beautypg.com

H3C Technologies H3C SecCenter Firewall Manager User Manual

Page 5

background image

i

Contents

Overview ······································································································································································ 1

 

Introduction to H3C SecCenter Firewall Manager ········································································································ 1

 

What H3C SecCenter Firewall Manager can do ·········································································································· 1

 

Installation and uninstallation ······································································································································ 2

 

Installing the firewall manager ········································································································································ 2

 

Registering the firewall manager ····································································································································· 2

 

Uninstalling the firewall manager ··································································································································· 3

 

System management ···················································································································································· 5

 

Device management ························································································································································· 5

 

Managing devices ···················································································································································· 5

 

Managing batch import ········································································································································ 20

 

Managing device groups ····································································································································· 20

 

Managing events ··················································································································································· 22

 

Managing device access templates ···················································································································· 24

 

Managing the device software database ··········································································································· 27

 

Managing deployment tasks ································································································································ 29

 

Operator management ·················································································································································· 30

 

Managing operators ············································································································································· 30

 

Managing operation logs ····································································································································· 32

 

Changing your login password ··························································································································· 33

 

System configuration ······················································································································································ 34

 

Configuring system parameter ····························································································································· 34

 

Configuring management ports ··························································································································· 35

 

Configuring the mail server ·································································································································· 36

 

Managing filters ···················································································································································· 37

 

Managing LDAP servers ······································································································································· 39

 

Managing log retention time ································································································································ 41

 

Monitoring the disk space ···································································································································· 41

 

Managing subsystems ··········································································································································· 43

 

Firewall management ················································································································································ 46

 

Attack events monitoring ··············································································································································· 46

 

Snapshot of events ················································································································································ 46

 

Recent events list ···················································································································································· 48

 

Device monitoring ················································································································································· 49

 

Event analysis ································································································································································· 49

 

Event overview ······················································································································································· 49

 

Event details ··························································································································································· 51

 

Report exporting management ····························································································································· 53

 

Event auditing ································································································································································· 56

 

Inter-zone access log auditing ····························································································································· 56

 

Abnormal traffic log auditing ······························································································································· 56

 

Blacklist log auditing ············································································································································· 57

 

Operation log auditing ········································································································································· 57

 

Other log auditing ················································································································································· 58

 

NAT log auditing ··················································································································································· 58

 

MPLS log auditing ················································································································································· 59

 

Security policy management ········································································································································· 59