Managing endpoint conflict audit logs, Querying endpoint conflict audit logs – H3C Technologies H3C Intelligent Management Center User Manual

Page 504

Advertising
background image

486

Managing endpoint conflict audit logs

UAM supports the following methods for obtaining endpoint information (vendor, endpoint type, and

operation system): iNode client, DHCP character, HTTP user agent, and MAC address range. UAM

compares the obtained endpoint information every time with that recorded in the endpoint list. If different
endpoint information is obtained through the same method, UAM records the difference into the

endpoint conflict audit log. If the Process of Endpoint Information Inconsistency in the user endpoint

settings is set to Allow authentication, the data in the endpoint MAC address list is refreshed.
Endpoint conflict audit log include the MAC address, recording time, account name, login name,

endpoint information obtained this time, the recorded endpoint information, and the obtaining method.
This information helps locate the user authentication failure causes.
UAM clears outdated endpoint conflict audit logs every day for higher database performance. The

retention time of the endpoint conflict audit logs is determined by the service parameter Log Lifetime. For

more information about the service parameter, see "

32 Configuring global system settings

."

Accessing the endpoint conflict audit list page

1.

Click the User tab.

2.

Select User Access Log > Endpoint Conflict Audit from the navigation tree.
The list includes all endpoint conflict audit logs.
Endpoint conflict audit list contents

{

Account Name—Access account name of the endpoint that has endpoint conflict audit logs.
Click the account name to view its details. For more information about access users, see

"

Viewing ordinary access user details

."

{

Login Name—Login username of the account.

{

MAC Address—MAC address of the endpoint that has endpoint conflict audit logs.

{

Recording Time—Time when the endpoint conflict is recorded.

{

Details—Click the Details icon to view detailed information about the endpoint conflict audit
logs.

Querying endpoint conflict audit logs

1.

Access the endpoint conflict audit list page.

2.

In the Query Endpoint Conflict Audit area, specify one or more of the following query criteria:

{

MAC Address—Enter the MAC address of the endpoint that has the endpoint conflict audit logs.
UAM supports fuzzy matching for this field. For example, if you enter ac, all MAC addresses that

contain ac are matched.

{

Recording Time From/To—Set a time range to match the time when the endpoint conflicts are
recorded within this specific time range. Enter a time range or click the Calendar icon to
select one. The date and time settings must be in the format YYYY-MM-DD hh:mm.

Empty fields are ignored.

3.

Click Query.
The endpoint conflict audit list displays all endpoint conflict audit logs that match the query criteria.

4.

To clear the query criteria, click Reset.
The endpoint conflict audit list displays all endpoint conflict audit logs.

Advertising