<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic RE: WM3700 (WINGS 5.7.0.0-057R) We have a problem with the wireless controller. in ExtremeWireless (WiNG)</title>
    <link>https://community.extremenetworks.com/t5/extremewireless-wing/wm3700-wings-5-7-0-0-057r-we-have-a-problem-with-the-wireless/m-p/22063#M1684</link>
    <description>Hello Jeon,&lt;BR /&gt;
Right now this topic is marked "private," which means only Extreme Networks employees can view and respond to it. Would it be okay if I mark this public so others can respond? I see some public IP addresses in your configuration, so I wanted to ask first.&lt;BR /&gt;</description>
    <pubDate>Wed, 29 Nov 2017 21:40:00 GMT</pubDate>
    <dc:creator>Drew_C</dc:creator>
    <dc:date>2017-11-29T21:40:00Z</dc:date>
    <item>
      <title>WM3700 (WINGS 5.7.0.0-057R) We have a problem with the wireless controller.</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/wm3700-wings-5-7-0-0-057r-we-have-a-problem-with-the-wireless/m-p/22062#M1683</link>
      <description>Good morning !&lt;BR /&gt;
&lt;BR /&gt;
I did not speak English and I used Google Translator. Sorry.&lt;BR /&gt;
Image WINGS 5.7.0.0-057R There is a failure. Please check the settings.&lt;BR /&gt;
WM3700 is converted to Morotora image and is in use.The current version is using 5.7.0.0-057R.&lt;BR /&gt;
There are many problems in operation.&lt;BR /&gt;
&lt;BR /&gt;
1. Symptoms occur when you enable the firewall feature in a firewall policy.&lt;BR /&gt;
&lt;BR /&gt;
2. The dhcp server is the current controller and the user does not receive the ip correctly.&lt;BR /&gt;
   Some people are good, but some people do not get IP from time to time.&lt;BR /&gt;
&lt;BR /&gt;
3. I am running Active-Standby Controller and check the settings.&lt;BR /&gt;
&lt;BR /&gt;
4. If the SNMP data is high, the response is late. I do not know why.&lt;BR /&gt;
   If the SNMP capacity is low, an immediate response is received. If the SNMP capacity is large, it is very late&lt;BR /&gt;
&lt;BR /&gt;
--------------------------------------------------------------------------------------------------------------------------------&lt;BR /&gt;
&lt;BR /&gt;
Controller-A&lt;BR /&gt;
&lt;BR /&gt;
!&lt;BR /&gt;
! Configuration of RFS7000 version 5.7.0.0-057R&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
version 2.3&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
ip access-list BROADCAST-MULTICAST-CONTROL&lt;BR /&gt;
 permit tcp any any log rule-precedence 10 &lt;BR /&gt;
 permit udp any eq 67 any eq dhcpc log rule-precedence 11 &lt;BR /&gt;
 permit proto 254 any any log rule-precedence 19 &lt;BR /&gt;
 deny udp any range 137 138 any range 137 138 log rule-precedence 21 &lt;BR /&gt;
 deny ip any 224.0.0.0/4 log rule-precedence 22 &lt;BR /&gt;
 deny ip any host 255.255.255.255 log rule-precedence 23 &lt;BR /&gt;
 permit ip any any log rule-precedence 101 &lt;BR /&gt;
!&lt;BR /&gt;
mac access-list PERMIT-ARP-AND-IPv4&lt;BR /&gt;
 permit any any type ip rule-precedence 10 &lt;BR /&gt;
 permit any any type arp rule-precedence 20 &lt;BR /&gt;
!&lt;BR /&gt;
ip snmp-access-list default&lt;BR /&gt;
 permit any&lt;BR /&gt;
!&lt;BR /&gt;
firewall-policy default&lt;BR /&gt;
 no ip dos smurf&lt;BR /&gt;
 no ip dos twinge&lt;BR /&gt;
 no ip dos invalid-protocol&lt;BR /&gt;
 no ip dos router-advt&lt;BR /&gt;
 ip dos router-solicit log-only log-level warnings &lt;BR /&gt;
 no ip dos option-route&lt;BR /&gt;
 no ip dos ascend&lt;BR /&gt;
 no ip dos chargen&lt;BR /&gt;
 no ip dos fraggle&lt;BR /&gt;
 no ip dos snork&lt;BR /&gt;
 no ip dos ftp-bounce&lt;BR /&gt;
 no ip dos tcp-intercept&lt;BR /&gt;
 no ip dos broadcast-multicast-icmp&lt;BR /&gt;
 no ip dos land&lt;BR /&gt;
 no ip dos tcp-xmas-scan&lt;BR /&gt;
 no ip dos tcp-null-scan&lt;BR /&gt;
 no ip dos winnuke&lt;BR /&gt;
 no ip dos tcp-fin-scan&lt;BR /&gt;
 no ip dos udp-short-hdr&lt;BR /&gt;
 no ip dos tcp-post-syn&lt;BR /&gt;
 no ip dos tcphdrfrag&lt;BR /&gt;
 no ip dos ip-ttl-zero&lt;BR /&gt;
 no ip dos ipspoof&lt;BR /&gt;
 no ip dos tcp-bad-sequence&lt;BR /&gt;
 no ip dos tcp-sequence-past-window&lt;BR /&gt;
 no ip tcp validate-rst-seq-number&lt;BR /&gt;
 no ip tcp validate-rst-ack-number&lt;BR /&gt;
 no ip tcp validate-icmp-unreachable&lt;BR /&gt;
 no ip tcp recreate-flow-on-out-of-state-syn&lt;BR /&gt;
 no ip tcp optimize-unnecessary-resends&lt;BR /&gt;
 ip-mac conflict log-only log-level warnings &lt;BR /&gt;
 dhcp-offer-convert&lt;BR /&gt;
 no proxy-arp&lt;BR /&gt;
