nMAC authentication precedes 802.1X authentication - The administrators can enable MAC authentication for 802.1X authentication. MAC authentication shares all authentication server configurations with 802.1X authentication. If a wireless or wired client connects to the network, MAC authentication is performed first. If MAC authentication fails, 802.1X authentication is not triggered. If MAC authentication is successful, 802.1X authentication is attempted. If 802.1X authentication is successful, the client is assigned an 802.1X authentication role. If 802.1X authentication fails, the client is assigned a deny-allrole or mac-auth-onlyrole.

nMAC authentication only role - Allows you to create a mac-auth-onlyrole to allow role-based access rules when MAC authentication is enabled for 802.1X authentication. The mac-auth-onlyrole is assigned to a client when the MAC authentication is successful and 802.1X authentication fails. If 802.1X authentication is successful, the mac-auth-onlyrole is overwritten by the final role. The mac-auth-onlyrole is primarily used for wired clients.

nL2 authentication fall-through - Allows you to enable the l2-authentication-fallthroughmode. When this option is enabled, the 802.1X authentication is allowed even if the MAC authentication fails. If this option is disabled, 802.1X authentication is not allowed. The l2-authentication-fallthroughmode is disabled by default.

For more information on configuring an AP to use MAC + 802.1X Authentication, see Configuring MAC authentication with 802.1X authentication on page 53.

Captive Portal — Captive portal authentication is used for authenticating guest users. For more information on captive portal authentication, see Captive portal for guest access on page 56.

MAC authentication with Captive Portal authentication—This authentication method has the following features:

n If the captive portal splash page type is Internal-Authenticatedor External-RADIUS Server, MAC authentication reuses the server configurations.

n If the captive portal splash page type is Internal-Acknowledged or External-Authentication Text and MAC authentication is enabled, a server configuration page is displayed.

n If the captive portal splash page type is none, MAC authentication is disabled.

n You can configure the mac-auth-onlyrole when MAC authentication is enabled with captive portal authentication.

For more information configuring an AP to use MAC and captive portal authentication, see Configuring MAC authentication with captive portal authentication on page 54.

802.1X authentication with Captive Portal authentication — This authentication mechanism allows you to configure different captive portal settings for clients on the same SSID. For example, you can configure an 802.1x SSID and create a role for captive portal access, so that some of the clients using the SSID derive the captive portal role. You can configure rules to indicate access to external or internal captive portal, or none. For more information on configuring captive portal roles for an SSID with 802.1x authentication, see Configuring captive portal roles for an SSID on page 63.

WISPr authentication—Wireless Internet Service Provider roaming (WISPr) authentication allows a smart client to authenticate on the network when they roam between wireless Internet Service Providers (ISPs), even if the wireless hotspot uses an ISP with whom the client may not have an account.

If a hotspot is configured to use WISPr authentication in a specific ISP and a client attempts to access the internet at that hotspot, the WISPr AAA server configured for the ISP authenticates the client directly and allows the client to access the network. If the client only has an account with a partner ISP, the WISPr AAA server forwards the credentials of the client to the WISPr AAA server of the partner ISP for authentication. When the client is authenticated on the partner ISP, it is also authenticated on hotspot of your ISP as per their service agreements. The AP assigns the default WISPr user role to the client when your ISP sends an

47 Wireless configuration

HP Cloud Network Manager User Guide

Page 47
Image 47
HP Cloud Network Manager Software manual Wireless configuration

Cloud Network Manager Software specifications

HP Cloud Network Manager is a robust software solution designed to simplify and enhance the management of network infrastructure in cloud environments. As organizations increasingly shift toward cloud computing, they require comprehensive tools to oversee complex network deployments. HP Cloud Network Manager rises to this challenge, offering a powerful suite of features aimed at optimizing performance, automating tasks, and ensuring reliable connectivity.

One of the main features of HP Cloud Network Manager is its intuitive dashboard, which provides users with real-time insights into network operations. This centralized interface allows administrators to monitor the status of various components, identify potential issues, and respond swiftly to anomalies. With advanced analytics capabilities, the software empowers users to make data-driven decisions that enhance network efficiency.

Another critical feature of this software is its automation capabilities. HP Cloud Network Manager simplifies routine network management tasks, such as configuration, provisioning, and software updates, allowing IT teams to focus on strategic initiatives rather than mundane maintenance. Automation reduces the risk of human error and accelerates deployment times, significantly increasing operational agility.

The software also supports multi-cloud environments, enabling organizations to manage their network resources across different cloud platforms seamlessly. This flexibility is essential for businesses that utilize various cloud providers and wish to maintain a unified network strategy. Coupled with its compatibility with open standards, HP Cloud Network Manager facilitates integration with existing IT ecosystems, ensuring a smooth transition to advanced cloud solutions.

Security is a top priority in today's digital landscape, and HP Cloud Network Manager includes integrated security features to protect network assets. It provides visibility into traffic patterns, helping to detect and mitigate potential threats before they become significant issues. Enhanced security protocols ensure that sensitive data remains protected during transit and at rest, aligning with compliance requirements.

Finally, HP Cloud Network Manager is built on cutting-edge technologies, including artificial intelligence and machine learning, which enable proactive network management. These technologies predict network behavior, assisting administrators in optimizing resources and anticipating potential challenges. As a result, organizations can achieve enhanced reliability and performance from their network infrastructure.

In summary, HP Cloud Network Manager is an essential tool for businesses looking to improve their cloud network management capabilities. With its powerful features, supportive technologies, and commitment to security, it stands out as a reliable solution for navigating the complexities of modern network environments.