Querying the unauthorized access list, Viewing the unauthorized access log list – H3C Technologies H3C Intelligent Management Center User Manual

Page 431

Advertising
background image

417

{

Click

to page backward to the front of the Unauthorized Access List.

5.

Click 8, 15, 50, 100, or 200 from the right side of the main pane to configure how many items per
page you want to view.

6.

For the Unauthorized Access List that have more than one page, click 1, 2, 3, 4, 5, 6, 7, 8, 9,10…
from the upper middle or bottom right side of the main pane to jump to a particular page of the list.
You can sort the Unauthorized Access List by most fields. Click the column label to sort the list by
the selected field. The column label is a toggle switch that lets you toggle between the various sort

options specific to each field.

Querying the unauthorized access list

IMC provides the ability to query the Unauthorized Access List.
To query the Unauthorized Access List:

1.

Navigate to Resource > Unauthorized Access List.

2.

Click the Resource tab from the tabular navigation system on the top.

3.

Click the Terminal Access section of the navigation tree on the left.

4.

Click Unauthorized Access under Terminal Access from the navigation tree on the left.
The Unauthorized Access List displays in the main portion of the Unauthorized Access page.

5.

Move the pointer over Query at the upper right corner of Unauthorized Access List, and a search
criteria dialog box appears.

6.

Enter one or more of the following search criteria in the dialog box:

Terminal MAC: Enter the MAC address in the Terminal MAC field.

Terminal IP: Enter the IP address in the Terminal IP field.

Terminal Name: Enter the terminal name in the Terminal Name field.

Device Label: Enter the device label in the Device Label field.

Device IP: Enter the IP address of the access device in the Device IP field.

Interface Description: Enter the description of the interface connected to the terminal in the Interface
Description field.

Status: Select the process status from the Status list.

7.

Click Query.

8.

Click Reset when you have finished your search to restore the full Unauthorized Access List.

Viewing the unauthorized access log list

To view the Unauthorized Access Log List

1.

Navigate to Resource > Unauthorized Access > Unauthorized Access Log List.

a.

Click the Resource tab from the tabular navigation system on the top.

b.

Click the Terminal Access section of the navigation tree on the left.

c.

Click Unauthorized Access under Terminal Access from the navigation tree on the left.
The Unauthorized Access List is displayed in the main portion of the Unauthorized Access
page.

2.

Click All Unauthorized Access Logs.
The Unauthorized Access Log List is displayed in the main portion of the Unauthorized Access Log
List page.

Advertising