 no firewall enable&lt;BR /&gt;
 no ipv6 firewall enable&lt;BR /&gt;
 no ipv6 strict-ext-hdr-check &lt;BR /&gt;
 no ipv6 unknown-options &lt;BR /&gt;
 no ipv6 duplicate-options &lt;BR /&gt;
 no ipv6 option strict-hao-opt-check&lt;BR /&gt;
 no ipv6 option strict-padding&lt;BR /&gt;
 no ipv6 dos multicast-icmpv6&lt;BR /&gt;
 no ipv6 dos hop-limit-zero&lt;BR /&gt;
 no ipv6 dos tcp-intercept-mobility&lt;BR /&gt;
 no alg ftp&lt;BR /&gt;
 no alg tftp&lt;BR /&gt;
 no alg dns&lt;BR /&gt;
 no alg pptp&lt;BR /&gt;
 virtual-defragmentation maximum-fragments-per-datagram 2000&lt;BR /&gt;
 no proxy-nd&lt;BR /&gt;
 no ipv6-mac conflict&lt;BR /&gt;
 no ipv6-mac routing conflict&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
mint-policy global-default&lt;BR /&gt;
!&lt;BR /&gt;
wlan-qos-policy default&lt;BR /&gt;
 qos trust dscp&lt;BR /&gt;
 qos trust wmm&lt;BR /&gt;
!&lt;BR /&gt;
radio-qos-policy default&lt;BR /&gt;
 no admission-control firewall-detected-traffic&lt;BR /&gt;
 no admission-control implicit-tspec&lt;BR /&gt;
 admission-control voice max-clients 256&lt;BR /&gt;
 admission-control voice max-roamed-clients 256&lt;BR /&gt;
 admission-control voice reserved-for-roam-percent 150&lt;BR /&gt;
 admission-control video max-clients 256&lt;BR /&gt;
 admission-control video max-roamed-clients 256&lt;BR /&gt;
 admission-control video reserved-for-roam-percent 150&lt;BR /&gt;
 accelerated-multicast max-client-streams 3&lt;BR /&gt;
!&lt;BR /&gt;
wlan guest_wifi&lt;BR /&gt;
 description guest@seoul&lt;BR /&gt;
 ssid guest@seoul&lt;BR /&gt;
 vlan-pool-member 90 limit 250&lt;BR /&gt;
 vlan-pool-member 91 limit 250&lt;BR /&gt;
 vlan-pool-member 92 limit 250&lt;BR /&gt;
 vlan-pool-member 93 limit 250&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type none&lt;BR /&gt;
 authentication-type none&lt;BR /&gt;
 wireless-client cred-cache-ageout 1200&lt;BR /&gt;
 wireless-client vlan-cache-ageout 1200&lt;BR /&gt;
!&lt;BR /&gt;
wlan guestSecure&lt;BR /&gt;
 description guestSecure@Seoul&lt;BR /&gt;
 ssid guestSecure@Seoul&lt;BR /&gt;
 vlan-pool-member 112 limit 250&lt;BR /&gt;
 vlan-pool-member 113 limit 250&lt;BR /&gt;
 vlan-pool-member 114 limit 250&lt;BR /&gt;
 vlan-pool-member 115 limit 250&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type none&lt;BR /&gt;
 authentication-type none&lt;BR /&gt;
 wireless-client hold-time 5&lt;BR /&gt;
!&lt;BR /&gt;
dhcp-server-policy DHCP_Rule&lt;BR /&gt;
 dhcp-pool DHCP_114&lt;BR /&gt;
  network 210.104.114.0/24&lt;BR /&gt;
  address range 210.104.114.2 210.104.114.253 &lt;BR /&gt;
  lease 0 4&lt;BR /&gt;
  default-router 210.104.114.254&lt;BR /&gt;
  dns-server 168.126.63.1&lt;BR /&gt;
 dhcp-pool DHCP_115&lt;BR /&gt;
  network 210.104.115.0/24&lt;BR /&gt;
  address range 210.104.115.2 210.104.115.253 &lt;BR /&gt;
  lease 0 4&lt;BR /&gt;
  default-router 210.104.115.254&lt;BR /&gt;
  dns-server 168.126.63.1&lt;BR /&gt;
 dhcp-pool DHCP_112&lt;BR /&gt;
  network 210.104.112.0/24&lt;BR /&gt;
  address range 210.104.112.2 210.104.112.253 &lt;BR /&gt;
  lease 0 4&lt;BR /&gt;
  default-router 210.104.112.254&lt;BR /&gt;
  dns-server 168.126.63.1&lt;BR /&gt;
 dhcp-pool DHCP_91&lt;BR /&gt;
  network 210.104.91.0/24&lt;BR /&gt;
  address range 210.104.91.2 210.104.91.253 &lt;BR /&gt;
  lease 0 0 30&lt;BR /&gt;
  default-router 210.104.91.254&lt;BR /&gt;
  dns-server 168.126.63.1&lt;BR /&gt;
 dhcp-pool DHCP_92&lt;BR /&gt;
  network 210.104.92.0/24&lt;BR /&gt;
  address range 210.104.92.2 210.104.92.253 &lt;BR /&gt;
  lease 0 0 30&lt;BR /&gt;
  default-router 210.104.92.254&lt;BR /&gt;
  dns-server 168.126.63.1&lt;BR /&gt;
 dhcp-pool DHCP_93&lt;BR /&gt;
  network 210.104.93.0/24&lt;BR /&gt;
  address range 210.104.93.2 210.104.93.253 &lt;BR /&gt;
  lease 0 0 30&lt;BR /&gt;
  default-router 210.104.93.254&lt;BR /&gt;
  dns-server 168.126.63.1&lt;BR /&gt;
 dhcp-pool DHCP_90&lt;BR /&gt;
  network 210.104.90.0/24&lt;BR /&gt;
  address range 210.104.90.2 210.104.90.253 &lt;BR /&gt;
  lease 0 0 30&lt;BR /&gt;
  default-router 210.104.90.254&lt;BR /&gt;
  dns-server 168.126.63.1&lt;BR /&gt;
 dhcp-pool DHCP_113&lt;BR /&gt;
  network 210.104.113.0/24&lt;BR /&gt;
  address range 210.104.113.2 210.104.113.253 &lt;BR /&gt;
  lease 0 4&lt;BR /&gt;
  default-router 210.104.113.254&lt;BR /&gt;
  dns-server 168.126.63.1 164.124.101.2&lt;BR /&gt;
 dhcp-server activation-criteria cluster-master&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
management-policy default&lt;BR /&gt;
 telnet&lt;BR /&gt;
 no http server&lt;BR /&gt;
