H3C IMC Intelligent Portal Management Administrator Guide-7.3-5W100

HomeSupportNetwork Operations & ManagementIntelligent Management Center 7Configure & DeployUser ManualsH3C IMC Intelligent Portal Management Administrator Guide-7.3-5W100
01-Text
Title Size Download
01-Text 5.46 MB

Contents

Overview·· 1

Functions· 1

Concepts· 1

Policy management 1

Portal management 2

Hierarchical management 3

Benefits· 4

Prerequisites· 6

Support for multiple feature entrances· 7

Configuration wizard· 8

Features· 9

Data statistics· 9

Dashboard monitoring· 9

Advertisement statistics· 10

Customer flow statistics· 11

SMS message statistics· 13

Network resources· 13

Report management 15

Theme management 15

Viewing page templates· 15

Adding a page template· 16

Importing a page template· 17

Configuring an authentication policy· 18

Managing advertisements· 19

Static advertisements· 19

Dynamic advertisements· 21

Managing sites· 23

Adding a site· 23

Adding a site group· 24

Moving sites to a site group· 25

Adding a subgroup· 26

Importing site APs· 26

Viewing the heat map· 27

Managing users· 28

User list 28

Adding a user group· 29

Assigning users to a user group· 30

Online users· 30

Access log· 31

Access failure logs· 31

Manually logging off users· 31

Managing the blacklist 31

System configuration· 32

Managing operators· 32

Endpoint identification· 32

Adding an ACG·· 33

Configuring system parameters· 34

Platform device view· 35

Configuring the SMS message platform·· 36

Configuring WeChat authentication· 36

Configuring third-party authentication parameters· 36

Configuring the SMS message operation· 37

Managing the SMS message content 37

Sending SMS messages· 38

Configuring an SMS message delivery task· 39

Configuring the WeChat operation· 40

Adding a WeChat official account 40

Configuring a WeChat official account 41

Managing the WeChat content 42

Configuring a WeChat delivery task· 43

Configuring portal authentication· 43

Adding access devices· 43

Configuring IP groups· 44

Configuring the portal server 45

Configuring portal devices· 46


Overview

Intelligent Portal Management (IPM) is a management platform that provides Wi-Fi marketing for enterprises and organizations. IPM supports site-based authentication policy customization, monitors and analyzes customer flow data, and flexibly pushes advertisements to customers. IPM meets the management and marketing requirements of portal sites, upgrades service quality, and improves customers' online experiences.

Functions

As shown in Figure 1, IPM provides the following functions:

·     AccessProvides SMS message authentication, WeChat authentication, and other authentication methods for customers to access the network conveniently.

·     InteractionUses IPM portals or apps to push services to customers based on scenario elements (for example, customer identity, time, and location), and interacts with customers to build real-time value-added relationship.

·     AnalysisObtains valuable data from the customer identities and behaviors for service improvement.

·     ManagementMonitors and manages the running status of network-wide devices.

Figure 1 IPM functions

 

 

Concepts

Policy management

As shown in Figure 2, you can customize authentication policies by following these steps:

1.     Make advertisements in Advertisement Management, and add them to theme templates. The advertisement statistics report provides data of advertisement views and hits and can be used as a reference for the administrator to make and adjust marketing strategies.

2.     Customize authentication methods and authentication pages by drawing theme templates in Page Template. You can add advertisements to the templates by integrating texts, pictures, videos, and links to the advertisements.

3.     Bind released page templates to authentication policies and configure authentication parameters. For example, if WeChat authentication is added to a page template, you must configure a WeChat official account in the authentication policy bound to this page template.

Figure 2 Policy customization

 

Portal management

IPM allows you to create sites on a per branch portal basis and assign them to site groups with different operators. Each site must be associated with physically deployed APs and configured with an SSID for wireless authentication.

Both sites and site groups can be bound to authentication policies. If a site and its site groups are bound to different authentication policies, an authentication policy bound to the activity group, site, and area group is selected in descending order of priority. For more information about site groups, see "Hierarchical management."

Figure 3 Creating a portal

 

Hierarchical management

IPM supports the following operator types:

·     Super administratorHas the privilege to create the super administrator, area operators, and activity operators and manages all area groups and activity groups.

·     Area operatorHas the privilege to create area operators and configure subgroups. IPM supports a maximum of three levels of area operators.

·     Activity operatorOnly has the privilege to view site data of the activity group to which the operator is assigned.

IPM supports the following site group types:

·     Area group—Created based on branch levels and locations. An area group supports a maximum of five levels of subgroups. A subgroup is managed by the same operator as its parent area group. If an area operator is added by a parent area operator, groups managed by the area operator can only be selected from the groups managed by the parent area operator.

·     Activity groupUsed for the activity promotion. Sites in different areas can be assigned to an activity group. An activity group cannot include subgroups.

Figure 4 Hierarchical management of operators and site groups

 

Figure 5 Relationship between site groups and operators

 

Benefits

IPM delivers the following benefits:

·     Integrates device management, portal customization, and business marketing.

·     Supports various authentication methods and accurate point-to-point advertisement promotion.

