ECS ExtremeWireless Core - ECS-CORE
WGAC-EXT-WICO
Schedule
Description
This course is a blend of both theoretical and hands-on Lab experience.Successful candidates will gain the skills and knowledge to deploy, configure and troubleshoot ExtremeWireless Core.
This class will give the students a good technical understanding of the ExtremeWireless CORE technologies.
There will also be practical, hands-on-labs, where the students will get to setup and configure this type of technology to supplement the theoretical learning.
Solution Overview
ExtremeWireless Landscape
WiNG at a glance
What's New In WiNG 7
11ax Introduction
WPA3 Introduction
Dual Mode Capability
ExtremeWireless WiNG hardware overview
Configuration Model
ExtremeWireless WiNG configuration model concepts such as RF Domain, Profile, Device overrides, WLAN and Policy
Final device configuration
Mint Protocol
MiNT protocol link layers and link levels
Forming MiNT links
AP Adoption
Finding a controller using L2 and L3 adoption
Understanding and configuring L2 and L3 adoption
Zero Touch Provisioning
Describing the provisioning policy
Provisioning policy wildcards
Supported Deployments and Provisioning
Reference designs for single and central site/multi-site deployments
Scalability considerations
General best practices and common design mistakes
Clustering
Clustering overview
Clustering setup
Virtual Controller
VC overview
VC configuration
Initial Configuration
Initial device setup
Resetting APs to factory defaults
Configure management access settings via Management Policy
Software Management
Mixed mode
Image types
Software upgrade
Wireless LANs
WLAN configuration
WLAN forwarding modes
WLAN assignments, authentication methods, and encryption
AAA Policy
QoS policies and mappings
Advanced WLAN Features
Configuring SMART RF
Using SMART RF statistics to analyse WLAN state and potential issues
WLAN optimization features
Integrated Services
DHCP server
Radius server
Role Based Access Control (RBAC)
IPsec VPN
Captive Portal
Hotspot deployment options and defining policies
Authentication methods used to verify user registrations
Enforcing authentication methods
User and device registration and notification methods
Security Features
Stateful L2+ Distributed Firewall features
Firewall SPI, IP ACLs, ACLS, DOS detection, and storm control
Variations of Wireless IPS (WIPS)
Mesh Features
MeshConnex overview
Opportunistic Rate Link Adaption (ORLA)
Configuring MeshConnex
Troubleshooting and Remote Diagnostics
Troubleshooting rules and processes
Different levels of log messages (log file, CLI, or remote syslog)
Live packet capture, different capture modes, and using capture points and filters
Remote debugging on the captive portal
Opening GTAC case
NSight
NSight overview
Using NSight for monitoring and troubleshooting
Extreme Guest
Extreme Guest overview and features
Location Sensor
Extreme Location Sensor
Configuring WiNG to support Extreme Location
What's new?
Recent firmware releases overview