beautypg.com

H3C Technologies H3C Intelligent Management Center User Manual

Page 962

background image

948

6.

Click Select Event to the right of the Event to Process field to select the type of security attack you

want to define this policy control event for.
The Select Attack Alarm dialog box appears.

7.

Click the radio button to the left of the attack alarm type you want to create this security control

policy for.

8.

Click OK.
The security event you selected for processing displays in the Event to Process field.

9.

Click Next to enter the Network Segment to Protect page to set the network range to which the
policy applies.

10.

If you want to apply this security control policy to the entire network, click the checkbox to the
left of It takes effect on the whole network. If you select this option, skip to Step 12.

11.

If you want to specify the IP address range to apply this security control policy to, do the following:

a.

Enter the last IP address for the IP address range you want to apply this security control policy
to in the End IP field.

b.

Click Add to add the IP address range to the Configured Segments list.

c.

To add more IP address ranges, repeat Step 11 for each IP address range you want to add.

12.

Click Next to enter the Protection Periods page to set the time periods in which the policy is
effective.

13.

If you want this security control policy to be always effective, click the checkbox to the left of The

policy is always effective. If you select this option, skip to Step 15.

14.

If you want to specify the time periods in which the security control policy is effective, do the
following:

a.

Clear the It takes effect all periods box. All time periods appear in the Period List.

b.

Select one or more time periods.

15.

Click Next to enter the Protect Alarm Sources page to configure whether to protect the devices that

generate alarms.

16.

If you want the security control policy to protect the devices that generate alarms, click It takes
effect on all alarm sources. If you select this option, skip to Step 18.
The It takes effect on all alarm sources option is grayed out for alarms that do not contain alarm
source variables.

17.

If you want to specify the alarm sources to be protected by the security control policy, do the
following:

a.

Clear the It takes effect all periods box. The page displays Device List, Custom View List, and
Device Group List.

b.

Click Select Device in the Device List area and then select the devices you want to protect in the
popup window. For more information about selecting devices, see "

Adding devices by View

"

and "

Adding devices by Advanced query

."

c.

Click Select Custom View in the Custom View List area.
The Select Custom View window appears.

d.

Select the checkbox to the left of Custom View to select all custom views. Clear the

checkbox to the left of Custom View to clear all custom views. Click Expand All to

expand

all custom views. Click Collapse All to collapse all custom views. Click to the left of a

custom view to expand all subviews of this view, and click to collapse all subviews of this

view.