SlideShare une entreprise Scribd logo
1  sur  2
PRODUCT SPECIFICATIONS SHEET



                                                                                                                  guestmanager


                                                              AEROHIVE NETWORKS GUESTMANAGER is a guest account management
                                                              and authentication server that completes Aerohive’s robust and secure guest
                                                              access solution. In combination with HiveAPs, the GuestManager enables
                                                              guest users to be simply and securely authorized for access to a guest network.
                                                              The Aerohive GuestManager makes it simple for authorized employees to
                                                              create guest accounts while keeping the guest network secure by authenticat-
                                                              ing and reporting on all guest users.


                                                              Role Based Administration of Guests
                                                              GuestManager in conjunction with the overall Aerohive solution enables
                                                              granular management of different types of guest roles, while the HiveAPs can
                                        Corp VLAN
  Captive Web Portal
    Authentication     Public Network   Guest VLAN
                                                              enforce different security, QoS or segmentation requirements based upon roles
                                           Corp RADIUS
                                                              communicated to the HiveAP from GuestManager. This enables, for example,
                             Firewall    GuestManager
                                                              contractors to get extended access to a network and a visitor to get access for
                                                              only a few hours. This functionality also enables contractors to get access to
                                                              different network resources, while visitors may be allowed to access only the
                                                              internet. These two types of guests both authenticate using the same SSID and
                         Authorized
         Guest           Employee

                                                              web portal interface but have different policies applied based upon their user
                                                              credentials.
 GuestManager is a central
 resource in the network that
                                                              GuestManager and the Aerohive Guest Access Solution
 acts as a RADIUS server for
                                                              In order to enable guest access to a corporate network securely with the least
 guest access. Authorized
                                                              operational effort, an entire guest solution must be in place. The chart below
 employees access an
                                                              shows the key requirements and how Aerohive provides a complete solution.
 intuitive web interface to
 register guest accounts.
 Guests use the credentials                          Requirements                     The Aerohive Solution
 provided to authenticate                            The ability to secure and        Aerohive enables segmentation through a rich identity based
 through the captive web                             segment guest traffic from       policy engine. Based upon user identity, guests can be put
                                                     corporate traffic                on a separate VLAN or be tunneled to the DMZ to ensure
 portal on the AP. If autho-                                                          that guest and employee traffic does not mix.
 rized, the guest can access                         The ability to apply QoS and     Aerohive can apply complete access policy at the AP
 the guest VLAN or tunnel                            Security policy to the guest     including time of day and day of week access, firewall, DoS
                                                     users as they join on the        prevention and QoS policy based on the identity or role of
 which drops them onto the
                                                     network                          the guest.
 Internet. If there are multiple
                                                     The ability to easily create     The GuestManager makes it simple for authorized employ-
 types of guests like contrac-                       unique guest credentials         ees to create and distribute guest credentials and instructions
                                                                                      for joining the network.
 tors, consultants and
                                                     A user friendly authentication   As a guest logs into a guest SSID, they are presented with a
 visitors, they can be placed
                                                     and authorization process        Web Login page or “Captive Web Portal” hosted on the AP.
 on separate networks with                                                            The users credentials are passed, via RADIUS to the Guest-
                                                                                      Manager where the user is authenticated and based upon
 different policies.
                                                                                      role be authorized for access to the guest network.



