EACW – Extreme Access Wireless WiNG


Ota yhteyttä

Voit olla meihin yhteydessä ja tiedustella koulutuksistamme täydentämällä yhteystietosi ja koulutuksen nimen oheen.

Tilaa uutiskirje

Haluan tarjouksia ja tietoa koulutuksista sähköpostiini.

Tietosuojalauseke ja yksityisyys

Annan Insoft Services Ltd:lle oikeuden olla minuun yhteydessä. Annan Insoft Servicelle oikeuden käsitellä, kerätä ja tallentaa tietojani. Kaikki annetut tiedot käsitellään tietoturvallisesti tietosuojalausekkeen mukaisesti.

Tulevat päivämäärät

Oct 17 - Oct 20, 2022
09:00 - 17:00

Nov 14 - Nov 17, 2022
09:00 - 17:00

Dec 12 - Dec 15, 2022
09:00 - 17:00

Jan 9 - Jan 12, 2023
09:00 - 17:00

Feb 6 - Feb 9, 2023
09:00 - 17:00

Mar 6 - Mar 9, 2023
09:00 - 17:00

EACW – Extreme Access Wireless WiNG
4 days  (Instructor Led Online)  |  Wireless / Mobility

Course Details


In the Extreme Access Wireless WiNG (EACW) course, students will learn methods to properly configure and manage their Extreme Wireless WiNG WLAN environments using the online Web Interface. This knowledge will be reinforced through hands-on experience with wireless equipment in a lab environment, where students will perform real-world tasks configuring access points, security parameters, filtering and privacy settings, as well as managing their wireless network.


See other Extreme courses


Upon completion of this course, students will have gained the working knowledge to:

  • Successfully configure and manage their Wireless implementation
  • Take the ExtremeWiNG Specialist certification exam


Solution Overview

  • WiNG features
  • ExtremeWireless WiNG APs
  • T5 Private Broadband Network solution
  • ExtremeWireless WiNG licenses

Configuration Model

  • ExtremeWireless WiNG configuration model concepts such as RF Domain, Profile, Device overrides, WLAN and Policy
  • Final device configuration using these components and within configuration management tasks
  • Base MAC Address

Initial Configuration

  • Initial device setup
  • Admin user roles
  • Configure management access settings via Management Policy

Mint Protocol

  • MiNT protocol link layers and link levels
  • Forming MiNT links
  • Best practices and common mistakes for MiNT links

AP Adoption

  • Finding a Controller using L2 and L3 adoption
  • Understanding and configuring L2 and L3 adoption
  • Best practices and common mistakes for device adoption

Virtual Controller

  • New enhancements from WiNG 5.9

Zero Touch Provisioning

  • Describing the provisioning policy
  • Provisioning policy wildcards

Supported Deployments and Provisioning

  • New Virtual Controller features
  • Reference designs for the single and central site/multi-site deployments
  • Scalability considerations
  • General best practices, trends and common design mistakes
  • Correct design and proper configuration

Location Sensor

  • Extreme Location Sensor
  • Configuring WiNG to support Extreme Location

Wireless LANs

  • WLAN Configuration
  • WLAN Forwarding Modes
  • WLAN assignments, authentication methods, and encryption
  • AAA Policy and Server pools and proxies
  • QoS Policies and Mappings

Advanced WLAN Features

  • Configuring SMART RF
  • Using SMART RF statistics to analyse WLAN state and potential issues
  • WLAN optimization features such as Load Balancing, QoS and Roaming Assist features
  • Other advanced WLAN features

Integrated Services

  • Integrated Services such as:
    • DHCP services provided by the controllers and APs
    • Radius server(s) and services
    • Role-Based Access Control (RBAC)
    • IPsec VPN
    • Providing visibility to manage these applications

Captive Portal

  • Captive Portal and associated features such as
    • 3 hotspot deployment options and defining policies
    • Authentication methods used to verify user registrations
    • Enforcing authentication methods
    • User and Device Registration and notification methods (email, SMS and SMS via SMTP)

Mesh Features

  • MeshConnex technology vs legacy mesh
  • Self-Healing and Self-Forming MeshConnex mesh
  • Opportunistic Rate Link Adaption (ORLA)
  • Configuring MeshConnex mesh

Security Features – Distributed Wireless Protections

  • Stateful L2+ Distributed Firewall features
    • IP/MAC conflict detection
    • Firewall SPI, IP ACLs, ACLS, DOS detection, and storm control

Variations of Wireless IPS (WIPS) such as

    • Rogue Detection
    • Logging and Reporting

Troubleshooting and Remote Diagnostics

  • Troubleshooting rules and processes
  • Different levels of log messages (log file, CLI, or remote Syslog)
  • Live packet capture, different capture modes, and using capture points and filters
  • Remote debugging on the captive portal
  • Debug using events

Common Mistakes

  • Identify Problems with:
    • Standalone deployment scaling and RF Domains
    • Centralized deployment scaling, AP remote sites, Controllers and AP remote sites
    • Clustering configurations for centralized controller and site controllers
    • Extended VLANs
    • Firewall policy inclusions


  • Using NSight in the Network
  • Using NSight for Monitoring and Troubleshooting

Extreme Guest

  • Extreme Guest Features
  • Troubleshooting Extreme Guest


This course is designed for individuals responsible for the configuration, management, maintenance, and support of the Extreme Wireless networks.


Before attending the Extreme Access Wireless WiNG course, students should possess an understanding of network fundamentals, traffic classifications, and general network management concepts, as well as network security concepts and technologies.