Policy Manager Getting Started Guide

Welcome to the Policy Manager 6.9 Getting Started Guide. This guide contains the following information:

Setting Up the Policy Manager Hardware Appliances

Using VMware vSphere Web Client to Install Policy Manager on a Virtual Machine

Using Microsoft Hyper-V to Install Policy Manager on a Virtual Appliance

Starting or Stopping Policy Manager Services

Intended Audience

The intended audience for the Policy Manager 6.9 Getting Started Guide includes customers, partners, system administrators, and Aruba/HPE field System Engineers. Please note that this document is not a training guide, and it is assumed that the reader has at minimum foundational training in Policy Manager essentials..

The user of this guide should have a working knowledge of the following:

AAAAuthentication, Authorization, and Accounting. AAA is a security framework to authenticate users, authorize the type of access based on user credentials, and record authentication events and information about the network access and network resource consumption. technologies (RADIUSRemote Authentication Dial-In User Service. An Industry-standard network access protocol for remote authentication. It allows authentication, authorization, and accounting of remote users who want to access network resources. , TACACSTerminal Access Controller Access Control System. TACACS is a family of protocols that handles remote authentication and related services for network access control through a centralized server. , 802.1X802.1X is an IEEE standard for port-based network access control designed to enhance 802.11 WLAN security. 802.1X provides an authentication framework that allows a user to be authenticated by a central authority., MACMedia Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network. authentication, and Web authentication)

Layer-2 and Layer-3 networking

User Identity stores, such as Active DirectoryMicrosoft Active Directory. The directory server that stores information about a variety of things, such as organizations, sites, systems, users, shares, and other network objects or components. It also provides authentication and authorization mechanisms, and a framework within which related services can be deployed.


Providing information about network device configurations and capabilities is outside the scope of this guide. For information on these topics, refer to the documentation provided by the vendor of your network equipment.