·     Promotes product marketing and brand influence based on the customer flow data analysis.

·     Supports unified management of physically dispersed portals, area-based or activity-based management policies, and inter-area user interaction.


Prerequisites

Before you use IPM, perform the following tasks:

1.     Build a wireless network and add wireless devices to the iMC platform.

2.     Configure wireless authentication parameters on wireless devices. For more information about configuration procedures, see related configuration guides.


Support for multiple feature entrances

IPM provides multiple feature entrances for easy access.

As shown in Figure 6, four entrances are available for Page Template. Entrances in Configuration Wizard help the administrator to configure service processes fast. Entrances in Quick Start link to each configuration page and simplify IPM maintenance.

Figure 6 Multiple entrances of Page Template

 

This administration guide uses entrances on the left navigation tree for illustration.


Configuration wizard

As shown in Figure 7, the configuration wizard enables the administrator to configure WeChat, SMS message, and account authentication methods fast.

Figure 7 Configuration process

 

A brief authentication configuration process is as follows:

1.     Access the Quick Start page, click the Configuration Wizard icon, and then select one authentication method to enter the configuration wizard page for this method.

2.     Perform one of the following tasks according to the authentication method:

·     For WeChat authentication, you must apply for a WeChat official account in advance, and access WeChat Official Account to add the official account to IPM. For more information, see "Configuring the WeChat operation." Then, access WeChat Authentication Configuration to bind the WeChat official account to the shop information. For more information, see "Configuring WeChat authentication."

·     For account authentication, you must configure user account information in IPM in advance in User List. For more information, see "User list."

·     For SMS message authentication, you must configure SMS message delivery at the gateway. You can use the iMC platform or a third-party SMS gateway to send SMS messages.

3.     Access Advertisement Management and make advertisements. For more information, see "Managing advertisements."

4.     Access Page Template and customize endpoint authentication pages. For more information, see "Theme management."

5.     Access Authentication Policy and configure authentication policy parameters. For more information, see "Configuring an authentication policy."

6.     Access Site Group Management and add a site group, and then assign sites to the site group. For more information, see "Adding a site group."

7.     Access Site Management and configure site information. For more information, see "Adding a site."

8.     Access Operator Management and add operators. For more information, see "Managing operators."

To access a configuration page, click the configuration wizard option of the page, or click Previous and Next to locate the page.


Features

Data statistics

IPM monitors both network device running status and customer flow data. Various statistics collected by IPM provide data support for marketing strategies.

Dashboard monitoring

The dashboard monitors network device running status and customer flow data in real-time.

To access the device monitoring page or customer flow monitoring page:

1.     From the left navigation tree, select Quick Start, and then click the Monitor icon on the page that opens.

2.     Perform one of the following tasks:

¡     Select Device to open the device monitoring page.

¡     Select Customer Flow to open the customer flow page.

As shown in Figure 8, the device monitoring page displays the following information:

·     The dashboard provides real-time performance status of network-wide ACs, APs, and endpoints.

·     The carousel displays network resource information of all site groups or sites.

·     The map in the middle displays distribution information of all sites, and it supports the switchover between activity groups and area groups.

¡     If you click an area group, the dashboard displays statistics for this group. The carousel displays the site information of the area group and its subgroups accordingly.

¡     If you click the Activity group icon  in the upper right corner of the page and then click an activity group on the map, the dashboard displays statistics for this group. The carousel displays the site information of this group accordingly.

Figure 8 Device monitoring

 

As shown in Figure 9, the customer flow monitoring dashboard displays customer flow data, which can be used for the strategy adjustment. For example, a bank manager can open more service windows at the customer peak time based on the customer flow trend graph.

Figure 9 Customer flow monitoring

 

Advertisement statistics

To access the Advertisement Statistics page, select Advertisement Promotion > Advertisement Statistics from the left navigation tree. As shown in Figure 10, the Advertisement Statistics page displays advertisement data based on customer visits and can be used for advertisement promotion analysis to improve the advertisement effect.

Figure 10 Advertisement statistics

 

Customer flow statistics

To access the Customer Flow Statistics page, select User Management > Customer Flow Statistics from the left navigation tree. As shown in Figure 11, the Customer Flow Statistics page displays customer behaviors in pie charts and trend graphs, which plays an important role in deciding marketing strategies. To view customer flow statistics for today, the recent one week, and the recent one month, select Today, 1w, and 1m in the upper corner of the page, respectively.

Figure 11 Customer flow statistics

 

SMS message statistics

To access the SMS message statistics page, select SMS Message Operation > Statistics Analysis from the left navigation tree. As shown in Figure 12, the pie charts and list on the Statistics Analysis page displays SMS message sending statistics.

Figure 12 SMS message statistics

 

Network resources

Network resources include AP resources and endpoint resources. IPM analyzes network resources statistics to help the administrator locate wireless network issues.

Viewing AP information

To access the AP Information page, select Network Resources > AP Information from the left navigation tree. As shown in Figure 13, the AP Information page collects AP statistics by various criteria. You can view the AP information network-wide or on a per site group basis.

