Cisco Training Courses

Insoft has been serving IT community with official Cisco training offering since 2010. Find all the relevant information on Cisco training on this page.

View More

Cisco Certifications

Experience a blended learning approach that combines the best of instructor-led training and self-paced e-learning to help you prepare for your certification exam.

View More

Cisco Learning Credits

Cisco Learning Credits (CLCs) are prepaid training vouchers redeemed directly with Cisco that make planning for your success easier when purchasing Cisco products and services.

Have CLCs and want to redeem them?

Cisco Continuing Education

The Cisco Continuing Education Program offers all active certification holders flexible options to recertify by completing a variety of eligible training items.

View More

Cisco Digital Learning

Certified employees are VALUED assets. Explore Cisco official Digital Learning Library to educate yourself through recorded sessions.

Browse CDLL Catalogue

Cisco Business Enablement

The Cisco Business Enablement Partner Program focuses on sharpening the business skills of Cisco Channel Partners and customers.

View More

Fortinet Technical Certifications

The Fortinet Network Security Expert (NSE) program is an eight-level training and certification program to teach engineers of their network security for Fortinet FW skills and experience.

View More

Fortinet Technical Courses

Insoft is recognised as Fortinet Authorized Training Center in selected locations across EMEA.

View More

Official ATC Status

Check our ATC Status across selected countries in Europe.

View More

Fortinet Services Packages

Insoft Services has developed a specific solution to streamline and simplify the process of installing or migrating to Fortinet Products.

Browse Packages

Prepforce Bootcamp

The only comprehensive source available today to prepare for Fortinet NSE 8 certification globally.

View More

Microsoft Training

Insoft Services provides Microsoft training in EMEAR. We offer Microsoft technical training and certification courses that are led by world-class instructors.

View More

Technical Training

The evolution of Extreme Networks Technical Training provides a comprehensive progressive pathway from Associate to Professional accreditation.

View More

ATP Accreditation

As an authorised training partner (ATP), Insoft Services ensures that you receive the highest standards of education available.

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

View More

 

Our Mission: Provide an expert set of modern & leading edge Network Automation skills to the market through professional services.

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

View More

 

We help organisations to deploy Software-Defined Networking (SDN) solutions, such as Cisco DNA. Besides, our team has extensive experience in integrating Cisco DNA Center with third-party systems.

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

View More

About Us

Our training portfolio includes a wide range of IT training from IP providers, including Cisco, Extreme Networks, Fortinet, Microsoft, to name a few, in EMEA.

View More

Extreme Access Wireless WiNG

X

Contact Us

We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.

Subscribe

I'd like to receive emails with the latest updates and promotions from Insoft.

Data Protection & Privacy

I hereby allow Insoft Ltd. to contact me on this topic. Further, I authorise Insoft Ltd. processing, using collecting and storing my personal data for the purpose of these activities. All your data will be protected and secured as outlined in our privacy policy.


Extreme Access Wireless WiNG

Enroll Now
Extreme Access Wireless WiNG
Duration
4 Days
Delivery
(Online and onsite)
Price
Price Upon Request
In the Extreme Access Wireless WiNG (EACW) course, students will learn methods to properly configure and manage their Extreme Wireless WiNG WLAN environments using the online Web Interface. This knowledge will be reinforced through hands-on experience with wireless equipment in a lab environment, where students will perform real-world tasks configuring access points, security parameters, filtering and privacy settings, as well as managing their wireless network.