Aerohive Networks, Inc., 3150-C Coronado Drive, Santa Clara, CA 95054 USA | phone 408.988.9918 | toll-free 866.918.9928 | fax 408.492.9918
can be randomly generated or specified during registra-
 Guest Account Creation and Management
                                                                           tion to provide a unique login identity for the guest. Once
 GuestManager also provides flexible Guest Account
                                                                           the user credentials are created the credentials can be
 management, allowing guest access and accounts to be
                                                                           emailed or printed out on letter sized paper or a label
 audited, canceled or tracked. The creation of guest accounts
                                                                           printer along with instructions on how to access the
 enables an enterprise to set up a system that matches the
                                                                           network.
 security and operational goals of the enterprise. Here are a
 few examples of guest account registration available in
                                                                           Single Centralized Instance for Guest
 GuestManager:
                                                                           Authentication
                                                                           GuestManager runs on RADIUS so it can be used to
 • Lobby ambassador registration enables receptionists or
                                                                           authenticate guests on wired portals as well as wireless
   security personnel to provide access to the network as the
                                                                           portals and enables an entire multi-site enterprise to use a
   guest enters the building
                                                                           single instance or regionalized instance of the platform to
 • Employee registration enables any employee to create
                                                                           cover an entire company or just one part.
   guest accounts. Guest manager integrates with Active
   Directory to enable employee access to GuestManager
   based on group policy
 • Self registration where guests can use a kiosk in the lobby
   or secure area to create their own accounts. This
   presumes physical access in order to get network access
 • Bulk account registration enables conference or training
                                                                           Delivered as an Appliance
   organizers to create large numbers of user credentials
                                                                           The GuestManager is delivered as an appliance to ease
   easily
                                                                           deployment and maintenance of guest services. The Guest-
                                                                           Manager appliance has been “hardened” or secured
 Credentials
                                                                           against malicious attack and as the system is upgraded
 The simple distribution of unique guest credentials is one of
                                                                           vulnerabilities are fixed.
 the key operational benefits of GuestManager. Credentials



  PHYSICAL PROPERTIES

  GUESTMANAGER

  DEVICE SPECIFICATIONS
  • Form factor: 1U rack-mountable device
  • Chassis dimensions: 16 13/16” W x 1 3/4” H x 15 13/16” D (42.7 cm W x 4.4 cm H x 40.2 cm D)
  • Weight: 13.75 lb. (6.24 kg)
  • Serial port: male DB-9 RS-232 port (bits per second:9600, data bits: 8, parity: none, stop bits: 1, flow control: none)
  • USB port: standard Type A USB 2.0 port
  • Ethernet ports: MGT and LAN – autosensing 10/100/1000Base-T

  POWER SPECIFICATIONS
  • ATX (Advanced Technology Extended) autoswitching power supply with PFC (power factor corrector):
    – Input: 100 – 240 VAC
    – Output: 250 watts
  • Power supply cord: standard three conductor SVT 18AWG cord with an NEMA5-15P three-prong male plug and three-pin
    socket

  ENVIRONMENTAL SPECIFICATIONS
  • Operating temperature: 32 to 140°F (0 to 40°C)
  • Storage temperature: -4 to 176°F (-20 to 80°C)
  • Relative humidity: 10% – 90% (noncondensing)


SKU                     Description
GuestManager
AH-GM-UNR-1U            GuestManager (1U) Appliance Unrestricted License



                                                     www.aerohive.com                                                              LIT0800504

Contenu connexe

Tendances

Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Richard Bullington-McGuire
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4OracleIDM
 
SharePoint Saturday The Conference 2011 - Extranets & Claims Authentication
SharePoint Saturday The Conference 2011 - Extranets & Claims AuthenticationSharePoint Saturday The Conference 2011 - Extranets & Claims Authentication
SharePoint Saturday The Conference 2011 - Extranets & Claims AuthenticationBrian Culver
 
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Systems, Inc.
 

Tendances (10)

OAuth 2.0 101
OAuth 2.0 101OAuth 2.0 101
OAuth 2.0 101
 
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
Enabling Web Apps For DoD Security via PKI/CAC Enablement (Forge.Mil case study)
 
Shmat ccs12
Shmat ccs12Shmat ccs12
Shmat ccs12
 
OpenSSO Deployments
OpenSSO DeploymentsOpenSSO Deployments
OpenSSO Deployments
 
Web Application Solutions
Web Application SolutionsWeb Application Solutions
Web Application Solutions
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
 
SharePoint Saturday The Conference 2011 - Extranets & Claims Authentication
SharePoint Saturday The Conference 2011 - Extranets & Claims AuthenticationSharePoint Saturday The Conference 2011 - Extranets & Claims Authentication
SharePoint Saturday The Conference 2011 - Extranets & Claims Authentication
 
Technical Cyber Defense Strategies Explained!
Technical Cyber Defense Strategies Explained!Technical Cyber Defense Strategies Explained!
Technical Cyber Defense Strategies Explained!
 
