beautypg.com

H3C Technologies H3C SecBlade IPS Cards User Manual

Page 10

background image

iii

Applying a Segment Bandwidth Control Scheme to the Segment..................................................8-4

Precautions .............................................................................................................................................8-4

9 Layer 2 Fallback.........................................................................................................................................9-1

Layer 2 Fallback Overview......................................................................................................................9-1

Configuring Layer 2 Fallback ..................................................................................................................9-1

Guidelines ...............................................................................................................................................9-2

10 Interface Status Synchronization.........................................................................................................10-1

Interface Status Synchronization Overview ..........................................................................................10-1

Configuring Interface Status Synchronization.......................................................................................10-1

11 Time Table Management.......................................................................................................................11-1

Time Table Management Overview ......................................................................................................11-1

Configuring Time Table Management...................................................................................................11-1

Configuration Task List..................................................................................................................11-1

Creating a Time Table ...................................................................................................................11-1

12 Action Management...............................................................................................................................12-1

Action Management Overview ..............................................................................................................12-1

Configuring Action Management...........................................................................................................12-1

Configuration Task List..................................................................................................................12-1

Creating a Block Action .................................................................................................................12-2

Creating a Notify Action.................................................................................................................12-3

Creating an Action Set...................................................................................................................12-4

Uploading Packet Trace Files .......................................................................................................12-7

13 Log Management ...................................................................................................................................13-1

System Logs .........................................................................................................................................13-1

System Logs Overview..................................................................................................................13-1

Displaying Recent Logs.................................................................................................................13-1

Querying System Logs ..................................................................................................................13-3

Deleting System Logs....................................................................................................................13-4

Backing Up System Logs ..............................................................................................................13-4

Operation Logs......................................................................................................................................13-4

Operation Logs Overview ..............................................................................................................13-4

Displaying Recent Logs.................................................................................................................13-5

Querying Operation Logs ..............................................................................................................13-6

Deleting Operation Logs................................................................................................................13-8

Backing Up Operation Logs ..........................................................................................................13-8

Attack Logs ...........................................................................................................................................13-8

Attack Logs Overview....................................................................................................................13-8

Displaying Recent Logs.................................................................................................................13-9

Querying Attack Logs ..................................................................................................................13-10

Deleting Attack Logs....................................................................................................................13-11

Virus Logs ...........................................................................................................................................13-12

Virus Logs Overview....................................................................................................................13-12

Displaying Recent Logs...............................................................................................................13-12

Querying Virus Logs ....................................................................................................................13-14