HP MSM Series. Setup Guide
|
|
- Megan Marcia Stevenson
- 6 years ago
- Views:
Transcription
1 HP MSM Series Setup Guide
2 Disclaimer THIS DOCUMENTATION AND ALL INFORMATION CONTAINED HEREIN ( MATERIAL ) IS PROVIDED FOR GENERAL INFORMATION PURPOSES ONLY. GLOBAL REACH AND ITS LICENSORS MAKE NO WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, WITH REGARD TO THE MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, NON-INFRINGEMENT AND FITNESS FOR A PARTICULAR PURPOSE, OR THAT THE MATERIAL IS ERROR-FREE, ACCURATE OR RELIABLE. GLOBAL REACH RESERVES THE RIGHT TO MAKE CHANGES OR UPDATES TO THE MATERIAL AT ANY TIME. Limitation of Liability IN NO EVENT SHALL GLOBAL REACH BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL OR CONSEQUENTIAL DAMAGES, OR DAMAGES FOR LOSS OF PROFITS, REVENUE, DATA OR USE, INCURRED BY YOU OR ANY THIRD PARTY, WHETHER IN AN ACTION IN CONTRACT OR TORT, ARISING FROM YOUR ACCESS TO, OR USE OF, THE MATERIAL. VERSION 1.1 PUBLISHED APRIL 2015 Page 2 of 22
3 IMPORTANT - BEFORE YOU START The following document applies to HP MSM Series controllers (e.g. 720, 760). Before attempting to configure your MSM controller to use Odyssys, please ensure that ALL of the following requirements are met: Your MSM is installed in an environment where compatible Access Points are configured to work with the controller, i.e. - DNS, DHCP options configured correctly The following components are required to be configured and working in your environment before attempting integration with Odyssys: DHCP Server DNS Server Firewall NAT In addition, to protect the privacy of your Wi-Fi users, it is highly recommended that you obtain a SSL certificate signed by a trusted 3rd-party certificate authority. This will ensure the secure submission of usernames and passwords and prevent warning messages from being displayed on client devices. Details of how to upload and apply a custom SSL certificate are given later in this guide. TECH NOTE Due to a limitation of the MSM firmware, the use of wildcard SSL certificates may cause your Wi-Fi users to experience connectivity issues. You should therefore check that your certificate's common name (CN) attribute does not contain the wildcard character '*'. For help viewing your certificate's common name, please refer to step 1 of the "Preparing Your Certificate Chain" section. PLEASE NOTE - This is a technical document and as such, integration of your hardware with Odyssys should only be handled by trained individuals. TECH NOTE Odyssys does not use standard RADIUS ports, therefore please make sure you allow the ports in your firewall, defined in your manager.odyssys.net Captive Portal settings. Page 3 of 22
4 GETTING STARTED WITH ODYSSYS Before you attempt to configure your HP controller for use with Odyssys, you will first need to create your own captive portal. 1. First, navigate to and log in using your assigned Customer ID, username and password. 2. Select Captive Portals > Captive Portals from the left-hand navigation menu and click Create Captive Portal. The following dialog should appear: Page 4 of 22
5 You should complete the form as follows: Name: An arbitrary name for your captive portal. Hardware Vendor: Set this to HP MSM. Click Create to confirm. Page 5 of 22
6 CONFIGURING ODYSSYS WITHIN THE MSM 1. Navigate to your HP controller's web UI and log in using an account with sufficient privileges to make configuration changes. 2. Next, you should configure your MSM controller to authenticate your Wi-Fi users using your captive portal's RADIUS authentication and accounting servers. To do this, select Authentication > RADIUS profiles from the main navigation menu and click Add New Profile... The following form should be displayed: Page 6 of 22
7 You should complete the form as follows, referring to the information provided in step 4 of "Getting Started with Odyssys". Profile name: An arbitrary name identifying this RADIUS profile, e.g. your portal's unique identifier. Server Address: Your captive portal's RADIUS Primary Server IP. Secret/Confirm Secret: Your captive portal's RADIUS Shared Secret. Authentication Port: Your captive portal's RADIUS Authentication Port. Accounting Port: Your captive portal's RADIUS Accounting Port. You may also optionally fill in the fields under Secondary RADIUS server. You should use the same shared secret as for the primary server but set the Server address to your captive portal's RADIUS Secondary Server IP. Click Save to confirm. Page 7 of 22
