Opera Pms User Guide Version 5 Download

On
  1. Opera Pms User Guide Version 5 Download
Welcome back to Opera at Humber College now we were going to learn how to make a reservation again we click on the pms and click the log in button and we're going to start with reservations so now we are going to create a new reservation the first screen that opens up we need to enter in the date of the reservation it automatically defaults to today's date and today's date can be seen at the top of the screen here so we're going to make this reservation for arrival in May so we select May and the dates this person's going to arrive on the 14th and stay until the 16th we then click OK as you see it automatically defaults to the number of nights at this point we're not going to fill in any other information we're going to click OK this still it takes us to the rate screen and there is a lot of information on this screen as you can see we have the room types so this is a double-double non-smoking if you click on this acronym you will find out more information about it so the ddns stands for two double beds non-smoking aren't and there are a total of 28 rooms in the hotel of this type and currently it's showing that there are 28 vacant one has been inspected 116 a clean and 11 are dirty obviously if this hotel had some rooms that were occupied it would show that information here so we're going to close that down on the sides are the types of rates that we have available and again you can click on here double click on here and it will expand that and we can see see that this is an Iraq rate and if we click here it will show us rec rates and that it's a 2 double bed non-smoking and for that it's five two hundred and fifty dollars as you see there are various kinds of rates and packages down here if we click on a sports package we'll select this one it shows sports package has a queen non-smoking room and full American breakfast for two and two tickets for a live sporting event so this is where you would select your type of rate from so for this exercise we are going to click a rec rate in a DD room and click OK this is where we enter in the guests profile information so first of all we are going to type in the name and where it says name here this refers to surname and generally speaking in a PMS system you are working in capital letters so you type in the name and you click this gray square here and it will take you to the guest profile here you can enter in more information so we have the title the language so the language is either English so we could pick other languages from this drop-down box oops let's select it back to English and here you can pick the title mister so we have the option here of also selecting if this were a VIP from the sales office or a peek customer or something like that then of course we enter in the address the city the postal code the country is automatically populated and then you would select the province this information is very very important for the revenue management so it's important to fill in all this..
    • 3
      Table of Contents
    • 10
      Figures
    • 14
      Tables
  • 15
    About This Guide

    • 15
      Audience
    • 15
      Document Organization
    • 17
      Notational Conventions
    • 17
      Related Documentation
    • 17
      Terminology
  • 19
    An Overview of the BlueSecure Controller

    • 20
      An Introduction to the BlueSecure WLAN Solution
      • 20
        User Authentication
      • 20
        RADIUS Accounting and Hotspot Support
      • 20
        Figure 1-1: the Role of the Bluesocket BSC in a Wireless LAN
      • 21
        Role-based Authorization
      • 21
        Remote Management
      • 21
        Scalability
      • 21
        Intrusion Detection and Worm Protection
      • 21
        BlueSecure Access Points
      • 22
        RF Management
      • 22
        RF Intrusion Detection/RF Containment
      • 23
        VoIP Protocols/VoWLAN Support
      • 23
        Secure Mobility® MatriX
    • 23
      The BlueSecure WLAN Solution End-user Experience
      • 23
        Transparent Authentication
      • 23
        Figure 1-2: the Bluesocket Secure Mobility MatriX Architecture
      • 24
        Web-based User Logins
      • 24
        Figure 1-3: a Sample BSC User Login Page
    • 25
      BlueSecure Controller Models
      • 25
        Bluesocket BSC-2200/3200/5200
      • 25
        Figure 1-4: Bluesocket BSC-5200
      • 26
        Bluesocket BSC-2100
      • 26
        Bluesocket BSC-1200
      • 26
        Bluesocket BSC-600
      • 26
        Figure 1-5: Bluesocket BSC-2100
      • 26
        Figure 1-6: Bluesocket BSC-1200
      • 27
        Bluesocket BSC Model Specifications
      • 27
        Figure 1-7: Bluesocket BSC-600
    • 27
      Table 1-1: Bluesocket BSC Model Specifications
      • 28
        Typical BlueSecure WLAN Solution Network Configurations
        • 28
          Single BSC Configuration
        • 29
          Multiple BSCs
        • 29
          Failover BSCs
        • 29
          Figure 1-8: Failover BSCs
        • 30
          Figure 1-9: Failover Within a BSC Pair
        • 30
          Figure 1-10: Recovery of the Failed BSC
  • 31
    Installation

