Policy Manager Getting Started Guide
Welcome to the Policy Manager 6.9 Getting Started Guide. This guide contains the following information:
The intended audience for the Policy Manager 6.9 Getting Started Guide includes customers, partners, system administrators, and Aruba/HPE field System Engineers. Please note that this document is not a training guide, and it is assumed that the reader has at minimum foundational training in Policy Manager essentials..
The user of this guide should have a working knowledge of the following:
AAAAuthentication, Authorization, and Accounting. AAA is a security framework to authenticate users, authorize the type of access based on user credentials, and record authentication events and information about the network access and network resource consumption. technologies (RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources. , TACACSTerminal Access Controller Access Control System. TACACS is a family of protocols that handles remote authentication and related services for network access control through a centralized server. , 802.1X802.1X is an IEEE standard for port-based network access control designed to enhance 802.11 WLAN security. 802.1X provides an authentication framework that allows a user to be authenticated by a central authority., MACMedia Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network. authentication, and Web authentication)
Layer-2 and Layer-3 networking
User Identity stores, such as Active DirectoryMicrosoft Active Directory. The directory server that stores information about a variety of things, such as organizations, sites, systems, users, shares, and other network objects or components. It also provides authentication and authorization mechanisms, and a framework within which related services can be deployed.
Providing information about network device configurations and capabilities is outside the scope of this guide. For information on these topics, refer to the documentation provided by the vendor of your network equipment.
Was this information helpful?
Great! Thanks for the feedback
Sorry about that! How can we improve it?