Platform Help >> Terminal Access Management >> Unauthorized Access

Unauthorized Access

With terminal access binding and switch access binding configured, when a terminal that does not meet the binding requirements accesses the network, the system generates the unauthorized access logs and considers the access as an unauthorized access.

The unauthorized access function enables you to:

Precautions

Functions

Related Topics