beautypg.com
i
Contents
1 UAM overview ·························································································································································· 1
UAM in the EAD solution ················································································································································· 1
UAM functional structure ·················································································································································· 1
UAM user types ································································································································································· 2
UAM access control settings ············································································································································ 2
Authorization ···························································································································································· 2
Binding ······································································································································································ 3
Access and authentication methods ································································································································ 4
802.1X access ·························································································································································· 4
Portal access ····························································································································································· 5
VPN access ······························································································································································· 7
MAC authentication ················································································································································· 7
UAM local authentication ········································································································································ 8
LDAP authentication ················································································································································· 8
RSA authentication ··················································································································································· 9
Roaming authentication ········································································································································ 10
UAM and access device cooperation ·························································································································· 11
Access device configuration ································································································································· 12
Other UAM functions ····················································································································································· 12
Monitoring and auditing ······································································································································ 12
Terminal page customization ······························································································································· 13
Trouble report management ································································································································· 13
Hierarchical management ···································································································································· 14
System configuration ············································································································································· 14
Self service ····························································································································································· 14
2 UAM authentication architecture ··························································································································· 15
UAM function in simple AAA authentication model ··································································································· 15
UAM authentication architecture description ·············································································································· 15
Endpoint types ······················································································································································· 15
Authentication functions ········································································································································ 16
Authentication methods········································································································································· 16
Endpoint authentication schemes ························································································································· 17
BYOD ·············································································································································································· 22
Roaming ·········································································································································································· 23
UAM authentication configuration guide ···················································································································· 23
802.1X authentication and UAM local authentication ······························································································ 23
UAM configuration ················································································································································ 24
Access device configuration ································································································································· 28
Endpoint configuration ·········································································································································· 29
Parameter correlation ············································································································································ 29
Portal authentication and UAM local authentication ·································································································· 29
UAM configuration ················································································································································ 30
Access device configuration ································································································································· 36
Endpoint configuration ·········································································································································· 37
Parameter correlation ············································································································································ 37
Transparent portal authentication ································································································································· 38
UAM configuration ················································································································································ 38
Access device configuration ································································································································· 40