 https server&lt;BR /&gt;
 ssh&lt;BR /&gt;
 snmp-server manager v2&lt;BR /&gt;
 snmp-server community 0 hotelw ro&lt;BR /&gt;
 snmp-server user snmpoperator v3 encrypted des auth md5 0 &lt;BR /&gt;
 snmp-server user snmptrap v3 encrypted des auth md5 0 &lt;BR /&gt;
 snmp-server user snmpmanager v3 encrypted des auth md5 0 &lt;BR /&gt;
 no t5 snmp-server enable server&lt;BR /&gt;
 no t5 snmp-server enable traps&lt;BR /&gt;
 banner motd welcome to CLI&lt;BR /&gt;
!&lt;BR /&gt;
l2tpv3 policy default&lt;BR /&gt;
!&lt;BR /&gt;
profile rfs7000 default-rfs7000&lt;BR /&gt;
 ip default-gateway 210.105.79.1&lt;BR /&gt;
 no ip default-gateway failover&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto remote-vpn-client&lt;BR /&gt;
 interface me1&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  switchport mode trunk&lt;BR /&gt;
  switchport trunk native vlan 500&lt;BR /&gt;
  switchport trunk native tagged&lt;BR /&gt;
  switchport trunk allowed vlan 90-93,112-115,500,600&lt;BR /&gt;
 interface ge2&lt;BR /&gt;
  shutdown&lt;BR /&gt;
 interface ge3&lt;BR /&gt;
  shutdown&lt;BR /&gt;
 interface ge4&lt;BR /&gt;
  shutdown&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use dhcp-server-policy DHCP_Rule&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 cluster name Splex&lt;BR /&gt;
 cluster member ip 210.105.79.253 level 2&lt;BR /&gt;
 cluster member ip 210.105.79.254 level 2&lt;BR /&gt;
 cluster member vlan 500&lt;BR /&gt;
 cluster master-priority 255&lt;BR /&gt;
 cluster force-configured-state-delay 3&lt;BR /&gt;
 cluster radius-counter-db-sync-time 1&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
 router ospf&lt;BR /&gt;
!&lt;BR /&gt;
&lt;BR /&gt;
!&lt;BR /&gt;
profile ap650 default-ap650&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto load-management&lt;BR /&gt;
 crypto remote-vpn-client&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  wlan Seoul_WiFi bss 1 primary&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  wlan Seoul_WiFi bss 1 primary&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
 interface vlan500&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
!&lt;BR /&gt;
&lt;BR /&gt;
profile ap6562 DMW_AP_EXT_ap6562&lt;BR /&gt;
 ip default-gateway 210.105.80.1&lt;BR /&gt;
 no ip default-gateway failover&lt;BR /&gt;
 no autoinstall configuration&lt;BR /&gt;
 no autoinstall firmware&lt;BR /&gt;
 device-upgrade auto ap6562&lt;BR /&gt;
 load-balancing balance-ap-loads&lt;BR /&gt;
 load-balancing balance-band-loads&lt;BR /&gt;
 load-balancing balance-channel-loads 5ghz&lt;BR /&gt;
 load-balancing balance-channel-loads 2.4ghz&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto load-management&lt;BR /&gt;
 crypto remote-vpn-client&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  wlan Seoul_WiFi bss 1 primary&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  wlan Seoul_WiFi bss 1 primary&lt;BR /&gt;
  antenna-mode 2x2&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  switchport mode access&lt;BR /&gt;
  switchport access vlan 600&lt;BR /&gt;
 interface vlan600&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 controller host 210.105.79.253 pool 1 level 1&lt;BR /&gt;
 controller host 210.105.79.254 pool 1 level 1&lt;BR /&gt;
 controller vlan 500&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
 router ospf&lt;BR /&gt;
!&lt;BR /&gt;
&lt;BR /&gt;
rf-domain DMW&lt;BR /&gt;
 location DaeMinDongWiress&lt;BR /&gt;
 timezone Asia/Seoul&lt;BR /&gt;
 country-code kr&lt;BR /&gt;
!&lt;BR /&gt;
rf-domain JMW&lt;BR /&gt;
 location JeonMunDongWiress&lt;BR /&gt;
 timezone Asia/Seoul&lt;BR /&gt;
 country-code kr&lt;BR /&gt;
!&lt;BR /&gt;
rf-domain default&lt;BR /&gt;
 timezone Asia/Seoul&lt;BR /&gt;
 country-code kr&lt;BR /&gt;
!&lt;BR /&gt;
rfs7000 &lt;BR /&gt;
 use profile default-rfs7000&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname WM3700-MASTER&lt;BR /&gt;
 ip default-gateway 210.105.79.1&lt;BR /&gt;
 ip default-gateway failover&lt;BR /&gt;
 no use radius-server-policy&lt;BR /&gt;
 interface me1&lt;BR /&gt;
  duplex auto&lt;BR /&gt;
  ip address 192.168.0.1/24&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  no description&lt;BR /&gt;
  switchport mode trunk&lt;BR /&gt;
  switchport trunk native vlan 500&lt;BR /&gt;
  switchport trunk native tagged&lt;BR /&gt;
  switchport trunk allowed vlan 90-93,112-115,500,600&lt;BR /&gt;
 interface ge2&lt;BR /&gt;
  no description&lt;BR /&gt;
  switchport mode access&lt;BR /&gt;
  switchport access vlan 1&lt;BR /&gt;
