Opera Pms User Guide Version 5 Download
- 3Table of Contents
- 10Figures
- 14Tables
- 15About This Guide
- 15Audience
- 15Document Organization
- 17Notational Conventions
- 17Related Documentation
- 17Terminology
- 19An Overview of the BlueSecure Controller
- 20An Introduction to the BlueSecure WLAN Solution
- 20User Authentication
- 20RADIUS Accounting and Hotspot Support
- 20Figure 1-1: the Role of the Bluesocket BSC in a Wireless LAN
- 21Role-based Authorization
- 21Remote Management
- 21Scalability
- 21Intrusion Detection and Worm Protection
- 21BlueSecure Access Points
- 22RF Management
- 22RF Intrusion Detection/RF Containment
- 23VoIP Protocols/VoWLAN Support
- 23Secure Mobility® MatriX
- 23The BlueSecure WLAN Solution End-user Experience
- 23Transparent Authentication
- 23Figure 1-2: the Bluesocket Secure Mobility MatriX Architecture
- 24Web-based User Logins
- 24Figure 1-3: a Sample BSC User Login Page
- 25BlueSecure Controller Models
- 25Bluesocket BSC-2200/3200/5200
- 25Figure 1-4: Bluesocket BSC-5200
- 26Bluesocket BSC-2100
- 26Bluesocket BSC-1200
- 26Bluesocket BSC-600
- 26Figure 1-5: Bluesocket BSC-2100
- 26Figure 1-6: Bluesocket BSC-1200
- 27Bluesocket BSC Model Specifications
- 27Figure 1-7: Bluesocket BSC-600
- 27Table 1-1: Bluesocket BSC Model Specifications
- 28Typical BlueSecure WLAN Solution Network Configurations
- 28Single BSC Configuration
- 29Multiple BSCs
- 29Failover BSCs
- 29Figure 1-8: Failover BSCs
- 30Figure 1-9: Failover Within a BSC Pair
- 30Figure 1-10: Recovery of the Failed BSC
- 31Installation
- 32Overview of the Installation Procedure
- 32Safety Precautions
- 34BSC-2200/3200/5200 Displays, Controls, and Connectors
- 34Figure 2-1: BSC-2200/3200/5200 Displays, Controls, and Connectors
- 35BSC-2100 Displays, Controls, and Connectors
- 35Figure 2-2: BSC-2100 Displays, Controls, and Connectors
- 36BSC-1200 Displays, Controls, and Connectors
- 37Figure 2-3: BSC-1200 Displays, Controls, and Connectors
- 37Table 2-1: BSC-1200 Status LEDs
- 38BSC-600 Controls and Connectors
- 38Figure 2-4: BSC-600 LEDs, Controls, and Connectors
- 38Table 2-2: BSC-600 Status LEDs
- 39Preparing Your Network
- 40Environmental, Rack, Space, and Power Requirements
- 40Mounting the BlueSecure Controller Chassis
- 40BSC-600/BSC-1200 Desktop Mounting
- 41BSC-2100 and BSC-2200/3200/5200 Desktop Mounting
- 41Figure 2-5: Attaching a Rubber Pad to a BSC-2100/5200 Bumper
- 41Figure 2-6: Attaching the BSC-2100/5200 Chassis Desktop Bumper
- 42Rack-mounting the BlueSecure Controller
- 42Figure 2-7: Attaching the BSC-2100/5200 Chassis Cap
- 42Figure 2-8: Attaching the Mounting Brackets to the BSC Chassis
- 43Connecting the BlueSecure Controller to Your Network
- 43Connecting the BSC to Its Power Source
- 44Powering Down Your BSC
- 44Enabling Power Over Ethernet On the BSC-600 and BSC-1200
- 45LED Run Time Mode for BSC-600 and BSC-1200
- 45Basic POE LED Functionality for BSC-600 and BSC-1200
- 45Figure 2-9: Location of BSC-600 PoE Power Supply Connector
- 47Administrator Console
- 48Logging Into the Administrator Console for the First Time
- 48Figure 3-1: BSC Administrator Login Page
- 49Logging Out of the Administrator Console
- 49Using and Managing Administrator Accounts
- 49Figure 3-2: the BSC Administrator Console
- 50Adding a New Administrator Account
- 51Changing an Administrator Password
- 51Figure 3-3: New Admin User Page
- 52Changing Your Login Password
- 52Deleting Administrator Accounts
- 52Installing the Bluesocket SSL Certificate
- 52Figure 3-4: Changing Your Login Password
- 53Figure 3-5: Security Certificate Alert
