•HiveAP management traffic for CAPWAP, SNMP monitoring and notifications, and SCP configuration, captive
web portal file, and HiveOS firmware uploads to managed HiveAPs
When you enable both interfaces, HiveManager management traffic uses the MGT interface while HiveAP
management traffic uses the LAN interface, as shown in Figure2.
Figure 2 Using Both MGT and LAN Interfaces
пртптктпо
᫬»®
пртптнтрсом
пртптмтрсом
пртптлтрсом
³«´¬·°´» Ø·ª»ßÐ-ò
ÔßÒ
пртптптисом
ÓÙÌ
пртптотисом
Ø·ª»Ó¿²¿¹»®
ß¼³·²
пртптйтнм
Static Routes: HiveManager sends traffic destined for 10.1.6.0/24 to 10.1.2.1.
HiveManager sends traffic destined for 10.1.7.0/24 to 10.1.2.1.
Default Gateway:10.1.1.1 (HiveManager sends traffic here when there are no specific routes to a destination.)
Note: To set static routes after you log in to the GUI, click HM Admin > HiveManager Settings > Routing >
Add, set the destination IP address/netmask and gateway, and then click Apply.
When only the MGT interface is enabled, both types of management traffic use it. A possible drawback to this
approach is that the two types of management traffic cannot be separated into two different networks. For
example, if you have an existing management network, you would not be able to use it for HiveManager
management traffic. Both HiveManager and HiveAP management traffic would need to flow on the operational
network because HiveManager would need to communicate with the HiveAPs from its MGT interface (see
Figure3). However, if the separation of both types of traffic is not an issue, then using just the MGT interface is
Default Gateway:10.1.1.1 (HiveManager sends all traffic to the default gateway.)
ÍÝÐ Í»®ª»®
пртптктпо
³«´¬·°´» Ø·ª»ßÐ-ò
8.After you finish configuring the network settings, return to the main menu, and reboot the HiveManager
appliance by entering 5 (5 Reboot HM Appliance).
You can now disconnect the serial cable.
80Aerohive
INSTALLINGAND CONNECTINGTOTHE HIVEMANAGER GUI
Connecting to the GUI through the MGT Interface
1.Connect Ethernet cables from the MGT interface and LAN interface—if you are using it—to the network.
2.Connect an Ethernet cable from your management system to the network so that you can make an HTTPS
connection to the IP address that you set for the MGT interface.
3.Open a web browser and enter the IP address of the MGT interface in the address field. For example, if you
changed the IP address to 10.1.1.8, enter this in the address field: https://10.1.1.8
Note: If you ever forget the IP address of the MGT interface and cannot make an HTTP connection to
HiveManager, make a serial connection to its console port and enter this command: ifconfig . The
output displays data about the MGT interface (internally called "eth0"), including its IP address. The
serial connection settings are explained in "Changing Network Settings" on page79.
A login prompt appears.
4.Type the default user name (admin) and password ( aerohive ) in the login fields, and then click Login.
5.If prompted to enter a license key, click Browse, navigate to and select the text file containing the license key
that Aerohive provided when HiveManager was purchased, and then click OK.
You are now logged in to the HiveManager GUI. After logging in, you can check details about the license you
installed on the HM Admin > License Management page.
Deployment Guide81
Chapter 7 Using HiveManager
INTRODUCTIONTOTHE HIVEMANAGER GUI
Using the HiveManager GUI, you can set up the configurations needed to deploy, manage, and monitor large
numbers of HiveAPs. The configuration workflow is described in "HiveManager Configuration Workflow" on page85.
The GUI consists of several important sections, which are shown in Figure4.
Figure 4 Important Sections of the HiveManager GUI
Menu Bar: The items in the menu bar open
the major sections of the GUI. You can then
use the navigation tree to navigate to more
specific topics within the selected section.
Navigation Tree: The navigation tree contains
all the topics within the GUI section that you
chose in the menu bar. Items you select in the
navigation tree appear in the main panel.
Notifications: HiveManager displays a
summary of new HiveAPs, rogue APs, rogue
clients, and alarms detected on managed
HiveAPs here. Clicking a displayed number
opens the relevant page with more details.
Main Panel: The main panel contains
the windows in which you set and view
various parameters.
Some convenient aspects that the HiveManager GUI offers are the ability to clone configurations, apply
configurations to multiple HiveAPs at once, and sort displayed information. Brief overviews of these functions are
presented in the following sections.
82Aerohive
INTRODUCTIONTOTHE HIVEMANAGER GUI
Cloning Configurations
When you need to configure multiple similar objects, you can save time by configuring just the first object, cloning
it, and then making slight modifications to the subsequent objects. With this approach, you can avoid re-entering
repeated data.
Figure 5 Cloning a Hive
To clone an object, select it in an open window, and then click the Clone button.
Retain the settings you want to keep, and modify those you want to change.
îò Ý´·½µ
ïò Í»´»½¬
Multiselecting
You can select multiple objects to make the same modifications or perform the same operation to all of them at
once.
Figure 6 Selecting Multiple New HiveAPs
Select the check boxes to select multiple noncontiguous objects, or shift-click to select check
boxes for multiple contiguous objects.
Then click Accept to accept all the selected HiveAPs for HiveManager management, or click
the Modify button to configure them with the same settings.
Here, you use the shift-click multiselection method to select a set of the topmost eight HiveAPs in
the list; that is, you select the check box for the top HiveAP and hold down the SHIFT key while
selecting the check box for the eighth HiveAP from the top.
Deployment Guide83
Chapter 7 Using HiveManager
By default, displayed objects are
sorted alphanumerically from the
top by name. If you click the
Sorting Displayed Data
You can control how the GUI displays data in the main panel by clicking a column header. This causes the displayed
content to reorder itself alphanumerically or chronologically in either ascending or descending order. Clicking the
header a second time reverses the order in which the data is displayed.
Figure 7 Sorting Event Log Entries by HiveAP Host Name and then Chronologically
name again, the order is reversed; that is, the objects are ordered alphanumerically from the bottom.
By clicking the heading of a column, you can reorder the display of objects either alphanumerically or
chronologically, depending on the content of the selected column. Here you reorder the data chronologically.
