Operation Manual – AAA & RADIUS & HWTACACS & EAD
H3C S7500 Series Ethernet Switches
Figure 2-1 EAD basic principle
2.2 Typical Network Application of EAD
The EAD scheme checks the security status of the user, and implements the user
access control policy forcibly according to the result. Therefore, those non-compliant
users are isolated and are forced to upgrade virus database software and install system
patches.
Figure 2-2 Typical network application of EAD
Figure 2-2
shows the typical network application of EAD.
2-2
Chapter 2 EAD Configuration