Figure 13 Viewing AP information

 

To view the AP details list, click the More Details link in the upper right corner of the AP Information page. You can query AP details by MAC address and site.

Figure 14 AP details list

 

Viewing endpoint information

To access the Endpoint Information page, select Network Resources > Endpoint Information from the left navigation tree. As shown in Figure 15, the Endpoint Information page collects endpoint statistics by various criteria. You can view the endpoint information network-wide or on a per site group basis.

Figure 15 Viewing endpoint information

 

Report management

Various types of IPM reports collect user and advertisement statistics based on groups and sites and allow you to view and analyze report data in different perspectives.

To access the report management page, select Report Management from the left navigation tree.

Theme management

Viewing page templates

To view page templates, select Page Template from the left navigation tree.

As shown in Figure 16, a page template can be in one of the following status:

·     UnreleasedIndicated in a gray circle in the Status column. Page templates in this status can be edited.

·     ReleasedIndicated in a green circle in the Status column. Page templates in this status cannot be edited. You can bind only released page templates to authentication policies.

·     BoundIndicated in a red circle in the Status column. Page templates in this status are bound to authentication polices.

Figure 16 Page template list

 

Adding a page template

The administrator can customize the first page, authentication page, and authentication completion page for PCs, pads, and phones. Figure 17 displays an example of the customized first page, authentication page, and authentication completion page on a phone.

Figure 17 Customized pages on a phone

 

To add a page template:

1.     From the left navigation tree, select Page Template.

2.     On the Page Template page, click Add.

3.     Configure theme parameters, as shown in Figure 18, and then click OK.

Figure 18 Adding a theme

 

4.     On the template customization page, select a page type, and drag basic controls from the Basic Controls area. Then edit the controls in the right area of the page, as shown in Figure 19.

Figure 19 Customizing a template

 

5.     Save the page. You can immediately release the page after saving it.

The customization of the first page is optional. The customization of the authentication page and authentication completion page is required.

Only released page templates can be bound to authentication polices. To edit a released page template, you must cancel the page template release first.

Importing a page template

1.     From the left navigation tree, select Page Template.

2.     On the Page Template page, click Import Template File.

The Import Template File page opens, as shown in Figure 20.

Figure 20 Importing a template file

 

3.     Enter a unique theme name.

4.     Click Choose File, and then select a local page template.

5.     Click OK.

Configuring an authentication policy

An authentication policy bound to a portal defines wireless services available for portal users.

To configure an authentication policy:

1.     From the left navigation tree, select Authentication Policy.

2.     On the Authentication Policy List page, click Add.

3.     Configure the following parameters on the Add Authentication Policy page, as shown in Figure 21:

¡     Name—Enter an authentication policy name.

¡     Description—Enter a description of the authentication policy.

¡     Page Template—Select a page template to bind it to the authentication policy.

¡     Authentication Free—Select this option if no user authentication is required and only authentication completion page is pushed to users.

¡     Only Mobile Endpoints—Select this option if IPM authenticates only mobile endpoints.

¡     Transparent Authentication Period—Specify a transparent period during which a user can reconnect to the network by clicking One-Click Login without entering a verification code. The default is Today.

¡     Idle Time Before Network Cut (Minutes)—Specify an idle time after which the user is disconnected from the network if the user traffic is less than the value specified in the Idle Traffic Before Network Cut field.

¡     Idle Traffic Before Network Cut (Bytes)—Use this parameter with Idle Time Before Network Cut.

¡     Max. Online Duration Per Access (Seconds)—Specify the maximum online duration for each network access. If you set the parameter value to 0, the online duration per access is unlimited.

¡     Maximum Online Duration Per Day (Seconds)—Specify the maximum total duration for which a user can use the network from 00:00 to 24:00. If you set the parameter value to 0, the online duration per day is unlimited.

¡     Maximum Traffic Per Day (MB)—Specify the maximum total traffic that can be used by a user from 00:00 to 24:00. If you set the parameter value to 0, the traffic per day is unlimited.

¡     WeChat ConfigurationSelect a WeChat configuration name if WeChat authentication is selected on the page template. For more information about WeChat authentication, see "Configuring WeChat authentication."

¡     SMS Message AuthenticationConfigure a description for the authentication message if SMS authentication is selected on the page template.

¡     Authentication Email SubjectConfigure the subject for the authentication email if email authentication is selected on the page template.

¡     Authentication Email BodyEnter the body of the authentication email if email authentication is selected on the page template.

Figure 21 Adding an authentication policy

 

4.     Click OK.

Managing advertisements

IPM supports customizing the following types of advertisements to provide flexible advertisement push services:

·     Static advertisementsSupport adding picture advertisements.

·     Dynamic advertisementsSupport adding scrolling pictures, pictures, two pictures in parallel, three pictures in parallel, four pictures in parallel, rich text, and titles to advertisements. You can also add tag advertisements.

Static advertisements

To add a static advertisement:

1.     From the navigation tree, select Advertisement Promotion > Static Advertisement Management.

2.     Click Add on the page that opens.

3.     Configure the following parameters to add a static advertisement, as shown in Figure 22.

¡     Advertisement NameEnter a unique advertisement name.