RADIUS
RADIUSRADIUS
RADIUS
 
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
 

En vedette

Tirada Plato - 25 De Abril 2010 - Gador
Tirada Plato - 25 De Abril 2010 - GadorTirada Plato - 25 De Abril 2010 - Gador
Tirada Plato - 25 De Abril 2010 - Gadorguestdd2a4c
 
Keyyo, Module CTI pour Sage CRM
Keyyo, Module CTI pour Sage CRM Keyyo, Module CTI pour Sage CRM
Keyyo, Module CTI pour Sage CRM Sage france
 
Projektmanagement bei komplexen Altlastensanierungen
Projektmanagement bei komplexen AltlastensanierungenProjektmanagement bei komplexen Altlastensanierungen
Projektmanagement bei komplexen AltlastensanierungenPhilippe Vallat
 
Scrum und User Centered Design, Usability Coffee, 05.06.2014, St.Gallen
Scrum und User Centered Design, Usability Coffee, 05.06.2014, St.GallenScrum und User Centered Design, Usability Coffee, 05.06.2014, St.Gallen
Scrum und User Centered Design, Usability Coffee, 05.06.2014, St.Gallensoultank AG
 
GlobeCore Bitumen emulsion plant UVB 1
GlobeCore Bitumen emulsion plant  UVB 1 GlobeCore Bitumen emulsion plant  UVB 1
GlobeCore Bitumen emulsion plant UVB 1 GlobeCore
 
Broadcast Asia Conference June 15 2010: Social Media
Broadcast Asia Conference June 15 2010: Social MediaBroadcast Asia Conference June 15 2010: Social Media
Broadcast Asia Conference June 15 2010: Social MediaRob Van Den Dam
 
Airtightness and insulation with solar study
Airtightness and insulation with solar studyAirtightness and insulation with solar study
Airtightness and insulation with solar studyJonathan Flanagan
 
Productividad - Retos en la colaboración interna - Joaquin Peña - e20biz.es 2013
Productividad - Retos en la colaboración interna - Joaquin Peña - e20biz.es 2013Productividad - Retos en la colaboración interna - Joaquin Peña - e20biz.es 2013
Productividad - Retos en la colaboración interna - Joaquin Peña - e20biz.es 2013Joaquín Peña Siles
 
Primeros pasos hacia el Social Commerce
Primeros pasos hacia el Social CommercePrimeros pasos hacia el Social Commerce
Primeros pasos hacia el Social CommerceSowre
 
Tupperware Mid-May 2015 Sales US
Tupperware Mid-May 2015 Sales USTupperware Mid-May 2015 Sales US
Tupperware Mid-May 2015 Sales USJohanna Wilkens
 
Job fairs at Community Employment Resource Centre October 2016
Job fairs at Community Employment Resource Centre  October 2016Job fairs at Community Employment Resource Centre  October 2016
Job fairs at Community Employment Resource Centre October 2016StittsvilleCentral.ca
 
Electronic Port Clearance
Electronic Port ClearanceElectronic Port Clearance
Electronic Port ClearanceCristina Lie
 
Estudio sobre Comercio Electrónico B2C 2012 (edición 2013)
Estudio sobre Comercio Electrónico B2C 2012 (edición 2013)Estudio sobre Comercio Electrónico B2C 2012 (edición 2013)
Estudio sobre Comercio Electrónico B2C 2012 (edición 2013)t2ó | Connect. Convert. Grow.
 
Xing ag results_9_m_2014
Xing ag results_9_m_2014Xing ag results_9_m_2014
Xing ag results_9_m_2014XING SE
 
Brd zusammenfassung kein staat - nur quadro zone
Brd zusammenfassung kein staat - nur quadro zoneBrd zusammenfassung kein staat - nur quadro zone
Brd zusammenfassung kein staat - nur quadro zoneChemtrails Spoter
 
Opm Oxpekk Friction And Wear Nano Profile Report 10 2042 V2
Opm Oxpekk Friction And Wear   Nano Profile Report 10 2042 V2Opm Oxpekk Friction And Wear   Nano Profile Report 10 2042 V2
Opm Oxpekk Friction And Wear Nano Profile Report 10 2042 V2tspahroxpekk
 
