This document provides an overview and agenda for a presentation on Aruba ClearPass for access management. The presentation covers ClearPass features such as policy-based authorization using multiple identity sources, device profiling, health checks and guest management. It also describes ClearPass' policy model including role-based access controls using user, device and context-based attributes. The document outlines ClearPass' integration capabilities including single sign-on, third-party APIs and interoperability with other access management solutions.
The document is a presentation on wireless LAN security fundamentals given by Jon Green in June 2014. It begins with an agenda that covers authentication with 802.1X, an overview of PKI, and a cryptography primer on symmetric and asymmetric encryption, hashing, digital signatures, and entropy. The presentation then discusses PKI in more detail including certificates, certificate authorities, and validating certificates. It concludes with an explanation of how 802.1X authentication uses these cryptography concepts together with EAP and a 4-way handshake to securely connect wireless clients to a network.
The document discusses how Aruba ClearPass provides adaptive network access policies through context-based authentication and authorization. It describes how ClearPass collects contextual information from various sources to make policy decisions. This context includes attributes about the user, device, location, authentication method, and more. ClearPass then maps collected context to roles and enforces policies based on matching roles and device posture to take actions like sending Radius responses, updating firewall rules, or triggering remediation. The adaptive policies allow for a more coordinated approach to security, operations, and user experience.
Tim Cappalli of Brandeis University presented on real-world challenges of deploying 802.1X authentication across wired and wireless networks. He discussed common EAP authentication methods like PEAP, EAP-TLS, and TTLS, noting their advantages and disadvantages. Cappalli also outlined challenges Brandeis faces including training support staff, empowering users, and planning for device onboarding. He explained steps Brandeis is taking like exploring EAP-TLS and utilizing client configuration tools to address these challenges.
Join us at this session to hear from Facebook on how they enabled easy to use, secure remote access solution for thousands of teleworkers. We will discuss how to design wireless access for mobile devices, wired access for VoIP phones - some with 4G cellular data for WAN backup.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
This document discusses Aruba's ClearPass guest access solution. It provides automated guest onboarding with sponsor approval, guest self-registration without IT involvement, and enterprise-grade security. ClearPass allows non-IT staff to manage guest access through an intuitive interface and offers compliance reporting, third-party integrations, and advertising capabilities.
Guests, contractors and employees are expected to connect wide variety of devices to your Wi-Fi, wired and VPN networks. Thankfully you can use Aruba ClearPass to define the right set of policies from a centralized system and extend them to many geographical locations. Join this session to discuss role based policies, device inventory management, mobile device onboarding, NAC for wired & wireless access and more
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
The document discusses implementing personalized network security using Aruba Networks products. It describes how traditional network security models are no longer effective due to factors like mobility and BYOD. Personalized, context-aware security which identifies users, devices, applications and locations is presented as a better approach. The Aruba security architecture is described, which uses ClearPass for policy management and enforcement across wireless, wired and VPN connections. Methods for strong authentication, device profiling, role-based access controls and guest access are covered to implement personalized security network-wide.
The document discusses Aruba Instant for providing remote networking capabilities. It outlines key applications and verticals that would benefit, requirements and challenges, and how Aruba Instant addresses them. Aruba Instant allows for remote networks to be set up with few on-site components, no special expertise required, full functionality, resiliency, and centralized management. It provides zero-touch provisioning, automatic whitelisting, scalability, site survivability, and centralized configuration and management while retaining local control and data planes for performance and resilience.
The document is a presentation on wireless LAN security fundamentals given by Jon Green in June 2014. It begins with an agenda that covers authentication with 802.1X, an overview of PKI, and a cryptography primer on symmetric and asymmetric encryption, hashing, digital signatures, and entropy. The presentation then discusses PKI in more detail including certificates, certificate authorities, and validating certificates. It concludes with an explanation of how 802.1X authentication uses these cryptography concepts together with EAP and a 4-way handshake to securely connect wireless clients to a network.
The document discusses how Aruba ClearPass provides adaptive network access policies through context-based authentication and authorization. It describes how ClearPass collects contextual information from various sources to make policy decisions. This context includes attributes about the user, device, location, authentication method, and more. ClearPass then maps collected context to roles and enforces policies based on matching roles and device posture to take actions like sending Radius responses, updating firewall rules, or triggering remediation. The adaptive policies allow for a more coordinated approach to security, operations, and user experience.
Tim Cappalli of Brandeis University presented on real-world challenges of deploying 802.1X authentication across wired and wireless networks. He discussed common EAP authentication methods like PEAP, EAP-TLS, and TTLS, noting their advantages and disadvantages. Cappalli also outlined challenges Brandeis faces including training support staff, empowering users, and planning for device onboarding. He explained steps Brandeis is taking like exploring EAP-TLS and utilizing client configuration tools to address these challenges.
Join us at this session to hear from Facebook on how they enabled easy to use, secure remote access solution for thousands of teleworkers. We will discuss how to design wireless access for mobile devices, wired access for VoIP phones - some with 4G cellular data for WAN backup.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
This document discusses Aruba's ClearPass guest access solution. It provides automated guest onboarding with sponsor approval, guest self-registration without IT involvement, and enterprise-grade security. ClearPass allows non-IT staff to manage guest access through an intuitive interface and offers compliance reporting, third-party integrations, and advertising capabilities.
Guests, contractors and employees are expected to connect wide variety of devices to your Wi-Fi, wired and VPN networks. Thankfully you can use Aruba ClearPass to define the right set of policies from a centralized system and extend them to many geographical locations. Join this session to discuss role based policies, device inventory management, mobile device onboarding, NAC for wired & wireless access and more
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
The document discusses implementing personalized network security using Aruba Networks products. It describes how traditional network security models are no longer effective due to factors like mobility and BYOD. Personalized, context-aware security which identifies users, devices, applications and locations is presented as a better approach. The Aruba security architecture is described, which uses ClearPass for policy management and enforcement across wireless, wired and VPN connections. Methods for strong authentication, device profiling, role-based access controls and guest access are covered to implement personalized security network-wide.
