Basic information area – H3C Technologies H3C Intelligent Management Center User Manual

Page 151

Advertising
background image

135

Basic Information area

Node Name—Name of the child node.

Status—State of the child node: Normal or Abnormal.

Reason for Abnormality—Reason why the child node is abnormal. When a child node is in the
normal state, this field is empty.

IP Address—IP address of the child node.

Port—Listening port of the child node.

Protocol Type—Protocol type used by the current node to access the child node. Only HTTP is
supported.

AUTH for Accessing Child Node—Indicates whether identity authentication is required for
accessing the child node. Identity authentication is required in centralized policy management.

Login Name—User name used by the current node to access the child node. This field is available
only when AUTH for Accessing Child Node is set to Enable.

Last Report Time—Time when the child node last reported data to the current node.

Last Success Deploy—Time when the current node last performed a successful deployment on the
child node.

Last Deploy—Time when the current node last performed a deployment operation.

Operation Result—Result of the last deployment performed by the current mode operation.

Reason—Reason why the last deployment failed. If the last deployment was successful, this field is
empty.

Real-time statistics on the number of users on the child node area

UAM total permitted—Last reported maximum number of access users permitted by the license on

the child node.

UAM used—Last reported number of existing access users on the child node.

EAD total permitted—Last reported maximum number of EAD users permitted by the license on the
child node.

EAD used—Last reported number of existing EAD users on the child node.

Number of online users—Last reported number of online users on the child node.

Number of secure online users—Last reported number of online users who passed the security
check on the child node.

Number of insecure online users—Last reported number of online users who failed the security
check on the child node. Insecure users include those who are monitored, informed, isolated, and

are to be kicked out.

Number of unknown online users—Last reported number of unknown online users on the child
node. Unknown users include those who are not required to pass the security check and those who

are currently going through the security check.

Number of blacklist users—Last reported number of blacklisted access users on the child node.

Number of guests—Last reported number of guests on the child node.

Real-time statistics on the number of user-services failing the security check on the child nodes area

Anti-virus software check failures—Number of access users who failed the anti-virus software

check.

Advertising