{"id":4987,"date":"2022-10-30T14:16:59","date_gmt":"2022-10-30T13:16:59","guid":{"rendered":"https:\/\/wordpress-neu.fg-networking.de\/?page_id=4987"},"modified":"2023-10-04T15:31:46","modified_gmt":"2023-10-04T13:31:46","slug":"extremewireless-core","status":"publish","type":"page","link":"https:\/\/wordpress.fg-networking.de\/schulungen\/extremewireless-core\/","title":{"rendered":"ExtremeWireless Core"},"content":{"rendered":"\n
\n

ExtremeWireless Core<\/h1>\n\n\n
\n

Pods Embed Error:<\/strong> Pod not found.<\/p><\/div><\/p>\n<\/div>\n<\/div>\n<\/section>\n\n\n\n

\n
\n
<\/path><\/svg><\/div>

Kursdauer<\/h3><\/div>

Pods Embed Error:<\/strong> Pod not found.<\/p><\/div><\/p><\/div><\/div>\n<\/div>\n\n\n\n

\n
<\/path><\/svg><\/div>

Voraussetzung<\/h3><\/div>

Pods Embed Error:<\/strong> Pod not found.<\/p><\/div><\/p><\/div><\/div>\n<\/div>\n\n\n\n

\n
<\/path><\/svg><\/div>

Abschluss<\/h3><\/div>

Pods Embed Error:<\/strong> Pod not found.<\/p><\/div><\/p><\/div><\/div>\n<\/div>\n<\/section>\n\n\n\n

\n
\n

Kursbeschreibung<\/h2>
<\/div><\/div>\n\n\n\n

Zielgruppe<\/h3>

Pods Embed Error:<\/strong> Pod not found.<\/p><\/div><\/p><\/div>\n\n\n\n

Inhalt<\/h3>

Pods Embed Error:<\/strong> Pod not found.<\/p><\/div><\/p><\/div>\n<\/div>\n<\/section>\n\n\n\n

\n
\n

Kursinhalte<\/h2>
<\/div>

(Auszug aus der Kursversion

Pods Embed Error:<\/strong> Pod not found.<\/p><\/div>)<\/p><\/div>\n\n\n

Solution Overview<\/strong>
\n\u2013 ExtremeWireless Landscape
\n\u2013 WiNG at a glance
\n\u2013 What\u2019s New In WiNG 7
\n\u2013 11ax Introduction
\n\u2013 WPA3 Introduction
\n\u2013 Dual Mode Capability
\n\u2013 ExtremeWireless WiNG hardware overview<\/p>\n

Configuration Model<\/strong>
\n\u2013 ExtremeWireless WiNG configuration model concepts such as RF Domain, Profile, Device overrides, WLAN and Policy
\n\u2013 Final device configuration<\/p>\n

Mint Protocol<\/strong>
\n\u2013 MiNT protocol link layers and link levels
\n\u2013 Forming MiNT links<\/p>\n

AP Adoption<\/strong>
\n\u2013 Finding a controller using L2 and L3 adoption
\n\u2013 Understanding and configuring L2 and L3 adoption<\/p>\n

Zero Touch Provisioning<\/strong>
\n\u2013 Describing the provisioning policy
\n\u2013 Provisioning policy wildcards<\/p>\n

Supported Deployments and Provisioning<\/strong>
\n\u2013 Reference designs for single and central site\/multi-site deployments
\n\u2013 Scalability considerations
\n\u2013 General best practices and common design mistakes<\/p>\n

Clustering<\/strong>
\n\u2013 Clustering overview
\n\u2013 Clustering setup<\/p>\n

Virtual Controller<\/strong>
\n\u2013 VC overview
\n\u2013 VC configuration<\/p>\n

Initial Configuration<\/strong>
\n\u2013 Initial device setup
\n\u2013 Resetting APs to factory defaults
\n\u2013 Configure management access settings via Management Policy<\/p>\n

Software Management<\/strong>
\n\u2013 Mixed mode
\n\u2013 Image types
\n\u2013 Software upgrade<\/p>\n

Wireless LANs<\/strong>
\n\u2013 WLAN configuration
\n\u2013 WLAN forwarding modes
\n\u2013 WLAN assignments, authentication methods, and encryption
\n\u2013 AAA Policy
\n\u2013 QoS policies and mappings<\/p>\n

