Хотите получать информацию по новым курсам и их датам проведения?
(EXN-W-WiNG) Беспроводные сети доступа Extreme WiNG (Extreme Access Wireless WiNG)
Описание курса
Students will learn methods to properly configure and manage their ExtremeWireless WiNG WLAN environments using the online Web Interface. This knowledge will be reinforced through hands-on experience with wireless equipment in a lab environment, where students will perform real world tasks configuring access points, security parameters, filtering and privacy settings, as well as managing their wireless network.
Upon completion of this course, students will have gained the working knowledge to:
- Successfully configure and manage their Wireless implementation
- Take the ExtremeWiNG Specialist certification exam
Целевая аудитория
This course is designed for individuals responsible for the configuration, management, maintenance, and support of the Extreme Wireless networks.
Минимальные требования
Students should possess an understanding of network fundamentals, traffic classifications, and general network management concepts, as well as network security concepts and technologies.
Содержание курса
Solution Overview
- WiNG features
- ExtremeWireless WiNG APs
- T5 Private Broadband Network solution
- ExtremeWireless WiNG licenses
Configuration Model
- ExtremeWireless WiNG configuration model concepts such as RF Domain, Profile, Device overrides, WLAN and Policy
- Final device configuration using these components and within configuration management tasks
- Base MAC Address
Initial Configuration
- Initial device setup
- Admin user roles
- Configure management access settings via Management Policy
Mint Protocol
- MiNT protocol link layers and link levels
- Forming MiNT links
- Best practices and common mistakes for MiNT links
AP Adoption
- Finding a Controller using L2 and L3 adoption
- Understanding and configuring L2 and L3 adoption
- Best practices and common mistakes for device adoption
Virtual Controller
- New enhancements from WiNG 5.9
Zero Touch Provisioning
- Describing the provisioning policy
- Provisioning policy wildcards
Supported Deployments and Provisioning
- New Virtual Controller features
- Reference designs for single and central site/multi-site deployments
- Scalability considerations
- General best practices, trends and common design mistakes
- Correct design and proper configuration
Location Sensor
- Extreme Location Sensor
- Configuring WiNG to support Extreme Location
Wireless LANs
- WLAN Configuration
- WLAN Forwarding Modes
- WLAN assignments, authentication methods, and encryption
- AAA Policy and Server pools and proxies
- QoS Policies and Mappings
Advanced WLAN Features
- Configuring SMART RF
- Using SMART RF statistics to analyse WLAN state and potential issues
- WLAN optimization features such as Load Balancing, QoS and Roaming Assist features
- Other advanced WLAN features
Integrated Services
- Integrated Services such as:
- DHCP services provided by the controllers and APs
- Radius server(s) and services
- Role Based Access Control (RBAC)
- IPsec VPN
- Providing visibility to manage these applications
Captive Portal
- Captive Portal and associated features such as
- 3 hotspot deployment options and defining policies
- Authentication methods used to verify user registrations
- Enforcing authentication methods
- User and Device Registration and notification methods (email, SMS and SMS via SMTP)
Mesh Features
- MeshConnex technology vs legacy mesh
- Self-Healing and Self-Forming MeshConnex mesh
- Opportunistic Rate Link Adaption (ORLA)
- Configuing MeshConnex mesh
Security Features – Distributed Wireless Protections
-
- Stateful L2+ Distributed Firewall features-
- IP/MAC conflict detection
- Firewall SPI, IP ACLs, ACLS, DOS detection, and storm control
- Stateful L2+ Distributed Firewall features-
Variations of Wireless IPS (WIPS) such as
-
- Rogue Detection
- Logging and Reporting
Troubleshooting and Remote Diagnostics
- Troubleshooting rules and processes
- Different levels of log messages (log file, CLI, or remote syslog)
- Live packet capture, different capture modes, and using capture points and filters
- Remote debugging on the captive portal
- Debug using events
Common Mistakes
- Identify Problems with:
- Standalone deployment scaling and RF Domains
- Centralized deployment scaling, AP remote sites, Controllers and AP remote sites
- Clustering configurations for centralized controller and site controllers
- Extended VLANs
- Firewall policy inclusions
NSight
- Using NSight in the Network
- Using NSight for Monitoring and Troubleshooting
Extreme Guest
- Extreme Guest Features
- Troubleshooting Extreme Guest
Дни | 4 дня |
---|---|
Дата курса | По запросу |
Город | Все города / Москва |