Types of captive portal

Cloud Network Manager supports the following types of Captive portal authentication:

Internal Captive portal — An internal server is used for hosting the captive portal service. It supports the following types of authentication:

n Internal Authenticated — When Internal Authenticated is enabled, a guest user who is pre-provisioned in the user database has to provide authentication details.

n Internal Acknowledged —When Internal Acknowledged is enabled, a guest user has to accept the terms and conditions to access the internet.

External Captive portal— For external Captive portal authentication, an external portal on the cloud or on a server outside the enterprise network is used.

Walled garden

Administrators can also control the resources that the guest users can access and the amount of bandwidth or air time they can use at any given time. When an external Captive portal is used, administrators can configure a walled garden, which determines access to the URLs requested by the guest users. In a hotel environment, the unauthenticated users are allowed to navigate to a designated login page (for example, a hotel website) and all its contents. Users who do not sign up for the internet service can view only the “allowed” websites (typically hotel property websites).

Administrators can allow or block access to specific URLs by creating a whitelist and blacklist. When users attempt to navigate to other Websites, which are not in the whitelist of the walled garden profile, users are redirected to the login page. If the requested URL is on the blacklist, it is blocked. If it appears on neither list, the request is redirected to the external Captive portal.

Configuring a WLAN SSID for guest access

To create an SSID for guest access:

1.Select Wireless Configuration > Networks and then click Create New. The CREATE A NEW NETWORK data pane is displayed.

2.Enter a name that uniquely identifies a wireless network in NAME (SSID).

3.Select the PRIMARY USAGE as Guest.

4.Click the SHOW ADVANCED OPTIONS link. The advanced options for configuration are displayed.

5.Enter the required values for the following configuration parameters:

Table 24: WLAN SSID configuration parameters for guest network

Data pane item

Description

BROADCAST/MULTICAST

Select any of the following values under Broadcast filtering:

 

All — When set to All, the AP drops all broadcast and multicast frames

 

except DHCP and ARP.

 

ARP — When set to ARP, the AP converts ARP requests to unicast and

 

sends frames directly to the associated client.

 

Disabled — When set to Disabled, all broadcast and multicast traffic is

 

forwarded.

 

 

DTIM INTERVAL

The DTIM INTERVAL indicates the DTIM period in beacons, which can be

 

configured for every WLAN SSID profile. The DTIM interval determines how

 

often the AP should deliver the buffered broadcast and multicast frames to

 

associated clients in the powersave mode. The default value is 1, which

 

means the client checks for buffered data on the AP at every beacon. You can

 

also configure a higher DTIM value for power saving.

 

 

57 Wireless configuration

HP Cloud Network Manager User Guide

Page 57
Image 57
HP Cloud Network Manager Software manual Configuring a Wlan Ssid for guest access, Types of captive portal, Walled garden

Cloud Network Manager Software specifications

HP Cloud Network Manager is a robust software solution designed to simplify and enhance the management of network infrastructure in cloud environments. As organizations increasingly shift toward cloud computing, they require comprehensive tools to oversee complex network deployments. HP Cloud Network Manager rises to this challenge, offering a powerful suite of features aimed at optimizing performance, automating tasks, and ensuring reliable connectivity.

One of the main features of HP Cloud Network Manager is its intuitive dashboard, which provides users with real-time insights into network operations. This centralized interface allows administrators to monitor the status of various components, identify potential issues, and respond swiftly to anomalies. With advanced analytics capabilities, the software empowers users to make data-driven decisions that enhance network efficiency.

Another critical feature of this software is its automation capabilities. HP Cloud Network Manager simplifies routine network management tasks, such as configuration, provisioning, and software updates, allowing IT teams to focus on strategic initiatives rather than mundane maintenance. Automation reduces the risk of human error and accelerates deployment times, significantly increasing operational agility.

The software also supports multi-cloud environments, enabling organizations to manage their network resources across different cloud platforms seamlessly. This flexibility is essential for businesses that utilize various cloud providers and wish to maintain a unified network strategy. Coupled with its compatibility with open standards, HP Cloud Network Manager facilitates integration with existing IT ecosystems, ensuring a smooth transition to advanced cloud solutions.

Security is a top priority in today's digital landscape, and HP Cloud Network Manager includes integrated security features to protect network assets. It provides visibility into traffic patterns, helping to detect and mitigate potential threats before they become significant issues. Enhanced security protocols ensure that sensitive data remains protected during transit and at rest, aligning with compliance requirements.

Finally, HP Cloud Network Manager is built on cutting-edge technologies, including artificial intelligence and machine learning, which enable proactive network management. These technologies predict network behavior, assisting administrators in optimizing resources and anticipating potential challenges. As a result, organizations can achieve enhanced reliability and performance from their network infrastructure.

In summary, HP Cloud Network Manager is an essential tool for businesses looking to improve their cloud network management capabilities. With its powerful features, supportive technologies, and commitment to security, it stands out as a reliable solution for navigating the complexities of modern network environments.