Hotspot Manager. Configuration guide for Cisco WLC. ADIPSYS SAS 2405 route des Dolines Valbonne Sophia-Antipolis
|
|
- Rachel Bradley
- 7 years ago
- Views:
Transcription
1 Hotspot Manager Configuration guide for Cisco WLC ADIPSYS SAS 2405 route des Dolines Valbonne Sophia-Antipolis ADIPSYS Configuration guide for Cisco WLC v1.5 1
2 Summary I. Introduction... 3 II. Cisco WLC configuration... 3 A. General Configuration... 3 B. Radius Server Authentication Accounting... 6 C. Access Lists... 6 D. Web redirection... 8 E. SSID configuration... 9 III. Cisco WLC configuration in Hotspot Manager A. Add the controller in HM B. Hotspot Configuration IV. Hotspot Manager Compliancy Matrix ADIPSYS Configuration guide for Cisco WLC v1.5 2
3 I. Introduction This document describes the configuration of a Cisco Wireless LAN Controller with Hotspot Manager Platform. The reference equipments used to write this guide are : Cisco WLC 2504 Wireless LAN Controller AIR-LAP1142N-E-K9 Dual band 2.4GHz 5GHz - Tests have been executed with firmware version The solution has also been validated on other WLC : 2125, 4404, 5508, 6500, Virtual WLC. The following parameters for Hotspot Manager were used in this guide, you will have to adapt them to your setup : RADIUS server RADIUS secret RADIUS NAS-ID Web URL Redirection E8687C55C585B7A1A83D0640F39E3AE3 D0-C2-82-E1-B1-20 Mac Address of your WLC II. Cisco WLC configuration Connect to the admin interface of your WLC to proceed the following setup A. General Configuration First, you have to configure network settings, specially the IP address for the management interface. Go to Controller -> Interfaces, then click on Management. ADIPSYS Configuration guide for Cisco WLC v1.5 3
4 Enter the network parameters of the controller on your LAN. You ll also see the MAC address of the WLC here. You will have to adapt the interface address parameters to your network environment. Then, you ll have to configure the NAS-ID parameter value that will be sent in Radius requests to uniquely identify your controller. The NAS-ID is usually defined by using the Mac ADIPSYS Configuration guide for Cisco WLC v1.5 4
5 Address of the controller formatted as XX-YY-ZZ-AA-BB-CC to ensure the symmetrical configuration of the device with Hotspot Manager. To configure it, go to Controller -> General. Modify the value of the Name field with the Mac Address of the controller. In this example, the NAS-ID value will be «D0-C2-82-E1-B1-20». B. Radius Server 1. Authentication Go to Security -> AAA -> Radius -> Authentication Select AP MAC Address as Auth Call Station ID Type. Select Hypen as MAC Delimiter. Click on Apply (top right) then on New to define the external Radius server in charge of authentication requests. ADIPSYS Configuration guide for Cisco WLC v1.5 5
6 Enter the following parameters : - Server IP Address : IP of radius server ( for demo.hotspotmanager.fr) - Shared Secret : E8687C55C585B7A1A83D0640F39E3AE3 - Port Number : 1812 (default port for Radius authentication) Click on Apply to validate changes. 2. Accounting Go to Security -> AAA -> Radius -> Accounting Set the same settings used for Authentication : - AP MAC Address as Acct Call Station ID Type. - Hypen as MAC Delimiter. Click on Apply then on New to define the external Radius server in charge of collecting accounting datas. Set the same settings used for Authentication except port number : - Server IP Address : IP of radius server ( for demo.hotspotmanager.fr) - Shared Secret : E8687C55C585B7A1A83D0640F39E3AE3 - Port Number : 1813 (default port for Radius accounting) Click on Apply to validate changes. C. Access Lists Go to Security -> Access Control Lists -> Access Control Lists Click on New to add an Access Control List, choose a name and click on Apply. ADIPSYS Configuration guide for Cisco WLC v1.5 6
7 Then click on that new ACL to edit it. Click on Add New Rule (top right) For that first ACL, enter the following parameters : - Sequence : 1 - Source : select IP Address and enter the IP of Hotspot Manager server (here ) and Netmask at to target only HM server - Protocol : select TCP - Direction : select Outbound - Action : select Permit Click on Apply to validate changes. Then create a new rule for Inbound direction. For this second ACL, enter the following parameters : - Sequence : 2 - Destination : select IP Address and enter the IP of Hotspot Manager server (here ) and Netmask at to target only HM server - Protocol : select TCP - Direction : select Inbound - Action : select Permit Click on Apply to validate changes. ADIPSYS Configuration guide for Cisco WLC v1.5 7
8 If external websites have to be added in the Walled Garden to be accessible by devices connected but not authenticated (PayPal or Facebook connection for example), you can add URLs by hovering the arrow next to your ACL name. D. Web redirection Go to Security -> Web Auth -> Web Login Page ADIPSYS Configuration guide for Cisco WLC v1.5 8
