- Table of Contents
-
- 03-Monitor
- 01-Application analysis center
- 02-Blacklist logs
- 03-Single-packet attack logs
- 04-Scanning attack logs
- 05-Flood attack logs
- 06-WAF logs
- 07-Threat logs
- 08-Reputation logs
- 09-URL filtering logs
- 10-File filtering logs
- 11-Security policy logs
- 12-IPCAR logs
- 13-Sandbox logs
- 14-Terminal status
- 15-Application audit logs
- 16-System logs
- 17-Configuration logs
- 18-Traffic logs
- 19-TopN traffic
- 20-Security policy hit analysis
- 21-TopN threats
- 22-TopN URL filtering statistics
- 23-TopN file filtering statistics
- 24-Attack defense statistics
- 25-Connection rate ranking
- 26-TopN traffic trends
- 27-Security policy hit trend analysis
- 28-TopN threat trends
- 29-TopN URL filtering trends
- 30-TopN file filtering trends
- 31-Botnet analysis
- 32-Asset security
- 33-Threat case management
- 34-Report settings
- 35-Session list
- 36-User information center
- 37-IPv4 online users
- 38-IPv6 online users
- 39-MAC authentication online users
- 40-Terminal status
- Related Documents
-
Title | Size | Download |
---|---|---|
39-MAC authentication online users | 13.53 KB |
MAC authentication online users
Introduction
The MAC authentication online user list displays information about all MAC authentication online users. On the list, you can view the access interface, MAC address, authorization VLAN, and login time, and so on of each online user. Additionally, you can forcibly log off online users as an administrator.
For this page to display information about a user, the following operations must be performed:
1. Enable MAC authentication globally and on the user's access interface on the Network > Security Access > MAC Access > MAC Authentication page.
2. The user accesses the interface and passes MAC authentication successfully.