The document discusses Aruba Instant for providing remote networking capabilities. It outlines key applications and verticals that would benefit, requirements and challenges, and how Aruba Instant addresses them. Aruba Instant allows for remote networks to be set up with few on-site components, no special expertise required, full functionality, resiliency, and centralized management. It provides zero-touch provisioning, automatic whitelisting, scalability, site survivability, and centralized configuration and management while retaining local control and data planes for performance and resilience.
The document discusses ClearPass access management and network access control capabilities. It describes how ClearPass profiles connecting devices, prevents MAC spoofing, provides simple guest access and seamless BYOD, enables posture compliance checks, and can be used with TACACS for network auditing and access control. ClearPass uses services, roles, and policies to control network access based on attributes of the device and user. The document provides examples of configuring basic wired and guest access services in ClearPass.
The document discusses advanced access management features of Aruba ClearPass, including single sign-on, auto sign-on, integration with mobile device management systems, ClearPass Exchange APIs, outbound HTTP enforcement, and the post-authentication engine. New features of ClearPass 6.3 are also summarized, such as improvements to BYOD and guest features, network access control, server certificates, AirGroup capabilities, and performance monitoring tools.
This document discusses solutions for enabling commercial devices on classified networks using Suite B cryptography. It describes implementing two independent encryption layers - one at the network layer with IPsec and one at the application layer with TLS. It also outlines Aruba's offerings for securing wireless access on classified networks, including Remote Access Points that use credentials stored on secure USB keys and provide two factors of authentication with a wired Ethernet connection and Suite B encryption at both the network and application layers.
ClearPass is a solution for managing Bring Your Own Device (BYOD) networks. It combines network access control, mobile device management, and mobile application management into a single system. This allows organizations to onboard personal devices, detect and profile devices on the network, set policies based on device attributes from MDM integrations, and control access to applications. The presentation discusses how ClearPass streamlines BYOD deployment by automating device provisioning and policy enforcement across networks, devices, and apps.
The document discusses the Aruba SE Enablement Lab, which provides partner engineers access to demo Aruba technologies. It details the history and evolution of previous partner labs, and describes the current lab's infrastructure and capabilities. These include technologies like ClearPass, controllers, access points, AirWave, and AOS. The document also provides guidance on deploying your own lab, including recommended hardware and software, financial resources for partners, and how to get support.
The document provides instructions for configuring a Cisco 3750 switch to integrate with ClearPass Policy Manager (CPPM) for 802.1x, MAC, and downloadable access control list (DACL) authentication. Key steps include:
1. Configuring the switch interfaces, VLANs, and RADIUS settings to communicate with CPPM.
2. Creating 802.1x, MAC authentication, and DACL enforcement profiles in CPPM.
3. Associating the profiles in CPPM services and testing authentication of devices.
The document is a presentation on ClearPass Policy Manager from Aruba Networks. It discusses ClearPass authorization and profiling capabilities, how the policy model works, and considerations for deploying ClearPass in a clustered configuration. The presentation covers authorization sources, using device profiling data in policies, network requirements for profiling, ClearPass clustering technology, and operations of clustered ClearPass deployments. It provides use cases around authorization, device profiling, and ClearPass clustering.
This document provides an overview and agenda for an Aruba Networks workshop on enabling bring your own device (BYOD) programs using ClearPass Onboard for policy-based device onboarding and provisioning. The agenda covers planning a BYOD policy, configuring ClearPass Onboard settings like the certificate authority and network settings, the user experience of the onboarding lifecycle, and troubleshooting. It also discusses topics like detecting BYOD devices, building a BYOD policy, the onboarding workflow and architecture, integrating with mobile device management (MDM) systems, and deploying onboarding in different network configurations.
This document summarizes a presentation on practical cryptography, certificates, and 802.1X. It begins with an overview of cryptography basics like symmetric and asymmetric encryption. It then covers public key infrastructure concepts such as certificates, certificate authorities, and how they establish trust. The presentation concludes by explaining how certificates and cryptography are used together to enable 802.1X authentication.
Practice makes perfect - let's get together to walk through the Aruba ClearPass product in real-time to better understand all the configuration, monitoring and reporting options available. In this session you will be able to gather practical knowledge on how to use Clearpass features such as Single Sign-On (SSO), TACACS+, RADIUS return attributes and more.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
The document discusses Aruba's eSupport project which includes enhancing the Airheads community experience by integrating the support site, community, and partner center. It also discusses upcoming solutions like the Solutions Exchange for pre-building sample configurations and mentions the release of AOS 6.2.1.2. Various wireless issues and troubleshooting techniques are then covered such as reducing channel busy, fixing low SNR, and new troubleshooting tools in AOS 6.3 like client packet capture. Reminders are provided about resources such as the TAC quick reference guide, validated reference designs, and raising a support ticket.
The document outlines an agenda for an Aruba Networks workshop on advanced ClearPass network security. The agenda includes sections on using ClearPass for wired and wireless network access control (NAC), TACACS+ device authentication, and bringing your own device (BYOD) integration using Onboard for certificate provisioning. Monitoring and troubleshooting ClearPass deployments is also discussed.
The document discusses the migration of the University of San Diego's wireless network from Aruba AP 125, 135, and 175 controllers to Aruba 7200 series controllers. It provides an overview of the university and current wireless network statistics. It then outlines the requirements, pre-migration steps, and migration process for the controller upgrade. This includes backing up configuration, licenses, and wireless data from the existing controllers before and after a software upgrade. The new 7200 controllers would then be configured and licensed before cutting over the network.
This document provides an overview of advanced RF troubleshooting techniques for WiFi networks. It discusses various tools that can be used, including spectrum analysis tools, heatmaps, site surveys, and understanding client network interface cards. It also covers performance testing using tools like iperf, packet capture techniques, and examples of useful commands in the Aruba controller CLI for troubleshooting issues.
This document discusses Aruba's Mobility Switch Security Architecture and products. It provides an overview of the Aruba S3500 and S2500 Mobility Access Switches, including their capabilities and features. Key points include their support for role-based user access policies through integration with ClearPass Policy Manager, as well as their ability to tunnel traffic to an Aruba Mobility Controller for centralized policy enforcement. The document also covers how user roles can be implemented through traditional AAA services or user derivation rules based on attributes like MAC address OUIs or DHCP fingerprints.