8 3. Now select Public access > Web content and the following form should be displayed: You should complete the form as follows: Support a local Welcome page: This should be unchecked. Redirect users to the Login page via: This should be set to HTTPS 1. HMAC tag required: This should be unchecked. Click Save to confirm. 1 To avoid warnings about invalid certificates on client devices and to protect the privacy of your Wi-Fi users, you should upload a custom SSL certificate signed by a trusted 3rd party certificate authority. Details of how to do this are given later in this guide. Page 8 of 22
9 4. Next, select the Attributes tab and click Add New Attribute... The following form should be displayed: Page 9 of 22
10 To complete this step you will need to add several attributes, configuring each as specified below. You will also need to refer to the information provided in step 4 of "Getting Started with Odyssys". a) First, allow HTTP access to Odyssys by adding the following attribute: Name: Set this to ACCESS-LIST. Value: Set this to unauth,accept,tcp,manager.odyssys.net,80 b) Add another attribute to allow HTTPS access: Name: Set this to ACCESS-LIST. Value: Set this to unauth,accept,tcp,manager.odyssys.net,443 c) Apply the ACL to unauthenticated users: Name: Set this to USE-ACCESS-LIST-UNAUTH. Value: Set this to unauth d) Now set the redirect URL to your captive portal's splash page: Name: Set this to LOGIN-URL. Value: Set this to your captive portal's Splash Page URL followed by?client_mac=%m&login_url=%l&original_url=%o e.g. e) Finally, set the authentication error URL to your captive portal's splash page: Name: Set this to LOGIN-ERR-URL. Value Set this to your captive portal's Splash Page URL followed by?error=true&error_msg=user+authentication+failed. e.g. ed. TECH NOTE If your organization uses a custom domain to access Odyssys (e.g. wifi.examplenetworks.com), you should replace manager.odyssys.net in the atttributes above with your custom domain. For example, the first attribute would become unauth,tcp,wifi.examplenetworks.com,80 Page 10 of 22
11 5. Next, select Controller > VSCs from the left-hand navigation menu and click Add New VSC Profile... The following should be displayed: Page 11 of 22
12 The form should be completed as follows: Global: Profile Name: An arbitrary name for this VSC profile. Virtual AP: Name: The SSID you want your APs to broadcast. Page 12 of 22
13 HTML-based user logins: Local: Should be unchecked. Remote: Should be checked. Select RADIUS and choose the RADIUS profile you created in step 1. RADIUS accounting: Should be checked. Select the RADIUS profile you created in step 1. Page 13 of 22
14 6. In this step, you will assign your newly created VSC to an AP group, which this guide assumes to be the default group. If you would prefer to use a different AP group, then please take this opportunity to create and assign APs to it as necessary. For a more detailed explanation of this process, please refer to the supporting documentation provided with your MSM controller. Once you have chosen an appropriate group, select it under Controlled APs from the left-hand navigation menu. Then select the VSC bindings tab and click Add New Binding... The following should be displayed: You should use the following settings: VSC Profile: Set this to the Profile name you chose in step 5. Click Save to confirm. Page 14 of 22
15 7. You now need to push your configuration changes to your APs. To do so, select Overview > Discovered APs from the main navigation menu. Then select Synchronize Configuration from the drop-down menu and click Apply. Your MSM controller is now configured and ready to use Odyssys. Please take this opportunity to make a backup of your configuration. If you have opted to upload a custom SSL certificate, then you will also need to complete the next step. Page 15 of 22
