• Objectives
  • Product overview
  • Discussion topics
  • HPE MSM Controllers
    • Number of controlled APs per MSM Controller
  • Access, mobility, and premium mobility controllers
  • Overview of access controllers’ key features
  • Overview of access controllers’ security features
  • Overview of mobility and premium mobility controllers’ key features
  • Activity: Which controller would you select?
  • Discussion topics
  • AP operating modes
  • HPE APs
  • HPE MSM AP models: 802.11n
  • HPE MSM AP models: 802.11a/b/g
  • Other AP models
    • HPE M110
    • HPE MSM313
    • 16. HPE M111 Client Bridge Series
  • HPE MSM317 Access Device
  • Activity: Name the models
  • Discussion topics
  • HPE RF Manager
  • HPE MSM415
  • HPE IMC and WSM: Centralized management and configuration
  • HPE IMC and WSM: Monitoring
  • Implementing HPE MSM Wireless Networks
  • Discussion topics
  • Activity: Explore the architectural possibilities
    • The centralized WLAN architecture
    • The optimized WLAN architecture
  • Centralized WLAN architecture
  • Optimized WLAN architecture
    • Distributed forwarding without centralized authentication
    • Distributed forwarding with centralized authentication
    • Centralized access control
  • Lab Activity 1
  • Lab Activity 1 debrief
  • Summary
  • Learning check
  • Objectives
  • Discussion topics
  • MSM760 or MSM775 zl ports
  • MSM775 zl internal ports
  • MSM Controller schematic
  • Exploring how the MSM Controller handles incoming traffic
  • Web browser interface traffic
  • Other management traffic
  • Traffic from access-controlled clients (default)
  • Adding VLANs to MSM760 or MSM775 zl Controller ports
    • Network profiles
    • Mapping network profiles to controller ports as VLANs
    • Configuring IP interfaces for profiles with VLAN IDs (non-default IP interfaces)
    • Non-default IP interfaces and the controller schematic
  • MSM720 ports
  • MSM720 networks
  • Activity: Exploring how the MSM Controller handles incoming wired traffic (untunneled)
    • MSM760 Controller
    • MSM720 Controller
  • Discussion topics
  • Initial setup proces
  • Planning the MSM Controller’s connection
    • MSM760 and MSM775 zl controllers
    • MSM720
  • Obtain initial access
    • Direct connection
    • Alternative strategies
  • Configuring IP and other initial settings
    • Configuring IP settings on MSM760 or MSM775 zl
    • Controllers – MSM720
    • Create a default route
    • CLI commands for configuring IP settings
  • Temporarily disabling the default VSC (optional)
  • Connecting the MSM Controller in its final location
    • Ready the network infrastructure
    • Connect the controller
    • Verify the connection
    • Activity
  • Restricting management to the correct interface
  • Lab Activity 2.1
  • Lab Activity 2.1 debrief
  • Discussion topics
  • Planning the AP deployment
  • AP deployment solutions
  • Solution 1: Deploying APs in a dedicated VLAN
  • Using DHCP to assign IP addresses to APs
    • Preferred option: Network DHCP server
    • Controller DHCP server
  • Solution 2: Deploying APs in an existing VLAN
  • Layer 2 AP discovery 
  • AP management – AP configuration settings
    • AP configuration levels
    • AP configuration synchronization 
  • Lab Activity 2.2 
  • Lab Activity 2.2 debrief 
  • Solution 3: Deploying APs across Layer 3 boundaries 
  • Assigning IP addresses to MSM APs in multiple subnets
    • Network DHCP server
    • Static assignment 
  • Layer 3 AP discovery
    • Order of discovery methods 
  • Layer 3 AP discovery: DHCP
  • Layer 3 AP discovery: DNS
  • Layer 3 discovery: Static 
  • Provisioning APs
    • Non-staged or individual AP provisioning 
  • Provisioning APs with other settings 
  • Lab Activity 2.3  Lab Activity 2.3 debrief
  • Implementing HPE MSM Wireless Networks
  • Review: Planning an MSM Controller and AP deployment 
  • Summary
  • Learning check

