HP Cloud Network Manager Software manuals
Computer Equipment > Software
When we buy new device such as HP Cloud Network Manager Software we often through away most of the documentation but the warranty.
Very often issues with HP Cloud Network Manager Software begin only after the warranty period ends and you may want to find how to repair it or just do some service work.
Even oftener it is hard to remember what does each function in Software HP Cloud Network Manager Software is responsible for and what options to choose for expected result.
Fortunately you can find all manuals for Software on our side using links below.
HP Cloud Network Manager Software Manual
89 pages 1.03 Mb
2 Document 5998-5742,edition 1 (July 2014)Acknowledgments 3 Contents9 About this guideIntended audience Related documents Conventions HP websites 10 About Cloud Network ManagerCloud Network Manager overview 11 Cloud Network Manager user interfaceActivating your Cloud Network Manager subscriptions12 8.Read and accept the End User License agreement, and then click Finisha.Your subscription(s) is activated in the HP Cloud Network Manager Activating your HP Cloud Network Manager account Wireless configuration on page To activate your HP Cloud Network Manager account: Open the welcome email and click the link 3.Use the temporary password to log into the Cloud Network Manager 4.Change your password 13 User interface14 MonitoringWireless configuration Reports Maintenance Virtual Controller Override Resolve Override 15 HelpData paneWireless Configuration > Access Points 16 SupportFeedback 17 Monitoring18 AP detailsRemote Console System pane Access Point Console Access 19 Clients20 WIDSEvent log The Event Log pane displays the event details that occur in the network 22 Wireless configurationInitial AP configuration Wireless network profiles23 Network types24 2.For TYPE, select Wireless3.Enter a name that is used to identify the network in the Name (SSID) box Based on the type of network profile, select any of the following options underPRIMARY USAGE Employee • Voice • Guest 26 Configuring VLAN settings for a WLAN SSID profileTo configure VLAN settings for an SSID: 1.In VLAN, select any of the following options for CLIENT IP ASSIGNMENT:Virtual Controller Assigned DHCP configuration on page default, the client VLAN is assigned to the native VLAN on the wired network b.Enter the following information: • STRING — Enter the string to match • VLAN — Enter the VLAN to be assigned 27 Configuring security settings for an employee or voice network29 Configuring access rules for a WLAN SSID profile on pageConfiguring access rules for a WLAN SSID profile Configuring a WLAN SSID for guest access on page To configure access rules for an employee or voice network: 1.In Access Rules, select any of the following types of access control: • Unrestricted — Select this to set unrestricted access to the networkNetwork-based Allow any to all destinations a.Click (+) icon b.Select appropriate options in the New Rule pane c.Click OK 30 General configuration tasks34 Advanced configuration tasks35 Configuring ARRM assigned radio profiles for an APConfiguring radio profiles manually for AP 36 The following table describes various configuration modes for an AP4.If the ACCESS mode is selected, perform the following actions:a.Select Administrator assigned in 2.4 GHz and 5 GHz BAND BAND From Enter appropriate transmit power value in Configuring uplink VLAN for an AP To configure the uplink management VLAN on an AP: 2.Click Edit. The Edit pane for modifying AP details is displayed 3.Click UPLINK and specify the VLAN in UPLINK MANAGEMENT VLAN 5.Reboot the AP Obtaining IP address To specify a static IP address for the AP 37 Advanced radio resource management42 Intrusion detection system43 logged informationThis chapter describes the following procedures: •Detecting and classifying rogue APs on page •OS fingerprinting on page •Configuring wireless intrusion protection and detection levels on page Detecting and classifying rogue APs A rogue AP is an unauthorized AP plugged into the wired side of the network OS fingerprinting •Windows •Windows Vista •Windows Server •Windows XP •Windows ME •OS •iPhone •iOS •Android •Blackberry •Linux Configuring wireless intrusion protection and detection levels 44 You can configure the following options:Infrastructure Detection Policies Client Detection Policies Infrastructure Protection Policies Client Protection Policies Containment Methods IDS •Off •Low •Medium •High Custom settings 45 The following levels of detection can be configured in the WIP Protection page:field 46 Authentication48 External RADIUS serverInternal RADIUS server 49 Authentication termination on APConfiguring an external server for authentication 50 LDAP Server51 Configuring dynamic RADIUS proxy parameters52 1.Enable dynamic RADIUS proxyEnabling dynamic RADIUS proxy To enable RADIUS RADIUS proxy:1.Select Wireless Configuration > System. The System data pane is displayed data pane is displayed2.In GENERAL, select Enabled from DYNAMIC RADIUS PROXY , select from To configure DRP parameters for the authentication server: Table • DRP MASK—Subnetmask of the DRP IP address Configuring 802.1X authentication for a network profile The steps involved in 802.1X authentication are as follows: 1.The NAS requests authentication credentials from a wireless client 2.The wireless client sends authentication credentials to the NAS 3.The NAS sends these credentials to a RADIUS server Configuring MAC authentication for wireless network profiles 54 6.Click ACCESS tab to define access rulesConfiguring MAC authentication with captive portal authentication This authentication method has the following features: For wireless network profile, selectENFORCE MAC AUTH ONLY ROLE 3.Click Next and then click Save Settings Configuring WISPr authentication Cloud Network Manager supports the following smart clients: niPass nBoingo redirect authentication logoff To configure WISPr authentication: 55 Blacklisting clients manually56 Captive portal for guest access57 Types of captive portalWalled garden 59 6.Click Next to configure VLAN settings. The VLAN details are displayed7.Select any of the following options for CLIENT IP ASSIGNMENT: • Network Assigned—Selectthis option to obtain the IP address from the network • STRING— Enter the string to match • VLAN— Enter the VLAN to be assigned to configure , for the guest users 60 Configuring internal captive portal for guest network1. In the SECURITY tab, assign values for the configuration parameters: 61 External captive portal profilesCreating a captive portal profile 62 4. Click SaveConfiguring guest logon role and access rules for guest users You can configure up to 64 access rules for a guest network To configure access rules for a guest network: 4.Select Guest under PRIMARY USAGE and click Next 7.In the Access tab, select any of the following types of access control: b.Click Save 63 1. Create a user role:a.Click New in ROLE pane b.Enter a name for the new role and click Ok 2.Create access rules for a specific user role: 3.Create a role assignment rule , click b.Select appropriate options in Attribute, Operator, String, and Role fields c.Click Save 8.Click Finish Configuring captive portal roles for an SSID To create a captive portal role for both splash page types: Select an SSID profile from 3.Click (+). The ACCESS RULES FOR SELECTED ROLES data pane is displayed 4.In ACCESS RULES FOR SELECTED ROLES, specify the following parameters 64 •Select a profile from Captive Portal ProfileIf you want to edit the profile, click Configuring walled garden access 65 DHCP configurationConfiguring local and local, L3 DHCP scopes Local, L3 66 To configure a new DHCP scope:1.Select Wireless Configuration > DHCP. The DHCP Server data pane is displayed To configure aLocal Local DHCP Scopes New DHCP Scope 3.Based on type of DHCP scope, configure the following parameters: 4. Click OkConfiguring DHCP server for client IP assignment 67 Services72 Uplink configuration75 Mobility and client management77 Enterprise domainSNMP and logging 81 Reports83 Maintenance84 Device managementUser management The user can perform following actions: •Add User: Add additional users to the Network Management System (NMS) 85 Terminology
Also you can find more HP manuals or manuals for other Computer Equipment.