16 8. (Optional) To complete this step you will first need to create a PKCS#12 file containing your custom SSL certificate, private key and accompanying certificate chain. For more information on creating a PKCS#12 file, please refer to the section of this guide entitled "Preparing Your Certificate Chain". a) To upload your PKCS#12 file, select Controller from the left-hand navigation menu and then Security > Certificate stores from the main navigation menu. Click Choose File and select your PKCS#12 file. Enter your PKCS#12 file's password, if any, in the PKCS#12 password field. Click Install to confirm. b) Now select the Certificate usage tab and click HTML authentication. Choose the certificate you just uploaded from the Local certificate drop-down list. The entry that corresponds to your certificate will match the common name attribute of your certificate's Subject field. Page 16 of 22
17 Click Save to confirm. Page 17 of 22
18 PREPARING YOUR CERTIFCATE CHAIN This section demonstrates how to bundle your custom certificate/private key pair and certificate chain into a PKCS#12 file using OpenSSL. To check that OpenSSL is installed, enter the following at the terminal (Mac OS X/Linux) or Command Prompt (Windows). $ openssl You should see the following OpenSSL command prompt. Type quit to exit. OpenSSL> This section assumes the following certificates: a self-signed root CA certificate (globalsign.pem), an intermediate CA certificate (alphassl.pem), a custom certificate (login.odyssys.net.pem) and private key (login.odyssys.net.key). Accordingly, you will need to substitute the filenames of your own certificates/keys with those given in the following examples. 1. First, you should print and note the value of the Common Name (CN) attribute of your SSL certificate's Subject field, e.g.: $ openssl x509 -subject -noout -in login.odyssys.net.pem This should produce: subject= /OU=Domain Control Validated/CN=login.odyssys.net Please ensure that your certificate's common name (CN) does not contain the wildcard character '*', as this is likely to cause problems for your Wi-Fi users. 2. To create the PKCS#12 file containing your certificates and private key, you should issue the following commands. Remember, your PKCS#12 file should not contain the self-signed root CA certificate (globalsign.pem in this example). $ cat alphasign.pem login.odyssys.net.pem > all.pem $ cat login.odyssys.net.key >> all.pem $ openssl pkcs12 -export -in all.pem -out login.odyssys.net.pfx You should make a note of the password, if any, you chose to encrypt the file with, as this will be required during the configuration. Your PKCS#12 file is now ready to be uploaded to your MSM controller. Page 18 of 22
19 ACCESS CONTROL LIST ADDRESSES Odyssys Twitter api.twitter.com *.twimg.com Google Facebook *.facebook.com *.akamaihd.net *.fbcdn.net connect.facebook.com LinkedIn PayPal Express Checkout / / / / /32 If you wish to disable Apple's Captive Assistant please add the following to your walled garden captive.apple.com Page 19 of 22
20 FREQUENTLY ASKED QUESTIONS Q. I want to add different authentication provider types, how do I do this? A. Please see our Odyssys Authentication guide for further information. Q. I need more information on how to setup Odyssys A. Please see our Odyssys setup guide. Page 20 of 22
21 GLOSSARY ACL - Access Control List AAA - Authentication, Authorization, and Accounting CA - Certificate Authority DHCP - Dynamic Host Configuration Protocol DNS - Domain Name Service NAT - Network Address Translation PORT - A process-specific or an application-specific software construct serving as a communication endpoint, which is used by the Transport Layer protocols of Internet Protocol suite, such as User Diagram Protocol (UDP) and Transmission Control Protocol (TCP) RADIUS - Remote Authentication Dial In User Service (RADIUS) SHARED SECRET - A single password shared between two devices SSID - Service Set Identifier - A unique identifier for your Wi-Fi service WLAN - Wireless Local Area Network WLC - Wireless Local Area Network Controller Page 21 of 22
22 Craven House, 121 Kingsway London WC2B 6PA T +44 (0) info@globalreachtech.com Copyright Global Reach Technology Limited All rights reserved. Global Reach and the Global Reach logo are registered trademarks.
Cisco Meraki. Setup Guide. Published April Version 1.0
Cisco Meraki Setup Guide Published April 2015 - Version 1.0 Disclaimer THIS DOCUMENTATION AND ALL INFORMATION CONTAINED HEREIN ( MATERIAL ) IS PROVIDED FOR GENERAL INFORMATION PURPOSES ONLY. GLOBAL REACH
More informationRuckus SmartCell Gateway. Setup Guide. Published April Version 1.0
Ruckus SmartCell Gateway Setup Guide Published April 2015 - Version 1.0 Disclaimer THIS DOCUMENTATION AND ALL INFORMATION CONTAINED HEREIN ( MATERIAL ) IS PROVIDED FOR GENERAL INFORMATION PURPOSES ONLY.