The document discusses best practices for securing wireless networks. It recommends using a centralized wireless architecture with a mobility controller for better visibility and control. It emphasizes the importance of detecting and containing rogue access points, controlling uncontrolled wireless devices, using WPA2 encryption with 802.1x authentication, and implementing network access control with identity-based policies and health assessments to authorize devices and enforce security.
The document discusses planning for high-density wireless LANs in large public venues. It provides an overview of key terminology used for planning these types of networks, such as facility capacity, maximum device count, associated device count, and active devices. The document also outlines a process for planning and capacity analysis, including estimating the expected number of associations, active devices, and uplink bandwidth needs per access point based on factors like the number of seats in each section. An example spreadsheet is provided showing the results of applying this planning methodology to an event venue divided into sections.
The document is a presentation on network design fundamentals by Andy Logan from Aruba Networks. It discusses the wireless LAN lifecycle including requirements definition, site surveys, network design, RF design, security design, quality of service design, staging and provisioning, installation and validation, administration, monitoring, and troubleshooting. It provides information on validated reference designs, defining mobility requirements, conducting site surveys, mounting access points, network and controller deployment, remote access solutions, and operating the network including monitoring, troubleshooting, and the full wireless LAN lifecycle.
The document discusses features and capabilities of the Aruba AirWave network management platform. It covers how data flows into AirWave from controllers and devices, advanced monitoring features like application visibility and Lync monitoring, visualization of network performance data on floor plans, improvements to the user interface, ways to configure devices and controllers through AirWave, and serviceability features like backups.
The document discusses Aruba Instant for providing remote networking capabilities. It outlines the challenges of deploying and managing remote networks, and describes how Aruba Instant addresses these challenges through features like zero-touch provisioning, centralized management, fast failover, and VPN connectivity with advantages over conventional solutions. The presentation agenda includes applications and verticals served, requirements and challenges, and details on Aruba Instant's architecture and components.
This document provides an overview of 802.11ac Wi-Fi fundamentals including:
- 11ac extends 11n by introducing wider channels up to 160MHz, better modulation up to 256-QAM, and more streams up to 8.
- 11ac supports both 5GHz and wider channel widths which enable significantly higher data rates compared to 11n.
- Dynamic bandwidth management allows 11ac devices to utilize channel widths between 20MHz and 160MHz to optimize performance and coexistence with other networks.
The document provides tips for troubleshooting and optimizing Aruba wireless networks. It discusses segmental troubleshooting of users, APs, controllers and processes. It also covers optimizing AP stability, system profiles and load on processes. Additionally, it provides guidance on datapath debugging, deployment tips and using the Aruba Support Assistant (ASE) for troubleshooting.
The document discusses ClearPass access management and network access control capabilities. It describes how ClearPass profiles connecting devices, prevents MAC spoofing, provides simple guest access and seamless BYOD, enables posture compliance checks, and can be used with TACACS for network auditing and access control. ClearPass uses services, roles, and policies to control network access based on attributes of the device and user. The document provides examples of configuring basic wired and guest access services in ClearPass.
The document discusses advanced access management features of Aruba ClearPass, including single sign-on, auto sign-on, integration with mobile device management systems, ClearPass Exchange APIs, outbound HTTP enforcement, and the post-authentication engine. New features of ClearPass 6.3 are also summarized, such as improvements to BYOD and guest features, network access control, server certificates, AirGroup capabilities, and performance monitoring tools.
This document discusses solutions for enabling commercial devices on classified networks using Suite B cryptography. It describes implementing two independent encryption layers - one at the network layer with IPsec and one at the application layer with TLS. It also outlines Aruba's offerings for securing wireless access on classified networks, including Remote Access Points that use credentials stored on secure USB keys and provide two factors of authentication with a wired Ethernet connection and Suite B encryption at both the network and application layers.
ClearPass is a solution for managing Bring Your Own Device (BYOD) networks. It combines network access control, mobile device management, and mobile application management into a single system. This allows organizations to onboard personal devices, detect and profile devices on the network, set policies based on device attributes from MDM integrations, and control access to applications. The presentation discusses how ClearPass streamlines BYOD deployment by automating device provisioning and policy enforcement across networks, devices, and apps.
The document discusses the Aruba SE Enablement Lab, which provides partner engineers access to demo Aruba technologies. It details the history and evolution of previous partner labs, and describes the current lab's infrastructure and capabilities. These include technologies like ClearPass, controllers, access points, AirWave, and AOS. The document also provides guidance on deploying your own lab, including recommended hardware and software, financial resources for partners, and how to get support.
The document provides instructions for configuring a Cisco 3750 switch to integrate with ClearPass Policy Manager (CPPM) for 802.1x, MAC, and downloadable access control list (DACL) authentication. Key steps include:
1. Configuring the switch interfaces, VLANs, and RADIUS settings to communicate with CPPM.
2. Creating 802.1x, MAC authentication, and DACL enforcement profiles in CPPM.
3. Associating the profiles in CPPM services and testing authentication of devices.
The document is a presentation on ClearPass Policy Manager from Aruba Networks. It discusses ClearPass authorization and profiling capabilities, how the policy model works, and considerations for deploying ClearPass in a clustered configuration. The presentation covers authorization sources, using device profiling data in policies, network requirements for profiling, ClearPass clustering technology, and operations of clustered ClearPass deployments. It provides use cases around authorization, device profiling, and ClearPass clustering.
This document provides an overview and agenda for an Aruba Networks workshop on enabling bring your own device (BYOD) programs using ClearPass Onboard for policy-based device onboarding and provisioning. The agenda covers planning a BYOD policy, configuring ClearPass Onboard settings like the certificate authority and network settings, the user experience of the onboarding lifecycle, and troubleshooting. It also discusses topics like detecting BYOD devices, building a BYOD policy, the onboarding workflow and architecture, integrating with mobile device management (MDM) systems, and deploying onboarding in different network configurations.
