Access device configuration, Other uam functions, Monitoring and auditing – H3C Technologies H3C Intelligent Management Center User Manual
Page 30: Online user management, Access service topology display and operation, Log management, Data export (dump), Reports

12
UAM supports establishing an authentication network with HP, H3C, Cisco, Huawei, and Ruijie devices,
and with other devices that support standard RADIUS.
Access device configuration
For use with UAM, an access device must be configured with RADIUS, 802.1X, portal, VPN, MAC
authentication, or certificates, as needed to meet the network requirements.
For more information about configuration, see the configuration guides of the access device.
Other UAM functions
Other UAM functions include monitoring and auditing, trouble report management, hierarchical
management, system configuration, and self-service.
Monitoring and auditing
UAM functions to monitor, control, and audit access users.
Online user management
UAM displays all online users in a list. You can perform the following operations on the list:
•
Send messages. For example, you can send a message to users, telling them to log off before system
maintenance.
•
Log off unauthorized online users.
•
Log off users halted due to network device reboot or other reasons.
Access service topology display and operation
An access service topology integrates user management and access device management into the basic
network topology.
On an access service topology, you can display/hide access users, log off online users, and send
messages to online users.
Log management
Logs help you analyze and audit users' network access behaviors, as well as analyze and locate network
errors.
UAM logs user authentication failures, user network access details, and user self-service operations.
Data export (dump)
The data export function lets you export data from UAM to other storage devices. Data export helps
ensure high performance by implementing data backup and by reducing the data that UAM saves
You can export UAM access user information and user network access details.
Reports
Reports summarize and display data in tables and charts. You can use the reports to audit user behavior
history and to analyze trends.
UAM provides the following reports:
•
Online user count