Point to enable an open industry-wide framework
for interoperability of security products and applications. Products
carrying the “Secured by Check Point” seal have been tested to
guarantee integration and interoperability.
OS Operating system.
OSI Open System Interconnection. An ISO standard for worldwide
communications that defines a networking framework for
implementing protocols in seven layers. Control is passed from one
layer to the next, starting at the application layer in one station, down
through the presentation, session, transport, network, data link layer
to the physical layer at the bottom, over the channel to the next station
and back up the hierarchy.
OSI Layer 2 At the Data Link layer (OSI Layer 2), data packets are encoded and
decoded into bits. The data link layer has two sublayers:
●the Logical Link Control (LLC) layer controls frame
synchronization, flow control and error checking
●The Media Access Control (MAC) layer controls how a computer
on the network gains access to the data and permission to transmit
it.
OSI Layer 3 The Network layer (OSI Layer 3) provides switching and routing
technologies, creating logical paths, known as virtual circuits, for
transmitting data from node to node. Routing and forwarding are
functions of this layer, as well as addressing, internetworking, error
handling, congestion control and packet sequencing.
N (Continued)
P
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 237
OSPF Open Shortest Path First, an interior gateway routing protocol
developed for IP networks based on the shortest path first or link-state
algorithm. Routers use link-state algorithms to send routing
information to all nodes in an internetwork by calculating the shortest
path to each node based on a topography of the Internet constructed
by each node. Each router sends that portion of the routing table
(keeps track of routes to particular network destinations) that
describes the state of its own links, and it also sends the complete
routing structure (topography). Using OSPF, a host that obtains a
change to a routing table or detects a change in the network
immediately multicasts the information to all other hosts in the
network so that all will have the same routing table information. The
host using OSPF sends only the part that has changed, and only when
a change has taken place. (RFC2328)
OUI Organizationally Unique Identifier (used in MAC addressing).
P
Packet The unit of data that is routed between an origin and a destination on
the Internet or any other packet-switched network. When any file is
sent from one place to another on the Internet, the Transmission
Control Protocol (TCP) layer of TCP/IP divides the file into packets.
Each packet is separately numbered and includes the Internet address
of the destination. The individual packets for a given file may travel
different routes through the Internet. When they have all arrived, they
are reassembled into the original file (by the TCP layer at the receiving
end).
PAP Password Authentication Protocol is the most basic form of
authentication, in which a user's name and password are transmitted
over a network and compared to a table of name-password pairs.
Typically, the passwords stored in the table are encrypted. (See
CHAP).
PDU Protocol Data Unit. A data object exchanged by protocol machines
(such as management stations, SMUX peers, and SNMP agents) and
consisting of both protocol control information and user data. PDU is
sometimes used as a synonym for “packet''.
PEAP PEAP (Protected Extensible Authentication Protocol) is an IETF draft
standard to authenticate wireless LAN clients without requiring them
to have certificates. In PEAP authentication, first the user authenticates
the authentication server, then the authentication server authenticates
the user. If the first phase is successful, the user is then authenticated
over the SSL tunnel created in phase one using EAP-Generic Token
Card (EAP-GTC) or Microsoft Challenged Handshake Protocol
Version 2 (MSCHAP V2). (See also EAP-TLS).
PHP server Hypertext Preprocessor
PKI Public Key Infrastructure
O (Continued)
Glossary
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
238
PoE Power over Ethernet. The Power over Ethernet standard (802.3af)
defines how power can be provided to network devices over existing
Ethernet connection, eliminating the need for additional external
power supplies.
POST Power On Self Test, a diagnostic testing sequence performed by a
computer to determine if its hardware elements are present and
powered on. If so, the computer begins its boot sequence.
push-to-talk (PTT) The push-to-talk (PTT) is feature on wireless telephones that allows
them to operate like a walkie-talkie in a group, instead of standard
telephone operation. The PTT feature requires that the network be
configured to allow multicast traffic.
A PTT call is initiated by selecting a channel and pressing the “talk”
key on the wireless telephone. All wireless telephones on the same
network that are monitoring the channel will hear the transmission.
On a PTT call you hold the button to talk and release it to listen.
Q
QoS Quality of Service. A term for a number of techniques that intelligently
match the needs of specific applications to the network resources
available, using such technologies as Frame Relay, Asynchronous
Transfer Mode (ATM), Ethernet and 802.1 networks, SONET, and
IP-routed networks. QoS features provide better network service by
supporting dedicated bandwidth, improving loss characteristics,
avoiding and managing network congestion, shaping network traffic,
setting traffic priorities across the network.
Quality-of-Service (QoS): A set of service requirements to be met by
the network while transporting a flow. (RFC2386)
R
RADIUS Remote Authentication Dial-In User Service. An authentication and
accounting system that checks User Name and Password and
authorizes access to a network. The RADIUS specification is
maintained by a working group of the IETF (RFC2865 RADIUS,
RFC2866 RADIUS Accounting, RFC2868 RADIUS Attributes for
Tunnel Protocol Support).
RF Radio Frequency, a frequency in the electromagnetic spectrum
associated with radio wave propagation. When an RF current is
supplied to an antenna, an electromagnetic field is created that can
propagate through space. These frequencies in the electromagnetic
spectrum range from Ultra-low frequency (ULF) -- 0-3 Hz to
Extremely high frequency (EHF) -- 30GHz - 300 GHz. The middle
ranges are: Low frequency (LF) -- 30 kHz - 300 kHz, Medium
frequency (MF) -- 300 kHz - 3 MHz, High frequency (HF) -- 3MHz - 30
MHz, Very high frequency (VHF) -- 30 MHz - 300 MHz, Ultra-high
frequency (UHF)-- 300MHz - 3 GHz.
P (Continued)
S
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 239
RFC Request for Comments, a series of notes about the Internet, submitted
to the Internet Engineering Task Force (IETF) and designated by an
RFC number, that may evolve into an Internet standard. The RFCs are
catalogued and maintained on the IETF RFC website: www.ietf.org/
rfc.html.
Roaming In 802.11, roaming occurs when a wireless device (a station) moves
from one Access Point to another (or BSS to another) in the same
Extended Service Set (ESS) -identified by its SSID.
RP-SMA Reverse Polarity-Subminiature version A, a type of connector used
with wireless antennas
RSN Robust Security Network. A new standard within IEEE 802.11 to
provide security and privacy mechanisms. The RSN (and related TSN)
both specify IEEE 802.1x authentication with Extensible Authentication
Protocol (EAP).
RSSI RSSI received signal strength indication (in 802.11 standard)
RTS / CTS RTS request to send, CTS clear to send (in 802.11 standard)
S
Segment In Ethernet networks, a section of a network that is bounded by
bridges, routers or switches. Dividing a LAN segment into multiple
smaller segments is one of the most common ways of increasing
available bandwidth on the LAN.
SLP Service Location Protocol. A method of organizing and locating the
resources (such as printers, disk drives, databases, e-mail directories,
and schedulers) in a network. Using SLP, networking applications can
discover the existence, location and configuration of networked
devices.
With Service Location Protocol, client applications are 'User Agents'
and services are advertised by 'Service Agents'. The User Agent issues
a multicast 'Service Request' (SrvRqst) on behalf of the client
application, specifying the services required. The User Agent will
receive a Service Reply (SrvRply) specifying the location of all services
in the network which satisfy the request.
For larger networks, a third entity, called a 'Directory Agent', receives
registrations from all available Service Agents. A User Agent sends a
unicast request for services to a Directory Agent (if there is one) rather
than to a Service Agent.
(SLP version 2, RFC2608, updating RFC2165)
SMI Structure of Management Information. A hierarchical tree structure for
information that underlies Management Information Bases (MIBs), and
is used by the SNMP protocol. Defined in RFC1155 and RFC1442
(SNMPv2).
R (Continued)
Glossary
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
240
SMT (802.11) Station ManagemenT. The object class in the 802.11 MIB that provides
the necessary support at the station to manage the processes in the
station such that the station may work cooperatively as a part of an
IEEE 802.11 network. The four branches of the 802.11 MIB are:
●dot11smt - objects related to station management and local
configuration
●dot11mac - objects that report/configure on the status of various
MAC parameters
●dot11res - Objects that describe available resources
●dot11phy - Objects that report on various physical items.
SNMP Simple Network Management Protocol. A set of protocols for
managing complex networks. SNMP works by sending messages,
called protocol data units (PDUs), to different parts of a network.
SNMP-compliant devices, called agents, store data about themselves
in Management Information Bases (MIBs) and return this data to the
SNMP requesters.
SNMP includes a limited set of management commands and
responses. The management system issues Get, GetNext and Set
messages to retrieve single or multiple object variables or to establish
the value of a single variable. The managed agent sends a Response
message to complete the Get, GetNext or Set.
SNMP trap An event notification sent by the SNMP managed agent to the
management system to identify the occurrence of conditions (such as a
threshold that exceeds a predetermined value).
SSH Secure Shell, sometimes known as Secure Socket Shell, is a Unix-based
command interface and protocol for securely getting access to a
remote computer. SSH is a suite of three utilities - slogin, ssh, and scp
- secure versions of the earlier UNIX utilities, rlogin, rsh, and rcp.
With SSH commands, both ends of the client/server connection are
authenticated using a digital certificate, and passwords are protected
by being encrypted.
SSID Service Set Identifier. A 32-character unique identifier attached to the
header of packets sent over a Wireless LAN that acts as a password
when a wireless device tries to connect to the Basic Service Set (BSS).
Several BSSs can be joined together to form one logical WLAN
segment, referred to as an extended service set (ESS). The SSID is used
to identify the ESS.
In 802.11 networks, each Access Point advertises its presence several
times per second by broadcasting beacon frames that carry the ESS
name (SSID). Stations discover APs by listening for beacons, or by
sending probe frames to search for an AP with a desired SSID. When
the station locates an appropriately-named Access Point, it sends an
associate request frame containing the desired SSID. The AP replies
with an associate response frame, also containing the SSID.
Some APs can be configured to send a zero-length broadcast SSID in
beacon frames instead of sending their actual SSID. The AP must
return its actual SSID in the probe response.
S (Continued)
S
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 241
SSL Secure Sockets Layer. A protocol developed by Netscape for
transmitting private documents via the Internet. SSL works by using a
public key to encrypt data that's transferred over the SSL connection.
URLs that require an SSL connection start with https: instead of http.
SSL uses a program layer located between the Internet's Hypertext
Transfer Protocol (HTTP) and Transport Control Protocol (TCP) layers.
The “sockets” part of the term refers to the sockets method of passing
data back and forth between a client and a server program in a
network or between program layers in the same computer. SSL uses
the public-and-private key encryption system from RSA, which also
includes the use of a digital certificate.
SSL has recently been succeeded by Transport Layer Security (TLS),
which is based on SSL.