This document summarizes a presentation on practical cryptography, certificates, and 802.1X. It begins with an overview of cryptography basics like symmetric and asymmetric encryption. It then covers public key infrastructure concepts such as certificates, certificate authorities, and how they establish trust. The presentation concludes by explaining how certificates and cryptography are used together to enable 802.1X authentication.
Practice makes perfect - let's get together to walk through the Aruba ClearPass product in real-time to better understand all the configuration, monitoring and reporting options available. In this session you will be able to gather practical knowledge on how to use Clearpass features such as Single Sign-On (SSO), TACACS+, RADIUS return attributes and more.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
The document discusses Aruba's eSupport project which includes enhancing the Airheads community experience by integrating the support site, community, and partner center. It also discusses upcoming solutions like the Solutions Exchange for pre-building sample configurations and mentions the release of AOS 6.2.1.2. Various wireless issues and troubleshooting techniques are then covered such as reducing channel busy, fixing low SNR, and new troubleshooting tools in AOS 6.3 like client packet capture. Reminders are provided about resources such as the TAC quick reference guide, validated reference designs, and raising a support ticket.
The document outlines an agenda for an Aruba Networks workshop on advanced ClearPass network security. The agenda includes sections on using ClearPass for wired and wireless network access control (NAC), TACACS+ device authentication, and bringing your own device (BYOD) integration using Onboard for certificate provisioning. Monitoring and troubleshooting ClearPass deployments is also discussed.
The document discusses the migration of the University of San Diego's wireless network from Aruba AP 125, 135, and 175 controllers to Aruba 7200 series controllers. It provides an overview of the university and current wireless network statistics. It then outlines the requirements, pre-migration steps, and migration process for the controller upgrade. This includes backing up configuration, licenses, and wireless data from the existing controllers before and after a software upgrade. The new 7200 controllers would then be configured and licensed before cutting over the network.
This document provides an overview of advanced RF troubleshooting techniques for WiFi networks. It discusses various tools that can be used, including spectrum analysis tools, heatmaps, site surveys, and understanding client network interface cards. It also covers performance testing using tools like iperf, packet capture techniques, and examples of useful commands in the Aruba controller CLI for troubleshooting issues.
This document discusses Aruba's Mobility Switch Security Architecture and products. It provides an overview of the Aruba S3500 and S2500 Mobility Access Switches, including their capabilities and features. Key points include their support for role-based user access policies through integration with ClearPass Policy Manager, as well as their ability to tunnel traffic to an Aruba Mobility Controller for centralized policy enforcement. The document also covers how user roles can be implemented through traditional AAA services or user derivation rules based on attributes like MAC address OUIs or DHCP fingerprints.
The document discusses best practices for securing wireless networks. It recommends using a centralized wireless architecture with a mobility controller for better visibility and control. It emphasizes the importance of detecting and containing rogue access points, controlling uncontrolled wireless devices, using WPA2 encryption with 802.1x authentication, and implementing network access control with identity-based policies and health assessments to authorize devices and enforce security.
The document discusses planning for high-density wireless LANs in large public venues. It provides an overview of key terminology used for planning these types of networks, such as facility capacity, maximum device count, associated device count, and active devices. The document also outlines a process for planning and capacity analysis, including estimating the expected number of associations, active devices, and uplink bandwidth needs per access point based on factors like the number of seats in each section. An example spreadsheet is provided showing the results of applying this planning methodology to an event venue divided into sections.
The document is a presentation on network design fundamentals by Andy Logan from Aruba Networks. It discusses the wireless LAN lifecycle including requirements definition, site surveys, network design, RF design, security design, quality of service design, staging and provisioning, installation and validation, administration, monitoring, and troubleshooting. It provides information on validated reference designs, defining mobility requirements, conducting site surveys, mounting access points, network and controller deployment, remote access solutions, and operating the network including monitoring, troubleshooting, and the full wireless LAN lifecycle.
The document discusses features and capabilities of the Aruba AirWave network management platform. It covers how data flows into AirWave from controllers and devices, advanced monitoring features like application visibility and Lync monitoring, visualization of network performance data on floor plans, improvements to the user interface, ways to configure devices and controllers through AirWave, and serviceability features like backups.
The document discusses Aruba Instant for providing remote networking capabilities. It outlines the challenges of deploying and managing remote networks, and describes how Aruba Instant addresses these challenges through features like zero-touch provisioning, centralized management, fast failover, and VPN connectivity with advantages over conventional solutions. The presentation agenda includes applications and verticals served, requirements and challenges, and details on Aruba Instant's architecture and components.
This document provides an overview of 802.11ac Wi-Fi fundamentals including:
- 11ac extends 11n by introducing wider channels up to 160MHz, better modulation up to 256-QAM, and more streams up to 8.
- 11ac supports both 5GHz and wider channel widths which enable significantly higher data rates compared to 11n.
- Dynamic bandwidth management allows 11ac devices to utilize channel widths between 20MHz and 160MHz to optimize performance and coexistence with other networks.
The document provides tips for troubleshooting and optimizing Aruba wireless networks. It discusses segmental troubleshooting of users, APs, controllers and processes. It also covers optimizing AP stability, system profiles and load on processes. Additionally, it provides guidance on datapath debugging, deployment tips and using the Aruba Support Assistant (ASE) for troubleshooting.
The document provides an overview of considerations for implementing an all-wireless workplace including wireless devices, wireless office requirements, RF considerations, high availability, broadcast suppression, and visibility. It discusses topics such as channel planning, client matching, data rates, channel width, controller redundancy, broadcast domain segmentation, and application visibility solutions from Aruba Networks. The document also promotes Aruba Solution Exchange (ASE) as a tool for generating wireless network configurations.
This document provides an overview and summary of Aruba wireless LAN fundamentals and design topics, including:
- Mobility controller and Aruba Instant architectures.
- Remote AP (RAP) and RAP-NG/IAP-VPN technologies for distributed deployments.
- Management platforms like Aruba Central and AirWave.
- Deployment types including mobility controller with master-local, Instant, and hybrid models.
- Campus redundancy, high availability, and forwarding modes.