- 53Figure 3-6: SSL Certificate Dialog
- 54An Overview of the Tabs On the Console
- 54Figure 3-7: Navigating the Administrator Console
- 55Read-only Pages (Replication Nodes Only)
- 55Obtaining Online Help
- 56Site Map
- 56Figure 3-8: Site Map
- 57Error Checking On Page Forms
- 57Using Command Buttons and Icons
- 57Table 3-1: Administrator Console Command Buttons and Icons
- 58Sorting and Filtering Table Data
- 58Customizing the Presentation of Table Data
- 58Table 3-2: Sorting and Filtering Administrator Console Table Data
- 59Paging Through Data
- 59Console Fonts
- 59Figure 3-9: Customizing the Presentation of Table Data
- 59Table 3-4: Administrator Console Font Controls
- 60Downloading Administrator Console Data
- 60Entering IP Addresses and Fully Qualified Domain Names
- 61Restarting the BSC to Activate Configuration Information
- 61Figure 3-10: Using the Pop Up List Feature
- 63Networks
- 64Defining the BSC Protected Physical Interface
- 64Figure 4-1: Edit Protected Interface (Eth0) Page
- 67Creating a VLAN On the Protected Side (Optional)
- 67Figure 4-2: Link Aggregation Interfaces On the BSC-5200
- 68Figure 4-3: Create a Protected VLAN Page
- 69Configuring a Protected Virtual Interface (Optional)
- 69Configuring the BSC Managed Interface
- 69Figure 4-4: Create a Protected Virtual Interface Page
- 70Figure 4-5: Edit Managed Interface (Eth1) Page
- 71Configuring Wireless Client IP Address Assignment
- 72Figure 4-6: Completed DHCP Relay Options
- 74Figure 4-7: Enabling the BSC DHCP Server
- 75Figure 4-8: DHCP Settings for Managed Interface (Eth1) Page
- 78Figure 4-9: Fixed IP Address Assignments for Wireless Clients
- 79Creating a VLAN On the Managed Side of Your Network
- 79Figure 4-10: NAT Settings for Managed Interface Page
- 80Figure 4-11: Create a Managed VLAN Page
- 81Configuring a Managed Remote Subnet
- 81Figure 4-12: a Sample Managed Remote Subnet
- 82Figure 4-13: Create a Managed Remote Subnet Page
- 83Figure 4-14: DHCP Settings for New Managed Remote Subnet Page
- 85Configuring a Managed Virtual Interface
- 85Figure 4-15: Create a Managed Virtual Interface Page
- 86Configuring the Admin Interface
- 87Configuring Failover Parameters
- 87Figure 4-16: Edit Admin Interface Page
- 88Normal Operation
- 88Failover State
- 88Recovery State
- 88Configuring the Primary BSC
- 88Figure 4-17: Failover - Normal State
- 89Figure 4-18: Failover - Failover State
- 89Figure 4-19: Failover - Recovery State
- 90Completing the Failover Setup
- 90Configuring Static Routes
- 90Figure 4-20: Edit Failover (Eth2) Page
- 91Figure 4-21: Sample BSC Routing Table
- 91Figure 4-22: Create a Static Route Entry
- 92Configuring Multicast Routing
- 92Figure 4-23: Admin Interface in Network Routing Table
- 93Configuring AppleTalk Routing
- 93AppleTalk Networks: Key Concepts
- 93Figure 4-24: Enabling Multicast Routing
- 95Configuration Procedure
- 95Figure 4-25: Enabling AppleTalk Routing
- 97Authentication Using Internal Database
- 98Local BSC User Authentication
- 98Creating/Editing/Deleting a Local User Account
- 99Figure 5-1: New Local User Page
- 101Defining MAC Address Authentication
- 101Figure 5-2: New MAC Device Page
- 105Authentication Using External Servers
- 106An Overview of External User Authentication
- 106RADIUS Authentication
- 107Figure 6-1: New RADIUS Server Page
- 110LDAP/Active Directory Authentication
- 111Figure 6-2: New LDAP/Active Directory Server Page
- 114SIP2 Authentication
- 115Figure 6-3: New SIP2 Server Page
- 116NTLM Authentication
- 116Figure 6-4: New NTLM Server Page
- 118Transparent NTLM Authentication
- 119Figure 6-5: New Transparent NTLM Windows Server Page
