H3C Technologies H3C SecBlade IPS Cards User Manual
Page 10
iii
Precautions .............................................................................................................................................8-4
9 Layer 2 Fallback.........................................................................................................................................9-1
Layer 2 Fallback Overview......................................................................................................................9-1
Configuring Layer 2 Fallback ..................................................................................................................9-1
Guidelines ...............................................................................................................................................9-2
10 Interface Status Synchronization.........................................................................................................10-1
Interface Status Synchronization Overview ..........................................................................................10-1
Configuring Interface Status Synchronization.......................................................................................10-1
11 Time Table Management.......................................................................................................................11-1
Time Table Management Overview ......................................................................................................11-1
Configuring Time Table Management...................................................................................................11-1
Configuration Task List..................................................................................................................11-1
Creating a Time Table ...................................................................................................................11-1
12 Action Management...............................................................................................................................12-1
Action Management Overview ..............................................................................................................12-1
Configuring Action Management...........................................................................................................12-1
Configuration Task List..................................................................................................................12-1
Creating a Block Action .................................................................................................................12-2
Creating a Notify Action.................................................................................................................12-3
Creating an Action Set...................................................................................................................12-4
Uploading Packet Trace Files .......................................................................................................12-7
13 Log Management ...................................................................................................................................13-1
System Logs .........................................................................................................................................13-1
System Logs Overview..................................................................................................................13-1
Displaying Recent Logs.................................................................................................................13-1
Querying System Logs ..................................................................................................................13-3
Deleting System Logs....................................................................................................................13-4
Backing Up System Logs ..............................................................................................................13-4
Operation Logs......................................................................................................................................13-4
Operation Logs Overview ..............................................................................................................13-4
Displaying Recent Logs.................................................................................................................13-5
Querying Operation Logs ..............................................................................................................13-6
Deleting Operation Logs................................................................................................................13-8
Backing Up Operation Logs ..........................................................................................................13-8
Attack Logs ...........................................................................................................................................13-8
Attack Logs Overview....................................................................................................................13-8
Displaying Recent Logs.................................................................................................................13-9
Querying Attack Logs ..................................................................................................................13-10
Deleting Attack Logs....................................................................................................................13-11
Virus Logs ...........................................................................................................................................13-12
Virus Logs Overview....................................................................................................................13-12
Displaying Recent Logs...............................................................................................................13-12
Querying Virus Logs ....................................................................................................................13-14