This document provides an overview and refresher on key concepts in 802.11 wireless networking, including:
- Wireless communications fundamentals like how channels work and the importance of avoiding co-channel interference
- Factors that impact wireless performance like available channels, channel widths, transmit power levels, and signal to noise ratios
- How lower signal to noise ratios can cause clients to downgrade their data rates, impacting overall channel performance
- A brief discussion of access point planning and placement as well as client roaming behaviors
This Solution Guide describes best practices for implementing an Aruba 802.11 wireless network that supports thousands of highly mobile devices (HMDs) such as Wi-Fi phones, handheld scanning terminals, voice badges, and computers mounted to vehicles. It describes the design principles particular to keeping devices that are in constant motion connected to the network as well as best practices for configuring Aruba Networks controllers and the mobile devices. The comprehensive guide addresses six areas of network planning to ensure a high quality of service for roaming data and voice sessions: device configuration, airtime optimization, roaming optimization, IP mobility configuration, IP multicast configuration, and interference resistance. A detailed troubleshooting section covers common issues that arise with these types of WLANs.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
This document provides an overview of 802.11 wireless frames and packet analysis. It discusses the different types of 802.11 frames including management, control, and data frames. It also describes using packet captures and analysis to troubleshoot common wireless issues like slow performance, client disconnects, and application issues. Interpreting information in frames like retry counts, NAV values, and null frames can help identify problems. Understanding the layers of the wireless protocol including LLC, MAC, PLCP and PMD is also important for packet analysis.
The document provides an overview of HPE's campus switching portfolio and strategy. It discusses the ArubaOS-Switch software that powers HPE's switches, deployment models, HPE Smart Rate technology, and an overview of the product portfolio including the Aruba 5400R, 3810, 2920, and 2530 switch series. Integration with Aruba's wireless, SDN, and management solutions is also covered.
This document provides an overview of Aruba ClearPass and its access management capabilities. It discusses ClearPass' policy model and how it uses context such as identity, device, and location to enable granular, role-based access policies. It covers ClearPass' authorization features and how it profiles devices to incorporate that data into policies. The document also reviews ClearPass clustering functionality and considerations for deployment and operations.
The document discusses Aruba's policy enforcement firewall. It describes how the firewall uses roles, policies, and rules to control network access and apply security policies based on user, device, and application attributes. Key capabilities include identity-based access control, application awareness, dynamic policy assignment, blacklisting of devices, and quality of service tagging for prioritization of real-time traffic like voice and video. The firewall can be used to securely control both wireless and wired network access.
This document provides an overview of wireless LAN security fundamentals, including cryptography, certificates, and 802.1X authentication. It begins with a cryptography primer covering symmetric and asymmetric encryption, hash functions, digital signatures, and key concepts. It then explains public key infrastructure (PKI) and the role of certificates in establishing trust between parties. The document concludes by describing how 802.1X authentication utilizes Extensible Authentication Protocol (EAP) and PKI to authenticate users before granting them network access.
Don't matter how many WLANs have you implemented and the installation guides that you read: AirHeads can always teach you something, and (only for Eng.) in a funny way.
Real effective.
Thanks Blake.
The document summarizes internet connectivity metrics for various regions in the first quarter of 2014. In the Americas, the United States had the highest average connection speed of 10.5 Mbps, while Uruguay had the highest peak speed of 45.4 Mbps. In EMEA, Switzerland had the highest average speed of 12.7 Mbps, while Romania had the highest peak speed above 50 Mbps. In Asia-Pacific, South Korea maintained its lead with average speeds, while Australia had the peak speed of 114.2 Mbps.
The Aruba Mobility Access Switch family of products provides various features including voice VLAN, Link Layer Discovery Protocol – Media Endpoint Discovery (LLDP-MED), and Quality of Service (QoS) to enable successful deployment of VoIP in enterprise networks. This application note addresses traditional techniques and introduces new device-aware support to deploy VoIP phones. This document is intended for all system engineers and network administrators who are deploying a VoIP solution in an enterprise network.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
The document provides 10 tips from Aruba Technical Assistance Center engineers for opening and resolving support tickets, including checking online resources before opening a ticket, being prepared with necessary logs and information, and understanding common issues and configurations related to products like AirWave, Amigopod, upgrading controllers and RAPs, and client connectivity problems. It offers explanations and recommendations to avoid delays in resolving support cases.
Wireless Controller Comparative Performance Cisco vs Aruba Miercom ReportCisco Mobility
The document compares the performance of wireless controllers from Cisco and Aruba. Key findings include:
1. The Cisco 8540 delivered over twice the throughput of the Aruba 7240 with small and medium packet sizes as well as mixed packet sizes.
2. The Cisco 5520 and 8540 were able to utilize a higher percentage of their maximum bandwidth (85-95% for Cisco vs. 25-30% for Aruba) across packet sizes.
3. Testing found the Cisco 5520 could handle over 3 times as many wireless client authentications per second compared to an older Cisco model, using the 802.1X authentication standard.
4. TCP throughput performance was notably better with Cisco than
In centralized Aruba WLAN deployments, the mobility controller is the heart of the network. The controller operates as a stand-alone master, or in a master-local cluster. Aruba provides several redundancy models for deploying mobility controllers. Each of these options, including the choice to forgo redundancy, must be understood so that the correct choice can be made for each deployment model.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
Point-to-point (PTP) wireless connections have many use cases including linking buildings on university campus, creating connections between offshore oil rigs, and eliminating the need to pull fiber cable between buildings on opposite sides of a busy road. This guide will help you select the right hardware platform (including both the AOS-based AP-175 and Aruba¹s new AirMesh products; Choose appropriate antennas and accessories; Identify and overcome some of the most common outdoor installation challenges; Set up and configure the Aruba solution.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
The document describes an Aruba Mobility Access Switch workshop held on December 10th and 12th, 2014. It provides an overview of the Aruba Mobility Access Switch family, including the S3500, S2500, and S1500 series switches. The switches provide role-based access control, policy enforcement, and integration with other Aruba products for unified wired and wireless access. Key features include PoE, stacking, security, and management capabilities.
The document provides an overview of the ClearPass access management solution. It discusses ClearPass basics like controlling access, advanced features, device profiling, and guest access workflows. ClearPass provides a consolidated solution for network access control, device management, and application security through features like profiling, role-based policies, guest management portals, and integration with mobile device management.