¡     Advertisement VendorEnter the name of the advertisement vendor.

¡     Advertisement URLEnter the URL of the advertisement. When you add an advertisement to a theme template, the advertisement URL is embedded into the advertisement picture.

¡     Advertisement DescriptionEnter a description for the advertisement.

¡     Advertisement PictureUpload the advertisement picture. Static advertisements support only pictures.

Figure 22 Adding a static advertisement

 

4.     Click OK.

The advertisement is added to the static advertisement list, as shown in Figure 23.

Figure 23 Static advertisement list

 

To select the customized advertisement when you customize the page template, select Picture in the Basic Controls area, then select Static Advertisement to select the advertisement.

Dynamic advertisements

Adding a dynamic advertisement

1.     From the navigation tree, select Advertisement Promotion > Dynamic Advertisement Management.

2.     Click Add on the page that opens.

3.     Configure the following parameters to add a dynamic advertisement, as shown in Figure 24.

¡     Advertisement NameEnter a unique advertisement name.

¡     TypeSelect a dynamic advertisement type. Options include Scrolling Pictures, Picture, Two Pictures in Parallel, Three Pictures in Parallel, Four Pictures in Parallel, Rich Text, and Title.

¡     Default AdvertisementSelect a static advertisement as the default advertisement when the advertisement type is set to Scrolling Picture, Picture, Two Pictures in Parallel, Three Pictures in Parallel, Four Pictures in Parallel, or Rich Text.

¡     Advertisement DescriptionEnter a description for the advertisement.

Figure 24 Adding a dynamic advertisement

 

4.     Click OK.

The advertisement is added to the dynamic advertisement list, as shown in Figure 25.

Figure 25 Dynamic advertisement list

 

Adding a tag advertisement

Tag advertisements support the collaboration between advertisements and user tags. IPM can push different advertisements to users based on user tags.

To add a tag advertisement:

1.     Access the dynamic advertisement list.

2.     Click the name of an advertisement.

3.     On the Tag Advertisement List page that opens, click Add.

4.     Select an advertisement tag and add advertisements to this tag.

Figure 26 Adding a tag advertisement

 

5.     Click Add.

After you select a dynamic advertisement with an advertisement tag for a page template, the collaboration between page elements and user tags can push specific advertisements to targeted users.

Managing sites

Adding a site

1.     From the left navigation tree, select Site Management.

2.     On the Site Management page, click Add.

3.     Configure the following site parameters, as shown in Figure 27:

¡     Site Name—Enter the name of the site.

¡     Site AddressEnter a keyword string and then select the matching site address, or click the site on the map to obtain the address. The longitude and latitude field is automatically populated when you click the site on the map. If you enter the site address, the longitude and latitude are not automatically obtained. You can manually enter the site location.

¡     Associate with Location View—Select a location view for the site. The heat map of a site is available only when the site is associated with a location view. For more information, see "Viewing the heat map."

¡     Associated AP List—Select APs that have been deployed in the site. Batch import is supported. For more information, see "Importing site APs."

¡     Associate with IP Address Group List—Select bound IP address groups that have been configured for portal authentication. For more information, see "Binding IP groups to the portal device."

¡     Associate with ACG List—Select associated ACG devices. You can configure sites in ACG configuration. For more information, see "Adding an ACG."

¡     Bind to Authentication Policies—If the site group to which the site belongs has been bound to an authentication policy, you do not need to bind an authentication policy to the site. If a site and its site group are bound to different authentication policies, the site selects an authentication policy bound to the activity group, site, and area group in descending order of priority.

Figure 27 Adding a site

 

4.     Click OK.

Adding a site group

1.     From the left navigation tree, select Site Group.

2.     On the Site Group Management page, click Add.

3.     Configure the following site group parameters, as shown in Figure 28.

¡     Site Group AddressEnter a keyword string and then select the matching address, or click the site on the map to obtain the address.

¡     Longitude and LatitudeThis field is automatically populated when you click the site group on the map. If you enter the site group address, the longitude and latitude are not automatically obtained. You can enter the site location.

¡     OperatorSelect operators that can manage the site group. If you do not select any operators, only the administrator has the privilege to manage this site group.

¡     Bind to Authentication Policies—Bind the site group to authentication policies. If a site and its area group and activity group are bound to different policies, IPM selects a policy from the following policies in descending order of priority:

-     Policies bound to the activity group of the site.

-     Policies bound to the site.

-     Policies bound to the area group of the site.

Figure 28 Adding a site group

 

4.     Click OK.

Moving sites to a site group

1.     Access the Site Group Management page.

2.     On the site group list, click a site group name.

The site group details page opens, as shown in Figure 29.

Figure 29 Moving sites to a site group

 

3.     On the site list, select sites, and click move to group.

4.     Select the site group on the dialog box that opens.

5.     Click OK.

Adding a subgroup

1.     Access the Site Group Management page.

2.     On the site group list, click a site group name.

The site group details page opens, as shown in Figure 29.

3.     On the site list, click Add Subgroup, and then configure the subgroup in the same way a site group is configured.

Importing site APs

IPM supports batch importing APs of a site.

