Policy Manager Getting Started Guide
Welcome to the Policy Manager 6.9 Getting Started Guide. This guide contains the following information:
Setting Up the Policy Manager Hardware Appliances
Using VMware vSphere Web Client to Install Policy Manager on a Virtual Machine
Using Microsoft Hyper-V to Install Policy Manager on a Virtual Appliance
Starting or Stopping Policy Manager Services
Intended Audience
The intended audience for the Policy Manager 6.9 Getting Started Guide includes customers, partners, system administrators, and Aruba/HPE field System Engineers. Please note that this document is not a training guide, and it is assumed that the reader has at minimum foundational training in Policy Manager essentials..
The user of this guide should have a working knowledge of the following:
AAAAuthentication, Authorization, and Accounting. AAA is a security framework to authenticate users, authorize the type of access based on user credentials, and record authentication events and information about the network access and network resource consumption. technologies (RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources. , TACACSTerminal Access Controller Access Control System. TACACS is a family of protocols that handles remote authentication and related services for network access control through a centralized server. , 802.1X802.1X is an IEEE standard for port-based network access control designed to enhance 802.11 WLAN security. 802.1X provides an authentication framework that allows a user to be authenticated by a central authority., MACMedia Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network. authentication, and Web authentication)
Layer-2 and Layer-3 networking
|
Providing information about network device configurations and capabilities is outside the scope of this guide. For information on these topics, refer to the documentation provided by the vendor of your network equipment. |
Was this information helpful?
Great! Thanks for the feedback
Sorry about that! How can we improve it? Send your comments and suggestions!