User access manager – H3C Technologies H3C Intelligent Management Center User Manual

Page 30

Advertising
background image

16

Monitoring of VoIP traffic.

Real-time, graphical service-level views of the entire VoIP infrastructure.

Tracking the real-time operational status of every VCX system and IP phone.

Notification of issues that may impact service quality.

Tracking of changes to IP phone status.

Tracking and inventory of communications devices and IP phones.

Tools to facilitate rapid troubleshooting and fault isolation.

Real-time tracking, evaluation, and reporting on user experience and metrics such as delay, loss,
and jitter.

Measures service quality and calculates reports associated with active calls on the system.

Call quality metrics gathered from IP phones that enable administrators to assess call quality and
address issues proactively.

Voice infrastructure monitoring and management using IMC VSM. This includes VCX, NBX, and
related IP telephony devices, ensuring a single pane of management and service quality for voice

infrastructure-related devices.

User Access Manager

The UAM component provides IMC users with authentication and authorization services for endpoints

accessing the network edge.
As a component of the IMC management platform, UAM centrally manage access for wired, wireless,

and remote users. It supports access policies across devices such as Ethernet switches, routers,

broadband access servers, and VPN access gateways.
UAM, together with the base IMC platform and other IMC modules, provides network operators with

integrated management of users, resources, and services.
UAM provides the following functionality:

RADIUS server that supports centralized AAA management of endpoints that connect and use
network services.

Policy management provides access control with tiered privilege levels. IMC UAM enables multiple
802.1X authentication methods such as PAP, CHAP, EAP, and MS-CHAPv2, and leverages existing

user directories as a RADIUS proxy directly to LDAP-compliant user stores such as the Microsoft

Active Directory, Novelle Directory, OpenLDAP, or as a local user store.

Realms can be created within UAM to authenticate user names and passwords against distributed
UAM databases. This provides authentication redundancy, increasing security and enabling the

authentication of roaming users. IMC UAM provides flexible authorization policies to dictate access

by defining access policies for individual users, devices, and groups. Additionally, policies provide

the ability to control access by location and time of day.

Reporting capabilities through its centralized, Web-based management console, enabling network

administrators to quickly scan the activity and status of all devices currently or historically connected
to the network. Reports can be used for real-time analysis, historical analysis, compliance auditing,

and troubleshooting.

A comprehensive directory of all network attached devices and endpoints—including printers, IP
telephony equipment, uninterruptible power supplies, HVAC systems, PXE boot hosts and badge

readers—to provide additional control and authentication for "non-networking" devices.

Advertising