beautypg.com

H3C Technologies H3C SecCenter Firewall Manager User Manual

Page 6

background image

ii

Virtual device group ·············································································································································· 60

 

Managing virtual devices ····································································································································· 63

 

Security zones ························································································································································ 67

 

Time ranges ···························································································································································· 71

 

Services ·································································································································································· 73

 

IP addresses ··························································································································································· 78

 

Interzone rules························································································································································ 86

 

Interzone policy application ································································································································· 91

 

Intrusion detection ·························································································································································· 97

 

Blacklist ··································································································································································· 97

 

Packet inspection ················································································································································· 102

 

Firewall device management ······································································································································ 105

 

Managing firewall devices ································································································································· 105

 

Viewing device statistics ····································································································································· 107

 

Managing the device configuration database ································································································· 107

 

Managing deployment tasks ······························································································································ 114

 

SSL VPN auditing ···················································································································································· 116

 

Comprehensive analysis ·············································································································································· 116

 

Online users ························································································································································· 116

 

Online users trends ·············································································································································· 117

 

Daily user statistics ·············································································································································· 117

 

Device monitoring ··············································································································································· 118

 

SSL VPN log auditing ·················································································································································· 119

 

User access records auditing ····························································································································· 119

 

Operation log auditing ······································································································································· 119

 

Resource access auditing ··································································································································· 120

 

Authentication failure auditing ··························································································································· 120

 

Configuration example 1 ······································································································································· 122

 

Network requirements ················································································································································· 122

 

Configuration procedure ············································································································································· 122

 

Adding devices to the firewall manager ··········································································································· 122

 

Index ········································································································································································ 124