Resumen Legendario Fisiologia - Digestivo 2016
Resumen Legendario Fisiologia - Digestivo 2016Resumen Legendario Fisiologia - Digestivo 2016
Resumen Legendario Fisiologia - Digestivo 2016Mijail JN
 
Solicitud plaza escuela musica y danza
Solicitud plaza escuela musica y danzaSolicitud plaza escuela musica y danza
Solicitud plaza escuela musica y danzaOcio Melilla Now
 
Making sense of big data at redbox
Making sense of big data at redboxMaking sense of big data at redbox
Making sense of big data at redboxtableauevents
 
Actividad estados unidos yanet rubi segundo diaz oficial
Actividad estados unidos yanet rubi segundo diaz oficialActividad estados unidos yanet rubi segundo diaz oficial
Actividad estados unidos yanet rubi segundo diaz oficialPatricia Arredondo
 

En vedette (20)

Tirada Plato - 25 De Abril 2010 - Gador
Tirada Plato - 25 De Abril 2010 - GadorTirada Plato - 25 De Abril 2010 - Gador
Tirada Plato - 25 De Abril 2010 - Gador
 
Keyyo, Module CTI pour Sage CRM
Keyyo, Module CTI pour Sage CRM Keyyo, Module CTI pour Sage CRM
Keyyo, Module CTI pour Sage CRM
 
Projektmanagement bei komplexen Altlastensanierungen
Projektmanagement bei komplexen AltlastensanierungenProjektmanagement bei komplexen Altlastensanierungen
Projektmanagement bei komplexen Altlastensanierungen
 
Scrum und User Centered Design, Usability Coffee, 05.06.2014, St.Gallen
Scrum und User Centered Design, Usability Coffee, 05.06.2014, St.GallenScrum und User Centered Design, Usability Coffee, 05.06.2014, St.Gallen
Scrum und User Centered Design, Usability Coffee, 05.06.2014, St.Gallen
 
GlobeCore Bitumen emulsion plant UVB 1
GlobeCore Bitumen emulsion plant  UVB 1 GlobeCore Bitumen emulsion plant  UVB 1
GlobeCore Bitumen emulsion plant UVB 1
 
Broadcast Asia Conference June 15 2010: Social Media
Broadcast Asia Conference June 15 2010: Social MediaBroadcast Asia Conference June 15 2010: Social Media
Broadcast Asia Conference June 15 2010: Social Media
 
Airtightness and insulation with solar study
Airtightness and insulation with solar studyAirtightness and insulation with solar study
Airtightness and insulation with solar study
 
Productividad - Retos en la colaboración interna - Joaquin Peña - e20biz.es 2013
Productividad - Retos en la colaboración interna - Joaquin Peña - e20biz.es 2013Productividad - Retos en la colaboración interna - Joaquin Peña - e20biz.es 2013
Productividad - Retos en la colaboración interna - Joaquin Peña - e20biz.es 2013
 
Primeros pasos hacia el Social Commerce
Primeros pasos hacia el Social CommercePrimeros pasos hacia el Social Commerce
Primeros pasos hacia el Social Commerce
 
Tupperware Mid-May 2015 Sales US
Tupperware Mid-May 2015 Sales USTupperware Mid-May 2015 Sales US
Tupperware Mid-May 2015 Sales US
 
Job fairs at Community Employment Resource Centre October 2016
Job fairs at Community Employment Resource Centre  October 2016Job fairs at Community Employment Resource Centre  October 2016
Job fairs at Community Employment Resource Centre October 2016
 
Electronic Port Clearance
Electronic Port ClearanceElectronic Port Clearance
Electronic Port Clearance
 
Estudio sobre Comercio Electrónico B2C 2012 (edición 2013)
Estudio sobre Comercio Electrónico B2C 2012 (edición 2013)Estudio sobre Comercio Electrónico B2C 2012 (edición 2013)
Estudio sobre Comercio Electrónico B2C 2012 (edición 2013)
 
Xing ag results_9_m_2014
Xing ag results_9_m_2014Xing ag results_9_m_2014
Xing ag results_9_m_2014
 
Brd zusammenfassung kein staat - nur quadro zone
Brd zusammenfassung kein staat - nur quadro zoneBrd zusammenfassung kein staat - nur quadro zone
Brd zusammenfassung kein staat - nur quadro zone
 