9 Set the following parameters : - Web Authentication Type : External (Redirect to external server) - External Webauth URL : the target url for Hotspot Manager (for example for our demo instance : Click on Apply to validate changes. E. SSID configuration Go to WLANs -> WLANs, select Create New and click on Go Set a Profile Name and the SSID name that will be broadcasted by the Hotspot. Click on Apply to validate changes. Under General tab, check the Status box to enable the SSID Under Security tab -> Layer 2, select None as Layer 2 Security parameter. Under Security tab -> Layer 3, select Web Policy and the ACL created previously as Preauthentication ACL (here ACL_DEMO) ADIPSYS Configuration guide for Cisco WLC v1.5 9
10 Under Security tab -> AAA Servers, check to following boxes to enable options : - Radius Server Overwrite interface - Authentication Servers and select radius server configured previously - Accounting Servers and select radius server configured previously Then, modify the Authentication priority order for web-auth user to have Radius on top of the list. ADIPSYS Configuration guide for Cisco WLC v1.5 10
11 Under Advanced tab : - Check the box Allow AAA Override - Uncheck the box Enable Session Timeout Click on Apply to validate changes. Don t forget to click on Save Configuration (top right) to retain your configuration after a reboot. Your WLC is now ready to be configured in Hotspot Manager interface. ADIPSYS Configuration guide for Cisco WLC v1.5 11
12 III. Cisco WLC configuration in Hotspot Manager To access Hotspot Manager platform you ll need an admin account. Contact to have your credentials. Then connect to and enter your credentials. A. Add the controller in HM Under Configurations -> Access Controllers - NAS-ID : enter here the same NAS-ID you ve configured previously. - Monitor : if enabled, HM will monitor the radius activity. - COA : default port for Change Of Authorization requests. B. Hotspot Configuration Once the WLC has been created, it has to be associated to a Wifi Zone and the AP will have to be associated to a Hotspot. (Please refer to HM configuration guide for more details) To identify which APs your WLC manages, go to Wireless -> Access Points (in the WLC interface) to see the list of all known aps by your WLC. ADIPSYS Configuration guide for Cisco WLC v1.5 12
13 Click on the one you want to configure in HM to get its Mac Address which will be the Base Radio Mac value (here 0C AB-DD-E0) Once you have all necessary Macs, you can create APs in HM under APs tab. ADIPSYS Configuration guide for Cisco WLC v1.5 13
14 Set : - the Name of the AP displayed in HM - the Access Controller to be linked with the AP. - the MAC address (base radio mac of the AP). Setup finished. Now when a device will connect to the SSID broadcasted by APs linked to your WLC, it will be redirected to the captive portal associated in HM interface. If you re getting an error message, check APs Mac Address configured in the Hotspot. If you re not getting the configuration to work, open a ticket on support.adipsys.com and attach a snapshot if it s possible. IV. Hotspot Manager Compliancy Matrix Features available, compatible or not with this controller and Hotspot Manager. Web authentication yes When a user tries to log into the hotspot, he must authenticate through a web captive portal with a couple of login / password Duration yes Amount of time a user can log into the hotspot before his credit is sold out Validity yes Amount of time before the credentials of a user expire Idle-Timeout no Amount of time of inactivity before a user is disconnected from the hotspot Maximum duration per Amount of time a user can be logged into the hotspot before having to yes session (Session-Timeout) re-authenticate Quota received data no Maximum volume of data a user can receive before his credit is sold out Quota sent data no Maximum volume of data a user can send before his credit is sold out RADIUS Change of Authorization (CoA) / Disconnect yes Allows HM to contact the Controller to modify the parameters of an ongoing session (CoA) / disconnect an end-user (Disconnect) Maximum download speed yes Maximum download speed allowed for the user (rate limiting) Maximum upload speed yes Maximum upload speed allowed for the user (rate limiting) Redirect SSL og Allows to redirect any HTTPs request initiated by an unauthentified device towards the captive portal Legal log External yes yes no og nct The feature is available today and validated The feature exists on the controller but uses a vendor specific profile The feature does not exist on the controller Ongoing or to be confirmed New compliancy tests planned ADIPSYS Configuration guide for Cisco WLC v1.5 14
Web Authentication Proxy on a Wireless LAN Controller Configuration Example
Web Authentication Proxy on a Wireless LAN Controller Configuration Example Document ID: 113151 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Proxy on
