Monday, September 30, 2013

Part 1 :- HP Wireless MSM Controller 720 Basic Configuration and Screenshots

HP is having comware v5 based controller and MSM based controller, Basic difference is MSR controller are Pure HP basic system(GUI basic) and comware controller are 3com devices like 810 series (CLI)

(BYOD setup are mostly working in comware suite)  

MSM Home page






Controller > Network > Interfaces  


By default devices will have 2 internet port and 4 Lan ports
   Internet (Outside) <<<<Wireless controller >>>>(inside port) LAN port





Management > Network discovery > By default it will only enable for Lan ports in this case Access Network port (LAN port). We need to client on internet network for enabling auto discovery of Access point. Otherwise it won’t able to find the AP’s in network



Once the access point are activated. We can find it on Controlled AP’s section.



Note :- MSM controller are based on centralized architecture and all the wireless traffic wil go thought controller

   
Controller port we can see on Network >Ports >


VSC is screen, We can setup what kind of authentication like Open ,WEP, WAP , Radius server OR WAP2




Controller  >> VSC > Virtual AP >(Default virtual AP will not enable for SSID, We need click it for Broadcasting the SSID


VSC >Radius Authentication







VSC>
Default we should not change this option (Wireless Mobility is licensed one for L2/L3 roaming)
Block User: - will block user which is misconfigured or unwanted users which is not authorized (It will drop user traffic in AP it self
Consider the user at Home :- if you click this option user traffic will allowed to network ap will allow the traffic via default Vlan which is configured on Controller  
Also ways configure BLOCK USER option



VSC’s Network tree (it will show total controllers and controlled Access points)
In this screen you see the VSC setup Parameters (SSID’s)




VSC Profile we can see the Total SSID group which is configured in Controller with authentication parameter  




Friday, September 27, 2013

Sonicwall Group vpn client setup


Sonicwall Group VPN = Easy Vpn in Cisco

Setups for basic setup of Sonicwall

Create >>>> Network object (= Host 192.168.1.1)
Create >>>>Network services( =Port 8080)
Create >>>>Firewall Zones (DMZ or Internet)
Create >>>>Map interface to Zones
Create >>>>Firewall rule and allow or deny traffic

Notes :- Sonicwall is based on zone base security and object based.


Screenshot










 Public ip address of sonicwall outside interface X0 or X1









Some of configuration, We can configure the Pre-share key also.



Optimization of fortigate IPS

IPS signature need select according to infrastructure environment  Eg:-  if  we are not have Linux servers this ips signature can disable (d...