|00-Overview-the whole video set.rar||47.38 MB|
- Table of Contents
We provide iMC UAM/EAD configuration examples to show how they function to manage and protect your network effectively.
Click the download link to download the whole video set. Or you can go to each video description page to download the single video as needed.
Seven videos added:
l 71-Automatic Asset Registration
l 72-Manual Asset Registration
l 73-Asset Changes Monitoring
l 74-Deploying Software Through FTP for Silent Installation
l 75-Deploying Software Through File Sharing for Manual Installation
l 76-Deploying Green Software Through HTTP
l 77-Desktop Control
Three videos added:
l 51-Antivirus Software Check for Access Users
l 52-Patch Check for Access Users
l 53-Software Management for Access Users
Seven videos added:
l 02-Time-Based Access Control
l 03-Account-Access Device Binding
l 04-Fast 802.1X Authentication
l 05-Account-PC Binding
l 06-Unbinding Area Application
l 07-Certificate-Based 802.1X Authentication
l 08-Direct Portal Authentication
Implements 802.1X authentication and strict access control at access layer
02-Time-Based Access Control
Implements time-based access control so that users can access the network only in specified time periods.
03-Account-Access Device Binding
Limits an account’s access to the network to a specified device so that the account cannot be used in different areas for authentication.
04-Fast 802.1X Authentication
Creates a fast access account and confines the use of the account within public areas, reducing the access management of all visitors to a single account and ensuring the network security.
Binds user computers with access accounts so that each account can only be used on a particular computer to access the network.
06-Unbinding Area Application
Allows accounts with binding configured to access such unbinding area where binding rules do not apply.
07-Certificate-Based 802.1X Authentication
Implements user authentication of high security and strict access control at access layer.
08-Direct Portal Authentication
Implements portal authentication and access control at distribution layer.
51-Antivirus Software Check for Access Users
Denies or isolates users if the anti-virus engine or virus definitions of the computers are too old. This helps protect security of the whole network.
52-Patch Check for Access Users
Denies or isolates users if necessary patches are missing on their computers. Auto patching is also provided to fix the violations.
53-Software Management for Access Users
Denies or isolates users if black software is installed or white software is missing on their computers, effectively controlling software installation and usage of enterprise internal users.
71-Automatic Asset Registration
Automatically registers assets to iMC DAM for unified management and monitoring.
72-Manual Asset Registration
Allows users to manually register assets to iMC DAM for unified management and monitoring.
73-Asset Changes Monitoring
Reports any changes of asset software or hardware to iMC DAM, allowing administrators to monitor such events and understand change history.
74-Deploying Software Through FTP for Silent Installation
Delivers a software deployment task so that user assets can automatically connect to the FTP server, download and install the software.
Any combination of a deployment method and an installation mode can be configured. For example, green software can be deployed through FTP.
75-Deploying Software Through File Sharing for Manual Installation
Delivers a software deployment task so that user assets can automatically connect to the file sharing server and download the software. Users can choose a proper time to manually install the software.
76-Deploying Green Software Through HTTP
Delivers a software deployment task so that user assets can automatically connect to the HTTP server and download the green software. Such software can be used directly without installation.
Prevents unauthorized use of peripherals on both online and offline assets, including the use of various peripherals with USB interfaces, CD-ROMs, Infrared/Bluetooth devices, and modems.
Copyright ©2010 Hangzhou H3C Technologies Co., Ltd. All rights reserved.
No part of this manual may be reproduced or transmitted in any form or by any means without prior written consent of Hangzhou H3C Technologies Co., Ltd.
The information in this document is subject to change without notice.