More informationpfsense Captive Portal: Part One
pfsense Captive Portal: Part One Captive portal forces an HTTP client to see a special web page, usually for authentication purposes, before using the Internet normally. A captive portal turns a web browser
More informationWiNG5 CAPTIVE PORTAL DESIGN GUIDE
WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated
More informationQuick Start Guide for Zone Director Controller
Quick Start Guide for Zone Director Controller Version 1.0 Copyright 2012, Wifi-Soft Solutions All rights reserved. Purpose of this document 1. This document should be used in conjunction with Zone Director
More informationHow to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0
How to set up the HotSpot module with SmartConnect Panda GateDefender 5.0 Content Introduction... 3 Minimum requirements to enable the hotspot module... 4 Hotspot settings... 6 General settings....6 Configuring
More informationCase Study - Configuration between NXC2500 and LDAP Server
Case Study - Configuration between NXC2500 and LDAP Server 1 1. Scenario:... 3 2. Topology:... 4 3. Step-by-step Configurations:...4 a. Configure NXC2500:...4 b. Configure LDAP setting on NXC2500:...10
More informationWireless Local Area Networks (WLANs)
4 Wireless Local Area Networks (WLANs) Contents Overview...................................................... 4-3 Configuration Options: Normal Versus Advanced Mode.............. 4-4 Normal Mode Configuration..................................
More informationUAG4100 Support Notes
2013 UAG4100 Support Notes CSO ZyXEL 2013/07/29 Table of Contents Scenario 1 Activate a Paid Access Hotspot... 2 Print ticket to access the Internet... 3 Pay with PayPal payment service to access the Internet...
More informationSymantec VIP Integration with ISE
Symantec VIP Integration with ISE Table of Contents Overview... 3 Symantec VIP... 3 Cisco Identity Services Engine (ISE)... 3 Cisco Centralized Web Authentication... 4 VIP in Action... 4 ISE Configuration...
More informationD-Link Central WiFiManager Configuration Guide
Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install
More informationDeployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller
Deployment Guide: Cisco Guest Access Using the Cisco Wireless LAN Controller August 2006 Contents Overview section on page 1 Configuring Guest Access on the Cisco Wireless LAN Controller section on page
More informationHow To Check If Your Router Is Working Properly
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Dual Band Wireless-N Router WNDR3300. You can access these features by selecting the
More informationConfigure WorkGroup Bridge on the WAP131 Access Point
Article ID: 5036 Configure WorkGroup Bridge on the WAP131 Access Point Objective The Workgroup Bridge feature enables the Wireless Access Point (WAP) to bridge traffic between a remote client and the wireless
More informationCox Managed CPE Services. RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft]
Cox Managed CPE Services RADIUS Authentication for AnyConnect VPN Version 1.3 [Draft] September, 2015 2015 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted
More informationAP6511 First Time Configuration Procedure
AP6511 First Time Configuration Procedure Recommended Minimum Configuration Steps From the factory, all of the 6511 AP s should be configured with a shadow IP that starts with 169.254.xxx.xxx with the
More informationOn-boarding and Provisioning with Cisco Identity Services Engine
On-boarding and Provisioning with Cisco Identity Services Engine Secure Access How-To Guide Series Date: April 2012 Author: Imran Bashir Table of Contents Overview... 3 Scenario Overview... 4 Dual SSID
More informationMikrotik Router OS - Setup and Configuration Guide for Aradial Radius Server
Mikrotik Router OS - Setup and Configuration Guide for Aradial Radius Server 2012 Aradial This document contains proprietary and confidential information of Aradial and Spotngo and shall not be reproduced
More informationF-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
More informationController Management
Controller Management - Setup & Provisioning - 1 PRONTO SERVICE CONTROLLER (PN-CPP-A-1422) 2 PSC Key Features Fully interoperable with IEEE802.11b/g compliant products External AP support and management
More informationVirtual Appliance Setup Guide
The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment
More informationChapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under
More informationUAG Series. Application Note. Unified Access Gateway. Version 4.00 Edition 1, 04/2014. Copyright 2014 ZyXEL Communications Corporation
UAG Series Unified Access Gateway Version 4.00 Edition 1, 04/2014 Application Note Copyright 2014 ZyXEL Communications Corporation Table of Contents Scenario 1 How to Activate a Paid Access Hotspot...