Subnet mask (See netmask)
Subnets Portions of networks that share the same common address format. A
subnet in a TCP/IP network uses the same first three sets of numbers
(such as 198.63.45.xxx), leaving the fourth set to identify devices on the
subnet. A subnet can be used to increase the bandwidth on the
network by breaking the network up into segments.
SVP SpectraLink Voice Protocol, a protocol developed by SpectraLink to be
implemented on access points in order to facilitate voice prioritization
over an 802.11 wireless LAN that will carry voice packets from
SpectraLink wireless telephones.
Switch In networks, a device that filters and forwards packets between LAN
segments. Switches operate at the data link layer (layer 2) and
sometimes the network layer (layer 3) of the OSI Reference Model and
therefore support any packet protocol. LANs that use switches to join
segments are called switched LANs or, in the case of Ethernet
networks, switched Ethernet LANs.
syslog A protocol used for the transmission of event notification messages
across networks, originally developed on the University of California
Berkeley Software Distribution (BSD) TCP/IP system
implementations, and now embedded in many other operating
systems and networked devices. A device generates a messages, a
relay receives and forwards the messages, and a collector (a syslog
server) receives the messages without relaying them.
Syslog uses the user datagram protocol (UDP) as its underlying
transport layer mechanism. The UDP port that has been assigned to
syslog is 514. (RFC3164)
S (Continued)
Glossary
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
242
T
TCP / IP Transmission Control Protocol. TCP, together with IP (Internet
Protocol), is the basic communication language or protocol of the
Internet. Transmission Control Protocol manages the assembling of a
message or file into smaller packets that are transmitted over the
Internet and received by a TCP layer that reassembles the packets into
the original message. Internet Protocol handles the address part of
each packet so that it gets to the right destination.
TCP/IP uses the client/server model of communication in which a
computer user (a client) requests and is provided a service (such as
sending a Web page) by another computer (a server) in the network.
TFTP Trivial File Transfer Protocol. An Internet software utility for
transferring files that is simpler to use than the File Transfer Protocol
(FTP) but less capable. It is used where user authentication and
directory visibility are not required. TFTP uses the User Datagram
Protocol (UDP) rather than the Transmission Control Protocol (TCP).
TFTP is described formally in Request for Comments (RFC) 1350.
TKIP Temporal Key Integrity Protocol (TKIP) is an enhancement to the WEP
encryption technique that uses a set of algorithms that rotates the
session keys. TKIPs’ enhanced encryption includes a per-packet key
mixing function, a message integrity check (MIC), an extended
initialization vector (IV) with sequencing rules, and a re-keying
mechanism. The encryption keys are changed (rekeyed) automatically
and authenticated between devices after the rekey interval (either a
specified period of time, or after a specified number of packets has
been transmitted).
TLS Transport Layer Security. (See EAP, Extensible Authentication
Protocol)
ToS / DSCP ToS (Type of Service) / DSCP (Diffserv Codepoint). The ToS/DSCP
box contained in the IP header of a frame is used by applications to
indicate the priority and Quality of Service (QoS) for each frame. The
level of service is determined by a set of service parameters which
provide a three way trade-off between low-delay, high-reliability, and
high-throughput. The use of service parameters may increase the cost
of service.
TSN Transition Security Network. A subset of Robust Security Network
(RSN), which provides an enhanced security solution for legacy
hardware. The Wi-Fi Alliance has adopted a solution called Wireless
Protected Access (WPA), based on TSN. RSN and TSN both specify
IEEE 802.1x authentication with Extensible Authentication Protocol
(EAP).
Tunnelling Tunnelling (or encapsulation) is a technology that enables one
network to send its data via another network's connections.
Tunnelling works by encapsulating packets of a network protocol
within packets carried by the second network. The receiving device
then decapsulates the packets and forwards them in their original
format.
U
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 243
U
UDP User Datagram Protocol. A connectionless protocol that, like TCP,
runs on top of IP networks. Unlike TCP/IP, UDP/IP provides very
few error recovery services, offering instead a direct way to send and
receive packets over an IP network. It is used primarily for
broadcasting messages over a network.
U-NII Unlicensed National Information Infrastructure. Designated to provide
short-range, high-speed wireless networking communication at low
cost, U-NII consists of three frequency bands of 100 MHz each in the 5
GHz band: 5.15-5.25GHz (for indoor use only), 5.25-5.35 GHz and
5.725-5.825GHz. The three frequency bands were set aside by the FCC
in 1997 initially to help schools connect to the Internet without the
need for hard wiring. U-NII devices do not require licensing.
URL Uniform Resource Locator. the unique global address of resources or
files on the World Wide Web. The URL contains the name of the
protocol to be used to access the file resource, the IP address or the
domain name of the computer where the resource is located, and a
pathname -- a hierarchical description that specifies the location of a
file in that computer.
V
VoIP Voice Over Internet Protocol. An internet telephony technique. With
VoIP, a voice transmission is cut into multiple packets, takes the most
efficient path along the Internet and is reassembled when it reaches
the destination.
VPN Virtual Private Network. A private network that is constructed by
using public wires to connect nodes. These systems use encryption
and other security mechanisms to ensure that only authorized users
can access the network and that the data cannot be intercepted.
VSA Vendor Specific Attribute, an attribute for a RADIUS server defined by
the manufacturer.(compared to the RADIUS attributes defined in the
original RADIUS protocol RFC2865). A VSA attribute is defined in
order that it can be returned from the RADIUS server in the Access
Granted packet to the Radius Client.
W
Walled Garden A restricted subset of network content that wireless devices can access.
WEP Wired Equivalent Privacy. A security protocol for wireless local area
networks (WLANs) defined in the 802.11b standard. WEP aims to
provide security by encrypting data over radio waves so that it is
protected as it is transmitted from one end point to another.
Wi-Fi Wireless fidelity. A term referring to any type of 802.11 network,
whether 802.11b, 802.11a, dual-band, etc. Used in reference to the Wi-
Fi Alliance, a nonprofit international association formed in 1999 to
certify interoperability of wireless Local Area Network products based
on IEEE 802.11 specification.
Glossary
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
244
WINS Windows Internet Naming Service. A system that determines the IP
address associated with a particular network computer, called name
resolution. WINS supports network client and server computers
running Windows and can provide name resolution for other
computers with special arrangements. WINS supports dynamic
addressing (DHCP) by maintaining a distributed database that is
automatically updated with the names of computers currently
available and the IP address assigned to each one.
DNS is an alternative system for name resolution suitable for network
computers with fixed IP addresses.
WLAN Wireless Local Area Network.
WM-AD WM Access Domain Services (WM-AD). Extreme Networks’ means of
mapping wireless networks to the topology of an existing wired
network. When you set up WM-AD on the Summit WM series switch,
you are defining subnets for groups of wireless users. This WM-AD
definition creates a virtual IP subnet where the Summit WM series
switch acts as a default gateway for wireless devices. This technique
enables policies and authentication to be applied to the groups of
wireless users on a WM-AD, as well as the collecting of accounting
information. When a WM-AD is set up on the Summit WM series
switch, one or more Altitude APs (by radio) are associated with it. A
range of IP addresses is set aside for the Summit WM series switch's
DHCP server to assign to wireless devices.
WMM Wi-Fi Multimedia (WMM), a Wi-Fi Alliance certified standard that
provides multimedia enhancements for Wi-Fi networks that improve
the user experience for audio, video, and voice applications. This
standard is compliant with the IEEE 802.11e Quality of Service (QoS)
extensions for 802.11 networks. WMM provides prioritized media
access by shortening the time between transmitting packets for higher
priority traffic. WMM is based on the Enhanced Distributed Channel
Access (EDCA) method.
WPA Wireless Protected Access, or Wi-Fi Protected Access is a security
solution adopted by the Wi-Fi Alliance that adds authentication to
WEPs’ basic encryption. For authentication, WPA specifies IEEE 802.1x
authentication with Extensible Authentication Protocol (EAP). For
encryption, WPA uses the Temporal Key Integrity Protocol (TKIP)
mechanism, which shares a starting key between devices, and then
changes their encryption key for every packet. Certificate
Authentication (CA) can also be used. Also part of the encryption
mechanism are 802.1X for dynamic key distribution and Message
Integrity Check (MIC) a.k.a. Michael.
WPA requires that all computers and devices have WPA software.
W (Continued)
W
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 245
Summit WM series switch, access points, and WLAN
switch software terms and abbreviations
WPA-PSK Wi-Fi Protected Access with Pre-Shared Key, a special mode of WPA
for users without an enterprise authentication server. Instead, for
authentication, a Pre-Shared Key is used. The PSK is a shared secret
(passphrase) that must be entered in both the Altitude AP or router
and the WPA clients.
This preshared key should be a random sequence of characters at least
20 characters long or hexadecimal digits (numbers 0-9 and letters A-F)
at least 24 hexadecimal digits long. After the initial shared secret, the
Temporal Key Integrity Protocol (TKIP) handles the encryption and
automatic rekeying.
Term Explanation
Altitude AP The Altitude AP is a wireless LAN thin access point (IEEE 802.11)
provided with unique software that allows it to communicate only
with a Summit WM series switch. (A thin access point handles the
radio frequency (RF) communication but relies on a controller to
handle WLAN elements such as authentication.) The Altitude AP also
provides local processing such as encryption. The Altitude AP is a
dual-band access point, with both 802.11a and 802.11b/g radios.
CTP CAPWAP Tunnelling Protocol (CTP). The Altitude AP uses a UDP
(User Datagram Protocol) based tunnelling protocol called CAPWAP
Tunnelling Protocol (CTP) to encapsulate the 802.11 packets and
forward them to the Summit WM series switch.
The CTP protocol defines a mechanism for the control and
provisioning of Altitude APs (CAPWAP) through centralized access
controllers. In addition, it provides a mechanism providing the option
to tunnel the mobile client data between the access point and the
access controller.
Data Collector The Data Collector is an application on the Summit WM series switch
that receives and manages the Radio Frequency (RF) scan messages
sent by the Altitude AP. This application is part of the Summit spy
technique, working in conjunction with the scanner mechanism and
the Analysis Engine to assist in detecting rogue access points.
DRM (dynamic radio/RF
management)
The DRM feature consists of software on the Altitude AP that
provides dynamic radio frequency (RF) management. For Altitude
APs with the DRM feature enabled and on a common channel, the
power levels will be adjusted to balance coverage if an Altitude AP is
added to, or leaves, the network. The feature also allows wireless
clients to be moved to another Altitude AP if the load is too high. The
feature can also be set to scan automatically for a channel, using a
channel selection algorithm.
W (Continued)
Glossary
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
246
Langley Langley is a Summit WM series switch, access points, and WLAN
switch software term for the inter-process messaging infrastructure on
the Summit WM series switch.