Upon completion of this course, students will have gained the working knowledge to:

  • Successfully configure and manage their Wireless implementation
  • Take the ExtremeWiNG Specialist certification exam

Solution Overview

  • WiNG features
  • ExtremeWireless WiNG APs
  • T5 Private Broadband Network solution
  • ExtremeWireless WiNG licenses

Configuration Model

  • ExtremeWireless WiNG configuration model concepts such as RF Domain, Profile, Device overrides, WLAN and Policy
  • Final device configuration using these components and within configuration management tasks
  • Base MAC Address

Initial Configuration

  • Initial device setup
  • Admin user roles
  • Configure management access settings via Management Policy

Mint Protocol

  • MiNT protocol link layers and link levels
  • Forming MiNT links
  • Best practices and common mistakes for MiNT links

AP Adoption

  • Finding a Controller using L2 and L3 adoption
  • Understanding and configuring L2 and L3 adoption
  • Best practices and common mistakes for device adoption

Virtual Controller

  • New enhancements from WiNG 5.9

Zero Touch Provisioning

  • Describing the provisioning policy
  • Provisioning policy wildcards

Supported Deployments and Provisioning

  • New Virtual Controller features
  • Reference designs for the single and central site/multi-site deployments
  • Scalability considerations
  • General best practices, trends and common design mistakes
  • Correct design and proper configuration

Location Sensor

  • Extreme Location Sensor
  • Configuring WiNG to support Extreme Location

Wireless LANs

  • WLAN Configuration
  • WLAN Forwarding Modes
  • WLAN assignments, authentication methods, and encryption
  • AAA Policy and Server pools and proxies
  • QoS Policies and Mappings

Advanced WLAN Features

  • Configuring SMART RF
  • Using SMART RF statistics to analyse WLAN state and potential issues
  • WLAN optimization features such as Load Balancing, QoS and Roaming Assist features
  • Other advanced WLAN features

Integrated Services

  • Integrated Services such as:
    • DHCP services provided by the controllers and APs
    • Radius server(s) and services
    • Role-Based Access Control (RBAC)
    • IPsec VPN
    • Providing visibility to manage these applications

Captive Portal

  • Captive Portal and associated features such as
    • 3 hotspot deployment options and defining policies
    • Authentication methods used to verify user registrations
    • Enforcing authentication methods
    • User and Device Registration and notification methods (email, SMS and SMS via SMTP)

Mesh Features

  • MeshConnex technology vs legacy mesh
  • Self-Healing and Self-Forming MeshConnex mesh
  • Opportunistic Rate Link Adaption (ORLA)
  • Configuring MeshConnex mesh

Security Features – Distributed Wireless Protections

  • Stateful L2+ Distributed Firewall features
    • IP/MAC conflict detection
    • Firewall SPI, IP ACLs, ACLS, DOS detection, and storm control

Variations of Wireless IPS (WIPS) such as

    • Rogue Detection
    • Logging and Reporting

Troubleshooting and Remote Diagnostics

  • Troubleshooting rules and processes
  • Different levels of log messages (log file, CLI, or remote Syslog)
  • Live packet capture, different capture modes, and using capture points and filters
  • Remote debugging on the captive portal
  • Debug using events

Common Mistakes

  • Identify Problems with:
    • Standalone deployment scaling and RF Domains
    • Centralized deployment scaling, AP remote sites, Controllers and AP remote sites
    • Clustering configurations for centralized controller and site controllers
    • Extended VLANs
    • Firewall policy inclusions

NSight

  • Using NSight in the Network
  • Using NSight for Monitoring and Troubleshooting

Extreme Guest

  • Extreme Guest Features
  • Troubleshooting Extreme Guest

This course is designed for individuals responsible for the configuration, management, maintenance, and support of the Extreme Wireless networks.

Before attending the Extreme Access Wireless WiNG course, students should possess an understanding of network fundamentals, traffic classifications, and general network management concepts, as well as network security concepts and technologies.

In the Extreme Access Wireless WiNG (EACW) course, students will learn methods to properly configure and manage their Extreme Wireless WiNG WLAN environments using the online Web Interface. This knowledge will be reinforced through hands-on experience with wireless equipment in a lab environment, where students will perform real-world tasks configuring access points, security parameters, filtering and privacy settings, as well as managing their wireless network.