 interface vlan90&lt;BR /&gt;
  ip address 210.104.90.1/24&lt;BR /&gt;
  no dhcp-relay-incoming&lt;BR /&gt;
 interface vlan91&lt;BR /&gt;
  ip address 210.104.91.1/24&lt;BR /&gt;
  no dhcp-relay-incoming&lt;BR /&gt;
 interface vlan92&lt;BR /&gt;
  ip address 210.104.92.1/24&lt;BR /&gt;
  no dhcp-relay-incoming&lt;BR /&gt;
 interface vlan93&lt;BR /&gt;
  ip address 210.104.93.1/24&lt;BR /&gt;
  no dhcp-relay-incoming&lt;BR /&gt;
 interface vlan112&lt;BR /&gt;
  ip address 210.104.112.1/24&lt;BR /&gt;
  no dhcp-relay-incoming&lt;BR /&gt;
 interface vlan113&lt;BR /&gt;
  ip address 210.104.113.1/24&lt;BR /&gt;
  no dhcp-relay-incoming&lt;BR /&gt;
 interface vlan114&lt;BR /&gt;
  ip address 210.104.114.1/24&lt;BR /&gt;
  no dhcp-relay-incoming&lt;BR /&gt;
 interface vlan115&lt;BR /&gt;
  ip address 210.104.115.1/24&lt;BR /&gt;
  no dhcp-relay-incoming&lt;BR /&gt;
 interface vlan500&lt;BR /&gt;
  ip address 210.105.79.254/24&lt;BR /&gt;
  no dhcp-relay-incoming&lt;BR /&gt;
 interface vlan600&lt;BR /&gt;
  ip address 210.105.80.254/24&lt;BR /&gt;
  no dhcp-relay-incoming&lt;BR /&gt;
 no use event-system-policy&lt;BR /&gt;
 use dhcp-server-policy DHCP_Rule&lt;BR /&gt;
 cluster name Splex&lt;BR /&gt;
 cluster mode active&lt;BR /&gt;
 cluster member ip 210.105.79.253&lt;BR /&gt;
 cluster member ip 210.105.79.254&lt;BR /&gt;
 cluster member vlan 500&lt;BR /&gt;
 cluster master-priority 255&lt;BR /&gt;
 no cluster handle-stp&lt;BR /&gt;
 no cluster force-configured-state&lt;BR /&gt;
 cluster force-configured-state-delay 5&lt;BR /&gt;
 cluster radius-counter-db-sync-time 5&lt;BR /&gt;
 ip dhcp client hostname&lt;BR /&gt;
 ip dhcp client persistent-lease&lt;BR /&gt;
 logging on&lt;BR /&gt;
 logging console warnings&lt;BR /&gt;
 logging buffered warnings&lt;BR /&gt;
 ip routing&lt;BR /&gt;
 vrrp version 2&lt;BR /&gt;
 no controller adopted-devices external-devices&lt;BR /&gt;
 controller adopted-devices aps&lt;BR /&gt;
!&lt;BR /&gt;
rfs7000 &lt;BR /&gt;
 use profile default-rfs7000&lt;BR /&gt;
 use rf-domain default&lt;BR /&gt;
 hostname WM3700-SLAVE&lt;BR /&gt;
 ip default-gateway 210.105.79.1&lt;BR /&gt;
 ip default-gateway failover&lt;BR /&gt;
 interface me1&lt;BR /&gt;
  ip address 192.168.0.2/24&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  switchport mode trunk&lt;BR /&gt;
  switchport trunk native vlan 500&lt;BR /&gt;
  switchport trunk native tagged&lt;BR /&gt;
  switchport trunk allowed vlan 90-93,112-115,500,600&lt;BR /&gt;
 interface vlan90&lt;BR /&gt;
  ip address 210.104.90.1/24&lt;BR /&gt;
  no dhcp-relay-incoming&lt;BR /&gt;
 interface vlan91&lt;BR /&gt;
  ip address 210.104.91.1/24&lt;BR /&gt;
  no dhcp-relay-incoming&lt;BR /&gt;
 interface vlan92&lt;BR /&gt;
  ip address 210.104.92.1/24&lt;BR /&gt;
  no dhcp-relay-incoming&lt;BR /&gt;
 interface vlan93&lt;BR /&gt;
  ip address 210.104.93.1/24&lt;BR /&gt;
  no dhcp-relay-incoming&lt;BR /&gt;
 interface vlan112&lt;BR /&gt;
  ip address 210.104.112.1/24&lt;BR /&gt;
  no dhcp-relay-incoming&lt;BR /&gt;
 interface vlan113&lt;BR /&gt;
  ip address 210.104.113.1/24&lt;BR /&gt;
  no dhcp-relay-incoming&lt;BR /&gt;
 interface vlan114&lt;BR /&gt;
  ip address 210.104.114.1/24&lt;BR /&gt;
  no dhcp-relay-incoming&lt;BR /&gt;
 interface vlan115&lt;BR /&gt;
  ip address 210.104.115.1/24&lt;BR /&gt;
  no dhcp-relay-incoming&lt;BR /&gt;
 interface vlan500&lt;BR /&gt;
  ip address 210.105.79.253/24&lt;BR /&gt;
  no dhcp-relay-incoming&lt;BR /&gt;
 interface vlan600&lt;BR /&gt;
  ip address 210.105.80.253/24&lt;BR /&gt;
 use dhcp-server-policy DHCP_Rule&lt;BR /&gt;
 cluster name Splex&lt;BR /&gt;
 cluster mode standby&lt;BR /&gt;
 cluster member ip 210.105.79.253&lt;BR /&gt;
 cluster member ip 210.105.79.254&lt;BR /&gt;
 cluster member vlan 500&lt;BR /&gt;
 cluster master-priority 128&lt;BR /&gt;
 cluster handle-stp&lt;BR /&gt;
 logging on&lt;BR /&gt;
 controller adopted-devices external-devices&lt;BR /&gt;
 controller adopted-devices aps&lt;BR /&gt;
!&lt;BR /&gt;
ap650 00-04-96-5F-11-14&lt;BR /&gt;
 use profile JMW_Secure_ap4600&lt;BR /&gt;
 use rf-domain JMW&lt;BR /&gt;
 hostname SM_05F_5_5F1114&lt;BR /&gt;
 interface vlan500&lt;BR /&gt;
  ip address 210.105.79.211/24&lt;BR /&gt;
!&lt;BR /&gt;
ap650 00-04-96-5F-29-D0&lt;BR /&gt;
 use profile DMW_AP_ap4600&lt;BR /&gt;
 use rf-domain DMW&lt;BR /&gt;
 hostname SI_17F_2_5F29D0&lt;BR /&gt;
 interface vlan600&lt;BR /&gt;
  ip address 210.105.80.143/24&lt;BR /&gt;
!&lt;BR /&gt;
&lt;BR /&gt;
!&lt;BR /&gt;
end&lt;BR /&gt;