Mobility manager (and
mobility agent)
The technique in Summit WM series switch, access points, and WLAN
switch software by which multiple Summit WM series switches on a
network can discover each other and exchange information about a
client session. This enables a wireless device user to roam seamlessly
between different Altitude APs on different Summit WM series
switches, to provide mobility to the wireless device user.
One Summit WM series switch on the network must be designated as
the mobility manager. All other Summit WM series switches are
designated as mobility agents. Relying on SLP, the mobility manager
registers with the Directory Agent and the mobility agents discover
the location of the mobility manager.
Summit WM series switch The Summit WM series switch is a rack-mountable network device
designed to be integrated into an existing wired Local Area Network
(LAN). It provides centralized control over all access points (both
Altitude APs and third-party access points) and manages the network
assignment of wireless device clients associating through access
points.
Summit spy The Summit spy is a mechanism that assists in the detection of rogue
access points. The feature has three components: (1) a radio frequency
(RF) scanning task that runs on the Altitude AP, (2) an application
called the Data Collector on the Summit WM series switch that
receives and manages the RF scan messages sent by the Altitude AP,
(3) an Analysis Engine on the Summit WM series switch that processes
the scan data.
WM-AD WM Access Domain Services (WM-AD). Extreme Networks’ means of
mapping wireless networks to the topology of an existing wired
network. When you set up WM-AD on the Summit WM series switch,
you are defining subnets for groups of wireless users. This WM-AD
definition creates a virtual IP subnet where the Summit WM series
switch acts as a default gateway for wireless devices. This technique
enables policies and authentication to be applied to the groups of
wireless users on a WM-AD, as well as the collecting of accounting
information. When a WM-AD is set up on the Summit WM series
switch, one or more Altitude APs (by radio) are associated with it. A
range of IP addresses is set aside for the Summit WM series switch's
DHCP server to assign to wireless devices.
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 247
ASystem states and LEDs
Summit WM series switch system states and LEDs
The Summit WM series switch has the two system states: Standby and Active.
It enters Standby state when shut down in the user interface. During this state, the Summit WM series
switch:
●sends a control message to Altitude APs to enter Standby state
●does not handle any wireless traffic or sessions
●disables DHCP, Policy Manager, Security Manager, Altitude AP Manager, and Redirector
●remains on the wired network
The Summit WM series switch enters Active state on startup in the user interface. It responds to the
Altitude AP's discover message by returning a message indicating that the Altitude AP can enter the
active state.
Activity and traffic monitoring
The activity and traffic on the Summit WM series switch is monitored via three LEDs on the back of the
Summit WM series switch. These LEDs are Link, Status, and Activity.
The three LEDs perform the following functions:
●Link LED: Displays the link status of management port Ethernet link as seen by the system software.
This LED is only visible at the back of the Summit WM series switch
●Status LED: Indicates the state of the controller from software point of view, normal operation,
whether processes have gone down, are restarting, and so on. This LED is visible from both the front
and the back of the Summit WM series switch.
●Activity LED: Indicates the amount of traffic carried to and from Altitude APs. This LED is visible
from both the front and the back of the Summit WM series switch.
System states and LEDs
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
248
Table 18 shows the sequence of the Status and Activity LEDs.
Altitude AP system states
For the Altitude AP, the Status LED in the center also indicates power. The Status LED is dark when
unit is off and is green (solid) when the AP has completed discovery and is operational.
The chart below shows states and corresponding Status LED displays:
Table 18: Status and Activity LED sequence
System State Status LED Activity LED
Power up Off Off
Services started: WDTSTAT installed (init.d starts services) Blinking Amber Off
Startup Manager Task started Solid Amber Blinking Amber
Startup Manager Task completes startup – all components
started
Solid Green Blinking green, if traffic
Blank, if no traffic
A component fails to start or needs restarting (Startup Manager
Task retrying that component)
Solid Amber Blinking green
Summit WM series switch fails to boot Solid Red Off
A component fails (no more retries) Solid Red Off
System about to be reset by watchdog Blinking Red Off
Table 19: Altitude AP system states and status LED displays
State / Process Description LEDs
Power Altitude AP not powered. Off
Power Start up: Power On Self Test (POST) Steady green
(briefly)
Power Power On Self Test (POST) successful Off (briefly)
Discovery If the POST self test is successful, the AP begins Discovery process.
Altitude AP is powered on and searching for an active Summit WM
series switch. It sends a discover message and waits for a response
Orange (steady)
Fail to find DHCP Altitude AP failed to find DHCP (will stay in this state until a route
appears).
Red-orange
(alternate blink)
Failed discovery If there are SLP issues in failed discovery, the LED display changes. Green-orange
(alternate blink)
Registration Altitude AP learns the Summit WM series switch's IP address, and
can begin the Registration process
Orange (blink)
Failed Registration Altitude AP fails to learn the Summit WM series switch's IP address. Red (blink)
Standby 1 Altitude AP enters this state from Discovery when it encounters
an active Summit WM series switch and completes the
Registration process.
2 Altitude AP enters this state from Active when it receives a
control message from the Summit WM series switch to enter this
state. If the Altitude AP has any wireless device traffic, it will
drop the traffic.
Green (blink)
Altitude AP fails to register. It will wait 5 seconds and try again. Red (slow blink)
Firmware download from the Summit WM series switch is in progress Orange + green
(blink)
Altitude AP system states
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 249
Active (Ready) Altitude AP has received a control message from an active Summit
WM series switch to enter active or ready state. It is ready to receive
wireless traffic.
Note: The two Traffic LEDs on either side of the Status LED display
a green (blink) if there is active wireless traffic. The left LED is for
the 2.4 GHz radio. The right LED is for the 5 GHz radio.
Green (steady)
Vulnerable time
interval
Vulnerable time interval (the Summit WM series switch resets to
factory default if powered-off for three consecutive times during this
state). No vulnerable period when access point is resetting to factory
defaults.
Left: Green/Off
Center: Off/Green
Right: Green/Off
Upgrading firmware Altitude AP is upgrading its firmware Center: Red/Green
Table 19: Altitude AP system states and status LED displays (Continued)
State / Process Description LEDs
System states and LEDs
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
250
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 251
BRegulatory Information
This section provides the regulatory information for the Summit WM 200/2000 series switch and
Altitude 350-2 Access Point.
Configuration of the Altitude 350-2 frequencies and power output are controlled by the regional
software purchased with the Summit WM series switch and are downloaded from the sever upon initial
set-up. A company is only allowed to download the software related it it's geographic location, thus
allowing the proper set-up of Access points in accordance with local laws and regulation. The Altitude
350-2 AP must not be operated until proper regional software is downloaded and properly configured.
NOTE
Please refer to http://www.extremenetworks.com/go/rfcertification.htm for latest regulatory information regarding
operation of the Altitude 350-2 Access Point.
Only authorized Extreme Networks service personnel are permitted to service the system. Procedures that should be
performed only by Extreme Networks personnel are clearly identified in this guide.
Changes or modifications made to the Summit WM series switch or the Altitude APs which are not expressly
approved by Extreme and party responsible for compliance upon installation could void the user's authority to
operate the equipment.
If agency verification testing is required, contact Extreme Networks for additional instructions.
Summit WM200 (15955), Summit WM2000 (15956)
Safety Standards
North American Safety of ITE:
●UL 60950-1:2003 1st Ed., Listed Device (US)
●CSA 22.2#60950-1-03 1st Ed. (Canada)
European Safety of ITE:
●EN60950-1:2001+A11
●TUV-R GS Mark by German Notified Body
●73/23/EEC Low Voltage Directive
International Safety of ITE:
●CB Report & Certificate per IEC 60950-1:2001+ Country Deviations
●AS/NZX 3260 (Australia /New Zealand)
Regulatory Information
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
252
EMI/EMC Standards
North America EMC for ITE:
●FCC CFR 47 part 15 Class A (USA)
●ICES-003 Class A (Canada)
European EMC standards
●EN 55022:1998 Class A
●EN 55024:1998 Class A
includes IEC 61000-4-2, 3, 4, 5, 6, 11
●EN 61000-3-2,3 (Harmonics & Flicker)
●ETSI EN 300 386:2001 (EMC Telecommunications)
●89/336/EEC EMC Directive
International EMC Certifications:
●CISPR 22:1997 Class A (International Emissions)
●CISPR 24:1997 Class A (International Immunity)
●IEC/EN 61000-4-2 Electrostatic Discharge, 8kV Contact, 15kV Air, Criteria A
●IEC/EN 61000-4-3 Radiated Immunity 10V/m, Criteria A
●IEC/EN 61000-4-4 Transient Burst, 1kV, Criteria A
●IEC/EN 61000-4-5 Surge, 2kV L-L, 2kV L-G, Level 3, Criteria A
●IEC/EN 61000-4-6 Conducted Immunity, 0.15-80MHz, 10V/m unmod. RMS, Criteria A
●IEC/EN 61000-4-11 Power Dips & Interruptions, >30%, 25 periods, Criteria C
Country Specific:
●VCCI Class A (Japan Emissions)
●AS/NZS 3548 ACA (Australia Emissions)
●CNS 13438:1997 Class A (BSMI-Taiwan)
●NOM/NYCE (Mexico)
●ANATEL (Brazil)
●Argentina Form B
●MIC Mark, EMC Approval (Korea)
Telecom Standards
●ETSI EN 300 386:2001 (EMC Telecommunications)
●ETSI EN 300 019 (Environmental for Telecommunications)
Summit WM200 (15955), Summit WM2000 (15956)
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 253
Physical and Environmental
Product Dimensions:
●Width: 17.3 inches (44 cm)
●Depth: 13 inches (33 cm)-with module levers
●Height: 4.4 inches (11.1 cm)-2.5U rack according to IEC 60297-5-100 and IEC 60297-5-107 for front
mounted modules
Product Weight:
●21 lbs (9.4 kg)-with dual PSU
Package Dimensions:
●Width: 25.2 inches (63.5 cm)
●Depth: 18.1 inches (46 cm)
●Height: 9.4 inches (24 cm)
Package Weight:
●27 lbs (12.3 kg)
Environmental Operating Conditions for Summit WM100/1000,
Summit WM200/2000, and Altitude 350-2 AP
Environmental Standards:
●EN/ETSI 300 019-2-1 v2.1.2 - Class 1.2 Storage
●EN/ETSI 300 019-2-2 v2.1.2 - Class 2.3 Transportation
●EN/ETSI 300 019-2-3 v2.1.2 - Class 3.1e Operational
●EN/ETSI 300 753 (1997-10) - Acoustic Noise
●ASTM D3580 Random Vibration Unpackaged 1.5G
Operational Environment:
●Operating Temperature Range. 0 C to +40 C (32º F to 104º F)
●Operating Relative Humidity110 - 90% RH
●Operating Altitude 0 – 3000 meters (9,850 ft)
●Operating Shock (In Rack)13G, 11ms, 60 shocks
●Operational Office Vibration (In Rack)15-100-5 Hz @ 2/10G, 0-Peak, 1 Oct./min.