Assuming that you have already installed your HiveAPs, uploaded maps (see "Setting Up Topology Maps" on page91),
accepted the HiveAPs for management, and decided on the features and settings you want to use, you are now
ready to start configuring the HiveAPs through HiveManager1. You can configure numerous objects, some of which
might need to reference other objects. An efficient configuration strategy is to first define any objects that you will
later need to use when configuring others. The typical workflow, shown in Figure8, proceeds like this:
1.Define network objects. You can then reference them when defining other parts of the configuration. If you do
not plan to use network objects, you can skip this step.
2.Configure various features.
3.Define radio profiles (or use default settings).
4 and 5.Compile the features from step 2 into a WLAN policy, assign the radio profiles and WLAN policy to one or
more HiveAPs, and then push the configurations to the physical devices on the network.
Figure 8 Configuration Workflow
is unnecessary.
2. Use default settings or configure new settings for various
features that, when combined, constitute a WLAN policy:
• Mobility policies
• Firewall policies
• QoS traffic classification and marking
• MAC Filters
• SSIDs
• User profiles
• AAA settings (for user authentication using IEEE 802.1X)
• Wireless IDS policy
• Hive
3.Use default settings or define one or more radio profiles.
4.Compose a WLAN policy by referencing items set in Step 2.
5.Apply the WLAN policy and radio profiles to one or more
HiveAPs, and then push the configuration to the physical
devices across the network.
1
Network Objects:
VLANs
2
Mobility
Policies
User
Profiles
IP
Addresses
Firewall
Policies
Mgt
Services
Services
QoS Traffic
Classification
and Marking
Settings
HiveManager
MAC
OUIs
MAC Filters
SSIDs
AAA
MAC
Addresses
IDS
Policy
Hive
3
Radio ProfilesWLAN Policy
1.When HiveAPs are in the same subnet as HiveManager, they can use CAPWAP (Control and Provisioning of Wireless Access Points)
to discover HiveManager on the network. CAPWAP works within a layer-2 broadcast domain and is enabled by default on all
HiveAPs. If the HiveAPs and HiveManager are in different subnets, then you can use one of several approaches to enable
HiveAPs to connect to HiveManager. For information about these options, see "How HiveAPs Connect to HiveManager" on
page95.
45
Deployment Guide85
Managed
HiveAP
Chapter 7 Using HiveManager
UPDATING SOFTWAREON HIVEMANAGER
You can update the software running on HiveManager from either a local directory on your management system or
an SCP (Secure Copy) server. If you download an image and save it to a local directory, you can load it from there. If
you save the image to an SCP server, you can direct HiveManager to log in and load it from a directory there.
1.If you do not yet have an account on the Aerohive Support portal, send an email request to
(support@aerohive.com) to set one up.
2.When you have login credentials, visit www.aerohive.com/support/login, and log in.
3.Navigate to the software image that you want to load onto HiveManager (Customer Support > Software
Downloads > HiveManager software images) and download the file.
4.Save the HiveManager image file to a local directory or an SCP server.
5.Log in to HiveManager and navigate to HM Admin > HiveManager Operations > Update Software.
6.To load files from a directory on your local management system, choose either Update and clear alarm and
event logs or Full update (to keep existing log entries after the upgrade), and then enter the following:
•File from local host: (select); type the directory path and a file name; or click Browse, navigate to the
software file, and select it.
or
To load a file from an SCP server:
•File from remote server: (select)
•IP Address: Enter the IP address of the SCP server.
•SCP Port: Enter the port number of the SCP server (the default port number for SCP is 22).
•File Path: Enter the directory path and HiveManager software file name. If the file is in the root directory of
the SCP server, you can simply enter the file name.
•User Name: Type a user name with which HiveManager can access the SCP server.
•Password: Type a password with which HiveManager can use to log in securely to the SCP server.
7.To save the new software and reboot HiveManager, click OK.
86Aerohive
UPDATING HIVEOS FIRMWARE
UPDATING HIVEOS FIRMWARE
HiveManager makes it easy to update HiveOS firmware running on managed HiveAPs. First, you obtain new HiveAP
firmware from Aerohive Support and upload it onto HiveManager. Then you push the firmware to the HiveAPs and
activate it by rebooting them.
Note: When upgrading both HiveManager software and HiveOS firmware, do so in this order:
• Upgrade HiveManager (HiveManager can manage HiveAPs running the current version of HiveOS and
also previous versions).
• Upload the new HiveOS firmware to the managed HiveAPs, and reboot them to activate it.
• Reload the HiveOS configurations to the managed HiveAPs—even if nothing in the configurations has
changed—and reboot them to activate the configuration that is compatible with the new HiveOS image.
1.Log in to the Aerohive Support portal to obtain a new HiveOS image.
2.Save the HiveOS image file to a directory on your local management system or network.
3.Log in to HiveManager and navigate to Configuration > HiveAP File Management.
4.On the HiveAP Files page, select HiveOS Image for the file type, enter one of the following—depending on how
you intend to upload the HiveOS image file to HiveManager—and then click OK:
To load a HiveOS image file from a directory on your local management system:
•Local File: (select); type the directory path and image file name, or click Browse, navigate to the image
file, and select it.
To load a HiveOS image file from an SCP server:
•SCP Server: (select) IP Address : Enter the IP address of the SCP server.
•SCP Port: Enter the port number of the SCP server (the default port number for SCP is 22).
•File Path: Enter the path to the HiveOS image file and the file name. If the file is in the root directory of the
SCP server, you can simply enter the file name.
•User Name: Type a user name with which HiveManager can access the SCP server.
•Password: Type a password that HiveManager can use to log in securely to the SCP server.
Note: To delete an old image file, select the file in the "Available Images" list, and then click Remove.
5.Click Access Points > ManagedHiveAPs.
6.In the Managed HiveAPs window, select one or more HiveAPs, and then click Update > Upload and Activate SW Image.
The Upload and Activate SW Image dialog box appears.
7.Enter the following, and then click Upload:
•From the HiveOS Image drop-down list, select the image that you want to load onto managed HiveAPs.
•In the Activation Time section, select one of the following options, depending on when you want to activate
the software—by rebooting the HiveAPs—after HiveManager finishes loading it:
•Activate at: Select and set the time at which you want the HiveAPs to activate the software. To use this
option accurately, make sure that both HiveManager and managed HiveAP clocks are synchronized.
•Activate after: Select to load the firmware on the selected HiveAPs and activate it after a specified
interval. The range is 0 – 3600 seconds; that is, immediately to one hour. The default is 5 seconds.
