EACW – Extreme Access Wireless WiNG


Contact Us

We would love to hear from you. Please complete this form to pre-book or request further information about our delivery options.


I'd like to receive emails with the latest updates and promotions from Insoft.

Data Protection & Privacy

I hereby allow Insoft Ltd. to contact me on this topic. Further, I authorise Insoft Ltd. processing, using collecting and storing my personal data for the purpose of these activities. All your data will be protected and secured as outlined in our privacy policy.

Upcoming Dates

Sep 19 - Sep 22, 2022
09:00 - 17:00

Oct 17 - Oct 20, 2022
09:00 - 17:00

Nov 14 - Nov 17, 2022
09:00 - 17:00

Dec 12 - Dec 15, 2022
09:00 - 17:00

Jan 9 - Jan 12, 2023
09:00 - 17:00

Feb 6 - Feb 9, 2023
09:00 - 17:00

EACW – Extreme Access Wireless WiNG
4 days  (Instructor Led Online)  |  Wireless / Mobility

Course Details

In the Extreme Access Wireless WiNG (EACW) course, students will learn methods to properly configure and manage their Extreme Wireless WiNG WLAN environments using the online Web Interface. This knowledge will be reinforced through hands-on experience with wireless equipment in a lab environment, where students will perform real-world tasks configuring access points, security parameters, filtering and privacy settings, as well as managing their wireless network.


Upon completion of this course, students will have gained the working knowledge to:

  • Successfully configure and manage their Wireless implementation
  • Take the ExtremeWiNG Specialist certification exam


Solution Overview

  • WiNG features
  • ExtremeWireless WiNG APs
  • T5 Private Broadband Network solution
  • ExtremeWireless WiNG licenses

Configuration Model

  • ExtremeWireless WiNG configuration model concepts such as RF Domain, Profile, Device overrides, WLAN and Policy
  • Final device configuration using these components and within configuration management tasks
  • Base MAC Address

Initial Configuration

  • Initial device setup
  • Admin user roles
  • Configure management access settings via Management Policy

Mint Protocol

  • MiNT protocol link layers and link levels
  • Forming MiNT links
  • Best practices and common mistakes for MiNT links

AP Adoption

  • Finding a Controller using L2 and L3 adoption
  • Understanding and configuring L2 and L3 adoption
  • Best practices and common mistakes for device adoption

Virtual Controller

  • New enhancements from WiNG 5.9

Zero Touch Provisioning

  • Describing the provisioning policy
  • Provisioning policy wildcards

Supported Deployments and Provisioning

  • New Virtual Controller features
  • Reference designs for the single and central site/multi-site deployments
  • Scalability considerations
  • General best practices, trends and common design mistakes
  • Correct design and proper configuration

Location Sensor

  • Extreme Location Sensor
  • Configuring WiNG to support Extreme Location

Wireless LANs

  • WLAN Configuration
  • WLAN Forwarding Modes
  • WLAN assignments, authentication methods, and encryption
  • AAA Policy and Server pools and proxies
  • QoS Policies and Mappings

Advanced WLAN Features

  • Configuring SMART RF
  • Using SMART RF statistics to analyse WLAN state and potential issues
  • WLAN optimization features such as Load Balancing, QoS and Roaming Assist features
  • Other advanced WLAN features

Integrated Services

  • Integrated Services such as:
    • DHCP services provided by the controllers and APs
    • Radius server(s) and services
    • Role-Based Access Control (RBAC)
    • IPsec VPN
    • Providing visibility to manage these applications

Captive Portal

  • Captive Portal and associated features such as
    • 3 hotspot deployment options and defining policies
    • Authentication methods used to verify user registrations
    • Enforcing authentication methods
    • User and Device Registration and notification methods (email, SMS and SMS via SMTP)

Mesh Features

  • MeshConnex technology vs legacy mesh
  • Self-Healing and Self-Forming MeshConnex mesh
  • Opportunistic Rate Link Adaption (ORLA)
  • Configuring MeshConnex mesh

Security Features – Distributed Wireless Protections

  • Stateful L2+ Distributed Firewall features
    • IP/MAC conflict detection
    • Firewall SPI, IP ACLs, ACLS, DOS detection, and storm control

Variations of Wireless IPS (WIPS) such as

    • Rogue Detection
    • Logging and Reporting

Troubleshooting and Remote Diagnostics

  • Troubleshooting rules and processes
  • Different levels of log messages (log file, CLI, or remote Syslog)
  • Live packet capture, different capture modes, and using capture points and filters
  • Remote debugging on the captive portal
  • Debug using events

Common Mistakes

  • Identify Problems with:
    • Standalone deployment scaling and RF Domains
    • Centralized deployment scaling, AP remote sites, Controllers and AP remote sites
    • Clustering configurations for centralized controller and site controllers
    • Extended VLANs
    • Firewall policy inclusions


  • Using NSight in the Network
  • Using NSight for Monitoring and Troubleshooting

Extreme Guest

  • Extreme Guest Features
  • Troubleshooting Extreme Guest

Target Audience

This course is designed for individuals responsible for the configuration, management, maintenance, and support of the Extreme Wireless networks.


Before attending the Extreme Access Wireless WiNG course, students should possess an understanding of network fundamentals, traffic classifications, and general network management concepts, as well as network security concepts and technologies.