Training Extreme Networks

Training goals dlearning

code: EN-EAWW

Students will learn methods to properly configure and manage their ExtremeWireless WiNG WLAN environments using the online Web Interface. This knowledge will be reinforced through hands-on experience with wireless equipment in a lab environment, where students will perform real world tasks configuring access points, security parameters, filtering and privacy settings, as well as managing their wireless network.

Upon completion of this course, students will have gained the working knowledge to:

  • Successfully configure and manage their Wireless implementation
  • Take the ExtremeWiNG Specialist certification exam

Target Audience:

  • This course is designed for individuals responsible for the configuration, management, maintenance, and support of the Extreme Wireless networks.

Conspect Show list

  1. Solution Overview
    • WiNG features
    • ExtremeWireless WiNG APs
    • T5 Private Broadband Network solution
    • ExtremeWireless WiNG licenses
  2. Configuration Model
    • ExtremeWireless WiNG configuration model concepts such as RF Domain, Profile, Device overrides, WLAN and Policy
    • Final device configuration using these components and within configuration management tasks
    • Base MAC Address
  3. Initial Configuration
    • Initial device setup
    • Admin user roles
    • Configure management access settings via Management Policy
  4. Mint Protocol
    • MiNT protocol link layers and link levels
    • Forming MiNT links
    • Best practices and common mistakes for MiNT links
  5. AP Adoption
    • Finding a Controller using L2 and L3 adoption
    • Understanding and configuring L2 and L3 adoption
    • Best practices and common mistakes for device adoption
  6. Virtual Controller
    • New enhancements from WiNG 5.9
  7. Zero Touch Provisioning
    • Describing the provisioning policy
    • Provisioning policy wildcards
  8. Supported Deployments and Provisioning
    • New Virtual Controller features
    • Reference designs for single and central site/multi-site deployments
    • Scalability considerations
    • General best practices, trends and common design mistakes
    • Correct design and proper configuration
  9. Location Sensor
    • Extreme Location Sensor
    • Configuring WiNG to support Extreme Location
  10. Wireless LANs
    • WLAN Configuration
    • WLAN Forwarding Modes
    • WLAN assignments, authentication methods, and encryption
    • AAA Policy and Server pools and proxies
    • QoS Policies and Mappings
  11. Advanced WLAN Features
    • Configuring SMART RF
    • Using SMART RF statistics to analyse WLAN state and potential issues
    • WLAN optimization features such as Load Balancing, QoS and Roaming Assist features
    • Other advanced WLAN features
  12. Integrated Services
    • Integrated Services such as:
      • DHCP services provided by the controllers and APs
      • Radius server(s) and services
      • Role Based Access Control (RBAC)
      • IPsec VPN
      • Providing visibility to manage these applications
  13. Captive Portal
    • Captive Portal and associated features such as
      • 3 hotspot deployment options and defining policies
      • Authentication methods used to verify user registrations
      • Enforcing authentication methods
      • User and Device Registration and notification methods (email, SMS and SMS via SMTP)
  14. CMesh Features
    • MeshConnex technology vs legacy mesh
    • Self-Healing and Self-Forming MeshConnex mesh
    • Opportunistic Rate Link Adaption (ORLA)
    • Configuing MeshConnex mesh
  15. Security Features – Distributed Wireless Protections
    • Stateful L2+ Distributed Firewall features
    • IP/MAC conflict detection
    • Firewall SPI, IP ACLs, ACLS, DOS detection, and storm control
  16. Variations of Wireless IPS (WIPS) such as
    • Rogue Detection
    • Logging and Reporting
  17. Troubleshooting and Remote Diagnostics
    • Troubleshooting rules and processes
    • Different levels of log messages (log file, CLI, or remote syslog)
    • Live packet capture, different capture modes, and using capture points and filters
    • Remote debugging on the captive portal
    • Debug using events
  18. Common Mistakes
    • Identify Problems with:
      • Standalone deployment scaling and RF Domains
      • Centralized deployment scaling, AP remote sites, Controllers and AP remote sites
      • Clustering configurations for centralized controller and site controllers
      • Extended VLANs
      • Firewall policy inclusions
  19. NSight
    • Using NSight in the Network
    • Using NSight for Monitoring and Troubleshooting
  20. Extreme Guest
    • Extreme Guest Features
    • Troubleshooting Extreme Guest
Download conspect training as PDF

Additional information


Students should possess an understanding of network fundamentals, traffic classifications, and general network management concepts, as well as network security concepts and technologies.

Difficulty level
Duration 4 days

The participants will obtain certificates signed by Extreme Networks.

This course prepares also for the Extreme Certified Specialist (ECS) – Access Wireless WiNG certification exam provides networking professionals with methods to properly configure, deploy, manage and troubleshoot their Extreme Networks environments.

More information about Extreme Networks certification program and available certification levels you can find on the


Authorized Extreme Networks Trainer.

Other training Extreme Networks | Wireless

Training thematically related

Networking and Wireless

Contact form

Please fill form below to obtain more info about this training.

* Fields marked with (*) are required !!!

Information on data processing by Compendium - Centrum Edukacyjne Spółka z o.o.

1800 EUR








    • General information
    • Guaranteed dates
    • Last minute (-10%)
    • Language of the training
    • English
Book a training appointment

Traditional training

Sessions organised at Compendium CE are usually held in our locations in Kraków and Warsaw, but also in venues designated by the client. The group participating in training meets at a specific place and specific time with a coach and actively participates in laboratory sessions.

Dlearning training

You may participate from at any place in the world. It is sufficient to have a computer (or, actually a tablet, or smartphone) connected to the Internet. Compendium CE provides each Distance Learning training participant with adequate software enabling connection to the Data Center. For more information, please visit site


Paper materials

Traditional materials: The price includes standard materials issued in the form of paper books, printed or other, depending on the arrangements with the manufacturer.

Electronic materials

Electronic materials: These are electronic training materials that are available to you based on your specific application: Skillpipe, eVantage, etc., or as PDF documents.

Ctab materials

Ctab materials: the price includes ctab tablet and electronic training materials or traditional training materials and supplies provided electronically according to manufacturer's specifications (in PDF or EPUB form). The materials provided are adapted for display on ctab tablets. For more information, check out the ctab website.

Upcoming Extreme Networks training

Training schedule
Extreme Networks