&lt;BR /&gt;
------------------------------------------------------------------------------------------------------------------------------&lt;BR /&gt;
&lt;BR /&gt;
Controller-B&lt;BR /&gt;
&lt;BR /&gt;
!&lt;BR /&gt;
! Configuration of RFS7000 version 5.7.0.0-057R&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
version 2.3&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
ip access-list BROADCAST-MULTICAST-CONTROL&lt;BR /&gt;
 permit tcp any any log rule-precedence 10 &lt;BR /&gt;
 permit udp any eq 67 any eq dhcpc log rule-precedence 11 &lt;BR /&gt;
 permit proto 254 any any log rule-precedence 19 &lt;BR /&gt;
 deny udp any range 137 138 any range 137 138 log rule-precedence 21 &lt;BR /&gt;
 deny ip any 224.0.0.0/4 log rule-precedence 22 &lt;BR /&gt;
 deny ip any host 255.255.255.255 log rule-precedence 23 &lt;BR /&gt;
 permit ip any any log rule-precedence 101 &lt;BR /&gt;
!&lt;BR /&gt;
mac access-list PERMIT-ARP-AND-IPv4&lt;BR /&gt;
 permit any any type ip rule-precedence 10 &lt;BR /&gt;
 permit any any type arp rule-precedence 20 &lt;BR /&gt;
!&lt;BR /&gt;
ip snmp-access-list default&lt;BR /&gt;
 permit any&lt;BR /&gt;
!&lt;BR /&gt;
firewall-policy default&lt;BR /&gt;
 no ip dos smurf&lt;BR /&gt;
 no ip dos twinge&lt;BR /&gt;
 no ip dos invalid-protocol&lt;BR /&gt;
 no ip dos router-advt&lt;BR /&gt;
 ip dos router-solicit log-only log-level warnings &lt;BR /&gt;
 no ip dos option-route&lt;BR /&gt;
 no ip dos ascend&lt;BR /&gt;
 no ip dos chargen&lt;BR /&gt;
 no ip dos fraggle&lt;BR /&gt;
 no ip dos snork&lt;BR /&gt;
 no ip dos ftp-bounce&lt;BR /&gt;
 no ip dos tcp-intercept&lt;BR /&gt;
 no ip dos broadcast-multicast-icmp&lt;BR /&gt;
 no ip dos land&lt;BR /&gt;
 no ip dos tcp-xmas-scan&lt;BR /&gt;
 no ip dos tcp-null-scan&lt;BR /&gt;
 no ip dos winnuke&lt;BR /&gt;
 no ip dos tcp-fin-scan&lt;BR /&gt;
 no ip dos udp-short-hdr&lt;BR /&gt;
 no ip dos tcp-post-syn&lt;BR /&gt;
 no ip dos tcphdrfrag&lt;BR /&gt;
 no ip dos ip-ttl-zero&lt;BR /&gt;
 no ip dos ipspoof&lt;BR /&gt;
 no ip dos tcp-bad-sequence&lt;BR /&gt;
 no ip dos tcp-sequence-past-window&lt;BR /&gt;
 no ip tcp validate-rst-seq-number&lt;BR /&gt;
 no ip tcp validate-rst-ack-number&lt;BR /&gt;
 no ip tcp validate-icmp-unreachable&lt;BR /&gt;
 no ip tcp recreate-flow-on-out-of-state-syn&lt;BR /&gt;
 no ip tcp optimize-unnecessary-resends&lt;BR /&gt;
 ip-mac conflict log-only log-level warnings &lt;BR /&gt;
 dhcp-offer-convert&lt;BR /&gt;
 no proxy-arp&lt;BR /&gt;
 no firewall enable&lt;BR /&gt;
 no ipv6 firewall enable&lt;BR /&gt;
 no ipv6 strict-ext-hdr-check &lt;BR /&gt;
 no ipv6 unknown-options &lt;BR /&gt;
 no ipv6 duplicate-options &lt;BR /&gt;
 no ipv6 option strict-hao-opt-check&lt;BR /&gt;
 no ipv6 option strict-padding&lt;BR /&gt;
 no ipv6 dos multicast-icmpv6&lt;BR /&gt;
 no ipv6 dos hop-limit-zero&lt;BR /&gt;
 no ipv6 dos tcp-intercept-mobility&lt;BR /&gt;
 no alg ftp&lt;BR /&gt;
 no alg tftp&lt;BR /&gt;
 no alg dns&lt;BR /&gt;
 no alg pptp&lt;BR /&gt;
 virtual-defragmentation maximum-fragments-per-datagram 2000&lt;BR /&gt;
 no proxy-nd&lt;BR /&gt;
 no ipv6-mac conflict&lt;BR /&gt;
 no ipv6-mac routing conflict&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
mint-policy global-default&lt;BR /&gt;
!&lt;BR /&gt;
wlan-qos-policy default&lt;BR /&gt;
 qos trust dscp&lt;BR /&gt;
 qos trust wmm&lt;BR /&gt;
!&lt;BR /&gt;
radio-qos-policy default&lt;BR /&gt;
 no admission-control firewall-detected-traffic&lt;BR /&gt;
 no admission-control implicit-tspec&lt;BR /&gt;
 admission-control voice max-clients 256&lt;BR /&gt;
 admission-control voice max-roamed-clients 256&lt;BR /&gt;
 admission-control voice reserved-for-roam-percent 150&lt;BR /&gt;
 admission-control video max-clients 256&lt;BR /&gt;
 admission-control video max-roamed-clients 256&lt;BR /&gt;
 admission-control video reserved-for-roam-percent 150&lt;BR /&gt;
 accelerated-multicast max-client-streams 3&lt;BR /&gt;
!&lt;BR /&gt;
wlan guest_wifi&lt;BR /&gt;
 description guest@seoul&lt;BR /&gt;
 ssid guest@seoul&lt;BR /&gt;
 vlan-pool-member 90 limit 250&lt;BR /&gt;
 vlan-pool-member 91 limit 250&lt;BR /&gt;
 vlan-pool-member 92 limit 250&lt;BR /&gt;
 vlan-pool-member 93 limit 250&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type none&lt;BR /&gt;
 authentication-type none&lt;BR /&gt;
 wireless-client cred-cache-ageout 1200&lt;BR /&gt;
 wireless-client vlan-cache-ageout 1200&lt;BR /&gt;
!&lt;BR /&gt;
wlan guestSecure&lt;BR /&gt;
 description guestSecure@Seoul&lt;BR /&gt;
 ssid guestSecure@Seoul&lt;BR /&gt;
