beautypg.com

H3C Technologies H3C Intelligent Management Center User Manual

Page 274

background image

256

{

Outer VLAN ID—Enter the outer VLAN ID to which an access user is bound. UAM supports only

exact match for this field.

{

LDAP Synchronization Policy—Select the LDAP synchronization policy that is associated with an
access user. This query criterion is effective on LDAP users only. For more information about the

LDAP users, see "

Managing LDAP users

."

{

LDAP User Status—Select the LDAP user status from the list. Options include Unknown, Existent,
and Nonexistent. The Unknown option indicates that an LDAP user has not synchronized

information from the LDAP server. The Existent option indicates that the LDAP server contains an

LDAP user that is associated with the access user. The Nonexistent option indicates that the LDAP
server does not contain an LDAP user that is associated with the access user. This query criterion

is effective on LDAP users only. For more information about the LDAP users, see "

Managing LDAP

users

."

{

Windows Domain—Enter the name of the domain to which the computer of an access user is
bound. UAM supports fuzzy matching for this field. For example, if you enter a, all access users
with Windows domain names containing a are queried.

{

IMSI—Enter the IMSI of the user endpoint. UAM supports fuzzy matching for this field. For
example, if you enter act, all access users bound to IMSI that contains act are queried.

{

Computer Name—Enter the name of the computer to which an access user is bound. UAM
supports fuzzy matching for this field. For example, if you enter a, all access users with computer

names containing a are queried.

{

Device SN—Enter the device sequence number bound to the access user. UAM supports fuzzy
matching for this field. For example, if you enter EF, all access users who are bound to a device

sequence number containing EF are queried.

{

Smart Device MAC Address—Enter the device MAC address bound to the access user account.
You can enter a complete MAC address in the format of XXXX-XXXX-XXXX, XX-XX-XX-XX-XX-XX, or

XX:XX:XX:XX:XX:XX, or enter part of a MAC address for a fuzzy match. For example, if you enter

00-ef, all MAC addresses that contain 00-ef are queried.

{

Max. Smart Device Bindings for Portal—Select the maximum number of device MAC addresses
only for transparent authentication that can be bound to the access user account or select Not

Supported from the list. Not Supported indicates the account does not support transparent
portal authentication.

{

WLAN Cell Phone Number—Enter the phone number to which the access user is bound. UAM
supports fuzzy matching for this field. For example, if you enter 138, all access users with bound

phone numbers containing 138 are queried.

Empty fields are ignored.

5.

Click Preview to view the query result in the access user list area.

6.

Click Reset to clear all the query criteria.
The access user list displays all access users.

7.

Click Export Accounts.
The Export File Format page appears.

8.

Select a file format: TXT or CSV. You can open a .csv file in Microsoft Excel.

9.

Select the column separator from the list. Options include Space, TAB, comma (,), colon (:), pound
sign (#), and dollar sign ($). This parameter is available when you select TXT for File Format.

10.

Select whether to export the passwords in plain text. Select Yes to export the passwords in plain
text, or select No to export the passwords in cipher text.

11.

Select the account parameters you want to export.