More informationAruba Mobility. Setup Guide
Aruba Mobility Setup Guide Disclaimer THIS DOCUMENTATION AND ALL INFORMATION CONTAINED HEREIN ( MATERIAL ) IS PROVIDED FOR GENERAL INFORMATION PURPOSES ONLY. GLOBAL REACH AND ITS LICENSORS MAKE NO WARRANTY
More informationCisco WLC. (For Version ) CoA Setup Guide
Cisco WLC (For Version 8.0.120.0) CoA Setup Guide Disclaimer THIS DOCUMENTATION AND ALL INFORMATION CONTAINED HEREIN ( MATERIAL ) IS PROVIDED FOR GENERAL INFORMATION PURPOSES ONLY. GLOBAL REACH AND ITS
More informationRuckus SmartZone 100 and Virtual SmartZone (Essentials)
Ruckus SmartZone 100 and Virtual SmartZone (Essentials) For firmware versions 3.0-3.4 Setup Guide Disclaimer THIS DOCUMENTATION AND ALL INFORMATION CONTAINED HEREIN ( MATERIAL ) IS PROVIDED FOR GENERAL
More informationAuthentication Provider - Facebook. Setup Guide
Authentication Provider - Facebook Setup Guide Disclaimer THIS DOCUMENTATION AND ALL INFORMATION CONTAINED HEREIN ( MATERIAL ) IS PROVIDED FOR GENERAL INFORMATION PURPOSES ONLY. GLOBAL REACH AND ITS LICENSORS
More informationSupported 3rd Party Authentication Providers for Odyssys
Supported 3rd Party Authentication Providers for Odyssys 1. Introduction... 3 1.1 Authentication Provider Menu... 3 1.2 Gateway Configuration... 4 2. Google+/Google Apps... 4 2.1 Prerequisites... 4 2.2
More informationNetwork Policy Controller UAM/RADIUS Guide
Network Policy Controller UAM/RADIUS Guide 1. Introduction... 3 1.1. Terminology... 3 2. Web Authentication... 5 2.1. Redirect URL Parameters... 5 2.2. UAM Login URL... 5 2.3. UAM Logout URL... 6 3. UAM/RADIUS
More informationSecureW2 and Wi-Fi Cloud. Integration Guide
SecureW2 and Wi-Fi Cloud Integration Guide SecureW2 and Wi-Fi Cloud Integration Guide Deployment Overview This guide demonstrates how to integrate a WatchGuard Wi-Fi Cloud Captive Portal with SecureW2
More informationWEB ANALYTICS HOW-TO GUIDE
WEB ANALYTICS HOW-TO GUIDE MOTOROLA, MOTO, MOTOROLA SOLUTIONS and the Stylized M logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC and are used under license. All other trademarks
More informationTECHNICAL NOTE MSM & CLEARPASS HOW TO CONFIGURE HPE MSM CONTROLLERS WITH ARUBA CLEARPASS VERSION 3, JUNE 2016
HOW TO CONFIGURE HPE MSM CONTROLLERS WITH ARUBA CLEARPASS VERSION 3, JUNE 2016 CONTENTS Introduction... 5 MSM and AP Deployment Options... 5 MSM User Interfaces... 6 Assumptions... 7 Network Diagram...
More informationMSM320, MSM410, MSM422, MSM430,
Polycom VIEW Certified Configuration Guide Hewlett-Packard MSM710/720/760/765 Wireless LAN Controller With MSM310, MSM320, MSM410, MSM422, MSM430, MSM46x APs September 2012 1725-36068-001 Rev H Trademarks
More informationHow to Set Up External CA VPN Certificates
To configure a client-to-site, or site-to-site VPN using s created by External CA, you must create the following VPN s for the VPN service to be able to authenticate Before you begin Use an external CA
More informationCisco Meeting Management
Cisco Meeting Management Cisco Meeting Management 1.1 User Guide for Administrators September 19, 2018 Cisco Systems, Inc. www.cisco.com Contents 1 Introduction 4 1.1 The software 4 2 Deployment overview
More informationVPN Tracker for Mac OS X
VPN Tracker for Mac OS X How-to: Interoperability with SonicWALL Internet Security Appliances Rev. 2.2 Copyright 2002-2003 equinux USA Inc. All rights reserved. 1. Introduction 1. Introduction This document
More informationTunneling Configuration Guide for Enterprise
Tunneling Configuration Guide for Enterprise Tech Note Version 1.0 Table of Contents Introduction... 3 Tunneling Options... 4 Why use tunneling... 4 Tunnel types... 4 Ruckus GRE... 4 Soft-GRE... 5 Tunneling
More informationGuest Management Software Administrator Guide. Installation and Getting Started Guide Administrator Guide
Guest Management Software Administrator Guide Guest ProCurve Management 5400zl Switches Software Installation and Getting Started Guide Administrator Guide Guest Management Software Administrator Guide
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for Tableau Server All information herein is either public information or is the property of
More informationVPN Tracker for Mac OS X
VPN Tracker for Mac OS X How-to: Interoperability with SonicWALL Internet Security Appliances Rev. 4.0 Copyright 2003-2005 equinux USA Inc. All rights reserved. 1. Introduction 1. Introduction This document
More informationTanium Network Quarantine User Guide
Tanium Network Quarantine User Guide Version 1.0.2 August 14, 2018 The information in this document is subject to change without notice. Further, the information provided in this document is provided as
More informationD-Link Central WiFiManager Configuration Guide
Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install
More informationCisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at
Document Date: May 16, 2017 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for SonicWALL Secure Remote Access All information herein is either public information or is
More informationGTA SSL Client & Browser Configuration
GB-OS Version 6.2 GTA SSL Client & Browser Configuration SSL201607-01 Global Technology Associates 3361 Rouse Rd, Suite 240 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: info@gta.com
More informationIdentity Services Engine Guest Portal Local Web Authentication Configuration Example
Identity Services Engine Guest Portal Local Web Authentication Configuration Example Document ID: 116217 Contributed by Marcin Latosiewicz, Cisco TAC Engineer. Jun 21, 2013 Contents Introduction Prerequisites
More informationDualFence. Implementation Guide. Copyright 2013 Deepnet Security Limited. Copyright 2013, Deepnet Security. All Rights Reserved.
