George Persian Logout

00-Overview

Download Book
Title Size Downloads
00-Overview-the whole video set.rar 47.38 MB

Overview

We provide iMC UAM/EAD configuration examples to show how they function to manage and protect your network effectively.

Click the download link to download the whole video set. Or you can go to each video description page to download the single video as needed.

 

Release History

2010-04-08

Seven videos added:

l          71-Automatic Asset Registration

l          72-Manual Asset Registration

l          73-Asset Changes Monitoring

l          74-Deploying Software Through FTP for Silent Installation

l          75-Deploying Software Through File Sharing for Manual Installation

l          76-Deploying Green Software Through HTTP

l          77-Desktop Control

 

2010-03-05

Three videos added:

l          51-Antivirus Software Check for Access Users

l          52-Patch Check for Access Users

l          53-Software Management for Access Users

 

2010-02-22

Seven videos added:

l          02-Time-Based Access Control

l          03-Account-Access Device Binding

l          04-Fast 802.1X Authentication

l          05-Account-PC Binding

l          06-Unbinding Area Application

l          07-Certificate-Based 802.1X Authentication

l          08-Direct Portal Authentication

 

2010-01-22

First published.

 

Video List

Video

Description

01-802.1X Authentication

Implements 802.1X authentication and strict access control at access layer

02-Time-Based Access Control

Implements time-based access control so that users can access the network only in specified time periods.

03-Account-Access Device Binding

Limits an account’s access to the network to a specified device so that the account cannot be used in different areas for authentication.

04-Fast 802.1X Authentication

Creates a fast access account and confines the use of the account within public areas, reducing the access management of all visitors to a single account and ensuring the network security.

05-Account-PC Binding

Binds user computers with access accounts so that each account can only be used on a particular computer to access the network.

06-Unbinding Area Application

Allows accounts with binding configured to access such unbinding area where binding rules do not apply.

07-Certificate-Based 802.1X Authentication

Implements user authentication of high security and strict access control at access layer.

08-Direct Portal Authentication

Implements portal authentication and access control at distribution layer.

51-Antivirus Software Check for Access Users

Denies or isolates users if the anti-virus engine or virus definitions of the computers are too old. This helps protect security of the whole network.

52-Patch Check for Access Users

Denies or isolates users if necessary patches are missing on their computers. Auto patching is also provided to fix the violations.

53-Software Management for Access Users

Denies or isolates users if black software is installed or white software is missing on their computers, effectively controlling software installation and usage of enterprise internal users.

71-Automatic Asset Registration

Automatically registers assets to iMC DAM for unified management and monitoring.

72-Manual Asset Registration

Allows users to manually register assets to iMC DAM for unified management and monitoring.

73-Asset Changes Monitoring

Reports any changes of asset software or hardware to iMC DAM, allowing administrators to monitor such events and understand change history.

74-Deploying Software Through FTP for Silent Installation

Delivers a software deployment task so that user assets can automatically connect to the FTP server, download and install the software.

Any combination of a deployment method and an installation mode can be configured. For example, green software can be deployed through FTP.

75-Deploying Software Through File Sharing for Manual Installation

Delivers a software deployment task so that user assets can automatically connect to the file sharing server and download the software. Users can choose a proper time to manually install the software.

76-Deploying Green Software Through HTTP

Delivers a software deployment task so that user assets can automatically connect to the HTTP server and download the green software. Such software can be used directly without installation.

77-Desktop Control

Prevents unauthorized use of peripherals on both online and offline assets, including the use of various peripherals with USB interfaces, CD-ROMs, Infrared/Bluetooth devices, and modems.

 

 

 

Copyright ©2010 Hangzhou H3C Technologies Co., Ltd. All rights reserved.

No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of Hangzhou H3C Technologies Co., Ltd.

The information in this document is subject to change without notice.