Opm Oxpekk Friction And Wear Nano Profile Report 10 2042 V2
Opm Oxpekk Friction And Wear   Nano Profile Report 10 2042 V2Opm Oxpekk Friction And Wear   Nano Profile Report 10 2042 V2
Opm Oxpekk Friction And Wear Nano Profile Report 10 2042 V2
 
Resumen Legendario Fisiologia - Digestivo 2016
Resumen Legendario Fisiologia - Digestivo 2016Resumen Legendario Fisiologia - Digestivo 2016
Resumen Legendario Fisiologia - Digestivo 2016
 
Solicitud plaza escuela musica y danza
Solicitud plaza escuela musica y danzaSolicitud plaza escuela musica y danza
Solicitud plaza escuela musica y danza
 
Making sense of big data at redbox
Making sense of big data at redboxMaking sense of big data at redbox
Making sense of big data at redbox
 
Actividad estados unidos yanet rubi segundo diaz oficial
Actividad estados unidos yanet rubi segundo diaz oficialActividad estados unidos yanet rubi segundo diaz oficial
Actividad estados unidos yanet rubi segundo diaz oficial
 

Similaire à Aerohive-GuestManager

Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...CA Technologies
 
Aerohive Branch on Demand Solution Brief
Aerohive Branch on Demand Solution BriefAerohive Branch on Demand Solution Brief
Aerohive Branch on Demand Solution BriefAltaware, Inc.
 
Creating v sphere client plug ins
Creating v sphere client plug insCreating v sphere client plug ins
Creating v sphere client plug insPablo Roesch
 
Amazon Web Services: Overview of Security Processes
Amazon Web Services: Overview of Security ProcessesAmazon Web Services: Overview of Security Processes
Amazon Web Services: Overview of Security Processeswhite paper
 
OpSource cloud hosting
OpSource cloud hostingOpSource cloud hosting
OpSource cloud hostingOpSource
 
Design and Implementation of an IP based authentication mechanism for Open So...
Design and Implementation of an IP based authentication mechanism for Open So...Design and Implementation of an IP based authentication mechanism for Open So...
Design and Implementation of an IP based authentication mechanism for Open So...WilliamJohn41
 
The WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems OverviewThe WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems OverviewNick Owen
 
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage OverviewCloudPassage
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerNovell
 
OAuth2 on Ericsson Labs
OAuth2 on Ericsson LabsOAuth2 on Ericsson Labs
OAuth2 on Ericsson LabsEricsson Labs
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...VMworld
 
Microsoft Forefront - Unified Access Gateway (UAG) Presentation
Microsoft Forefront - Unified Access Gateway (UAG) PresentationMicrosoft Forefront - Unified Access Gateway (UAG) Presentation
Microsoft Forefront - Unified Access Gateway (UAG) PresentationMicrosoft Private Cloud
 
Privileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined NetworkPrivileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined NetworkCA Technologies
 
Cisco Study: State of Web Security
Cisco Study: State of Web Security Cisco Study: State of Web Security
Cisco Study: State of Web Security Cisco Canada
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - SegmentationVMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - SegmentationVMworld
 
Secure your applications with Azure AD and Key Vault
Secure your applications with Azure AD and Key VaultSecure your applications with Azure AD and Key Vault
Secure your applications with Azure AD and Key VaultDavide Benvegnù
 
When and Why Would I use Oauth2?
When and Why Would I use Oauth2?When and Why Would I use Oauth2?
When and Why Would I use Oauth2?Dave Syer
 
040711 webcast securing vmachine
040711 webcast securing vmachine 040711 webcast securing vmachine
040711 webcast securing vmachine Erin Banks
 
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...VMworld
 

Similaire à Aerohive-GuestManager (20)

Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
 
Aerohive Branch on Demand Solution Brief
Aerohive Branch on Demand Solution BriefAerohive Branch on Demand Solution Brief
Aerohive Branch on Demand Solution Brief
 
Creating v sphere client plug ins
Creating v sphere client plug insCreating v sphere client plug ins
Creating v sphere client plug ins
 
Amazon Web Services: Overview of Security Processes
Amazon Web Services: Overview of Security ProcessesAmazon Web Services: Overview of Security Processes
Amazon Web Services: Overview of Security Processes
 
OpSource cloud hosting
OpSource cloud hostingOpSource cloud hosting
OpSource cloud hosting
 
Design and Implementation of an IP based authentication mechanism for Open So...
Design and Implementation of an IP based authentication mechanism for Open So...Design and Implementation of an IP based authentication mechanism for Open So...
Design and Implementation of an IP based authentication mechanism for Open So...
 
The WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems OverviewThe WiKID Strong Authentication Systems Overview
The WiKID Strong Authentication Systems Overview
 
CloudPassage Overview
CloudPassage OverviewCloudPassage Overview
CloudPassage Overview
 
Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access Manager
 
OAuth2 on Ericsson Labs
OAuth2 on Ericsson LabsOAuth2 on Ericsson Labs
OAuth2 on Ericsson Labs
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
VMworld 2013: NSX PCI Reference Architecture Workshop Session 2 - Privileged ...
 
Unlocking the Cloud Operating Model
Unlocking the Cloud Operating ModelUnlocking the Cloud Operating Model
Unlocking the Cloud Operating Model
 
Microsoft Forefront - Unified Access Gateway (UAG) Presentation
Microsoft Forefront - Unified Access Gateway (UAG) PresentationMicrosoft Forefront - Unified Access Gateway (UAG) Presentation
Microsoft Forefront - Unified Access Gateway (UAG) Presentation
 
Privileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined NetworkPrivileged Access Management for the Software-Defined Network
Privileged Access Management for the Software-Defined Network
 
Cisco Study: State of Web Security
Cisco Study: State of Web Security Cisco Study: State of Web Security
Cisco Study: State of Web Security
 
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - SegmentationVMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
VMworld 2013: NSX PCI Reference Architecture Workshop Session 1 - Segmentation
 
Secure your applications with Azure AD and Key Vault
Secure your applications with Azure AD and Key VaultSecure your applications with Azure AD and Key Vault
Secure your applications with Azure AD and Key Vault
 
When and Why Would I use Oauth2?
When and Why Would I use Oauth2?When and Why Would I use Oauth2?
When and Why Would I use Oauth2?
 
040711 webcast securing vmachine
040711 webcast securing vmachine 040711 webcast securing vmachine
040711 webcast securing vmachine
 
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
VMworld 2013: Enhancing Workplace Mobility and BYOD with the VMware Mobile Se...
 

Plus de ppuichaud

Aerohive - The death of the controller
Aerohive - The death of the controllerAerohive - The death of the controller
Aerohive - The death of the controllerppuichaud
 
Aerohive - La mort annoncée du contrôleur
Aerohive - La mort annoncée du contrôleurAerohive - La mort annoncée du contrôleur
Aerohive - La mort annoncée du contrôleurppuichaud
 
Aerohive - Livre Blanc 2009 - Nouvelle génération de réseaux sans fil
Aerohive - Livre Blanc 2009 - Nouvelle génération de réseaux sans filAerohive - Livre Blanc 2009 - Nouvelle génération de réseaux sans fil
Aerohive - Livre Blanc 2009 - Nouvelle génération de réseaux sans filppuichaud
 
Aerohive - Garantie de niveau de service sur le réseau Wi-Fi
Aerohive - Garantie de niveau de service sur le réseau Wi-FiAerohive - Garantie de niveau de service sur le réseau Wi-Fi
Aerohive - Garantie de niveau de service sur le réseau Wi-Fippuichaud
 
Aerohive - Optimisation du réseau Wi-Fi et des performances
Aerohive - Optimisation du réseau Wi-Fi et des performancesAerohive - Optimisation du réseau Wi-Fi et des performances
Aerohive - Optimisation du réseau Wi-Fi et des performancesppuichaud
 
Aerohive - Sécuriser et simplifier l’accès Wi-Fi avec Private Psk
Aerohive - Sécuriser et simplifier l’accès Wi-Fi avec Private PskAerohive - Sécuriser et simplifier l’accès Wi-Fi avec Private Psk
Aerohive - Sécuriser et simplifier l’accès Wi-Fi avec Private Pskppuichaud
 