Implementation Guide Copyright 2013 Deepnet Security Limited Copyright 2013, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID, PocketID, SafeID,
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationClearPass QuickConnect 2.0
ClearPass QuickConnect 2.0 User Guide Copyright 2013 Aruba Networks, Inc. Aruba Networks trademarks include, Aruba Networks, Aruba Wireless Networks, the registered Aruba the Mobile Edge Company logo,
More informationOne Identity Starling Two-Factor Desktop Login 1.0. Administration Guide
One Identity Starling Two-Factor Desktop Login 1.0 Administration Guide Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationPartner Information. Integration Overview. Remote Access Integration Architecture
Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration OTP Barracuda Networks Barracuda SSL VPN User Name + Security Code VIP Enterprise
More informationMSC-5100 Promotional Bundle Quickstart
MSC-5100 Promotional Bundle Quickstart This Quickstart shows you how to install, configure, and use the MSC-5100 Promotional Bundle. For detailed configuration and operating information on the MSC-5100
More informationDeploying Devices. Cisco Prime Infrastructure 3.1. Job Aid
Deploying Devices Cisco Prime Infrastructure 3.1 Job Aid Copyright Page THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION,
More informationGrandstream Networks, Inc. Captive Portal Authentication via Facebook
Grandstream Networks, Inc. Table of Content SUPPORTED DEVICES... 4 INTRODUCTION... 5 CAPTIVE PORTAL SETTINGS... 6 Policy Configuration Page... 6 Landing Page Redirection... 9 Pre-Authentication Rules...
More informationSafeNet Authentication Service
SafeNet Authentication Service Push OTP Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have
More informationSonicWall Global VPN Client Getting Started Guide
SonicWall Global VPN Client 4.10 Getting Started Guide Copyright 2017 SonicWall Inc. All rights reserved. SonicWall is a trademark or registered trademark of SonicWall Inc. and/or its affiliates in the
More informationStonesoft Management Center. Release Notes for Version 5.6.1
Stonesoft Management Center Release Notes for Version 5.6.1 Updated: January 9, 2014 Table of Contents What s New... 3 Fixes... 3 System Requirements... 6 Basic Management System Hardware Requirements...
More informationHow to social login with Aruba controller. Bo Nielsen, CCIE #53075 (Sec) December 2016, V1.00
Bo Nielsen, CCIE #53075 (Sec) December 2016, V1.00 Overview This short document describes the basic setup for social login using Aruba ClearPass and Aruba wireless LAN controller. Aruba ClearPass, version
More informationTroubleshooting Web Authentication on a Wireless LAN Controller (WLC)
Troubleshooting Web Authentication on a Wireless LAN Controller (WLC) Document ID: 108501 Contents Introduction Prerequisites Requirements Components Used Related Products Conventions Web Authentication
More informationHP Cloud-Managed Networking Solution Release Notes
HP Cloud-Managed Networking Solution Release Notes Abstract These release notes provide important release-related information about the HP Cloud Network Manager and HP 365, HP 355, and HP 350 Access Points.
More informationNeoAccel NeoAccel Management Console: Gateway Gateway Administration version version 2.3
SSL VPN-Plus TM NeoAccel NeoAccel Management Console: Console: Gateway Gateway Administration version version 2.3 2.0 Copyright 2005-2006. 2005-2009. NeoAccel Inc. NeoAccel Inc. NMC - Volume II -SSL VPN-Plus-v2.33
More informationINTEROPERABILITY DOCUMENT BETWEEN OMNIACCESS STELLAR SOLUTION AND OCTOPUS WIFI
INTEROPERABILITY DOCUMENT BETWEEN OMNIACCESS STELLAR SOLUTION AND OCTOPUS WIFI PREPARED BY Engineering Department of Blue Octopus WiFi VERSIÓN 1.0 Table of contents 1. INTRODUCTION 3 2. SOLUTION ADVENTAGES
More informationSafeNet Authentication Manager
SafeNet Authentication Manager Integration Guide Using RADIUS Protocol for F5 BIG-IP Access Policy Manager All information herein is either public information or is the property of and owned solely by
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for RadiantOne Cloud Federation Service (CFS) All information herein is either public information
More informationSafeNet Authentication Manager
SafeNet Authentication Manager Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationSafeNet Authentication Service
SafeNet Authentication Service Push OTP Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have
More informationUpgrading Software Version 3.1 to Version 4. HP ProCurve Secure Access 700wl Series.