1. Objectives
2. Discussion topics
3. Wireless cel
4. 802.11 a/b/g/n review
5. Channels in the 2.4 GHz band
6. Commonly used channels in the 5 GHz band
7. 802.11h – DFS – TPC – Optional activity
8. 802.11n: enhancements
9. 802.11n: channel bonding
10. 802.11n: MIMO and spatial streaming
11. 802.11n: transmit beamforming
12. 802.11n: band steering
13. 802.11n: backward compatibility
14. CTS-to-self
15. RTS/CTS – Finding and resolving hidden node issues
16. Discussion topics
17. Activity: Identifying modes and IDs
18. Ad hoc mode
19. Infrastructure mode
20. In-cell relay mode
21. BSS and BSSID
22. ESS and ESSID
23. Open versus closed systems
24. Discussion topics
25. Passive and active scanning on 802.11 networks

  • Preparing to authenticate and associate

26. Overview of 802.11 authentication and association

  • 802.11 authentication
  • 802.11 association
  • Supplemental authentication

27. 802.11 authentication

  • Open-system authentication
  • Shared-key authentication

28. 802.11 association
29. Review activity
30. Contents
31. Discussion topics
32. Coverage and capacity
33. Factors that affect coverage and capacity
34. Measuring wireless power
35. EIRP
36. Free space path loss
37. Real-world path loss and obstacles

  • Scattering Exponent
  • Major obstructions in the signal path
  • Antenna type

38. Basic and supported rates
39. Activity: planning coverage and capacity

  • Conclusion 

40. Discussion topics 
41. Antennas
42. Three-dimensional coverage
43. Omnidirectional antenna
44. Directional antenna
45. Diversity antenna
46. Yagi antenna
47. Discussion topics
48. What does roaming mean to your company?
49. Factors that affect roaming

  • Roaming to a new AP

50. Layer 2 roaming

  • APs must be in the same ESS
  • The APs must support the same VLAN and subnet

51. Layer 3 roaming
52. Fast roaming
53. Lab Activity 3
54. Lab Activity 3 debrief
55. Summary
56. Learning check
57. Supplemental information about 802.11 a/b/g/n
58. 802.11b
59. 802.11a
60. 802.11g
61. 802.11n
62. Implementing HP MSM Wireless Networks

