H3C Technologies H3C SecCenter IPS Manager User Manual
Page 5

i
Contents
Overview ······································································································································································ 1
Introduction to H3C SecCenter IPS Manager ················································································································1
What H3C SecCenter IPS Manager can do··················································································································1
Installation and uninstallation······································································································································ 2
Installing the IPS Manager ···············································································································································2
Registering the IPS Manager ···········································································································································2
Uninstalling the IPS Manager ··········································································································································3
System management···················································································································································· 5
Device management ·························································································································································5
Managing device groups ········································································································································5
Managing device access templates ·······················································································································6
Managing devices····················································································································································9
Managing events··················································································································································· 13
Configuring device interface alarming ··············································································································· 15
Operator management·················································································································································· 16
Managing operators ············································································································································· 16
Managing operation logs····································································································································· 18
Changing your login password ··························································································································· 19
System configuration······················································································································································ 20
Configuring service parameters··························································································································· 20
Configuring management ports ··························································································································· 21
Configuring the mail server·································································································································· 22
Configuring SMS alarming ·································································································································· 24
Managing filters ···················································································································································· 24
Monitoring the disk space ···································································································································· 27
Managing subsystems··········································································································································· 28
IPS management·························································································································································31
Overview········································································································································································· 31
IPS device management ················································································································································ 31
Managing IPS devices ·········································································································································· 31
Managing signature files······································································································································ 34
Displaying device statistics··································································································································· 36
Realtime monitoring ······················································································································································· 37
Displaying event snapshots ·································································································································· 37
Displaying attack/virus/DDoS snapshot list······································································································· 41
Monitoring IPS devices ········································································································································· 43
Event analysis ································································································································································· 43
Displaying attack/virus/DDoS attack event analysis reports ··········································································· 43
Displaying attack event details ···························································································································· 47
Displaying virus event details······························································································································· 50
Displaying DDoS event details····························································································································· 52
Configuring the alarming function······················································································································· 53
Managing report export tasks······························································································································ 56
Policy management························································································································································ 59
Configuring attack protection policies ················································································································ 59
Configuring anti-virus policies······························································································································ 63
Configuring policy applications ·························································································································· 67