- 121Transparent 802.1X Authentication
- 121Figure 6-6: User Authentication in an 802.1X Environment
- 122Figure 6-7: New Transparent 802.1X Server Page
- 123The BSC Internal 802.1X Authentication Server
- 124Figure 6-8: Edit the Local 802.1X Server Page
- 127Kerberos Authentication
- 127Figure 6-9: New Kerberos Server Page
- 128Cosign Authentication
- 129Figure 6-10: New Cosign Server Page
- 131Pubcookie Authentication
- 132Figure 6-11: New Pubcookie Server Page
- 134CAS Authentication
- 134Figure 6-12: New CAS Server Page
- 136IPass Client Authentication
- 136Transparent Certificate Authentication
- 137Figure 6-13: Enabling Transparent Certificate Authentication
- 138Testing an External Authentication Server
- 139Figure 6-14: External Authentication Server Test Page
- 141RADIUS Accounting
- 142Defining a RADIUS Accounting Server
- 142Figure 7-1: New RADIUS Accounting Page
- 143Attributes Sent to External RADIUS Accounting Server By BSC
- 143Table 7-1: RADIUS Accounting Attributes Sent From the BSC
- 145Roles and Role Elements
- 146An Example of Role-based Authorization
- 146An Overview of Roles
- 146Defining User Roles to Enforce Network Usage Policies
- 147Role Inheritance
- 147Figure 8-1: Role-based Authorization for a Registered User
- 147Figure 8-2: Role-based Authorization for an Unregistered User
- 148Defining a Role
- 149Figure 8-3: Create a Role Page
- 151Figure 8-4: Enabling Machine Authentication On Windows Zero-Config
- 152Figure 8-6: Mapping Role Placement Based On Username
- 152Figure 8-7: Successful Machine Authentication
- 152Figure 8-8: Successful User Login
- 152Figure 8-9: Failed User Login Because Machine Authentication Failed
- 152Figure 8-10: Log Message Upon Failure
- 152Figure 8-5: Enabling Prerequisite Machine Authentication Role
- 154Creating Destinations and Destination Groups
- 155Creating a Single Device Destination
- 155Figure 8-11: Create a (Destination) Host Page
- 156Creating a Network Space Destination
- 156Creating Destination Groups
- 156Figure 8-12: Create a (Destination) Network Page
- 154Creating Role Elements
- 154Modifying a Role
- 157Creating Network Services and Services Groups
- 157Figure 8-13: Create a (Destination) Group Page
- 158Creating a Network Service
- 159Figure 8-14: Create a Service Page
- 160Creating Network Service Groups
- 161Creating Schedules and Schedule Groups
- 161Creating a Schedule
- 161Figure 8-15: Create a (Service) Group Page
- 162Figure 8-16: Create a Schedule Page
- 163Creating Schedule Groups
- 163Creating Locations and Location Groups
- 163Figure 8-17: Create a (Schedule) Group Page
- 164Creating a User Location
- 164Creating User Location Groups
- 164Figure 8-18: Create a User Location Page
- 165Figure 8-19: Create a (Location) Group Page
- 167Voice Over WLAN Support
- 168Configuring General VoWLAN Settings
- 168Configuring Vendor-specific IP Phone Support
- 168Configuring VoWLAN QoS
- 168Figure 9-1: VoWLAN General Settings Page
- 168Figure 9-2: IP Phones Settings Page
- 171General BSC Operational Settings
- 172Figure 10-1: HTTP Settings Page
- 172HTTP Server Settings
- 175Intrusion Detection System
- 176Figure 10-2: BSC IDS Host State Model
- 177Configuration Procedure
- 178Figure 10-3: Intrusion Detection System Settings Page
- 178SNMP Agent
- 179Automatic Backup of the BSC Database
- 179Figure 10-4: SNMP Settings Page
- 180Figure 10-5: Auto Backups Page
- 180System Time and Date Settings
- 181Figure 10-6: BSC Time Settings Page
- 181Mail Server Access
- 182Public Access Networks
- 182Figure 10-7: BSC Email Settings Page