Deployment Guide87
Chapter 7 Using HiveManager
•Activate at next reboot: Select to load the software and not activate it. The loaded software gets
activated the next time the HiveAP reboots.
Note: When choosing which option to use, consider how HiveManager connects to the HiveAPs it is updating.
See "Updating HiveAPs in a Mesh Environment".
•Select the check box for each HiveAP whose software you want to update.
Updating HiveAPs in a Mesh Environment
When updating hive members in a mesh environment, be careful of the order in which the HiveAPs reboot. If a
portal completes the upload and reboots before a mesh point beyond it completes its upload—which most likely
would happen because portals receive the uploaded content first and then forward it to mesh points—the reboot
will interrupt the data transfer to the mesh point. This can also happen if a mesh point linking HiveManager to
another mesh point reboots before the more distant mesh point completes its upload. As a result of such an
interruption, the affected mesh point receives an incomplete firmware or configuration file and aborts the update.
Note: A mesh point is a hive member that uses a wireless backhaul connection to communicate with the rest of
the hive. HiveManager manages mesh points through another hive member that acts as a portal, which
links mesh points to the wired LAN.
To avoid the reboot of an intervening HiveAP from interfering with an ongoing upload to a mesh point beyond it,
allow enough time for the firmware to reach the farthest mesh points before activating the firmware. After all the
HiveAPs have the firmware, rebooting any HiveAPs between them and HiveManager becomes inconsequential.
The following examples in this chapter show how to install over 70 HiveAPs at three locations in a corporate
network, use HiveManager to create configurations for them, and then push the configurations to them over the
network. The high-level deployment scheme is as follows:
Headquarters - Building 1 (HQ-B1)Headquarters - Building 2 (HQ-B2) Branch Office (Branch1)
The general design of the deployment is shown in Figure1.
Figure 1 Deployment Overview
¨ è
Ú´±±®-
ШПуЮпШПуЮо
Ø·ª»ï
ÉÔßÒ°±´·½§ó¸¯ï
ì Ø·ª»ßÐ-
°»® Ú´±±®
êì
Ø·ª»ßÐ-
̱¬¿´
ݱ®°±®¿¬»
Ø»¿¼¯«¿®¬»®-
Ø·ª»Ó¿²¿¹»®
ш·² •ШПуЮпŒч
¨ è
Ú´±±®-
Ø·ª»î
ÉÔßÒ°±´·½§ó¸¯î
ÊÐÒ Ì«²²»´
î Ø·ª»ßÐ-
°»® Ú´±±®
è
Ø·ª»ßÐ-
̱¬¿´
Þ®¿²½¸
Ѻº·½»
ÉÔßÒ°±´·½§ó¾®¿²½¸ï
¨ ì
Ú´±±®-
Þ®¿²½¸ï
Ø·ª»í
You can look at any of the following examples individually to study how to configure a specific feature or view all of
them sequentially as a set to study the workflow for deploying large numbers of HiveAPs and configuring them
through HiveManager.
Deployment Guide89
Chapter 8 HiveManager Configuration Examples
This chapter contains a sequential flow of examples that show how to import and organize maps, install HiveAPs on
the network and link them to maps, configure typically needed features, assign these features to HiveAPs, and push
configurations to the HiveAPs across the network. The examples are as follows:
•"Example 1: Mapping Locations and Installing HiveAPs" on page91
Upload image files of topology maps to HiveManager and use one of two ways to associate physical HiveAPs
with their corresponding icons on the maps.
•"Example 2: Defining Network Objects and MAC Filters" on page97
Define a MAC OUI (organizationally unique identifier), VLANs, and IP addresses for use by other
configuration objects. Define a MAC filter so that QoS classifiers and SSID profiles can reference them. Map
the MAC OUI and several services to Aerohive classes.
•"Example 3: Providing Guest Access" on page104
Provide controlled and limited network access for guests. Two approaches are presented.
•"Example 4: Creating User Profiles" on page113
Define several user profiles, their companion QoS forwarding rates and priorities, and their VLANs.
•"Example 5: Setting SSIDs" on page117
Define sets of authentication and encryption services that wireless clients and HiveAPs use when
communicating with each other.
•"Example 6: Setting Management Service Parameters" on page120
Configure DNS, syslog, SNMP, and NTP settings for HiveAPs.
•"Example 7: Defining AAA RADIUS Settings" on page123
Define AAA RADIUS server settings to use when HiveAPs send 802.1X authentication requests.
•"Example 8: Creating Hives" on page125
Create hives so that sets of HiveAPs can exchange information with each other over the network to
coordinate client access, provide best-path forwarding, and enforce QoS policies.
•"Example 9: Creating WLAN Policies" on page126
Define WLAN policies. These are sets of configuration objects (defined in previous examples) that HiveAPs
use to control how wireless clients access the network.
•"Example 10: Assigning Configurations to HiveAPs" on page135
Assign WLAN policies, radio profiles, and maps to detected HiveAPs so that you can begin managing them
through HiveManager. Also change HiveAP login settings and country codes.
90Aerohive
EXAMPLE 1: MAPPING LOCATIONSAND INSTALLING HIVEAPS
on on the CorpOffices map
Topology Maps section of the navigation tree in the
EXAMPLE 1:MAPPING LOCATIONSAND INSTALLING HIVEAPS
HiveManager allows you to mark the location of HiveAPs on maps so that you can track devices and monitor their
status. First, you must upload the maps to HiveManager, and then name and arrange them in a structured hierarchy
(see "Setting Up Topology Maps"). After that, you can follow one of two ways to install HiveAPs so that you can later
put their corresponding icons on the right maps (see "Preparing the HiveAPs" on page94).
Note: All image files that you upload to HiveManager must be in .png or .jpg format.
Setting Up Topology Maps
In this example, you upload maps to HiveManager showing floor plans for three office buildings and organize them in
a hierarchical structure. You need to make .png of .jpg files of drawings or blueprints showing the layout of each
floor. Also, as an easy means of organizing the maps in the HiveManager GUI, you create a file showing the three
buildings HQ-B1, HQ-B2, and Branch-1. By using this drawing at the top topographical level, you can display icons for
each floor of each building. You can then click an icon to link to its corresponding map. This is shown in Figure2.
Figure 2 Organizational Structure of Level-1 and -2 Maps
Double-clicking a floor ic
(level 1) opens the corresponding level-2 map.
You can also navigate to any map within the
HiveManager GUI.