The document discusses Aruba's solutions for deploying remote and branch networks. It covers the challenges of deploying remote networks, Aruba Instant for private WAN deployments, Aruba Instant-VPN, and management and zero-touch deployment. Aruba Instant provides scalable, self-optimizing, and self-healing wireless access for remote offices and branches. Aruba Instant-VPN allows secure connectivity over the WAN for remote networks using IPsec VPN tunnels. Management tools like AirWave and Aruba Central enable centralized monitoring and zero-touch provisioning of remote network devices.
Aruba AirWave is a network management platform that can manage Aruba wireless networks, controllers, access points, and other network devices. It collects data from these devices using protocols like SNMP and syslog and presents the data in customizable dashboards and reports. It provides visibility into network and client performance, RF interference and capacity, and application usage. The latest version of AirWave features an improved HTML5-based user interface, multi-server scalability for networks with thousands of devices, and enhanced configuration, troubleshooting, and provisioning capabilities.
Aos & cppm integration configuration & testing document for eap tls & eap ...Abilash Soundararajan
The document discusses the configuration and testing of EAP-TLS and EAP-PEAP authentication with termination on both the Aruba Central Policy and Policy Manager (CPPM) and the Aruba wireless controller. It provides step-by-step instructions on setting up digital certificates, authentication policies and services on the CPPM and wireless controller configuration for user authentication via EAP-TLS and EAP-PEAP. Troubleshooting tips are also included to help with failed authentication attempts.
Printing and projecting with smartphones and tablets on large scale Wi-Fi networks are not as easy as it sounds. Relying on technologies such as DLNA and Apple Bonjour, these tasks require policy control across many different locations, for different sets of users. For instance, what do you do when your guest user tries to access an Apple TV installed in your meeting room? Join us to answer more of these questions in this session.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
This document discusses BYOD strategies and technologies such as MDM and MAM. It provides an overview of challenges posed by BYOD and options for policy enforcement including NAC, MDM, and MAM. The rest of the document details how to build a BYOD policy, the onboarding workflow for mobile devices, methods for detecting BYO devices, and how MDM can be integrated to help manage both corporate and personal devices on the network.
The document discusses Aruba's Mobility Access Switch portfolio and provides an overview of its capabilities. It describes the different switch models (S3500, S2500, S1500), their features such as PoE support, stacking, and uplink options. It also covers role-based access policies, integration with ClearPass for policy enforcement, and zero-touch provisioning using Aruba Activate and AirWave management.
AirWave lets IT manage the application and device experience on several generations of multi-vendor networks. Join us in this session to learn more about how you can use AirWave to improve RF troubleshooting, inventory management, custom network management alerts and reports, wireless security compliance, real-time RF visualization and location tracking for your wireless LAN.
To learn more, visit us at http://www.arubanetworks.com/wlan. Join the discussion at https://community.arubanetworks.com
This document outlines an agenda for an AirWave workshop. The agenda includes discussions of how AirWave can provide end-to-end visibility, integrated threat management, troubleshooting tools, and reporting for wireless and wired networks. It also covers best practices for organizing devices in AirWave groups and folders, configuring AirWave integration, and using AirWave to monitor networks, detect rogues, perform RF analysis and helpdesk support. New features for version 7.6 including additional monitoring, troubleshooting and reporting capabilities are also highlighted.
Aos & cppm integration & testing document for eap tls & eap peapJulia Ostrowski
The document discusses the configuration and testing of EAP-TLS and EAP-PEAP authentication between an Aruba controller and CPPM authentication server. It provides step-by-step instructions on setting up EAP-TLS and EAP-PEAP when the EAP tunnel is terminated on the CPPM server or Aruba controller. Troubleshooting tips are also included such as ensuring the correct certificates, authentication methods and services are configured on the controller, CPPM and client devices.
The document discusses Aruba ClearPass network access control solutions. It describes the ClearPass virtual appliance options that support up to 25,000, 5,000, or 500 endpoints. It also outlines the ClearPass license options for access control, onboarding, health checking, and guest portal customization. Finally, it provides definitions of the ClearPass publisher/subscriber clustering model and discusses requirements for a Flex-N-Gate network design.
This document discusses the need for adaptive trust security policies to address challenges from increased enterprise mobility and BYOD trends. It promotes the Aruba ClearPass policy management platform as a solution. ClearPass provides centralized identity management, device profiling, and context-aware access policies. It can integrate with firewalls, MDM solutions, and other security tools to enable adaptive, risk-based access control based on user, device, app, and location attributes. ClearPass supports a range of use cases including secure BYOD access, differentiated guest access, and migration from AAA to context-based policy models.
The document discusses service meshes and Consul. It provides an overview of smart networking principles like service discovery, identity, authorization and encryption between services. It describes how a service mesh like Consul separates the control plane and data plane. The control plane handles configuration and policy while the data plane handles traffic routing. The document outlines Consul's architecture, usage and capabilities like service discovery, configuration and segmentation. It also previews exercises on exploring Consul's service discovery, KV store and service mesh features.
The document discusses wireless LAN security fundamentals including cryptography concepts like symmetric and asymmetric encryption, hashing, digital signatures, and public key infrastructure (PKI). It then describes how these concepts are applied in the 802.1X authentication process to securely authenticate users and grant them network access.
Securing BYOD with Palo Alto & Aruba: BYOD is driving an extensive change in the way that organizations design their networks and deploy security. With BYOD, the organization faces the task of securing devices that may not even be owned or managed by the company. As a result, the organization must secure the network and apply policy based on who is accessing their applications and what device they’re using. In this session, learn about how to build a more secure wireless environment through the adoption of “Zero Trust” principles at the access layer.
In this session, join Brian Tokuyoshi, senior product manager from Palo Alto Networks, to learn about how to integrate Aruba wireless infrastructure and Palo Alto's next-generation security platform. Please comment on what you think about the session and anything specific you would like us to cover. For more please visit http://community.arubanetworks.com
The document discusses design considerations for deploying voice and video over Wi-Fi networks. It covers challenges like ensuring sufficient bandwidth and quality of service. It also describes Aruba's solutions for addressing these challenges, such as application-aware radio management to optimize bandwidth, voice-aware firewalls and scanning to prioritize calls, and load balancing to smoothly handle roaming calls. The overall goal is to assure quality for real-time multimedia applications on the wireless network.