To import site APs:

1.     Access the Site Management page.

2.     Click Import Site APs above the site list.

3.     On the page that opens, select a .csv file, as shown in Figure 30.

4.     Click Next to view the import result.

Figure 30 Importing site APs

 

 

NOTE:

You can associate a site with offline APs only by importing these APs.

 

Viewing the heat map

The heat map of a site displays real-time and history distributions of endpoints that have passed authentication.

To view the heat map of a site:

1.     Access the Site Management page.

2.     On the site list, click the location view name in the Heat Map column of a site.

The heat map of the site is displayed, as shown in Figure 31.

Figure 31 Viewing the heat map

 

Managing users

User list

Adding users

For account-based wireless access solutions, the administrator must preconfigure information of all users by batch import or manually adding users one by one.

To batch import users:

1.     From the left navigation tree, select User Management > User List.

2.     Click Batch Import above the user list.

3.     On the Import User page that opens, select a .csv file, as shown in Figure 32.

4.     Click Next to view the import result.

Figure 32 Batch importing users

 

To add a user:

1.     From the left navigation tree, select User Management > User List.

2.     Click Add User above the user list.

3.     On the Add User page, configure user information, as shown in Figure 33.

The Set Online User Count parameter setting limits the maximum of concurrent online users of an account. You can select By User Group to use the count value that is set when the user group is added, or select Set Count, and then enter a value in the field that appears.

Figure 33 Adding a user

 

4.     Click OK.

Viewing user endpoint information

1.     From the left navigation tree, select User Management > User List.

2.     Click User Endpoint Information above the user list.

Figure 34 Viewing user endpoint information

 

On the user endpoint list, you can remove MAC addresses of users who come online through transparent authentication. These users must be authenticated again when they access the network next time.

Adding a user group

1.     From the left navigation tree, select User Management > User Group.

2.     On the User Group page, click Add.

3.     Configure user group information, as shown in Figure 35.

The Set Online User Count parameter setting limits the maximum of concurrent online users of an account in this user group.

Figure 35 Adding a user group

 

 

NOTE:

The user group feature cooperates with the third-party ACG gateway. The added user group name must be consistent with the configuration on the ACG. The ACG policy assigns different bandwidth and online privileges to user groups. For more information about the ACG configuration, see related document. The ACG device must be associated with the site. For more information, see "Adding an ACG."

 

4.     Click OK.

Assigning users to a user group

1.     Access the user group list.

2.     Click a user group name.

The user group details page opens.

3.     Click Add User, and then select users on the dialog box that opens.

4.     Click OK.

Online users

The online user list displays information about online users of all sites in real-time. Account names, WeChat accounts, or phone numbers of online users are displayed based on the user authentication type. The online user list allows you to query user information by criteria, such as the account name, site name, user IP, and user MAC.

To access the online user list, select User Management > Online User from the left navigation tree.

Figure 36 Online users

 

Access log

The access log list contains information about all users that have connected to the portal network, and it can be used as a supplement for customer flow statistics. To access the access log list, select User Management > Access Logs from the left navigation tree.

Figure 37 Access log

 

Access failure logs

The access failure log list records information about users who fail to access the network.

To access the access failure log list, select User Management > Access Failure Logs from the left navigation tree.

Manually logging off users

Manually log off online users to ensure the network security.

To manually log off one or multiple online users:

1.     Access the online user list.

2.     Select one or multiple online users.

3.     Click Manually Log Off.

Managing the blacklist

Adding users to the blacklist

Users that are added to the blacklist will be forcibly logged off. They cannot access the network until they are removed from the blacklist.

To add users to the blacklist:

1.     Access the User List page.

2.     Select one or multiple users.

3.     Click Add to Blacklist.

Removing users from the blacklist

1.     From the left navigation tree, select User Management > Blacklist.

2.     Select one or multiple users from the blacklist.

3.     Click Remove from Blacklist.

System configuration

Managing operators

An IPM operator can be a super administrator, area operator, or activity operator. For relationship among these types of operators, see "Hierarchical management."

A super administrator manages all activity groups and area groups. An area operator manages area groups. An activity operator manages an activity group.

If an area operator is added by a parent area operator, groups managed by the area operator can only be selected from the groups managed by the parent area operator.

To add an operator:

1.     From the left navigation tree, select System Configuration > Operator Management.

2.     Click Add.

3.     Add an operator, as shown in Figure 38.

Figure 38 Adding an operator

 

4.     Click OK.

Endpoint identification

IPM is preconfigured with various HTTP user agents for endpoint identification. The administrator can add user-defined HTTP user agents.

To add an HTTP user agent:

1.     From the left navigation tree, select System Configuration > Endpoint Identification.

2.     Click the HTTP User Agent link.

3.     On the HTTP User Agent page, click Add.

4.     Configure the following parameters as shown in Figure 39:

¡     HTTP User Agent—Enter an HTTP user agent string, which is typically in the OS&&endpoint model format. The user agent string is the key information extracted from the User-Agent field of an HTTP request packet. For example, if the User-Agent field of the HTTP request is Mozilla/5.0(iPad; U; CPU iPhone OS 3_2 like Mac OS X; en-us) AppleWebKit/531.21.10 (KHTML, like Gecko) Version/4.0.4 Mobile/7B314 Safari/531.21.10 when you access the network through the Safari browser on an iPad, the key information is iPad and like Mac OS X. You can configure the user agent string as iPad&&like Mac OS X to represent the endpoint type and OS information, where the double ampersand (&&) indicates AND.

