Data pane item

Description

 

Select an appropriate value for Tx key from Tx KEY.

 

Enter an appropriate WEP KEY and reconfirm.

 

 

802.11r

To enable 802.11r roaming, select Enabled from 802.11r ROAMING. Selecting

ROAMING

this enables fast BSS transition.

 

The fast BSS transition mechanism minimizes the delay when a client transitions

 

from one BSS to another within the same cluster.

 

 

TERMINATION

To terminate the EAP portion of 802.1X authentication on the AP instead of the

 

RADIUS Server, set TERMINATION to Enabled.

 

Enabling TERMINATION can reduce network traffic to the external RADIUS

 

Server by terminating the authorization protocol on the AP. By default, for 802.1X

 

authorization, the client conducts an EAP exchange with the RADIUS Server,

 

and the AP acts as a relay for this exchange.

 

When TERMINATIONTermination is enabled, the AP acts as an authentication

 

server and terminates the outer layers of the EAP and relays only the innermost

 

layer to the external RADIUS Server.

 

NOTE: If you are using LDAP for authentication, ensure that AP termination is

 

configured to support EAP.

 

 

AUTHENTICATIO

Select any of the following options from AUTHENTICATION SERVER 1:

N SERVER 1 and

 

 

AUTHENTICATIO

Select an authentication server from the list if an external server is already

N

configured.

SERVER 2

Select New to configure any of the following servers as an external server:

 

RADIUS Server

 

LDAP Server

For information on configuring external servers, see Configuring an external server for authentication on page 49.

To use an internal server, select Internal server and add the clients that are required to authenticate with the internal RADIUS Server. Click Users to add the users.

If an external server is selected, you can also configure another authentication server.

LOAD

Set this to Enabled if you are using two RADIUS authentication servers, to

BALANCING

balance the load across these servers.

 

 

REAUTH

Specify a value for REAUTH INTERVAL. When set to a value greater than zero,

INTERVAL

APs periodically reauthenticate all associated and authenticated clients.

 

 

BLACKLISTING

To enable blacklisting of the clients with a specific number of authentication fail-

 

ures, select Enabled from BLACKLISTING and specify a value for MAX

 

AUTHENTICATION FAILURES. The users who fail to authenticate the number

 

of times specified in MAX AUTHENTICATION FAILURES field are dynamically

 

blacklisted.

 

 

ACCOUNTING

To enable accounting, select Enabled from ACCOUNTING. On setting this

 

option to Enabled, APs post accounting information to the RADIUS server at the

 

specified ACCOUNTING INTERVAL.

 

 

AUTHENTICATIO

To enable authentication survivability, set AUTHENTICATION SURVIVABILITY

N

to Enabled. Specify a value in hours for CACHE TIMEOUT to set the duration

SURVIVABILITY

after which the authenticated credentials in the cache expires. When the cache

 

expires, the clients are required to authenticate again. You can specify a value

HP Cloud Network Manager User Guide

Wireless configuration 28

Page 28
Image 28
HP Cloud Network Manager Software manual Roaming, Termination, Authenticatio, Server, Load, Balancing, Reauth, Interval

Cloud Network Manager Software specifications

HP Cloud Network Manager is a robust software solution designed to simplify and enhance the management of network infrastructure in cloud environments. As organizations increasingly shift toward cloud computing, they require comprehensive tools to oversee complex network deployments. HP Cloud Network Manager rises to this challenge, offering a powerful suite of features aimed at optimizing performance, automating tasks, and ensuring reliable connectivity.

One of the main features of HP Cloud Network Manager is its intuitive dashboard, which provides users with real-time insights into network operations. This centralized interface allows administrators to monitor the status of various components, identify potential issues, and respond swiftly to anomalies. With advanced analytics capabilities, the software empowers users to make data-driven decisions that enhance network efficiency.

Another critical feature of this software is its automation capabilities. HP Cloud Network Manager simplifies routine network management tasks, such as configuration, provisioning, and software updates, allowing IT teams to focus on strategic initiatives rather than mundane maintenance. Automation reduces the risk of human error and accelerates deployment times, significantly increasing operational agility.

The software also supports multi-cloud environments, enabling organizations to manage their network resources across different cloud platforms seamlessly. This flexibility is essential for businesses that utilize various cloud providers and wish to maintain a unified network strategy. Coupled with its compatibility with open standards, HP Cloud Network Manager facilitates integration with existing IT ecosystems, ensuring a smooth transition to advanced cloud solutions.

Security is a top priority in today's digital landscape, and HP Cloud Network Manager includes integrated security features to protect network assets. It provides visibility into traffic patterns, helping to detect and mitigate potential threats before they become significant issues. Enhanced security protocols ensure that sensitive data remains protected during transit and at rest, aligning with compliance requirements.

Finally, HP Cloud Network Manager is built on cutting-edge technologies, including artificial intelligence and machine learning, which enable proactive network management. These technologies predict network behavior, assisting administrators in optimizing resources and anticipating potential challenges. As a result, organizations can achieve enhanced reliability and performance from their network infrastructure.

In summary, HP Cloud Network Manager is an essential tool for businesses looking to improve their cloud network management capabilities. With its powerful features, supportive technologies, and commitment to security, it stands out as a reliable solution for navigating the complexities of modern network environments.