
© 2005 Extreme Networks, Inc. All rights reser ved. Summit WM Series WLAN Switches—Page 4
Extreme Networks Data Sheet
Comprehensive Security
Directory-integrated Link
Security
The Summit wireless mobility solution
delivers comprehensive link security
capabilities that leverage existing direc-
tory resources to streamline management
of user access. Link security characteris-
tics are defined within the context of each
WM-AD. To ensure high availability,
multiple Authentication, Authorization,
and Accounting (AAA) resources can be
defined for specific WM-ADs.
Summit WM series switches offer a
complete range of privacy options ranging
from unencrypted communication for
guests, shared key for phones and PDAs,
to WPA-v1, and WPA–v2. For high-
performance and scalability, all over-the-
air encryption connections are terminat-
ed at the AP with hardware acceleration.
Multiple Authentication and
Access Control Options
Each WM-AD specifies how the wireless
user or device should authenticate, with
options for browser-based login, MAC
address verification, or 802.1x Enterprise
AAA identity management. MAC address
authentication can be combined with other
link security types for additional protection.
After users are placed on the network it is
important to limit their access to the
resources they need. WM-ADs offer
comprehensive filtering options for each
connection based on WM-AD member-
ship, authentication status, and specific
filtering instructions provided as a part of
the RADIUS authentication message.
Guests can be restricted to a “walled
garden” or routed directly to the Internet.
Traffic from specific WM-ADs can be
restricted to selected ports and/or
network locations using next-hop routing.
The Summit WM switch offers unique and
powerful enhancements to basic network
access control. Using information
exchanged between the Summit WM
switch and the RADIUS server, adminis-
trators can design sophisticated access
control solutions that tailor access rights
to specific locations, users, or roles. WM-
ADs also simplify integration with VPN
and firewall solutions by aggregating
traffic through a specific physical port to
the VPN or firewall resource, eliminating
the need for standalone or redundant VPN
systems for wired and wireless users.
Wireless Intrusion Detection
Rogue APs or unauthorized networks
represent a significant threat to the
integrity of Enterprise networks—even
when wireless networks are not officially
supported. Today’s users have easy and
inexpensive access to WLAN gear and
may not understand the security risks
associated with the installation of an
unmanaged AP.
The Summit WM Spy capability provides
intrusion detection by scanning multiple
bands and channels to locate unauthorized
rogue APs and Peer-to-Peer wireless
networks. It does this by using the same
Altitude 350-2 APs that are used for
wireless connectivity support. If a rogue
device/network is found, it is reported on
the management console.
Security is justifiably a key concern for WLAN systems. Summit WM series switches offer state of the art security for link
access and intrusion detection, all delivered using a single AP infrastructure.
Summit WM1000
Core
Edge
Altitude 350-2
Altitude 350-2 Altitude 350-2
Rogue Access Point Detection
Comentarios a estos manuales