Configure Track Client Location Using the Tazmen Protocol

Before you begin

Create a Location Server.
Note

Note

To integrate Extreme Networks devices with location services such as Ekahau that use the Tazmen Sniffer Protocol (TZSP), you must first configure the RFID tags with the SSID settings that they will use to associate with a device. With the IP address of the location processing engine or domain name, they will connect through the device. Refer to Ekahau product documentation for details on configuring tags through the Ekahau Activator and Ekahau Positioning Engine.

About this task

Use this task to configure Extreme Networks devices to work with a TZSP-based location service.

Procedure

  1. Select Tazmen Sniffer Protocol.
  2. For IP Address or Domain Name, from the drop-down list, choose the IP address or host name for the location server that will receive TZSP-encapsulated multicast data frames, RSSI measurement, and channel information for each multicast frame.
    To add a new IP Address or Host Name, see Add IP Objects and Host Names.
  3. For Port, the Extreme Networks device listens for the connection request on the UDP port that you enter here.
    It must be the same port configured on the server.
  4. Enter the Multicast MAC Address that RFID tags periodically transmit data frames to, so that devices can listen for them on their wireless interfaces, and forward them to the location engine specified in the IP Address or Domain Name field.
  5. Enter the Rate Limit Threshold for Tags to protect Extreme Networks devices from CPU overload and attack by floods of malformed tag frames.
    The threshold applies to tags transmitting frames within the same second to the same set of Extreme Networks devices. The larger the number of tags, the less probable they will all happen to be sending multicast frames within the same second, and the less likely they will all associate within radio range of the same set of Extreme Networks devices. The threshold can be considerably lower than the number of deployed tags.

What to do next

Continue configuring the network policy. If you have not already done so, configure an SSID with which the RFID tags will associate, and add it to the network policy.