è ·½±²- ´·²µ·²¹
¬± ´»ª»´óî ³¿°-
Ô»ª»´ î
Ш»¿¼¯«¿®¬»®- Ю«·´¼·²¹ п шШПуЮпч У¿°-Ш»¿¼¯«¿®¬»®- Ю«·´¼·²¹ о шШПуЮоч У¿°-Ю®¿²½¸уп У¿°-
•ШПуЮпуЪиŒ
è Ó¿°-
ø±²» °»® º´±±®÷
•ШПуЮпуЪпŒ
è ·½±²- ´·²µ·²¹
¬± ´»ª»´óî ³¿°-
ì ·½±²- ´·²µ·²¹
¬± ´»ª»´óî ³¿°-
•ШПуЮоуЪиŒ
è Ó¿°-
•ШПуЮоуЪпŒ
•Ю®¿²½¸упуЪмŒ
ì Ó¿°-
•Ю®¿²½¸упуЪпŒ
Uploading Maps
1.Log in to the HiveManager GUI as explained in " Installing and Connecting to the HiveManager GUI" on page79.
2.Click Topology, right-click World, and then choose Add/Delete Image from the pop-up menu that appears.
3.In the Add/Delete Image window, click Browse, navigate to the directory containing the image files that you
want to upload, and select one of them.
4.Click Upload.
Deployment Guide91
Chapter 8 HiveManager Configuration Examples
The selected image file is transferred from your management system to HiveManager as shown in Figure3.
Figure 3 Uploading a Map of a Building Floor Plan
Map showing one
of the floor plans
Management SystemHiveManager
Uploading map to HiveManager
5.Repeat this for all the image files that you need to load. In this example, you load 21 files:
•8 maps for the eight floors in HQ-B1 (Headquarters Building 1)
•8 maps for the eight floors in HQ-B2 (Headquarters Building 2)
•4 maps for the four floors in Branch-1
•1 file (named "corp_offices.png" in this example) that shows a picture of the three buildings
Naming and Arranging Maps within a Structure
1.Click Topology, right-click the top level map "World", and then choose Edit from the pop-up menu that appears.
2.In the Edit Map - World dialog box, enter the following, and then click Update:
•Map Name: CorpOffices (Note that spaces are not allowed in map level names.)
•Map Icon: Building
•Background Image: Choose corp_offices.png from the drop-down list.
• Environment: Because the CorpOffices "map" does not contain any HiveAP icons—it is an illustration of three
buildings that you use to organize the submaps of the floors in each building—the environment setting is
irrelevant. Leave it at its default, Free Space.
•Width (optional): Because the corp_offices.png depicts buildings instead of a floor plan, it is not necessary
to specify the width of the image.
3.Click Topology, right-click the top level map "CorpOffices", and then choose New from the pop-up menu that
appears.
4.In the New Map (Submap for CorpOffices) dialog box, enter the following, and then click Create:
•Map Name: HQ-B1-F
•Map Icon: Floor
•Background Image: Choose HQ-B1-F1.png from the drop-down list.
•Environment: Because the environment is that of a typical office building, choose Enterprise. The
environment assists in the prediction of signal strength and attenuation shown in the heat maps.
•Width: 80 feet (HiveManager automatically calculates the height based on the aspect ratio of the image.)
A white floor icon () labeled "HQ-B1-F1" appears on the CorpOffices image, and a new entry named
"HQ-B1-F1" appears nested under "CorpOffices" in the navigation tree.
5.Click Unlock, select the icon, drag it to the location you want, and then click Save.
6.Click Topology, right-click the top level map "CorpOffices", and then choose New from the pop-up menu that
appears.
92Aerohive
EXAMPLE 1: MAPPING LOCATIONSAND INSTALLING HIVEAPS
7.In the New Map (Submap for CorpOffices) dialog box, enter the following, and then click Create:
•Map Name: HQ-B1-F2
•Map Icon: Floor
•Background Image: Choose HQ-B1-F2.png from the drop-down list.
•Environment: Enterprise
•Width: 80 feet
A white floor icon labeled "HQ-B1-F2" appears on the CorpOffices image, and a new entry named "HQ-B1-F2"
appears nested under "CorpOffices" in the navigation tree.
8.Click Unlock, select the icon, drag it to the location you want, and then click Save.
After adding the CorpOffices "map" (really an illustration showing three buildings), two floor plans for the first
and second floors of "HQ-B1", and dragging the floor icons into position, the display of the CorpOffices map
looks similar to that in Figure4.
Figure 4 CorpOffice Map (Level 1) with Links to Level-2 Maps HQ-B1-F1 and HQ-B1-F2
The submaps in the
navigation tree and the
icons on this map link
to other maps.
Click a submap or
double-click an icon to
open the map to which
it links.
9.Repeat this process until you have arranged all the maps and icons in place as shown in Figure5.
Figure 5 CorpOffice Map with Links to All Level-2 Maps
Note: You can add as many levels as necessary to the map hierarchy. You can also delete maps as long as they
do not have any submaps or HiveAP icons on them.
Deployment Guide93
Chapter 8 HiveManager Configuration Examples
Preparing the HiveAPs
There are several approaches that you can take when mapping the location of installed HiveAP devices. Two
possible approaches are presented below. With the first approach ("Using SNMP"), HiveManager automatically assigns
HiveAPs to maps. This approach does require a small amount of configuration of each HiveAP up front, but after the
HiveAPs form a CAPWAP connection with HiveManager, the automatic assignment of HiveAPs to their appropriate
maps on HiveManager occurs without any further effort. The second approach ("Using MAC Addresses" on page95)
allows you to install HiveAPs without needing to do any extra configurations, but you later have to match each
HiveAP with the right map in HiveManager manually.
Note: For a summary of how HiveAPs use CAPWAP to discover and connect to HiveManager, see "How HiveAPs
Connect to HiveManager" on page95.
Using SNMP
This approach makes use of the SNMP (Simple Network Management Protocol) sysLocation MIB (Management
Information Base) object, which you define on HiveAPs. HiveManager can use this information to associate a HiveAP
with a map and provide a description of where on the map each HiveAP belongs.
1.Make copies of the maps you uploaded to HiveManager, label them, and take them with you for reference when
installing the HiveAPs.
2.For each HiveAP that you install, do the following:
1.Make a serial connection to the console port, and log in (see "Log in through the console port" on page150).
