Before you begin
Create a Location Server.
Note
To integrate Extreme Networks devices with location
services such as Ekahau that use the Tazmen Sniffer Protocol (TZSP), you must
first configure the RFID tags with the SSID settings that they will use to
associate with a device. With the IP address of the location processing engine
or domain name, they will connect through the device. Refer to Ekahau product
documentation for details on configuring tags through the Ekahau Activator and
Ekahau Positioning Engine.
About this task
Use this task to configure Extreme Networks devices to work with a TZSP-based
location service.
Procedure
-
Select Tazmen Sniffer
Protocol.
-
For IP Address or Domain Name, from the drop-down list,
choose the IP address or host name for the location server that will receive
TZSP-encapsulated multicast data frames, RSSI measurement, and channel
information for each multicast frame.
-
For Port, the Extreme Networks device listens for the
connection request on the UDP port that you enter here.
It must be the same port configured on the server.
-
Enter the Multicast MAC Address that RFID tags
periodically transmit data frames to, so that devices can listen for them on
their wireless interfaces, and forward them to the location engine specified in
the IP Address or Domain Name field.
-
Enter the Rate Limit Threshold for Tags to protect
Extreme Networks devices from CPU overload and attack by floods of malformed tag
frames.
The threshold applies to tags transmitting frames within the same second to
the same set of Extreme Networks devices. The larger the number of tags, the
less probable they will all happen to be sending multicast frames within the
same second, and the less likely they will all associate within radio range of
the same set of Extreme Networks devices. The threshold can be considerably
lower than the number of deployed tags.
What to do next
Continue configuring the network policy. If you have not already done so, configure
an SSID with which the RFID tags will associate, and add it to the network
policy.