  • Objectives
  • Supplemental authentication options
    • 802.1X with WPA, WPA2, or dynamic WEP
    • Shared key
    • Web-Auth
    • MAC-Auth 
  • Discussion topics
  • 802.1X
  • Roles in the 802.1X authentication proces
    • Supplicant
    • Authenticator
    • Authentication server
    • 6. 802.1X ports
    • Controlled port
    • Uncontrolled port
  • Controlled port states
  • EAP proces
  • Negotiating the EAP method
  • EAP methods: TLS
    • Advantages
  • EAP methods: TTLS and PEAP
    • outer method
    • inner method  - Benefits
  • Complete 802.1X process
    • RADIUS protocol
    • 13. 802.1X requirements
  • Certificates required for 802.1X
  • Installing certificates on the MSM Controller 
  • Activity: Advantages and disadvantages of using 802.1X
  • 802.1X encryption options
  • WPA
    • Temporal Key Integrity Protocol (TKIP)
    • Michael
    • Authentication options
    • Requirements • TKIP
    • Securely generated master keys
    • Key rotation with transient keys
    • Key mixing for per-frame keys
  • TKIP key distribution: four-way handshake for a pairwise key
    • Distributing keys
    • Completing the four-way handshake
  • Contents
  • TKIP key distribution: two-way handshake for group key
  • WPA2 (802.11i)
    • Strong encryption
    • Encryption-based integrity
    • Authentication
    • Requirements
  • CCMP/AES 
    • AES counter mode encryption
    • MIC for data integrity
    • Hole 196
  • WPA/WPA2 compatibility
  • Dynamic WEP
  • Activity: Advantages of using WPA2
  • Configure 802.1X on the MSM Controller
    • Configuration decisions
    • Best practices
  • Bind the VSC to an AP group
  • Lab Activity 4.1
  • Lab Activity 4.1 debrief
  • Discussion topics
  • WPA/WPA2-PSK (personal mode)
  • Failed WPA/WPA2-PSK handshake
  • Activity: Advantages and disadvantages of using WPA/WPA2-PSK
  • Discussion topics
  • Web-Auth overview
  • Activity: Advantages and disadvantages of using Web-Auth
    • Advantages of Web-Auth
    • Disadvantages of Web-auth
  • Discussion topics
  • MAC-Auth overview
  • Local MAC-Auth
  • RADIUS MAC-Auth
  • Activity: Advantages and disadvantages of using MAC-Auth
  • Configuring MAC-Auth on the MSM Controllers
  • Lab Activity 4.2
  • Lab Activity 4.2 debrief
  • Discussion topics
  • Static WEP
    • Encryption
    • Authentication
  • Shared-key WEP
    • Shared-key authentication proces
    • Vulnerability of shared-key WEP
  • Open-key WEP
  • Rev. 14.21
  • Implementing HPE MSM Wireless Networks
  • Discussion topics
  • Security filters for VSCs
    • Wireless security filters
    • Wireless MAC filter
    • Wireless IP filter
  • Client-to-site and site-to-site VPNs
  • Lab Activity 4.3
  • Lab Activity 4.3 debrief
  • Summary
  • Learning check
  • Objectives 
  • Public access or guest solutions 
  • Common settings for the guest solution VSC 
  • Implementing the guest solution 
  • Discussion topics
  • Guest solution architectures
  • Solution 1: Client data tunnels
  • Implementing client data tunnels
  • Detailed look at client data tunnels
  • Mapping tunneled traffic to access-controlled VSCs 
  • Establishing guest subnets
    • Configuring the DHCP server
    • Default VSC – Other VSCs
  • Isolation of access-controlled clients
  • Solution 2: Traffic from non-MSM connected clients 
  • Creating VLANs for access-controlled clients
  • Mapping incoming traffic to VSCs
    • Default VSC
    • Other VSCs
  • Establishing the subnets for guest VLANs
  • Solution 3: Implementing wireless guest access without tunneling
    • Use case 1
    • Use case 2
  • Implementing the solution without tunneling
  • Discussion topics
  • Handling traffic mapped to an access-controlled VSC
  • Handling unauthenticated user traffic (defaults)
  • Helping users become redirected
    • Test the connection to the DNS server
    • Enable DNS interception
    • Enable HTTP/HTTPS proxy support
    • Automatically authenticate clients without user interfaces
    • 33. Handling authenticated user traffic (defaults) 
  • Need to support return traffic to access-controlled clients 
  • Solutions for routing traffic to access-controlled clients
  • Lab Activity 5.1
  • Lab Activity 5.1 debrief
  • Implementing HPE MSM Wireless Networks
  • Review activity
    • Solution 1
    • Solution 2
    • Solution 3
  • Discussion topics
  • Authenticating access-controlled users with Web-Auth
  • Authenticating users to local accounts
  • Creating local user accounts
  • Creating subscription plans
  • Using GMS to create local accounts
  • Managing user accounts
  • Monitoring clients and users
  • Lab Activity 5.2
  • Lab Activity 5.2 debrief
  • Discussion topics
  • Public access interface
  • Public access interface structure