●Operational Random Vibration13-500 Hz @ 1.5G rms
1. Worst-case operational condition. Not for extended use under this condition.
Regulatory Information
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
254
Storage & Transportation Environment:
●Storage & Transportation Temp.Range1–40º C to +70º C (-40º F to 158º F)
●Storage & Transportation Relative Humidity110 - 95% RH
●Storage & Transportation Shock118G @ 6ms, 600 shocks (package < 50kg)
●Storage & Transportation Random Vib.15-20 Hz @ 1.0 ASD w/-3dB/oct. from 20-200 Hz
●Storage & Transportation Packaging Drop114 drops min on sides & corners @ 39.4”
(<15kg box)
Altitude 350-2 Int. AP (15958) AP, Altitude 350-2
Detach. AP (15939)
The above Altitude 350-2 AP models are Wi-Fi certified for operation in accordance with
IEEE 802.11a/b/g. Certification# WFA3822.
NOTE
Operation in the European Community and rest of the world may be dependant on securing local licenses/
certifications/regulatory approvals. For details and information on the most recent country-specific requirements for
the Altitude 350-2 AP, go to the following website: http://www.extremenetworks.com/go/rfcertification.htm.
United States - FCC Declaration of Conformity Statement
This device complies with Part 15 of the FCC Rules. Operation is subject to the following two
conditions:
●This device may not cause harmful interference.
●This device must accept any interference received, including interference that may cause undesired
operation.
This equipment has been tested and found to comply with the limits for a Class B digital device,
pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against
harmful interference when the equipment is operated in a residential and business environment. This
equipment generates, uses, and radiates radio frequency energy, and if not installed and used in
accordance with instructions, may cause harmful interference. However, there is no guarantee that
interference will not occur. If this equipment does cause harmful interference, which can be determined
by turning the equipment off and on, the user is encouraged to try to correct the interference by one or
more of the following measures:
●Reorient or relocate the transceiver antenna.
●Increase the distance between the equipment and transceiver.
1. Worst-case Storage & Transportation condition.
Altitude 350-2 Int. AP (15958) AP, Altitude 350-2 Detach. AP (15939)
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 255
●Connect the equipment to an outlet on a circuit different from that to which the effected equipment
is connected.
●Consult the dealer or an experienced radio/TV technician for suggestion.
This equipment meets the conformance standards listed in Table 20.
NOTE
The Altitude 350-2 AP must be installed and used in strict accordance with the manufacture's instructions as
described in this guide and the quick start guide for the device to which Altitude 350-2 AP is connected. Any other
installation or use of the product violates FCC Part 15 regulations.
NOTE
Operation of the Altitude 350-2 AP is restricted for indoor use only, in the UNII 5.15 - 5.25 GHz band in
accordance with 47 CFR 15.407(e).
CAUTION
This Part 15 radio device operates on a non-interference basis with other devices operating at this frequency when
using integrated antennas or other Extreme Networks certified antennas. Any changes or modification to the product
not expressly approved by Extreme Networks could void the user's authority to operate this device.
Conditions Under Which a Second party may replace a
Part 15 Unlicensed Antenna
Second party antenna replacement (end user or second manufacturer) is permitted under the conditions
listed below, with no testing or filing requirement. The general technical requirement of FCC Part 15.15
(a)(b)(c) still applies, however.
●Replacement antennas must be equal or lower then 4dBi gain within 2.4Ghz range and 5dB gain
within 5GHz range. The replacement antenna must be of same type (Omnidirectional Tri band with
Reverse SMA connectors) as previously authorized by the Commission/TCB.
Table 20: USA Conformance Standards
Safety • UL 60950-1:2001 1st Edition,
Listed Accessory
• UL 2043 Plenum Rated
EMC • FCC CFR 47 Part 15 Class B
Radio Transceiver • CFR 47 Part 15.247, Class C, 2.4 GHz
• CFR 47 Part 15.407, Class C, 5 GHz
• CFR 47 Part 15.205, 15.207, 15.209
• CFR 47 Part 2.1091, 2.1093
• FCC OET No. 65 1997
Other:
• IEEE 802.11a (5 Ghz)
• IEEE 802.11b/g (2.4 GHz)
• IEEE 802.3af
• FCC ID: RJF-A3502A
Environmental See Environmental Conditions.
FCC ID#: RJF-A3502A
Regulatory Information
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
256
●Replacement antennas must be the same pattern type (i.e. similar in-band and out-of-band antenna
beam patterns). Special care must be taken when adhering to this condition; the antenna beam
patterns of the antennas tested must be compared with the beam patterns of the replacement
antennas for similarities.
●Integral and detachable antennas included with the Altitude 350-2 AP models have been tested and
included within the FCC/TCB grant. Any other antennas used with the Altitude 350-2 AP models
must follow these guidelines to be used legally with the Altitude 350-2 AP.
●Antennas offered for sale by Extreme Networks have been tested using the highest gain of each
antenna type at maximum output power.
FCC RF Radiation Exposure Statement
The Altitude 350-2 Access Point complies with FCC RF radiated exposure limits set forth for an
uncontrolled environment. End users must follow the specific operating instructions for satisfying RF
exposure compliance. This device has been tested and has demonstrated compliance when
simultaneously operated in the 2.4 GHz and 5 GHz frequency ranges. This device must not be co-
located or operated in conjunction with any other antenna or transmitter.
NOTE
The radiated output power of the Altitude 350-2 APs far below the FCC radio frequency exposure limits as specified
in “Guidelines for Human Exposure to Radio Frequency Electromagnetic Fields” (OET Bullet 65, Supplement C).
This equipment should be installed and operated with a minimum distance of 20 centimeters (8 inches) between
the radiator and your body or other co-located operating antennas.
Department of Communications Canada Compliance Statement
This digital apparatus does not exceed the Class B limits for radio noise emissions from digital
apparatus as set out in the interference-causing equipment standard entitled “Digital Apparatus,” ICES-
003 of the Department of Communications.
Cet appareil numerique respecte les limites de bruits radioelectriques applicables aux appareils
numeriques de Classe B prescrites dans la norme sur le materiel brouilleur: “Appareils Numeriques,”
NMB-003 edictee par le ministere des Communications.
This device complies with Part 15 of the FCC Rules and Canadian Standard RSS-210. Operation is
subject to the following conditions: (1) This device may not cause harmful interference, and (2) this
device must accept any interference received, including interference that may cause undesired
operation. This Class B device digital apparatus complies with Canada ICES-003.
Altitude 350-2 Int. AP (15958) AP, Altitude 350-2 Detach. AP (15939)
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 257
This equipment meets the following conformance standards:
●Operation in the 5150-5250 MHz band is limited to indoor use only to reduce potential for harmful
interference to co-channel mobile satellite systems.
●The maximum antenna gain permitted for operation in the 5250-5350 MHz band to comply with the
e.i.r.p. limit is 4.3 dBi for the internal antenna and 5 dBi for the external antenna.
●The maximum antenna gain permitted for operation in the 5725-5825 MHz band to comply with the
e.i.r.p. limit is 4.3 dBi for the internal antenna and 5 dBi for the external antenna.
●Please note that high power radars are allocated as primary users (meaning they have priority) in
the 5250-5350 MHz and 5650-5850 MHz bands and these radars could cause interference and/or
damage to LE-LAN devices.
European Community
The Altitude 350-2 APs are wireless ports designed for use in the European Union and other countries
with similar regulatory restrictions where the end user or installer is allowed to configure the wireless
port for operation by entry of a country code relative to a specific country. Upon connection to the
switch the software will prompt the user to enter a country code. After the country code is entered, the
switch will set up the wireless port with the proper frequencies and power outputs for that country
code.
Table 21: Canada Conformance Standards
Safety • cULus Listed Accessory
#60950-1-03 1st edition
• Plenum Rated Enclosure
EMC • ICES-003 Class B
Radio
Transceiver
• RSS-210
• RSS-139-1
• RSS-102 FR Exposure
• ID# 4141A-3502
Other:
• IEEE 802.11a (5 GHz)
• IEEE 802.11b/g (2.4 GHz)
• IEEE 802.3af
Environmental See Environmental Conditions.
Regulatory Information
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
258
Declaration of Conformity with regard to R&TTE Directive of the
European Union 1999/5/EC
The symbol indicates compliance with the Essential Requirements of the R&TTE Directive
of the European Union (1999/5/EC). The Altitude 350-2 Int. AP (15958) and Altitude 350-2 Detach.
15939 models meet the following conformance standards.
NOTE
A signed copy of the Declaration of Conformity (DoC) in accordance with the preceding directives and standards has
been made and is available at www.extremenetworks.com/go/rfcertification.htm.
Conditions of Use in the European Community
The Altitude 350-2 Access Point with integrated and detachable antennas is designed and intended to
be used indoors. Some EU countries allow outdoor operation with limitations and restrictions, which
are described in this section. If the end user chooses to operate the Altitude 350-2 AP outdoors, it is
their responsibility to insure operation in accordance with these rules, frequencies, and power output.
The Altitude 350-2 AP must not be operated until proper regional software is downloaded.
Table 22: European Conformance Standards
Safety • 73/23/EEC Low Voltage Directive (LVD)
• CB Scheme, IEC 60950-1:2001 with all
available country deviations
• GS Mark, EN 60950-1:2001
• Plenum Rated Enclosure
EMC • 89/336/EEC EMC Directive
Emissions
• EN55022:1998 Class B
• CISPR22:1997 Class B
• EN61000-3-2 and 3-3
• EN/ETSI 301 489-17 (9-2000)
Immunity
• EN55024:1998 Class A, includes IEC 61000-4-2,3,4,5,6,11
• EN/ETSI 301 489-17 (9-2000)
Radio Transceiver • R&TTE Directive 1999/5/EC
• ETSI/EN 300 328-2 2003-04
(2.4 GHz)
• ETSI/EN 301 893-1 2002-07 (5 GHz)
• ETSI/EN 301 489-1 2002-08
• ETSI/EN 301 489-17 2002-08 (RLAN)
Other:
• IEEE 802.11a (5 Ghz)
• IEEE 802.11b/g (2.4 GHz
• IEEE 802.3af
Environmental • EN/ETSI 300 019-2-1 v2.1.2 - Class 1.2 Storage
• EN/ETSI 300 019-2-2 v2.1.2 - Class 2.3 Transportation
• EN/ETSI 300 019-2-3 v2.1.2 - Class 3.1e Operational
• ASTM D5276 Drop Packaged
• ASTM D3580 Random Vibration Unpackaged 1.5 G
0891
Altitude 350-2 Int. AP (15958) AP, Altitude 350-2 Detach. AP (15939)
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 259
WARNING!