¡     Vendor—Select the endpoint vendor that matches the HTTP user agent string. Available options include existing vendors in IPM.

¡     Endpoint Type—Select the endpoint type that matches the HTTP user agent string. Available options include existing endpoint types in IPM.

¡     OS—Select the endpoint OS that matches the HTTP user agent string. Available options include existing operating systems in IPM.

¡     Description—Enter a description for the HTTP user agent configuration. A detailed description helps operators differentiate HTTP user agent configurations.

Figure 39 Adding an HTTP user agent

 

5.     Click OK.

Adding an ACG

IPM collaborates with an ACG gateway to control the network access privilege of users. The ACG associated with each site controls user network access based on the user group. To ensure correct collaboration between IPM and an ACG gateway, configure the gateway IP address, port number, and shared key for the ACG gateway. You can configure an associated ACG for a site when you add the site.

To add an ACG:

1.     From the left navigation tree, select System Configuration > ACG Configuration.

2.     Click Add.

3.     Add an ACG, as shown in Figure 40.

Figure 40 Adding an ACG

 

4.     Click OK.

Configuring system parameters

1.     From the left navigation tree, select System Configuration > System Parameters.

2.     Configure the following parameters, as shown in Figure 41.

¡     Device Monitoring Page Title—Enter the title of the device monitoring page.

¡     Customer Flow Monitoring Page Title—Enter the title of the customer flow monitoring page.

¡     iMC Server Address—Specify the public address of the iMC sever used to cooperate with the WeChat server.

¡     IPM WeChat Cloud Server AddressEnter the public address of the WeChat authentication server.

¡     Phone Number Format RequirementEnter a Java regular expression. IPM uses this regular expression to determine whether the number string provided by the user during authentication is a phone number.

¡     SMS Message Verification Code LengthSet a length for SMS message verification codes for SMS message authentication.

¡     IP After NATEnter an IP address if NAT is used in the network.

¡     Limit Online User CountSelect whether to enable limiting concurrent online users of the same account. The concurrent online user count of the same account takes effect only after you enable this feature.

¡     Enable Authentication LoggingSelect whether to enable authentication logging. Authentication information is logged if you enable this feature.

¡     Enable HeartbeatSelect whether to enable heartbeat check. If you enable this feature, IPM performs the heartbeat check on lightweight portal devices.

¡     Heartbeat Interval (Seconds)Set an interval for IPM to perform the heartbeat check. As a best practice, set this value to be identical to the user synchronization interval for lightweight portal authentication on the device.

¡     Max. Heartbeat Check TimesSet the maximum number of heartbeat recheck times. This number does not include the first check failure. IPM logs out portal authenticated users when this number is exceeded and no heartbeat is detected.

¡     Phone Number LocationSelect a location. IPM uses this location to determine whether phone numbers are local.

¡     Authentication Data and Parameter Configuration—Click Take Effect Immediately to enable the authentication policy to take effect immediately. If you do not click Take Effect Immediately, the authentication policy takes effect when a periodic task is executed at intervals of 10 minutes.

¡     Page Template—Click Immediately Release to enable the authentication server to obtain the page templates that have been configured. This task is typically performed for data recovery authentication server capacity expansion. Do not perform this task frequently or at a time users come online or go offline. Before you perform this task, make sure all authentication servers have been started.

Figure 41 System parameters

 

Platform device view

The platform device view enables the administrator to view wireless devices on the network and configure them conveniently.

To access the platform device view, select System Configuration > Platform Device View, as shown in Figure 42.

Figure 42 Platform device view

 

Configuring the SMS message platform

The SMS message platform originates from the iMC platform, and IPM provides a quick entrance for it. For more information about configuring the SMS message platform, see H3C IMC Enterprise and Standard Platform Administrator Guide.

The SMS message platform can be used for SMS message authentication and marketing. For more information, see "Configuring the SMS message operation."

To access the SMS message platform configuration page, select System Configuration > SMS Platform Configuration from the left navigation tree, as shown in Figure 43.

Figure 43 Configuring the SMS message platform

 

Configuring WeChat authentication

Associate the WeChat official account with shop information for WeChat authentication. For more information about adding a WeChat official account, see "Adding a WeChat official account."

To configure WeChat authentication:

1.     From the left navigation tree, select System Configuration > WeChat Authentication Configuration.

2.     Click Add.

3.     Configure WeChat authentication for a branch portal, as shown in Figure 44.

The WeChat configuration parameters must be same in IPM and WeChat official platform.

Figure 44 Configuring WeChat authentication for a branch portal

 

4.     Click OK.

Configuring third-party authentication parameters

If IPM uses Weibo, QQ, or Alipay authentication methods, you must configure third-party authentication parameters.