Aerohive Jan09 Fr
Aerohive Jan09 FrAerohive Jan09 Fr
Aerohive Jan09 Frppuichaud
 
Aerohive-HiveManager3.0
Aerohive-HiveManager3.0Aerohive-HiveManager3.0
Aerohive-HiveManager3.0ppuichaud
 
Aerohive-HiveAP300
Aerohive-HiveAP300Aerohive-HiveAP300
Aerohive-HiveAP300ppuichaud
 
Aerohive-HiveAP20
Aerohive-HiveAP20Aerohive-HiveAP20
Aerohive-HiveAP20ppuichaud
 

Plus de ppuichaud (10)

Aerohive - The death of the controller
Aerohive - The death of the controllerAerohive - The death of the controller
Aerohive - The death of the controller
 
Aerohive - La mort annoncée du contrôleur
Aerohive - La mort annoncée du contrôleurAerohive - La mort annoncée du contrôleur
Aerohive - La mort annoncée du contrôleur
 
Aerohive - Livre Blanc 2009 - Nouvelle génération de réseaux sans fil
Aerohive - Livre Blanc 2009 - Nouvelle génération de réseaux sans filAerohive - Livre Blanc 2009 - Nouvelle génération de réseaux sans fil
Aerohive - Livre Blanc 2009 - Nouvelle génération de réseaux sans fil
 
Aerohive - Garantie de niveau de service sur le réseau Wi-Fi
Aerohive - Garantie de niveau de service sur le réseau Wi-FiAerohive - Garantie de niveau de service sur le réseau Wi-Fi
Aerohive - Garantie de niveau de service sur le réseau Wi-Fi
 
Aerohive - Optimisation du réseau Wi-Fi et des performances
Aerohive - Optimisation du réseau Wi-Fi et des performancesAerohive - Optimisation du réseau Wi-Fi et des performances
Aerohive - Optimisation du réseau Wi-Fi et des performances
 
Aerohive - Sécuriser et simplifier l’accès Wi-Fi avec Private Psk
Aerohive - Sécuriser et simplifier l’accès Wi-Fi avec Private PskAerohive - Sécuriser et simplifier l’accès Wi-Fi avec Private Psk
Aerohive - Sécuriser et simplifier l’accès Wi-Fi avec Private Psk
 
Aerohive Jan09 Fr
Aerohive Jan09 FrAerohive Jan09 Fr
Aerohive Jan09 Fr
 
Aerohive-HiveManager3.0
Aerohive-HiveManager3.0Aerohive-HiveManager3.0
Aerohive-HiveManager3.0
 
Aerohive-HiveAP300
Aerohive-HiveAP300Aerohive-HiveAP300
Aerohive-HiveAP300
 
Aerohive-HiveAP20
Aerohive-HiveAP20Aerohive-HiveAP20
Aerohive-HiveAP20
 

Dernier

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Dernier (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