More informationIntegrating Cisco ISE with GO!Enterprise MDM Quick Start
Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise
More informationARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE. Technical Note
ARUBA WIRELESS AND CLEARPASS 6 INTEGRATION GUIDE Technical Note Copyright 2013 Aruba Networks, Inc. Aruba Networks trademarks include, Aruba Networks, Aruba Wireless Networks, the registered Aruba the
More informationConfiguring the WT-4 for ftp (Ad-hoc Mode)
En Configuring the WT-4 for ftp (Ad-hoc Mode) Mac OS X Introduction This document provides basic instructions on configuring the WT-4 wireless transmitter and a Mac OS X (10.5.2) ftp server for transmission
More informationHow to Configure Guest Management on the DWC-1000
Configuration Guide How to Configure Guest Management on the DWC-1000 Overview This guide describes how to configure and customize a billing profile and generate temporary user account on the D-Link DWC-1000
More informationHow To Configure SSL VPN in Cyberoam
How To Configure SSL VPN in Cyberoam Applicable Version: 10.00 onwards Overview SSL (Secure Socket Layer) VPN provides simple-to-use, secure access for remote users to the corporate network from anywhere,
More informationConfiguring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these
More informationConfiguration of Cisco Autonomous Access Point with 802.1x Authentication for Avaya 3631 Wireless Telephone
Configuration of Cisco Autonomous Access Point with 802.1x Authentication for Avaya 3631 Wireless Telephone Product Summary Manufacturer: Cisco Systems: www.cisco.com Access Point: Cisco Aironet 1130AG
More informationHow To Manage My Smb Ap On Cwm On Pc Or Mac Or Ipad (Windows) On A Pc Or Ipa (Windows 2) On Pc (Windows 3) On An Ipa Or Mac (Windows 5) On Your Pc
Central Wifi Manager FAQs 1 The installation tool can t find my SMB AP Check the firmware and hardware version of your SMB AP o DAP-2310 H/W B1 F/W v2.01rc013 or above o DAP-2360 H/W B1 F/W v2.01rc012
More informationChapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items
More informationTrustSec How-To Guide: On-boarding and Provisioning
TrustSec How-To Guide: On-boarding and Provisioning For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...
More informationManaging Web Authentication
Obtaining a Web Authentication Certificate, page 1 Web Authentication Process, page 4 Choosing the Default Web Authentication Login Page, page 7 Using a Customized Web Authentication Login Page from an
More informationIntegrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal
Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal This Application Note explains how to configure ConnectWise PSA (Professional Service Automation) application settings and Cisco
More informationEnabling WISPr (Hotspot Services) in the ZoneDirector
A P P L I C A T I O N N O T E Enabling WISPr ( Services) in the Introduction This document describes the WISPr support (hotspot service) for. Unauthenticated users: The users who have not passed authentication
More informationNXC5500/2500. Application Note. Captive Portal with QR Code. Version 4.20 Edition 2, 02/2015. Copyright 2015 ZyXEL Communications Corporation
NXC5500/2500 Version 4.20 Edition 2, 02/2015 Application Note Captive Portal with QR Code Copyright 2015 ZyXEL Communications Corporation Captive Portal with QR Code What is Captive Portal with QR code?