2.Enter the following command, in which string1 describes the location of the HiveAP on the map (in open
format) and string2 is the name of the map:
snmp location string1@string2
For example, if you install a HiveAP in the northwest corner on the first floor of building 1, enter
snmplocation northwest_corner@HQ-B1-F1. If you want to use spaces in the description, surround
the entire string with quotation marks: snmp location "northwest corner@HQ-B1-F1".
If the name of a map is not unique, then include the map hierarchy in the string until the path to the map is
unique. For example, if you have two maps named "floor-1", and the one you want to use is nested under a
higher level map named "building-1" while the other is nested under "building-2", then enter the command
as follows: snmplocation northwest_corner@floor-1@building-1 . Similarly, if there are two
maps named "building-1" nested under higher level maps for two different sites ("campus-1" and "campus-2",
for example), then include that next higher level in the string to make it unique:
3.Mount and cable the HiveAP to complete its installation. (For mounting details, see "Mounting the HiveAP
20" on page29. For information about the PoE port on the HiveAP, see "Ethernet and Console Ports" on
page26.)
When a HiveAP connects to HiveManager, HiveManager checks its SNMP location. When you accept the HiveAP for
management, then HiveManager automatically associates it with the map specified in its SNMP location description.
You can then click the icon to see its location and drag it to the specified location on the map. Also, on the Access
Points > New HiveAPs > Automatically Discovered window in the HiveManager GUI, you can sort detected HiveAPs by
map name to assign them more easily to WLAN policies and radio profiles.
94Aerohive
EXAMPLE 1: MAPPING LOCATIONSAND INSTALLING HIVEAPS
Using MAC Addresses
With this approach, you write down the MAC address labelled on the underside of each HiveAP and its location while
installing the HiveAPs throughout the buildings. The MAC address on the label is for the mgt0 interface. Because the
MAC addresses of all HiveAPs begin with the Aerohive MAC OUI 00:19:77, you only need to record the last six
numerals in the address. For example, if the MAC OUI is 0019:7700:0120, you only need to write "000120" to be able
to distinguish it from other HiveAPs later.
1.Make copies of the maps you uploaded to HiveManager, label them, and take them with you when installing the
HiveAPs.
2.When you install a HiveAP, write the last six digits of its MAC address at its location on the map.
When HiveAPs automatically connect with HiveManager, HiveManager displays them in the Access Points > New
HiveAPs > Automatically Discovered window. You can differentiate them in the displayed list by MAC address (node
ID), which allows you to match the HiveAPs in the GUI with those you noted during installation so that you can
properly assign each one to a map, a WLAN policy, and two radio profiles.
How HiveAPs Connect to HiveManager
If HiveAPs are in the same layer-2 broadcast domain (and same VLAN) as HiveManager, they broadcast CAPWAP
(Control and Provisioning of Wireless Access Points) Discovery Request messages to discover and establish a secure
connection with HiveManager automatically. There is no need for any extra configuration on your part.
When HiveAPs and HiveManager are in different subnets, the HiveAPs will not be able to discover HiveManager by
broadcasting CAPWAP Discovery Request messages. In this case, you can use one of the following methods to
configure HiveAPs with the HiveManager IP address or configure them so that they can learn it through DHCP or DNS.
When HiveAPs have the HiveManager IP address, they then send unicast CAPWAP Discovery Request messages to that
address.
•Log in to the CLI on each HiveAP and enter the HiveManager IP address with the following command, in which
the variable ip_addr is the address of the interface through which HiveManager communicates with HiveAPs:
hivemanager ip_addr
•Configure the DHCP server to supply the HiveManager domain name as DHCP option 225 or its IP address as
option 226 in its DHCPOFFER. (If you use a domain name, the authoritative DNS server for that domain must also
be configured with an A record that maps the domain name to an IP address for HiveManager.) HiveAPs request
DHCP option 225 and 226 by default when they broadcast DHCPDISCOVER and DHCPREQUEST messages.
Note: If you need to change the DHCP option number (perhaps because another custom option with that
number is already in use on the DHCP server), enter this command on each HiveAP with a different
option number for the variable number:
interface mgt0 dhcp client option custom hivemanager number { ip | string }
•If HiveManager continues to use its default domain name ("hivemanager"), configure the local authoritative DNS
server with an A record that resolves that name to an IP address. If the HiveAPs do not have a static IP address
configured for HiveManager and do not receive an address or domain name returned in a DHCP option, then they
try to resolve the domain name "hivemanager" to an IP address.
Within the framework of the CAPWAP protocol, HiveAPs are CAPWAP clients and HiveManager is a CAPWAP server.
The client proceeds through a series of CAPWAP states. These states and the basic events that trigger the client to
transition from one state to another are shown in Figure6 on page96.
Note: To illustrate all possible CAPWAP states, Figure6 on page96 begins by showing a HiveAP and HiveManager
already in the Run state. When a HIveAP first attempts to discover a HiveManager—after the HiveAP has an
IP address for its mgt0 interface and has been configured with (or has discovered) the HiveManager IP
address—it begins in the Discovery state.
Deployment Guide95
Chapter 8 HiveManager Configuration Examples
Figure 6 CAPWAP Process—Beginning from the Run State
EXAMPLE 2: DEFINING NETWORK OBJECTSAND MAC FILTERS
EXAMPLE 2:DEFINING NETWORK OBJECTSAND MAC FILTERS
Network objects are the most basic objects that you can configure and only function when other objects such as QoS
classifiers, SSID profiles, and firewall policy rules reference them. IP addresses, network services (HTTP, SMTP,
FTP, … ), MAC addresses, MAC OUIs (organizationally unique identifiers), VLANs, Ethernet profiles, and radio profiles
are network objects that make no reference to any other previously defined object.
You define the following network objects that you reference in other examples later in this chapter:
•MAC OUI for filtering VoIP phone traffic
•VLANs that you can apply to user profiles
•IP addresses that you can assign to management services and RADIUS servers
In addition, you define a MAC filter to control access to the SSID for VoIP traffic.
