User access manager – H3C Technologies H3C Intelligent Management Center User Manual
Page 30

16
•
Monitoring of VoIP traffic.
•
Real-time, graphical service-level views of the entire VoIP infrastructure.
•
Tracking the real-time operational status of every VCX system and IP phone.
•
Notification of issues that may impact service quality.
•
Tracking of changes to IP phone status.
•
Tracking and inventory of communications devices and IP phones.
•
Tools to facilitate rapid troubleshooting and fault isolation.
•
Real-time tracking, evaluation, and reporting on user experience and metrics such as delay, loss,
and jitter.
•
Measures service quality and calculates reports associated with active calls on the system.
•
Call quality metrics gathered from IP phones that enable administrators to assess call quality and
address issues proactively.
•
Voice infrastructure monitoring and management using IMC VSM. This includes VCX, NBX, and
related IP telephony devices, ensuring a single pane of management and service quality for voice
infrastructure-related devices.
User Access Manager
The UAM component provides IMC users with authentication and authorization services for endpoints
accessing the network edge.
As a component of the IMC management platform, UAM centrally manage access for wired, wireless,
and remote users. It supports access policies across devices such as Ethernet switches, routers,
broadband access servers, and VPN access gateways.
UAM, together with the base IMC platform and other IMC modules, provides network operators with
integrated management of users, resources, and services.
UAM provides the following functionality:
•
RADIUS server that supports centralized AAA management of endpoints that connect and use
network services.
•
Policy management provides access control with tiered privilege levels. IMC UAM enables multiple
802.1X authentication methods such as PAP, CHAP, EAP, and MS-CHAPv2, and leverages existing
user directories as a RADIUS proxy directly to LDAP-compliant user stores such as the Microsoft
Active Directory, Novelle Directory, OpenLDAP, or as a local user store.
•
Realms can be created within UAM to authenticate user names and passwords against distributed
UAM databases. This provides authentication redundancy, increasing security and enabling the
authentication of roaming users. IMC UAM provides flexible authorization policies to dictate access
by defining access policies for individual users, devices, and groups. Additionally, policies provide
the ability to control access by location and time of day.
•
Reporting capabilities through its centralized, Web-based management console, enabling network
administrators to quickly scan the activity and status of all devices currently or historically connected
to the network. Reports can be used for real-time analysis, historical analysis, compliance auditing,
and troubleshooting.
•
A comprehensive directory of all network attached devices and endpoints—including printers, IP
telephony equipment, uninterruptible power supplies, HVAC systems, PXE boot hosts and badge
readers—to provide additional control and authentication for "non-networking" devices.