Unauthorized Access
With terminal access binding and switch access binding configured, when a terminal that does not meet the binding requirements accesses the network, the system generates the unauthorized access logs and considers the access as an unauthorized access.
The unauthorized access function enables you to:
- Configure terminal access binding or switch access binding for the detected unauthorized accesses
- Delete unauthorized access records
- Query unauthorized access logs
Precautions
- If an unauthorized access record is deleted, the corresponding unauthorized access logs that have the same terminal MAC, access device IP, and access interface as the record are also deleted.
Functions
Related Topics