12 managing endpoint devices, Managing endpoint devices, Viewing the endpoint list – H3C Technologies H3C Intelligent Management Center User Manual
Page 279

261
12 Managing endpoint devices
User endpoint management provides the following functions:
•
Endpoint Management—Allows you to manage endpoint device information, user information, and
transparent MAC authentication.
•
Endpoint Configuration Management—It is also called BYOD quick deployment, and allows you to
send endpoint configurations to endpoints and to make the configurations effective on endpoints.
Endpoint configuration contains BYOD authentication auxiliary configuration and security
configuration.
•
Endpoint Identification—Allows you to identify the vendor, type, and operating system of an
endpoint. For more information, see "
9 Managing endpoint identification
Managing endpoint devices
The Endpoint Management module maintains an endpoint list that shows the correlations between
endpoint information and access user accounts. The entries are automatically learned by UAM, but they
cannot be manually added to the endpoint list.
UAM uses the following entry learning process:
•
When an endpoint user passes authentication for the first time, UAM automatically learns the
correlation between the endpoint's MAC address and the account name, and generates an entry
on the endpoint list. This entry is not updated even when the user account successfully passes
authentication from another endpoint.
•
When an endpoint user manually adds correlations between endpoint MAC addresses and access
user accounts in the self-service center, UAM automatically adds these entries to the endpoint list.
An access user account can be correlated with multiple endpoints.
•
An operator bulk imports correlations between endpoint MAC addresses and access user accounts
to UAM. An access user account can be correlated with multiple endpoints.
•
With endpoint identification, UAM obtains endpoint information, correlates the information with
the endpoint MAC address, and generates an entry on the endpoint list. Operators can modify the
entry. When the endpoint is used for authentication, UAM compares the endpoint information with
the entry. If the information does not match, UAM generates an endpoint conflict audit log. For more
information about endpoint identification, see "
9 Managing endpoint identification
The Endpoint Management module also enables you to configure transparent authentication for
endpoints. This function requires transparent MAC authentication to be enabled in UAM service
parameter settings.
In addition, an operator can associate specific users with an endpoint device to prevent other users from
using the endpoint device for network access.
Viewing the endpoint list
1.
Click the User tab.
2.
From the navigation tree, select User Endpoint > Endpoint Management.