beautypg.com

Configuring a protocol auditing policy, Verification, Firewall logs and seccenter analysis – H3C Technologies H3C SecCenter UTM Manager User Manual

Page 255

background image

247

NOTE:

Only the U200-A supports flow logging.

Configuring a protocol auditing policy

1.

Select Protocol Audit > Segment Policy Management from the navigation tree to enter the segment

policy configuration page.

2.

Apply the default auditing policy to segment 3.

3.

Click Activate.

Figure 238 Segment policy configuration page

NOTE:

After configuring all the policies, click Activate to bring them into effect.

Verification

Firewall logs and SecCenter analysis

Displaying logs on the firewall webpage

When attack packets, such as Land attack packets and Winnuke attack packets, travel from the internal

PC to the external PC, or from the external PC to the internal PC, the firewall will detect them and log the

events.
Select Log Report > Report to display the system logs, connection limit logs, attack prevention logs,

blacklist logs, interzone policy logs and user logs.

Attack prevention logs

Blacklist logs