Role-based administrative controls, Role-based, Administrative controls – H3C Technologies H3C Intelligent Management Center User Manual
Page 16

2
This includes creating, managing, and maintaining alarm lists for:
{
Trap and syslog filters
{
Trap and syslog definitions
{
Alarm notifications
•
Monitoring, reporting, and alarming on the performance of the network and the devices that
comprise it.
This includes:
{
Managing global and device-specific monitors.
{
Managing global and device-specific thresholds.
{
Creating views and reports for displaying performance information.
Performance monitoring and management
•
Access control list (ACL) management. This includes:
{
Creating and maintaining ACL templates, resources, and rule sets.
{
Deploying ACL rule sets to devices managed by IMC.
{
Monitoring and leveraging ACLs that exist on devices for deployment to other network devices.
•
Monitoring and managing security attacks and the alarms they generate. See "
•
Global management of VLANs on all devices that support VLANs, managed by IMC. See "
These are the functional areas of IMC base platform. In addition, the IMC framework and suite of
services also includes service components for extending the scope and reach of IMC ability to manage
the network infrastructure.
Role-based administrative controls
IMC provides administrators with both the tools and the ability to grant access to only those features and
resources operators need.
IMC also provides controls and audit trails to support IT management best practices.
In IMC, management rights and access to all resources managed by IMC are granted or restricted
through the use of three IMC features:
•
Operator groups
•
Device groups
•
Custom views of the devices
Through the configuration of the operator account these three features converge to define the specific set
of access and management rights and restrictions assigned to each operator.
First, administrators define operator by selecting which IMC features members of the group can access.
An administrator can use operator groups to grant or restrict access to IMC features including:
•
Resource Management
•
Alarm Management