The user or installer is responsible to ensure that the Altitude 350-2 AP is operated according to channel
limitations, indoor / outdoor restrictions, license requirements, and within power level limits for the current country
of operation. A configuration utility has been provided with the switch to allow the end user to check the
configuration and make necessary configuration changes to ensure proper operation in accordance with the spectrum
usage rules for compliance with the European R&TTE directive 1999/5/EC. See the switch software guide for
detailed instructions on use of this utility.
The Altitude 350-2 Access Point with integrated and detachable antennas are designed to be operated only indoors
within all countries of the European Community. Some countries require limited channels of operation for indoor
use. These restrictions are described in this section. For the most up to date restriction and limitations go to
www.extremenetworks.com/go/rfcertification.htm.
NOTE
The Altitude 350-2 AP is completely configured and managed by the Summit WM series switch connected to the
network Please follow the instructions in this software user guide to properly configure the Altitude 350-2 AP.
●The Altitude 350-2 wireless port requires the end user or installer to properly enter the correct
country code into the switch software prior to operating the Altitude 350-2 AP, to allow for proper
configuration in conformance with European National spectrum usage laws.
●After the first Altitude 350-2 wireless port is connected to the switch, each additional wireless port
connected will inherit the operating configuration of the first Altitude 350-2 wireless port. The user
or installer is responsible to ensure the first Altitude 350-2 wireless port is properly configured.
●The software within the switch will automatically limit the allowable channels and output power
determined by the current country code entered. Incorrectly entering the country of operation or
identifying the proper antenna used, may result in illegal operation and may cause harmful
interference to other systems.
●This device employs a radar detection feature required for European Community operation in the 5
GHz band. This feature is automatically enabled when the country of operation is correctly
configured for any European Community country. The presence of nearby radar operation may
result in temporary interruption of operation of this device. The radar detection feature will
automatically restart operation on a channel free of radar.
●The 5 GHz Turbo Mode feature is not enabled for use on the Altitude 350-2 AP Model 15938 and
15939.
●The AutoChannelSelect/SmartSelect setting of the 5 GHz described in the switch software guide
must always remain enabled to ensure that automatic 5 GHz channel selection complies with
European requirements. The current setting for this feature is found in the 5 GHz Radio
Configuration Window as described in this switch software manual.
●The Altitude 350-2 AP with integral or detachable antennas may be used to transmit indoors and
outdoors in countries of the European Community, as indicated in Table 23.
Go to http://www.extremenetworks.com/go/rfcertification.htm for the most up to date limitation
and restrictions.
●The Altitude 350-2 AP must be operated indoors only when using the 5150- 5350 MHz bands,
channels 36, 40, 44, 48, 52, 56, 60, or 64. See Table 23 for permitted 5 GHz channels by country.
●The Altitude 350-2 AP with detachable antenna must be used only with antennas certified by
Extreme Networks.
●The Altitude 350-2 AP may be operated indoors or outdoors in all countries of the European
Community using the 2.4 GHz band: Channels 1 – 13, except where noted in Table 23.
Regulatory Information
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
260
●In Italy, the end user must apply for a license from the national spectrum authority to operate this
device outdoors.
●In Belgium, outdoor operation is only permitted using the 2.46 - 2.4835 GHz band: Channel 13.
●In France, outdoor operation is only permitted using the 2.4 - 2.454 GHz band: Channels 1 - 7.
European Spectrum Usage Rules
Table 23 lists the rules and restrictions for operating a 2.4 GHz or 5 GHz device in the European
Community. Always use the latest software version for the most up-to-date channel list; some earlier
software versions supply only a limited number of channels.
The Altitude 350-2 AP must be installed in the proper indoor or outdoor location. Use the installation
utility provided with the switch software to insure proper set-up in accordance with all European
spectrum usage rules.
Table 23: European Spectrum Usage Rules - Effective as of July 2005
Country
5.15-5.25 (GHz)
Channels:
36,40,44,48
5.25-5.35 (GHz)
Channels:
52,56,60,64
5.47-5.725 (GHz)
Channels:
100,104,108,112,116,12
0,124,128,132,136,140
2.4-2.4835 (GHz)
Channels: 1 to 13
(Except Where Noted)
Austria Indoor Only Indoor Only Indoor or Outdoor Indoor or Outdoor
BelgiumaIndoor Only Indoor Only Indoor or Outdoor Indoor or Outdoora
Bulgaria Indoor Only Indoor Only Indoor or Outdoor Indoor or Outdoor
Denmark Indoor Only Indoor Only Indoor or Outdoor Indoor or Outdoor
Cyprus Indoor Only Indoor Only Indoor or Outdoor Indoor or Outdoor
Czech Rep. Indoor Only Indoor Only Expect to Open
Fall 2006
Indoor or Outdoor
Estonia Indoor Only Indoor Only Indoor or Outdoor Indoor or Outdoor
Finland Indoor Only Indoor Only Indoor or Outdoor Indoor or Outdoor
France Indoor Only Indoor Only Expect to Open
Fall 2006
Indoor channels 1-13
Outdoor channels 1-7 only
Germany Indoor Only Indoor Only Indoor or Outdoor Indoor or Outdoor
Greece Indoor Only Indoor Only Indoor Only Indoor Only
Hungary Indoor Only Indoor Only Indoor or Outdoor Indoor or Outdoor
Iceland Indoor Only Indoor Only Indoor or Outdoor Indoor or Outdoor
Ireland Indoor Only Indoor Only Indoor or Outdoor Indoor or Outdoor
Italy Indoor Only Indoor Only Indoor
(Outdoor w/License)
Indoor
(Outdoor w/License)
Latvia Indoor Only Indoor Only Indoor or Outdoor Indoor or Outdoor
Liechtenstein Indoor Only Indoor Only Indoor or Outdoor Indoor or Outdoor
Lithuania Indoor Only Indoor Only Indoor or Outdoor Indoor or Outdoor
Luxembourg Indoor Only Indoor Only Indoor or Outdoor Indoor or Outdoor
Netherlands Indoor Only Indoor Only Indoor or Outdoor Indoor or Outdoor
Malta Indoor Only Indoor Only Indoor or Outdoor Indoor or Outdoor
Norway Indoor Only Indoor Only Indoor or Outdoor Indoor or Outdoor
Poland Indoor Only Indoor Only Indoor or Outdoor Indoor or Outdoor
Altitude 350-2 Int. AP (15958) AP, Altitude 350-2 Detach. AP (15939)
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 261
Portugal Indoor Only Indoor Only Indoor or Outdoor Indoor or Outdoor
Slovak Rep. Indoor Only Indoor Only Indoor or Outdoor Indoor or Outdoor
Slovenia Indoor Only Indoor Only Indoor or Outdoor Indoor or Outdoor
Spain Indoor Only Indoor Only Indoor or Outdoor Indoor or Outdoor
Sweden Indoor Only Indoor Only Indoor or Outdoor Indoor or Outdoor
Switzerland Indoor Only Indoor Only Indoor or Outdoor Indoor or Outdoor
U. K. Indoor Only Indoor Only Indoor or Outdoor Indoor or Outdoor
Turbo Mode Not Allowed
in 5GHz
Not Allowed
in 5GHz
Not Allowed
in 5GHz
Same 2.4 GHz
rulesasabove
AdHoc Mode Not Allowed Not Allowed Not Allowed Same 2.4 GHz
rules as above
a. Belgium requires that the spectrum agency be notified if you deploy wireless links greater than 300 meters in outdoor public
areas using 2.4 GHz band.
Table 23: European Spectrum Usage Rules - Effective as of July 2005 (Continued)
Country
5.15-5.25 (GHz)
Channels:
36,40,44,48
5.25-5.35 (GHz)
Channels:
52,56,60,64
5.47-5.725 (GHz)
Channels:
100,104,108,112,116,12
0,124,128,132,136,140
2.4-2.4835 (GHz)
Channels: 1 to 13
(Except Where Noted)
Regulatory Information
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
262
Declarations of Conformity
Table 24 presents the Extreme Networks declarations of conformity for the languages used in the
European Community.
Table 24: Declaration of Conformity in Languages of the European Community
English Hereby, Extreme Networks, declares that this Radio LAN device is in compliance with the
essential requirements and other relevant provisions of Directive 1999/5/EC.
Finnish Valmistaja Extreme Networks vakuuttaa taten etta Radio LAN device tyyppinen laite on
direktiivin 1999/5/EY oleellisten vaatimusten ja sita koskevien direktiivin muiden ehtojen
mukainen.
Dutch Hierbij verklaart Extreme Networks dat het toestel Radio LAN device in overeenstemming is
met de essentiele eisen en de andere relevante bepalingen van richtlijn 1999/5/EG
Bij deze verklaart Extreme Networks dat deze Radio LAN device voldoet aan de essentiele
eisen en aan de overige relevante bepalingen van Richtlijn 1999/5/EC.
French Par la presente Extreme Networks declare que l'appareil Radio LAN device est conforme aux
exigences essentielles et aux autres dispositions pertinentes de la directive 1999/5/CE
Par la presente, Extreme Networks declare que ce Radio LAN device est conforme aux
exigences essentielles et aux autres dispositions de la directive 1999/5/CE qui lui sont
applicables
Swedish Harmed intygar Extreme Networks att denna Radio LAN device star I overensstammelse med
de vasentliga egenskapskrav och ovriga relevanta bestammelser som framgar av direktiv
1999/5/EG.
Danish Undertegnede Extreme Networks erklarer herved, at folgende udstyr Radio LAN device
overholder de vasentlige krav og ovrige relevante krav i direktiv 1999/5/EF
German Hiermit erklart Extreme Networks, dass sich diese Radio LAN device in Ubereinstimmung mit
den grundlegenden Anforderungen und den anderen relevanten Vorschriften der Richtlinie
1999/5/EG befindet”. (BMWi)
Hiermit erklart Extreme Networks die Ubereinstimmung des Gerates Radio LAN device mit
den grundlegenden Anforderungen und den anderen relevanten Festlegungen der Richtlinie
1999/5/EG. (Wien)
Greek
Italian Con la presente Extreme Networks dichiara che questo Radio LAN device e conforme ai
requisiti essenziali ed alle altre disposizioni pertinenti stabilite dalla direttiva 1999/5/CE.
Spanish Por medio de la presente Extreme Networks declara que el Radio LAN device cumple con los
requisitos esenciales y cualesquiera otras disposiciones aplicables o exigibles de la Directiva
1999/5/CE
Portuguese Extreme Networks declara que este Radio LAN device esta conforme com os requisitos
essenciais e outras disposicoes da Directiva 1999/5/CE.
