12 managing endpoint devices, Managing endpoint devices, Viewing the endpoint list – H3C Technologies H3C Intelligent Management Center User Manual

Page 279

Advertising
background image

261

12 Managing endpoint devices

User endpoint management provides the following functions:

Endpoint Management—Allows you to manage endpoint device information, user information, and
transparent MAC authentication.

Endpoint Configuration Management—It is also called BYOD quick deployment, and allows you to
send endpoint configurations to endpoints and to make the configurations effective on endpoints.

Endpoint configuration contains BYOD authentication auxiliary configuration and security
configuration.

Endpoint Identification—Allows you to identify the vendor, type, and operating system of an
endpoint. For more information, see "

9 Managing endpoint identification

."

Managing endpoint devices

The Endpoint Management module maintains an endpoint list that shows the correlations between
endpoint information and access user accounts. The entries are automatically learned by UAM, but they

cannot be manually added to the endpoint list.
UAM uses the following entry learning process:

When an endpoint user passes authentication for the first time, UAM automatically learns the
correlation between the endpoint's MAC address and the account name, and generates an entry

on the endpoint list. This entry is not updated even when the user account successfully passes
authentication from another endpoint.

When an endpoint user manually adds correlations between endpoint MAC addresses and access
user accounts in the self-service center, UAM automatically adds these entries to the endpoint list.

An access user account can be correlated with multiple endpoints.

An operator bulk imports correlations between endpoint MAC addresses and access user accounts
to UAM. An access user account can be correlated with multiple endpoints.

With endpoint identification, UAM obtains endpoint information, correlates the information with
the endpoint MAC address, and generates an entry on the endpoint list. Operators can modify the
entry. When the endpoint is used for authentication, UAM compares the endpoint information with

the entry. If the information does not match, UAM generates an endpoint conflict audit log. For more

information about endpoint identification, see "

9 Managing endpoint identification

."

The Endpoint Management module also enables you to configure transparent authentication for

endpoints. This function requires transparent MAC authentication to be enabled in UAM service
parameter settings.
In addition, an operator can associate specific users with an endpoint device to prevent other users from

using the endpoint device for network access.

Viewing the endpoint list

1.

Click the User tab.

2.

From the navigation tree, select User Endpoint > Endpoint Management.

Advertising