beautypg.com
i
Contents
Overview ······································································································································································ 1
Introduction to H3C SecCenter Firewall Manager ········································································································ 1
What H3C SecCenter Firewall Manager can do ·········································································································· 1
Installation and uninstallation ······································································································································ 2
Installing the firewall manager ········································································································································ 2
Registering the firewall manager ····································································································································· 2
Uninstalling the firewall manager ··································································································································· 3
System management ···················································································································································· 5
Device management ························································································································································· 5
Managing devices ···················································································································································· 5
Managing batch import ········································································································································ 20
Managing device groups ····································································································································· 20
Managing events ··················································································································································· 22
Managing device access templates ···················································································································· 24
Managing the device software database ··········································································································· 27
Managing deployment tasks ································································································································ 29
Operator management ·················································································································································· 30
Managing operators ············································································································································· 30
Managing operation logs ····································································································································· 32
Changing your login password ··························································································································· 33
System configuration ······················································································································································ 34
Configuring system parameter ····························································································································· 34
Configuring management ports ··························································································································· 35
Configuring the mail server ·································································································································· 36
Managing filters ···················································································································································· 37
Managing LDAP servers ······································································································································· 39
Managing log retention time ································································································································ 41
Monitoring the disk space ···································································································································· 41
Managing subsystems ··········································································································································· 43
Firewall management ················································································································································ 46
Attack events monitoring ··············································································································································· 46
Snapshot of events ················································································································································ 46
Recent events list ···················································································································································· 48
Device monitoring ················································································································································· 49
Event analysis ································································································································································· 49
Event overview ······················································································································································· 49
Event details ··························································································································································· 51
Report exporting management ····························································································································· 53
Event auditing ································································································································································· 56
Inter-zone access log auditing ····························································································································· 56
Abnormal traffic log auditing ······························································································································· 56
Blacklist log auditing ············································································································································· 57
Operation log auditing ········································································································································· 57
Other log auditing ················································································································································· 58
NAT log auditing ··················································································································································· 58
MPLS log auditing ················································································································································· 59
Security policy management ········································································································································· 59