 vlan-pool-member 112 limit 250&lt;BR /&gt;
 vlan-pool-member 113 limit 250&lt;BR /&gt;
 vlan-pool-member 114 limit 250&lt;BR /&gt;
 vlan-pool-member 115 limit 250&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type none&lt;BR /&gt;
 authentication-type none&lt;BR /&gt;
 wireless-client hold-time 5&lt;BR /&gt;
!&lt;BR /&gt;
dhcp-server-policy DHCP_Rule&lt;BR /&gt;
 dhcp-pool DHCP_114&lt;BR /&gt;
  network 210.104.114.0/24&lt;BR /&gt;
  address range 210.104.114.2 210.104.114.253 &lt;BR /&gt;
  lease 0 4&lt;BR /&gt;
  default-router 210.104.114.254&lt;BR /&gt;
  dns-server 168.126.63.1&lt;BR /&gt;
 dhcp-pool DHCP_115&lt;BR /&gt;
  network 210.104.115.0/24&lt;BR /&gt;
  address range 210.104.115.2 210.104.115.253 &lt;BR /&gt;
  lease 0 4&lt;BR /&gt;
  default-router 210.104.115.254&lt;BR /&gt;
  dns-server 168.126.63.1&lt;BR /&gt;
 dhcp-pool DHCP_90&lt;BR /&gt;
  network 210.104.90.0/24&lt;BR /&gt;
  address range 210.104.90.2 210.104.90.253 &lt;BR /&gt;
  lease 0 0 30&lt;BR /&gt;
  default-router 210.104.90.254&lt;BR /&gt;
  dns-server 168.126.63.1&lt;BR /&gt;
 dhcp-pool DHCP_91&lt;BR /&gt;
  network 210.104.91.0/24&lt;BR /&gt;
  address range 210.104.91.2 210.104.91.253 &lt;BR /&gt;
  lease 0 0 30&lt;BR /&gt;
  default-router 210.104.91.254&lt;BR /&gt;
  dns-server 168.126.63.1&lt;BR /&gt;
 dhcp-pool DHCP_92&lt;BR /&gt;
  network 210.104.92.0/24&lt;BR /&gt;
  address range 210.104.92.2 210.104.92.253 &lt;BR /&gt;
  lease 0 0 30&lt;BR /&gt;
  default-router 210.104.92.254&lt;BR /&gt;
  dns-server 168.126.63.1&lt;BR /&gt;
 dhcp-pool DHCP_93&lt;BR /&gt;
  network 210.104.93.0/24&lt;BR /&gt;
  address range 210.104.93.2 210.104.93.253 &lt;BR /&gt;
  lease 0 0 30&lt;BR /&gt;
  default-router 210.104.93.254&lt;BR /&gt;
  dns-server 168.126.63.1&lt;BR /&gt;
 dhcp-pool DHCP_112&lt;BR /&gt;
  network 210.104.112.0/24&lt;BR /&gt;
  address range 210.104.112.2 210.104.112.253 &lt;BR /&gt;
  lease 0 4&lt;BR /&gt;
  default-router 210.104.112.254&lt;BR /&gt;
  dns-server 168.126.63.1&lt;BR /&gt;
 dhcp-pool DHCP_113&lt;BR /&gt;
  network 210.104.113.0/24&lt;BR /&gt;
  address range 210.104.113.2 210.104.113.253 &lt;BR /&gt;
  lease 0 4&lt;BR /&gt;
  default-router 210.104.113.254&lt;BR /&gt;
  dns-server 168.126.63.1 164.124.101.2&lt;BR /&gt;
 dhcp-server activation-criteria cluster-master&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
management-policy default&lt;BR /&gt;
 telnet&lt;BR /&gt;
 no http server&lt;BR /&gt;
 https server&lt;BR /&gt;
 no ftp&lt;BR /&gt;
 ssh&lt;BR /&gt;
 access all&lt;BR /&gt;
 snmp-server manager v2&lt;BR /&gt;
 snmp-server community 0 cityw ro&lt;BR /&gt;
 snmp-server user snmpoperator v3 encrypted des auth md5 0 &lt;BR /&gt;
 snmp-server user snmptrap v3 encrypted des auth md5 0&lt;BR /&gt;
 snmp-server user snmpmanager v3 encrypted des auth md5 0 &lt;BR /&gt;
 no t5 snmp-server enable server&lt;BR /&gt;
 no t5 snmp-server enable traps&lt;BR /&gt;
 banner motd welcome to CLI&lt;BR /&gt;
!&lt;BR /&gt;
l2tpv3 policy default&lt;BR /&gt;
!&lt;BR /&gt;
profile rfs7000 default-rfs7000&lt;BR /&gt;
 ip default-gateway 210.105.79.1&lt;BR /&gt;
 no ip default-gateway failover&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto remote-vpn-client&lt;BR /&gt;
 interface me1&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  switchport mode trunk&lt;BR /&gt;
  switchport trunk native vlan 500&lt;BR /&gt;
  switchport trunk native tagged&lt;BR /&gt;
  switchport trunk allowed vlan 90-93,112-115,500,600&lt;BR /&gt;
 interface ge2&lt;BR /&gt;
  shutdown&lt;BR /&gt;
 interface ge3&lt;BR /&gt;
  shutdown&lt;BR /&gt;
 interface ge4&lt;BR /&gt;
  shutdown&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use dhcp-server-policy DHCP_Rule&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 cluster name Splex&lt;BR /&gt;
 cluster member ip 210.105.79.253 level 2&lt;BR /&gt;
 cluster member ip 210.105.79.254 level 2&lt;BR /&gt;
 cluster member vlan 500&lt;BR /&gt;
 cluster master-priority 255&lt;BR /&gt;
 cluster force-configured-state-delay 3&lt;BR /&gt;
 cluster radius-counter-db-sync-time 1&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
 router ospf&lt;BR /&gt;
!&lt;BR /&gt;
&lt;BR /&gt;
profile ap650 DMW_AP_ap4600&lt;BR /&gt;
 ip default-gateway 210.105.80.1&lt;BR /&gt;
 no ip default-gateway failover&lt;BR /&gt;
 no autoinstall configuration&lt;BR /&gt;
 no autoinstall firmware&lt;BR /&gt;
 load-balancing balance-ap-loads&lt;BR /&gt;
 load-balancing balance-band-loads&lt;BR /&gt;