Aerohive-GuestManager

  • 1. PRODUCT SPECIFICATIONS SHEET guestmanager AEROHIVE NETWORKS GUESTMANAGER is a guest account management and authentication server that completes Aerohive’s robust and secure guest access solution. In combination with HiveAPs, the GuestManager enables guest users to be simply and securely authorized for access to a guest network. The Aerohive GuestManager makes it simple for authorized employees to create guest accounts while keeping the guest network secure by authenticat- ing and reporting on all guest users. Role Based Administration of Guests GuestManager in conjunction with the overall Aerohive solution enables granular management of different types of guest roles, while the HiveAPs can Corp VLAN Captive Web Portal Authentication Public Network Guest VLAN enforce different security, QoS or segmentation requirements based upon roles Corp RADIUS communicated to the HiveAP from GuestManager. This enables, for example, Firewall GuestManager contractors to get extended access to a network and a visitor to get access for only a few hours. This functionality also enables contractors to get access to different network resources, while visitors may be allowed to access only the internet. These two types of guests both authenticate using the same SSID and Authorized Guest Employee web portal interface but have different policies applied based upon their user credentials. GuestManager is a central resource in the network that GuestManager and the Aerohive Guest Access Solution acts as a RADIUS server for In order to enable guest access to a corporate network securely with the least guest access. Authorized operational effort, an entire guest solution must be in place. The chart below employees access an shows the key requirements and how Aerohive provides a complete solution. intuitive web interface to register guest accounts. Guests use the credentials Requirements The Aerohive Solution provided to authenticate The ability to secure and Aerohive enables segmentation through a rich identity based through the captive web segment guest traffic from policy engine. Based upon user identity, guests can be put corporate traffic on a separate VLAN or be tunneled to the DMZ to ensure portal on the AP. If autho- that guest and employee traffic does not mix. rized, the guest can access The ability to apply QoS and Aerohive can apply complete access policy at the AP the guest VLAN or tunnel Security policy to the guest including time of day and day of week access, firewall, DoS users as they join on the prevention and QoS policy based on the identity or role of which drops them onto the network the guest. Internet. If there are multiple The ability to easily create The GuestManager makes it simple for authorized employ- types of guests like contrac- unique guest credentials ees to create and distribute guest credentials and instructions for joining the network. tors, consultants and A user friendly authentication As a guest logs into a guest SSID, they are presented with a visitors, they can be placed and authorization process Web Login page or “Captive Web Portal” hosted on the AP. on separate networks with The users credentials are passed, via RADIUS to the Guest- Manager where the user is authenticated and based upon different policies. role be authorized for access to the guest network. Aerohive Networks, Inc., 3150-C Coronado Drive, Santa Clara, CA 95054 USA | phone 408.988.9918 | toll-free 866.918.9928 | fax 408.492.9918
  • 2. can be randomly generated or specified during registra- Guest Account Creation and Management tion to provide a unique login identity for the guest. Once GuestManager also provides flexible Guest Account the user credentials are created the credentials can be management, allowing guest access and accounts to be emailed or printed out on letter sized paper or a label audited, canceled or tracked. The creation of guest accounts printer along with instructions on how to access the enables an enterprise to set up a system that matches the network. security and operational goals of the enterprise. Here are a few examples of guest account registration available in Single Centralized Instance for Guest GuestManager: Authentication GuestManager runs on RADIUS so it can be used to • Lobby ambassador registration enables receptionists or authenticate guests on wired portals as well as wireless security personnel to provide access to the network as the portals and enables an entire multi-site enterprise to use a guest enters the building single instance or regionalized instance of the platform to • Employee registration enables any employee to create cover an entire company or just one part. guest accounts. Guest manager integrates with Active Directory to enable employee access to GuestManager based on group policy • Self registration where guests can use a kiosk in the lobby or secure area to create their own accounts. This presumes physical access in order to get network access • Bulk account registration enables conference or training Delivered as an Appliance organizers to create large numbers of user credentials The GuestManager is delivered as an appliance to ease easily deployment and maintenance of guest services. The Guest- Manager appliance has been “hardened” or secured Credentials against malicious attack and as the system is upgraded The simple distribution of unique guest credentials is one of vulnerabilities are fixed. the key operational benefits of GuestManager. Credentials PHYSICAL PROPERTIES GUESTMANAGER DEVICE SPECIFICATIONS • Form factor: 1U rack-mountable device • Chassis dimensions: 16 13/16” W x 1 3/4” H x 15 13/16” D (42.7 cm W x 4.4 cm H x 40.2 cm D) • Weight: 13.75 lb. (6.24 kg) • Serial port: male DB-9 RS-232 port (bits per second:9600, data bits: 8, parity: none, stop bits: 1, flow control: none) • USB port: standard Type A USB 2.0 port • Ethernet ports: MGT and LAN – autosensing 10/100/1000Base-T POWER SPECIFICATIONS • ATX (Advanced Technology Extended) autoswitching power supply with PFC (power factor corrector): – Input: 100 – 240 VAC – Output: 250 watts • Power supply cord: standard three conductor SVT 18AWG cord with an NEMA5-15P three-prong male plug and three-pin socket ENVIRONMENTAL SPECIFICATIONS • Operating temperature: 32 to 140°F (0 to 40°C) • Storage temperature: -4 to 176°F (-20 to 80°C) • Relative humidity: 10% – 90% (noncondensing) SKU Description GuestManager AH-GM-UNR-1U GuestManager (1U) Appliance Unrestricted License www.aerohive.com LIT0800504