Data sheet | HP MSM Controller Series
• Mobility Traffic Manager
Provides flexible and multiple network distribution schemes address a range of business
needs; policies for user network and security profiles are consistently applied and enforced;
wireless traffic can be directed anywhere in the network as required; enterprise businesses
can easily migrate to the MSM mobility solution, preserving prior network designs
• Controller client access control
Provides an SSL-protected universal access method, MAC address authentication, and
IEEE 802.1X authentication; Web proxy server; support for a centralized portal; AAA security;
WPA and WPA2 encryption; client-fixed IP address spoofing; per-site and per-user access
lists; white-list and black-list support; and bandwidth limiting per user, per VLAN, or per
VSC; and concurrent users (250 for the MSM720 and 2,000 for the MSM760, MSM765 zl,
and MSM775 zl controllers)
• Simplified management with central control
Reduces the time and complexity of managing a wireless network; the solution controls up to
hundreds of APs (depending on the controller) from a single management interface and helps
ensure that a consistent set of services is delivered throughout the wireless network; and the
controllers push authentication, encryption, QoS enforcement, and access policies to the APs,
delivering intelligence to the edge of mobile networks
• Services
Provides standard L2 roaming and VoWLAN support on all controllers, advanced fast roaming on
mobility controllers, plug-and-play AP management, as well as public and guest Internet access
• Advanced fast roaming (requires a mobility controller or upgrade)
Provides WPA2 opportunistic key caching through controller support as well as inter/intra-subnet
roaming and seamless roaming (less than 50 ms roaming delay) support for VoW deployments
Security
• Integrated IDS support (requires the premium mobility version)
– Automated AP and client classification
Reduces manual effort (the administrator can override AP classification)
– Comprehensive detection capabilities
Detects a wide range of attacks
– Flexible event reporting
Enables configuration that determines which events will result in notifications
– Location tracking capabilities
Helps identify the location of a rogue device
– Flexible deployment models
Supports time slicing or dedicating a radio to detect full time
5
Need help?
Do you have a question about the MSM Series and is the answer not in the manual?
Questions and answers