Upon completion of this course, students will have gained the working knowledge to:

  • Successfully configure and manage their Wireless implementation
  • Take the ExtremeWiNG Specialist certification exam

Solution Overview

  • WiNG features
  • ExtremeWireless WiNG APs
  • T5 Private Broadband Network solution
  • ExtremeWireless WiNG licenses

Configuration Model

  • ExtremeWireless WiNG configuration model concepts such as RF Domain, Profile, Device overrides, WLAN and Policy
  • Final device configuration using these components and within configuration management tasks
  • Base MAC Address

Initial Configuration

  • Initial device setup
  • Admin user roles
  • Configure management access settings via Management Policy

Mint Protocol

  • MiNT protocol link layers and link levels
  • Forming MiNT links
  • Best practices and common mistakes for MiNT links

AP Adoption

  • Finding a Controller using L2 and L3 adoption
  • Understanding and configuring L2 and L3 adoption
  • Best practices and common mistakes for device adoption

Virtual Controller

  • New enhancements from WiNG 5.9

Zero Touch Provisioning

  • Describing the provisioning policy
  • Provisioning policy wildcards

Supported Deployments and Provisioning

  • New Virtual Controller features
  • Reference designs for the single and central site/multi-site deployments
  • Scalability considerations
  • General best practices, trends and common design mistakes
  • Correct design and proper configuration

Location Sensor

  • Extreme Location Sensor
  • Configuring WiNG to support Extreme Location

Wireless LANs

  • WLAN Configuration
  • WLAN Forwarding Modes
  • WLAN assignments, authentication methods, and encryption
  • AAA Policy and Server pools and proxies
  • QoS Policies and Mappings

Advanced WLAN Features

  • Configuring SMART RF
  • Using SMART RF statistics to analyse WLAN state and potential issues
  • WLAN optimization features such as Load Balancing, QoS and Roaming Assist features
  • Other advanced WLAN features

Integrated Services

  • Integrated Services such as:
    • DHCP services provided by the controllers and APs
    • Radius server(s) and services
    • Role-Based Access Control (RBAC)
    • IPsec VPN
    • Providing visibility to manage these applications

Captive Portal

  • Captive Portal and associated features such as
    • 3 hotspot deployment options and defining policies
    • Authentication methods used to verify user registrations
    • Enforcing authentication methods
    • User and Device Registration and notification methods (email, SMS and SMS via SMTP)

Mesh Features

  • MeshConnex technology vs legacy mesh
  • Self-Healing and Self-Forming MeshConnex mesh
  • Opportunistic Rate Link Adaption (ORLA)
  • Configuring MeshConnex mesh

Security Features – Distributed Wireless Protections

  • Stateful L2+ Distributed Firewall features
    • IP/MAC conflict detection
    • Firewall SPI, IP ACLs, ACLS, DOS detection, and storm control

Variations of Wireless IPS (WIPS) such as

    • Rogue Detection
    • Logging and Reporting

Troubleshooting and Remote Diagnostics

  • Troubleshooting rules and processes
  • Different levels of log messages (log file, CLI, or remote Syslog)
  • Live packet capture, different capture modes, and using capture points and filters
  • Remote debugging on the captive portal
  • Debug using events

Common Mistakes

  • Identify Problems with:
    • Standalone deployment scaling and RF Domains
    • Centralized deployment scaling, AP remote sites, Controllers and AP remote sites
    • Clustering configurations for centralized controller and site controllers
    • Extended VLANs
    • Firewall policy inclusions

NSight

  • Using NSight in the Network
  • Using NSight for Monitoring and Troubleshooting

Extreme Guest

  • Extreme Guest Features
  • Troubleshooting Extreme Guest

This course is designed for individuals responsible for the configuration, management, maintenance, and support of the Extreme Wireless networks.

Before attending the Extreme Access Wireless WiNG course, students should possess an understanding of network fundamentals, traffic classifications, and general network management concepts, as well as network security concepts and technologies.

    Upcoming Dates
  • ` Feb 6 - Feb 9, 2023
  • ` Mar 6 - Mar 9, 2023
  • ` Apr 3 - Apr 6, 2023
  • ` May 1 - May 4, 2023
  • ` May 29 - Jun 1, 2023
  • ` Jun 26 - Jun 29, 2023