More informationCreate a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance
Create a VPN on your ipad, iphone or ipod Touch and SonicWALL NSA UTM firewall - Part 1: SonicWALL NSA Appliance This article will easily explain how to configure your Apple ipad, iphone or ipod Touch
More informationThe All-in-one Guest Access Solution of
The All-in-one Guest Access Solution of Redefining Networking Integration Tomorrow, Delivered Today Application Guide Series Series Application Guide Providing access in hospitality venues is not the same
More informationConfiguring SSL VPN on the Cisco ISA500 Security Appliance
Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these
More informationEmail Setup Guide. network support pc repairs web design graphic design Internet services spam filtering hosting sales programming
Email Setup Guide 1. Entourage 2008 Page 2 2. ios / iphone Page 5 3. Outlook 2013 Page 10 4. Outlook 2007 Page 17 5. Windows Live Mail a. New Account Setup Page 21 b. Change Existing Account Page 25 Entourage
More informationHow To - Implement Clientless Single Sign On Authentication with Active Directory
How To Implement Clientless Single Sign On in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable Version:
More informationCisco TrustSec How-To Guide: Guest Services
Cisco TrustSec How-To Guide: Guest Services For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...
More informationHow To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (
UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet
More informationWeb and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches
3 Web and MAC Authentication for the Series 2600/2600-PWR and 2800 Switches Contents Overview...................................................... 3-2 Client Options..............................................
More informationWindows Mobile 6.5 Classic Pocket Inventory Install and Setup in Windows Vista / 7
One Blue Hill Plaza, 16 th Floor, PO Box 1546 Pearl River, NY 10965 1-800-PC-AMERICA, 1-800-722-6374 (Voice) 845-920-0800 (Fax) 845-920-0880 Windows Mobile 6.5 Classic Pocket Inventory Install and Setup
More informationConfiguring Positron s V114 as a VoIP gateway for a 3cx system
Assumptions: Configuring Positron s V114 as a VoIP gateway for a 3cx system The IP address of the V114 is 192.168.1.2 The IP address of the 3CX PBX System is 192.168.1.110 3CX already has some IP phones
More informationAllo PRI Gateway and Elastix Server
Allo PRI Gateway and Elastix Server Setup Guide http://www.elastix.org 1.0 Setup Diagram Figure 1-1 is a setup diagram for a single Allo PRI Gateway configuration. We re going to configure a SIP Trunk
More informationInstallation Guides - Information required for connection to the Goldfields Institute s (GIT) Wireless Network
Installation Guides - Information required for connection to the Goldfields Institute s (GIT) Wireless Network Wireless Network Names and Credentials There are two wireless networks operating at the Goldfields
More information3CX PBX v12.5. SIP Trunking using the Optimum Business Sip Trunk Adaptor and the 3CX PBX v12.5
SIP Trunking using the Optimum Business Sip Trunk Adaptor and the 3CX PBX v12.5 Table of Contents 1. Overview 3 2. Prerequisites 3 3. PBX Configuration 3 4. Creating Extensions 4 5. VoIP Provider Setup
More informationChapter 3 LAN Configuration
Chapter 3 LAN Configuration This chapter describes how to configure the advanced LAN features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. This chapter contains the following sections
More informationThis guide is based on the production version of the Globalstar Sat-Fi and Sat-Fi Apps. Software changes may have occurred after this printing.
This guide is based on the production version of the Globalstar Sat-Fi and Sat-Fi Apps. Software changes may have occurred after this printing. Globalstar reserves the right to make changes in technical
More informationMultiSite Manager. Setup Guide
MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...