    • 32
      Overview of the Installation Procedure
    • 32
      Safety Precautions
    • 34
      BSC-2200/3200/5200 Displays, Controls, and Connectors
    • 34
      Figure 2-1: BSC-2200/3200/5200 Displays, Controls, and Connectors
    • 35
      BSC-2100 Displays, Controls, and Connectors
    • 35
      Figure 2-2: BSC-2100 Displays, Controls, and Connectors
    • 36
      BSC-1200 Displays, Controls, and Connectors
    • 37
      Figure 2-3: BSC-1200 Displays, Controls, and Connectors
    • 37
      Table 2-1: BSC-1200 Status LEDs
      • 38
        BSC-600 Controls and Connectors
      • 38
        Figure 2-4: BSC-600 LEDs, Controls, and Connectors
    • 38
      Table 2-2: BSC-600 Status LEDs
      • 39
        Preparing Your Network
      • 40
        Environmental, Rack, Space, and Power Requirements
      • 40
        Mounting the BlueSecure Controller Chassis
        • 40
          BSC-600/BSC-1200 Desktop Mounting
        • 41
          BSC-2100 and BSC-2200/3200/5200 Desktop Mounting
        • 41
          Figure 2-5: Attaching a Rubber Pad to a BSC-2100/5200 Bumper
        • 41
          Figure 2-6: Attaching the BSC-2100/5200 Chassis Desktop Bumper
        • 42
          Rack-mounting the BlueSecure Controller
        • 42
          Figure 2-7: Attaching the BSC-2100/5200 Chassis Cap
        • 42
          Figure 2-8: Attaching the Mounting Brackets to the BSC Chassis
      • 43
        Connecting the BlueSecure Controller to Your Network
      • 43
        Connecting the BSC to Its Power Source
      • 44
        Powering Down Your BSC
      • 44
        Enabling Power Over Ethernet On the BSC-600 and BSC-1200
      • 45
        LED Run Time Mode for BSC-600 and BSC-1200
      • 45
        Basic POE LED Functionality for BSC-600 and BSC-1200
      • 45
        Figure 2-9: Location of BSC-600 PoE Power Supply Connector
  • 47
    Administrator Console

    • 48
      Logging Into the Administrator Console for the First Time
    • 48
      Figure 3-1: BSC Administrator Login Page
      • 49
        Logging Out of the Administrator Console
    • 49
      Using and Managing Administrator Accounts
    • 49
      Figure 3-2: the BSC Administrator Console
      • 50
        Adding a New Administrator Account
      • 51
        Changing an Administrator Password
      • 51
        Figure 3-3: New Admin User Page
      • 52
        Changing Your Login Password
      • 52
        Deleting Administrator Accounts
    • 52
      Installing the Bluesocket SSL Certificate
    • 52
      Figure 3-4: Changing Your Login Password
    • 53
      Figure 3-5: Security Certificate Alert
    • 53
      Figure 3-6: SSL Certificate Dialog
    • 54
      An Overview of the Tabs On the Console
    • 54
      Figure 3-7: Navigating the Administrator Console
      • 55
        Read-only Pages (Replication Nodes Only)
    • 55
      Obtaining Online Help
    • 56
      Site Map
    • 56
      Figure 3-8: Site Map
    • 57
      Error Checking On Page Forms
    • 57
      Using Command Buttons and Icons
    • 57
      Table 3-1: Administrator Console Command Buttons and Icons
      • 58
        Sorting and Filtering Table Data
      • 58
        Customizing the Presentation of Table Data
    • 58
      Table 3-2: Sorting and Filtering Administrator Console Table Data
      • 59
        Paging Through Data
      • 59
        Console Fonts
      • 59
        Figure 3-9: Customizing the Presentation of Table Data
    • 59
      Table 3-4: Administrator Console Font Controls
      • 60
        Downloading Administrator Console Data
      • 60
        Entering IP Addresses and Fully Qualified Domain Names
      • 61
        Restarting the BSC to Activate Configuration Information
      • 61
        Figure 3-10: Using the Pop Up List Feature
  • 63
    Networks