 load-balancing balance-channel-loads 5ghz&lt;BR /&gt;
 load-balancing balance-channel-loads 2.4ghz&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto load-management&lt;BR /&gt;
 crypto remote-vpn-client&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  wlan Seoul_WiFi bss 1 primary&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  wlan Seoul_WiFi bss 1 primary&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  switchport mode access&lt;BR /&gt;
  switchport access vlan 600&lt;BR /&gt;
 interface vlan600&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 controller host 210.105.79.253 pool 1 level 1&lt;BR /&gt;
 controller host 210.105.79.254 pool 1 level 1&lt;BR /&gt;
 controller vlan 500&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
!&lt;BR /&gt;
profile ap650 JMW_AP_ap4600&lt;BR /&gt;
 ip default-gateway 210.105.79.1&lt;BR /&gt;
 no ip default-gateway failover&lt;BR /&gt;
 no autoinstall configuration&lt;BR /&gt;
 no autoinstall firmware&lt;BR /&gt;
 load-balancing balance-ap-loads&lt;BR /&gt;
 load-balancing balance-band-loads&lt;BR /&gt;
 load-balancing balance-channel-loads 5ghz&lt;BR /&gt;
 load-balancing balance-channel-loads 2.4ghz&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto load-management&lt;BR /&gt;
 crypto remote-vpn-client&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  wlan Seoul_WiFi bss 1 primary&lt;BR /&gt;
  wireless-client tx-power 20&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  wlan Seoul_WiFi bss 1 primary&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  switchport mode access&lt;BR /&gt;
  switchport access vlan 500&lt;BR /&gt;
 interface vlan500&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 controller host 210.105.79.253 pool 1 level 1&lt;BR /&gt;
 controller host 210.105.79.254 pool 1 level 1&lt;BR /&gt;
 controller vlan 500&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
!&lt;BR /&gt;
profile ap650 JMW_Secure_ap4600&lt;BR /&gt;
 ip default-gateway 210.105.79.1&lt;BR /&gt;
 no ip default-gateway failover&lt;BR /&gt;
 no autoinstall configuration&lt;BR /&gt;
 no autoinstall firmware&lt;BR /&gt;
 load-balancing balance-ap-loads&lt;BR /&gt;
 load-balancing balance-band-loads&lt;BR /&gt;
 load-balancing balance-channel-loads 5ghz&lt;BR /&gt;
 load-balancing balance-channel-loads 2.4ghz&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto load-management&lt;BR /&gt;
 crypto remote-vpn-client&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  wlan Seoul_Wifi_Secure bss 1 primary&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  wlan Seoul_Wifi_Secure bss 1 primary&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
  switchport mode access&lt;BR /&gt;
  switchport access vlan 500&lt;BR /&gt;
 interface vlan500&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 controller host 210.105.79.253 pool 1 level 1&lt;BR /&gt;
 controller host 210.105.79.254 pool 1 level 1&lt;BR /&gt;
 controller vlan 500&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
!&lt;BR /&gt;
profile ap650 default-ap650&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto load-management&lt;BR /&gt;
 crypto remote-vpn-client&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  wlan Seoul_WiFi bss 1 primary&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  wlan Seoul_WiFi bss 1 primary&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
 interface vlan500&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
!&lt;BR /&gt;
profile ap6521 default-ap6521&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
  ip address dhcp&lt;BR /&gt;
  ip address zeroconf secondary&lt;BR /&gt;
  ip dhcp client request options all&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
!&lt;BR /&gt;
profile ap621 default-ap621&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
  ip address dhcp&lt;BR /&gt;
  ip address zeroconf secondary&lt;BR /&gt;
  ip dhcp client request options all&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
!&lt;BR /&gt;
profile ap6511 default-ap6511&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
 interface up1&lt;BR /&gt;
 interface fe1&lt;BR /&gt;
 interface fe2&lt;BR /&gt;
 interface fe3&lt;BR /&gt;
 interface fe4&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
  ip address dhcp&lt;BR /&gt;
  ip address zeroconf secondary&lt;BR /&gt;
  ip dhcp client request options all&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
!&lt;BR /&gt;
profile ap6562 DMW_AP_EXT_ap6562&lt;BR /&gt;
