beautypg.com

H3C Technologies H3C SecBlade IPS Cards User Manual

Page 11

background image

iv

Deleting Virus Logs .....................................................................................................................13-15

Service Logs .......................................................................................................................................13-16

URL Logs ............................................................................................................................................13-17

Log Configuration................................................................................................................................13-19

Log Configuration Overview ........................................................................................................13-19

Configuring Device Logs .............................................................................................................13-19

Configuring Data Logs.................................................................................................................13-20

Configuring Email Parameters ....................................................................................................13-22

14 IPS ...........................................................................................................................................................14-1

IPS Overview ........................................................................................................................................14-1

Configuring IPS .....................................................................................................................................14-1

Configuration Task List..................................................................................................................14-1

Creating IPS Policy........................................................................................................................14-2

Configuring Default Rules for the Policy........................................................................................14-3

Configuring User Defined Rules for the Policy ..............................................................................14-6

Applying an IPS Policy to a Segment............................................................................................14-8

Configuring IPS Policy Fast Application ......................................................................................14-10

IPS Configuration Example .................................................................................................................14-11

Configuration Guidelines.....................................................................................................................14-14

15 URL Filtering Configuration .................................................................................................................15-1

URL Filtering Overview .........................................................................................................................15-1

Configuring URL Filtering......................................................................................................................15-1

Configuration Task List..................................................................................................................15-1

Configuring Global Parameters for URL Filtering..........................................................................15-2

Creating and Applying a URL Filtering Policy ...............................................................................15-4

URL Filtering Configuration Example..................................................................................................15-10

URL Filtering Configuration Example (Category-Based URL Filtering Supported).....................15-10

URL Filtering Configuration Example (Category-Based URL Filtering Unsupported).................15-15

Configuration Guidelines.....................................................................................................................15-19

16 Anti-Virus Configuration .......................................................................................................................16-1

Anti-Virus Overview...............................................................................................................................16-1

Configuring Anti-Virus ...........................................................................................................................16-1

Configuration Task List..................................................................................................................16-1

Creating an Anti-Virus Policy.........................................................................................................16-2

Configuring Rules for the Policy ....................................................................................................16-2

Applying the Policy to a Segment..................................................................................................16-5

Querying Viruses ...........................................................................................................................16-6

Anti-Virus Configuration Example .........................................................................................................16-6

Configuration Guidelines.....................................................................................................................16-10

17 DDoS Protection Configuration ...........................................................................................................17-1

Overview ...............................................................................................................................................17-1

Introduction to DDoS .....................................................................................................................17-1

Terminology of DDoS Protection...................................................................................................17-2

Implementation of DDoS Protection ..............................................................................................17-2