To configure third-party authentication parameters:

1.     From the left navigation tree, select System Configuration > Third-Party Authentication Configuration Parameters.

2.     Configure the following third-party authentication parameters, as shown in Figure 45.

¡     AppIDEnter a unique app ID.

¡     AppSecretEnter an app private key for app verification.

¡     Redirect URLEnter a redirect URL. A user is redirected to this URL when logging in by using a third-party private key.

Figure 45 Configuring third-party authentication parameters

 

Configuring the SMS message operation

The SMS message operation enables the administrator to edit SMS message for accurate marketing and send messages by user or user group. It also supports message exchange with customers.

Managing the SMS message content

1.     From the left navigation tree, select SMS Message Operation > Content Management.

Figure 46 Content management

 

2.     Click Add.

3.     Add an SMS message content, as shown in Figure 47.

Figure 47 Adding an SMS message content

 

4.     Click OK.

Sending SMS messages

On the Content Management page, you can select to send SMS messages by user or by user group:

·     To send SMS messages by user, select SMS messages from the SMS message list, and then click By User.

·     To send SMS messages by user group, select SMS messages from the SMS message list, and then click By Group.

To access the Content Management page, select SMS Message Operation > Content Management from the left navigation tree.

You can also configure sending SMS messages immediately or at a specific time.

Figure 48 Sending SMS messages by user

 

Figure 49 Sending SMS messages by user group

 

To view the sending information about SMS messages, access the SMS message sending management page as shown in Figure 50. To access this page, select SMS Message Operation > Sending Management from the left navigation tree.

Figure 50 SMS message delivery

 

Configuring an SMS message delivery task

Perform this task to send a message to targeted users periodically or at a specific time.

To configure an SMS message delivery task:

1.     From the navigation tree, select SMS Message Operation > Timed Sending.

2.     On the page that opens, click Add.

3.     Configure an SMS message delivery task as shown in Figure 51.

Figure 51 Configuring an SMS message delivery task

 

4.     Click OK.

Configuring the WeChat operation

The WeChat operation uses WeChat official accounts to push messages and services to users by using various methods with accurate location and broad coverage.

Adding a WeChat official account

The administrator must apply for a WeChat official account in advance, and then configure the official account information in IPM.

To add a WeChat official account:

1.     From the left navigation tree, select WeChat Operation > WeChat Official Account.

2.     Click Add.

3.     Add the WeChat official account that has been successfully applied, as shown in Figure 52.

The WeChat configuration parameters must be same in IPM and WeChat official platform.

Figure 52 Adding a WeChat official account

 

4.     Click OK.

Configuring a WeChat official account

The administrator can customize WeChat official account information, including the welcome message, menu, message interaction, and user information. Rich text materials are also supported.

On the WeChat official account list, click the Advanced Configuration icon  of a WeChat official account, and configure advanced functions as needed on the page that opens, as shown in Figure 53.

Figure 53 Configuring a WeChat official account

 

Managing the WeChat content

You can customize the WeChat content and send it at a specific time.

To manage the WeChat content:

1.     From the left navigation tree, select WeChat Operation > Content Management.

2.     Click Add.

3.     Configure the WeChat content, as shown in Figure 54.

Figure 54 Adding the WeChat content

 

4.     Click OK.

Configuring a WeChat delivery task

Perform this task to send the WeChat content to targeted users periodically or at a specific time.

To configure a WeChat delivery task:

1.     From the left navigation tree, select WeChat Operation > Timed Sending.

2.     Click Add.

3.     Configure a WeChat delivery task, as shown in Figure 55.

Figure 55 Configuring a WeChat delivery task

 

4.     Click OK.

Configuring portal authentication

Portal authentication provides authentication and authorization for users based on Web pages.

Adding access devices

Only access devices you have added can communicate with IPM.

In portal authentication, IPM acts as both the authentication server and the accounting server. Scenarios with IPM as the authentication server and another accounting server are not supported.

To add an access device:

1.     From the left navigation tree, select Portal Configuration > Access Device.

2.     Click Add.

The page for adding an access device opens, as shown in Figure 56.

3.     Click Add IPv4 Dev or Add IPv6 Dev to select an access device.

4.     Configuring the following parameters for the access device:

¡     Authentication Port—Enter the port to which IPM listens for RADIUS authentication packets. The port must be the same as what is configured on the access device at the CLI. The default port number is 1812.

¡     Accounting Port—Enter the port to which IPM listens for RADIUS accounting packets. The value must be the same as what is configured on the access device at the CLI. The default port number is 1813.

¡     Forcible Logout Type—Select a method that forces users to log out. Options are Disconnect user and Shut down and bring up port.

¡     Access Device Type—Select an access device type from the list.

¡     Shared Key—Enter a shared key. The shared key is used for the access device and IPM to authenticate each other. The value must be the same as what is configured on the access device at the CLI.

¡     Confirm Shared Key—Enter the same shared key as the value in the Shared Key field.

Figure 56 Adding an access device

 

5.     Click OK.

Configuring IP groups

An IP address group determines the accessible network range for endpoint users.

