H3C Technologies H3C Intelligent Management Center User Manual

Page 7

Advertising
background image

ii

Endpoint configuration ·········································································································································· 41

 

Anonymous MAC authentication ·································································································································· 41

 

UAM configuration ················································································································································ 42

 

DHCP server configuration ··································································································································· 42

 

Access device configuration ································································································································· 42

 

Endpoint configuration ·········································································································································· 43

 

Account registering configuration ························································································································ 43

 

Transparent MAC authentication ································································································································· 45

 

UAM configuration ················································································································································ 45

 

Access device configuration ································································································································· 46

 

VPN authentication and UAM local authentication ··································································································· 46

 

UAM configuration ················································································································································ 47

 

VPN gateway configuration ································································································································· 51

 

Endpoint configuration ·········································································································································· 55

 

Parameter correlation ············································································································································ 55

 

Mute terminal authentication ········································································································································ 55

 

UAM configuration ················································································································································ 56

 

Access device configuration ································································································································· 60

 

Mute terminal configuration ································································································································· 61

 

LDAP authentication ······················································································································································· 61

 

UAM configuration ················································································································································ 62

 

RSA authentication ························································································································································· 67

 

UAM configuration ················································································································································ 68

 

Certificate authentication ·············································································································································· 73

 

802.1X authentication and certificate authentication ······················································································· 73

 

Portal authentication and certificate authentication ··························································································· 76

 

Roaming authentication ················································································································································· 78

 

UAM 1 configuration ············································································································································ 79

 

UAM 2 configuration ············································································································································ 83

 

3 UAM menus and common operations ·················································································································· 86

 

Navigation menu ··························································································································································· 86

 

Common operations ······················································································································································ 89

 

Sorting a list ··························································································································································· 89

 

Navigating a list ···················································································································································· 89

 

Importing devices ·················································································································································· 90

 

4 Service quick experience ······································································································································· 92

 

Configuring service quick experience ························································································································· 92

 

Making a service quick experience ····························································································································· 94

 

5 Accessing service configuration wizard ··············································································································· 95

 

6 Using the service fast deploy function ··················································································································· 96

 

Configuring service fast deploy for guest MAC authentication ················································································ 96

 

Configuring service fast deploy for employee MAC authentication ········································································· 98

 

Configuring service fast deploy for employee 802.1X authentication ·································································· 100

 

7 Configuring access conditions ···························································································································· 103

 

Configuring access period policies ···························································································································· 104

 

Accessing the access period policy list page ··································································································· 104

 

Viewing access period policy details ················································································································ 104

 

Adding an access period policy ························································································································ 105

 

Modifying an access period policy ··················································································································· 106

 

Deleting an access period policy ······················································································································ 106

 

Configuring access device groups ····························································································································· 107

 

Accessing the access device group list page ··································································································· 107

 

Advertising