Delete unauthorized access entries, Cancel action, Refreshing the unauthorized access list – H3C Technologies H3C Intelligent Management Center User Manual

Page 434

Advertising
background image

420

4.

Select Yes or No from the Trusted list:

{

If Yes is selected, the port allow any terminal to access the network through this port.

{

If No is selected, the port only allow the binding terminals to access the network through this
port.

5.

Click OK to confirm your operation.

Delete unauthorized access entries

To delete one or more unauthorized access entries:

1.

Navigate to Resource > Unauthorized Access.

a.

Click the Resource tab from the tabular navigation system on the top.

b.

Click the Terminal Access section of the navigation tree on the left.

c.

Click Unauthorized Access under Terminal Access from the navigation tree on the left.

The Unauthorized Access List is displayed in the main portion of the Unauthorized Access page.

2.

Click the checkboxes to the left for each unauthorized access entry you want to delete.

3.

Click Delete.

4.

Click OK to confirm your operation.

Cancel action

In the unauthorized access processing policy, you can cancel the action of shutting down a port. The

canceling action is effective when the action is in the waiting state.
To cancel an action:

1.

Navigate to Resource > Unauthorized Access > Unauthorized Access Log List.

a.

Click the Resource tab from the tabular navigation system on the top.

b.

Click the Terminal Access section of the navigation tree on the left.

c.

Click Unauthorized Access under Terminal Access from the navigation tree on the left.

The Unauthorized Access List is displayed in the main portion of the Unauthorized Access page.

2.

Click the All Unauthorized Access Logs.
The Unauthorized Access Log List is displayed in the main portion of the Unauthorized Access Log
List page.

3.

Click the checkboxes to the left for each action status you want to cancel to the associated
unauthorized access log entries.

4.

Click Cancel Action.

5.

Click OK to confirm your operation.

Refreshing the unauthorized access list

To refresh the Unauthorized Access List page:

1.

Navigate to Resource > Unauthorized Access.

a.

Click the Resource tab from the tabular navigation system on the top.

b.

Click the Terminal Access section of the navigation tree on the left.

c.

Click Unauthorized Access under Terminal Access from the navigation tree on the left.

The Unauthorized Access List is displayed in the main portion of the Unauthorized Access page.

2.

Click Refresh to reload the Web page and review any updated information.

Advertising