Hello All,
I was hoping someone might know if there are any web based virtual controller solutions for older access points such as a msm310, msm320, and a ProCurve Access Point 530. I was hopinig there might be something akin to Arubas Instant VCs.
Hello All,
I was hoping someone might know if there are any web based virtual controller solutions for older access points such as a msm310, msm320, and a ProCurve Access Point 530. I was hopinig there might be something akin to Arubas Instant VCs.
Hi,
All HP MSM access points can work in autonomous mode, and can also be managed by any HP MSM controllers and the HP RF Manager for the RF security sensors, As far as I know there is no virtual controller solution. Alternatively you may consider Aruba APs.
Hi there,
I am having trouble setting up my guest WIFI on my MSM760.
I have set up a guest SSID that uses HTML based logins. This works totally fine, however all traffic on my proxy shows as the MSM760's internet port IP address. I would like this so i can see the IP address that is associated with the device. So we can track web filtering on our proxy.
Current setup:
Interfaces: Internet port IP: 10.10.1.15 mask 255.255.0.0
LAN port IP: 10.140.1.1 mask 255.255.0.0
Guest VLAN: 140
DHCP server config (on the MSM)
IP: 10.140.0.1 - 10.140.11.184
GW 10.140.1.1.
I believe this is a problem on the NAT on the interner interface, but i cant seem to get internet once i untick this. Any help would be great!
Thanks.
I have been getting this browser security issue when trying to login to the msm720 controller, the work around is to use an older verson of firefox browser and to login with out security block, so I was going to upgrade the firmware. I was wondering if I can upgrade from 5.7.1.1 to 6.0.x without any issues. I have all the maintence updates from 6.0.x up to 6.6.x so was wondering if I can jump with this unit msm720 with firmware 5.7.1.1-12533 and go to 6.0.x?
my concern is if I attempt to go to it, and it bombs I don't have any 5.7.x firmwares to revert back to.
thanks
sincerely
Vaughn Bender
Are you delivering your IP's to your Access points via Dhcp? If so consider this info and make sure you have this in DHCP on your Windows Srvr
https://support.hpe.com/hpsc/doc/public/display?docId=mmr_kc-0132602
Vaughn
We have 8 MSM422 and I have no problems with the AP perfomance but there is an open SSID from the same network. Let me be more clear:
My SSID is Mynetwork and is secured with password but also I have a open SSID from Mynetwork and it have access to my network files and to the Internet.
I have not found any option where to disable this open SSID.
Anyone have any idea?
Thanks in advance
Luis
Hi,
My MSM760 support only 40 APs , when i asked they told me end of sale. so any way to upgrate without replace with new model to support 100 APs .
Thanks,
Anyone at all?
Hi foxano,
There may be two ways to get more accesspoints on msm760.
1. Buy another msm760 and team them together. The controllers share licenses so you could get 80x accesspoints, BUT I am not sure if the default 40x ap licenses are shared. Just remember you will loose all over 40x if one controllers dies.
2. Search Google for "buy hp msm licences". I found some places with "In Stock", so you may be lucky.
I have 5x MSM760 controllers with 500x MSM460/560 which we are slowly moving over to Aruba APs (325s). They have built in controllers which work very well. So I have one "controller" per building at the moment, and was way easier than MSM controller to implement.
Regards,
Craig.
Hi there, I hope someone can assist me with getting up a SSID with my MSM760.
I have many SSIDs which are all for seperate VLANs.
When i set these up to just authenticate on WPA2, i get an IP on the right subnet and everything works - We have a proxy which have 3 DHCP servers on that gives the relevant leases. However when i tick the Access Control so i can authenticate with 802.1x, it authenticates fine but i get no IP address. I have looked everywhere and can't seem to find why this is happening.
If you need any more information about the VLANs please let me know.
Thanks.
Hi, I did this on my MSM765. Now FW 6.6.8.2-23491, but this was some years back
You will need to create an extra IP interface and vlan to egress the traffic out to your proxy or firewall.
Add the egress VLAN, and IPv4 interface under Controller/Network/Interfaces - give it an ip address. My egress vlan is just a pipe with 2 address, 1 on each end, so I use .1 on the controller, and .254 on the firewall where I dump the guest traffic and NAT out to the internet.
Make the egress vlan available on any switches between the controller and the destination. My firewall is the destination where I NAT the traffic out. Yours will be on the proxy server.
On the VSC, use the VSC Egress Mapping to send the traffic you want to the egress vlan. I send all (unauth, auth and intercepted) to the egress.
The traffic will have the source addresses 10.140.0.* assigned by the DHCP server on the VSC. You will need to route return traffic headed back 10.140.0.0 to the interface on the other end of the EGRESS vlan (.1 in my case) which is on the MSM
Hope this helps
Authenticate sends just the authentication request back to the controller, and then after authentication, responds to the AP and the traffic is then put onto the network at the switch the AP is connected to.
Access control sends all the traffic back to the controller through a tunnel, so traffic then has to leave via the controller ports. Unless you egress the traffic to your vlans with DHCP server on them not going to get an address
But you don't need to use access control to use 802.1x authentication - this can be set on the controller VSC by checking the 802.1x section. You could use the AD authentication but if you want to specify user vlan as well, use a RADIUS server to send the VLAN back as a parameter. In my case I have one SSID and can set VLAN by user group memebership or other access parameters.
Setup a radius profile to define the server and authentication method (most likely mschapV2)
Then check 802.1x authentication, remote and specify the RADIUS profile.
Unless you need to tunnel (encrypt) the traffic back to the controller, its more efficient to just authenticate and dump the traffic local to the AP
Hi
I have three SSID for employee ; students and guests
How can let users to authenticated from active directory
Hi,
the firmware of the MSM760 is 6.6.5
The expiration date of this Certification Autority is soon.
How to update it?
what trouble will appear if it isn't updated ?
BR
Pascal
I'm in the same boat.
Update: Found link
>>Download the new certificate from the software download site for your products on MyNetworking Portal
ITS NOT THERE!? And I checked the other affected hardware.
JOINING YOUR MSM TO THE ACTIVE DIRECTORY DOMAIN.
Enter Controller - Authentication - Active Directory.
In General - Device Name place any name (only descriptive name).
In General - Domain NetBIOS name place LAILAH. (one)
In General - Windows domain place lailah.local. (two)
In Join - Username, place a user administrator of the domain.
In Join - Password, enter the password of the administrator of the domain entered in Username:
or Username: administrator
o Password: password
Click on the Join Realm Now button, The Status should indicate Joined.
Click on Save.
Enable Active Directory authentication on the VSC.
Create a VSC - AD_Employed.
Login to VSC: VSC profiles and click Add new VSC profile.
It present on "My Networking" -> "My Software" -> "Other"
Hi
I have installed it, now all is green.
Thank you,
Pascal
New_Angel,
It wasn't listed till a case was created. *cough by me*
Jeff
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----