Upgrading Software Version 3.1 to Version 4 HP ProCurve Secure Access 700wl Series www.hp.com/go/hpprocurve HP PROCURVE SECURE ACCESS 700WL SERIES UPGRADING SOFTWARE VERSION 3.1 TO VERSION 4 Copyright
More informationCloud Access Manager Configuration Guide
Cloud Access Manager 8.1.3 Configuration Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationGrandstream Networks, Inc. Captive Portal Authentication via Twitter
Grandstream Networks, Inc. Table of Content SUPPORTED DEVICES... 4 INTRODUCTION... 5 CAPTIVE PORTAL SETTINGS... 6 Policy Configuration Page... 6 Landing Page Redirection... 8 Pre-Authentication Rules...
More informationAuthenticating Cisco VCS accounts using LDAP
Authenticating Cisco VCS accounts using LDAP Cisco TelePresence Deployment Guide Cisco VCS X6 D14526.04 February 2011 Contents Contents Document revision history... 3 Introduction... 4 Usage... 4 Cisco
More informationCMX Dashboard Visitor Connect
CHAPTER 11 Cisco CMX Visitor Connect is a guest access solution based on Mobility Services Engine (MSE), Cisco Wireless LAN Controller (WLC) and Lightweight Access points (AP). The CMX Visitor Connect
More informationGoldSim License Portal A User s Guide for Managing Your GoldSim Licenses
GoldSim License Portal A User s Guide for Managing Your GoldSim Licenses Copyright GoldSim Technology Group LLC, 1998-2016. All rights reserved. GoldSim is a registered trademark of GoldSim Technology
More informationVPN Tracker for Mac OS X
VPN Tracker for Mac OS X How-to: Interoperability with Check Point VPN-1 GateWay Rev. 1.1 Copyright 2003 equinux USA Inc. All rights reserved. 1. Introduction 1. Introduction This document describes how
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV and/or its subsidiaries who shall have and keep
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationCloudpath and Aruba Instant Integration
Cloudpath and Aruba Instant Integration This document describes the process to use Ruckus Cloudpath to secure an Aruba Instant network. The following versions were used for this example: Ruckus Cloudpath
More informationPartner Information. Integration Overview Authentication Methods Supported
Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration F5 Networks FirePass VPN User Name - Security Code User Name - Password - Security
More informationStoneGate Management Center. Release Notes for Version 5.3.4
StoneGate Management Center Release Notes for Version 5.3.4 Created: December 20, 2011 Table of Contents What s New... 3 Fixes... 3 Other Changes... 5 System Requirements... 6 Basic Management System Hardware
More informationCisco Expressway Authenticating Accounts Using LDAP
Cisco Expressway Authenticating Accounts Using LDAP Deployment Guide Cisco Expressway X8.5 December 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration 4
More informationCreating and Installing SSL Certificates (for Stealthwatch System v6.10)
Creating and Installing SSL Certificates (for Stealthwatch System v6.10) Copyrights and Trademarks 2017 Cisco Systems, Inc. All rights reserved. NOTICE THE SPECIFICATIONS AND INFORMATION REGARDING THE
More informationSymantec Validation & ID Protection Service. Integration Guide for Microsoft Outlook Web App
Symantec Validation & ID Protection Service Integration Guide for Microsoft Outlook Web App 2 Symantec VIP Integration Guide for Microsoft Outlook Web App The software described in this book is furnished
More informationForeScout CounterACT. Configuration Guide. Version 4.1
ForeScout CounterACT Network Module: VPN Concentrator Plugin Version 4.1 Table of Contents About the VPN Concentrator Plugin... 3 What to Do... 3 Requirements... 3 CounterACT Requirements... 3 Supported
More informationVPN Tracker for Mac OS X
VPN Tracker for Mac OS X How-to: Interoperability with NETGEAR VPN Router Appliances Rev. 1.2 Copyright 2003 equinux USA Inc. All rights reserved. 1. Introduction 1. Introduction This document describes
More informationVeritas Desktop Agent for Mac Getting Started Guide
Veritas Desktop Agent for Mac Getting Started Guide The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation
More informationCreating Wireless Networks
WLANs, page 1 Creating Employee WLANs, page 2 Creating Guest WLANs, page 4 Internal Splash Page for Web Authentication, page 7 Managing WLAN Users, page 9 Adding MAC for Local MAC Filtering on WLANs, page