  • Editing public access interface pages
    • Customization processes
    • Customization use cases
  • Optional Lab Activity 5.3
  • Lab Activity 5.3 debrief
  • Discussion topics
  • Types of customization
  • Establishing a user’s settings
  • Bandwidth control
  • Egress VLANs
  • VSC-based and user-based egress VLANs
  • Guidelines for implementing access lists
    • Permitting unauthenticated users access to necessary resources
    • Denying authenticated users access to some resources
    • Create a logout link
  • Creating access lists
  • Applying access lists
  • Processing access lists: Unauthenticated
  • Processing access lists: Authenticated
  • Additional session and security settings
    • RADIUS-assigned attributes
  • Lab Activity 5.4
  • Lab Activity 5.4 debrief
  • Summary
  • Learning check
  • Contents
  • Objectives
  • Discussion topics
  • Basic solution for connecting the MSM Controller
    • Questions
  • Deploying MSM APs at a single site 
  • Special considerations for deploying an MSM720
    • Additional guidelines on link aggregation groups
  • Discussion topics
  • Forwarding non-access-controlled clients on a VLAN– Questions
  • Multiple VLANs for non-access-controlled clients: Locationbased
    • Question 
  • Discussion topics
  • Goals for the review
  • Assigning guests to a subnet without VLANs
    • Questions: Default VSC
    • Questions: Other VSC
  • Using VLANs to apply access control to wired clients
    • Questions: Default VSC – Questions: Other VSC
  • Using VLANs to route authenticated guest traffic
    • Questions
  • Assigning user-based VLANs for routing authenticated guest traffic
    • Questions
  • Review traffic flow
    • Questions
  • Alternatives: Using VLANs to implement access control for wireless clients
    • Questions: Adjusting the AP discovery
    • Questions: Default VSC
    • Questions: Other VSC
  • Alternatives: Implementing a similar solution on an MSM720
    • Questions
  • Lab Activity 6.1
  • Lab Activity 6.1 debrief 
  • Discussion topics 
  • Using DHCP relay for access-controlled clients
  • Resolving potential issues with the firewall
  • Implementing HPE MSM Wireless Networks 
  • Extending the egress VLAN to access-controlled clients
  • Lab Activity 6.2
  • Lab Activity 6.2 debrief
  • Summary 
  • Learning check
  • Objectives
  • Wireless mesh overview
  • Static wireless mesh
  • Dynamic wireless mesh
  • Establishing and maintaining a dynamic wireless mesh
  • Supporting a wireless mesh and wireless user access on the same AP
  • Radio settings for a wireless mesh
  • Security for a wireless mesh
  • Wireless mesh settings
  • Provisioning APs that connect only through the wireless mesh
  • Planning the wireless mesh
  • Lab Activity 7
  • Lab Activity 7 debrief
  • Summary
  • Learning check
  • Objectives
  • Discussion topics 
  • Redundancy and scalability 
  • Controller team
  • Secure control channel
  • Licensing
  • N + N redundancy
  • Features that are not supported in a team configuration
  • Discussion topics
  •  Configuring teaming
  •  Connectivity settings 
  •  Team settings
  • Teaming on MSM720 Controllers
    • Dedicated VLAN
    • Direct link
  • Discovering a team member
  • DHCP relay for VSCs with distributed forwarding
  • DHCP relay for VSCs with centralized access control
  • Activity: AP discovery
  • Managing the team 
  • Discussion topics 
  • Failover for a team member
  • Failover for the team manager
  • Discussion topics
  • Deploying multiple controllers without teaming
  • Deploying APs in a non-teamed, redundant controller environment
    • Ensuring that APs can discover all controllers
    • Ensuring all controllers provide the correct configuration for APs
    • Ensuring that all controllers support some APs during normal operation
    • Supplemental information about AP authentication
  • Deploying APs in a multiple controller environment without redundancy
  • Lab Activity 8
  • Lab Activity 8 debrief
  • Summary
  • Learning check
  • Objectives
  • MSM317 Access Device
  • VSCs on the MSM317 radio
  • MSM317 switch ports
  • Creating a non-access-controlled VSC for MSM317 switch ports
  • Binding the non-access-controlled VSC to an MSM317 switch port
  • Forwarding the traffic on the uplink port
  • Configuring authentication settings at the switch port
  • Configuring MAC filters on the switch port
  • Applying user-based VLANs
  • Applying a quarantine VLAN
  • Implementing an access-controlled VSC on an MSM317 switch port:
  • Tunneling client traffic
  • Using VLANs
  • Features that do not apply with access-controlled VSCs
  • Set up a port to support a VoIP device
  • Set up a port to support a VoIP device and computer
  • Additional port settings
  • Summary
  • Learning check

