beautypg.com

Table 9, Table 10, Table 11 – H3C Technologies H3C Intelligent Management Center User Manual

Page 105

background image

87

Table 9 Guest menu

Item Function

All Guests

Allows you to query, delete, or blacklist guests.

Guest Manager

Allows you to query, add, modify, or delete guest managers.

Guest Service

Allows you to add or delete services that can be assigned to guests.

Guest Parameters

Allows you to configure the global parameters for guest management.

Table 10 User Endpoint menu

Item Function

Endpoint Management

Allows you to view and manage the correlations between the endpoint device
information and the account name. You can also configure transparent MAC

authentication for endpoint devices.

Endpoint Configuration
Distribution Policy

Allows you to query, add, modify, or delete configuration distribution policies for
endpoints.

Endpoint Configuration
Templates

Allows you to query, add, modify, or delete endpoint configuration templates.

Endpoint Configuration
Tool

Allows you to view the endpoint configuration tool.

Endpoint Configuration
History

Allows you to view the history of deployment from configuration templates to
endpoints.

Endpoint Profiling

Allows you to query, add, modify, or delete the correlations between endpoint
information and characters (such as DHCP, HTTP User Agent, and MAC).

Device Fingerprint

Allows you to query, add, modify, or delete the endpoint information, such as
vendor, type, and operation system.

Table 11 User Access Log menu

Item Function

Auth Failure Log

Allows you to view the authentication failure logs and analyze authentication
failure reasons.

Access Details

Allows you to view login details about endpoint users, including the account
name, service name, user IP address, access duration, and the endpoint

information.

Roaming Access Details

Allows you to view login details about roaming users, including the login
name, device IP address, and access duration.

Authentication Violation Log

Allows you to view authentication violation information for endpoint users,
including the account name, user IP address, user MAC address, violation
duration, and violation type.

Self-Service Log

Allows you to view the operation logs that are generated for endpoint users at
the self-service center.

Device User AuthN Log

Allows you to view the authentication information for device users, including
the account name, service type, authentication time, and authentication result.

Endpoint Conflict Audit

Allows you to view conflicts for the endpoint information compared to the

stored information in UAM during endpoint user authentication.