More informationKACE GO Mobile App 5.0. Getting Started Guide
KACE GO Mobile App 5.0 Getting Started Guide Table of Contents Using the KACE GO Mobile App...3 Getting Started...3 What features are included in this version of the KACE GO Mobile App?...3 How do I access
More informationSilver Peak EC-V and Microsoft Azure Deployment Guide
Silver Peak EC-V and Microsoft Azure Deployment Guide How to deploy an EC-V in Microsoft Azure 201422-001 Rev. A September 2018 2 Table of Contents Table of Contents 3 Copyright and Trademarks 5 Support
More informationSafeNet Authentication Manager
SafeNet Authentication Manager Integration Guide Using SafeNet Authentication Manager as an Identity Provider for F5 BIG- IP Access Policy Manager All information herein is either public information or
More informationCisco TelePresence Authenticating Cisco VCS Accounts Using LDAP
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.2 D14465.07 June 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration
More informationKACE GO Mobile App 3.1. Release Notes
KACE GO Mobile App 3.1 Release Notes Table of Contents Quest KACE GO 3.1 Mobile App Release Notes...3 About the KACE GO Mobile App... 3 Capabilities for KACE Systems Management Appliance (K1000) administrators...
More informationPDxxxxx {P/N} {Doc Description} PRELIMINARY PDS-104_SECURED_WEB_BROWSING_UG. PDS-104G - Secured web browsing certificate management.
PDS-104G - Secured web browsing certificate management User Guide TABLE OF CONTENTS PDS-104_SECURED_WEB_BROWSING_UG 1 INTRODUCTION...2 1.1 GENERAL... 2 1.2 ENFORCING SECURED WEB BROWSING... 2 1.3 SECURED
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the
More informationHPE IMC UAM BYOD Quick Deployment on Mobile Device Configuration Examples
HPE IMC UAM BYOD Quick Deployment on Mobile Device Configuration Examples Part Number: 5200-1387 Software version: IMC UAM 7.2 (E0403) Document version: 2 The information in this document is subject to
More informationOne Identity Starling Two-Factor HTTP Module 2.1. Administration Guide
One Identity Starling Two-Factor HTTP Module 2.1 Administration Guide Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationVMware Avery Dennison Printer Integration Guide Integration with Workspace ONE UEM
VMware Avery Dennison Printer Integration Guide Integration with Workspace ONE UEM Workspace ONE UEM 9.7 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationVPN Tracker for Mac OS X
VPN Tracker for Mac OS X How-to: Interoperability with NETGEAR FVM 318 Internet Security Appliances Rev. 1.0 Copyright 2004 equinux USA Inc. All rights reserved. 1. Introduction 1. Introduction This document
More informationAruba Central Guest Access Application
Aruba Central Guest Access Application User Guide Copyright Information Copyright 2017Hewlett Packard Enterprise Development LP. Open Source Code This product includes code licensed under the GNU General
More informationZL UA Exchange 2013 Archiving Configuration Guide
ZL UA Exchange 2013 Archiving Configuration Guide Version 8.0 January 2014 ZL Technologies, Inc. Copyright 2014 ZL Technologies, Inc.All rights reserved ZL Technologies, Inc. ( ZLTI, formerly known as
More informationStoneGate SSL VPN Release Notes for Version 1.3.1
StoneGate SSL VPN Release Notes for Version 1.3.1 Created: July 29, 2009 Table of Contents What s New... 3 System Requirements... 4 Build Version... 4 Product Binary Checksums... 4 Compatibility... 5 Upgrade
More informationStonesoft Firewall/VPN Express. Release Notes for Version 5.5.7
Stonesoft Firewall/VPN Express Release Notes for Version 5.5.7 Created: April 9, 2014 Table of Contents What s New... 3 Fixes... 3 System Requirements... 5 Stonesoft Firewall/VPN Appliances... 5 Build
More informationSymantec Desktop and Laptop Option 8.0 SP2. Symantec Desktop Agent for Mac. Getting Started Guide
Symantec Desktop and Laptop Option 8.0 SP2 Symantec Desktop Agent for Mac Getting Started Guide Disclaimer The information contained in this publication is subject to change without notice. Symantec Corporation
More informationGrandstream Networks, Inc. Captive Portal Authentication via Facebook
Grandstream Networks, Inc. Table of Content SUPPORTED DEVICES... 4 INTRODUCTION... 5 CAPTIVE PORTAL SETTINGS... 6 Policy Configuration Page... 6 Landing Page Redirection... 8 Pre-Authentication Rules...
