H3C Technologies H3C Intelligent Management Center User Manual

Page 6

Advertising
background image

i

Contents

1 UAM overview ·························································································································································· 1

 

UAM in the EAD solution ················································································································································· 1

 

UAM functional structure ·················································································································································· 1

 

UAM user types ································································································································································· 2

 

UAM access control settings ············································································································································ 2

 

Authorization ···························································································································································· 2

 

Binding ······································································································································································ 3

 

Access and authentication methods ································································································································ 4

 

802.1X access ·························································································································································· 4

 

Portal access ····························································································································································· 5

 

VPN access ······························································································································································· 7

 

MAC authentication ················································································································································· 7

 

UAM local authentication ········································································································································ 8

 

LDAP authentication ················································································································································· 8

 

RSA authentication ··················································································································································· 9

 

Roaming authentication ········································································································································ 10

 

UAM and access device cooperation ·························································································································· 11

 

Access device configuration ································································································································· 12

 

Other UAM functions ····················································································································································· 12

 

Monitoring and auditing ······································································································································ 12

 

Terminal page customization ······························································································································· 13

 

Trouble report management ································································································································· 13

 

Hierarchical management ···································································································································· 14

 

System configuration ············································································································································· 14

 

Self service ····························································································································································· 14

 

2 UAM authentication architecture ··························································································································· 15

 

UAM function in simple AAA authentication model ··································································································· 15

 

UAM authentication architecture description ·············································································································· 15

 

Endpoint types ······················································································································································· 15

 

Authentication functions ········································································································································ 16

 

Authentication methods········································································································································· 16

 

Endpoint authentication schemes ························································································································· 17

 

BYOD ·············································································································································································· 22

 

Roaming ·········································································································································································· 23

 

UAM authentication configuration guide ···················································································································· 23

 

802.1X authentication and UAM local authentication ······························································································ 23

 

UAM configuration ················································································································································ 24

 

Access device configuration ································································································································· 28

 

Endpoint configuration ·········································································································································· 29

 

Parameter correlation ············································································································································ 29

 

Portal authentication and UAM local authentication ·································································································· 29

 

UAM configuration ················································································································································ 30

 

Access device configuration ································································································································· 36

 

Endpoint configuration ·········································································································································· 37

 

Parameter correlation ············································································································································ 37

 

Transparent portal authentication ································································································································· 38

 

UAM configuration ················································································································································ 38

 

Access device configuration ································································································································· 40

 

Advertising