H3C Technologies H3C SecBlade IPS Cards User Manual
Page 11
iv
Deleting Virus Logs .....................................................................................................................13-15
Service Logs .......................................................................................................................................13-16
URL Logs ............................................................................................................................................13-17
Log Configuration................................................................................................................................13-19
Log Configuration Overview ........................................................................................................13-19
Configuring Device Logs .............................................................................................................13-19
Configuring Data Logs.................................................................................................................13-20
Configuring Email Parameters ....................................................................................................13-22
14 IPS ...........................................................................................................................................................14-1
IPS Overview ........................................................................................................................................14-1
Configuring IPS .....................................................................................................................................14-1
Configuration Task List..................................................................................................................14-1
Creating IPS Policy........................................................................................................................14-2
Configuring Default Rules for the Policy........................................................................................14-3
IPS Configuration Example .................................................................................................................14-11
Configuration Guidelines.....................................................................................................................14-14
15 URL Filtering Configuration .................................................................................................................15-1
URL Filtering Overview .........................................................................................................................15-1
Configuring URL Filtering......................................................................................................................15-1
Configuration Task List..................................................................................................................15-1
URL Filtering Configuration Example..................................................................................................15-10
URL Filtering Configuration Example (Category-Based URL Filtering Unsupported).................15-15
Configuration Guidelines.....................................................................................................................15-19
16 Anti-Virus Configuration .......................................................................................................................16-1
Anti-Virus Overview...............................................................................................................................16-1
Configuring Anti-Virus ...........................................................................................................................16-1
Configuration Task List..................................................................................................................16-1
Creating an Anti-Virus Policy.........................................................................................................16-2
Configuring Rules for the Policy ....................................................................................................16-2
Applying the Policy to a Segment..................................................................................................16-5
Querying Viruses ...........................................................................................................................16-6
Anti-Virus Configuration Example .........................................................................................................16-6
Configuration Guidelines.....................................................................................................................16-10
17 DDoS Protection Configuration ...........................................................................................................17-1
Overview ...............................................................................................................................................17-1
Introduction to DDoS .....................................................................................................................17-1
Terminology of DDoS Protection...................................................................................................17-2