Auditing logs of a guest access operator, Deleting a guest access operator – H3C Technologies H3C Intelligent Management Center User Manual

Page 1032

Advertising
background image

1018

e.

Enter the end IP address of the access control rule in the End IP input box.

f.

Select an action from the Action list. Options include Permit and Deny. If you select Permit, the
guest access operator can access the network when the guest access operator uses an IP
address in the login control list to access the network. If you select Deny, the guest access

operator cannot access the network when the guest access operator uses an IP address in the

login control list to accesses the network.

g.

Enter the description of the operator login control list in the Description input box.

Selecting an access control rule from an existing template

h.

Select the Select from Existing Templates radio button.

i.

Click the checkbox located to the left of a template to select the template.

j.

Alternatively, you can click the Add Template link to enter the page for adding a login control
template. For how to add a login control template, see "

Securing IMC through operator login

control templates

."

k.

Click OK. The added or selected access control rules are displayed on the login control list.

l.

Click the Delete icon for an access control rule to delete the access control rule.

m.

If there are multiple access control rules, you can arrange them. When a guest access operator
accesses network, the operator is matched against the access control rules in the login control

list in order. When the operator fails to match an access control rule, the operator continue to

match the next one.
Click the Move Down icon for an access control rule to move the access control rule
downwards. Click the Move Up icon for an access control rule to move the access control
rule upwards. For the access control rule on the top of the list, the move up icon is grayed .
For the access control rule on the bottom of the list, the move down icon is grayed .

11.

Click OK to confirm the modification and return to the Guest Access Operator List page.

12.

Click Cancel to cancel the modification and return to the Guest Access Operator List page.

Auditing logs of a guest access operator

All operations of guest access operators are logged. An IMC operator can use the log auditing function

to determine whether the operations of the guest access operators are normal and thus secure the

network. To audit logs of a guest access operator:

1.

Navigate to Users > Guest Access Operator.

a.

Click the User tab from the tabular navigation system on the top.

b.

Click Guest Access Manager on the navigation tree on the left.

c.

Click Guest Access Operator under Guest Access Manager from the navigation system on the
left.
The Guest Access Operator page appears.

2.

Click the View Log icon

in the View Log column for the guest access operator you want to audit.

The page displaying the guest access logs appears. For more information about the guest access

logs, see "

Guest access logs

."

Deleting a guest access operator

You cannot delete an online guest access operator.
To delete a guest access operator:

1.

Navigate to Users > Guest Access Operator.

Advertising