Defining a MAC OUI
You define a MAC OUI for the type of VoIP (Voice over IP) phones in use in the network and assign traffic from it to
Aerohive class 6. Other critical IP telephony services are DHCP and DNS for address and domain name assignments,
and TFTP and HTTP for configuration downloads and software updates. You map traffic using destination port
numbers 53 (DNS) and 67 (DHCP) to Aerohive class 5. This is a fairly high priority level because these services are
vital for VoIP to work properly; however, they are not as high as that for the voice traffic itself. Finally, you map
traffic using destination port numbers 69 (TFTP) and 80 (HTTP) to Aerohive class 2. This is a much lower priority
level, but it is appropriate for these resilient and less time-sensitive services. HiveAPs check if an incoming packet
matches a classifier map by checking for matches in the following order. They then use the first match found:
1.Service
2.MAC OUI
3.Ingress interface
4.Existing priorities used by various standard QoS classification systems (802.11e, 802.1p, and DSCP)
After VoIP clients associate with an SSID and begin sending traffic, the HiveAP maps all DNS and DHCP traffic to class
5, all TFTP and HTTP traffic to class 2, and all remaining traffic—voice traffic in this case—to class 6 (see Figure7).
Figure 7 MAC OUI and Service Classifier Maps for VoIP Phones
By distinguishing voice traffic by the clients’ OUI and mapping it to class 6, HiveAPs can prioritize it above other
traffic types (see "Example 4: Creating User Profiles" on page113).
1.Log in to the HiveManager GUI.
2.Click Configuration > Network Objects > MAC Addresses/OUIs > New.
3.Enter the following, and then click Save:
•MAC OUI: (select)
•MAC Name: Type a name such as "VoIP_Phones". You cannot include any spaces when defining a MAC name.
Enter the following, and then click Apply:
•MAC Entry: Type the OUI for the VoIP phones used in the network; that is, type the first six numbers
constituting the vendor prefix of the MAC address. For example, if a MAC address is 01:22:34:AB:6C:04,
the OUI is 01:22:34. Type only the hexadecimal numerals without any formatting symbols such as colons
or dashes. If you do type such symbols, the GUI ignores—and does not display—them.
•Type: Choose Global because you do not need to restrict this network object to a particular set of
HiveAPs, which is what the other three options allow you to do.
•Description: Type a meaningful comment for the MAC OUI, such as the vendor that the OUI identifies.
Note: If there are phones from more than one vendor, make a separate MAC OUI entry for each one.
Mapping the MAC OUI and Services to Aerohive Classes
First, map VoIP phone MAC OUIs to Aerohive class 6. Next, map DNS and DHCP services to Aerohive class 5 and TFTP
and HTTP services to class 2. Because voice traffic is the only remaining type of traffic from phones whose MAC OUIs
you have already mapped to class 6, HiveAPs map voice traffic from those phones to class 6. Although all these
services are critical for IP telephony to function properly, voice traffic is the least resistant to delay, and TFTP and
HTTP file downloads are the most resistant. Therefore, you prioritize the different types of traffic accordingly.
•Name: VoIP-Mapping (You cannot include any spaces when defining the name of a classifier map.)
•Description: Add a descriptive comment, such as "Mapping services and OUIs for VoIP phone traffic".
•Network Services: (select)
•MAC OUIs: (select)
98Aerohive
EXAMPLE 2: DEFINING NETWORK OBJECTSAND MAC FILTERS
5.Click the Network Services tab, enter the following, and then click Apply:
•Service: DNS
•QoS Class: 5 - Video
•Action: Permit
•Logging: Select the check box to enable HiveAPsto log traffic that matches the service-to-Aerohive class
mapping. (HiveAPs log traffic whether the action is permit or deny.) The main use of logging traffic is to see
if the HiveAPs are receiving expected—or unexpected—types of traffic when you debug connectivity issues.
You can see the log entries in the event log on the HiveAPs (show logging buffered). Also, if you
configure the HiveAP to send event logs to a syslog server, you can see the log entries there (see "Example
6: Setting Management Service Parameters" on page120).
6.Enter the following, and then click Apply:
•Service: DHCP-Server
•QoS Class: 5 - Video
•Action: Permit
•Logging: Select the check box to enable traffic logging, or clear the check box to disable it.
7.Enter the following, and then click Apply:
•Service: TFTP
•QoS Class: 2 - Best Effort 1
•Action: Permit
•Logging: Select the check box to enable traffic logging, or clear the check box to disable it.
8.Enter the following, and then click Apply:
•Service: HTTP
•QoS Class: 2 - Best Effort 1
•Action: Permit
•Logging: Select the check box to enable traffic logging, or clear the check box to disable it.
9.Click the MAC OUIs tab, click New, enter the following, and then click Apply:
•MAC OUIs: Choose the name of the MAC OUI that you defined in "Defining a MAC OUI", such as "VoIP_Phones".
•QoS Class: 6 - Voice
•Action: Permit
•Comment: Enter a meaningful comment about the MAC OUI for future reference.
•Logging: Select the check box to enable log traffic that matches the MACOUI-to-Aerohive class mapping, or
clear the check box to disable it.
10.To save the configuration and close the dialog box, click Save.
Deployment Guide99
Chapter 8 HiveManager Configuration Examples
Defining VLANs
You define three VLANs that you will later assign to various user profiles (see "Example 4: Creating User Profiles" on
page113). By assigning different VLANs to different user roles, their traffic remains isolated from each other; that
is, voice traffic never shares a broadcast domain with data traffic; and data traffic from guests never shares the
same broadcast domain with employee data traffic. The result is that you can provide access for certain types of
traffic to select areas of the network while blocking unauthorized access to other areas.
The VLAN IDs and the user profiles to which you will assign them are as follows:
•VLAN ID 1 for the Emp and IT user profiles (and for users not yet registered through a captive web portal)
•VLAN ID 2 for the VoIP user profile
•VLAN ID 3 for the Guests user profile
Note: When defining the following VLANs, choose Global as the VLAN type because you do not need to restrict
these VLANs to a particular set of HiveAPs, which is what the other three options allow you to do.
1.Click Configuration > Network Objects > VLANs > New, enter the following, and then click Save:
•VLAN Name: VLAN-1-EmployeeData
•Enter the following, and then click Apply:
•VLAN ID: 1
•Type: Global
•Description: VLAN for Emp, IT, and unregistered CWP users
2.Click Configuration > Network Objects > VLANs> (check box) VLAN-1-EmployeeData > Clone, make the
following changes, and then click Save:
•VLAN Name: VLAN-2-EmployeeVoice
•VLAN ID: 2
•Type: Global
•Description: VLAN for VoIP traffic
3.Click Configuration > Network Objects > VLANs> (check box) VLAN-2-VoIP > Clone, make the following
changes, and then click Save:
•VLAN Name: VLAN-3-Guests
•VLAN ID: 2
•Type: Global
•Description: VLAN for guests visiting corporate
1
1.There is a predefined VLAN definition for VLAN ID 1, so it is not really necessary to create a new VLAN object for it. However,
because later examples in this chapter refer to VLAN 1 by the name defined here ("VLAN-1-EmployeeData"), its purpose will
hopefully be clearer than if it were referred to by the simpler name of the predefined VLAN ("1").