ΜΕ ΤΗΝ ΠΑΡΟΥΣΑ Extreme Networks ΔΗΛΩΝΕΙ ΟΤΙ Radio LAN device
ΣΥΜΜΟΡΦΩΝΕΤΑΙ ΠΡΟΣ ΤΙΣ ΟΥΣΙΩΔΕΙΣ ΑΠΑΙΤΗΣΕΙΣ ΚΑΙ ΤΙΣ ΛΟΙΠΕΣ ΣΧΕΤΙΚΕΣ
Δ
ΙΑΤΑΞΕΙΣ ΤΗΣ ΟΔΗΓΙΑΣ 1999/5/Ε
Κ
Certifications of Other Countries
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 263
Certifications of Other Countries
The Altitude 350-2 Int. AP (15958) and Altitude 350-2 Detach. AP (15939) APs have been certified for
use in the countries listed in Table 25. When the Altitude 350-2 AP is connected to the Extreme
Networks switch, the user is prompted to enter a country code. Once the correct country code is
entered, the switch automatically sets up the Altitude 350-2 AP with the proper frequencies and power
outputs for that country code.
Go to http://www.extremenetworks.com/go/rfcertification.htm for the most up to date list of certified
countries.
NOTE
It is the responsibility of the end user to enter the proper country code for the country the device will be operated
within.
Altitude 350-2 Int. AP (15958) and Altitude 350-2
Detach. (15939) Access Points
The Altitude 350-2 AP models are Wi-Fi certified under Certification ID # WFA4279 for operation in
accordance with IEEE 802.11a/b/g. The Altitude 350-2 Altitude APs with Internal and External
antennas are designed and intended to be used indoors.
NOTE
Operation in the European Community and rest of the world may be dependant on securing local licenses,
certifications, and regulatory approvals.
Optional Approved 3rd Party External Antennas
The Altitude 350-2 Detach. AP (15939) APs can also be used with optional certified external antennas.
Table 25: Other Country Specific Compliance Standards, Approvals and Declarations
Country Standards, Approvals, Declarations
Australia
and
New Zealand
• Altitude 350-2 Int. AP (15958) and
Altitude 350-2 Detach. AP (15939) APs
• AS/NZS 4288 (Radio)
• AS/NZX 3260 (Safety)
• AS/NZS 3548 (Emissions)
• EEE 802.11a/b/g
• IEEE 802.3af (PoE)
• EN 300 328-2:2003-4 (2.4 GHz)
• EN 301 893-1:2003-08 (5 GHz)
• EN 301 489-17:2002-08 (RLAN)
• EN 60950-1:2001 with Australia
Deviation
Regulatory Information
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
264
Antenna Diversity
There are some limitations for using different antennas and Tx/Rx diversity:
●If Alternate antenna diversity is used for Tx or Rx, then the same antenna model must be used as
left and right antennas. In addition, if cables are used to connect external antennas, the cables must
be of the same length and similar attenuation. If these rules are not respected, antenna diversity will
not function properly and there will be degradation in the link budget in both directions.
●You can choose to install only one antenna provided that both Tx and Rx diversity are configured to
use that antenna and only that antenna. You can choose to install one antenna for 11b/g band and
one antenna for 11a band, provided that the antenna diversity is configured appropriately on both
radios.
Sensor Support
Changing the antenna on sensors is not supported (at this stage) for the following reasons:
●The sensor factors the antenna gain and pattern in its calculations and therefore it needs to know the
antenna type and gain.
●The sensor operating in mitigation mode becomes a transmitter and must obey the same CTLs as the
normal AP software.
Optional 3rd Party External Antennas for the United States
The Altitude 350-2 Detach. AP (15939) APs can also be used with optional certified 3rd party antennas.
However, in order to comply with the local laws and regulations, an approval may be required by the
local regulatory authorities. The following optional antennas have been tested and approved for use
with the External Antenna model.
CAUTION
When using an approved 3rd party external antenna (other than the default), the power must be adjusted according
to these tables.
Professional Installation
This device must be professionally installed. The following are the requirements of professional
installation:
●The device cannot be sold retail to the general public or by mail order. It must be sold to dealers.
●Installation must be controlled.
●Installation must be carried out by licensed professionals (equipment sold to dealers who hire
installers)
●Installation requires special training (special programming and antenna and cable installations)
●The intended use is generally not for the general public. Instead, it is generally for industry/
commercial use.
Altitude 350-2 Int. AP (15958) and Altitude 350-2 Detach. (15939) Access Points
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 265
NOTE
The qualification testing and results are based on above described antennas, cable types, lengths, and connector
types. Other cable lengths and connector types are also available which are specified by the suffix part of the part
numbers (for example, SR2405135Dxxxxxx, where the xxxxxx suffix represents cable length and/or connector type).
The antenna feedline used in testing are the minimum cable length. Longer cable may be used with losses greater
than or equal to the cables used for testing. The maximum power settings must be adjusted according to these
tables.
NOTE
If one of the following antennas is used, you must select an operating channel (on the Wireless APs configuration
screens) and the corresponding allowed max power from the values listed in Table 27. DO NOT select a higher
power than the value listed in Table 27.
Table 26: List of FCC Approved Antennas
#Model Application Shape
Gain
(dBi)
Frequency
(MHz)
Coax Cable
Length/Type
Connector
Type
Cushcraft
#
1
SR2405135
Dxxxxxx
indoor Directional 52400-2500 3 feet /
19AWG
CMP(ETL)
C(ETL)
9700851
RPSMA
#
2
S24493DSx
xxxxx
indoor Omni,
2 inputs
32400-2500
4900-5990
3 feet /
19AWG
CMP(ETL)
C(ETL)
9700851
RPSMA, 2ea.
#
3
SL24513Px
xxxxx
indoor Omni 32400-2500
5150-5350
3 feet /
19AWG
CMP(ETL)
C(ETL)
9700851
RPSMA
#
4
S24497Pxxx
xxx
indoor Directional 72400-2500
4900-5990
3 feet /
19AWG
CMP(ETL)
C(ETL)
9700851
RPSMA
Hyperlink Tech
#
5
HG2458CUx
xx
indoor Omni 32300-2600
4900-6000
1 foot /
20AWG
Coleman Cable
921021
N-female
Maxrad
#
6
MDO24005
PTxxxxxx
indoor Omni,
2 inputs
5.2 2400-2485 3 feet /
19AWG
CMP(ETL)
C(ETL)
9700851
RPSMA, 2ea.
Regulatory Information
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
266
Table 27: FCC Antenna Channel-Power Information
Antenna
Antenna
#1
Cushcraft
SR240513
5Dxxxxxx
Antenna
#2
Cushcraft
S24493DSx
xxxxx
Antenna
#3
Cushcraft
SL24513Px
xxxxx
Antenna
#4
Cushcraft
S24497Pxx
xxxx
Antenna
#5 Hyperlink
Tech
HG2458CUxxx
Antenna
#6
Maxrad
MDO24005P
Txxxxxx
Frequency
(MHz)
Ch.
No.
Power limit
(dBm)
Power limit
(dBm)
Power limit
(dBm)
Power limit
(dBm)
Power limit
(dBm)
Power limit
(dBm)
11b
2412 116 18 17 16 17 17
2417 217 17 17 16 17 17
2422 318 18 18 18 18 18
2427 418 18 18 18 18 18
2432 518 18 18 18 18 18
2437 618 18 18 18 18 18
2442 718 18 18 18 18 18
2447 818 18 18 18 18 18
2452 918 18 18 18 18 18
2457 10 18 18 18 18 18 18
2462 11 18 18 18 18 18 18
11g
2412 110 13 13 10 12 13
2417 214 15 15 14 15 14
2422 315 16 16 15 16 16
2427 416 18 18 16 17 17
2432 516 18 18 17 18 18
2437 616 18 18 17 18 18
2442 718 18 18 18 18 18
2447 818 18 18 18 18 18
2452 918 18 18 18 18 18
2457 10 17 17 17 17 17 18
2462 11 14 14 14 14 14 14
Altitude 350-2 Int. AP (15958) and Altitude 350-2 Detach. (15939) Access Points
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 267
CAUTION
Channels designated as N/S are not supported by the antenna and must not be selected from the Wireless APs
configuration screens.
CAUTION
For antenna #3 (Cushcraft SL24513Pxxxxxx), do not select the Auto channel selection (on the Wireless APs
configuration screens) for the 11a radio. Instead, only select a channel from the listed supported channels in
Tabl e 28. Operating on a channel that is NOT supported (N/S) is in violation of the law.
CAUTION
If you select the Auto channel selection (on the Wireless APs configuration screens), you must also select the power
values listed in Tabl e 28. DO NOT select a higher power than the value listed in Table 28.
11a
5180 36 N/S 17 17 17 17 N/S
5200 40 N/S 17 17 17 17 N/S
5220 44 N/S 17 17 17 17 N/S
5240 48 N/S 17 17 17 17 N/S
5260 52 N/S 18 18 18 18 N/S
5280 56 N/S 18 18 18 18 N/S
5300 60 N/S 18 18 18 18 N/S
5320 64 N/S 18 18 18 18 N/S
5745 149 N/S 15 N/S 15 15 N/S
5765 153 N/S 15 N/S 15 15 N/S
5785 157 N/S 14 N/S 14 14 N/S
5805 161 N/S 14 N/S 14 14 N/S
5825 165 N/S 14 N/S 14 14 N/S
Table 27: FCC Antenna Channel-Power Information
Antenna
Antenna
#1
Cushcraft
SR240513
5Dxxxxxx
Antenna
#2
Cushcraft
S24493DSx
xxxxx
Antenna
#3
Cushcraft
SL24513Px
xxxxx
Antenna
#4
Cushcraft
S24497Pxx
xxxx
Antenna
#5 Hyperlink
Tech
HG2458CUxxx
Antenna
#6
Maxrad
MDO24005P
Txxxxxx
Frequency
(MHz)
Ch.
No.
Power limit
(dBm)
Power limit
(dBm)
Power limit
(dBm)
Power limit
(dBm)
Power limit
(dBm)
Power limit
(dBm)
Regulatory Information
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
268
RF Safety Distance
The antennas used for this transmitter must be installed to provide a separation distance of at least 20
cm from all persons and must not be co-located or operating in conjunction with another antenna or
transmitter.
Optional 3rd Party External Antennas for Canada
The Altitude 350-2 Detach. (15939) External Antenna APs can also be used with optional certified 3rd
party antennas. However, in order to comply with the local laws and regulations, an approval may be
required by the local regulatory authorities. The following optional antennas have been tested with and
approved for use with the External Antenna model.
CAUTION
When using an approved 3rd party external antenna (other than the default), the power must be adjusted according
to these tables.
Professional Installation
This device must be professionally installed. The following are the requirements of professional
installation:
●The device cannot be sold retail to the general public or by mail order. It must be sold to dealers.
●Installation must be controlled.
●Installation must be carried out by licensed professionals (equipment sold to dealers who hire
installers)
●Installation requires special training (special programming and antenna and cable installations)
The intended use is generally not for the general public. Instead, it is generally for industry/commercial
use.