More informationAuthenticating users of Cisco NCS or Cisco Prime Infrastructure against Microsoft NPS (RADIUS)
Authenticating users of Cisco NCS or Cisco Prime Infrastructure against Microsoft NPS (RADIUS) Date: January 15, 2013 My hope with this guide is to help others take advantage of a centralized user database
More informationCloudvue Remote Desktop Client GUI User Guide
Cloudvue Remote Desktop Client GUI User Guide I. To connect to a Windows server - After power up, the login screen will be displayed. A. Auto Search/User Defined Use Auto Search to find available Windows
More informationTable of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example
Table of Contents Wi Fi Protected Access 2 (WPA 2) Configuration Example...1 Document ID: 67134...1 Introduction...1 Prerequisites...1 Requirements...1 Components Used...2 Conventions...2 Background Information...2
More information1. Introduction 2. 2. What is Axis Camera Station? 3. 3. What is Viewer for Axis Camera Station? 4. 4. AXIS Camera Station Service Control 5
Table of Contents 1. Introduction 2 2. What is Axis Camera Station? 3 3. What is Viewer for Axis Camera Station? 4 4. AXIS Camera Station Service Control 5 5. Configuring Ports 7 5.1 Creating New Inbound
More informationDIGIPASS Authentication for Cisco ASA 5500 Series
DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations
More informationEnabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
More informationInstall Guide for JunosV Wireless LAN Controller
The next-generation Juniper Networks JunosV Wireless LAN Controller is a virtual controller using a cloud-based architecture with physical access points. The current functionality of a physical controller
More informationChapter 4 Managing Your Network
Chapter 4 Managing Your Network This chapter describes how to perform network management tasks with your ADSL2+ Modem Wireless Router. Backing Up, Restoring, or Erasing Your Settings The configuration
More informationWindows Mobile 6.5 Classic Pocket Inventory Install and Setup in Windows XP
One Blue Hill Plaza, 16 th Floor, PO Box 1546 Pearl River, NY 10965 1-800-PC-AMERICA, 1-800-722-6374 (Voice) 845-920-0800 (Fax) 845-920-0880 Windows Mobile 6.5 Classic Pocket Inventory Install and Setup
More informationHow To Check If Your Router Is Working Properly On A Nr854T Router (Wnr854) On A Pc Or Mac) On Your Computer Or Ipad (Netbook) On An Ipad Or Ipa (Networking
Chapter 7 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax NEXT Wireless Router WNR854T. These features can be found by clicking on the Maintenance
More informationnexvortex Setup Guide
nexvortex Setup Guide CUDATEL COMMUNICATION SERVER September 2012 510 S P R I N G S T R E E T H E R N D O N V A 2 0 1 7 0 + 1 8 5 5. 6 3 9. 8 8 8 8 Introduction This document is intended only for nexvortex
More informationBASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE
BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE 12/11/2012 Index 1 INTRODUCTION... 1-1 2 FACTORY DEFAULT SETTINGS... 2-1 3 CPE BASIC OPERATIONS... 3-1 3.1 PASSWORD MODIFICATION...
More informationMikrotik RouterBoard. Modified on: Mon, 1 Jun, 2015 at 1:31 PM
Mikrotik RouterBoard Modified on: Mon, 1 Jun, 2015 at 1:31 PM There guides are provided using the Mikrotik Winbox program as an interface with the RouterOS. The Winbox program can be obtained from the
More informationApple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4
1. APPLE AIRPORT EXTREME 1.1 Product Description The following are device specific configuration settings for the Apple Airport Extreme. Navigation through the management screens will be similar but may