    • 64
      Defining the BSC Protected Physical Interface
    • 64
      Figure 4-1: Edit Protected Interface (Eth0) Page
      • 67
        Creating a VLAN On the Protected Side (Optional)
      • 67
        Figure 4-2: Link Aggregation Interfaces On the BSC-5200
      • 68
        Figure 4-3: Create a Protected VLAN Page
      • 69
        Configuring a Protected Virtual Interface (Optional)
    • 69
      Configuring the BSC Managed Interface
    • 69
      Figure 4-4: Create a Protected Virtual Interface Page
    • 70
      Figure 4-5: Edit Managed Interface (Eth1) Page
      • 71
        Configuring Wireless Client IP Address Assignment
      • 72
        Figure 4-6: Completed DHCP Relay Options
      • 74
        Figure 4-7: Enabling the BSC DHCP Server
      • 75
        Figure 4-8: DHCP Settings for Managed Interface (Eth1) Page
      • 78
        Figure 4-9: Fixed IP Address Assignments for Wireless Clients
      • 79
        Creating a VLAN On the Managed Side of Your Network
      • 79
        Figure 4-10: NAT Settings for Managed Interface Page
      • 80
        Figure 4-11: Create a Managed VLAN Page
      • 81
        Configuring a Managed Remote Subnet
      • 81
        Figure 4-12: a Sample Managed Remote Subnet
      • 82
        Figure 4-13: Create a Managed Remote Subnet Page
      • 83
        Figure 4-14: DHCP Settings for New Managed Remote Subnet Page
      • 85
        Configuring a Managed Virtual Interface
      • 85
        Figure 4-15: Create a Managed Virtual Interface Page
    • 86
      Configuring the Admin Interface
    • 87
      Configuring Failover Parameters
    • 87
      Figure 4-16: Edit Admin Interface Page
      • 88
        Normal Operation
      • 88
        Failover State
      • 88
        Recovery State
      • 88
        Configuring the Primary BSC
      • 88
        Figure 4-17: Failover - Normal State
      • 89
        Figure 4-18: Failover - Failover State
      • 89
        Figure 4-19: Failover - Recovery State
      • 90
        Completing the Failover Setup
    • 90
      Configuring Static Routes
    • 90
      Figure 4-20: Edit Failover (Eth2) Page
    • 91
      Figure 4-21: Sample BSC Routing Table
    • 91
      Figure 4-22: Create a Static Route Entry
    • 92
      Configuring Multicast Routing
    • 92
      Figure 4-23: Admin Interface in Network Routing Table
    • 93
      Configuring AppleTalk Routing
      • 93
        AppleTalk Networks: Key Concepts
      • 93
        Figure 4-24: Enabling Multicast Routing
      • 95
        Configuration Procedure
      • 95
        Figure 4-25: Enabling AppleTalk Routing
  • 97
    Authentication Using Internal Database

    • 98
      Local BSC User Authentication
    • 98
      Creating/Editing/Deleting a Local User Account
    • 99
      Figure 5-1: New Local User Page
    • 101
      Defining MAC Address Authentication
    • 101
      Figure 5-2: New MAC Device Page
  • 105
    Authentication Using External Servers

    • 106
      An Overview of External User Authentication
    • 106
      RADIUS Authentication
    • 107
      Figure 6-1: New RADIUS Server Page
    • 110
      LDAP/Active Directory Authentication
    • 111
      Figure 6-2: New LDAP/Active Directory Server Page
    • 114
      SIP2 Authentication
    • 115
      Figure 6-3: New SIP2 Server Page
    • 116
      NTLM Authentication
    • 116
      Figure 6-4: New NTLM Server Page
    • 118
      Transparent NTLM Authentication
    • 119
      Figure 6-5: New Transparent NTLM Windows Server Page
    • 121
      Transparent 802.1X Authentication
      • 121
        Figure 6-6: User Authentication in an 802.1X Environment
      • 122
        Figure 6-7: New Transparent 802.1X Server Page
    • 123
      The BSC Internal 802.1X Authentication Server
    • 124
      Figure 6-8: Edit the Local 802.1X Server Page
    • 127
      Kerberos Authentication
    • 127
      Figure 6-9: New Kerberos Server Page
    • 128
      Cosign Authentication
    • 129
      Figure 6-10: New Cosign Server Page
    • 131
      Pubcookie Authentication
    • 132
      Figure 6-11: New Pubcookie Server Page
    • 134
      CAS Authentication
    • 134
      Figure 6-12: New CAS Server Page
    • 136
      IPass Client Authentication
    • 136
      Transparent Certificate Authentication
    • 137
      Figure 6-13: Enabling Transparent Certificate Authentication
    • 138
      Testing an External Authentication Server
    • 139
      Figure 6-14: External Authentication Server Test Page
  • 141
    RADIUS Accounting

