The device-profile command creates a terminal type identification profile and enters the terminal type identification profile view, or directly enters the view of a terminal type identification profile that has already been created.
The undo device-profile command deletes a terminal type identification profile that has been created.
By default, no terminal type identification profile is created.
This function is supported only by the S5730-HI, S5731-H, S5731S-H, S6730-H, S6730S-H, S5732-H, S6720-HI, and S5720-HI and takes effect only for wireless access users.
The AP3010DN-AGN does not support terminal type identification.
device-profile profile-name profile-name
undo device-profile { all | profile-name profile-name }
Parameter |
Description |
Value |
---|---|---|
profile-name profile-name |
Specifies the name of a terminal type identification profile. |
The value is a string of 1 to 31 case-sensitive characters without characters including spaces and the following:/ \ : * ? " < > | @ ' %. The value cannot be - or --. |
all |
Deletes all terminal type identification profiles. |
- |
With the development of Internet, many enterprises allow employees to wirelessly access the enterprise intranet using their own intelligent devices such as cellphones, tablets, and laptops, which satisfies employees' pursuit of new technology and desire of being unique, and improves their efficiency as well. This is called Bring Your Own Device (BYOD). However, access to enterprise intranet through PCs may cause potential security risks, and traditional security technology based on user identity authentication and authorization can no longer guarantee network security. It is in such a background that the terminal type identification technology comes out. With this technology, the types of the devices that employees use to access the intranet can be identified, facilitating access control. During the implementation of BYOD, administrators can limit intranet access rights to specified types of mobile devices and perform authentication and authorization based on users, device types, access time, access points, and environment information about the devices.
A terminal type identification profile is configured with terminal types that can be identified by devices, and identification rules. With the configured identification rules, the types of devices using which employees access the intranet can be identified, helping administrators to control employees' access rights.