Advanced WLAN Features<\/strong>
\n\u2013 Configuring SMART RF
\n\u2013 Using SMART RF statistics to analyse WLAN state and potential issues
\n\u2013 WLAN optimization features<\/p>\n

Integrated Services<\/strong>
\n\u2013 DHCP server
\n\u2013 Radius server
\n\u2013 Role Based Access Control (RBAC)
\n\u2013 IPsec VPN<\/p>\n

Captive Portal<\/strong>
\n\u2013 Hotspot deployment options and defining policies
\n\u2013 Authentication methods used to verify user registrations
\n\u2013 Enforcing authentication methods
\n\u2013 User and device registration and notification methods<\/p>\n

Security Features<\/strong>
\n\u2013 Stateful L2+ Distributed Firewall features
\n\u2013 Firewall SPI, IP ACLs, ACLS, DOS detection, and storm control
\n\u2013 Variations of Wireless IPS (WIPS)<\/p>\n

Mesh Features<\/strong>
\n\u2013 MeshConnex overview
\n\u2013 Opportunistic Rate Link Adaption (ORLA)
\n\u2013 Configuring MeshConnex<\/p>\n

Troubleshooting and Remote Diagnostics<\/strong>
\n\u2013 Troubleshooting rules and processes
\n\u2013 Different levels of log messages (log file, CLI, or remote syslog)
\n\u2013 Live packet capture, different capture modes, and using capture points and filters
\n\u2013 Remote debugging on the captive portal
\n\u2013 Opening GTAC case<\/p>\n

NSight<\/strong>
\n\u2013 NSight overview
\n\u2013 Using NSight for monitoring and troubleshooting<\/p>\n

Extreme Guest<\/strong>
\n\u2013 Extreme Guest overview and features<\/p>\n

Location Sensor<\/strong>
\n\u2013 Extreme Location Sensor
\n\u2013 Configuring WiNG to support Extreme Location<\/p>\n

What\u2019s new?<\/strong>
\n\u2013 Recent firmware releases overview<\/p>\n\n\n<\/div>\n<\/section>\n\n\n\n

\n
\n

Termine<\/h2>
<\/div>

Dieser Kurs wird auf Anfrage angeboten.<\/p><\/div>\n\n\n

Pods Embed Error:<\/strong> Pod not found.<\/p><\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"

Kursbeschreibung Zielgruppe Inhalt Kursinhalte (Auszug aus der Kursversion ) Termine Dieser Kurs wird auf Anfrage angeboten.<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":4737,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_eb_attr":"","_uag_custom_page_level_css":"","footnotes":""},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"post-thumbnail":false,"esotera-featured":false,"esotera-featured-lp":false,"esotera-featured-half":false,"esotera-featured-third":false,"esotera-lpbox-1":false,"esotera-lpbox-2":false},"uagb_author_info":{"display_name":"Patrick Koppen","author_link":"https:\/\/wordpress.fg-networking.de\/author\/koppen\/"},"uagb_comment_info":0,"uagb_excerpt":"Kursbeschreibung Zielgruppe Inhalt Kursinhalte (Auszug aus der Kursversion ) Termine Dieser Kurs wird auf Anfrage angeboten.","_links":{"self":[{"href":"https:\/\/wordpress.fg-networking.de\/wp-json\/wp\/v2\/pages\/4987"}],"collection":[{"href":"https:\/\/wordpress.fg-networking.de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wordpress.fg-networking.de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wordpress.fg-networking.de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/wordpress.fg-networking.de\/wp-json\/wp\/v2\/comments?post=4987"}],"version-history":[{"count":8,"href":"https:\/\/wordpress.fg-networking.de\/wp-json\/wp\/v2\/pages\/4987\/revisions"}],"predecessor-version":[{"id":6180,"href":"https:\/\/wordpress.fg-networking.de\/wp-json\/wp\/v2\/pages\/4987\/revisions\/6180"}],"up":[{"embeddable":true,"href":"https:\/\/wordpress.fg-networking.de\/wp-json\/wp\/v2\/pages\/4737"}],"wp:attachment":[{"href":"https:\/\/wordpress.fg-networking.de\/wp-json\/wp\/v2\/media?parent=4987"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}