More informationWindows Mobile 6.5 Classic Pocket Inventory Install and Setup in Windows 8
One Blue Hill Plaza, 16 th Floor, PO Box 1546 Pearl River, NY 10965 1-800-PC-AMERICA, 1-800-722-6374 (Voice) 845-920-0800 (Fax) 845-920-0880 Windows Mobile 6.5 Classic Pocket Inventory Install and Setup
More informationGood MDM Integration with Cisco Identity Service Engine. Secure Access How -To Guides Series
Good MDM Integration with Cisco Identity Service Engine Secure Access How -To Guides Series Author: Imran Bashir Date: December 2012 Table of Contents Mobile Device Management (MDM)... 3 Overview... 3
More informationConfigure Guest Access
Cisco ISE Guest Services, page 1 Guest and Sponsor Accounts, page 2 Guest Portals, page 19 Sponsor Portals, page 31 Monitor Guest and Sponsor Activity, page 36 Guest Access Deployment Scenarios, page 37
More informationCreating your fi rst CloudTrax network
CLOUDTAX QUICK STAT GUIDE Creating your fi rst CloudTrax network CloudTrax is a free cloud-based network controller that helps you build, manage and monitor your wireless networks from anywhere in the
More informationWeb Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
More informationVirtual Appliance Setup Guide
The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on
More informationConfiguration Manual
Configuration Manual Page 1 of 20 Table of Contents Chronicall Setup...3 Standard Installation...3 Non-standard Installation (Recording Library on Separate machine)...8 Configuring Call Recording through
More informationConfiguring the WT-4 for ftp (Infrastructure Mode)
Introduction En Configuring the WT-4 for ftp (Infrastructure Mode) This document provides basic instructions on configuring the WT-4 wireless transmitter and a ftp server for transmission over an infrastructure
More informationMFC7840W Windows Network Connection Repair Instructions
Difficulty printing from your PC can occur for various reasons. The most common reason a networked Brother machine may stop printing, is because the connection between the computer and the Brother machine
More informationWiFi Anywhere. Multi Carrier 3G/4G WiFi Router. IntraTec Solutions Ltd www.intratec-uk.com
WiFi Anywhere Multi Carrier 3G/4G WiFi Router Contents Packing List... 3 Introduction... 3 Supported USB Modems... 3 Connecting USB Devices... 3 Accessing the Web Interface... 4 Interfaces... 4 Configuring
More informationUsing the CloudTrax splash page editor
CLOUDTRAX USER GUIDE Using the CloudTrax splash page editor CloudTrax is a free cloud-based network controller that helps you build, manage and monitor your wireless networks from anywhere in the world.
More informationSonicOS Enhanced 3.8.0.6 Release Notes TZ 180 Series and TZ 190 Series SonicWALL, Inc. Firmware Release: August 28, 2007
SonicOS Enhanced 3.8.0.6 TZ 180 Series and TZ 190 Series SonicWALL, Inc. Firmware Release: August 28, 2007 CONTENTS PLATFORM COMPATIBILITY SONICWALL RECOMMENDATIONS KNOWN ISSUES RESOLVED KNOWN ISSUES UPGRADING
More information700 Fox Glen Barrington, Illinois 60010 ph: [847] 842-9570 fx: [847] 842-0190 www.excaltech.com support@excaltech.com.
700 Fox Glen Barrington, Illinois 60010 ph: [847] 842-9570 fx: [847] 842-0190 www.excaltech.com support@excaltech.com Email Setup Guide 1. Entourage 2008 Page 2 2. Outlook 2007 Page 5 3. Outlook 2003 Page
More informationFAQs: MATRIX NAVAN CNX200. Q: How to configure port triggering?
FAQs: MATRIX NAVAN CNX200 Q: How to configure port triggering? Port triggering is a type of port forwarding where outbound traffic on predetermined ports sends inbound traffic to specific incoming ports.
