Data pane item

Description

INTERNAL

If INTERNAL is selected as splash page type:

 

Under SPLASH PAGE VISUALS, use the editor to specify text and colors for the

 

initial page that will be displayed to users connecting to the network. The initial

 

page asks for user credentials or email, depending on the splash page type

 

configured

 

To change the welcome text, enter the required text in WELCOME TEXT, and

 

click Save. Ensure that the welcome text does not exceed 127 characters.

 

To change the policy text, enter the required text in POLICY TEXT, and click

 

Save. Ensure that the policy text does not exceed 255 characters.

 

To change the color of the splash page, click the box corresponding to BODY

 

BACKGROUND COLOR and select the required color from the palette.

 

To redirect the guest users, specify the URL in REDIRECT URL.

 

To preview the captive portal page, click PREVIEW SPLASH PAGE .

 

 

EXTERNAL

If EXTERNAL is selected, perform the following steps:

Select a profile from Captive Portal Profile.

If you want to edit the profile, click Edit and update the following parameters:

TYPE — Select either RADIUS AUTHENTICATION (to enable user authentication against a RADIUS server) or AUTHENTICATION TEXT (to specify the authentication text to returned by the external server after a successful user authentication).

IP OR HOSTNAME— Enter the IP address or the hostname of the external splash page server.

URL— Enter the URL for the external splash page server.

PORT — Enter the port number for communicating with the external splash page server

CAPTIVE PORTAL FAILURE —This field allows you to configure internet access for the guest clients when the external captive portal server is not available. Select Deny Internet to prevent clients from using the network, or Allow Internet to allow the guest clients to access internet when the external captive portal server is not available.

AUTOMATIC URL WHITELISTING — Select Enabled or Disabled to enable or disable automatic whitelisting of URLs. On selecting this for the external captive portal authentication, the URLs allowed for the unauthenticated users to access are automatically whitelisted. The automatic URL whitelisting is disabled by default.

AUTH TEXT— Indicates the authentication text returned by the external server after a successful user authentication.

REDIRECT URL— Specify a redirect URL to redirect the users to another URL.

5.Click Save. The enforce captive portal rule is created and listed as an access rule.

6.Click Save Settings.

The client can connect to this SSID after authenticating with username and password. After the user logs in successfully, the captive portal role is assigned to the client.

Configuring walled garden access

On the internet, a walled garden typically controls access to web content and services. The walled garden access is required when an external captive portal is used. For example, a hotel environment where unauthenticated users are allowed to navigate to a designated login page (for example, a hotel website) and access all its contents.

HP Cloud Network Manager User Guide

Wireless configuration 64

Page 64
Image 64
HP Cloud Network Manager Software manual Configuring walled garden access, Internal, External

Cloud Network Manager Software specifications

HP Cloud Network Manager is a robust software solution designed to simplify and enhance the management of network infrastructure in cloud environments. As organizations increasingly shift toward cloud computing, they require comprehensive tools to oversee complex network deployments. HP Cloud Network Manager rises to this challenge, offering a powerful suite of features aimed at optimizing performance, automating tasks, and ensuring reliable connectivity.

One of the main features of HP Cloud Network Manager is its intuitive dashboard, which provides users with real-time insights into network operations. This centralized interface allows administrators to monitor the status of various components, identify potential issues, and respond swiftly to anomalies. With advanced analytics capabilities, the software empowers users to make data-driven decisions that enhance network efficiency.

Another critical feature of this software is its automation capabilities. HP Cloud Network Manager simplifies routine network management tasks, such as configuration, provisioning, and software updates, allowing IT teams to focus on strategic initiatives rather than mundane maintenance. Automation reduces the risk of human error and accelerates deployment times, significantly increasing operational agility.

The software also supports multi-cloud environments, enabling organizations to manage their network resources across different cloud platforms seamlessly. This flexibility is essential for businesses that utilize various cloud providers and wish to maintain a unified network strategy. Coupled with its compatibility with open standards, HP Cloud Network Manager facilitates integration with existing IT ecosystems, ensuring a smooth transition to advanced cloud solutions.

Security is a top priority in today's digital landscape, and HP Cloud Network Manager includes integrated security features to protect network assets. It provides visibility into traffic patterns, helping to detect and mitigate potential threats before they become significant issues. Enhanced security protocols ensure that sensitive data remains protected during transit and at rest, aligning with compliance requirements.

Finally, HP Cloud Network Manager is built on cutting-edge technologies, including artificial intelligence and machine learning, which enable proactive network management. These technologies predict network behavior, assisting administrators in optimizing resources and anticipating potential challenges. As a result, organizations can achieve enhanced reliability and performance from their network infrastructure.

In summary, HP Cloud Network Manager is an essential tool for businesses looking to improve their cloud network management capabilities. With its powerful features, supportive technologies, and commitment to security, it stands out as a reliable solution for navigating the complexities of modern network environments.