100Aerohive
EXAMPLE 2: DEFINING NETWORK OBJECTSAND MAC FILTERS
Creating IP Addresses
You use the IP addresses that you create here when defining management services for the HiveAPs (see "Example 6:
Setting Management Service Parameters" on page120). The IP addresses are used for DNS, SNMP, syslog, and NTP
servers. To understand the locations of the different servers on the network, see Figure15 on page120.
DNS Servers
1.Click Configuration > Network Objects > IP Addresses > New, and after entering all the following, click Save:
•Address Name: DNS-Primary
Enter the following, and then click Apply:
— IP Address: 10.1.1.25
— Netmask: 255.255.255.255
— Type: Classifier
— Value: Tag 1: hq
By classifying the IP address definition as "hq" and then later classifying all HiveAPs deployed at
headquarters as "hq", only those HiveAPs will use the 10.1.1.25 address for their primary DNS
server.
— Description: Primary DNS server located at HQ
Enter the following, and then click Apply:
— IP Address: 10.2.2.251
— Netmask: 255.255.255.255
— Type: Classifier
— Value: Tag 1: branch1
By classifying the IP address definition as "branch1" and then later classifying all HiveAPs deployed
at the branch site as "branch1", only those HiveAPs will use the 10.2.2.251 address for their primary
DNS server. Classifying the different IP address definitions within the same IP address object allows
you to use this one object in multiple locations that have different addressing schemes.
2.Click Configuration > Network Objects > IP Addresses > New, and after entering all the following, click Save:
•Address Name: DNS-Secondary
Enter the following, and then click Apply:
— IP Address: 10.1.1.26
— Netmask: 255.255.255.255
— Type: Global
Because all the HiveAPs at both the headquarters and branch site use the same secondary DNS
server, you classify it as Global. The server is located at headquarters and HiveAPs at the branch
site reach it through a VPN tunnel.
— Description: Secondary DNS server located at HQ
Deployment Guide101
Chapter 8 HiveManager Configuration Examples
Syslog Server
Click Configuration > Network Objects > IP Addresses > New, and after entering all the following, click Save:
•Address Name: Syslog-Server
Enter the following, and then click Apply:
— IP Address: 10.1.1.23
— Netmask: 255.255.255.255
— Type: Global
Because all the HiveAPs at both the headquarters and branch site use the same syslog server, you
classify it as Global. The HiveAPs at the branch site reach the syslog server, which is also located at
headquarters, through a VPN tunnel.
— Description: Syslog server at HQ
SNMP Server
Click Configuration > Network Objects > IP Addresses > (check box) Syslog-Server > Clone, change the
following settings, click Save:
•Address Name: SNMP-Server
— IP Address: 10.1.1.24 (This is the IP address of the SNMP management system to which the SNMP
agent running on the HiveAPs sends SNMP traps.)
— Description: SNMP server at HQ
NTP Server
Click Configuration > Network Objects > IP Addresses > (check box) SNMP-Server > Clone, change the
following settings, click Save:
1.Click Configuration > Network Objects > IP Addresses > New, and after entering all the following, click Save:
•Address Name: RADIUS-Server-Primary
Enter the following, and then click Apply:
— IP Address: 10.1.1.15
— Netmask: 255.255.255.255
— Type: Global
Because all the HiveAPs at both the headquarters and branch site use the same RADIUS servers, you
classify them as Global. The HiveAPs at the branch site reach the RADIUS servers, which are also
located at headquarters, through a VPN tunnel.
— Description: Primary RADIUS server at HQ
2.Click Configuration > Network Objects > IP Addresses > (check box) RADIUS-Server-Primary > Clone, and
after making the following changes, click Save:
•Address Name: RADIUS-Server-Secondary
— IP Address: 10.1.2.16
— Description: Secondary RADIUS server at HQ
102Aerohive
EXAMPLE 2: DEFINING NETWORK OBJECTSAND MAC FILTERS
Creating a MAC Filter
A MAC filter is a type of security policy that you can apply to an SSID to allow or deny access to clients attempting to
form associations based on their source MAC addresses. In this example, you define a MAC filter based on the VoIP
phone OUI and apply it to the SSID to which you want VoIP clients to associate. HiveAPs can then filter association
requests and respond only to clients whose OUI matches that in the filter (see "Example 5: Setting SSIDs" on
page117).
The MAC filter that you create here becomes useful when you define the SSID for voice traffic (see "voip SSID" on
page118). You apply this filter to the SSID so that only VoIP phones with the MAC OUI 01:22:34 can form an
association with the HiveAPs.
1.Click Configuration > Security Policies > MAC Filters > New.
The New MAC Filters dialog box appears.
2.Enter the following name and description for the MAC filter:
•Name: corpVoIPphones (You cannot include any spaces when defining a MAC filter name.)
•Description: Use this filter for "voip" SSID
Choose the name that you gave the OUI, such as "VoIP_Phones" (see "Defining a MAC OUI" on page97) from the
MAC Address/OUI drop-down list, choose Permit as the action, and then click Apply.
3.To save the MAC filter configuration and close the dialog box, click Create.
Deployment Guide103
Chapter 8 HiveManager Configuration Examples
EXAMPLE 3:PROVIDING GUEST ACCESS
As a convenience for guests visiting the corporate headquarters or branch office, you provide them with wireless
network access. To preserve bandwidth for employees, the rate limit for guests is somewhat minimized. To maintain
security, visitors are restricted to accessing just the public LAN.
Two approaches are presented in this section:
•"Guest Access with Preshared Keys": This approach provides visitors with secured network access by using WPA
or WPA2 with preshared keys and TKIP or CCMP (AES) encryption. It does not include a means for enforcing
visitors to accept a network usage policy before receiving network access.
•"Guest Access with Captive Web Portal" on page105: A captive web portal is a way to control network access by
requiring users to authenticate or register before assigning them network and user profile settings that allow
them network access beyond the HiveAP with which they associated. With this approach, registered visitors’
activity can be tracked and stored in historical logs on a syslog server for security and compliance auditing.
