Table 9, Table 10, Table 11 – H3C Technologies H3C Intelligent Management Center User Manual
Page 105

87
Table 9 Guest menu
Item Function
All Guests
Allows you to query, delete, or blacklist guests.
Guest Manager
Allows you to query, add, modify, or delete guest managers.
Guest Service
Allows you to add or delete services that can be assigned to guests.
Guest Parameters
Allows you to configure the global parameters for guest management.
Table 10 User Endpoint menu
Item Function
Endpoint Management
Allows you to view and manage the correlations between the endpoint device
information and the account name. You can also configure transparent MAC
authentication for endpoint devices.
Endpoint Configuration
Distribution Policy
Allows you to query, add, modify, or delete configuration distribution policies for
endpoints.
Endpoint Configuration
Templates
Allows you to query, add, modify, or delete endpoint configuration templates.
Endpoint Configuration
Tool
Allows you to view the endpoint configuration tool.
Endpoint Configuration
History
Allows you to view the history of deployment from configuration templates to
endpoints.
Endpoint Profiling
Allows you to query, add, modify, or delete the correlations between endpoint
information and characters (such as DHCP, HTTP User Agent, and MAC).
Device Fingerprint
Allows you to query, add, modify, or delete the endpoint information, such as
vendor, type, and operation system.
Table 11 User Access Log menu
Item Function
Auth Failure Log
Allows you to view the authentication failure logs and analyze authentication
failure reasons.
Access Details
Allows you to view login details about endpoint users, including the account
name, service name, user IP address, access duration, and the endpoint
information.
Roaming Access Details
Allows you to view login details about roaming users, including the login
name, device IP address, and access duration.
Authentication Violation Log
Allows you to view authentication violation information for endpoint users,
including the account name, user IP address, user MAC address, violation
duration, and violation type.
Self-Service Log
Allows you to view the operation logs that are generated for endpoint users at
the self-service center.
Device User AuthN Log
Allows you to view the authentication information for device users, including
the account name, service type, authentication time, and authentication result.
Endpoint Conflict Audit
Allows you to view conflicts for the endpoint information compared to the
stored information in UAM during endpoint user authentication.