The Implementing HPE MSM Wireless Networks course provides learners with the skills and tools to successfully design, implement, and configure SMB and small-enterprise level HPE wireless networks, including how to integrate into the existing wired infrastructure.

Wireless networks are already widely deployed in a majority of today’s businesses, schools and universities. The Implementing HPE MSM Wireless Networks course provides the learners with a solid introduction to HPE Networking’s MSM wireless products and solutions. Topics include 802.11 standards, Controller Team for high availability, industry-level wireless security technologies (WPA2, AES, etc.), basic architectural design, implementation and configuration of HPE Networking wireless products.  This course is approximately 60 percent hands-on-labs and 40 percent lecture and learning activities. The Implementing HPE MSM Wireless Networks course prepares candidates for the HPE ASE—FlexNetwork Architect V2 and soon to be released HPE ASE—FlexNetwork Integrator V1 within the HPE ExpertONE program.

For why?

The Implementing HPE MSM Wireless Networks course is suitable for all IT Professionals who want to learn about HPE MSM Wireless products and solutions. The focus of this course is on implementing and configuring HPE MSM Wireless Networks.

Specifications:

HPE AIS - Network Infrastructure (2011) (inactive) or HPE ATP - FlexNetwork Solutions V2 certified.

 

The Implementing HPE MSM Wireless Networks course covers the important topics a network wireless specialist needs to know when implementing wireless networks. After completing this course, you will be able to: 

  • Describe the HPE Networking MSM wireless products such as Access Points (AP's) and Access/Mobility Controllers
  • Perform initial setup and configuration of AP's and controllers
  • Understand the wireless fundamentals like, 802.11 standards, antennas, radios and Wi-Fi properties
  • Identify WLAN security vulnerabilities and how to solve them with the available technologies such as WPA2, 802.1x with local or external RADIUS servers
  • Setup and configure basic Guest Access policies
  • Implement high availability solutions by setting up Controller Teaming and Meshing • Configure and setup Layer 2 and Layer 3 roaming

W cenę szkolenia wliczony jest:

  • Autoryzowany certyfikat producenta
  • Autoryzowane materiały szkoleniowe w formie elektronicznej bądź papierowej
  • Materiały szkoleniowe, notatnik, długopis
  • Kawa, herbata, słodki poczęstunek 
  • Obiad

Firma NT GROUP Sp.  z o.o. jest Autoryzowanym partnerem firmy HPE

Zachęcamy firmy do uzyskania możliwości dofinansowania na szkolenia oferowane przez naszą firmę. W obecnej chwili istnieją dwa sposoby dzięki którym możesz uzyskać dofinansowanie.

  • Szkolenia dofinansowane do 80% z funduszy europejskich  - Baza Usług Rozwojowych (BUR). Dofinansowanie dostępne jest dla wszystkich firm zatrudniających średniorocznie do 250 pracowników (maksymalnie średnie przedsiębiorstwo)
  • Szkolenia dofinansowane z Krajowego Funduszu Szkoleniowego  - dofinansowanie do 100%. Niezależnie od wielkości przedsiębiorstwa oraz kapitału.

Nasi pracownicy pomogą uzyskać dla Twojej firmy dofinansowanie. To naprawdę nie jest trudne. Jeżeli masz pytania  napisz lub zadzwoń do nas.

Zapraszamy!

Opinie
  • Brak dodanych opinii
Dodaj opinie
Cena netto
5200.00 zł
Czas trwania: 4 d,32 h
Poziom trudności
Język Polski,
Język materiałów Angielski,
Prowadzący Autoryzowany trener,
Atrybuty