Table 28: Auto Channel Selection
Antenna 11a (dBm) 11b/g (dBm)
#1 N/S 10
#2 14 13
#3 17 13
#4 14 10
#5 14 12
#6 N/S 13
Altitude 350-2 Int. AP (15958) and Altitude 350-2 Detach. (15939) Access Points
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 269
NOTE
The qualification testing and results are based on above described antennas, cable types, lengths, and connector
types. Other cable lengths and connector types are also available which are specified by the suffix part of the part
numbers (ex. SR2405135Dxxxxxx, where the xxxxxx suffix represents cable length and/or connector type). The
antenna feedline used in testing are the minimum cable length. Longer cable may be used with losses greater than
or equal to the cables used for testing. The maximum power settings must be adjusted according to these tables.
NOTE
If one of the following antenna is used, you must select an operating channel (on the Wireless APs configuration
screens) and the corresponding allowed max power from the values listed in Table 30. DO NOT select a higher
power than the value listed in Table 30.
Table 29: List of IC (Industry Canada) Approved Antennas
#Model Application Shape Gain (dBi)
Frequency
(MHz)
Coax Cable
Length/Type
Connector
Type
Cushcraft
#1 SR2405135
Dxxxxxx
indoor Directional 52400-2500 3 feet /
19AWG
CMP(ETL)
C(ETL)
9700851
RPSMA
#2 S24493DSx
xxxxx
indoor Om n i ,
2 inputs
32400-2500
4900-5990
3 feet /
19AWG
CMP(ETL)
C(ETL)
9700851
RPSMA,
2ea.
#3 SL24513Pxx
xxxx
indoor Omni 32400-2500
5150-5350
3 feet /
19AWG
CMP(ETL)
C(ETL)
9700851
RPSMA
#4 S24497Pxxx
xxx
indoor Directional 72400-2500
4900-5990
3 feet /
19AWG
CMP(ETL)
C(ETL)
9700851
RPSMA
Hyperlink Tech
#5 HG2458CUx
xx
indoor Omni 32300-2600
4900-6000
1 foot /
20AWG
Coleman
Cable
921021
N-female
Maxrad
#6 MDO24005
PTxxxxxx
indoor Om n i ,
2 inputs
5.2 2400-2485 3 feet /
19AWG
CMP(ETL)
C(ETL)
9700851
RPSMA,
2ea.
Regulatory Information
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
270
Table 30: IC Antenna Channel-Power Information
Antenna
Antenna
#1 Cushcraft
SR2405135D
xxxxxx
Antenna
#2
Cushcraft
S24493DS
xxxxxx
Antenna
#3
Cushcraft
SL24513P
xxxxxx
Antenna
#4
Cushcraft
S24497P
xxxxxx
Antenna
#5
Hyperlink
Tech
HG2458CU
xxx
Antenna
#6
Maxrad
MDO24005P
Txxxxxx
Frequency
(MHz)
Ch.
No.
Power limit
(dBm)
Power limit
(dBm)
Power
limit (dBm)
Power
limit
(dBm)
Power limit
(dBm)
Power limit
(dBm)
11b
2412 116 18 17 16 17 17
2417 217 17 17 16 17 17
2422 318 18 18 18 18 18
2427 418 18 18 18 18 18
2432 518 18 18 18 18 18
2437 618 18 18 18 18 18
2442 718 18 18 18 18 18
2447 818 18 18 18 18 18
2452 918 18 18 18 18 18
2457 10 18 18 18 18 18 18
2462 11 18 18 18 18 18 18
11g
2412 110 13 13 10 12 13
2417 214 15 15 14 15 14
2422 315 16 16 15 16 16
2427 416 18 18 16 17 17
2432 516 18 18 17 18 18
2437 616 18 18 17 18 18
2442 718 18 18 18 18 18
2447 818 18 18 18 18 18
2452 918 18 18 18 18 18
2457 10 17 17 17 17 17 18
2462 11 14 14 14 14 14 14
Altitude 350-2 Int. AP (15958) and Altitude 350-2 Detach. (15939) Access Points
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 271
CAUTION
Channels designated as N/S are not supported by the antenna and must not be selected from the Wireless APs
configuration screens.
CAUTION
For antenna #3 (Cushcraft SL24513Pxxxxxx), do not select the Auto channel selection (on the Wireless APs
configuration screens) for the 11a radio. Instead, only select a channel from the listed supported channels in
Tabl e 31. Operating on a channel that is NOT supported (N/S) is in violation of the law.
CAUTION
If you select the Auto channel selection (on the Wireless APs configuration screens), you must also select the power
values listed in Tabl e 31. DO NOT select a higher power than the value listed in Table 31.
11a
5180 36 N/S 17 17 17 17 N/S
5200 40 N/S 17 17 17 17 N/S
5220 44 N/S 17 17 17 17 N/S
5240 48 N/S 17 17 17 17 N/S
5260 52 N/S 18 18 18 18 N/S
5280 56 N/S 18 18 18 18 N/S
5300 60 N/S 18 18 18 18 N/S
5320 64 N/S 18 18 18 18 N/S
5745 149 N/S 15 N/S 15 15 N/S
5765 153 N/S 15 N/S 15 15 N/S
5785 157 N/S 14 N/S 14 14 N/S
5805 161 N/S 14 N/S 14 14 N/S
5825 165 N/S 14 N/S 14 14 N/S
Table 30: IC Antenna Channel-Power Information
Antenna
Antenna
#1 Cushcraft
SR2405135D
xxxxxx
Antenna
#2
Cushcraft
S24493DS
xxxxxx
Antenna
#3
Cushcraft
SL24513P
xxxxxx
Antenna
#4
Cushcraft
S24497P
xxxxxx
Antenna
#5
Hyperlink
Tech
HG2458CU
xxx
Antenna
#6
Maxrad
MDO24005P
Txxxxxx
Frequency
(MHz)
Ch.
No.
Power limit
(dBm)
Power limit
(dBm)
Power
limit (dBm)
Power
limit
(dBm)
Power limit
(dBm)
Power limit
(dBm)
Regulatory Information
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
272
RF Safety Distance
The antennas used for this transmitter must be installed to provide a separation distance of at least 20
cm from all persons and must not be co-located or operating in conjunction with another antenna or
transmitter.
Optional 3rd Party External Antennas the European Community
The Altitude 350-2 Detach. (15939) External Antenna APs can also be used with optional certified 3rd
party antennas. However, in order to comply with the local laws and regulations, an approval may be
required by the local regulatory authorities. The following optional antennas have been tested with and
approved for use with the External Antenna model.
CAUTION
When using an approved 3rd party external antenna (other than the default), the power must be adjusted according
to these tables.
Professional Installation
This device must be professionally installed. The following are the requirements of professional
installation:
●The device cannot be sold retail to the general public or by mail order. It must be sold to dealers.
●Installation must be controlled.
●Installation must be carried out by licensed professionals (equipment sold to dealers who hire
installers)
●Installation requires special training (special programming and antenna and cable installations)
The intended use is generally not for the general public. Instead, it is generally for industry/commercial
use.
Table 31: Auto Channel Selection
Antenna 11a (dBm) 11b/g (dBm)
#1 N/S 10
#2 14 13
#3 17 13
#4 14 10
#5 14 12
#6 N/S 13
Altitude 350-2 Int. AP (15958) and Altitude 350-2 Detach. (15939) Access Points
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 273
NOTE
If one of the following antenna is used, you must select an operating channel (on the Wireless APs configuration
screens) and the corresponding allowed max power from the values listed in Table 33. DO NOT select a higher
power than the value listed in Table 33.
Table 32: Approved Antenna List for Europe
#Model Location Type Gain (dBi) Frequency (MHz)
Huber+Suhner
#1 SOA
2454/360/7/20/DF
outdoor-capable Omni 6
8
2400-2500
4900-5875
#2 SPA
2456/75/9/0/DF
outdoor-capable Planar
2 or 1 inputs
92400-2500
5150-5875
#3 SPA
2400/80/9/0/DS
outdoor-capable Planar
2 inputs
8.5 2300-2500
#4 SWA
0859/360/4/10/V
outdoor-capable Omni 72400-5875
#5 SOA
2400/360/4/0/DS
outdoor-capable Omni 3.5 2400-2500
#6 SPA
2400/40/14/0/DS
outdoor-capable Planar
2 inputs
13.5 2400-2500
#7 SWA
2459/360/4/45/V
outdoor-capable Omni >4 2400-5875
Regulatory Information
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
274
Table 33: ETSI Antenna Channel-Power Information
Antenna
Antenna
#1
Huber
+Suhner
SOA
2454/
360/7/20/
DF
Antenna
#2
Huber
+Suhner
SPA
2456/75/
9/0/DF
Antenna
#3
Huber
+Suhner
SPA 2400/
80/9/0/DS
Antenna
#4
Huber
+Suhner
SWA
0859/
360/4/10/
V
Antenna
#5
Huber
+Suhner
SOA
2400/
360/4/0/
DS
Antenna
#6
Huber
+Suhner
SPA 2400/
40/14/0/DS
Antenna
#7
Huber
+Suhner
SWA 2459/
360/4/45/V
Frequency
(MHz) Ch.
No.
Power
limit
(dBm)
Power
limit
(dBm)
Power
limit
(dBm)
Power
limit
(dBm)
Power
limit
(dBm)
Power
limit
(dBm)
Power
limit
(dBm)
11b
2412 115 14 14 15 15 915
2417 215 14 14 15 15 915
2422 315 14 14 15 15 915
2427 415 14 14 15 15 915
2432 515 14 14 15 15 915
2437 615 14 14 15 15 915
2442 715 14 14 15 15 915
2447 815 14 14 15 15 915
2452 915 14 14 15 15 915
2457 10 15 14 14 15 15 915
2462 11 15 14 14 15 15 915
2467 12 15 14 14 15 15 915
2472 13 15 14 15 15 15 10 15
11g
2412 115 13 14 15 15 915
2417 215 13 14 15 15 915
2422 315 13 14 15 15 915
2427 415 13 14 15 15 915
2432 515 13 14 15 15 915
2437 615 13 14 15 15 915
2442 715 14 14 15 15 10 15
2447 815 14 14 15 15 10 15
2452 915 14 14 15 15 10 15
2457 10 15 14 14 15 15 10 15
2462 11 15 14 14 15 15 10 15
2467 12 15 14 14 15 15 10 15
2472 13 15 13 13 15 15 915
Altitude 350-2 Int. AP (15958) and Altitude 350-2 Detach. (15939) Access Points
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 275
CAUTION
Channels designated as N/S are not supported by the antenna and must not be selected from the Wireless APs
configuration screens.
CAUTION
If you select the Auto channel selection (on the Wireless APs configuration screens), you must also select the power
values listed in Tabl e 34. DO NOT select a higher power than the value listed in Table 34.
