beautypg.com

Security level, security mode, and device action, Isolation mode – H3C Technologies H3C Intelligent Management Center User Manual

Page 33

background image

17

Security level, security mode, and device action

A security level for smart devices contains check items and their respective security modes and device

actions. Security modes define actions to take in response to non-compliant users. Device actions are

taken on any smart devices used by non-compliant users.
EAD supports the following security modes in descending order of severity:

Kick Out—The EAD server works with the UAM server to log off non-compliant users and generates
security logs for violations.

Isolate—The EAD server isolates non-compliant users in a restricted area, informs the users of the
security vulnerability and remediation methods, and generates security logs for violations.

No Action—The EAD server only generates security logs for violations.

EAD supports the following device actions in descending order of severity:

Wipe Data—The EAD server works with the MDM server to wipe all data and restore factory
settings on the smart device, and generates security logs for violations.

Wipe Corporation Data—The EAD server works with the MDM server to wipe the corporation data
on the smart device and generates security logs for violations.

Lock—The EAD server works with the MDM server to lock the smart device and generates security
logs for violations.

When a smart device fails the security check, EAD immediately takes the configured actions for the

non-compliant user and smart device, regardless of the Action After parameter setting.

Isolation mode

Smart device user isolation is implemented based on ACLs or VLANs, which are deployed to the access

device.
ACLs and VLANs can be defined for network security or for isolation.

Security ACLs and VLANs define the accessible areas for users who pass the security check.

Isolation ACLs and VLANs define the quarantine areas for users who fail the security check to fix
security vulnerabilities.

EAD provides several isolation modes for smart devices, as shown in

Table 8

.

Table 8 Smart device isolation modes

Isolation mode

Description

Remarks

Deploy ACLs to access device

The EAD server deploys security and isolation
ACLs to the access device for users' access

control.
The mechanism for processing ACLs depends
on the device vendor and model.

The access device must
support the ACL deployment

feature.

Deploy VLANs to access
device

The EAD server deploys security and isolation
VLANs to the access device for users' access

control.
The mechanism for processing VLANs

depends on the device vendor and model.

The access device must
support the VLAN deployment
feature.