How Enterprises will Benefit from SDN Shashi Kiran
This document discusses how software defined networking (SDN) can help enterprises by providing three key benefits: increased automation and agility, improved efficiency, and better visibility and control. It outlines some of the challenges of traditional network models, such as complex provisioning and troubleshooting. SDN is presented as a solution to capture user intent through application-centric policies that separate applications from the underlying IP infrastructure. Examples of Cisco's SDN approach and products are provided.
Slides from the October Oracle Middleware Forum held in Canberra, Australia. Covers API Gateway and how it can be used in an organisation. For more information, check out our blog at http://ofmcanberra.wordpress.com
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...CA Technologies
CA Single Sign-On (CA SSO) is constantly evolving, incorporating the latest technologies in secure Web access management. In order to stay secure and competitive, CA SSO makes greater use of the CA Access Gateway (formerly CA SiteMinder Secure Proxy Server). This presentation provides a comprehensive overview of the new features in CA Single Sign On.
For more information on CA Security solutions, please visit: http://bit.ly/10WHYDm
Similar to Access Management with Aruba ClearPass #AirheadsConf Italy (20)
Aruba Central user may need a centralized web-server to host captive portal page for their distributed networks across the globe like coffee shops, restaurant or hotels. Aruba central 2.0 has a new feature called Cloud Guest or Guest Management that allows administrator to create a splash page for guest users using Web server and radius server running in the cloud.
Check out the webinar recording where this presentation was used:
https://community.arubanetworks.com/t5/Cloud-Managed-Networks/Airheads-Tech-Talks-Cloud-Guest-SSID-on-Aruba-Central/td-p/524320
ClearPass OnGuard agents perform endpoint posture assessment and ensure that compliance is met before granting access to the network. This session will cover the ClearPass OnGuard Agent components and work-flow in detail.
Check out the webinar recording where this presentation was used:
https://community.arubanetworks.com/t5/Security/Airheads-Tech-Talks-Understanding-ClearPass-OnGuard-Agents/td-p/524288
Clustering is a new feature introduced in AOS 8.0 that enables seamless roaming of clients between APs, hitless client failover and load balancing of users across Mobility Controllers in the cluster. This solution provides the configuration required to create a cluster of Mobility Controllers that are managed by the same Mobility Master.
Check out the webinar recording where this presentation was used:
https://community.arubanetworks.com/t5/Wired-Intelligent-Edge-Campus/Airheads-Tech-Talks-Advanced-Clustering-in-AOS-8-x/td-p/506441
During this presentation, we will cover a deep dive into Aruba Central and its features. Check out the webinar recording where this presentation was used:
https://community.arubanetworks.com/t5/Cloud-Managed-Networks/Technical-Webinar-Advance-Aruba-Central/m-p/496064
During this webinar, we will cover AppRF - a suite of application visibility and control features that are part of Aruba's Policy Enforcement Firewall. AppRF is a PEF feature that is designed to give network administrators insight into the applications that are running on their network, and who is using them. Check out the webinar recording where this presentation was used:
https://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-Aruba-AppRF-AOS-6-x-amp-8-x/td-p/490800
This document discusses ArubaOS switch stacking, including:
- Backplane stacking allows connecting multiple switches together to simplify operations and optimize uplink usage.
- Topologies supported are chain, ring, and mesh, with ring and mesh recommended for redundancy.
- Key functions of stacking include topology discovery, electing a commander and standby, managing members, and handling splits.
- Specific switch models like the 3800 and 2900 series support backplane stacking of up to 10 units in ring topology with stacking throughput of up to 160Gbps.
In this presentation, we will discuss how IEEE standard 802.3ad and its implications allow third-party devices such as switches, servers, or any other networking device that supports trunking to interoperate with the distributed trunking switches (DTSs) seamlessly. Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wired-Intelligent-Edge-Campus/Technical-Webinar-LACP-and-distributed-LACP-ArubaOS-Switch/td-p/458170
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
In this presentation, e will discuss AirWave 10, a new software build that lets us streamline code, add performance, clustering. Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Network-Management/Technical-Webinar-Introduction-to-AirWave-10/td-p/454762
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
In this presentation, we will discuss how Virtual Switching Framework (VSF) allows supported switches connected to each other through Ethernet connections (copper or fibre) to behave like a single chassis switch. Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Controllerless-Networks/Technical-Webinar-Virtual-Switching-Framework-ArubaOS-Switch/td-p/445696
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
In this presentation, we will cover the Central platform which provides a standard Web-based interface that allows you to configure and monitor multiple Aruba Instant networks / Switches from anywhere with a connection to the Internet. Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Cloud-Managed-Networks/Technical-Webinar-Aruba-Central-with-Instant-AP/td-p/429366
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
In this presentation, we will discuss how AirGroup configurations have changed to support hierarchical configuration in release 8.2. AirGroup configs will now be profile based and can be applied at any node. Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-AirGroup-profiling-changes-across-8-1-amp-8-2/td-p/417153
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
In this presentation, we will explore the RESTApi as the ClearPass API integrations and further developments are more focused to RESTApi than the other existing API services like xml-rpc, SOAP, etc.Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Security/Technical-Webinar-Getting-Started-with-the-ClearPass-REST-API/td-p/410214
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
During this webinar, we will discuss how starting from ArubaOS 8.2.0.0, selected APs can run in both controller-based mode and controller-less mode and the implications tied to that. Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-AP-Discovery-amp-Deployment-Policy-ArubaOS-8-x/m-p/394540/
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
In this presentation, we will discuss the L3 Redundancy Requirement which primarily comes from customers who want to handle the complete Data Center Failure during natural disasters or other catastrophic events. Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-Layer-3-Redundancy-for-Mobility-Master-ArubaOS/td-p/382029
Register for the upcoming webinars: https://community.arubanetworks.com/t5/Training-Certification-Career/EMEA-Airheads-Webinars-Jul-Dec-2017/td-p/271908
This document discusses managed device deployment at branch offices using Aruba branch controllers. It provides an overview of how branch controllers connect to a master controller via an internet modem and establish communication. It also covers branch controller and VPN concentrator configuration in Aruba OS versions 6.x and 8.x, including initial setup, zero touch provisioning, and debugging tools. Additional topics include address pool management for VLANs, tunnels, NAT, and DHCP to allow for dynamic IP assignment at branch office deployments.