For the first approach, no extra configuration is necessary other than configuring a guest user profile and SSID. For
the second approach, you might want to customize the registration form used on the captive web portal. To do that,
see "Customizing the Registration Page" on page108 and "Loading Customized Captive Web Portal Files" on page111.
Guest Access with Preshared Keys
You can provide visitors with secure but unregistered network access by issuing them a preshared key to use when
associating with the guest SSID. A receptionist can provide visitors with the preshared key along with access
instructions upon their arrival, as shown in Figure8.
Figure 8 Guest Access Using a Preshared Key
λ½»°¬·±²·-¬
The guest SSID provides secure network access for visitors. Also, by linking visitors to the guest SSID, you can
differentiate them from employees—who associate with other SSIDs (voip and corp)—so that you can apply one set
of QoS (Quality of Service) settings for visitors and other settings for employees. In addition, the user profiles for
employees and guests further separate their traffic into two different VLANs. For instructions on setting up guest
access with a preshared key, see "Guests QoS and User Profile" on page115 and "guest SSID" on page119.
A captive web portal provides registered users with network access while containing unregistered users. Aerohive
offers two approaches to applying a captive web portal, one using external DHCP and DNS servers on the network
and the other using internal DHCP and DNS servers on the HiveAP itself. In the first approach, both registered and
unregistered users must be in the same VLAN because the DHCP and DNS servers that they use initially before they
register will be the same ones that they continue using after they register. In the second approach, you can separate
the unregistered and registered users into two separate VLANs because the unregistered users access the internal
DHCP and DNS servers on the HiveAPs, whereas the registered users access the external DHCP and DNS servers,
which can be in a different VLAN from the internal servers on the HiveAP.
Captive Web Portal with External DHCP and DNS Servers
With this approach, when the client of a previously unregistered visitor first associates with the guest SSID, the
HiveAP assigns the "Unregistered-Guests" user profile to the visitor. It allows DHCP and DNS traffic to pass through so
that the client can receive its address and TCP/IP assignments and resolve domain names to IP addresses. It also
allows ICMP traffic for diagnostic purposes. However, the HiveAP intercepts all HTTP and HTTPS traffic from that
client—and drops all other types of traffic—thereby limiting its network access to just the HiveAP with which it
associated. No matter what website the visitor tries to reach, the HiveAP directs the visitor’s browser to a
registration page. After the visitor registers, the HiveAP stores the client’s MAC address as a registered user, applies
the "Guests" user profile to the visitor, and stops keeping the client captive; that is, the HiveAP no longer intercepts
HTTP and HTTPS traffic from that MAC address, but allows the client to access external web servers. The entire
process is shown in Figure9.
Figure 9 Captive Web Portal Exchanges Using External DHCP and DNS Servers
To enable the captive web portal to forward DHCP and DNS traffic from unregistered users to external servers on the
network, click Configuration > Authentication > Captive Web Portal > New, and select Use external DHCP and DNS servers on the network.
Note: With this captive web portal implementation, you must assign unregistered and registered users to the
same VLAN.
106Aerohive
EXAMPLE 3: PROVIDING GUEST ACCESS
ØÌÌРݱ²²»½¬·±² ¬± ¬¸» Ý¿°¬·ª» É»¾ ᮬ¿´
Captive Web Portal with Internal DHCP and DNS Servers
With this approach, when the client of a previously unregistered visitor first associates with the guest SSID, the
HiveAP acts as a DHCP server, DNS server, and web server, limiting the client’s network access to just the HiveAP
with which it associated. No matter what website the visitor tries to reach, the HiveAP directs the browser to a
registration page. After the visitor registers, the HiveAP stores the client’s MAC address as a registered user and
stops keeping the station captive; that is, the HiveAP no longer acts as a DHCP, DNS, and web server for traffic from
that MAC address, but allows the client to access external servers. The entire process is shown in Figure10.
Figure 10 Captive Web Portal Exchanges Using Internal Servers
To enable the captive web portal to forward DHCP and DNS traffic from unregistered users to its internal servers,
click Configuration > Authentication > Captive Web Portal > New, and select Use internal DHCP and DNS servers on the HiveAP. By default, the internal DHCP server issues leases with a ten-second lifetime, and if a client with a
nonexistent lease requests a lease renewal, the HiveAP responds by broadcasting a DHCP NAK. You can change the
HiveAP response so that it sends a unicast NAK or ignores the request completely (Keep Silent).
Note: With this captive web portal implementation, you can assign unregistered and registered users to the same
Although Aerohive provides .html and .jpg files for use on the captive web portal server, you might want to
customize them to better suit your organization. There are six files, four of which are shown in Figure11:
•index.html (the main registration page)•loginscreen_02.jpg (image at the top of web pages)
•success.html (page that appears after registering) •loginscreen_03.jpg (yellow line near top of web pages)
•reg.php (script stored on internal web server)•loginscreen_05.jpg (image at bottom of index.html)
Unregistered users’ browsers are redirected to the registration page (index.html) of the captive web portal for the
SSID to which they associate (the guest SSID in the examples here). You can have a different registration page for
each SSID.
To access the default set of .html and .jpg files on a HiveAP, do the following:
1.Configure a guest SSID as explained in "guest SSID" on page119 and complete the rest of the HiveAP steps
explained in this chapter to bring a HiveAP under HiveManager management.
Note: An alternative approach is to log in to the console port of an individual HiveAP that you have
connected to the network—see "Step 1 Log in through the console port" on page150—and enter the
following commands:
2.Position your management system near the HiveAP and form an association with it using the guest SSID.
3.Open a web browser. When it tries to open its home page, the HiveAP intercepts the HTTP traffic and redirects
it to the captive portal web server.
4.Save the registration page to your local system. In Microsoft Internet Explorer®, for example, click File >
SaveAs, name it index, and in the Save as type field, choose Webpage, complete (*.htm, *.html) .
5.Open the directory where you saved the index.html file.
In addition to the index.html file, there is also an images directory containing the three .jpg files that
index.html references: loginscreen_02.jpg, loginscreen_03.jpg, and loginscreen_05.jpg.
6.Because the directory structure in the HiveAP is different, move the three .jpg files to the same directory as
index.html. Optionally, delete those three images and create your own new images, saving them in the same
directory as the index.html file.
7.Open index.html with a text editor and make the following changes:
Deployment Guide109
Loading...
+ 71 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.