Generating Output from Planner

Chapter 9 Generating Output from Planner

Planner generates a comprehensive report giving the architect’s drawings, BoM for WLAN devices, information about APs’ and Sensors’ configuration, original layouts, and all the security exposure and network coverage RF views generated during planning. It also replays customer input as a ready reference. The report is configurable where by you can select any of the above for inclusion in the report. For example, you may want to restrict the report to only BoM or security analysis (leaving out network details). The report is generated in MS WORD. The compliance report is generated in the XML format.

Contents of the generated reports are:

BoM (Bill of Material): Contains a tabulated list of APs and Sensors placed on the layout along with the location on the floor map. This report is useful to understand the equipment requirement and placement.

Introduction Report: Explains the entire process from the customer input to the 3Com Corporation output. It also describes the Planning Methodology and Objectives, the general assumptions made for modeling a WLAN, and the observations that you can make based on the RF plan.

Compliance Report: Contains the configuration details of APs and Sensors placed on the layout. You can import this report into a WLAN Controller, so that you do not have to reconfigure the controllers for APs and Sensors. There is no specific industry format for this kind of report and hence 3Com Corporation has decided this format.

Layout Report: Contains details of the Work Order, WLAN Coverage Map, Security Exposure Map, AP Coverage Redundancy Map, Link Speed Map, Channel Allocation Map, Sensor Coverage Map, Sensor External Map, and Sensor Redundancy Map.

Note: You cannot generate any report without completing the calculations for all the RF views.

9.1WLAN Planning Report

You can generate a WLAN planning report in two ways:

1Go to FileÆGenerate Report.

2Click on the Toolbar.

Figure 136. Generate Report: Invoking from File Menu

Note: If you have not saved the project file for which you are to generate a report, Planner prompts you to do so.

This displays the Generate Report dialog box.

104

3Com ® AirProtect Planner User Guide

Page 112
Image 112
HP AirProtect Security Software manual Generating Output from Planner, Wlan Planning Report, Go to FileÆGenerate Report

AirProtect Security Software specifications

HP AirProtect Security Software is an advanced security solution designed to provide comprehensive protection for enterprise devices, particularly those operating within the fluctuating and unpredictable environments of modern business. With the growing trend of remote work and mobile computing, the need for robust cybersecurity solutions has never been more critical. HP AirProtect offers a multi-layered approach to safeguard sensitive information and ensure seamless connectivity, making it an essential tool for businesses of all sizes.

One of the standout features of HP AirProtect is its real-time threat detection and response capabilities. Leveraging artificial intelligence and machine learning technologies, it continuously monitors devices for any unusual behavior or potential malware threats. This proactive approach allows for immediate intervention before any potential breaches can escalate, ensuring that valuable company data remains secure.

Another key characteristic of HP AirProtect is its integration with HP's proprietary software and hardware solutions. This seamless compatibility enhances the overall security posture of the devices it protects. Organizations can benefit from features such as device health monitoring, which assesses the security status of endpoints, providing an additional layer of assurance that devices meet necessary compliance standards.

Additionally, HP AirProtect emphasizes user-centric design, offering intuitive dashboards and easy-to-navigate interfaces. This ease of use is vital for IT administrators, who can manage security protocols efficiently without extensive training. It also provides insightful analytics and reporting tools that help organizations understand potential vulnerabilities and areas for improvement.

The software also prioritizes network security, employing virtual private network (VPN) technology to encrypt data transmission and protect against interception during remote access. Moreover, HP AirProtect includes endpoint isolation features, which allow organizations to limit network access for devices that are suspected of being compromised, thereby containing potential threats.

In conclusion, HP AirProtect Security Software combines cutting-edge technologies with user-friendly features to provide a comprehensive cybersecurity solution suited for the modern workforce. By focusing on real-time threat detection, seamless integration, and network security, it empowers organizations to navigate the complexities of digital security, ensuring their critical data remains protected in an ever-evolving threat landscape.