    • 142
      Defining a RADIUS Accounting Server
    • 142
      Figure 7-1: New RADIUS Accounting Page
    • 143
      Attributes Sent to External RADIUS Accounting Server By BSC
    • 143
      Table 7-1: RADIUS Accounting Attributes Sent From the BSC
  • 145
    Roles and Role Elements

    • 146
      An Example of Role-based Authorization
    • 146
      An Overview of Roles
    • 146
      Defining User Roles to Enforce Network Usage Policies
    • 147
      Role Inheritance
      • 147
        Figure 8-1: Role-based Authorization for a Registered User
      • 147
        Figure 8-2: Role-based Authorization for an Unregistered User
    • 148
      Defining a Role
      • 149
        Figure 8-3: Create a Role Page
      • 151
        Figure 8-4: Enabling Machine Authentication On Windows Zero-Config
      • 152
        Figure 8-6: Mapping Role Placement Based On Username
      • 152
        Figure 8-7: Successful Machine Authentication
      • 152
        Figure 8-8: Successful User Login
      • 152
        Figure 8-9: Failed User Login Because Machine Authentication Failed
      • 152
        Figure 8-10: Log Message Upon Failure
      • 152
        Figure 8-5: Enabling Prerequisite Machine Authentication Role
    • 154
      Creating Destinations and Destination Groups
      • 155
        Creating a Single Device Destination
      • 155
        Figure 8-11: Create a (Destination) Host Page
      • 156
        Creating a Network Space Destination
      • 156
        Creating Destination Groups
      • 156
        Figure 8-12: Create a (Destination) Network Page
    • 154
      Creating Role Elements
    • 154
      Modifying a Role
    • 157
      Creating Network Services and Services Groups
    • 157
      Figure 8-13: Create a (Destination) Group Page
    • 158
      Creating a Network Service
    • 159
      Figure 8-14: Create a Service Page
    • 160
      Creating Network Service Groups
    • 161
      Creating Schedules and Schedule Groups
      • 161
        Creating a Schedule
        • 161
          Figure 8-15: Create a (Service) Group Page
        • 162
          Figure 8-16: Create a Schedule Page
      • 163
        Creating Schedule Groups
    • 163
      Creating Locations and Location Groups
    • 163
      Figure 8-17: Create a (Schedule) Group Page
    • 164
      Creating a User Location
    • 164
      Creating User Location Groups
      • 164
        Figure 8-18: Create a User Location Page
      • 165
        Figure 8-19: Create a (Location) Group Page
  • 167
    Voice Over WLAN Support

    • 168
      Configuring General VoWLAN Settings
    • 168
      Configuring Vendor-specific IP Phone Support
      • 168
        Configuring VoWLAN QoS
      • 168
        Figure 9-1: VoWLAN General Settings Page
      • 168
        Figure 9-2: IP Phones Settings Page
  • 171
    General BSC Operational Settings

