Szkolenia Extreme Networks

Cel szkolenia szkolenie zdalne - dlearning

kod: EN-EAWW

Students will learn methods to properly configure and manage their ExtremeWireless WiNG WLAN environments using the online Web Interface. This knowledge will be reinforced through hands-on experience with wireless equipment in a lab environment, where students will perform real world tasks configuring access points, security parameters, filtering and privacy settings, as well as managing their wireless network.

Upon completion of this course, students will have gained the working knowledge to:

  • Successfully configure and manage their Wireless implementation
  • Take the ExtremeWiNG Specialist certification exam

Target Audience:

  • This course is designed for individuals responsible for the configuration, management, maintenance, and support of the Extreme Wireless networks.

Plan szkolenia Rozwiń listę

  1. Solution Overview
    • WiNG features
    • ExtremeWireless WiNG APs
    • T5 Private Broadband Network solution
    • ExtremeWireless WiNG licenses
  2. Configuration Model
    • ExtremeWireless WiNG configuration model concepts such as RF Domain, Profile, Device overrides, WLAN and Policy
    • Final device configuration using these components and within configuration management tasks
    • Base MAC Address
  3. Initial Configuration
    • Initial device setup
    • Admin user roles
    • Configure management access settings via Management Policy
  4. Mint Protocol
    • MiNT protocol link layers and link levels
    • Forming MiNT links
    • Best practices and common mistakes for MiNT links
  5. AP Adoption
    • Finding a Controller using L2 and L3 adoption
    • Understanding and configuring L2 and L3 adoption
    • Best practices and common mistakes for device adoption
  6. Virtual Controller
    • New enhancements from WiNG 5.9
  7. Zero Touch Provisioning
    • Describing the provisioning policy
    • Provisioning policy wildcards
  8. Supported Deployments and Provisioning
    • New Virtual Controller features
    • Reference designs for single and central site/multi-site deployments
    • Scalability considerations
    • General best practices, trends and common design mistakes
    • Correct design and proper configuration
  9. Location Sensor
    • Extreme Location Sensor
    • Configuring WiNG to support Extreme Location
  10. Wireless LANs
    • WLAN Configuration
    • WLAN Forwarding Modes
    • WLAN assignments, authentication methods, and encryption
    • AAA Policy and Server pools and proxies
    • QoS Policies and Mappings
  11. Advanced WLAN Features
    • Configuring SMART RF
    • Using SMART RF statistics to analyse WLAN state and potential issues
    • WLAN optimization features such as Load Balancing, QoS and Roaming Assist features
    • Other advanced WLAN features
  12. Integrated Services
    • Integrated Services such as:
      • DHCP services provided by the controllers and APs
      • Radius server(s) and services
      • Role Based Access Control (RBAC)
      • IPsec VPN
      • Providing visibility to manage these applications
  13. Captive Portal
    • Captive Portal and associated features such as
      • 3 hotspot deployment options and defining policies
      • Authentication methods used to verify user registrations
      • Enforcing authentication methods
      • User and Device Registration and notification methods (email, SMS and SMS via SMTP)
  14. CMesh Features
    • MeshConnex technology vs legacy mesh
    • Self-Healing and Self-Forming MeshConnex mesh
    • Opportunistic Rate Link Adaption (ORLA)
    • Configuing MeshConnex mesh
  15. Security Features – Distributed Wireless Protections
    • Stateful L2+ Distributed Firewall features
    • IP/MAC conflict detection
    • Firewall SPI, IP ACLs, ACLS, DOS detection, and storm control
  16. Variations of Wireless IPS (WIPS) such as
    • Rogue Detection
    • Logging and Reporting
  17. Troubleshooting and Remote Diagnostics
    • Troubleshooting rules and processes
    • Different levels of log messages (log file, CLI, or remote syslog)
    • Live packet capture, different capture modes, and using capture points and filters
    • Remote debugging on the captive portal
    • Debug using events
  18. Common Mistakes
    • Identify Problems with:
      • Standalone deployment scaling and RF Domains
      • Centralized deployment scaling, AP remote sites, Controllers and AP remote sites
      • Clustering configurations for centralized controller and site controllers
      • Extended VLANs
      • Firewall policy inclusions
  19. NSight
    • Using NSight in the Network
    • Using NSight for Monitoring and Troubleshooting
  20. Extreme Guest
    • Extreme Guest Features
    • Troubleshooting Extreme Guest
Pobierz konspekt szkolenia w formacie PDF

Dodatkowe informacje

Wymagania wstępne

Students should possess an understanding of network fundamentals, traffic classifications, and general network management concepts, as well as network security concepts and technologies.

Poziom trudności
Czas trwania 4 dni

The participants will obtain certificates signed by Extreme Networks.

This course prepares also for the Extreme Certified Specialist (ECS) – Access Wireless WiNG certification exam provides networking professionals with methods to properly configure, deploy, manage and troubleshoot their Extreme Networks environments.

More information about Extreme Networks certification program and available certification levels you can find on the


Authorized Extreme Networks Trainer.

Pozostałe szkolenia Extreme Networks | Wireless

Szkolenia powiązane tematycznie

Sieci komputerowe

Formularz kontaktowy

Prosimy o wypełnienie poniższego formularza, jeśli chcą Państwo uzyskać więcej informacji o powyższym szkoleniu.

* pola oznaczone (*) są wymagane

Informacje o przetwarzaniu danych przez Compendium – Centrum Edukacyjne Spółka z o.o.


Najbliższe szkolenia Extreme Networks

Harmonogram szkoleń
Extreme Networks