Access and authentication methods, Access methods, Authentication methods – H3C Technologies H3C Intelligent Management Center User Manual

Page 22: 1x access, Application scenarios

Advertising
background image

4

Access user and access device SN binding—Users can access the network only from an access

device that uses the bound serial number.

Access user and access VLAN binding—Users can access the network only from a specific VLAN on
an access device. The VLAN is specified in UAM. You can use VLAN binding or QinQ VLAN

binding but not both.

Access user and QinQ VLAN binding—Users can access the network only when the user's inner
and outer VLAN configuration is the same as that you configured in UAM. You can use VLAN

binding or QinQ VLAN binding, but not both.

Access user and PC's IPv4 address/IPv4 address range binding—Users can access the network
only when their network adapter for authentication uses a specific IPv4 address or is within an IPv4
address range. The IPv4 address or address range is configured in UAM.

Access user and PC's IPv6 address binding—Users can access the network only when the IPv6
address of the network adapter that the user uses for authentication is the same as that you

configured in UAM.

Access user and PC's MAC address binding—Users can access the network only when the MAC
address of the network adapter that the user uses for authentication is the same as that you

configured in UAM.

Access user and SSID binding—Wireless users can access the network only when the user uses the

same SSID as that you configured in UAM.

Access user and PC name binding—Users can access the network only when the user's PC name is
the same as that you configured in UAM.

PC and domain binding—Users can access the network only when the user's PC is added to the
domain specified in UAM.

PC and login-domain binding—Users can access the network only if the user logs in to a domain
when logging in to the PC operating system.

Access and authentication methods

A UAM authentication system contains UAM, access devices, and clients, as shown in

Figure 2

.

An access method refers to the exchange between a client and its access device.

An authentication method refers to the exchange between an access device and UAM.

An access method and an authentication method work together to implement user identity
authentication.

Access methods

UAM supports 802.1X, portal, VPN, and MAC authentication.

Authentication methods

UAM supports UAM local authentication, LDAP authentication, RSA authentication, and roaming
authentication.

802.1X access

Application scenarios

New network construction, or large-scale rebuilding of an existing network

Advertising