The following workflow applies:

1.     The administrator assigns IP addresses of the network-wide endpoint users to multiple IP address groups according to the network diagram, user distribution, and portal device configuration (NAT or IP address reallocation for example).

2.     When an endpoint user accesses the network from the portal device, only users whose IP addresses are in the bound IP group can pass authentication.

To add an IP group:

1.     From the left navigation tree, select Portal Configuration > Portal IP Group.

2.     Click Add.

3.     Configure the following parameters for an IP address group, as shown in Figure 57:

¡     IP Group Name—Enter the name of an IP address group, which must be unique in IPM.

¡     IPv6—Select Yes to configure the IP address group as an IPv6 address group or select No to configure the IP address group as an IPv4 address group. If you select Yes, you only need to configure Start IP and End IP.

¡     Start IP—Enter the start IPv4 or IPv6 address in an IP address group. When entering an IPv4 address, you must enter a complete IPv4 address. When entering an IPv6 address, you can enter a complete IPv6 address or an IPv6 address in compressed format.

¡     End IP—Enter the end IPv4 or IPv6 address in an IP address group. When entering an IPv4 address, you must enter a complete IPv4 address. When entering an IPv6 address, you can enter a complete IPv6 address or an IPv6 address in compressed format. The start IP address cannot be higher than the end IP address.

¡     Action—Select the type of an IP address group, which can be Normal or NAT. This parameter appears only when you select No for the IPv6 parameter.

-     The NAT option is applicable to the network that has a NAT gateway between private portal devices and a public portal server.

-     The Normal option is applicable to that network that no NAT gateway is deployed between portal devices and the portal server and portal devices are not configured with IP address reallocation.

Figure 57 Adding an IP group

 

4.     Click OK.

Configuring the portal server

Configure IPM as the portal server to enable it to receive and process portal authentication packets.

To configure the portal server,

1.     From the left navigation tree, select Portal Configuration > Portal Server.

2.     Configure the following parameters for the portal server, as shown in Figure 58:

¡     Log LevelSpecify levels of information to be recorded in logs.

¡     Request Timeout (Seconds)—Enter the timeout time of the request sent by the portal server to a portal device.

¡     Server Heartbeat Interval (Seconds)—Enter the interval at which the portal server sends a server heartbeat packet to the portal device.

-     The portal server sends a server heartbeat packet to the portal device at certain intervals. If receiving no server heartbeat packet within an interval, the portal device considers the portal server failed and changes the authentication mode to the fail-open mode. In the fail-open mode, the portal device allows all users to access the Internet without authentication.

-     If the portal device receives a server heartbeat packet in the fail-open mode, the device considers that the portal server recovers and restores to the authentication mode.

To enable server heartbeat on the portal device, select Yes for Support Server Heartbeat for the portal device. For the CLI configuration on the device, see relation configuration guide.

Figure 58 Configuring the portal server

 

3.     Click OK.

Configuring portal devices

Portal devices cooperate with the portal server to perform portal authentication for users.

Adding a portal device

1.     From the left navigation tree, select Portal Configuration > Portal Device.

2.     Click Add.

3.     Add a portal device, as shown in Figure 59:

¡     Device Name—Enter the name of the portal device. The name must be unique in IPM.

¡     IP Address—Enter the IPv4 or IPv6 address of the portal device.

¡     Key—Enter a key. The key is used for the portal device and IPM to authenticate each other. The value must be the same as what is configured on the portal device at the CLI.

¡     Confirm Key—Enter the same key as the value in the Key field.

¡     Authentication Retries—Enter the number of authentication requests that the portal server re-sends to the portal device when a request times out. The portal server considers a request times out if it cannot receive a reply from the portal device within a specified period of time after the request is sent.

¡     Logout Retries—Enter the number of logout requests that the portal server re-sends to the portal device when a request times out. The portal server considers a request times out if it cannot receive a reply from the portal device within a specified period of time after the request is sent.

¡     Support Server Heartbeat—Select Yes or No to enable or disable server heartbeat for the portal device.

¡     VersionSelect a portal version for the portal device.

¡     Device Description—Enter detailed information about a portal device for easy maintenance.

Figure 59 Adding a portal device

 

4.     Click OK.

Binding IP groups to the portal device

1.     Access the portal device configuration page.

2.     Click the Bind IP Address Groups  icon in the Operation column.

3.     On the page that opens, click Add.

4.     Perform the following tasks, as shown in Figure 60.

a.     Select an authentication method used by endpoint users for Select Authentication Method. Options are PAP and CHAP.

b.     Select IP groups that can access the network from the IP group list.

Figure 60 Binding IP groups to the portal device

 

5.     Click OK.

  • Cloud & AI
  • InterConnect
  • Intelligent Computing
  • Security
  • SMB Products
  • Intelligent Terminal Products
  • Product Support Services
  • Technical Service Solutions
All Services
  • Resource Center
  • Policy
  • Online Help
All Support
  • Become a Partner
  • Partner Resources
  • Partner Business Management
All Partners
  • Profile
  • News & Events
  • Online Exhibition Center
  • Contact Us
All About Us
新华三官网