    • 172
      Figure 10-1: HTTP Settings Page
    • 172
      HTTP Server Settings
    • 175
      Intrusion Detection System
    • 176
      Figure 10-2: BSC IDS Host State Model
    • 177
      Configuration Procedure
    • 178
      Figure 10-3: Intrusion Detection System Settings Page
    • 178
      SNMP Agent
    • 179
      Automatic Backup of the BSC Database
    • 179
      Figure 10-4: SNMP Settings Page
    • 180
      Figure 10-5: Auto Backups Page
    • 180
      System Time and Date Settings
    • 181
      Figure 10-6: BSC Time Settings Page
    • 181
      Mail Server Access
    • 182
      Public Access Networks
      • 182
        Figure 10-7: BSC Email Settings Page
      • 182
        Figure 10-8: Public Access Settings Page
    • 184
      Event Logging and Connection Tracking
    • 185
      Figure 10-9: Logging Settings Page
    • 187
      Figure 10-10: Thresholds Page
    • 187
      Threshold Values
    • 188
      Domain Name System (DNS) Settings
    • 189
      Figure 10-11: DNS Proxy Page
    • 190
      Digital Certificates
      • 190
        Overview
      • 190
        How the BSC Uses Certificates
      • 191
        Configuring External Server Authentication Over SSL
      • 191
        Figure 10-12: Certificate Management Page
      • 192
        Requesting and Installing an IPSec Authentication Certificate
      • 193
        Figure 10-13: IPSec Certificate Signing Request Generation Page
      • 193
        Figure 10-14: IPSec CSR Generated Page
    • 194
      Figure 10-15: Miscellaneous Settings Page
    • 194
      Miscellaneous BSC Options
  • 197
    Web Logins

    • 198
      Customizing the User Login Page
      • 198
        The Appearance of the User Login Page
      • 198
        Figure 11-1: Default User Login Page
      • 199
        Customizing the Login Form and HTML Body of Login Page
        • 199
          Figure 11-2: Elements of the User Login Page You Can Customize
        • 200
          Figure 11-3: Create New Custom Login Page
      • 202
        Customizing the Right Side of the User Login Page
      • 203
        Figure 11-4: Custom Login Page - Edit HTML
      • 206
        Redirecting Clients to an External Server for Authentication
      • 206
        Configuring Hotspot Account Generation
        • 206
          Figure 11-5: Custom Login Page - Edit Redirection
        • 207
          Figure 11-6: Create New Account Link
        • 208
          Figure 11-7: Sample Account Selections Page
    • 208
      Table 11-1: Required Authorize.net Settings
      • 210
        Figure 11-8: Hotspot Account Generation Page
      • 212
        Figure 11-9: Friends and Family Freespot
      • 213
        Figure 11-10: Guest DNA
      • 213
        Uploading Image/Media Files for the User Login Page
      • 214
        Figure 11-11: File Uploads Page
        • 216
          Defining a User Login Page Language
        • 216
          Figure 11-12: Create a User Login Page Language Page
        • 218
          Editing a User Login Page Language
      • 214
        Translating User Login Pages
      • 218
        Installing a Custom SSL Login Certificate
        • 219
          Requesting a Certificate
        • 219
          Figure 11-13: SSL Certificate Generation Page
        • 220
          Figure 11-14: SSL CSR Generated Page
        • 221
          Uploading a Replacement SSL Certificate You Already Have
        • 221
          Figure 11-15: Uploaded Certificate
        • 221
          Figure 11-16: Certificate Management Page
        • 222
          Recovering the Private Key
        • 223
          Renewing a Custom SSL Certificate
        • 223
          Figure 11-17: SSL Certificate Generation Page
        • 224
          Installing a Wildcard (*) SSL Certificate On Multiple BSCs
Opera Pms User Guide Version 5 DownloadOpera Pms User Guide Version 5 DownloadUser guide for iphone 5s

Opera Pms User Guide Version 5 Download

P manuals E-books that published today as a guide. Our site has the following Ebook Pdf available for free PDF download. You may find Ebook Pdf document other than just. Related Book PDF Book Opera Pms User Guide Version 5: - Home - Make Your Healthy Delicious Recipes - Make Your Felt Shark Couture - Make Your Dolls House Furniture. Opera Pms V5 User Guide Manual. Opera Pms V5 User Guide Manual. Learn More - opens are subject to change RUNS, SELLING AS IS AS A NON RUNNING MACHINE WE WILL LOAD. Import charges previously quoted little my grandmother always to 1 loyalty point.

Windows 7 convert raw to ntfs. Due to power outage, virus attack, improper use, then the drive/card may change to RAW without your conscious and you just did not know how to handle this and are looking for some tool which can convert RAW to NTFS and hope to access files in the partition. Download iCare Data Recovery to restore data from the raw drive before converting it to fat32 or ntfs since once the converting is done, your files would be erased. Tutorial: Video Tutorial: how to use iCare Data Recovery for file rescue Steps of raw drive recovery with iCare Data Recovery Pro Select a possible drive that contains your files and let it build file structures for recovery.