H3C Technologies H3C SecCenter UTM Manager User Manual
Page 5

i
Contents
Overview ······································································································································································ 1
Introduction to H3C SecCenter UTM Manager ·············································································································1
What H3C SecCenter UTM Manager can do···············································································································1
Installation and uninstallation······································································································································ 2
Installing H3C SecCenter ·················································································································································2
Registering the UTM Manager·········································································································································4
Uninstalling the UTM Manager ·······································································································································5
Integration with iMC ···················································································································································· 7
Using SCMTOOL to integrate SecCenter into iMC·······································································································7
Removing SCMTOOL ·······················································································································································9
System management··················································································································································10
Device management ······················································································································································ 10
Managing device groups ····································································································································· 10
Managing device access templates ···················································································································· 12
Managing devices················································································································································· 15
Managing device software ·································································································································· 20
Managing the device configuration ···················································································································· 24
Managing the device software database··········································································································· 30
Managing deployment tasks································································································································ 32
Managing events··················································································································································· 33
Configuring device interface alarming ··············································································································· 35
Operator management·················································································································································· 35
Managing Operators············································································································································ 35
Managing operation logs····································································································································· 38
Changing your password····································································································································· 39
System configuration······················································································································································ 40
Configuring service parameters··························································································································· 40
Configuring system parameters ··························································································································· 41
Configuring management ports ··························································································································· 41
Configuring the mail server·································································································································· 43
Configuring SMS alarming ·································································································································· 44
Managing filters ···················································································································································· 45
Managing LDAP servers ······································································································································· 47
Configuring SMS alarming ·································································································································· 49
Configuring segments ··········································································································································· 50
Monitoring the disk space ···································································································································· 51
Managing subsystems··········································································································································· 53
Bandwidth management············································································································································56
Traffic snapshot ······························································································································································ 56
Traffic snapshot······················································································································································ 56
Segment traffic comparison·································································································································· 58
Traffic anomaly alarm··········································································································································· 59
Service traffic analysis by device group······················································································································ 61
Service traffic trend ··············································································································································· 61
Service traffic distribution ····································································································································· 65
Generic service analysis······································································································································· 68
Service traffic analysis by user ····································································································································· 69