More informationWLAN Security: Identifying Client and AP Security
WLAN Security: Identifying Client and AP Security 2010 Cisco Systems, Inc. All rights reserved. CUWN v7.0 4-1 Lesson Overview & Objectives Overview This lesson provides detailed discussions on the Cisco
More informationN300 WiFi Range Extender WN2000RPT User Manual
N300 WiFi Range Extender WN2000RPT User Manual December 2013 202-11333-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device,
More informationADMINISTRATION GUIDE. Cisco Small Business. WAP371 Wireless-AC/N Dual Radio Access Point with Single Point Setup
ADMINISTRATION GUIDE Cisco Small Business WAP371 Wireless-AC/N Dual Radio Access Point with Single Point Setup Contents Chapter 1: Getting Started 5 Starting the Web-Based Configuration Utility 5 Using
More informationWave IP 4.5. Wave Spectralink Phone Configuration Guide
Wave IP 4.5 Wave Spectralink Phone Configuration Guide 2014 by Vertical Communications, Inc. All rights reserved. Vertical Communications and the Vertical Communications logo and combinations thereof and
More informationConfiguring Global Protect SSL VPN with a user-defined port
Configuring Global Protect SSL VPN with a user-defined port Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be Global Protect SSL VPN Overview This document gives you an overview on how to configure
More informationWave 500 IP PBX v4.5. SIP Trunking using the Optimum Business Sip Trunk Adaptor and the Wave 500 IP PBX v4.5
SIP Trunking using the Optimum Business Sip Trunk Adaptor and the Wave 500 IP PBX v4.5 1 Table of Contents 1. Overview 3 2. Prerequisites 3 3. PBX Configuration 3 4. Creating Extensions 4 5. Inbound/Outbound
More informationSoftware Version 1.0 ConnectKey TM Share to Cloud April 2013. Xerox ConnectKey Share to Cloud User / Administrator s Guide
Software Version 1.0 ConnectKey TM Share to Cloud April 2013 Xerox ConnectKey Share to Cloud User / Administrator s Guide 2013 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and Xerox
More informationXenApp/Citrix Program Neighborhood Installation
1. Download the XenApp Plugin (Citrix Presentation Server) Client Package Version 11.0 for Hosted Apps. Click on this LINK to obtain it. Once prompted, click RUN 2. 3. Save the file to your desktop. Once
More informationCisco QuickVPN Installation Tips for Windows Operating Systems
Article ID: 2922 Cisco QuickVPN Installation Tips for Windows Operating Systems Objective Cisco QuickVPN is a free software designed for remote access to a network. It is easy to install on a PC and simple
More informationConfiguring Infoblox DHCP
Copyright 2008 Sophos Group. All rights reserved. No part of this publication may be reproduced, stored in retrieval system, or transmitted, in any form or by any means electronic, mechanical, photocopying,
More informationLab 8.4.5.1 Configuring LEAP/EAP using Local RADIUS Authentication
Lab 8.4.5.1 Configuring LEAP/EAP using Local RADIUS Authentication Objective Topology Estimated Time: 40 minutes Number of Team Members: Students can work in teams of two. In this lab, the student will
More informationWireless USB Adapter
Wireless USB Adapter User s Manual 1 Table of Contents USER S MANUAL... 1 WELCOME... 3 PACKAGE CONTENTS... 3 WIRELESS USB ADAPTER OVERVIEW... 4 INTERFACE... 4 LED DESCRIPTION... 4 WPS BUTTON... 4 WIRELESS
More informationF-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
More informationGuestAir Administrators Guide
GuestAir Administrators Guide 1. Introduction 2. Companies 3. Users 4. Zones 5. SonicWALL Configuration 6. Emails 7. User Auth Logins 8. User Registration 9. Facebook Logins 10. Editing Templates 11. File
More informationUnified Access Point Administrator's Guide
Unified Access Point Administrator's Guide Product Model: DWL-3600AP DWL-6600AP DWL-8600AP Unified Wired & Wireless Access System Release 2.0 November 2011 Copyright 2011. All rights reserved. November
More informationCisco Unified Communications Manager 7.1 SIP Configuration Guide
Valcom Session Initiation Protocol (SIP) VIP devices are compatible with Cisco Unified Communications Manager (formerly Cisco Unified CallManager) (SIP enabled versions). The Valcom device is added to
More informationControl Panel User Guide
December 2011 Copyright by ClearAccess, Inc. All rights reserved. ClearAccess, Inc. reserves the right to revise this publication from time to time without obligation of ClearAccess to notify any person
More informationSetting Up Your Team-SQL Database for ORACLE 8.05
Setting Up Your Team-SQL Database for ORACLE 8.05 Once you have your Oracle Server in place, and have the SQL client software installed on all Team Client PCs, you are ready to set up your Team-SQL for
More informationSIP Trunking using Optimum Business SIP Trunk Adaptor and the Allworx 6x IP PBX 7.1.6.1
ALLWORX SIP Trunking using Optimum Business SIP Trunk Adaptor and the Allworx 6x IP PBX 7.1.6.1 Goal The purpose of this configuration guide is to describe the steps needed to configure the Allworx 6x
More informationSSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks
SSL VPN Virtual Appliance Installation Guide Virtual Private Networks C ONTENTS Introduction... 2 Installing the Virtual Appliance... 2 Configuring Appliance Operating System Settings... 3 Setting up the
More information