Configure a Location Server.
Note
When tracking AeroScout RFID tags, you must use the
AeroScout Tag Manager to configure the tags to
broadcast beacons using the IBSS data frame format. Navigate to the
Transmission tab in the
Configuration window. Choose
IBSS from the Data Frame Format drop-down list, make
sure that the MAC address in the
IBSS/WDS field is
01-0C-CC-00-00-00, which it is by default with
IBSS chosen, and then select
Save.
To integrate devices with AeroScout real-time locating services (RTLS), define the IP
address or domain name of the AeroScout Engine, designate the types of wireless
devices locations to track, set a threshold for the maximum number of packets per
second, and enable the feature.
-
Select AeroScout
Location Server.
-
For IP Address or Domain Name, from the drop-down list,
choose the IP address or host name of the AeroScout location processing engine
that will receive tracking reports.
Extreme Networks devices receive messages from the server on UDP port 1144. To
add a new IP Address or Host Name, see
Add IP Objects and Host Names.
-
Select Enable location detection for tags to enable
Extreme Networks devices to track Wi-Fi enabled tags and then forward them
together with their RSSI values to the AeroScout location processing engine.
Set a rate limit threshold to protect devices from CPU overload and attack by
floods of malformed tag frames.
-
Select Enable location detection for stations to enable
tracking currently active wireless stations.
Set a rate limit threshold to determine the maximum number of
station-transmitted packets to process each second. This threshold limits the
amount of device CPU resources allocated to station tracking and protects the
device from packet flood attacks.
-
Select Enable location detection for rogue APs to enable
Extreme Networks devices to track the location of rogue APs, and report captured
packets and rogue AP RSSI values to the AeroScout location processing
engine.
Set a rate limit threshold to protect Extreme Networks devices from CPU
overload and packet flood attacks.
Continue configuring a network policy.