More informationCisco Aironet 1815T (Teleworker) Access Point Deployment Guide
Cisco Aironet 1815T (Teleworker) Access Point Deployment Guide First Published: 2017-08-18 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com
More informationStonesoft Firewall/VPN Express. Release Notes for Version 5.5.4
Stonesoft Firewall/VPN Express Release Notes for Version 5.5.4 Created: December 17, 2013 Table of Contents What s New... 3 Fixes... 3 System Requirements... 4 Stonesoft Firewall/VPN Appliances... 4 Build
More informationSurePassID Local Agent Guide SurePassID Authentication Server 2016
SurePassID Local Agent Guide SurePassID Authentication Server 2016 SurePassID Local Agent Guide Revision: 03 10 2016 You can find the most up-to-date technical documentation at: http://www.surepassid.com
More informationNokia Intrusion Prevention with Sourcefire. Appliance Quick Setup Guide
Nokia Intrusion Prevention with Sourcefire Appliance Quick Setup Guide Part Number N450000567 Rev 001 Published September 2007 COPYRIGHT 2007 Nokia. All rights reserved. Rights reserved under the copyright
More informationDell Secure Mobile Access Connect Tunnel Service User Guide
Dell Secure Mobile Access 11.4 Connect Tunnel Service 2016 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationNokia Intrusion Prevention with Sourcefire Appliance Quick Setup Guide. Sourcefire Sensor on Nokia v4.8
Nokia Intrusion Prevention with Sourcefire Appliance Quick Setup Guide Sourcefire Sensor on Nokia v4.8 Part No. N450000774 Rev 001 Published September 2008 COPYRIGHT 2008 Nokia. All rights reserved. Rights
More informationNetApp Cloud Volumes Service for AWS
NetApp Cloud Volumes Service for AWS AWS Account Setup Cloud Volumes Team, NetApp, Inc. March 29, 2019 Abstract This document provides instructions to set up the initial AWS environment for using the NetApp
More informationCloud Access Manager Overview
Cloud Access Manager 8.1.3 Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationLevelOne. Quick Installation Guide. WHG series Secure WLAN Controller. Introduction. Getting Started. Hardware Installation
Introduction LevelOne WHG series Secure WLAN Controller LevelOne Secure WLAN Controller is the most advanced yet simple deployment and cost-effective wireless solution; it is an ideal security solution
More informationInstall Certificate on the Cisco Secure ACS Appliance for PEAP Clients
Install Certificate on the Cisco Secure ACS Appliance for PEAP Clients Document ID: 64067 Contents Introduction Prerequisites Requirements Components Used Conventions Microsoft Certificate Service Installation
More informationVeritas Desktop and Laptop Option Mac Getting Started Guide
Veritas Desktop and Laptop Option 9.3.1 Mac Getting Started Guide 20-Nov-18 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms
More informationJuly SonicWall SonicOS 6.2 Upgrade Guide
SonicWall SonicOS 6.2 July 2017 This provides instructions for upgrading your SonicWall network security appliance from SonicOS 6.1 firmware or a previous version of SonicOS 6.2 to the latest version of
More informationSymantec Managed PKI. Integration Guide for AirWatch MDM Solution
Symantec Managed PKI Integration Guide for AirWatch MDM Solution ii Symantec Managed PKI Integration Guide for AirWatch MDM Solution The software described in this book is furnished under a license agreement
More informationLookout Mobile Endpoint Security. Deploying Lookout with BlackBerry Unified Endpoint Management
Lookout Mobile Endpoint Security Deploying Lookout with BlackBerry Unified Endpoint Management June 2018 2 Copyright and disclaimer Copyright 2018, Lookout, Inc. and/or its affiliates. All rights reserved.
More informationBlue Coat Security First Steps Solution for Controlling HTTPS
Solution for Controlling HTTPS SGOS 6.5 Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks
More informationNetwork Controller 3500 Quick Start Guide
Network Controller 3500 Quick Start Guide Firmware Version 1.00.82 1. Configuring the Controller 1.1. Connect to the Controller: The default LAN IP Address of the Controller is: IP: 192.168.1.1 Set you
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationTippingPoint Best Practice Guide. RADIUS PEAP Configuration for IPS Devices and Cisco ACS. Version:
TippingPoint Best Practice Guide RADIUS PEAP Configuration for IPS Devices and Cisco ACS Version: 16.1.1 Copyright Statement Copyright 2016 Trend Micro. Trend Micro Incorporated ( Trend Micro ) makes no
More information