- 182Figure 10-8: Public Access Settings Page
- 184Event Logging and Connection Tracking
- 185Figure 10-9: Logging Settings Page
- 187Figure 10-10: Thresholds Page
- 187Threshold Values
- 188Domain Name System (DNS) Settings
- 189Figure 10-11: DNS Proxy Page
- 190Digital Certificates
- 190Overview
- 190How the BSC Uses Certificates
- 191Configuring External Server Authentication Over SSL
- 191Figure 10-12: Certificate Management Page
- 192Requesting and Installing an IPSec Authentication Certificate
- 193Figure 10-13: IPSec Certificate Signing Request Generation Page
- 193Figure 10-14: IPSec CSR Generated Page
- 194Figure 10-15: Miscellaneous Settings Page
- 194Miscellaneous BSC Options
- 197Web Logins
- 198Customizing the User Login Page
- 198The Appearance of the User Login Page
- 198Figure 11-1: Default User Login Page
- 199Customizing the Login Form and HTML Body of Login Page
- 199Figure 11-2: Elements of the User Login Page You Can Customize
- 200Figure 11-3: Create New Custom Login Page
- 202Customizing the Right Side of the User Login Page
- 203Figure 11-4: Custom Login Page - Edit HTML
- 206Redirecting Clients to an External Server for Authentication
- 206Configuring Hotspot Account Generation
- 206Figure 11-5: Custom Login Page - Edit Redirection
- 207Figure 11-6: Create New Account Link
- 208Figure 11-7: Sample Account Selections Page
- 208Table 11-1: Required Authorize.net Settings
- 210Figure 11-8: Hotspot Account Generation Page
- 212Figure 11-9: Friends and Family Freespot
- 213Figure 11-10: Guest DNA
- 213Uploading Image/Media Files for the User Login Page
- 214Figure 11-11: File Uploads Page
- 216Defining a User Login Page Language
- 216Figure 11-12: Create a User Login Page Language Page
- 218Editing a User Login Page Language
- 214Translating User Login Pages
- 218Installing a Custom SSL Login Certificate
- 219Requesting a Certificate
- 219Figure 11-13: SSL Certificate Generation Page
- 220Figure 11-14: SSL CSR Generated Page
- 221Uploading a Replacement SSL Certificate You Already Have
- 221Figure 11-15: Uploaded Certificate
- 221Figure 11-16: Certificate Management Page
- 222Recovering the Private Key
- 223Renewing a Custom SSL Certificate
- 223Figure 11-17: SSL Certificate Generation Page
- 224Installing a Wildcard (*) SSL Certificate On Multiple BSCs
Opera Pms User Guide Version 5 Download
P manuals E-books that published today as a guide. Our site has the following Ebook Pdf available for free PDF download. You may find Ebook Pdf document other than just. Related Book PDF Book Opera Pms User Guide Version 5: - Home - Make Your Healthy Delicious Recipes - Make Your Felt Shark Couture - Make Your Dolls House Furniture. Opera Pms V5 User Guide Manual. Opera Pms V5 User Guide Manual. Learn More - opens are subject to change RUNS, SELLING AS IS AS A NON RUNNING MACHINE WE WILL LOAD. Import charges previously quoted little my grandmother always to 1 loyalty point.
Windows 7 convert raw to ntfs. Due to power outage, virus attack, improper use, then the drive/card may change to RAW without your conscious and you just did not know how to handle this and are looking for some tool which can convert RAW to NTFS and hope to access files in the partition. Download iCare Data Recovery to restore data from the raw drive before converting it to fat32 or ntfs since once the converting is done, your files would be erased. Tutorial: Video Tutorial: how to use iCare Data Recovery for file rescue Steps of raw drive recovery with iCare Data Recovery Pro Select a possible drive that contains your files and let it build file structures for recovery.