Aruba Networks Authorized Training Center
Extreme Wireless WiNG (ECS Level) Schedule FAQ Email us

Course Overview

Students will learn methods to properly configure and manage their ExtremeWireless WiNG WLAN environments using the online Web Interface. This knowledge will be reinforced through hands-on experience with wireless equipment in a lab environment, where students will perform real world tasks configuring access points, security parameters, filtering and privacy settings, as well as managing their wireless network..

Target Audience

This course is designed for individuals responsible for the configuration, management, maintenance, and support of the Extreme Wireless networks.

Course Prerequisites

Students should possess an understanding of network fundamentals, traffic classifications, and general network management concepts, as well as network security concepts and technologies.

Course Objectives

Upon completion of this course, students will have gained the working knowledge to successfully configure and manage their Wireless implementation as well as take the Extreme Wireless Specialist certification exam

Course Agenda

  • Solution Overview
    • WiNG features
    • ExtremeWireless WiNG APs
    • T5 Private Broadband Network solution
    • ExtremeWireless WiNG licenses
  • Configuration Model
    • ExtremeWireless WiNG configuration model concepts such as RF Domain, Profile, Device overrides, WLAN and Policy
    • Final device configuration using these components and within configuration management tasks
    • Base MAC Address
  • Initial Configuration
    • Initial device setup
    • Admin user roles
    • Configure management access settings via Management Policy
  • Mint Protocol
    • MiNT protocol link layers and link levels
    • Forming MiNT links
    • Best practices and common mistakes for MiNT links
  • AP Adoption
    • Finding a Controller using L2 and L3 adoption
    • Understanding and configuring L2 and L3 adoption
    • Best practices and common mistakes for device adoption
  • Virtual Controller
    • New enhancements from WiNG 5.9
    • Zero Touch Provisioning
    • Describing the provisioning policy
    • Provisioning policy wildcards
  • Supported Deployments and Provisioning
    • New Virtual Controller features
    • Reference designs for single and central site/multi-site deployments
    • Scalability considerations
    • General best practices, trends and common design mistakes
    • Correct design and proper configuration
  • Location Sensor
    • Extreme Location Sensor
    • Configuring WiNG to support Extreme Location
  • Wireless LANs
    • WLAN Configuration
    • WLAN Forwarding Modes
    • WLAN assignments, authentication methods, and encryption
    • AAA Policy and Server pools and proxies
    • QoS Policies and Mappings
  • Advanced WLAN Features
    • Configuring SMART RF
    • Using SMART RF statistics to analyse WLAN state and potential issues
    • WLAN optimization features such as Load Balancing, QoS and Roaming Assist features
    • Other advanced WLAN features
  • Integrated Services
    • DHCP services provided by the controllers and APs
    • Radius server(s) and services
    • Role Based Access Control (RBAC)
    • IPsec VPN
    • Providing visibility to manage these applications
  • Captive Portal
    • Hotspot deployment options and defining policies
    • Authentication methods used to verify user registrations
    • Enforcing authentication methods
    • User and Device Registration and notification methods (email, SMS and SMS via SMTP)
  • Mesh Features
    • MeshConnex technology vs legacy mesh
    • Self-Healing and Self-Forming MeshConnex mesh
    • Opportunistic Rate Link Adaption (ORLA)
    • Configuing MeshConnex mesh
  • Security Features – Distributed Wireless Protections
    • Stateful L2+ Distributed Firewall features-
      • IP/MAC conflict detection
      • Firewall SPI, IP ACLs, ACLS, DOS detection, and storm control
    • Variations of Wireless IPS (WIPS) such as
      • Rogue Detection
      • Logging and Reporting
  • Troubleshooting and Remote Diagnostics
    • Troubleshooting rules and processes
    • Different levels of log messages (log file, CLI, or remote syslog)
    • Live packet capture, different capture modes, and using capture points and filters
    • Remote debugging on the captive portal
    • Debug using events
      Common Mistakes - Identify Problems with:
      • Standalone deployment scaling and RF Domains
      • Centralized deployment scaling, AP remote sites, Controllers and AP remote sites
      • Clustering configurations for centralized controller and site controllers
      • Extended VLANs
      • Firewall policy inclusions
  • NSight
    • Using NSight in the Network
    • Using NSight for Monitoring and Troubleshooting
  • Extreme Guest
    • Extreme Guest Features
    • Troubleshooting Extreme Guest

Course Duration

4 days

t:  +44 (0)845 450 3544         f: +44 (0) 845 127 4438  


netconsult online, all rights reserved - privacy policy

All courses are subject to change.  Terms and conditions apply