 ip default-gateway 210.105.80.1&lt;BR /&gt;
 no ip default-gateway failover&lt;BR /&gt;
 no autoinstall configuration&lt;BR /&gt;
 no autoinstall firmware&lt;BR /&gt;
 device-upgrade auto ap6562&lt;BR /&gt;
 load-balancing balance-ap-loads&lt;BR /&gt;
 load-balancing balance-band-loads&lt;BR /&gt;
 load-balancing balance-channel-loads 5ghz&lt;BR /&gt;
 load-balancing balance-channel-loads 2.4ghz&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
  isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto load-management&lt;BR /&gt;
 crypto remote-vpn-client&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
  wlan Seoul_WiFi bss 1 primary&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
  wlan Seoul_WiFi bss 1 primary&lt;B&gt;&lt;/B&gt;</description>
      <pubDate>Wed, 29 Nov 2017 07:41:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/wm3700-wings-5-7-0-0-057r-we-have-a-problem-with-the-wireless/m-p/22062#M1683</guid>
      <dc:creator>jeon_min</dc:creator>
      <dc:date>2017-11-29T07:41:00Z</dc:date>
    </item>
    <item>
      <title>RE: WM3700 (WINGS 5.7.0.0-057R) We have a problem with the wireless controller.</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/wm3700-wings-5-7-0-0-057r-we-have-a-problem-with-the-wireless/m-p/22063#M1684</link>
      <description>Hello Jeon,&lt;BR /&gt;
Right now this topic is marked "private," which means only Extreme Networks employees can view and respond to it. Would it be okay if I mark this public so others can respond? I see some public IP addresses in your configuration, so I wanted to ask first.&lt;BR /&gt;</description>
      <pubDate>Wed, 29 Nov 2017 21:40:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/wm3700-wings-5-7-0-0-057r-we-have-a-problem-with-the-wireless/m-p/22063#M1684</guid>
      <dc:creator>Drew_C</dc:creator>
      <dc:date>2017-11-29T21:40:00Z</dc:date>
    </item>
    <item>
      <title>RE: WM3700 (WINGS 5.7.0.0-057R) We have a problem with the wireless controller.</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/wm3700-wings-5-7-0-0-057r-we-have-a-problem-with-the-wireless/m-p/22064#M1685</link>
      <description>IP is not actually used, it is an arbitrary IP.</description>
      <pubDate>Wed, 29 Nov 2017 21:40:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/wm3700-wings-5-7-0-0-057r-we-have-a-problem-with-the-wireless/m-p/22064#M1685</guid>
      <dc:creator>jeon_min</dc:creator>
      <dc:date>2017-11-29T21:40:00Z</dc:date>
    </item>
    <item>
      <title>RE: WM3700 (WINGS 5.7.0.0-057R) We have a problem with the wireless controller.</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/wm3700-wings-5-7-0-0-057r-we-have-a-problem-with-the-wireless/m-p/22065#M1686</link>
      <description>Thanks. I'll make this public now.&lt;BR /&gt;</description>
      <pubDate>Wed, 29 Nov 2017 21:40:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/wm3700-wings-5-7-0-0-057r-we-have-a-problem-with-the-wireless/m-p/22065#M1686</guid>
      <dc:creator>Drew_C</dc:creator>
      <dc:date>2017-11-29T21:40:00Z</dc:date>
    </item>
    <item>
      <title>RE: WM3700 (WINGS 5.7.0.0-057R) We have a problem with the wireless controller.</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/wm3700-wings-5-7-0-0-057r-we-have-a-problem-with-the-wireless/m-p/22066#M1687</link>
      <description>Hello&lt;BR /&gt;
- Enable logs to debug mode&lt;BR /&gt;
- Via CLI sh logging and send this information.&lt;BR /&gt;
- Via CLI sh sh event-history and send information.&lt;BR /&gt;
&lt;BR /&gt;
This Primary Controller Information&lt;BR /&gt;
&lt;BR /&gt;
&lt;P class="fancybox-image"&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="885175eb452a4fbca9e1b6293f496570_RackMultipart20171201-24987-1ufpa4g-Debug_inline.jpg"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/3099i8728633F617D6865/image-size/large?v=v2&amp;amp;px=999" role="button" title="885175eb452a4fbca9e1b6293f496570_RackMultipart20171201-24987-1ufpa4g-Debug_inline.jpg" alt="885175eb452a4fbca9e1b6293f496570_RackMultipart20171201-24987-1ufpa4g-Debug_inline.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;BR /&gt;
&lt;BR /&gt;
Regards&lt;BR /&gt;
&lt;BR /&gt;
Edmundo</description>
      <pubDate>Sat, 02 Dec 2017 01:15:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/wm3700-wings-5-7-0-0-057r-we-have-a-problem-with-the-wireless/m-p/22066#M1687</guid>
      <dc:creator>Edmundo</dc:creator>
      <dc:date>2017-12-02T01:15:00Z</dc:date>
    </item>
  </channel>
</rss>