The existing channel and power assignment functions in ARM support channel scanning, channel assignment and power adjustments, locally. Decisions are made locally at the AP without looking at the entire network. Thanks to the dynamic machine learning techniques, AirMatch centralises this function in the Mobility Master while dynamically learning the network and adapting the RF planning for the entire network. Check out the webinar recording where this presentation was used: http://community.arubanetworks.com/t5/Wireless-Access/Technical-Webinar-Recording-Slides-What-does-AirMatch-do/td-p/314413
This document provides an overview and introduction to the Aruba 8400 switch, which is designed for campus core and aggregation applications. It describes the hardware architecture including line cards, management modules, fabric modules, and power supplies. It also discusses the software architecture of ArubaOS-CX running on the 8400 and its high availability, programmability, security, and analytics capabilities. Example deployments of the 8400 as a campus core and aggregation solution are shown.
These slides were used during our Airheads Meetup Event at Jaarbeurs Utrecht on October 27th 2017.
If you have ideas, new speaker topics and recommendations for the events, please help us to improve for next year’s event by commenting on the community page: http://community.arubanetworks.com/t5/Wireless-Access/Airheads-Technical-Event-The-Netherlands-October-27th-2017/m-p/313566#M75870
These slides were used during our Airheads Meetup Event at Jaarbeurs Utrecht on October 27th 2017.
If you have ideas, new speaker topics and recommendations for the events, please help us to improve for next year’s event by commenting on the community page: http://community.arubanetworks.com/t5/Wireless-Access/Airheads-Technical-Event-The-Netherlands-October-27th-2017/m-p/313566#M75870
These slides were used during our Airheads Meetup Event at Jaarbeurs Utrecht on October 27th 2017.
If you have ideas, new speaker topics and recommendations for the events, please help us to improve for next year’s event by commenting on the community page: http://community.arubanetworks.com/t5/Wireless-Access/Airheads-Technical-Event-The-Netherlands-October-27th-2017/m-p/313566#M75870
More from Aruba, a Hewlett Packard Enterprise company (20)
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Infrastructure Challenges in Scaling RAG with Custom AI modelsZilliz
Building Retrieval-Augmented Generation (RAG) systems with open-source and custom AI models is a complex task. This talk explores the challenges in productionizing RAG systems, including retrieval performance, response synthesis, and evaluation. We’ll discuss how to leverage open-source models like text embeddings, language models, and custom fine-tuned models to enhance RAG performance. Additionally, we’ll cover how BentoML can help orchestrate and scale these AI components efficiently, ensuring seamless deployment and management of RAG systems in the cloud.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
The introduction of Wi-Fi enabled smart phones and tablets has changed the dynamics for rolling out new user devices and services. IT no longer has the ability to qualify which device a user receives, pre-configure them with work and security apps, and monitor their use.
Personal devices are the new norm and successful deployments of new services like BYOD are gauged by days, not months. Other factors include the number of helpdesk calls and how happy the users are.
With the speed in which devices are introduced, refreshed and replaced, lets look at some new IT issues that is faced with.
To eliminate silos Aruba ClearPass is designed to deliver user and device visibility, automated workflow services and policy management enforcement all from a single platform.
Built-in device profiling provides a comprehensive picture of what’s connecting to the network which makes it simple to differentiate access for BYOD and IT managed devices. Real-time troubleshooting tools help IT create policies that work and also solve connectivity issues. For example, an access dashboard and per session logs allow IT to easily see why a user had a problem without having to peruse lengthy log databases.
To help off-load IT, ClearPass includes automated features that allow users to self-provision personal devices and register media sharing devices like an Apple TV or just a printer. ClearPass Guest lets visitors self-register or sponsors can create credentials that automatically expire. Device management services extend MDM capabilities with network control and enforcement. A built-in CA can be used to distribute and manage device specific certificates. User can even re-install or revoke certificates for lost or stolen devices.
The policy component brings it all together by allowing organizations to create granular policies for Aruba and multivendor Wi-Fi, wired and VPN networks. A role-based model allows you to assign and differentiate access by user, device and other contextual attributes like location, job function and device ownership. All this from a single pane of glass.
All of the features just described are delivered as hardware or virtual appliances that can authenticate up to 500, 5000 and 25000 unique devices per week. ClearPass is also unique in that the base appliance includes our entire feature set – RADIUS and TACACS services, policy engine, identity broker features, as well as each of the add-on modules in the form of a starter bundle for Guest, Onboard, OnGuard and WorkSpace.
The add-on modules are expandable per use case which means that customers with 100 guests per week only need to license for that amount. The same goes for onboarding personal or BYO devices. They’re not required to purchase advanced licenses or features they won’t use.
Other customer benefits include the ability to create policies that query multiple identity stores, connect multiple active directory domains, leverage external MDM solutions and work in Wi-Fi, wired and VPN environments. Again without purchasing special licensing.
User authentication attempt with jail broken device
ClearPass quarantines device via RADIUS
Using RESTful API, ClearPass automatically creates trouble ticket in ServiceNow including:
User ID
MAC address
Device type
Location
Email sent to helpdesk staff
ClearPass provides added value as a combination of contextual attributes can be used to create very granular policies in networks where multivendor and Aruba Mobility Controllers are deployed. While permit/deny and VLAN enforcement is supported for non-Aruba equipment, ClearPass lets organizations create enforcement rules that take advantage of Aruba’s role-based enforcement features. Policies can be written that take advantage of per user firewalls and optimization for voice and video applications.
Context can be used to differentiate employee access by device type and OS if needed. For example, Guest policies can be written that limit access to week days and not weekends. Or executives can be given full access for smart phones, while employees can be restricted to the Internet when using mobile devices.