11a
5180 36 16 16 N/S 16 N/S N/S 16
5200 40 16 16 N/S 16 N/S N/S 16
5200 44 16 16 N/S 16 N/S N/S 16
5240 48 16 16 N/S 16 N/S N/S 16
5260 52 16 16 N/S 16 N/S N/S 16
5280 56 16 16 N/S 16 N/S N/S 16
5300 60 16 16 N/S 16 N/S N/S 16
5320 64 16 16 N/S 16 N/S N/S 16
5500 100 20 19 N/S 20 N/S N/S 20
5520 104 20 19 N/S 20 N/S N/S 20
5540 108 20 19 N/S 20 N/S N/S 20
5560 112 20 19 N/S 20 N/S N/S 20
5580 116 20 19 N/S 20 N/S N/S 20
5600 120 20 19 N/S 20 N/S N/S 20
5620 124 20 19 N/S 20 N/S N/S 20
5640 128 20 19 N/S 20 N/S N/S 20
5660 132 20 19 N/S 20 N/S N/S 20
5680 136 20 19 N/S 20 N/S N/S 20
5700 140 20 19 N/S 20 N/S N/S 20
Table 33: ETSI Antenna Channel-Power Information
Antenna
Antenna
#1
Huber
+Suhner
SOA
2454/
360/7/20/
DF
Antenna
#2
Huber
+Suhner
SPA
2456/75/
9/0/DF
Antenna
#3
Huber
+Suhner
SPA 2400/
80/9/0/DS
Antenna
#4
Huber
+Suhner
SWA
0859/
360/4/10/
V
Antenna
#5
Huber
+Suhner
SOA
2400/
360/4/0/
DS
Antenna
#6
Huber
+Suhner
SPA 2400/
40/14/0/DS
Antenna
#7
Huber
+Suhner
SWA 2459/
360/4/45/V
Frequency
(MHz) Ch.
No.
Power
limit
(dBm)
Power
limit
(dBm)
Power
limit
(dBm)
Power
limit
(dBm)
Power
limit
(dBm)
Power
limit
(dBm)
Power
limit
(dBm)
Regulatory Information
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
276
RF Safety Distance
The antennas used for this transmitter must be installed to provide a separation distance of at least 20
cm from all persons and must not be co-located or operating in conjunction with another antenna or
transmitter.
Table 34: Auto Channel Selection
Antenna 11a (dBm) 11b/g (dBm)
#1 16 15
#2 16 13
#3 N/S 13
#4 16 15
#5 N/S 15
#6 N/S 9
#7 16 15
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 277
Index
A
accounting
setup on a WM-AD, 121
adding
Altitude AP manually, 63
alarms
overview of log types and levels, 220
allow all or approved APs
for availability setup, 155
allow or deny in a filtering rule, 91
Altitude AP
adding for availability setup, 155
adding manually, 63
assigning to a WM-AD, 107
client disassociate, 203
default configuration, 30, 35, 58, 66, 68, 79,
153, 155, 159
copy to defaults, 79
international licensing, 56
LED sequence in discovery, 58
maintenance and reboot, 81
radios, 56, 70
static configuration, 75
view statistics, 193
Analysis engine
functions, 183
antennae on the Altitude AP, 56
authentication
MAC-based, 119
no RADIUS server, 87
none on a WM-AD, 142
on a WM-AD for AAA, 116
on a WM-AD for Captive Portal, 109
overview of types, 108
protocols supported, 89, 112
Authentication, Authorization, Accounting (AAA)
filter ID values (RADIUS policy), groups, 122
set up 802.1x authentication, 116
set up privacy on a WM-AD, 138
availability, 155
B
backup controller software configuration, 214
branch office, static configuration of Altitude AP,
75
C
call data records (CDRs), 121
Captive Portal
authentication on a WM-AD, 109
configuring internal, external Captive Portal,
114
defined, 89
non-authenticated filtering rules, 126
privacy mechanisms, 135
set up a WM-AD topology, 98
view sample page, 115
Check Point event logging, 167
configuring
Captive Portal, internal, external, 114
software - overview steps, 30
static routes, 45
controller
availability overview, 29
back up software configuration, 214
define management user names, passwords,
163
define network time synchronization, 165
defined as mobility manager for mobility, 159
enable ELA event logging (Check Point), 167
events during a failover, 158
paired for availability, 153
restore software configuration, 217
set up third-party APs, 175
system maintenance, 208
system shutdown, 208
D
default filter, 131
default gateway on a WM-AD, 102
disassociate a wireless client, 203
discovery
Altitude AP LED sequence, 58
steps, 57
displays
Altitude AP availability, 156, 193
Altitude AP wired and wireless statistics, 193
client location by foreign Summit switch, 163,
196
client location by home, 163, 196
list of displays, 191
Summit switch tunnel traffic, 163, 196
Index
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
278
documentation feedback, 10
Domain Name Server (DNS)
in discovery, 57
DSCP classifications, 147
Dynamic Host Configuration Protocol (DHCP)
for availability, 153
for mobility (WM Access Domain Manager),
159
Option 78 in discovery, 57
relay on a WM-AD, 104
required as part of solution, 22
E
event logging
in Check Point, 167
in Summit switch software, 220
exception filters
on a WM-AD, 124
port-based, 51
exclusions, IP address range on a WM-AD, 103
F
failover of a controller
availability overview, 29
events and recovery, 158
failover of a RADIUS server, 112
filtering
default filter, 131
exception filter on a WM-AD, 124
filtering rules, overview of set up, 123
for an AAA group, 133
for Captive Portal authentication, 115
non-authenticated filter for Captive Portal,
126
non-authenticated filtering rules, examples,
128
on a WM-AD for third-party APs, 177
overview of packet filtering, 28
overview, four types, 90
port-based, 50
rules for filter ID values, 129
set filter ID values (RADIUS policy), 122
formatting conventions, 10
forwarding table report, 47
G
gateway, default, on a WM-AD, 102
global settings
for a WM-AD, 92
RADIUS servers for authentication, 111, 118,
120, 122
groups for Authentication, Authorization,
Accounting (AAA), 122
H
health checking status of Altitude APs, 208
heartbeat messages, in WM Access Domain
Manager feature, 159
I
IP address range on a WM-AD, 103
L
LED sequence
in discovery, 58
login user name and password, 37
Login-LAT-Group, 129
for WM-AD AAA authentication, 122
logs
changing log level, 208
event logging in Check Point, 167
overview of types and levels, 220
M
MAC-based authentication, 119
Management Information Bases (MIBs)
supported, 169
management port
management traffic on data port, 45
modify management port settings, 40
port-based filtering, 50
management traffic
enabling on a WM-AD, 100
mobility
mobility manager and mobility agent, 159
overview, 29
mobility manager
defining a controller for mobility, 159
multicast
for a WM-AD, 133
N
network assignment
by AAA, 138
by SSID for Captive Portal, 98
options for a WM-AD, 87
VLAN, 23, 26
network time synchronization, 165
next hop route for a WM-AD, 101
non-authenticated filter for Captive Portal, 115,
126
Index
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide 279
O
operating system software upgrade, 210
OSPF
configuring, 47
linkstate report, 50
neighbor report, 50
on a WM-AD, 101
overview, 28
P
password, for management users, 163
port
port exception filters, 51
priority override, 144
privacy
dynamic WEP on a WM-AD for AAA, 139
encryption methods supported, 27
on a WM-AD for AAA
AAA, 138
overview on a WM-AD, 92
setup on a WM-AD for Captive Portal, 135
static WEP for an AAA WM-AD, 138
WPA v1 and WPA v2 on a WM-AD for AAA, 139
product key
system maintenance, 210
protocols
for authentication by Captive Portal, 112
Q
QoS (Quality of Service), 30, 88, 94, 142, 144,
238, 242
admission control thresholds, 94
advanced, 147
modes, 144
policy, 146
R
radio
5 GHz (a) and 2.4 GHz (b/g), 56
channels, 70, 74
radio settings
view and modify, 70
RADIUS server
deployment with no server, 87
filter ID values, 129
for authentication, 111, 118, 120, 122
for MAC-based authentication, 119
priority for redundancy, 112
RADIUS accounting, 121
RADIUS policy for a WM-AD, 122
required as part of solution, 22
VSAs in RADIUS message, 108
random delays, 59
read/write privileges, 163
reboot Altitude AP, 81
registration
settings for availability setup, 155
reports
AP inventory, 198
forwarding table, 47, 198
list of displays, 191
OSPF linkstate, 50, 198
OSPF neighbor, 50, 198
restore controller software configuration, 217
rogue detection, Summit spy feature, 184
routing
configuring OSPF on data port, 47
configuring static routes, 45
next hop route on a WM-AD, 101
overview, 28
routing table
viewing, 47
S
scan results, Summit spy feature, 184
security of network, overview of methods, 26
service class, 142
Service Location Protocol (SLP)
for availability, 153
for mobility (WM Access Domain Manager),
159
in discovery, 57
required as part of solution, 22
traffic allowed on data port, 45
view slpdump tool report, 156
set up for a WM-AD, 175
shut down system, 208
Simple Network Management Protocol (SNMP)
MIBs supported, 169
software
maintenance of Altitude AP software, 81
maintenance of Controller software, 210
SSID network assignment for Captive Portal, 98
static configuration of Altitude AP, 75
static routes
configuring, 45
viewing forwarding table report, 47
syslog event reporting
define parameters, 208
T
third-party APs, 175
defining a WM-AD for, 100
Index
Summit WM Series WLAN Switch and Altitude Access Point Software Version 4.1 User Guide
280
in Summit spy feature, 188
topology of a WM-AD
Captive Portal, 98
traces
overview of log types and levels, 220
Type of Service (ToS/DSCP)
on a WM-AD, 142
Quality of Service, 30
U
user name and password for login, 37
user name and password, changing, 163
V
vendor specific attributes (VSA)
in RADIUS message, 108
RADIUS server
vendor specific attributes, 112, 119
VLAN
configuration, 76, 97, 102, 144, 149, 150
IDs, 150, 151
Voice-over-IP (VoIP)
define multicast groups on a WM-AD, 133
set up a WM-AD for, 142
vulnerable time interval, 59
W
Wi-Fi Multimedia (WMM)
on a WM-AD, 142
Quality of Service, 30
Wi-Fi Protected Access (WPA)
overview on a WM-AD, 92
PSK mode for Captive Portal, 136
WPA v1 and v2 on a WM-AD for AAA, 139
Wired Equivalent Privacy (WEP)
on a WM-AD for AAA, 138
overview on a WM-AD, 92
static for Captive Portal, 135
WM Access Domain Services (WM-AD), 28
authentication by AAA (802.1x), 116
authentication by Captive Portal, 109
define filtering rules, 123
defined, 85
for third-party APs, 176
global settings, 92
multicast, 133
network assignment overview, 87
privacy for AAA, 138
privacy overview, 135
set up for VoIP, 142
topology for Captive Portal, 98