4 configuring imc for use, Securing imc and access to managed resources, 4 configuring imc – H3C Technologies H3C Intelligent Management Center User Manual

Page 136: For use

Advertising
background image

122

4 Configuring IMC for use

Effective implementation and maintenance of IMC depends on pre-discovery planning and

configuration. This chapter describes the functional areas of IMC that are most effectively used when

configured and implemented prior to populating IMC with users, devices, and resources. In addition, the
chapter includes basic IMC system-wide configuration and maintenance functions.

Securing IMC and access to managed resources

IMC offers you powerful control over network resources including network devices, network users, and

services. Securing IMC is at the top of the list of priorities for configuring IMC for use. This section
describes the security options available in IMC that secure its use, the access and control over resources

it offers you, and the data IMC uses to manage resources. Operator groups: Operator groups enable

you to assign or remove IMC management privileges by group. You can also create custom groups to

further extend administrative control over access to IMC and the network resources managed by it. For
configuring operator groups, see "

Managing operator groups

."

Operator roles: You have the ability to assign various levels of rights to individual operator accounts with

the ability to restrict access by views and groups. For configuring operator accounts, see "

Managing

IMC operators

."

Login control templates: You can permit or deny operator access to IMC by IP address. For configuring
login control templates, see "

Securing IMC through operator login control templates

."

Integration with authentication services: IMC supports secure access to IMC through integration with

RADIUS and LDAP for operator authentication to IMC. For more information, see "

Securing IMC access

through authentication services

."

Password strategy: IMC enables you to define system-wide password requirements for all operators that

have access to IMC. For configuring password strategies, see "

Establishing IMC password strategies

."

Online operators: You can view current IMC access and activity through the Online Operators feature.

Through this feature, you can log operators off as well as block access to IMC in real time. For more
information about this feature, see "

Managing online IMC operator access

."

SNMP configuration: For secure communications between IMC and managed devices, IMC supports

SNMPv1, v2c and various forms of v3. In addition, IMC also supports global SNMP community string

management for all managed devices once devices are configured to be managed by IMC. For
configuring SNMP through templates, see "

SNMP templates

."

Telnet and SSH device access: IMC also supports remote device access through Telnet and SSH with the

ability to use templates to configure Telnet and SSH settings. For configuring Telnet and SSH templates,

see "

Device access templates

."

Resource management: managing network

resources with global settings

IMC incorporates many services and features that enable you to easily and effectively manage global

network resources.

Advertising