Customize Wireless Network Optional Settings

Before you begin

Configure a standard wireless network.

About this task

When you configure an SSID, you can configure and apply radio rates, DoS prevention settings, traffic filters, and other options.

Procedure

  1. Select Optional Settings CUSTOMIZE under Additional Settings.
  2. For Radios and Rates, select the radio frequency and set the basic (mandatory) and optional data rates per SSID.
    By default, Extreme Networks devices advertise support for all rates on their SSIDs. By setting specific rates, you can restrict access to just those clients that can support them. Use these controls to force clients to connect at higher data rates on your SSID, which can help increase average data transfer rates.
  3. See Customize DoS Prevention for DoS Prevention customization instructions.
  4. Select Traffic Filters to control which management and diagnostic services an AP is permitted to receive and whether it allows traffic between clients connected to the AP by selected traffic filters.
    1. Select the appropriate check boxes to permit specific types of management and diagnostic access to the mgt0 interface, and enable traffic between clients connected to the AP.
    2. Clear the check boxes to deny access.
    Note

    Note

    When an Ethernet interface is in access mode, stations can communicate directly with each other without sending traffic through the AP. In this case, the AP cannot control their traffic. However, the AP can block traffic between stations connected to an Ethernet interface and stations connected to a wireless interface through an SSID.
  5. Use Choose User Profile Application Sequence in cases where different components in the SSID reference different user profiles.
    You can specify which profile you want to apply to user traffic. By default, an AP applies user profiles in the following order (the last one is what the AP ultimately applies to user traffic):
    • First, the AP applies the user profile indicated by attributes returned by a RADIUS server performing MAC authentication.
    • Second, the AP applies the user profile specified in an SSID for traffic management. This overrides the first user profile.
    • Third, the AP applies the user profile indicated by attributes returned from a RADIUS server when a captive web portal requires user authentication. This user profile overrides both the first and second profiles.

    To give priority to a user profile by applying it later in the sequence, reorder the profiles.

  6. For Voice Enterprise, see Configure Voice Enterprise Options.
  7. Select Enable WWM to enable WiFi Multimedia™ to prioritize network traffic.
    1. Select Voice to enable admission control algorithms for voice traffic.
    2. Select Video to enable admission control algorithms for video traffic.
    3. Select Enable Unscheduled Automatic Power Save Delivery to enable stations to request queued traffic at any time, rather than receiving queued traffic scheduled with the beacon.
  8. For the Broadcast and Multicast Handling section, see Customize Broadcast and Multicast Handling Settings.
  9. In the Client Related Network Settings section, define client usage parameters to control how devices in the SSID transmit data, how neighboring devices exchange information with each other, and the maximum number of clients that the SSID supports.
    • Maximum client limit: Set the maximum number of clients that can associate with an SSID on a device.
    • EAP Timeout (Enterprise Security Mode Only): During the 802.1x authentication phase, in the event of an EAP retry due to packet loss or lack of response from the client, the AP can retry the EAP request. Some clients cannot properly handle fast retry timers, so this might need adjustment to facilitate fast recovery for bad RF environments.
    • Inactive client ageout: Set the length of time to age out and automatically disassociate inactive clients.
    • EAP Retries (Enterprise Security Mode Only): After the EAP timeout, authentication fails and the client tries to reconnect per this value.
    • RTS threshold: The RTS (request-to-send) threshold indicates the minimum packet size to trigger an RTS/CTS (request-to-send/clear-to-send) exchange. The purpose of this exchange is to reserve the medium and thereby reduce collision interference.
    • Fragment threshold: The fragment threshold indicates the minimum packet size to begin fragmenting packets before transmitting them. If there is a high level of interference, smaller packet sizes can reduce the need to retransmit packets and improve performance.
    • DTIM settings: Extreme Networks devices include delivery traffic indication messages (DTIM) in beacons at scheduled intervals. DTIMs are included in beacons according to the DTIM period that you set. Increase the DTIM setting to improve battery life or shorten it to deliver buffered broadcast and multicast traffic more frequently.
    • Roaming cache update interval: An Extreme Networks AP updates its neighbors about its currently associated clients. Neighboring APs use this information to update their roaming caches—if necessary—with the most up-to-date client information from their neighboring APs.
    • Roaming cache ageout: By default, an Extreme Networks device removes an entry from its roaming cache if it is absent from 60 consecutive updates from a neighbor. You can change the number of times an entry must be absent.
  10. Select Ignore broadcast probe request to enable Extreme Networks devices hosting this SSID to ignore probe requests from wireless clients.
  11. Select Hide SSID (Stealth mode) to enable a simple but ineffective method to secure a wireless network; it hides the SSID (Service Set Identifier).
    Note

    Note

    This provides very little protection against anything but the most casual intrusion efforts.
  12. Select Save.

What to do next

Continue configuring the wireless network policy.